• Title/Summary/Keyword: 손상 탐지

Search Result 223, Processing Time 0.027 seconds

Crack Monitoring of RC beam using Surface Conductive Crack Detection Patterns based on Parallel Resistance Network (병렬저항회로에 기반한 표면 전도성 균열감지패턴을 사용한 콘크리트 휨 부재의 균열 감지 )

  • Kyung-Joon Shin;Do-Keun Lee;Jae-Heon Hong;Dong-Chan Shin;Jong-Hyun Chae
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.27 no.5
    • /
    • pp.67-74
    • /
    • 2023
  • A large number of concrete structures are built and used around the world. To ensure their safe and continuous use, these structures require constant inspection and maintenance. While man-powered inspection and maintenance techniques are efficient, they can only provide intermittent status checks at the time of on-site inspection. Therefore, there is a growing need for a system that can continuously monitor the condition of the structure. A study was conducted to detect cracks and damage by installing a conductive coating on the surface of a concrete structure. A parallel resistance pattern that can monitor the occurrence and progression of cracks was developed by reflecting the structural characteristics of concrete structure. An empirical study was conducted to veryfy the application of the proposed method. The crack detection pattern was installed on the reinforced concrete beams, and the crack monitoring method was verified through applying a load on the beams.

A Study on Termite Monitoring Method Using Magnetic Sensors and IoT(Internet of Things) (자력센서와 IoT(사물인터넷)를 활용한 흰개미 모니터링 방법 연구)

  • Go, Hyeongsun;Choe, Byunghak
    • Korean Journal of Heritage: History & Science
    • /
    • v.54 no.1
    • /
    • pp.206-219
    • /
    • 2021
  • The warming of the climate is increasing the damage caused by termites to wooden buildings, cultural properties and houses. A group removal system can be installed around the building to detect and remove termite damage; however, if the site is not visited regularly, every one to two months, you cannot observe whether termites have spread within, and it is difficult to take prompt effective action. In addition, since the system is installed and operated in an exposed state for a long period of time, it may be ineffective or damaged, resulting in a loss of function. Furthermore if the system is installed near a cultural site, it may affect the aesthetic environment of the site. In this study, we created a detection system that uses wood, cellulose, magnets, and magnetic sensors to determine whether termites have entered the area. The data was then transferred to a low power LoRa Network which displayed the results without the necessity of visiting the site. The wood was made in the shape of a pile, and holes were made from the top to the bottom to make it easier for termites to enter and produce a cellulose sample. The cellulose sample was made in a cylindrical shape with a magnet wrapped in cellulose and inserted into the top of a hole in the wood. Then, the upper part of the wood pile was covered with a stopper to prevent foreign matter from entering. It also served to block external factors such as light and rainfall, and to create an environment where termites could add cellulose samples. When the cellulose was added by the termites, a space was created around the magnet, causing the magnet to either fall or tilt. The magnetic sensor inside the stopper was fixed on the top of the cellulose sample and measured the change in the distance between the magnet and the sensor according to the movement of the magnet. In outdoor experiments, 11 cellulose samples were inserted into the wood detection system and the termite inflow was confirmed through the movement of the magnet without visiting the site within 5 to 17 days. When making further improvements to the function and operation of the system it in the future, it is possible to confirm that termites have invaded without visiting the site. Then it is also possible to reduce damage and fruiting due to product exposure, and which would improve the condition and appearance of cultural properties.

PARENTS EDUCATION OF ORAL HYGIENE USING QLF-D IN PATIENTS FOR SPECIAL HEALTH CARE NEEDS (QLF-D를 이용한 장애 아동 보호자의 구강위생관리 교육 : 증례보고)

  • Lim, So Young;Lee, Koeun;Choi, Byung-Jai;Lee, Jae-Ho
    • The Journal of Korea Assosiation for Disability and Oral Health
    • /
    • v.13 no.2
    • /
    • pp.99-103
    • /
    • 2017
  • The primary responsibility for the oral hygiene of the disabled is usually the parents. Dental care of the disabled is early detection and recovery of lesions and continuous management. For this to be successful it is necessary to use diagnostic tool that can detect the early stages of dental caries which is difficult to detect with the naked eye. It is also important to educate and motivate the caregivers on oral hygiene management. Quantitative Light-induced Fluorescence-Digital (Billuminator, Inspektor Researh Systems BV, Amsterdam, The Netherlands), which provides overall caries inspection and visual information, can be useful for caregiver education. A 3-year-old girl who was hospitalized with Pallister-Killian syndrome, Hypothyroidism visited our clinic with chief complaint of rugged upper incisors. This girl had multiple dental caries and oral hygiene was very poor. Periodic QLF-D images were taken to provide caregiver education and oral hygiene management was improved. A 13-year-old girl with cerebral palsy visited our clinic for regular check up. Using QLF-D, we explained to the parents that there is a need for treatment of dental caries, and education of oral hygiene management was conducted. Improvement of oral hygiene in the disabled can be achieved through caregiver education. QLF-D is a diagnostic device that can detects early caries by irradiating light in the visible ray area to the teeth. It can also detects microleakage of restoration, plaque and calculus without disclosing agent. Clinicians can use the QLF-D to perform a general oral examination for the disabled. Also, QLF-D can be used to store visual information and educate caregivers. The accumulation of information using QLF-D makes it possible to provide feedback on oral care of parents, which is more advantageous for caregivers education.

