• Title/Summary/Keyword: Integration method

Search Result 3,686, Processing Time 0.026 seconds

QR code as speckle pattern for reinforced concrete beams using digital image correlation

  • Krishna, B. Murali;Tezeswi, T.P.;Kumar, P. Rathish;Gopikrishna, K.;Sivakumar, M.V.N.;Shashi, M.
    • Structural Monitoring and Maintenance
    • /
    • v.6 no.1
    • /
    • pp.67-84
    • /
    • 2019
  • Digital Image Correlation technique (DIC) is a non-contact optical method for rapid structural health monitoring of critical infrastructure. An innovative approach to DIC is presented using QR (Quick Response) code based random speckle pattern. Reinforced Cement Concrete (RCC) beams of size $1800mm{\times}150mm{\times}200mm$ are tested in flexure. DIC is used to extract Moment (M) - Curvature (${\kappa}$) relationships using random speckle patterns and QR code based random speckle patterns. The QR code based random speckle pattern is evaluated for 2D DIC measurements and the QR code speckle pattern performs satisfactorily in comparison with random speckle pattern when considered in the context of serving a dual purpose. Characteristics of QR code based random speckle pattern are quantified and its applicability to DIC is explored. The ultimate moment-curvature values computed from the QR code based random speckled pattern are found to be in good agreement with conventional measurements. QR code encrypts the structural information which enables integration with building information modelling (BIM).

A Three-layered Optical Waveguide of Second-order Orbital Angular Momentum Mode Guiding for Photonic Integrated Circuit (3층 구조를 가지는 광 집적회로용 2차 궤도 각운동량 광 도파로)

  • Lee, In-Joon;Kim, Sang-In
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.4
    • /
    • pp.645-650
    • /
    • 2019
  • In this paper, a specifically designed waveguide structure that can carry first, and second-order orbital angular momentum(: OAM) mode is proposed. The proposed optical waveguide consists of three Si stripes embedded in $SiO_2$, which is suitable for implementing on-chip integration and fabrication by standard thin film deposition and etching processes. The second-order OAM mode was generated by combining two eigenmodes, which are calculated by finite difference method(: FDM). The topological charge number of the first, and second-order OAM mode was calculated as l=0.9642 and 1.8766 respectively, which is close to the theoretical value.

A Study on the Integrated Account Management Model (위험기반 통합계정관리모델에 관한 연구)

  • Kang, Yong-Suk;Choi, Kook-Hyun;Shin, Yong-Tae;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.947-950
    • /
    • 2014
  • The recent APT attacks including cyber terror are caused by a high level of malicious codes and hacking techniques. This implies that essentially, advanced security management is required, from the perspective of 5A. The changes of IT environment are represented by Mobile, Cloud and BYOD. In this situation, the security model needs to be changed, too into the Airport model which emphasizes prevention, and connection, security and integration of functions from the existing Castle model. This study suggested an application method of the risk-based Airport model to the cyber security environment.

  • PDF

What is Critical Fashion? (크리티컬 패션에 관한 고찰)

  • Jung, Jung-hee;Yim, Eun-hyuk
    • Fashion & Textile Research Journal
    • /
    • v.21 no.5
    • /
    • pp.540-551
    • /
    • 2019
  • This study analyzes a new fashion phenomenon for critical fashion. Critical fashion is a message-centered fashion that delivers consciousness and sociocultural issues for contemporary society. The research method for this study combined literature reviews and case studies along with a research scope, that reviewed aspects of critical fashion through works, presentations, and images of collections, various media, and joint projects from the 2000s to the present day. This study indicates that critical fashion exhibits a conceptual pattern that metaphorically expresses the message of designers' perspectives on society and the fashion system. Critical fashion designers' socially critical messages began to emerge in avant-garde fashion influenced by avant-garde art movement that then developed into a conceptual fashion heavily influenced by conceptual art movement before it evolves into concepts of critical fashion. Critical fashion has been influenced by community-oriented critical art, which signifies that the characteristic of criticism of an art system is expressed through the language of fashion. In conclusion, critical fashion resists the idea of the integration of a cultural industry whose homogeneity is continuously collapsing the differences for the purpose of consumption and challenges to the established fashion system.

