• Title/Summary/Keyword: Generate Data

Search Result 3,066, Processing Time 0.032 seconds

Vibration-based structural health monitoring for offshore wind turbines - Experimental validation of stochastic subspace algorithms

  • Kraemer, Peter;Friedmanna, Herbert
    • Wind and Structures
    • /
    • v.21 no.6
    • /
    • pp.693-707
    • /
    • 2015
  • The efficiency of wind turbines (WT) is primarily reflected in their ability to generate electricity at any time. Downtimes of WTs due to "conventional" inspections are cost-intensive and undesirable for investors. For this reason, there is a need for structural health monitoring (SHM) systems, to enable service and maintenance on demand and to increase the inspection intervals. In general, monitoring increases the cost effectiveness of WTs. This publication concentrates on the application of two vibration-based SHM algorithms for stability and structural change monitoring of offshore WTs. Only data driven, output-only algorithms based on stochastic subspace identification (SSI) in time domain are considered. The centerpiece of this paper deals with the rough mathematical description of the dynamic behavior of offshore WTs and with the basic presentation of stochastic subspace-based algorithms and their application to these structures. Due to the early stage of the industrial application of SHM on offshore WT on the one side and the required confidentiality to the plant manufacturer and operator on the other side, up to now it is not possible to analyze different isolated structural damages resp. changes in a systematic manner, directly by means of in-situ measurement and to make these "acknowledgements" publicly available. For this reason, the sensitivity of the methods for monitoring purposes are demonstrated through their application on long time measurements from a 1:10 large scale test rig of an offshore WT under different conditions: undamaged, different levels of loosened bolt connections between tower parts, different levels of fouling, scouring and structure inclination. The limitation and further requirements for the approaches and their applicability on real foundations are discussed along the paper.

Exploration on Possibility of the Disciplinary Convergence of the User Studies and the Research in Practice (이용자연구와 실용연구 분야의 학제적 융합 가능성 도출 연구)

  • Lee, Jee Yeon;Kam, Miah
    • Journal of the Korean Society for information Management
    • /
    • v.35 no.1
    • /
    • pp.129-155
    • /
    • 2018
  • This research aims to discover various aspects of the user studies and the research in practice and also to propose collaboration methods by empirical analysis of the data. To determine the application applicability of the user studies in other subject areas, the degree of keyword overlap between the user studies and the User Experience (UX), one of the research in practice discipline, was measured. The quantitative information science methods including simple frequency analysis were applied to more than ten thousand published papers to generate the network mapping and ranking as well as comparative analysis by time. The analysis result showed that there were slightly lesser overlap between the user studies and the UX in the domestically published articles than the international ones. It also revealed that there is a relationship between the actual occurrences of collaboration and the keyword overlap. The temporal analysis showed that there is increasingly more keyword overlap between two disciplines and thus it is possible to predict the active convergence in the future.

Volume measurement of limb edema using three dimensional registration method of depth images based on plane detection (깊이 영상의 평면 검출 기반 3차원 정합 기법을 이용한 상지 부종의 부피 측정 기술)

  • Lee, Wonhee;Kim, Kwang Gi;Chung, Seung Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.7
    • /
    • pp.818-828
    • /
    • 2014
  • After emerging of Microsoft Kinect, the interest in three-dimensional (3D) depth image was significantly increased. Depth image data of an object can be converted to 3D coordinates by simple arithmetic calculation and then can be reconstructed as a 3D model on computer. However, because the surface coordinates can be acquired only from the front area facing Kinect, total solid which has a closed surface cannot be reconstructed. In this paper, 3D registration method for multiple Kinects was suggested, in which surface information from each Kinect was simultaneously collected and registered in real time to build 3D total solid. To unify relative coordinate system used by each Kinect, 3D perspective transform was adopted. Also, to detect control points which are necessary to generate transformation matrix, 3D randomized Hough transform was used. Once transform matrices were generated, real time 3D reconstruction of various objects was possible. To verify the usefulness of suggested method, human arms were 3D reconstructed and the volumes of them were measured by using four Kinects. This volume measuring system was developed to monitor the level of lymphedema of patients after cancer treatment and the measurement difference with medical CT was lower than 5%, expected CT reconstruction error.