The influence of misinformation on memory: detection of original memory using concealed information test (CIT) (기억에 대한 오정보의 영향: 숨긴정보검사를 이용한 원기억의 탐지)

  • Han, Yuhwa;Park, Kwangbai
    • Science of Emotion and Sensibility
    • /
    • v.18 no.2
    • /
    • pp.85-100
    • /
    • 2015
  • This study aimed at examining if the original memory remains after a misinformation is presented, using Event-Related Potential based Concealed Information Test (ERP-based CIT). In the first stage of the study, the participant was presented with either the original information or a misleading information after experiencing an event (Post-information). The second stage was to measure brain wave and reaction time on the original, misleading, and irrelevant information (CIT-Stimulus). P300 amplitude, P300 area, P300 latency, and reaction time were used as dependant variables. In the result, a significant Post-information ${\times}$ CIT-Stimulus interaction effect was found on the P300 area measured at Cz, Pz, and Oz area. This interaction effect implied the possibility that the original information could be partially impaired in memory by misleading information presented afterward. P300 amplitude at Pz area did not differ between the accurate and the misleading stimuli in the condition in which a misleading information was presented. This result can be explained by source monitoring error. In discussion, the limitations of this study and directions of future studies were discussed.

Comparison of Longitudinal Wave Velocity in Concrete by Ultrasonic Pulse Velocity Method and Impact-Echo Method (초음파 속도법과 충격반향기법에 의한 콘크리트의 종파 속도 비교)

  • Lee, Hoi-Keun;Lee, Kwang-Myong;Kim, Young-H.
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.23 no.2
    • /
    • pp.98-106
    • /
    • 2003
  • Nondestructive test (NDT) provides much information on concrete without damage of structural functions. Of NDT methods, elastic wave propagation methods, such as ultrasonic pulse velocity (UPV) method and impact-echo (IE) method, have been successfully used to estimate the strength, elastic modulus, and Poisson's ratio of concrete as well as to detect the internal microstructural change and defects. In this study, the concretes with water-binder ratio ranging from 0.27 to 0.50 and fly ash content of 20% were made and then their longitudinal wave velocities were measured by UPV and IE method, respectively. Test results showed that the UPV is greater than the longitudinal wave velocity measured by the If method, i.e., rod-wave velocity obtained from the same concrete cylinder. It was found that the difference between the two types of velocities decreased with increasing the ages of concrete and strength level. Moreover, for the empirical formula, the dynamic Poisson's ratio, static and dynamic moduli of elasticity, and velocity-strength relationship were determined. It was observed that the Poisson's ratio and the modulus of elasticity determined by the dynamic method are greater than those determined by the static test. Consequently, for the more accurate estimation of concrete properties using the elastic wave velocities, the characteristics of these velocities should be understood.

Thermal Environment Evaluation of Wooden House Using Infra-red Thermal Image and Temperature Difference Ratio (TDR) (적외선열화상과 온도차비율법을 이용한 목조 주택의 열환경평가)

  • Chang, Yoon-Seong;Eom, Chang-Deuk;Park, Jun-Ho;Lee, Jun-Jae;Park, Joo-Saeng;Park, Moon-Jae;Yeo, Hwan-Myeong
    • Journal of the Korean Wood Science and Technology
    • /
    • v.38 no.6
    • /
    • pp.518-525
    • /
    • 2010
  • Infrared (IR) thermography which is the technique for detecting invisible infrared light emitted by objects due to their surface thermal condition and for producing an image of the light has been applied in various field without damaging the objects. It also could be used indirectly to examine the inside of an object. In this study, insulation property of wooden house in Korea Forest Research Institute (KFRI) was evaluated with according to "Thermal performance of building - Quantitative detection of thermal irregularities in building envelopes - infrared method (KS F 2829)". This method uses "Temperature Difference Ratio (TDR)" between outdoor wall surface and indoor wall surface of wooden building for evaluating its thermal performance. The thermal performance of a room on the 2nd floor of the wooden house was focused in this study and IR thermography on the indoor and outdoor surface of the house was captured by IR camera. Heat loss from the corner and the window of the wooden house as well as wall of the house was quantitatively evaluated and the invisible heat loss in the wall was detected. It is expected that the results from this study could contribute to improve the wooden building energy efficiency.

