• Title/Summary/Keyword: Networks Safety

Search Result 582, Processing Time 0.028 seconds

Generative Artificial Intelligence for Structural Design of Tall Buildings

  • Wenjie Liao;Xinzheng Lu;Yifan Fei
    • International Journal of High-Rise Buildings
    • /
    • v.12 no.3
    • /
    • pp.203-208
    • /
    • 2023
  • The implementation of artificial intelligence (AI) design for tall building structures is an essential solution for addressing critical challenges in the current structural design industry. Generative AI technology is a crucial technical aid because it can acquire knowledge of design principles from multiple sources, such as architectural and structural design data, empirical knowledge, and mechanical principles. This paper presents a set of AI design techniques for building structures based on two types of generative AI: generative adversarial networks and graph neural networks. Specifically, these techniques effectively master the design of vertical and horizontal component layouts as well as the cross-sectional size of components in reinforced concrete shear walls and frame structures of tall buildings. Consequently, these approaches enable the development of high-quality and high-efficiency AI designs for building structures.

The Activities of APEC to Reinforce the Cooperation and the Competence of Food Safety Management in Asia Pacific Region (아태지역 식품안전관리 협력과 역량강화를 위한 APEC의 활동)

  • Lee, Ggot-Im;Hwang, Myung-Sil;Yoon, Hye-Jung;Lee, Cherl-Ho
    • Journal of Food Hygiene and Safety
    • /
    • v.27 no.2
    • /
    • pp.176-181
    • /
    • 2012
  • Persistent accidents related to food safety and expanded international trades have urged the world to be aware of the gravity of the accidents. Accordingly many countries have tried to come up with various laws, regulations, measures, support networks and educational programs for the agenda, particularly focusing on harmonizing food safety technologies among nations and fostering professionals. Also, APEC newly organized Food Safety Cooperation Forum (FSCF) in 2007 to exert multi-dimensional efforts to improve food safety for Asia Pacific nations. Up to now, 35 activities have been promoted since 2007 and additional 20 activities are waiting for their turns for action on the list of APEC project agenda. FSCF has the objective that it helps the stakeholders in food supply chain develop their own competence in that area, thus increase international trade among nations and maintain the globe healthy by applying the highest standards and best practices for the management of food safety ranging from production to consumption. To achieve this strategic objective, APEC subsequently formed Partnership Training Institute Network (PTIN) to build up the multilateral networks of specialists from governmental agencies engaging in food safety management, industries, academia and international organizations in Asia-Pacific region. This attempt made it possible for the world to exchange their scientific and technological information concerning food safety and strengthen related education and training. Today, international cooperation is essential for food safety management. Therefore, we need to participate actively in the activities of APEC FSCF to contribute to improving food safety technologies for the member countries of APEC. We also need to connect the domestic support programs with theirs.

DTCF: A Distributed Trust Computing Framework for Vehicular Ad hoc Networks

  • Gazdar, Tahani;Belghith, Abdelfettah;AlMogren, Ahmad S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1533-1556
    • /
    • 2017
  • The concept of trust in vehicular ad hoc networks (VANETs) is usually utilized to assess the trustworthiness of the received data as well as that of the sending entities. The quality of safety applications in VANETs largely depends on the trustworthiness of exchanged data. In this paper, we propose a self-organized distributed trust computing framework (DTCF) for VANETs to compute the trustworthiness of each vehicle, in order to filter out malicious nodes and recognize fully trusted nodes. The proposed framework is solely based on the investigation of the direct experience among vehicles without using any recommendation system. A tier-based dissemination technique for data messages is used to filter out non authentic messages and corresponding events before even going farther away from the source of the event. Extensive simulations are conducted using Omnet++/Sumo in order to investigate the efficiency of our framework and the consistency of the computed trust metrics in both urban and highway environments. Despite the high dynamics in such networks, our proposed DTCF is capable of detecting more than 85% of fully trusted vehicles, and filtering out virtually all malicious entities. The resulting average delay to detect malicious vehicles and fraudulent data is showed to be less than 1 second, and the computed trust metrics are shown to be highly consistent throughout the network.

