• Title/Summary/Keyword: Automatic Damage Analysis

Search Result 79, Processing Time 0.028 seconds

A Study on Automatic Classification of Characterized Ground Regions on Slopes by a Deep Learning based Image Segmentation (딥러닝 영상처리를 통한 비탈면의 지반 특성화 영역 자동 분류에 관한 연구)

  • Lee, Kyu Beom;Shin, Hyu-Soung;Kim, Seung Hyeon;Ha, Dae Mok;Choi, Isu
    • Tunnel and Underground Space
    • /
    • v.29 no.6
    • /
    • pp.508-522
    • /
    • 2019
  • Because of the slope failure, not only property damage but also human damage can occur, slope stability analysis should be conducted to predict and reinforce of the slope. This paper, defines the ground areas that can be characterized in terms of slope failure such as Rockmass jointset, Rockmass fault, Soil, Leakage water and Crush zone in sloped images. As a result, it was shown that the deep learning instance segmentation network can be used to recognize and automatically segment the precise shape of the ground region with different characteristics shown in the image. It showed the possibility of supporting the slope mapping work and automatically calculating the ground characteristics information of slopes necessary for decision making such as slope reinforcement.

Seismic Fragility Assessment of Liquid Storage Tanks by Finite Element Reliability Analysis (유한요소 신뢰성 해석을 통한 액체저장탱크의 지진 취약도 평가)

  • Lee, Sangmok;Lee, Young-Joo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.718-725
    • /
    • 2017
  • A liquid storage tank is one of the most important structures in industrial complexes dealing with chemicals, and its structural damage due to an earthquake may cause a disastrous event such as the leakage of hazardous materials, fire, and explosion. It is thus essential to assess the seismic fragility of liquid storage tanks and prepare for seismic events in advance. When a liquid storage tank is oscillated by a seismic load, the hydrodynamic pressure caused by the liquid-structure interaction increases the stress and causes structural damage to the tank. Meanwhile, the seismic fragility of the structure can be estimated by considering the various sources of uncertainty and calculating the failure probabilities in a given limiting state. To accurately evaluate the seismic fragility of liquid storage tanks, a sophisticated finite element analysis is required during their reliability analysis. Therefore, in this study, FERUM-ABAQUS, a recently-developed computational platform integrated with commercial finite element and reliability analysis software packages, is introduced to perform the finite element reliability analysis and calculate the failure probability of a liquid storage tank subjected to a seismic load. FERUM-ABAUS allows for automatic data exchange between these two software packages and for the efficient seismic fragility assessment of a structure. Using this computational platform, the seismic fragility curve of a liquid storage tank is successfully obtained.

A Study on Quantitative Security Assessment after Privacy Vulnerability Analysis of PC (PC의 개인정보보호 취약점 분석과 정량화된 보안진단 연구)

  • Seo, Mi-Sook;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.456-460
    • /
    • 2012
  • Privacy Protection Act of 30 March 2012 was performed. In general, personal information management to enhance security in the DB server has a security system but, PC for the protection of the privacy and security vulnerability analysis is needed to research on self-diagnosis. In this paper, from a PC to search information relating to privacy and enhance security by encrypting and for delete file delete recovery impossible. In pc found vulnerability analysis is Check user accounts, Checking shared folders ,Services firewall check, Screen savers, Automatic patch update Is checked. After the analysis and quantification of the vulnerability checks through the expression, enhanced security by creating a checklist for the show, PC security management, server management by semi-hwahayeo activates. In this paper the PC privacy and PC security enhancements a economic damage and of the and Will contribute to reduce complaints.

