• Title/Summary/Keyword: Event Identification

Search Result 225, Processing Time 0.031 seconds

A Personal Memex System Using Uniform Representation of the Data from Various Devices (다양한 기기로부터의 데이터 단일 표현을 통한 개인 미멕스 시스템)

  • Min, Young-Kun;Lee, Bog-Ju
    • The KIPS Transactions:PartB
    • /
    • v.16B no.4
    • /
    • pp.309-318
    • /
    • 2009
  • The researches on the system that automatically records and retrieves one's everyday life is relatively actively worked recently. These systems, called personal memex or life log, usually entail dedicated devices such as SenseCam in MyLifeBits project. This research paid attention to the digital devices such as mobile phones, credit cards, and digital camera that people use everyday. The system enables a person to store everyday life systematically that are saved in the devices or the deviced-related web pages (e.g., phone records in the cellular phone company) and to refer this quickly later. The data collection agent in the proposed system, called MyMemex, collects the personal life log "web data" using the web services that the web sites provide and stores the web data into the server. The "file data" stored in the off-line digital devices are also loaded into the server. Each of the file data or web data is viewed as a memex event that can be described by 4W1H form. The different types of data in different services are transformed into the memex event data in 4W1H form. The memex event ontology is used in this transform. Users can sign in to the web server of this service to view their life logs in the chronological manner. Users can also search the life logs using keywords. Moreover, the life logs can be viewed as a diary or story style by converting the memex events to sentences. The related memex events are grouped to be displayed as an "episode" by a heuristic identification method. A result with high accuracy has been obtained by the experiment for the episode identification using the real life log data of one of the authors.

Seismic damage estimation through measurable dynamic characteristics

  • Lakshmanan, N.;Raghuprasad, B.K.;Muthumani, K.;Gopalakrishnan, N.;Sreekala, R.
    • Computers and Concrete
    • /
    • v.4 no.3
    • /
    • pp.167-186
    • /
    • 2007
  • Ductility based design of reinforced concrete structures implicitly assumes certain damage under the action of a design basis earthquake. The damage undergone by a structure needs to be quantified, so as to assess the post-seismic reparability and functionality of the structure. The paper presents an analytical method of quantification and location of seismic damage, through system identification methods. It may be noted that soft ground storied buildings are the major casualties in any earthquake and hence the example structure is a soft or weak first storied one, whose seismic response and temporal variation of damage are computed using a non-linear dynamic analysis program (IDARC) and compared with a normal structure. Time period based damage identification model is used and suitably calibrated with classic damage models. Regenerated stiffness of the three degrees of freedom model (for the three storied frame) is used to locate the damage, both on-line as well as after the seismic event. Multi resolution analysis using wavelets is also used for localized damage identification for soft storey columns.

Impact identification and localization using a sample-force-dictionary - General Theory and its applications to beam structures

  • Ginsberg, Daniel;Fritzen, Claus-Peter
    • Structural Monitoring and Maintenance
    • /
    • v.3 no.3
    • /
    • pp.195-214
    • /
    • 2016
  • Monitoring of impact loads is a very important technique in the field of structural health monitoring (SHM). However, in most cases it is not possible to measure impact events directly, so they need to be reconstructed. Impact load reconstruction refers to the problem of estimating an input to a dynamic system when the system output and the impulse response function are usually known. Generally this leads to a so called ill-posed inverse problem. It is reasonable to use prior knowledge of the force in order to develop more suitable reconstruction strategies and to increase accuracy. An impact event is characterized by a short time duration and a spatial concentration. Moreover the force time history of an impact has a specific shape, which also can be taken into account. In this contribution these properties of the external force are employed to create a sample-force-dictionary and thus to transform the ill-posed problem into a sparse recovery task. The sparse solution is acquired by solving a minimization problem known as basis pursuit denoising (BPDN). The reconstruction approach shown here is capable to estimate simultaneously the magnitude of the impact and the impact location, with a minimum number of accelerometers. The possibility of reconstructing the impact based on a noisy output signal is first demonstrated with simulated measurements of a simple beam structure. Then an experimental investigation of a real beam is performed.

