• Title/Summary/Keyword: Physical Network Approach

Search Result 206, Processing Time 0.026 seconds

An efficient hybrid TLBO-PSO-ANN for fast damage identification in steel beam structures using IGA

  • Khatir, S.;Khatir, T.;Boutchicha, D.;Le Thanh, C.;Tran-Ngoc, H.;Bui, T.Q.;Capozucca, R.;Abdel-Wahab, M.
    • Smart Structures and Systems
    • /
    • v.25 no.5
    • /
    • pp.605-617
    • /
    • 2020
  • The existence of damages in structures causes changes in the physical properties by reducing the modal parameters. In this paper, we develop a two-stages approach based on normalized Modal Strain Energy Damage Indicator (nMSEDI) for quick applications to predict the location of damage. A two-dimensional IsoGeometric Analysis (2D-IGA), Machine Learning Algorithm (MLA) and optimization techniques are combined to create a new tool. In the first stage, we introduce a modified damage identification technique based on frequencies using nMSEDI to locate the potential of damaged elements. In the second stage, after eliminating the healthy elements, the damage index values from nMSEDI are considered as input in the damage quantification algorithm. The hybrid of Teaching-Learning-Based Optimization (TLBO) with Artificial Neural Network (ANN) and Particle Swarm Optimization (PSO) are used along with nMSEDI. The objective of TLBO is to estimate the parameters of PSO-ANN to find a good training based on actual damage and estimated damage. The IGA model is updated using experimental results based on stiffness and mass matrix using the difference between calculated and measured frequencies as objective function. The feasibility and efficiency of nMSEDI-PSO-ANN after finding the best parameters by TLBO are demonstrated through the comparison with nMSEDI-IGA for different scenarios. The result of the analyses indicates that the proposed approach can be used to determine correctly the severity of damage in beam structures.

EDISON Platform to Supporting Education and Integration Research in Computational Science (계산과학 분야의 교육 및 융합연구 지원을 위한 EDISON 플랫폼)

  • Jin, Du-Seok;Jung, Young-Jin;Lee, Jong-Suk Ruth;Cho, Kum-Won;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.466-469
    • /
    • 2011
  • Recently, a new theoretical and methodological approach for computational science is becoming more and more popular for analyzing and solving scientific problems in various scientific disciplines such as Computational fluid dynamics, Chemistry, Physics, Structural Dynamics, Computational Design and applied research. Computational science is a field of study concerned with constructing mathematical models and quantitative analysis techniques and using large computing resources to solve the problems which are difficult to approach in a physical experimentally. In this paper, we present R&D of EDISON open integration platform that allows anyone like professors, researchers, industrial workers, students etc to upload their advanced research result such as simulation SW to use and share based on the cyber infrastructure of supercomputer and network. EDISON platform, which consists of 3 tiers (EDISON application framework, EDISON middleware, and EDISON infra resources) provides Web portal for education and research in 5 areas (CFD, Chemistry, Physics, Structural Dynamics, Computational Design) and user service.

  • PDF

Novel Anomaly Detection Method for Proactive Prevention from a Mobile E-finance Accident with User"s Input Pattern Analysis (모바일 디바이스에서의 전자금융사고 예방을 위한 사용자입력패턴분석 기반 이상증후 탐지 방법)

  • Seo, Ho-Jin;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.47-60
    • /
    • 2011
  • With the increase in the use of mobile banking service, mobile banking has become an attractive target to attackers. Even though many security measures are applied to the current mobile banking service, some threats such as physical theft or penetration to a mobile device from remote side are still remained as unsolved. With aiming to fill this void, we propose a novel approach to prevent e-financial incidents by analyzing mobile device user's input patterns. This approach helps us to distinguish between original user's usage and attacker's usage through analyzing personal input patterns such as input time-interval, finger pressure level on the touch screen. Our proposed method shows high accuracy, and is effective to prevent the e-finance incidents proactively.

