• Title/Summary/Keyword: Event modeling

Search Result 544, Processing Time 0.025 seconds

Detecting Surface Changes Triggered by Recent Volcanic Activities at Kīlauea, Hawai'i, by using the SAR Interferometric Technique: Preliminary Report (SAR 간섭기법을 활용한 하와이 킬라우에아 화산의 2018 분화 활동 관측)

  • Jo, MinJeong;Osmanoglu, Batuhan;Jung, Hyung-Sup
    • Korean Journal of Remote Sensing
    • /
    • v.34 no.6_4
    • /
    • pp.1545-1553
    • /
    • 2018
  • Recent eruptive activity at Kīlauea Volcano started on at the end of April in 2018 showed rapid ground deflation between May and June in 2018. On summit area Halema'uma'u lava lake continued to drop at high speed and Kīlauea's summit continued to deflate. GPS receivers and electronic tiltmeters detected the surface deformation greater than 2 meters. We explored the time-series surface deformation at Kīlauea Volcano, focusing on the early stage of eruptive activity, using multi-temporal COSMO-SkyMed SAR imagery. The observed maximum deformation in line-of-sight (LOS) direction was about -1.5 meter, and it indicates approximately -1.9 meter in subsiding direction by applying incidence angle. The results showed that summit began to deflate just after the event started and most of deformation occurred between early May and the end of June. Moreover, we confirmed that summit's deflation rarely happened since July 2018, which means volcanic activity entered a stable stage. The best-fit magma source model based on time-series surface deformation demonstrated that magma chambers were lying at depths between 2-3 km, and it showed a deepening trend in time. Along with the change of source depth, the center of each magma model moved toward the southwest according to the time. These results have a potential risk of including bias coming from single track observation. Therefore, to complement the initial results, we need to generate precise magma source model based on three-dimensional measurements in further research.

An Assessment of Applicability of Heat Waves Using Extreme Forecast Index in KMA Climate Prediction System (GloSea5) (기상청 현업 기후예측시스템(GloSea5)에서의 극한예측지수를 이용한 여름철 폭염 예측 성능 평가)

  • Heo, Sol-Ip;Hyun, Yu-Kyung;Ryu, Young;Kang, Hyun-Suk;Lim, Yoon-Jin;Kim, Yoonjae
    • Atmosphere
    • /
    • v.29 no.3
    • /
    • pp.257-267
    • /
    • 2019
  • This study is to assess the applicability of the Extreme Forecast Index (EFI) algorithm of the ECMWF seasonal forecast system to the Global Seasonal Forecasting System version 5 (GloSea5), operational seasonal forecast system of the Korea Meteorological Administration (KMA). The EFI is based on the difference between Cumulative Distribution Function (CDF) curves of the model's climate data and the current ensemble forecast distribution, which is essential to diagnose the predictability in the extreme cases. To investigate its applicability, the experiment was conducted during the heat-wave cases (the year of 1994 and 2003) and compared GloSea5 hindcast data based EFI with anomaly data of ERA-Interim. The data also used to determine quantitative estimates of Probability Of Detection (POD), False Alarm Ratio (FAR), and spatial pattern correlation. The results showed that the area of ERA-Interim indicating above 4-degree temperature corresponded to the area of EFI 0.8 and above. POD showed high ratio (0.7 and 0.9, respectively), when ERA-Interim anomaly data were the highest (on Jul. 11, 1994 (> $5^{\circ}C$) and Aug. 8, 2003 (> $7^{\circ}C$), respectively). The spatial pattern showed a high correlation in the range of 0.5~0.9. However, the correlation decreased as the lead time increased. Furthermore, the case of Korea heat wave in 2018 was conducted using GloSea5 forecast data to validate EFI showed successful prediction for two to three weeks lead time. As a result, the EFI forecasts can be used to predict the probability that an extreme weather event of interest might occur. Overall, we expected these results to be available for extreme weather forecasting.