Fragility assessment of RC bridges using numerical analysis and artificial neural networks

  • Razzaghi, Mehran S.;Safarkhanlou, Mehrdad;Mosleh, Araliya;Hosseini, Parisa
    • Earthquakes and Structures
    • /
    • v.15 no.4
    • /
    • pp.431-441
    • /
    • 2018
  • This study provides fragility-based assessment of seismic performance of reinforced concrete bridges. Seismic fragility curves were created using nonlinear analysis (NA) and artificial neural networks (ANNs). Nonlinear response history analyses were performed, in order to calculate the seismic performances of the bridges. To this end, 306 bridge-earthquake cases were considered. A multi-layered perceptron (MLP) neural network was implemented to predict the seismic performances of the selected bridges. The MLP neural networks considered herein consist of an input layer with four input vectors; two hidden layers and an output vector. In order to train ANNs, 70% of the numerical results were selected, and the remained 30% were employed for testing the reliability and validation of ANNs. Several structures of MLP neural networks were examined in order to obtain suitable neural networks. After achieving the most proper structure of neural network, it was used for generating new data. A total number of 600 new bridge-earthquake cases were generated based on neural simulation. Finally, probabilistic seismic safety analyses were conducted. Herein, fragility curves were developed using numerical results, neural predictions and the combination of numerical and neural data. Results of this study revealed that ANNs are suitable tools for predicting seismic performances of RC bridges. It was also shown that yield stresses of the reinforcements is one of the important sources of uncertainty in fragility analysis of RC bridges.

A Survey on Spectrum Sharing in Cognitive Radio Networks

  • Xu, Tangwen;Li, Zhenshuang;Ge, Jianhua;Ding, Haiyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3751-3774
    • /
    • 2014
  • With the rapid development of wireless communication, the confliction between the scarce frequency resources and the low spectral efficiency caused by the stationary spectrum sharing strategies seriously restricts the evolution of the future mobile communication. For this purpose, cognitive radio (CR) emerges as one of the most promising inventions which can overcome the spectrum shortage. As the key technology and main objective of CR, spectrum sharing can make full use of the limited spectrum, alleviate the scarcity of frequency resources and improve the system utilities, playing thereby an important role in improving the system performance of cognitive radio networks (CRNs). In this survey, the spectrum sharing in CRNs is discussed in terms of the sharing process, mainstream sharing technologies and spectrum sharing models. In particular, comparisons of different spectrum sharing strategies are concluded, as well as that of different spectrum sensing schemes in sharing procedure. Moreover, some application examples of the spectrum sharing in CRNs, such as smart grid, public safety, cellular network and medical body area networks are also introduced. In addition, our previous related works are presented and the open research issues in the field of spectrum sharing are stated as well.

A Survey on UAV Network for Secure Communication and Attack Detection: A focus on Q-learning, Blockchain, IRS and mmWave Technologies

  • Madhuvanthi T;Revathi A
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.779-800
    • /
    • 2024
  • Unmanned Aerial Vehicle (UAV) networks, also known as drone networks, have gained significant attention for their potential in various applications, including communication. UAV networks for communication involve using a fleet of drones to establish wireless connectivity and provide communication services in areas where traditional infrastructure is lacking or disrupted. UAV communication networks need to be highly secured to ensure the technology's security and the users' safety. The proposed survey provides a comprehensive overview of the current state-of-the-art UAV network security solutions. In this paper, we analyze the existing literature on UAV security and identify the various types of attacks and the underlying vulnerabilities they exploit. Detailed mitigation techniques and countermeasures for the protection of UAVs are described in this paper. The survey focuses on the implementation of novel technologies like Q-learning, blockchain, IRS, and mmWave. This paper discusses network simulation tools that range in complexity, features, and programming capabilities. Finally, future research directions and challenges are highlighted.