  • PDF

A Case Study of Concrete Pavement Deterioration by Alkali-Silica Reaction in Korea

  • Hong, Seung-Ho;Han, Seung-Hwan;Yun, Kyong-Ku
    • International Journal of Concrete Structures and Materials
    • /
    • v.1 no.1
    • /
    • pp.75-81
    • /
    • 2007
  • The concrete pavement of the Seohae Highway in Korea has suffered from serious distress, only four to seven years after construction. Deterioration due to Alkali-Silica Reaction (ASR) has seldom been reported per se in Korea, because the aggregate used for the cement concrete has been considered safe against alkali-silica reaction so far. The purpose of this study is to examine the deterioration caused by an alkali-silica reaction of concrete pavement in Korea. The investigation methods included visual inspection and Automatic Road Analyzer (ARAN) analysis of surface cracks, coring for internal cracks, stereo microscopic analysis, scanning electronic microscope (SEM) analysis, and electron dispersive X-ray spectrometer (EDX) analysis. The results are presented as follows: the crack pattern of the concrete pavement in Korea was longitudinal cracking, map cracking or D-cracking. Local areas of damage were noticed four to five years after construction. The cracks started from edges or joints and spread out to slabs. The most intensive cracking was observed at the intersection of the transverse and longitudinal joints. Where cracking was the most intense, pieces of concrete and aggregate had spalled away from top surface and joint interface area. The progress of deterioration was very fast. The reaction product of alkali-silica gel was clearly identified by its generally colorless, white, or very pale yellow hue seen through a stereo optical microscopy. The typical locations of the reaction product were at the interface between aggregate and cement paste in a shape of a rim, within aggregate particles in the cracks, and in the large void in the cement paste. Most of the white products were found at interface or internal aggregates. SEM and EDX analysis confirmed that the white gel was a typical reaction product of ASR. The ASR gel in Korea mainly consisted of Silicate (Si) and Potassium (K) from the cement. The crack in the concrete pavement was caused by ASR. It seems that Korea is no longer safe from alkali-silica reaction.

Using Image Visualization Based Malware Detection Techniques for Customer Churn Prediction in Online Games (악성코드의 이미지 시각화 탐지 기법을 적용한 온라인 게임상에서의 이탈 유저 탐지 모델)

  • Yim, Ha-bin;Kim, Huy-kang;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1431-1439
    • /
    • 2017
  • In the security field, log analysis is important to detect malware or abnormal behavior. Recently, image visualization techniques for malware dectection becomes to a major part of security. These techniques can also be used in online games. Users can leave a game when they felt bad experience from game bot, automatic hunting programs, malicious code, etc. This churning can damage online game's profit and longevity of service if game operators cannot detect this kind of events in time. In this paper, we propose a new technique of PNG image conversion based churn prediction to improve the efficiency of data analysis for the first. By using this log compression technique, we can reduce the size of log files by 52,849 times smaller and increase the analysis speed without features analysis. Second, we apply data mining technique to predict user's churn with a real dataset from Blade & Soul developed by NCSoft. As a result, we can identify potential churners with a high accuracy of 97%.

Optimized Ballast Water Exchange Management for Bulk Carrier (BULK 선용자동 Ballast Water Management Plan 개발)

  • HONG CHUNG YOU;PARK JE WOONG
    • Proceedings of the Korea Committee for Ocean Resources and Engineering Conference
    • /
    • 2004.05a
    • /
    • pp.67-72
    • /
    • 2004
  • Many port states such as New Zealand, the USA, Australia and Canada have strict regulations to prevent ships which arrive in their port from discharging polluted ballast water which contain harmful aquatic organism and pathogens. They are notified that transfer of polluted ballast water can cause serious injury to public health and damage to property and environment. For this reason, they perceived that the ballast exchange in deep sea is the most effective method, together with submitting the ballast management plan which contains the effective exchange method, ballast system and safety consideration. In this study, we pursued both nautical engineering analysis and optimization of algorithm in order to generate the sequence of stability and rapidity. Heuristic Algorithm was chosen on the basis of optimality and applicability to a sequential exchange problem. We have built an optimized algorithm, for automatic exchange of ballast water, by redefining core elements of the $A^\ast$ algorithm, such as node, operator and evaluation function. Final version of the optimized algorithm has been applied to existing bulk carrier and the performance of the algorithm has been verified successfully.

