• Title/Summary/Keyword: damage-detection

Search Result 1,651, Processing Time 0.023 seconds

Diagnostic Efficiency of Lactate Dehydrogenase, Creatine Kinase and Troponin T in Acute Myocardial Infarction (심근 손상에 있어서 Lactate Dehydrogenase, Creatine Kimase 및 Troponin T 진단적 유용성 비교)

  • Lee, Chae-Hoon;Kim, Kyung-Dong;Kim, Chung-Sook
    • Journal of Yeungnam Medical Science
    • /
    • v.12 no.1
    • /
    • pp.48-55
    • /
    • 1995
  • The present study was designed to evaluate the efficiency of total lactate dehydrogenase, total creatine kinase, LD1/LD2 ratio, CK-MB and newly developed troponin T in acute myocardial infarction. The level of troponin T was $0.01{\pm}0.02{\mu}g/L$ in 34 healthy person, but the peak vaule of acute myocardial infarction ranged in 4.7-24.2 ${\mu}g/L$. Total lactate dehydrogenase was peaked in 1 to 3 days after chest pain and then progressively decreased, but LD1/LD2 ratio was persistently higher than 1.0 for 10 days in most patients. Total creatine kinase and CK-MB were peaked in 1-2 days, and normalized in 3-4 days, so they were useful in early diagnosis of acute myocardial infarction, but not for the late stages of acute myocardial infarction. Troponin T is early elevated and persistently high level for more than 10 days. Comparing with total lactate dehydrogenase, total creatine kinase, LD1/LD2 ratio and CK-MB, troponin-T test improves the efficiency of serodiagnostic method for the detection of ischemic myocardial damage.

  • PDF

Development of a method for urban flooding detection using unstructured data and deep learing (비정형 데이터와 딥러닝을 활용한 내수침수 탐지기술 개발)

  • Lee, Haneul;Kim, Hung Soo;Kim, Soojun;Kim, Donghyun;Kim, Jongsung
    • Journal of Korea Water Resources Association
    • /
    • v.54 no.12
    • /
    • pp.1233-1242
    • /
    • 2021
  • In this study, a model was developed to determine whether flooding occurred using image data, which is unstructured data. CNN-based VGG16 and VGG19 were used to develop the flood classification model. In order to develop a model, images of flooded and non-flooded images were collected using web crawling method. Since the data collected using the web crawling method contains noise data, data irrelevant to this study was primarily deleted, and secondly, the image size was changed to 224×224 for model application. In addition, image augmentation was performed by changing the angle of the image for diversity of image. Finally, learning was performed using 2,500 images of flooding and 2,500 images of non-flooding. As a result of model evaluation, the average classification performance of the model was found to be 97%. In the future, if the model developed through the results of this study is mounted on the CCTV control center system, it is judged that the respons against flood damage can be done quickly.

Characteristics of OCP of Reinforced Concrete Using Socket-type Electrodes during Periodic Salt Damage Test (주기적 염해 시험에 따른 소켓 타입 전극을 활용한 철근 콘크리트의 OCP 특성)

  • Lee, Sang-Seok;Kwon, Seung-Jun
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.25 no.4
    • /
    • pp.28-36
    • /
    • 2021
  • It is known that buried rebars inside concrete structures are protected from corrosion due to passive layer. It is very important to delay the timing of corrosion or evaluate a detection of corrosion initiation for the purpose of cost-beneficiary service life of a structure. In this study, corrosion monitoring was performed on concrete specimens considering 3 levels of cover depth(60 mm, 45 mm, and 30 mm), W/C(water to cement) ratio(40.0%, 50.0%, and 60.0%) and chloride concentration(0.0%, 3.5%, and 7.0%). OCP(Open Circuit Potential) was measured using agar-based socket type sensors. The OCP measurement showed the consistent behavior where the potential was reduced in wet conditions and it was partially recovered in dry conditions. In the case of 30 mm of cover depth for most W/C ratio cases, the lowest OCP value was measured and rapid OCP recovery was evaluated in increasing cover depth from 30 mm to 45 mm, since cover depth was an effective protection against chloride ion ingress. As the chloride concentration increased, the effect on the cover depth tended to be more dominant than the that of W/C ratio. After additional monitoring and physical evaluation of chloride concentration after specimen dismantling, the proposed system can be improved with increasing reliability of the corrosion monitoring.