Risk analysis of offshore terminals in the Caspian Sea

  • Mokhtari, Kambiz;Amanee, Jamshid
    • Ocean Systems Engineering
    • /
    • v.9 no.3
    • /
    • pp.261-285
    • /
    • 2019
  • Nowadays in offshore industry there are emerging hazards with vague property such as act of terrorism, act of war, unforeseen natural disasters such as tsunami, etc. Therefore industry professionals such as offshore energy insurers, safety engineers and risk managers in order to determine the failure rates and frequencies for the potential hazards where there is no data available, they need to use an appropriate method to overcome this difficulty. Furthermore in conventional risk based analysis models such as when using a fault tree analysis, hazards with vague properties are normally waived and ignored. In other word in previous situations only a traditional probability based fault tree analysis could be implemented. To overcome this shortcoming fuzzy set theory is applied to fault tree analysis to combine the known and unknown data in which the pre-combined result will be determined under a fuzzy environment. This has been fulfilled by integration of a generic bow-tie based risk analysis model into the risk assessment phase of the Risk Management (RM) cycles as a backbone of the phase. For this reason Fault Tree Analysis (FTA) and Event Tree Analysis (ETA) are used to analyse one of the significant risk factors associated in offshore terminals. This process will eventually help the insurers and risk managers in marine and offshore industries to investigate the potential hazards more in detail if there is vagueness. For this purpose a case study of offshore terminal while coinciding with the nature of the Caspian Sea was decided to be examined.

Joint Optimization for Residual Energy Maximization in Wireless Powered Mobile-Edge Computing Systems

  • Liu, Peng;Xu, Gaochao;Yang, Kun;Wang, Kezhi;Li, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5614-5633
    • /
    • 2018
  • Mobile Edge Computing (MEC) and Wireless Power Transfer (WPT) are both recognized as promising techniques, one is for solving the resource insufficient of mobile devices and the other is for powering the mobile device. Naturally, by integrating the two techniques, task will be capable of being executed by the harvested energy which makes it possible that less intrinsic energy consumption for task execution. However, this innovative integration is facing several challenges inevitably. In this paper, we aim at prolonging the battery life of mobile device for which we need to maximize the harvested energy and minimize the consumed energy simultaneously, which is formulated as residual energy maximization (REM) problem where the offloading ratio, energy harvesting time, CPU frequency and transmission power of mobile device are all considered as key factors. To this end, we jointly optimize the offloading ratio, energy harvesting time, CPU frequency and transmission power of mobile device to solve the REM problem. Furthermore, we propose an efficient convex optimization and sequential unconstrained minimization technique based combining method to solve the formulated multi-constrained nonlinear optimization problem. The result shows that our joint optimization outperforms the single optimization on REM problem. Besides, the proposed algorithm is more efficiency.

Modernization determinants by ensuring economic security of enterprises in the competitive conditions

  • Tkachenko, Tetiana;Tulchynska, Svitlana;Kostiunik, Olena;Vovk, Olha;Kovalenko, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.119-126
    • /
    • 2021
  • The study develops methodological aspects for modeling the determining impact of modernization on the enterprise's economic security in development competitive conditions using the model of speed, stability and spaciousness of modernization. Modeling the determining impact of modernization on the enterprise's economic security in a competitive conditions involves: firstly, the formation of estimated modeling indicators in accordance with the speed, stability and spaciousness of the enterprise's modernization; secondly, establishing the weight of indicators in the assessment system using the tools of cognitive judgment; thirdly, the establishment of reference values of sound evaluation indicators; fourthly, the calculations of the integrated impact assessment of the modernization's determining impact modeling on the enterprise's ensuring economic security in a competitive conditions; fifthly, conducting calculations and analytical summarization of the results. To determine a comprehensive integrated indicator of the modernization changes impact on the competitiveness and economic security of enterprises, we use the correlation method of the calculated value with the reference value, as well as use weights for groups of calculations. Approbation of modeling of determining influence of modernization on maintenance of economic safety of the enterprise in competitive conditions of development by authors was carried out concerning such enterprises, as: JSC "Ukrzaliznytsia", SE "Ukraerorukh", SE IA "Boryspil", SE "Ukrposhta", KP "Kyivpastrans".