Source-Location Privacy in Wireless Sensor Networks (무선 센서 네트워크에서의 소스 위치 프라이버시)

  • Lee, Song-Woo;Park, Young-Hoon;Son, Ju-Hyung;Kang, Yu;Choe, Jin-Gi;Moon, Ho-Gun;Seo, Seung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.125-137
    • /
    • 2007
  • This paper proposes a new scheme to provide the location privacy of sources in Wireless Sensor Networks (WSNs). Because the geographical location of a source sensor reveals contextual information on an 'event' in WSN, anonymizing the source location is an important issue. Despite abundant research efforts, however, about data confidentiality and authentication in WSN, privacy issues have not been researched well so far. Moreover, many schemes providing the anonymity of communication parties in Internet and Ad-hoc networks are not appropriate for WSN environments where sensors are very resource limited and messages are forwarded in a hop-by-hop manner through wireless channel. In this paper, we first categorize the type of eavesdroppers for WSN as Global Eavesdropper and Compromising Eavesdropper. Then we propose a novel scheme which provides the anonymity of a source according to the types of eavesdroppers. Furthermore, we analyze the degree of anonymity of WSN using the entropy-based modeling method. As a result, we show that the proposed scheme improves the degree of anonymity compared to a method without any provision of anonymity and also show that the transmission range plays a key role to hide the location of source sensors.

Structural Behavior Evaluation of a Cable-Stayed Bridge Subjected to Aircraft Impact: A Numerical Study (항공기 충돌에 대한 사장교의 구조거동 평가: 수치해석적 접근)

  • Choi, Keunki;Lee, Jungwhee;Chung, Chul-Hun;An, Dongwoo;Yoon, Jaeyong
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.34 no.3
    • /
    • pp.137-149
    • /
    • 2021
  • Cable-stayed bridges are infrastructure facilities of a highly public nature; therefore, it is essential to ensure operational safety and prompt response in the event of a collapse or damage caused by natural and social disasters. Among social disasters, impact accidents can occur in bridges when a vehicle collides with a pier or when crashes occur due to aircraft defects. In the case of offshore bridges, ship collisions will occur at the bottom of the pylon. In this research, a procedure to evaluate the structural behavior of a cable-stayed bridge for aircraft impact is suggested based on a numerical analysis approach, and the feasibility of the procedure is demonstrated by performing an example assessment. The suggested procedure includes 1) setting up suitable aircraft impact hazard scenarios, 2) structural modeling considering the complex behavior mechanisms of cable-stayed bridges, and 3) structural behavior evaluation of cable-stayed bridges using numerical impact simulation. It was observed that the scenario set in this study did not significantly affect the target bridge. However, if impact analysis is performed through various scenarios in the future, the load position and critical load level to cause serious damage to the bridge could be identified. The scenario-based assessment process employed in this study is expected to facilitate the evaluation of bridge structures under aircraft impact in both existing bridges and future designs.

A Case Study of Demonstrating the Process of Digital Restoration of the Relationship between History and Culture Focused on "Latelier" (디지털 역사문화 관계성 복원 프로세스 사례연구 - 라뜰리에를 중심으로 -)

  • Kim, Keun-Soo;Ko, Jeong-Min
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.11
    • /
    • pp.156-164
    • /
    • 2021
  • Currently, digital restoration has s long way to go. Character restoration is only used as a one-time event to restore the shape of a specific person, and building restoration is only composed of digital modeling rather than using the restored cultural assets as content. There is a limit to restoring even the story of a building or a person with the current restoration method alone. Therefore, this study analyzed the method and process of digital restoration of a 'historical and cultural space' encompassing spaces, people, and events, focusing on relationships. In order to derive digital restoration methods, the case of 'Latelier', an indoor theme park based on Gogh, was analyzed. According to the study, the relationship of the person important for digital restoration is important. Based on Gogh's relationship, the process was formalized in four stages for digital restoration: the preparation stage, the digital archive stage, the DB advancement stage, and the demonstration stage. The restoration of the story of the character through the relationship can be expected to converge the past and the present as a true historical restoration, and through this, it is expected that the innovative development of digital restoration can be achieved.

Review on the Post-spill Monitoring Method of Sunken HNS and General Considerations (침강 HNS 유출사고 및 사고 후 모니터링 방법 및 고려사항)

  • Ki Young Choi;Chang Joon Kim;Young Il Kim;Yongmyung Kim;Moonjin Lee
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.spc
    • /
    • pp.37-43
    • /
    • 2022
  • Post-spill monitoring of hazardous noxious substances accidents is essential in the event of a spillage of significant quantities of pollutants and for the management of the marine environment resulting from the long-term effects of the persistent toxic substances. The accidental introduction of a sinker into the marine environment can create harmful anaerobic conditions in the benthic ecosystem and spread over the seafloor by the topography and currents. Through case studies, most post-spill monitoring includes modeling, remote sensing, and chemical analyses of the sediment and benthic organisms. The monitoring also evaluates the effectiveness of restoration and recovery activities and assesses damages and compensation.