Comparison of Virus Elimination Methods for Disease-free Seedlings of the Apple Dwarfing Rootstock (사과 왜성대목 무독묘 생산을 위한 바이러스 제거 방법 비교)

  • Kwon, Young Hee;Lee, Joung Kwan;Kim, Hee Kyu;Kim, Kyung Ok;Park, Jae Seong;Huh, Yoon Sun;Yoon, Yeo Joong
    • Proceedings of the Plant Resources Society of Korea Conference
    • /
    • 2019.04a
    • /
    • pp.54-54
    • /
    • 2019
  • Apple (Malus domestica) is one of the most economically important fruits in Korea. But virus infection has decreased sustainable production of apple and caused the serious problems such as yield loss and poor fruit quality. Virus or viroid infection including Apple chlorotic leaf spot virus (ACLSV), Apple stem pitting virus (ASPV), Apple stem grooving virus (ASGV), Apple mosaic virus (ApMV) and Apple scar skin viroid (ASSVd) has been also reported in Korea. In many cases, apple is infected with virus and viroid with no specific symptoms, the damage caused by the virus are unaware significantly. In our research, we tried to eliminate viruses in the rootstock for the disease-free seedlings of the apple dwarfing rootstock M.9 and M.26. The method of virus elimination was meristem culture, heat($37^{\circ}C$, 6weeks) treatment and chemistry($Ribavirin^{(R)}$) treatment. The analytical methods commonly used for the detection of virus is Enzyme-linked Immuno-Sorbent Assay(ELlSA) and Reverse Transcription-polymerase Chain Reaction(RT-PCR). RT-PCR method was more 30% sensitive than ELISA method. Efficiency of method eliminate virus appeared meristem method > heat treatment > chemistry treatment. The higher acquisition rate of disease-free seedlings is 30~40% on meristem treatment. In meristem treatment, the apple dwarfing rootstock M.9 gained infection ratio of ACLSV, ASPV and ASGV were 45%, 60% and 50% respectively. In the apple dwarfing rootstock M.26, infection ratio of ACLSV, ASPV and ASGV were 40%, 55%, 55%, respectively. Based on our results, it was found that most effective method of disease-free seedlings apple dwarfing rootstocks was by meristem treatment than heat method and chemistry treatment.

  • PDF

A Study on National Response Strategies of Large-scale Marine Disaster (대규모 해양재난의 국가적 대응전략에 관한 연구)

  • Lee, Choonjae
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.25 no.5
    • /
    • pp.550-559
    • /
    • 2019
  • The sinking of the M/V SEWOL in April 2014 was not a mere marine accident, but a marine catastrophe. This grim case developed into a social tragedy that impinged the national sentiment and communal integrity. It is imperative that thorough provisions and measures be outlined at the national level with regard to massive marine accidents, oil pollution, and natural disasters that might critically affect government affairs. Pivoting on "The Black Swan Theory," a concept of improperly rationalizing a national crisis based on uncertainties, this research assesses a variety of response strategies that minimize the national economic and social damage caused by a large-scale marine disaster. Along with the effort of minimizing any potential defects in each protective barrier, the "Black Swan Detection System of the Marine Disaster" needs to be incorporated to prevent cases wherein such defects lead to an actual crisis. Maritime safety must be systematically unified under a supervisory organization, and a structure for maritime crisis on-scene command and cooperation must likewise be established in order that every force on the scene of a marine disaster may act effectively and consistently under the direction of an on-scene commander.

Unrecorded Alien Plant in South Korea: Ludwigia peploides subsp. montevidensis (Spreng.) P.H. Raven (미기록 침입외래종: 꽃여뀌바늘)

  • Kim, Hye-Won;Son, Dong Chan;Park, Soo Hyun;Jang, Chang-Seok;Sun, Eun-Mi;Jo, Hyeryun;Yun, Seok Min;Chang, Kae Sun
    • Korean Journal of Plant Resources
    • /
    • v.32 no.2
    • /
    • pp.201-206
    • /
    • 2019
  • Alien invasive species are introduced with or without intent and spreading all over Korea. They are known to have negative effects on biodiversity such as economic and environmental damage and causing decrease or loss of native species. The habitats like wetland, reservoir and riverside are especially in danger of being invaded by alien species due to stress and disturbance. Therefore, Korea National Arboretum is steadily working on research and studies on managing alien invasive species. This research aims to collect basic information of Ludwigia peploides subsp. montevidensis (Spreng.) P.H. Raven which was found near riverside in Suwon-si and is concerned to become an invasive alien species. We expect the description, diagram and pictures of this taxon will be helpful for early detection and effective management.

