• Title/Summary/Keyword: Polytechnic analysis

Search Result 1,116, Processing Time 0.022 seconds

The Analysis for the Causes of Beach Erosion on Jeonchon-Najung Beach on the East Coast of Korea (전촌-나정해안의 해안침식 원인분석)

  • Yoo, Hyung-Seok;Kim, Kyu-Han;Joung, Eui-Jin
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.20 no.6
    • /
    • pp.611-620
    • /
    • 2008
  • The process of sediment transport has a very complex mechanism due to waves, currents and bottom topography changes. Usually, beach erosion occurs from various causes such as non-equilibrium sediment transport condition, construction of seawall and rip currents. Therefore, when we try to reduce and develop countermeasures for beach erosion, we have to know the main mode and direction of sediment transport that causes beach erosion. In this study, the process of sediment transport on Jeonchon-Najung beach and main causes of beach erosion have been studied. Field investigation data, aerial photos and the results of numerical model test were used in the analysis. As a result, it was realized that the main causes of beach erosion at Jeonchon-Najung beach was due to the construction of fishery harbors and a seawall.

Computational analysis of three dimensional steel frame structures through different stiffening members

  • Alaskar, Abdulaziz;Wakil, Karzan;Alyousef, Rayed;Jermsittiparsert, Kittisak;Ho, Lanh Si;Alabduljabbar, Hisham;Alrshoudi, Fahed;Mohamed, Abdeliazim Mustafa
    • Steel and Composite Structures
    • /
    • v.35 no.2
    • /
    • pp.187-197
    • /
    • 2020
  • Ground motion records are commonly used for fragility curves (FCs) developing utilized in seismic loss estimating analysis for earthquake prone zones. These records could be 'real', say the recorded acceleration time series or 'simulated' records consistent with the regional seismicity and produced by use of alternative simulation methods. This study has focused on fragility curves developing for masonry buildings through computational 'simulated' ground motion records while evaluating the properness of these fragilities compared to the curves generated by the use of 'real' records. Assessing the dynamic responses of structures, nonlinear computational time history analyses through the equivalent single degree of freedom systems have been implemented on OpenSees platform. Accordingly, computational structural analyses of multi-story 3D frame structures with different stiffening members considering soil interaction have been carried out with finite element software according to (1992) Earthquake East-West component. The obtained results have been compared to each frame regarding soil interaction. Conclusion and recommendations with the discuss of obtaining findings are presented.

Analysis of EEG Signals for Attention Training Game Contents (주의력 훈련 게임 콘텐츠에 대한 EEG 신호 분석)

  • Kang, Sung-Ho;Park, Jung-Hyun;Shin, Sung-Wook;Chung, Sung-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.3
    • /
    • pp.83-90
    • /
    • 2019
  • Recently, the need to prevent or treat cognitive impairment in older adults has been arising. In particular, they tried to diagnose MCI as an early stage of Alzheimer's disease and to delay the progression to dementia through training cognitive function. Most of cognitive function training have been manufactured to game contents which related to several cognitive function, and it needs to be verified quantitatively whether subjects are paying attention to cognitive function training. Thus in this study, we measured and analyzed EEG signals while performing attention training game contents. As an analysis method, we utilized CI, which shows how much they are focusing on, and RI, which shows how stable they are. The result of this study can be seen that all the subjects' CI were increased, which means that the subjects performed game contents with concentration.

Development of ITB Risk Mgt. Model Based on AI in Bidding Phase for Oversea EPC Projects (플랜트 EPC 해외 사업을 위한 입찰단계 시 AI 기반의 ITB Risk 관리 모델 개발)

  • Lee, Don-Hee;Yoon, Gun-Ho;Kim, Jeong-Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.4
    • /
    • pp.151-160
    • /
    • 2019
  • EPC companies to continue operating overseas, it is increasingly becoming apparent that risk is no longer something to be avoided but a subject to be managed. During the bidding stage, the requirements, specifications and project line items within the bid package must be studied in details to analyze the various risk factors in order to avoid cost overruns. However, reviewing vast quantities of bidding documents is time consuming and labor intensive and is not an easy task and this is where automated information technology can help. For this study, I have constructed an ITB analysis model based on Watson AI that can analyze and apply vast amount of documents more effectively in a short time. Configuration of the Watson Explorer AI architecture for AI-based ITB risk management model research, the selection of learning procedures and analysis subjects, and the performance evaluation criteria were defined, and a test bed was constructed to conduct a pilot research. Consequently, I verified the effectiveness of the analytical time reduction and the quality of its results and VOC operations by professionals.