A 3-D Visualization Method for Geographical Information based on Contour Lines (등고선을 이용한 자행정보의 3차원 시각화 기법)

  • Han, Jung-Kyu;Baek, Joong-Hwan;Hwang, Soo-Chan
    • Journal of Advanced Navigation Technology
    • /
    • v.5 no.2
    • /
    • pp.123-133
    • /
    • 2001
  • The existing visualization methods using the satellite images or map images require complicated preprocessing stages and a large amount of visual data to represent the 3-D terrain. This paper presents a 3-D visualization method for geographical information, which enables automatic generation of 3-D terrain. It is generated based, on contour information obtained from a numerical map. This paper also introduces a method that resolves the three main problems needed to visualize 3-D terrain from contour lines such as correspondence, tiling, and branching. The virtual contour line is defined to extend a distorted contour line to have a similar shape to the corresponding contour line that is used, to generate 3-D surfaces. It helps that 3-D terrain is represented exactly and in detail.

  • PDF

Vitamin D Sufficiency: How Should it be Defined and what are its Functional Indicators?

  • Hollis Broce W.
    • Nutritional Sciences
    • /
    • v.8 no.2
    • /
    • pp.111-117
    • /
    • 2005
  • It has been more than three decades since the first assay assessing circulating 25 (OH)D in human subjects was performed That publication as well as several that followed it defined 'normal' nutritional vitamin D status in human populations. Recently, the wisdom by which 'normal' circulating 25 (OH)D levels in human subjects were assigned in the past has come under question. It appears that sampling human subjects, who appear to be free from disease, and assessing 'normal' circulating 25 (OH)D levels by plotting a Gaussian distribution is grossly inaccurate. There are many reasons why this method is inaccurate, including race, lifestyle habits, sunscreen usage, age, latitude, and inappropriately low dietary recommendations for vitamin D. For instance, a 400 IU/day. AI for vitamin D is insignificant when one considers that a 10-15 minute whole body exposure to peak summer sun will generate and release up to 20,000 IU vitamin $D_3$ into the circulation. Recent studies, which orally administered up to 10,000 IU/day vitamin $D_3$ to human subjects for several months, have successfully elevated circulating 25 (OH)D levels to those observed in individuals from sun-rich environments. Further, we are now able to accurately assess sufficient circulating 25 (OH)D levels utilizing specific biomarkers instead of guessing what an adequate level is. These biomarkers include intact parathyroid hormone (PTH), calcium absorption, bone mineral density (BMD), insulin resistance and pancreatic beta cell function. Using the data from these biomarkers, vitamin D deficiency should be defined as circulating levels of 25 (OH)D$\leq$30 ng/mL. In certain cases, such as pregnancy and lactation, significantly higher circulating 25 (OH)D levels would almost certainly be beneficial to both the mother and recipient fetus/infant.

A Programming Model for USN Applications based on Nano-Qplus (Nano-Qplus기반의 USN 응용 프로그래밍 모델)

  • Lee, Woo-Jin;Kim, Ju-Il;Lee, Kwang-Yong;Chong, Ki-Won
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.4
    • /
    • pp.378-387
    • /
    • 2006
  • A programming model for ubiquitous sensor network (USN) applications based on Nano-Qplus is proposed. USN applications mean programs of nodes which are components of sensor network such as sensor, router, sink and actuator. Developers can automatically generate programs of USN applications by setting attributes values of nodes using a script after they model a sensor network. A script for setting attributes values of a node is proposed in this paper. The algorithm of automatic code generation is also described. Developers can easily implement USN applications even if they do not know details of low-level communication, data sharing, and collective operations because the applications are automatically generated from a script. They set only attributes values of nodes using the script. Efforts for USN applications development also are reduced because of automatic code generation. Furthermore, developers can correct errors of applications in the early stage of development through ear]y test based on rapid code generation.