A Study on the Development of Long-term Self Powered Underground Pipeline Remote Monitoring System (자가 발전형 장기 지하매설배관 원격감시 장치 개발에 관한 연구)

  • Kim, Youngsear;Chae, Hyun-Byung;Seo, Jae-Soon;Chae, Soo-Kwon
    • Journal of the Korean Society for Environmental Technology
    • /
    • v.19 no.6
    • /
    • pp.576-585
    • /
    • 2018
  • Systematic management during the whole life cycle from construction to operation and maintenance is very important for the seven underground pipelines (waterworks, sewerage, electricity, telecommunications, gas, heating, oil including waterworks and sewerage). Especially, it is the construction process that affects the whole life cycle of underground buried pipeline. In order to construct a new city or to maintain different underground pipes, it is always necessary to dig the ground and carry out construction and related work. There is a possibility that secondary and tertiary breaks frequently occur in the pipeline construction process after the piping constructed first in this process. To solve this problem, a system is needed which can monitor damage in real time. However, the supply of electric power for continuous operation of the system is limited according to the environment of underground buried pipelines, so it is necessary to develop a stable electric power supply system using natural energy rather than existing electric power. In this study, we developed a system that can operate the pipeline monitoring system for long time (24 hours and 15 days) using natural energy using wind and solar light.

A Classification Model for Illegal Debt Collection Using Rule and Machine Learning Based Methods

  • Kim, Tae-Ho;Lim, Jong-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.4
    • /
    • pp.93-103
    • /
    • 2021
  • Despite the efforts of financial authorities in conducting the direct management and supervision of collection agents and bond-collecting guideline, the illegal and unfair collection of debts still exist. To effectively prevent such illegal and unfair debt collection activities, we need a method for strengthening the monitoring of illegal collection activities even with little manpower using technologies such as unstructured data machine learning. In this study, we propose a classification model for illegal debt collection that combine machine learning such as Support Vector Machine (SVM) with a rule-based technique that obtains the collection transcript of loan companies and converts them into text data to identify illegal activities. Moreover, the study also compares how accurate identification was made in accordance with the machine learning algorithm. The study shows that a case of using the combination of the rule-based illegal rules and machine learning for classification has higher accuracy than the classification model of the previous study that applied only machine learning. This study is the first attempt to classify illegalities by combining rule-based illegal detection rules with machine learning. If further research will be conducted to improve the model's completeness, it will greatly contribute in preventing consumer damage from illegal debt collection activities.

An Efficient Method of Forensics Evidence Collection at the Time of Infringement Occurrence (호스트 침해 발생 시점에서의 효율적 Forensics 증거 자료 수집 방안)

  • Choi Yoon-Ho;Park Jong-Ho;Kim Sang-Kon;Kang Yu;Choe Jin-Gi;Moon Ho-Gun;Rhee Myung-Su;Seo Seung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.69-81
    • /
    • 2006
  • The Computer Forensics is a research area that finds the malicious users by collecting and analyzing the intrusion or infringement evidence of computer crimes such as hacking. Many researches about Computer Forensics have been done so far. But those researches have focussed on how to collect the forensic evidence for both analysis and poofs after receiving the intrusion or infringement reports of hosts from computer users or network administrators. In this paper, we describe how to collect the forensic evidence of good quality from observable and protective hosts at the time of infringement occurrence by malicious users. By correlating the event logs of Intrusion Detection Systems(IDSes) and hosts with the configuration information of hosts periodically, we calculate the value of infringement severity that implies the real infringement possibility of the hosts. Based on this severity value, we selectively collect the evidence for proofs at the time of infringement occurrence. As a result, we show that we can minimize the information damage of the evidence for both analysis and proofs, and reduce the amount of data which are used to analyze the degree of infringement severity.

Effect of Hypersonic Missiles on Maritime Strategy: Focus on Securing and Exploiting Sea Control (극초음속 미사일이 해양전략에 미치는 영향: 해양통제의 확보와 행사를 중심으로)

  • Cho, Seongjin
    • Maritime Security
    • /
    • v.1 no.1
    • /
    • pp.241-271
    • /
    • 2020
  • The military technology currently receiving the most attention is the hypersonic missile. hypersonic is faster than the speed of sound or Mach 5+. The vast majority of the ballistic missiles that it inspired achieved hypersonic speeds as they fell from the sky. Rather than speed, today's renewed attention to hypersonic weapons owes to developments that enable controlled flight. These new systems have two sub-varieties: hypersonic glide vehicles and hypersonic cruise missiles. Hypersonic weapons could challenge detection and defense due to their speed, maneuverability, and low altitude of flight. The fundamental question of this study is: 'What effect will the hypersonic missile have on the maritime strategy?' It is quite prudent to analyze and predict the impact of technology in the development stage on strategy in advance. However, strategy is essential because it affect future force construction. hypersonic missiles act as a limiting factor in securing sea control. The high speed and powerful destructive power of the hypersonic missile are not only difficult to intercept, but it also causes massive ship damage at a single shot. As a result, it is analyzed that the Securing sea control will be as difficult as the capacity of sea denial will be improved geographically and qualitatively. In addition, the concept of Fortress Fleet, which was criticized for its passive strategy in the past, could be reborn in a modern era. There are maritime power projection/defence, SLOC attack/defence in exploiting sea control. The effects of hypersonic missiles on exploiting sea control could be seen as both limiting and opportunity factors.

  • PDF