• Title/Summary/Keyword: crowd

Search Result 319, Processing Time 0.026 seconds

Proposal for Developed Procurement and Material management System On Using Previous System Analysis in Plant Engineering (플랜트 구매조달 및 자재관리 시스템 개발 요구사항 분석을 통한 개발 방향 제시)

  • Lee, Seung-Hun;Kim, Sun-Kuk;Lee, Jun-Bok;Han, Choong-Hee
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2006.11a
    • /
    • pp.204-209
    • /
    • 2006
  • Despite the recent depression of the construction industry, overseas plant market especially Middle East plant market is booming owing to the high oil price. Since many Middle Eastern countries are placing orders of big scale projects based on the high oil price, Korean EPC contractor are trying to get over the depression through theses plants. Presently, since the plant market is in prosperous condition in general, it is not hard to get overseas orders; however the original licenses that requirehigher technology and high added values are exclusive for advanced engineering companies which great difficulty is predicted for developing countries like us to join the crowd. Therefore, the objective of this study is to propose establishment of material management system on the filed to gain optimized effect of material management in connection with procurement system that all the procurement related personals execute tasks in advanced level by systemizing the task operation within the knowledge and task ability in time for plant construction procurement as a method to strengthening the competitiveness of Korean companies.

  • PDF

Comparison of Egress Modeling and Experiments for Flow Rate in the Bottleneck (병목현상 시 유동률에 대한 피난실험 및 모델링 비교)

  • Hwang, Eun-Kyoung;Woo, Sujin;Kim, Jong-Hoon;Kim, Woon-Hyung
    • Fire Science and Engineering
    • /
    • v.28 no.6
    • /
    • pp.35-40
    • /
    • 2014
  • Bottleneck occurs as many people crowd into narrow doorway or corridor. Delaying egress time is occurred by bottleneck effect, and it is very important phenomenon on the egress analysis for building fire. An analysis of egress time should includes flow rate for considering bottleneck. Flow rate is numbers of people who pass the narrow gate as door or start point of corridor per unit length and unit time. The flow rate resulted from egress modeling should be approached to the result of experiments. In this study, flow rates from modeling by 'Pathfinder' and experiments was compared. The difference between the result from egress modeling and the one from experiments was verified. The average value of experiments is $4.25N/m{\cdot}s$, and the maximum average value of modeling is $1.55N/m{\cdot}s$.

Modeling and Evaluating Information Diffusion for Spam Detection in Micro-blogging Networks

  • Chen, Kan;Zhu, Peidong;Chen, Liang;Xiong, Yueshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.8
    • /
    • pp.3005-3027
    • /
    • 2015
  • Spam has become one of the top threats of micro-blogging networks as the representations of rumor spreading, advertisement abusing and malware distribution. With the increasing popularity of micro-blogging, the problems will exacerbate. Prior detection tools are either designed for specific types of spams or not robust enough. Spammers may escape easily from being detected by adjusting their behaviors. In this paper, we present a novel model to quantitatively evaluate information diffusion in micro-blogging networks. Under this model, we found that spam posts differ wildly from the non-spam ones. First, the propagations of non-spam posts mostly result from their followers, but those of spam posts are mainly from strangers. Second, the non-spam posts relatively last longer than the spam posts. Besides, the non-spam posts always get their first reposts/comments much sooner than the spam posts. With the features defined in our model, we propose an RBF-based approach to detect spams. Different from the previous works, in which the features are extracted from individual profiles or contents, the diffusion features are not determined by any single user but the crowd. Thus, our method is more robust because any single user's behavior changes will not affect the effectiveness. Besides, although the spams vary in types and forms, they're propagated in the same way, so our method is effective for all types of spams. With the real data crawled from the leading micro-blogging services of China, we are able to evaluate the effectiveness of our model. The experiment results show that our model can achieve high accuracy both in precision and recall.