Framework for Supporting Business Services based on the EPC Network (EPC Network 기반의 비즈니스 서비스 지원을 위한 프레임워크)

  • Nam, Tae-Woo;Yeom, Keun-Hyuk
    • The KIPS Transactions:PartD
    • /
    • v.17D no.3
    • /
    • pp.193-202
    • /
    • 2010
  • Recently, there have been several researches on automatic object identification and distributed computing technology to realize a ubiquitous computing environment. Radio Frequency IDentification (RFID) technology has been applied to many business areas to simplify complex processes and gain important benefits. To derive real benefits from RFID, the system must rapidly implement functions to process a large quantity of event data generated by the RFID operations and should be configured dynamically for changing businesses. Consequently, developers are forced to implement systems to derive meaningful high-level events from simple RFID events and bind them to various business processes. Although applications could directly consume and act on RFID events, extracting the business rules from the business logic leads to better decoupling of the system, which consequentially increases maintainability. In this paper, we describe an RFID business aware framework for business processes in the Electronic Product Code (EPC) Network. This framework is proposed for developing business applications using business services. The term "business services" refers to generated events that can be used in business applications without additional data collection and processing. The framework provides business rules related to data collection, processing, and management, and supports the rapid development and easy maintenance of business applications based on business services.

Safety Assessments for the IS(Iodine Sulfur) Process in a Hydrogen Production Facility (수소생산시설에서의 요오드-황 공정에 대한 안전성 평가연구)

  • Lee, Hyon-Woo;Jae, Moo-Sung;Cho, Nam-Chul;Yang, Jon-Eon;Lee, Won-Jae
    • Journal of the Korean Society of Safety
    • /
    • v.24 no.3
    • /
    • pp.54-58
    • /
    • 2009
  • A substitute energy development has been required due to the exhaust of the fossil fuel and an environmental problem. Consequently, possible technologies producing hydrogen from water that does not release carbon is a very promising technology. Also, Iodine-Sulfur(IS) thermochemical water decomposition is one of the promising processes that are used to produce hydrogen efficiently using the high temperature gas-cooled reactor(HTGR) as an energy source that is possible to supply heat over 900$^{\circ}C$. In this study, to make a initiating events identification for the IS process, Master Logic Diagram(MLD) is used and 9 initiating events that cause a leakage of the chemical material are identified. Also, 6 events are identified among 9 initiating events above and are quantified using event tree.

A Design of Schema and Data Model for Shipping Distribution Field using Electronic Tag (전자태그의 해운 물류 유통 분야에 적용하기 위한 스키마 및 데이터 모델 설계)

  • Chang, Jung-Soo;Song, Jong-Chul;Choi, Il-Sun;Jeong, Jae-Gil;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.967-970
    • /
    • 2005
  • Ubiquitous Computing appeared, and moth researches are gone to apply this in various field. Specially, physical distribution circulation service field is intelligence enemy while alternate existent bar code and induction of RFID(Radio Frequency Identification) technology that permit various service is gone vigorously. In this treatise designed data model and schema to progress research about Core Event Type of PML(Product Markup Language) that is object information expression language that is proposed Auto-Id Lab and EPCglobal Inc. to process information of physical object and EPC-lS(Electronic Product Code Information Services) that is information services component and applies in sea transport physical logistics distribution service field.

  • PDF

Joint Reasoning of Real-time Visual Risk Zone Identification and Numeric Checking for Construction Safety Management

  • Ali, Ahmed Khairadeen;Khan, Numan;Lee, Do Yeop;Park, Chansik
    • International conference on construction engineering and project management
    • /
    • 2020.12a
    • /
    • pp.313-322
    • /
    • 2020
  • The recognition of the risk hazards is a vital step to effectively prevent accidents on a construction site. The advanced development in computer vision systems and the availability of the large visual database related to construction site made it possible to take quick action in the event of human error and disaster situations that may occur during management supervision. Therefore, it is necessary to analyze the risk factors that need to be managed at the construction site and review appropriate and effective technical methods for each risk factor. This research focuses on analyzing Occupational Safety and Health Agency (OSHA) related to risk zone identification rules that can be adopted by the image recognition technology and classify their risk factors depending on the effective technical method. Therefore, this research developed a pattern-oriented classification of OSHA rules that can employ a large scale of safety hazard recognition. This research uses joint reasoning of risk zone Identification and numeric input by utilizing a stereo camera integrated with an image detection algorithm such as (YOLOv3) and Pyramid Stereo Matching Network (PSMNet). The research result identifies risk zones and raises alarm if a target object enters this zone. It also determines numerical information of a target, which recognizes the length, spacing, and angle of the target. Applying image detection joint logic algorithms might leverage the speed and accuracy of hazard detection due to merging more than one factor to prevent accidents in the job site.