MOnCa2: High-Level Context Reasoning Framework based on User Travel Behavior Recognition and Route Prediction for Intelligent Smartphone Applications (MOnCa2: 지능형 스마트폰 어플리케이션을 위한 사용자 이동 행위 인지와 경로 예측 기반의 고수준 콘텍스트 추론 프레임워크)

  • Kim, Je-Min;Park, Young-Tack
    • Journal of KIISE
    • /
    • v.42 no.3
    • /
    • pp.295-306
    • /
    • 2015
  • MOnCa2 is a framework for building intelligent smartphone applications based on smartphone sensors and ontology reasoning. In previous studies, MOnCa determined and inferred user situations based on sensor values represented by ontology instances. When this approach is applied, recognizing user space information or objects in user surroundings is possible, whereas determining the user's physical context (travel behavior, travel destination) is impossible. In this paper, MOnCa2 is used to build recognition models for travel behavior and routes using smartphone sensors to analyze the user's physical context, infer basic context regarding the user's travel behavior and routes by adapting these models, and generate high-level context by applying ontology reasoning to the basic context for creating intelligent applications. This paper is focused on approaches that are able to recognize the user's travel behavior using smartphone accelerometers, predict personal routes and destinations using GPS signals, and infer high-level context by applying realization.

Potential of Children's Museum as a Base for Donation Network - Focused on Chicago Children's Museum - (기부네트워크 구축 거점으로서 어린이박물관의 잠재성 분석 연구 - 시카고 어린이박물관 사례를 중심으로 -)

  • Lee, Yeunsook;Lim, Yeaji;Kim, Kwangmi
    • KIEAE Journal
    • /
    • v.12 no.3
    • /
    • pp.3-10
    • /
    • 2012
  • The purpose of this study is to seek a planning approach for children's museum within Korean context that promotes community participation. A literature review method and a field survey method were used. Literature reviews on community participation paradigm, residents' participation and donation networks in community regeneration processes, and finally on case studies on children's museum in Korea were carried out. Through the field survey on Chicago Children's Museum(CCM) located in downtown Chicago, its role was identified as networking systems of community participation and donation and was verified as a socio-physical base for vitalizing donation culture that is an active and a leading community participation method. As a result, CCM has engaged many partnerships with city organizations and local schools to provide diverse and unique programs that are not only targeted to children but also parents, teachers and visitors. Also, an evolution of CCM through various types of donations and community participation was delineated. CCM was found successfully in restoring community spirit and vitalizing economical growth where it once was a decayed city area. Rather than focusing on descriptive technique of typical children's museum, this study explored how community fabric is made and acted out, through rethinking community participation's value, and how it can influence a physical space. CCM, as a good example of community participatory museum, the results can be used as a reference in planning and directing community participation based children's museums in Korea. It is significant to shed light on children's museum as an opportunity of social space which can empower community.

A Study on the Multiplexing of a Communication Line for the Physical Load Balancing-Based Prevention of Infringement (물리적 부하 균형(Load-balancing) 기반의 침해방지를 위한 통신라인 다중화에 관한 연구)

  • Choi, Hee-Sik;Seo, Woo-Seok;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.81-91
    • /
    • 2012
  • Presently in 2011, there are countless attacking tools oriented to invading security on the internet. And most of the tools are possible to conduct the actual invasion. Also, as the program sources attacking the weaknesses of PS3 were released in 2010 and also various sources for attacking agents and attacking tools such as Stuxnet Source Code were released in 2011, the part for defense has the greatest burden; however, it can be also a chance for the defensive part to suggest and develop methods to defense identical or similar patterned attacking by analyzing attacking sources. As a way to cope with such attacking, this study divides the network areas targeted for attack based on load balancing by the approach gateways and communication lines according to the defensive policies by attacking types and also suggests methods to multiply communication lines. The result of this paper will be provided as practical data to realize defensive policies based on high hardware performances through enhancing the price competitiveness of hardware infrastructure with 2010 as a start.

IoT Enabled Smart Emergency LED Exit Sign controller Design using Arduino

  • Jung, Joonseok;Kwon, Jongman;Mfitumukiza, Joseph;Jung, Soonho;Lee, Minwoo;Cha, Jaesang
    • International journal of advanced smart convergence
    • /
    • v.6 no.1
    • /
    • pp.76-81
    • /
    • 2017
  • This paper presents a low cost and flexible IoT enabled smart LED controller using Arduino that is used for emergency exit signs. The Internet of Things (IoT) is become a global network that put together physical objects using network communications for the purpose of inter-communication of devices, access information on internet, interaction with users as well as permanent connected environment. A crucial point in this paper, is underlined on the potential key points of applying the Arduino platform as low cost, easy to use microcontroller with combination of various sensors applied in IoT technology to facilitate and establishment of intelligent products. To demonstrate the feasibility and effectiveness of the system, devices such as LED strip, combination of various sensors, Arduino, power plug and ZigBee module have been integrated to setup smart emergency exit sign system. The general concept of the proposed system design discussed in this paper is all about the combination of various sensor such as smoke detector sensor, humidity, temperature sensor, glass break sensors as well as camera sensor that are connected to the main controller (Arduino) for the purpose of communicating with LED exit signs displayer and dedicated PC monitors from integrated system monitoring (controller room) through gateway devices using Zig bee module. A critical appraisal of the approach in the area concludes the paper.