Big Data-based Sensor Data Processing and Analysis for IoT Environment (IoT 환경을 위한 빅데이터 기반 센서 데이터 처리 및 분석)

  • Shin, Dong-Jin;Park, Ji-Hun;Kim, Ju-Ho;Kwak, Kwang-Jin;Park, Jeong-Min;Kim, Jeong-Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.1
    • /
    • pp.117-126
    • /
    • 2019
  • The data generated in the IoT environment is very diverse. Especially, the development of the fourth industrial revolution has made it possible to increase the number of fixed and unstructured data generated in manufacturing facilities such as Smart Factory. With Big Data related solutions, it is possible to collect, store, process, analyze and visualize various large volumes of data quickly and accurately. Therefore, in this paper, we will directly generate data using Raspberry Pi used in IoT environment, and analyze using various Big Data solutions. Collected by using an Sqoop solution collected and stored in the database to the HDFS, and the process is to process the data by using the solutions available Hive parallel processing is associated with Hadoop. Finally, the analysis and visualization of the processed data via the R programming will be used universally to end verification.

A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data

  • Lin, Weiwei;Yang, Chaofan;Zhang, Zeqing;Xue, Xingsi;Haga, Reiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4531-4544
    • /
    • 2021
  • Because the traditional network information security vulnerability risk assessment method does not set the weight, it is easy for security personnel to fail to evaluate the value of information security vulnerability risk according to the calculation value of network centrality, resulting in poor evaluation effect. Therefore, based on the network security data element feature system, this study designed a quantitative assessment method of network information security vulnerability detection risk under single transmission state. In the case of single transmission state, the multi-dimensional analysis of network information security vulnerability is carried out by using the analysis model. On this basis, the weight is set, and the intrinsic attribute value of information security vulnerability is quantified by using the qualitative method. In order to comprehensively evaluate information security vulnerability, the efficacy coefficient method is used to transform information security vulnerability associated risk, and the information security vulnerability risk value is obtained, so as to realize the quantitative evaluation of network information security vulnerability detection under single transmission state. The calculated values of network centrality of the traditional method and the proposed method are tested respectively, and the evaluation of the two methods is evaluated according to the calculated results. The experimental results show that the proposed method can be used to calculate the network centrality value in the complex information security vulnerability space network, and the output evaluation result has a high signal-to-noise ratio, and the evaluation effect is obviously better than the traditional method.

Digital Marketing in the Condition of Wartime Posture in Ukraine

  • Dubovyk, Tetiana;Buchatska, Iryna;Diachuk, Iryna;Zerkal, Anastasiia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.206-212
    • /
    • 2022
  • Strengthening global geopolitical instability in the world leads to an aggravation of international conflicts; it destabilizes the domestic political situation in countries, violates the rights and freedoms of man and citizen, and also activates economic crime. The full-scale invasion of the Russian Federation on the territory of Ukraine and the deployment of military operations in a large territory of a sovereign country have created a number of destabilizing factors in the development of digital technologies and negatively affect the state and trends of digital marketing, which allows establishing interaction with a wide audience and facilitating the search for new customers in various places. The purpose of the research lies in substantiating the theoretical and applied principles for studying the features of digital marketing in the conditions of wartime posture in Ukraine. In the course of the research, general and special methods of economic analysis have been used and applied, namely: analysis and synthesis; analogies and comparisons; generalization and systematization; graphic and tabular methods. Regarding the results of the research of digital marketing in the conditions of wartime posture in Ukraine, it has been established that the intensification of the development of digital marketing is caused by the crisis phenomena of social-economic, social-political and military nature, as well as exacerbated by the challenges of the COVID-19 pandemic. It has been proven that highly developed countries use innovative digital technologies more effectively in the field of marketing, which indicates the importance of the Multidimensional Index of Digitization (the USA - MID: 0,92-0,92; the UK - MID: 0,80-0,97; Japan - MID: 0,80-0,88; Canada - MID: 0,78-0,81; Germany - MID: 0,78-0,88; France - MID: 0,72-0,76), however, the developing countries record much lower values (Ukraine - MID: 0,22-0,48). Accordingly, the level of cybersecurity in highly developed countries is also significantly higher than in transitive countries, in particular, in the United States (GCI: 0,919-0,999); Great Britain (GCI: 0,783-0,995); Canada (GCI: 0,818-0,978) and in Ukraine (GCI: 0,501-0,661).