  • PDF

System identification of a super high-rise building via a stochastic subspace approach

  • Faravelli, Lucia;Ubertini, Filippo;Fuggini, Clemente
    • Smart Structures and Systems
    • /
    • v.7 no.2
    • /
    • pp.133-152
    • /
    • 2011
  • System identification is a fundamental step towards the application of structural health monitoring and damage detection techniques. On this respect, the development of evolved identification strategies is a priority for obtaining reliable and repeatable baseline modal parameters of an undamaged structure to be adopted as references for future structural health assessments. The paper presents the identification of the modal parameters of the Guangzhou New Television Tower, China, using a data-driven stochastic subspace identification (SSI-data) approach complemented with an appropriate automatic mode selection strategy which proved to be successful in previous literature studies. This well-known approach is based on a clustering technique which is adopted to discriminate structural modes from spurious noise ones. The method is applied to the acceleration measurements made available within the task I of the ANCRiSST benchmark problem, which cover 24 hours of continuous monitoring of the structural response under ambient excitation. These records are then subdivided into a convenient number of data sets and the variability of modal parameter estimates with ambient temperature and mean wind velocity are pointed out. Both 10 minutes and 1 hour long records are considered for this purpose. A comparison with finite element model predictions is finally carried out, using the structural matrices provided within the benchmark, in order to check that all the structural modes contained in the considered frequency interval are effectively identified via SSI-data.

Analysis of Computer Virus Immune System (바이러스 면역시스템 분석)

  • 전완근;이중식;이종일;김홍윤
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.39-47
    • /
    • 2002
  • To recently with the love-letter and Back Orifice the same Worm-virus, with the Trojan and the Linux-virus back against the new species virus which inside and outside of the country to increase tendency the malignant new species virus which is the possibility of decreasing the damage which is enormous in the object appears and to follow a same network coat large scale PC is being quicker, it disposes spontaneously to respect, applied an artificial intelligence technique the research against the next generation malignant computer virus of new form is demanded. Will reach and to respect it analyzes the digital immunity system of the automatic detection which is quick against the next generation malignant virus which had become unconfirmed and the foreign countries which has an removal function.

  • PDF

Optimized Ballast Water Exchange Management for Bulk Carriers (벌크 화물선용 자동 밸러스트수 교환계획 시스템 개발)

  • HONG CHUNG-YOU;PARK JE-WOONG
    • Journal of Ocean Engineering and Technology
    • /
    • v.18 no.4 s.59
    • /
    • pp.65-70
    • /
    • 2004
  • Many port states, such as New Zealand, U.S.A., Australia, and Canada, have strict regulations to prevent arriving ships from discharging polluted ballast water that contains harmful aquatic organisms and pathogens. They are notified that transfer of polluted ballast water can cause serious injury to public health and damage to property and environment. For this reason, ballast exchange in deep sea is perceived as the most effective method of emptying ballast water. The ballast management plan contains the effective exchange method, ballast system, and safety considerations. In this study, we pursued both nautical engineering analysis and optimization of the algorithm, in order to generate the sequence of stability and rapidity. A heuristic algorithm was chosen on the basis of optimality and applicability to a sequential exchange problem. We have built an optimized algorithm for the automatic exchange of ballast water, by redefining core elements of the A$\ast$ algorithm, such as node, operator, and evaluation function. The final version of the optimized algorithm has been applied to existing bulk carrier, and the performance of the algorithm has been successfully verified.

Automatic Malware Detection Rule Generation and Verification System (악성코드 침입탐지시스템 탐지규칙 자동생성 및 검증시스템)

  • Kim, Sungho;Lee, Suchul
    • Journal of Internet Computing and Services
    • /
    • v.20 no.2
    • /
    • pp.9-19
    • /
    • 2019
  • Service and users over the Internet are increasing rapidly. Cyber attacks are also increasing. As a result, information leakage and financial damage are occurring. Government, public agencies, and companies are using security systems that use signature-based detection rules to respond to known malicious codes. However, it takes a long time to generate and validate signature-based detection rules. In this paper, we propose and develop signature based detection rule generation and verification systems using the signature extraction scheme developed based on the LDA(latent Dirichlet allocation) algorithm and the traffic analysis technique. Experimental results show that detection rules are generated and verified much more quickly than before.