• Title/Summary/Keyword: damage threshold

Search Result 294, Processing Time 0.025 seconds

Experimental investigation on multi-parameter classification predicting degradation model for rock failure using Bayesian method

  • Wang, Chunlai;Li, Changfeng;Chen, Zeng;Liao, Zefeng;Zhao, Guangming;Shi, Feng;Yu, Weijian
    • Geomechanics and Engineering
    • /
    • v.20 no.2
    • /
    • pp.113-120
    • /
    • 2020
  • Rock damage is the main cause of accidents in underground engineering. It is difficult to predict rock damage accurately by using only one parameter. In this study, a rock failure prediction model was established by using stress, energy, and damage. The prediction level was divided into three levels according to the ratio of the damage threshold stress to the peak stress. A classification predicting model was established, including the stress, energy, damage and AE impact rate using Bayesian method. Results show that the model is good practicability and effectiveness in predicting the degree of rock failure. On the basis of this, a multi-parameter classification predicting deterioration model of rock failure was established. The results provide a new idea for classifying and predicting rockburst.

A modified index for damage detection of structures using improved reduction system method

  • Arefi, Shahin Lale;Gholizad, Amin;Seyedpoor, Seyed Mohammad
    • Smart Structures and Systems
    • /
    • v.25 no.1
    • /
    • pp.1-22
    • /
    • 2020
  • The modal strain energy method is one of the efficient methods for detecting damage in the structures. Due to existing some limitations in real-world structures, sensors can only be located on a limited number of degrees of freedom (DOFs) of a structure. Therefore, the mode shape values in all DOFs of structures cannot be measured. In this paper, a modified modal strain energy based index (MMSEBI) is introduced to locate damaged elements of structures when a limited number of sensors are used. The proposed MMSEBI is based on the reconstruction of mode shapes using Improved Reduction System (IRS) method. Therefore, in the first step by employing IRS method, mode shapes in slave degrees of freedom are estimated by those of master degrees of freedom. In the second step, the proposed MMSEBI is used to located damage elements. In order to evaluate the efficiency of the proposed method, two numerical examples are considered under different damage patterns considering the measurement noise. Moreover, the universal threshold based on statistical hypothesis testing principles is applied to damage index values. The results show the effectiveness of the proposed MMSEBI for the structural damage localization when comparing with the available damage index named MESBI. The results demonstrate that the presented method can be used as a practical strategy for structural damage identification, especially when a limited number of sensors are installed on the structure. Finally, the combination of MMSEBI and IRS method can provide a reliable tool to identify the location of damage accurately.

Analysis of change characteristics through estimating the limit rainfall by period (기간별 한계강우량 산정을 통한 변화 특성 분석)

  • Hwang, Jeong Geun;Cho, Jae Woong;Kang, Ho Seon;Lee, Han Seung;Moon, Hye Jin
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2020.06a
    • /
    • pp.99-99
    • /
    • 2020
  • The frequency and scale of domestic flood damage continues to increase, but the criteria for responding to flood damage have not been established. To this end, research is underway to estimate the amount of rainfall in each region so that it can be used to respond to flood damage. The limit rainfall is defined as the cumulative maximum rainfall for each duration that causes flooding, and this research purpose to improve the threshold rainfall by estimating the damage based on the damage history in units of 5 years and analyzing changes over time. The limit rainfall based on the damage history was estimated by using the NDMS past damage history of the Ministry of the Interior and Safety and the rainfall minutes data of AWS and ASOS. The period for estimating the limit rainfall is 2013 ~ 2017, 2015 ~ 2019, and the limit rainfall is estimated by analyzing the relationship between the flood damage history and the rainfall event in each period. Considering changes in watershed characteristics and disaster prevention performance, the data were compared using 5-year data. As a result of the analysis, the limit rainfall based on the damage history could be estimated for less than about 10.0% of the administrative dongs nationwide. As a result of comparing the limit rainfall by period, it was confirmed that the area where the limit rainfall has increased or decreased This was analyzed as a change due to rainfall events or urbanization, and it is judged that it will be possible to improve the risk criteria of flooding.