Passenger Ship Evacuation Simulation using Algorithm for Determination of Evacuating Direction based on Walking Direction Potential Function (보행 방향 포텐셜 함수 기반의 탈출 경로 결정 알고리즘을 이용한 여객선 승객 탈출 시뮬레이션)

  • Ha, Sol;Cho, Yoon-Ok;Ku, Namkug;Park, Kwangphil;Lee, Kyu-Yeul;Roh, Myung-Il
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.50 no.5
    • /
    • pp.307-313
    • /
    • 2013
  • This paper presents a simulation for passenger ship evacuation considering determination of evacuating direction based on walking direction potential function. In order to determine walking direction of a passenger, his/her position in two dimensional plane was adopted as a design variable, and fixed boundaries such as walls and obstacles were adopted as constraints. To solve this optimum problem, a walking direction potential function was adopted as an objective function. This potential function was configured as a kind of penalty function and it contained two components. One is a potential function concerned with the distance to the destination, and other is a potential function based on the effect of walls and obstacles. To determine evacuating direction, this problem was solved by minimizing the walking direction potential function every unit time during the simulation. The crowd behavior of the passenger consisted of the flock behavior, a form of collective behavior of a large number of interacting passengers with a common group. With the proposed algorithm, the test problems in International Maritime Organization, Maritime Safety Committee/Circulation 1238(IMO MSC/Circ.1238) were implemented and the direction of passengers and total evacuation time was analyzed.

Black Gold or the Devil's Curse? Oil and Networks in Azerbaijan (검은 황금인가 악마의 저주인가? 아제르바이쟌의 석유와 연줄망)

  • Lee, Chai-Mun
    • Journal of the Korean association of regional geographers
    • /
    • v.11 no.6
    • /
    • pp.640-656
    • /
    • 2005
  • A chronic depression in the Korean economy, which depends mostly on imported oil, has been attributed partly to rising crude oil prices recently. Against the backdrop of these realities in Korea, Azerbaijan in the Caspian region, with vast oil and gas deposits, has been greeted enviously by some Koreans. Many transition economies, especially on the Caspian region trumpeted by the oil boom, however, are rich in natural resources, but the benefits of those resources are appropriated by the local elite in collusion with foreign companies. Azerbaijan, in particular, is dominated by a series of internal and external patronage networks. Foreign capital nourishes those networks surrounding President Aliev. Thus, the case of Azerbaijan shows that resource rents in the transition economies sometimes do not help in improving the living conditions of ordinary people. Rather rich resource rents turn out to be a major impediment to the emerging development of the transition economy, lessening the incentives to reform in the country. The result was the possibility of the so-called Dutch Disease, in which disproportionate growth in a certain energy sector tends to crowd out investment in other sectors of the economy.

  • PDF

Position Improvement of a Mobile Robot by Real Time Tracking of Multiple Moving Objects (실시간 다중이동물체 추적에 의한 이동로봇의 위치개선)

  • Jin, Tae-Seok;Lee, Min-Jung;Tack, Han-Ho;Lee, In-Yong;Lee, Joon-Tark
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.2
    • /
    • pp.187-192
    • /
    • 2008
  • The Intelligent Space(ISpace) provides challenging research fields for surveillance, human-computer interfacing, networked camera conferencing, industrial monitoring or service and training applications. ISpace is the space where many intelligent devices, such as computers and sensors, are distributed. According to the cooperation of many intelligent devices, the environment, it is very important that the system knows the location information to offer the useful services. In order to achieve these goals, we present a method for representing, tracking and human Jollowing by fusing distributed multiple vision systems in ISpace, with application to pedestrian tracking in a crowd. This paper describes appearance based unknown object tracking with the distributed vision system in intelligent space. First, we discuss how object color information is obtained and how the color appearance based model is constructed from this data. Then, we discuss the global color model based on the local color information. The process of learning within global model and the experimental results are also presented.

Studies on Community and Seasonal Occurrence of chigger Mites around Yedang lake (예당지 주변의 털진드기류 군집 조사)