Analysis of articles on water quality accidents in the water distribution networks using big data topic modelling and sentiment analysis (빅데이터 토픽모델링과 감성분석을 활용한 물공급과정에서의 수질사고 기사 분석)

  • Hong, Sung-Jin;Yoo, Do-Guen
    • Journal of Korea Water Resources Association
    • /
    • v.55 no.spc1
    • /
    • pp.1235-1249
    • /
    • 2022
  • This study applied the web crawling technique for extracting big data news on water quality accidents in the water supply system and presented the algorithm in a procedural way to obtain accurate water quality accident news. In addition, in the case of a large-scale water quality accident, development patterns such as accident recognition, accident spread, accident response, and accident resolution appear according to the occurrence of an accident. That is, the analysis of the development of water quality accidents through key keywords and sentiment analysis for each stage was carried out in detail based on case studies, and the meanings were analyzed and derived. The proposed methodology was applied to the larval accident period of Incheon Metropolitan City in 2020 and analyzed. As a result, in a situation where the disclosure of information that directly affects consumers, such as water quality accidents, is restricted, the tone of news articles and media reports about water quality accidents with long-term damage in the event of an accident and the degree of consumer pride clearly change over time. could check This suggests the need to prepare consumer-centered policies to increase consumer positivity, although rapid restoration of facilities is very important for the development of water quality accidents from the supplier's point of view.

Stochastic Self-similarity Analysis and Visualization of Earthquakes on the Korean Peninsula (한반도에서 발생한 지진의 통계적 자기 유사성 분석 및 시각화)

  • JaeMin Hwang;Jiyoung Lim;Hae-Duck J. Jeong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.11
    • /
    • pp.493-504
    • /
    • 2023
  • The Republic of Korea is located far from the boundary of the earthquake plate, and the intra-plate earthquake occurring in these areas is generally small in size and less frequent than the interplate earthquake. Nevertheless, as a result of investigating and analyzing earthquakes that occurred on the Korean Peninsula between the past two years and 1904 and earthquakes that occurred after observing recent earthquakes on the Korean Peninsula, it was found that of a magnitude of 9. In this paper, the Korean Peninsula Historical Earthquake Record (2 years to 1904) published by the National Meteorological Research Institute is used to analyze the relationship between earthquakes on the Korean Peninsula and statistical self-similarity. In addition, the problem solved through this paper was the first to investigate the relationship between earthquake data occurring on the Korean Peninsula and statistical self-similarity. As a result of measuring the degree of self-similarity of earthquakes on the Korean Peninsula using three quantitative estimation methods, the self-similarity parameter H value (0.5 < H < 1) was found to be above 0.8 on average, indicating a high degree of self-similarity. And through graph visualization, it can be easily figured out in which region earthquakes occur most often, and it is expected that it can be used in the development of a prediction system that can predict damage in the event of an earthquake in the future and minimize damage to property and people, as well as in earthquake data analysis and modeling research. Based on the findings of this study, the self-similar process is expected to help understand the patterns and statistical characteristics of seismic activities, group and classify similar seismic events, and be used for prediction of seismic activities, seismic risk assessments, and seismic engineering.

A study on detective story authors' style differentiation and style structure based on Text Mining (텍스트 마이닝 기법을 활용한 고전 추리 소설 작가 간 문체적 차이와 문체 구조에 대한 연구)