A Secure WPA-PSK Protocol Resistant to Dictionary Attack on Smartphone Communication Using Wi-Fi Channel (Wi-Fi를 이용한 스마트폰에서 사전 공격에 안전한 WPA-PSK 프로토콜)

  • Park, Geun-Duk;Park, Jeong-Soo;Ha, Jae-Cheol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.4
    • /
    • pp.1839-1848
    • /
    • 2012
  • Recently, smartphone communications using Wi-Fi channel are increasing rapidly to provide diverse internet services. The WPA security protocol was used for data protection between user and wireless AP. However, WPA-PSK protocol was known to be weak to the dictionary attack. In this paper, we proposed a secure WPA-PSK protocol to resist the dictionary attack. Since the proposed method was designed to generate a strong encryption key which is combined the Diffie-Hellman key agreement scheme with secrecy property of PSK(Pre-Shared Key), we can protect the Wi-Fi channel from Man-In-The-Middle attack and Rogue AP impersonation attack.

Analysis of Electrical and Thermal Signal for Series Arc in Electrical Contact (전선의 접속부에서 직렬아크에 의한 전기적 및 열적 신호 분석)

  • Kim, Doo Hyun;Hwang, Dong Kyu
    • Journal of the Korean Society of Safety
    • /
    • v.30 no.5
    • /
    • pp.1-7
    • /
    • 2015
  • This paper is aimed to analyze the electrical and thermal signal such as ignition possibility, ignition time, thermal characteristics and arc fault power that are associated with electrical fire in case of the occurrence of series arc at IV wiring used for interior wiring at commercial power source. In order to analyze the signal, series arc was induced by generating the constant vibration through vibrating device in the one phase (R phase) and ignition possibility was analyzed along the condition of current value by adding cotton material to the contact point of wiring. The ignition time is shortened as the electric current value increased, burning time is not associated with current value and the temperature rose up to $740^{\circ}C$ though it was not ignited. It was checked out that the temperature was the energy source enough that can generate the fire related with insulation aging of wiring and the inflammable. The possibility of electrical fire by series arc was shown as more than 12% at 5A, more than 42% at 20A and arc showed 27W at 5A, 180W at 20A. It was confirmed that the possibility of electrical fire exists at the condition as above and the circuit breaker did not operate. This data can be used as the reference value for the investigation of electrical fire or development of the circuit breaker.

Automated Generation Algorithm of the Penetration Scenarios using Association Mining Technique (연관 마이닝 기법을 이용한 침입 시나리오 자동생성 알고리즘)

  • 정경훈;주정은;황현숙;김창수
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.05a
    • /
    • pp.203-207
    • /
    • 1999
  • In this paper we propose the automated generation algorithm of penetration scenario using association mining technique. Until now known intrusion detections are classified into anomaly detection and misuse detection. The former uses statistical method, features selection, neural network method in order to decide intrusion, the latter uses conditional probability, expert system, state transition analysis, pattern matching for deciding intrusion. In proposed many intrusion detection algorithms unknown penetrations are created and updated by security experts. Our algorithm automatically generates penetration scenarios applying association mining technique to state transition technique. Association mining technique discovers efficient and useful unknown information in existing data. In this paper the algorithm we propose can automatically generate penetration scenarios to have been produced by security experts and is easy to cope with intrusions when it is compared to existing intrusion algorithms. Also It has advantage that maintenance cost is not high.

  • PDF

A Hierarchical Method for Systematic Management and Application of e-Portfolio. (e-포트폴리오의 체계적인 관리와 활용을 위한 계층적 기법)

  • Lee, Hye-Jin;Park, Chan;Jang, Yeonghui;Jung, Ji-Sung;Seoung, Dong-Ook;Yoo, Jae-Soo;Yoo, Kwan-Hee
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.88-93
    • /
    • 2009
  • e-Portfolio in e-Learning environment is defined as the results which either teachers or learners systematically manage global contents related to their teaching and learning, respectively. When the e-Portfolio is applied to their work including teaching and learning, it is very useful for both teachers and learners to prepare their teaching plan, and to get the opportunity of their reflection by checking out their learning output, respectively. To generate e-Portfolios, there are two ways; one for collecting it directly from teachers and learners and another for collecting it automatically as a result of learning activities through e-learning system. In this paper, for efficient management of e-Portfolio, the data is layered, classified, restructured, and provided for users' purposes and various situations. Users can construct their own e-Portfolios by adding their own logic with their purposes in different situations.

  • PDF