Healthcare Workers' Mental Health in Pandemic Times: The Predict Role of Psychosocial Risks

  • Carla Barros;Pilar Baylina;Ruben Fernandes;Susana Ramalho;Pedro Arezes
    • Safety and Health at Work
    • /
    • v.13 no.4
    • /
    • pp.415-420
    • /
    • 2022
  • Background: Healthcare workers perform an emotionally exhausting daily work activity, making them prone to occupational hazards, namely psychosocial ones. This study aims to assess the impact of psychosocial risk factors on healthcare workers' mental health. Methods: A cross-sectional study was developed between May and June of 2021 with 479 healthcare workers from Portuguese hospitals. The Depression, Anxiety and Stress Scale was used to assess mental health, and psychosocial risks were assessed through the Health and Work Survey - INSAT. Statistical analysis was performed to identify the psychosocial risk factors related to anxiety, depression, and stress. Subsequently, a multiple linear regression was performed to identify the models that better explained psychosocial risk factors' relationship with anxiety, depression, and stress. Results: Data showed a strong exposure to psychosocial risks. Work pace and intensity, work relationships, and emotional demands stood out with higher global average percentages for yes answers to "exposure and discomfort." The analysis of the b values and p-values from the multiple linear regression shows that some cross-sectional psychosocial risks are predictors of anxiety and stress dimensions, and other psychosocial risks differ in the two mental health dimensions. However, it is important to highlight that healthcare workers still showed great joy and pleasure in performing their work activities. Conclusion: Support network development in the work environment is needed to prevent healthcare workers' emotional stress and promote their psychological well-being. Therefore, new research is essential to understand the psychosocial risks that affect healthcare workers and assess the less visible effects of work-health relationships.

Behaviour insights on damage-control composite beam-to-beam connections with replaceable elements

  • Xiuzhang He;Michael C.H. Yam;Ke Ke;Xuhong Zhou;Huanyang Zhang;Zi Gu
    • Steel and Composite Structures
    • /
    • v.46 no.6
    • /
    • pp.773-791
    • /
    • 2023
  • Connections with damage concentrated to pre-selected components can enhance seismic resilience for moment resisting frames. These pre-selected components always yield early to dissipate energy, and their energy dissipation mechanisms vary from one to another, depending on their position in the connection, geometry configuration details, and mechanical characteristics. This paper presents behaviour insights on two types of beam-to-beam connections that the angles were designed as energy dissipation components, through the results of experimental study and finite element analysis. Firstly, an experimental programme was reviewed, and key responses concerning the working mechanism of the connections were presented, including strain distribution at the critical section, section force responses of essential components, and initial stiffness of test specimens. Subsequently, finite element models of three specimens were established to further interpret their behaviour and response that were not observable in the tests. The moment and shear force transfer paths of the composite connections were clarified through the test results and finite element analysis. It was observed that the bending moment is mainly resisted by axial forces from the components, and the dominant axial force is from the bottom angles; the shear force at the critical section is primarily taken by the slab and the components near the top flange. Lastly, based on the insights on the load transfer path of the composite connections, preliminary design recommendations are proposed. In particular, a resistance requirement, quantified by a moment capacity ratio, was placed on the connections. Design models and equations were also developed for predicting the yield moment resistance and the shear resistance of the connections. A flexible beam model was proposed to quantify the shear resistance of essential components.

Thermal based adsorption of daily food waste with the test of AI grey calculations

  • ZY Chen;Huakun Wu;Yahui Meng;ZY Gu;Timothy Chen
    • Membrane and Water Treatment
    • /
    • v.15 no.3
    • /
    • pp.107-115
    • /
    • 2024
  • This study proposes the recycling of MVS as a value-added product for the removal of phosphate from aqueous solutions. By comparing the phosphate adsorption capacity of each calcined adsorbent at each temperature of MVS, it was determined that the optimal heat treatment temperature of MVS to improve the phosphate adsorption capacity was 800 ℃. MVS-800 suggests an adsorption mechanism through calcium phosphate precipitation. Subsequent kinetic studies with MVS-800 showed that the PFO model was more appropriate than the PSO model. In the equilibrium adsorption experiment, through the analysis of Langmuir and Freundlich models, Langmuir can provide a more appropriate explanation for the phosphate adsorption of MVS-800. This means that the adsorption of phosphate by MVS-800 is uniform over all surfaces and the adsorption consists of a single layer. Thermodynamic analysis of thermally activated MVS-800 shows that phosphate adsorption is an endothermic and involuntary reaction. MVS-800 has the highest phosphate adsorption capacity under low pH conditions. The presence of anions in phosphate adsorption reduces the phosphate adsorption capacity of MVS-800 in the order of CO 3 2-, SO 4 2-, NO 3- and Cl-. Based on experimental data to date, MVS-800 is an environmentally friendly adsorbent for recycling waste resources and is considered to be an adsorbent with high adsorption capacity for removing phosphates from aqueous solutions. This paper combines the advantages of gray predictor and AI fuzzy. The gray predictor can be used to predict whether the bear point exceeds the allowable deviation range, and then perform appropriate control corrections to accelerate the bear point to return to the boundary layer and achieve.