A Priority-Based Bandwidth Management Method in Public Safety Networks (재난 안전 통신망에서 우선순위를 고려한 대역폭 관리 방법)

  • Lee, Sang-Hoon;Kim, Hyun-Woo;Yoon, Hyun-Goo;Choi, Yong-Hoon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.15 no.2
    • /
    • pp.102-110
    • /
    • 2016
  • After Sewol ferry disaster occurred in April 2014, Korean government began investing to deploy LTE-based public safety network until the year of 2017. In order to reduce the operating and capital costs, resource sharing scheme among public safety network and commercial LTE networks is considered as one of the viable approaches. This thesis proposes a method of allocating bandwidth of public safety network based on various priorities required for disaster scenarios and stages in a resource sharing environment. In order to obtain the highest efficiency, we formulate the bandwidth allocation problem as a Fractional Knapsack Problem. Greedy algorithm was applied to solve the problem. For performance evaluation, we created several disaster scenarios and set suitable parameters for each scenario based on a disaster manual. The proposed method is compared with two typical methods, which are Class-based bandwidth allocation and Uniform bandwidth allocation. The results showed that the better performance in terms of the sum of the values and the amount of lost bytes.

Psychosocial Risks Assessment in Cryopreservation Laboratories

  • Fernandes, Ana;Figueiredo, Margarida;Ribeiro, Jorge;Neves, Jose;Vicente, Henrique
    • Safety and Health at Work
    • /
    • v.11 no.4
    • /
    • pp.431-442
    • /
    • 2020
  • Background: Psychosocial risks are increasingly a type of risk analyzed in organizations beyond chemical, physical, and biological risks. To this type of risk, a greater attention has been given following the update of ISO 9001: 2015, more precisely the requirement 7.1.4 for the process operation environment. The update of this normative reference was intended to approximate OHSAS 18001: 2007 reference updated in 2018 with the publication of ISO 45001. Thus, the organizations are increasingly committed to achieving and demonstrating good occupational health and safety performance. Methods: The aim of this study was to characterize the psychosocial risks in a cryopreservation laboratory and to develop a predictive model for psychosocial risk management. The methodology followed to collect the information was the inquiry by questionnaire that was applied to a sample comprising 200 employees. Results: The results show that most of the respondents are aware of the psychosocial risks, identifying interpersonal relationships and emotional feelings as the main factors that lead to this type of risks. Furthermore, terms such as lack of resources, working hours, lab equipment, stress, and precariousness show strong correlation with psychosocial risks. The model presented in this study, based on artificial neural networks, exhibited good performance in the prediction of the psychosocial risks. Conclusion: This work presents the development of an intelligent system that allows identifying the weaknesses of the organization and contributing to the enhancement of the psychosocial risks management.

A Study on the suitable Underground space for Safety against Terror (테러안전을 위한 지하공간의 예방대책)

  • Kwon, Jeong-hoon;Park, Ok-cheol;Kim, Tae-hwan
    • Journal of the Society of Disaster Information
    • /
    • v.4 no.1
    • /
    • pp.34-52
    • /
    • 2008
  • The result of all terrors causes enormous damage. In order to prevent this damage in advance and find a prompt provision after terror, we investigated a safety measure against terror on the assumption that the fire in Daegu central subway is a subway terror. The followings are the safety measures against terror based on an underground space. Frist, training systems have to be established to provide against a terror. Second, People's consciousness about safety from a terror, centering on early education, has to be raised. Third, the provisions related with underground tunnel have to be established so that people can take shelter in underground tunnel areas. Fourth, CCTV has to be established in the guest rooms of the electric motor cars. Last, cooperative systems among related organizations have to be constructed, and the networks of the organizations have to be established so that they can cope with an accident.

  • PDF

Access Policy Transfer Between Active Nodes Using Identities

  • Kim, Young-Soo;Han, Jong-Wook;Seo, Dong-Il;Sohn, Seung-Won
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2178-2181
    • /
    • 2003
  • Active networks allow active node’s functionality to be extended dynamically through the use of active extensions. This flexible architecture facilitates the deployment of new network protocols and services. However, the active nature of a network also raises serious safety and security concerns. These concerns must be addressed before active networks can be deployed. In this paper we look at how we can control active extension’s access to different active nodes. Specifically, the authentication between active nodes is very important in this case. We use unique identity each node has for transferring access policies between active nodes. In this paper, we suggest a new method of transferring access policies performing authentications using identities between active nodes.

  • PDF