  • PDF

A constrained minimization-based scheme against susceptibility of drift angle identification to parameters estimation error from measurements of one floor

  • Kangqian Xu;Akira Mita;Dawei Li;Songtao Xue;Xianzhi Li
    • Smart Structures and Systems
    • /
    • v.33 no.2
    • /
    • pp.119-131
    • /
    • 2024
  • Drift angle is a significant index for diagnosing post-event structures. A common way to estimate this drift response is by using modal parameters identified under natural excitations. Although the modal parameters of shear structures cannot be identified accurately in the real environment, the identification error has little impact on the estimation when measurements from several floors are used. However, the estimation accuracy falls dramatically when there is only one accelerometer. This paper describes the susceptibility of single sensor identification to modelling error and simulations that preliminarily verified this characteristic. To make a robust evaluation from measurements of one floor of shear structures based on imprecisely identified parameters, a novel scheme is devised to approximately correct the mode shapes with respect to fictitious frequencies generated with a genetic algorithm; in particular, the scheme uses constrained minimization to take both the mathematical aspect and the realistic aspect of the mode shapes into account. The algorithm was validated by using a full-scale shear building. The differences between single-sensor and multiple-sensor estimations were analyzed. It was found that, as the number of accelerometers decreases, the error rises due to insufficient data and becomes very high when there is only one sensor. Moreover, when measurements for only one floor are available, the proposed method yields more precise and appropriate mode shapes, leading to a better estimation on the drift angle of the lower floors compared with a method designed for multiple sensors. As well, it is shown that the reduction in space complexity is offset by increasing the computation complexity.

A Method for Operational Safety Assessment of a Deep Geological Repository for Spent Fuels

  • Jeong, Jongtae;Cho, Dong-Keun
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.18 no.spc
    • /
    • pp.63-74
    • /
    • 2020
  • The operational safety assessment is an important part of a safety case for the deep geological repository of spent fuels. It consists of different stages such as the identification of initiating events, event tree analysis, fault tree analysis, and evaluation of exposure doses to the public and radiation workers. This study develops a probabilistic safety assessment method for the operational safety assessment and establishes an assessment framework. For the event and fault tree analyses, we propose the advanced information management system for probabilistic safety assessment (AIMS-PSA Manager). In addition, we propose the Radiological Safety Analysis Computer (RSAC) program to evaluate exposure doses to the public and radiation workers. Furthermore, we check the applicability of the assessment framework with respect to drop accidents of a spent fuel assembly arising out of crane failure, at the surface facility of the KRS+ (KAERI Reference disposal System for SNFs). The methods and tools established through this study can be used for the development of a safety case for the KRS+ system as well as for the design modification and the operational safety assessment of the KRS+ system.

EDS scenario Implementation for the Multiple Network and Multiple Service Environments

  • Kim, Dong-Il;Lee, Soong-Hee
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.2
    • /
    • pp.135-140
    • /
    • 2009
  • The wide deployment of wireless access technologies and the integration of various access network interfaces into a single terminal, allows mobile end-users to be always connected to the IP network, and to use those interface simultaneously. In this paper the CTE provides various access network interfaces capabilities, allowing reception of data over multiple service providers with different characteristics. Considerations for multiple network and service provider environments are regarded as essential for the successful deployment of convergence services in Next Generation Network (NGN). Event Driven Service (EDS) is regarded as a typical convergence service converging different functions of multiple service providers. This paper first describes the deployment model of NGN convergence services for multiple service provider environments. It also covers the service scenario of EDS, a convergence service for multiple service provider environments in NGN. Multiple provider environments stimulates the unified identifier management, namely ubiquitous identification (U-ID), to enable users to be provided convergence services without awareness of multiple provides. Then the designed structure and procedures of U-ID based EDS are given. Finally, the implementation results tested on Korea Advanced Research Network (KOREN) are described.