• Title/Summary/Keyword: Damage information retrieval

Search Result 7, Processing Time 0.027 seconds

Real-time Knowledge Structure Mapping from Twitter for Damage Information Retrieval during a Disaster

  • Sohn, Jiu;Kim, Yohan;Park, Somin;Kim, Hyoungkwan
    • International conference on construction engineering and project management
    • /
    • 2020.12a
    • /
    • pp.505-509
    • /
    • 2020
  • Twitter is a useful medium to grasp various damage situations that have occurred in society. However, it is a laborious task to spot damage-related topics according to time in the environment where information is constantly produced. This paper proposes a methodology of constructing a knowledge structure by combining the BERT-based classifier and the community detection techniques to discover the topics underlain in the damage information. The methodology consists of two steps. In the first step, the tweets are classified into the classes that are related to human damage, infrastructure damage, and industrial activity damage by a BERT-based transfer learning approach. In the second step, networks of the words that appear in the damage-related tweets are constructed based on the co-occurrence matrix. The derived networks are partitioned by maximizing the modularity to reveal the hidden topics. Five keywords with high values of degree centrality are selected to interpret the topics. The proposed methodology is validated with the Hurricane Harvey test data.

  • PDF

The Design of a Retrieval System for Management of Emergency Equipment in the Underground Space (지하 공간의 방재장비 관리를 위한 검색 시스템 설계)

  • Park, Myung-Gil;Shin, Seong-Hyun;Jung, Hyun-Goon;Kim, Chang-Soo
    • 한국방재학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.641-644
    • /
    • 2008
  • Recently, a lot of life damage caused by disaster have happened in the underground space. Because the space is closed areas and used by the unspecific majority. Therefore there are many kinds of emergency equipments for diminishing the life damage in case of the disaster. In this paper, we propose the retrieval system for the administrator. Our system provides the function for searching the descriptive information and spatial information of the equipment management. And the administrator can manage underground disaster equipments effectively through the system.

  • PDF

Risk Assessment Strategy for Decommissioning of Fukushima Daiichi Nuclear Power Station

  • Yamaguchi, Akira;Jang, Sunghyon;Hida, Kazuki;Yamanaka, Yasunori;Narumiya, Yoshiyuki
    • Nuclear Engineering and Technology
    • /
    • v.49 no.2
    • /
    • pp.442-449
    • /
    • 2017
  • Risk management of the Fukushima Daiichi Nuclear Power Station decommissioning is a great challenge. In the present study, a risk management framework has been developed for the decommissioning work. It is applied to fuel assembly retrieval from Unit 3 spent fuel pool. Whole retrieval work is divided into three phases: preparation, retrieval, and transportation and storage. First of all, the end point has been established and the success path has been developed. Then, possible threats, which are internal/external and technical/societal/management, are identified and selected. "What can go wrong?" is a question about the failure scenario. The likelihoods and consequences for each scenario are roughly estimated. The whole decommissioning project will continue for several decades, i.e., long-term perspective is important. What should be emphasized is that we do not always have enough knowledge and experience of this kind. It is expected that the decommissioning can make steady and good progress in support of the proposed risk management framework. Thus, risk assessment and management are required, and the process needs to be updated in accordance with the most recent information and knowledge on the decommissioning works.

A Object-Based Image Retrieval Using Feature Analysis and Fractal Dimension (특징 분석과 프랙탈 차원을 이용한 객체 기반 영상검색)

  • 이정봉;박장춘
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.2
    • /
    • pp.173-186
    • /
    • 2004
  • This paper proposed the content-based retrieval system as a method for performing image retrieval through the effective feature extraction of the object of significant meaning based on the characteristics of man's visual system. To allow the object region of interest to be primarily detected, the region, being comparatively large size, greatly different from the background color and located in the middle of the image, was judged as the major object with a meaning. To get the original features of the image, the cumulative sum of tile declination difference vector the segment of the object contour had and the signature of the bipartite object were extracted and used in the form of being applied to the rotation of the object and the change of the size after partition of the total length of the object contour of the image into the normalized segment. Starting with this form feature, it was possible to make a retrieval robust to any change in translation, rotation and scaling by combining information on the texture sample, color and eccentricity and measuring the degree of similarity. It responded less sensitively to the phenomenon of distortion of the object feature due to the partial change or damage of the region. Also, the method of imposing a different weight of similarity on the image feature based on the relationship of complexity between measured objects using the fractal dimension by the Boxing-Counting Dimension minimized the wrong retrieval and showed more efficient retrieval rate.

  • PDF

Evaluating and Mitigating Malicious Data Aggregates in Named Data Networking

  • Wang, Kai;Bao, Wei;Wang, Yingjie;Tong, Xiangrong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4641-4657
    • /
    • 2017
  • Named Data Networking (NDN) has emerged and become one of the most promising architectures for future Internet. However, like traditional IP-based networking paradigm, NDN may not evade some typical network threats such as malicious data aggregates (MDA), which may lead to bandwidth exhaustion, traffic congestion and router overload. This paper firstly analyzes the damage effect of MDA using realistic simulations in large-scale network topology, showing that it is not just theoretical, and then designs a fine-grained MDA mitigation mechanism (MDAM) based on the cooperation between routers via alert messages. Simulations results show that MDAM can significantly reduce the Pending Interest Table overload in involved routers, and bring in normal data-returning rate and data-retrieval delay.

Position Control of AS/RS Stacker Crane By Using Cain-Scheduled Control Method in Automated High Rack Warehouse System

  • Kim, Hwan-Seong;You, Sam-Sang;Shigeyasu Kawaji
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1999.10a
    • /
    • pp.198-201
    • /
    • 1999
  • An automated storage and retrieval machinery for high rack warehouse systems is developed in order to stack the various kinds of productions. However, according to increase in the rack height, the long lead time should be taken. In stacker crane systems, the variations of the lifting height and the load generate the vibration of lifting machine, and it makes a Position control to be difficult Therefore, the reduction of vibration will be important factor for saving the lead time and the damage of Productions. This paper deals with a position control of stacker crane in automated high rack warehouse system by using a gain-scheduled control algorithm via a LMI method, where the variations of elastic coefficient of the stacker crane's post are considered.

  • PDF

The Avata Construction System for Image Lossless Scaling (이미지 손실없는 확대/축소가 가능한 아바타 생성 시스템)

  • 김원중;장미화
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.2
    • /
    • pp.181-189
    • /
    • 2002
  • In this paper, we designed and implemented Avata construction system using XML(extensible Markup Language) and SVG(Scalable Vector Graphic). The Web character created with Avata(or Web character) construction system are displayed in same (on without damage of image, regardless terminal type and user can modify and change image easily in form that want. Compare with existing Web character system, the Reusability of web character part element Is increased greatly with Avata construction system of this paper. Because SVG is described by text, graphic retrieval is convenient, and applications can use easily SVG document. Also, SVG can create web graphic document dynamically with database because can access easily in all graphic primitives of line, Polygon, text, image etc. As well as web character using study finding, we may develop usable technology to some contents on World Wide Web.