  • Moon, Seok Hyung;Kang, Juyoung
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.3
    • /
    • pp.89-115
    • /
    • 2019
  • This study was conducted to present the stylistic differences between Arthur Conan Doyle and Agatha Christie, famous as writers of classical mystery novels, through data analysis, and further to present the analytical methodology of the study of style based on text mining. The reason why we chose mystery novels for our research is because the unique devices that exist in classical mystery novels have strong stylistic characteristics, and furthermore, by choosing Arthur Conan Doyle and Agatha Christie, who are also famous to the general reader, as subjects of analysis, so that people who are unfamiliar with the research can be familiar with them. The primary objective of this study is to identify how the differences exist within the text and to interpret the effects of these differences on the reader. Accordingly, in addition to events and characters, which are key elements of mystery novels, the writer's grammatical style of writing was defined in style and attempted to analyze it. Two series and four books were selected by each writer, and the text was divided into sentences to secure data. After measuring and granting the emotional score according to each sentence, the emotions of the page progress were visualized as a graph, and the trend of the event progress in the novel was identified under eight themes by applying Topic modeling according to the page. By organizing co-occurrence matrices and performing network analysis, we were able to visually see changes in relationships between people as events progressed. In addition, the entire sentence was divided into a grammatical system based on a total of six types of writing style to identify differences between writers and between works. This enabled us to identify not only the general grammatical writing style of the author, but also the inherent stylistic characteristics in their unconsciousness, and to interpret the effects of these characteristics on the reader. This series of research processes can help to understand the context of the entire text based on a defined understanding of the style, and furthermore, by integrating previously individually conducted stylistic studies. This prior understanding can also contribute to discovering and clarifying the existence of text in unstructured data, including online text. This could help enable more accurate recognition of emotions and delivery of commands on an interactive artificial intelligence platform that currently converts voice into natural language. In the face of increasing attempts to analyze online texts, including New Media, in many ways and discover social phenomena and managerial values, it is expected to contribute to more meaningful online text analysis and semantic interpretation through the links to these studies. However, the fact that the analysis data used in this study are two or four books by author can be considered as a limitation in that the data analysis was not attempted in sufficient quantities. The application of the writing characteristics applied to the Korean text even though it was an English text also could be limitation. The more diverse stylistic characteristics were limited to six, and the less likely interpretation was also considered as a limitation. In addition, it is also regrettable that the research was conducted by analyzing classical mystery novels rather than text that is commonly used today, and that various classical mystery novel writers were not compared. Subsequent research will attempt to increase the diversity of interpretations by taking into account a wider variety of grammatical systems and stylistic structures and will also be applied to the current frequently used online text analysis to assess the potential for interpretation. It is expected that this will enable the interpretation and definition of the specific structure of the style and that various usability can be considered.

Study on the Fire Risk Prediction Assessment due to Deterioration contact of combustible cables in Underground Common Utility Tunnels (지하공동구내 가연성케이블의 열화접촉으로 인한 화재위험성 예측평가)

  • Ko, Jaesun
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.1
    • /
    • pp.135-147
    • /
    • 2015
  • Recent underground common utility tunnels are underground facilities for jointly accommodating more than 2 kinds of air-conditioning and heating facilities, vacuum dust collector, information processing cables as well as electricity, telecommunications, waterworks, city gas, sewerage system required when citizens live their daily lives and facilities responsible for the central function of the country but it is difficult to cope with fire accidents quickly and hard to enter into common utility tunnels to extinguish a fire due to toxic gases and smoke generated when various cables are burnt. Thus, in the event of a fire, not only the nerve center of the country is paralyzed such as significant property damage and loss of communication etc. but citizen inconveniences are caused. Therefore, noticing that most fires break out by a short circuit due to electrical works and degradation contact due to combustible cables as the main causes of fires in domestic and foreign common utility tunnels fire cases that have occurred so far, the purpose of this paper is to scientifically analyze the behavior of a fire by producing the model of actual common utility tunnels and reproducing the fire. A fire experiment was conducted in a state that line type fixed temperature detector, fire door, connection deluge set and ventilation equipment are installed in underground common utility tunnels and transmission power distribution cables are coated with fire proof paints in a certain section and heating pipes are fire proof covered. As a result, in the case of Type II, the maximum temperature was measured as $932^{\circ}C$ and line type fixed temperature detector displayed the fire location exactly in the receiver at a constant temperature. And transmission power distribution cables painted with fire proof paints in a certain section, the case of Type III, were found not to be fire resistant and fire proof covered heating pipes to be fire resistant for about 30 minutes. Also, fire simulation was carried out by entering fire load during a real fire test and as a result, the maximum temperature is $943^{\circ}C$, almost identical with $932^{\circ}C$ during a real fire test. Therefore, it is considered that fire behaviour can be predicted by conducting fire simulation only with common utility tunnels fire load and result values of heat release rate, height of the smoke layer, concentration of O2, CO, CO2 etc. obtained by simulation are determined to be applied as the values during a real fire experiment. In the future, it is expected that more reliable information on domestic underground common utility tunnels fire accidents can be provided and it will contribute to construction and maintenance repair effectively and systematically by analyzing and accumulating experimental data on domestic underground common utility tunnels fire accidents built in this study and fire cases continuously every year and complementing laws and regulations and administration manuals etc.