  • PDF

Sensitivity analysis of input variables to establish fire damage thresholds for redundant electrical panels

  • Kim, Byeongjun;Lee, Jaiho;Shin, Weon Gyu
    • Nuclear Engineering and Technology
    • /
    • v.54 no.1
    • /
    • pp.84-96
    • /
    • 2022
  • In the worst case, a temporary ignition source (also known as transient combustibles) between two electrical panels can damage both panels. Mitigation strategies for electrical panel fires were previously developed using fire modeling and risk analysis. However, since they do not comply with deterministic fire protection requirements, it is necessary to analyze the boundary values at which combustibles may damage targets depending on various factors. In the present study, a sensitivity analysis of input variables related to the damage threshold of two electrical panels was performed for dimensionless geometry using a Fire Dynamics Simulator (FDS). A new methodology using a damage evaluation map was developed to assess the damage of the electrical panel. The input variables were the distance between the electrical panels, the vertical height of the fuel, the size of the fire, the wind speed and the wind direction. The heat flux was determined to increase as the vertical distance between the fuel and the panel decreased, and the largest heat flux was predicted when the vertical separation distance divided by one half flame length was 0.3-0.5. As the distance between the panels increases, the heat flux decreases according to the power law, and damage can be avoided when the distance between the fuel and the panel is twice the length of the panel. When the wind direction is east and south, to avoid damage to the electrical panel the distance must be increased by 1.5 times compared to no wind. The present scale model can be applied to any configuration where combustibles are located between two electrical panels, and can provide useful guidance for the design of redundant electrical panels.

Electrical Characteristics of IGBT for Gate Bias under ${\gamma}$ Irradiation (게이트바이어스에서 감마방사선의 IGBT 전기적특성)

  • Lho, Young-Hwan;Lee, Sang-Yong;Kim, Jong-Dae
    • Proceedings of the KIEE Conference
    • /
    • 2008.10b
    • /
    • pp.165-168
    • /
    • 2008
  • The experimental results of exposing IGBT (Insulated Gate Bipolar Transistor) samples to gamma radiation source show shifting of threshold voltages in the MOSFET and degradation of carrier mobility and current gains. At low total dose rate, the shift of threshold voltage is the major contribution of current increases, but for more than some total dose, the current is increased because of the current gain degradation occurred in the vertical PNP at the output of the IGBTs. In the paper, the collector current characteristics as a function of gate emitter voltage (VGE) curves are tested and analyzed with the model considering the radiation damage on the devices for gate bias and different dose. In addition, the model parameters between simulations and experiments are found and studied.

  • PDF

Nano-Second Periodically Poled Lithium Niobate Optical Parametric Oscillator with Planar Cavity Mirrors

  • Kim, Hong-Ki;Rhee, Bum--Ku
    • Journal of the Optical Society of Korea
    • /
    • v.5 no.4
    • /
    • pp.136-139
    • /
    • 2001
  • We investigated a high-output ower, periodically poled lithium niobate(PPLN) optical parametric oscillator(OPO) pumped by a Q-switched Nd:YAG laser. Given the low optical damage threshold and the limited aperture (0.5mm thick) of PPLN, we tried to maximize the signal output power in a linear cavity consisting of two flat mirrors with a loosely focused pump beam. It is found that this simple cavity structure allowed a robust OPO operation, which was not sensitive to alignment compared with the conventional ones using concave mirrors. A maximum energy of 100$\mu$J/pulse was achieved for the signal at 1.36${\mu}{\textrm}{m}$, while the oscillation threshold was 0.3 mJ/pulse for the pump at 1064 nm.

A Damage Model for Predicting the Nonlinear Behavior of Rock (암석의 비선형 거동해석을 위한 손상모델 개발)

  • 장수호;이정인;이연규
    • Journal of the Korean Geotechnical Society
    • /
    • v.18 no.5
    • /
    • pp.83-97
    • /
    • 2002
  • An experimental model which considers post-peak behaviors and pre-peak damage characteristics representing changes of elastic moduli in each damage level was developed. From experiments, some damage thresholds of rocks were determined, and regression analyses were carried out in order to represent changes of elastic moduli in each damage level as functions of confining pressure. In addition, it was intended to simulate post-peak behaviors with Hoek-Brown constants, $m_r\;and\;s_r$ for post-failure. The developed experimental model was implemented into $FLAC^{2D}$ by a FISH function. From results of parametric studies on Hoek-Brown constants for post-peak, it was revealed that uniaxial compressive strength more highly depends upon $s_r$, although it depends on both $m_r\;and\;s_r$. It was also shown that the post-peak slopes of stress-stain curves depend mainly on $m_r$. When the optimum models obtained from parametric studies were applied to numerical analysis, they predicted maximum strengths obtained from experiments and well simulated stiffness changes due to damage levels.