Precision Analysis of NARX-based Vehicle Positioning Algorithm in GNSS Disconnected Area

  • Lee, Yong;Kwon, Jay Hyoun
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.39 no.5
    • /
    • pp.289-295
    • /
    • 2021
  • Recently, owing to the development of autonomous vehicles, research on precisely determining the position of a moving object has been actively conducted. Previous research mainly used the fusion of GNSS/IMU (Global Positioning System / Inertial Navigation System) and sensors attached to the vehicle through a Kalman filter. However, in recent years, new technologies have been used to determine the location of a moving object owing to the improvement in computing power and the advent of deep learning. Various techniques using RNN (Recurrent Neural Network), LSTM (Long Short-Term Memory), and NARX (Nonlinear Auto-Regressive eXogenous model) exist for such learning-based positioning methods. The purpose of this study is to compare the precision of existing filter-based sensor fusion technology and the NARX-based method in case of GNSS signal blockages using simulation data. When the filter-based sensor integration technology was used, an average horizontal position error of 112.8 m occurred during 60 seconds of GNSS signal outages. The same experiment was performed 100 times using the NARX. Among them, an improvement in precision was confirmed in approximately 20% of the experimental results. The horizontal position accuracy was 22.65 m, which was confirmed to be better than that of the filter-based fusion technique.

A Study on the Cognition Tendency of Disorder·Social Integration according to the Vulnerability of Fear of Crime - With a focus on the young women's group - (범죄두려움 취약도에 따른 무질서 및 사회통제 인지 경향에 관한 연구 - 청년층 여성을 중심으로 -)

  • Kang, So-Yeon;Ha, Mikyoung;Byun, Gidong
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.36 no.4
    • /
    • pp.31-39
    • /
    • 2020
  • The purpose of this study is to identify the relationship between general fear of crime and specific fear of crime. Also, it is to suggest the way of analyzing fear of crime by summing up the two concepts. This study finds a reason why fear of crime varies from person to person within the same sex and similar age group. In particular, this study intends to analyze the models that affect fear of crime to figure out which is relevant to those in the high-risk group. And with the results, we can devise measurements to effectively reduce fear of crime in a local community. The following facts have been found in this study: positive correlation between general fear of crime and specific fear of crime, method of subdividing group with fear of crime, models that affect fear of crime and sub-items that greatly relate to high-risk groups.

Software Library Design for GNSS/INS Integrated Navigation Based on Multi-Sensor Information of Android Smartphone

  • Kim, Youngki;Fang, Tae Hyun;Seo, Kiyeol
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.11 no.4
    • /
    • pp.279-286
    • /
    • 2022
  • In this paper, we designed a software library that produces integrated Global Navigation Satellite System (GNSS) / Inertial Navigation System (INS) navigation information using the raw measurements provided by the GNSS chipset, gyroscope, accelerometer and magnetometer embedded in android smartphone. Loosely coupled integration method was used to derive information of GNSS /INS integrated navigation. An application built in the designed library was developed and installed on the android smartphone. And we conducted field experiments. GNSS navigation messages were collected in the Radio Technical Commission for Maritime Service (RTCM 3.0) format by the Network Transport of RTCM via Internet Protocol (NTRIP). As a result of experiments, it was confirmed that design requirements were satisfied by deriving navigation such as three-dimensional position and speed, course over ground (COG), speed over ground (SOG), heading and protection level (PL) using the designed library. In addition, the results of this experiment are expected to be applicable to maritime navigation applications using smart device.