A Study on Optimal Parameter Selection for Health Monitoring of Turboprop Engine (PT6A-62) (터보프롭엔진(PT6A-62)의 성능저하 진단을 위한 최적 계측 변수 선정에 관한 연구)

  • 공창덕;기자영;장현수;오성환
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.4 no.4
    • /
    • pp.87-97
    • /
    • 2000
  • A steady state performance simulation and diagnostics program for the turboprop engine (PT6A-62), which is the power plant of the first developed military basic trainer KT-1 in Republic of Korea, was developed. The developed steady state performance analysis program was evaluated with the performance data provided by the engine manufacturer and with analysis results of GASTURB program, which is well known for the performance simulation of gas turbines. Performance parameters were discussed to evaluate validity of the developed program at various cases such as altitude, flight velocity and part load variation. GPA(Gas Pass Analysis) allows engine performance deterioration to be identified at the module level in terms of reduction in component efficiencies and changes in mass flow. In order to find optimal instrument set to detect the physical faults such as fouling, erosion and corrosion, a gas path analysis approach is utilized. This study was performed in two cases for selection of optimal measurement parameters. One case was considered with the effect of instrument number by changing independent parameter number. The other case was performed with selection of independent parameter set. According to the analysis results, the optimal measurement parameters selected were eight dependent variables such as shaft horsepower, fuel flow rate, compressor exit pressure and temperature, compressor turbine inlet pressure and temperature and power turbine inlet pressure and temperature.

  • PDF

An Efficient Method of Forensics Evidence Collection at the Time of Infringement Occurrence (호스트 침해 발생 시점에서의 효율적 Forensics 증거 자료 수집 방안)

  • Choi Yoon-Ho;Park Jong-Ho;Kim Sang-Kon;Kang Yu;Choe Jin-Gi;Moon Ho-Gun;Rhee Myung-Su;Seo Seung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.69-81
    • /
    • 2006
  • The Computer Forensics is a research area that finds the malicious users by collecting and analyzing the intrusion or infringement evidence of computer crimes such as hacking. Many researches about Computer Forensics have been done so far. But those researches have focussed on how to collect the forensic evidence for both analysis and poofs after receiving the intrusion or infringement reports of hosts from computer users or network administrators. In this paper, we describe how to collect the forensic evidence of good quality from observable and protective hosts at the time of infringement occurrence by malicious users. By correlating the event logs of Intrusion Detection Systems(IDSes) and hosts with the configuration information of hosts periodically, we calculate the value of infringement severity that implies the real infringement possibility of the hosts. Based on this severity value, we selectively collect the evidence for proofs at the time of infringement occurrence. As a result, we show that we can minimize the information damage of the evidence for both analysis and proofs, and reduce the amount of data which are used to analyze the degree of infringement severity.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

Development of a Ranging Inspection Technique in a Sodium-cooled Fast Reactor Using a Plate-type Ultrasonic Waveguide Sensor (판형 웨이브가이드 초음파 센서를 이용한 소듐냉각고속로 원격주사 검사기법 개발)

  • Kim, Hoe Woong;Kim, Sang Hwal;Han, Jae Won;Joo, Young Sang;Park, Chang Gyu;Kim, Jong Bum
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.25 no.1
    • /
    • pp.48-57
    • /
    • 2015
  • In a sodium-cooled fast reactor, which is a Generation-IV reactor, refueling is conducted by rotating, but not opening, the reactor head to prevent a reaction between the sodium, water and air. Therefore, an inspection technique that checks for the presence of any obstacles between the reactor core and the upper internal structure, which could disturb the rotation of the reactor head, is essential prior to the refueling of a sodium-cooled fast reactor. To this end, an ultrasound-based inspection technique should be employed because the opacity of the sodium prevents conventional optical inspection techniques from being applied to the monitoring of obstacles. In this study, a ranging inspection technique using a plate-type ultrasonic waveguide sensor was developed to monitor the presence of any obstacles between the reactor core and the upper internal structure in the opaque sodium. Because the waveguide sensor installs an ultrasonic transducer in a relatively cold region and transmits the ultrasonic waves into the hot radioactive liquid sodium through a long waveguide, it offers better reliability and is less susceptible to thermal or radiation damage. A 10 m horizontal beam waveguide sensor capable of radiating an ultrasonic wave horizontally was developed, and beam profile measurements and basic experiments were carried out to investigate the characteristics of the developed sensor. The beam width and propagation distance of the ultrasonic wave radiated from the sensor were assessed based on the experimental results. Finally, a feasibility test using cylindrical targets (corresponding to the shape of possible obstacles) was also conducted to evaluate the applicability of the developed ranging inspection technique to actual applications.