Extraction of a crack opening from a continuous approach using regularized damage models

  • Dufour, Frederic;Pijaudier-Cabot, Gilles;Choinska, Marta;Huerta, Antonio
    • Computers and Concrete
    • /
    • v.5 no.4
    • /
    • pp.375-388
    • /
    • 2008
  • Crack opening governs many transfer properties that play a pivotal role in durability analyses. Instead of trying to combine continuum and discrete models in computational analyses, it would be attractive to derive from the continuum approach an estimate of crack opening, without considering the explicit description of a discontinuous displacement field in the computational model. This is the prime objective of this contribution. The derivation is based on the comparison between two continuous variables: the distribution if the effective non local strain that controls damage and an analytical distribution of the effective non local variable that derives from a strong discontinuity analysis. Close to complete failure, these distributions should be very close to each other. Their comparison provides two quantities: the displacement jump across the crack [U] and the distance between the two profiles. This distance is an error indicator defining how close the damage distribution is from that corresponding to a crack surrounded by a fracture process zone. It may subsequently serve in continuous/discrete models in order to define the threshold below which the continuum approach is close enough to the discrete one in order to switch descriptions. The estimation of the crack opening is illustrated on a one-dimensional example and the error between the profiles issued from discontinuous and FE analyses is found to be of a few percents close to complete failure.

Development and Evaluation of Computational Method for Korean Threshold Runoff (국내 유역특성을 반영한 한계유출량 산정기법 개발 및 평가)

  • Cho, Bae-Gun;Ji, Hee-Sook;Bae, Deg-Hyo
    • Journal of Korea Water Resources Association
    • /
    • v.44 no.11
    • /
    • pp.875-887
    • /
    • 2011
  • The objective of this study is to develop and evaluate a Korean threshold runoff computation method. The selected study area is the Han-River basin and the stream channels in the study area are divided into 3 parts; natural channel and artificial manmade channel for small mountainous catchments, and main channel for master stream. The threshold runoff criteria for small streams is decided to 0.5 m water level increase from the channel bottom, which is the level that mountain climbers and campers successfully escape from natural flood damage. Threshold runoff values in natural channel of small mountainous area are computed by the results from the regional regression analysis between parameters of basin and stream channel, while those in artificial channel of small mountainous area are obtained from the data of basin and channel characteristics parameter. On the other hand, the threshold runoff values for master channel are used the warning flood level that is useful information for escaping guideline for riverside users. For verification of the threshold runoff computation method proposed in this study, three flash flood cases are selected and compared with observed values, which is obtained from SCS effective rainfall computation. The 1, 3, 6-hour effective rainfall values are greater than the corresponding threshold runoff values represents that the proposed computation results are reasonable.

Study on Threshold Scheme based Secure Secret Sharing P2P System (임계 방식 기반 안전 비밀조각 공유 P2P 시스템 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.3
    • /
    • pp.21-33
    • /
    • 2022
  • This paper is to suggest the secure secret sharing system in order to outstandingly reduce the damage caused by the leakage of the corporate secret. This research system is suggested as efficient P2P distributed system kept from the centrally controlled server scheme. Even the bitcoin circulation system is also based on P2P distribution scheme recenly. This research has designed the secure circulation of the secret shares produced by Threshold Shamir Secret Sharing scheme instead of the shares specified in the torrent file using the simple, highly scalable and fast transferring torrent P2P distribution structure and its protocol. In addition, this research has studied to apply both Shamir Threshold Secret Sharing scheme and the securely strong multiple user authentication based on Collaborative Threshold Autentication scheme. The secure transmission of secret data is protected as using the efficient symmetric encryption with the session secret key which is safely exchanged by the public key encryption. Also it is safer against the leakage because the secret key is effectively alive only for short lifetime like a session. Especially the characteristics of this proposed system is effectively to apply the threshold secret sharing scheme into efficient torrent P2P distributed system without modifying its architecture of the torrent system. In addition, this system guaranttes the confidentiality in distributing the secret file using the efficient symmetric encryption scheme, which the session key is securely exchanged using the public key encryption scheme. In this system, the devices to be taken out can be dynamically registered as an user. This scalability allows to apply the confidentiality and the authentication even to dynamically registerred users.