  • 강병찬;김명해
    • The Korean Journal of Ecology
    • /
    • v.21 no.1
    • /
    • pp.97-103
    • /
    • 1998
  • Yedang lake has so plentiful pondage and many species of fresh-walter-fish that a large number of people crowd around there all the year round. Most of them are not used to prevent tsutsugamushi disease spreading by chigger(T-mite). Accordingly, this study was carried out in order to obtain basic materials for prevention of this disease and the results are summarized as follows. The number of wild rat that captured in surveyed areas was sixty five(apodemus agrarius: 63, Rattus norvegicus: 2) during the period of a year and ration of captured rats to trap was about 8%. The dominant species of T-mite in all the surveyed areas were Leptotrombidium pallidum and L. palpale and the total number collected was 5782.9 with one family, two genra, eight species. The density of T-mites that collected from rats in three areas(Nodongri, Hatanbangri, Kyochonri) appeared $743.3{\pm}80.4,\;847.2{\pm}86.2\;and\;869.6{\pm}86.4,\;and\;in\;soil\;149.5{\pm}13.9,;154.7{\pm}14.7\;and\;182.4{\pm}20.8$ respectively. On the whole, the number of T-mite that collected from the rats was about three times as much as it in soil. The comparison of individual number of T-mite per a rat collected in three surveyed sites(A,B and C) showed 126.7, 243.1, 258.6 and per $2,000cm^3$ of soil 12.7, 12.7, 54.6, 103.5 respectively. In other word, the number of T-mite at site A and B is smaller than that at area C, thus comparing habitats of three sites each other, C is better living environment of rat and mite than that of A or B. Seasonl occuarance of t-mite that is from rat gradually was increased toward winter and showed the peak to January, and decreased since March but it in soil was inverse proportion to it from rats, because the larvae of T-mite that was hatched in soil was transmited to host in order to suck the body fluid.

  • PDF

A Study on File Sharing Mechanism for Network Energy Efficiency: Designing & Implementation Proxying System (네트워크 에너지 효율향상을 고려한 File Sharing 기술 연구)

  • Yun, Jung-Mee;Lee, Sang-Hak
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.4 no.2
    • /
    • pp.135-140
    • /
    • 2011
  • Currently, studies have show that the network related energy consumption are increasing. and part of overall energy consumption of our society are too. So, that is important to look for energy-efficient network applications and protocols. A most of network energy consumption are due to network edge devices. in this paper, in order to cut down the emissions of carbon dioxide from ICT business, which contributes 2% of the global energy consumption, it is necessary to understand energy consumption in peer-to-peer system. In this paper, in this paper we propose a architecture based on the introduction of a p2p proxy. The model is analyzed analytically and numerically to reveal how these factors influence the overall power consumption in both steady state and flash crowd information exchange scenarios. Specifically, our results show that the proxy-based solution can provide up to 50% reduction in the energy consumption and, at the same time, a significant reduction in the average file download time.

Analysis on the upper bound of strong Roman-domination in grid networks (그리드 네트워크의 강한 Roman 지배수 상계에 대한 해석)

  • Lee, Hoon;Sohn, Moo Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.8
    • /
    • pp.1114-1122
    • /
    • 2018
  • In this paper, we propose a theoretical framework for provisioning marginal resources in wired and wireless computer networks which include Internet. In more detail, we propose a mathematical model for the upper bounds of marginal capacity in grid networks, where the resource is designed a priori by normal traffic estimation and marginal resource is prepared for unexpected events such as natural disasters and abrupt flash crowd in public affairs. To be specific, we propose a method to evaluate an upper bound for minimum marginal capacity for an arbitrary grid topology using the concept of a strong Roman domination number. To that purpose, we introduce a graph theory to model and analyze the characteristics of general grid structure networks. After that we propose a new tight upper bound for the strong Roman domination number. Via a numerical example, we show the validity of the proposition.

A Design of Efficient Cluster Sensor Network Using Approximate Steiner Minimum Tree (근사 최소 스타이너 트리를 이용한 효율적인 클러스터 센서 네트워크의 구성)

  • Kim, In-Bum
    • The KIPS Transactions:PartA
    • /
    • v.17A no.2
    • /
    • pp.103-112
    • /
    • 2010
  • Cluster sensor network is a sensor network where input nodes crowd densely around some nuclei. Steiner minimum tree is a tree connecting all input nodes with introducing some additional nodes called Steiner points. This paper proposes a mechanism for efficient construction of a cluster sensor network connecting all sensor nodes and base stations using connections between nodes in each belonged cluster and between every cluster, and using repetitive constructions of approximate Steiner minimum trees. In experiments, while taking 1170.5% percentages more time to build cluster sensor network than the method of Euclidian minimum spanning tree, the proposed mechanism whose time complexity is O($N^2$) could spend only 20.3 percentages more time for building 0.1% added length network in comparison with the method of Euclidian minimum spanning tree. The mechanism could curtail the built trees' average length by maximum 3.7 percentages and by average 1.9 percentages, compared with the average length of trees built by Euclidian minimum spanning tree method.