Evaluation Criteria for Suitable Authentication Method for IoT Service Provider in Industry 4.0 Environment (4차 산업혁명 시대의 IoT 서비스 참여 주체에 대한 적합한 인증수단 선택을 위한 평가기준)

  • Jeong, Kwang Seob;Bae, Sukjoo;Kim, Hyoungtae
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.3
    • /
    • pp.116-122
    • /
    • 2017
  • Advances in information technology, communication and network technology are radically facilitating digital convergences as the integration of human, equipment, and space in the current industry 4.0 era. In industry 4.0 environment, the vast amount of information with networked computing technology can be simultaneously accessible even in limited physical space. Two main benefit points out of these information are the convenience and efficiency in their online transactions either buying things online or selling online. Even though there exist so many benefits that information technology can create for the people doing business over the internet there is a critical problem to be answered. In spite of many such advantages, however, online transactions have many dysfunctions such as personal information leakage, account hacking, and cybercrime. Without preparing the appropriate protection methods or schema people reluctantly use the transaction or would find some other partners with enhanced information security environment. In this paper we suggested a novel selection criteria that can be used to evaluate the reliable means of authentication against the expected risks under on-going IoT based environment. Our selection criteria consists of 4 steps. The first step is services and risk identification step. The second step is evaluation of risk occurrence step. The third step includes the evaluation of the extent of damage. And the final step is the assessment of the level of risk. With the help of the above 4 step-approach people can systematically identify potential risks hiding in the online transactions and effectively avoid by taking appropriate counter actions.

Prospects and Problems in the Study of Geography related to the Concept of Commodity, Transport, and Supply Chains (상품.교통.공급사슬개념과 관련된 지리학의 연구와 과제)

  • Han, Ju-Seong
    • Journal of the Korean Geographical Society
    • /
    • v.44 no.6
    • /
    • pp.723-744
    • /
    • 2009
  • The purpose of this paper is to clarify the prospects and problems in the study of geography related to the concept of commodity, transport, and supply chains. The geography studies related to commodity chains are expanded to each field of industry focusing on the subjects and economic difference which lead the commodity chain in core and periphery regions. These vertical connection are studied with the political economy approach that gives attention to geographical pattern of agricultural products and foods. But in viewpoint of commodity circuit and commodity network, the culture or subjects of micro regions and interaction are also studied. The contents of these study are to clarify the importance of cultural turn and local. And the study of chain standpoint appears that the series of transport process by transportation modes can be understood by transport chains and the physical distribution process of sea freight is to be grasped by supply chains.

Computer Vision and Neuro- Net Based Automatic Grading of a Mushroom(Lentinus Edodes L.) (컴퓨터시각과 신경회로망에 의한 표고등급의 자동판정)

  • Hwang, Heon;Lee, Choongho;Han, Joonhyun
    • Journal of Bio-Environment Control
    • /
    • v.3 no.1
    • /
    • pp.42-51
    • /
    • 1994
  • Visual features of a mushromm(Lentinus Edodes L.) are critical in sorting and grading as most agricultural products are. Because of its complex and various visual features, grading and sorting of mushrooms have been done manually by the human expert. Though actions involved in human grading look simple, it decision making underneath the simple action comes from the result of the complex neural processing of visual image. Recently, an artificial neural network has drawn a great attention because of its functional capability as a partial substitute of the human brain. Since most agricultural products are not uniquely defined in its physical properties and do not have a well defined job structure, the neuro -net based computer visual information processing is the promising approach toward the automation in the agricultural field. In this paper, first, the neuro - net based classification of simple geometric primitives were done and the generalization property of the network was tested for degraded primitives. And then the neuro-net based grading system was developed for a mushroom. A computer vision system was utilized for extracting and quantifying the qualitative visual features of sampled mushrooms. The extracted visual features of sampled mushrooms and their corresponding grades were used as input/output pairs for training the neural network. The grading performance of the trained network for the mushrooms graded previously by the expert were also presented.

  • PDF