• Title/Summary/Keyword: Building Infrastructure

Search Result 1,204, Processing Time 0.03 seconds

QR code as speckle pattern for reinforced concrete beams using digital image correlation

  • Krishna, B. Murali;Tezeswi, T.P.;Kumar, P. Rathish;Gopikrishna, K.;Sivakumar, M.V.N.;Shashi, M.
    • Structural Monitoring and Maintenance
    • /
    • v.6 no.1
    • /
    • pp.67-84
    • /
    • 2019
  • Digital Image Correlation technique (DIC) is a non-contact optical method for rapid structural health monitoring of critical infrastructure. An innovative approach to DIC is presented using QR (Quick Response) code based random speckle pattern. Reinforced Cement Concrete (RCC) beams of size $1800mm{\times}150mm{\times}200mm$ are tested in flexure. DIC is used to extract Moment (M) - Curvature (${\kappa}$) relationships using random speckle patterns and QR code based random speckle patterns. The QR code based random speckle pattern is evaluated for 2D DIC measurements and the QR code speckle pattern performs satisfactorily in comparison with random speckle pattern when considered in the context of serving a dual purpose. Characteristics of QR code based random speckle pattern are quantified and its applicability to DIC is explored. The ultimate moment-curvature values computed from the QR code based random speckled pattern are found to be in good agreement with conventional measurements. QR code encrypts the structural information which enables integration with building information modelling (BIM).

Building a Private Cloud-Computing System for Greenhouse Control

  • Kim, JoonYong;Lee, Chun Gu;Park, Dong-Hyeok;Park, Heun Dong;Rhee, Joong-Yong
    • Journal of Biosystems Engineering
    • /
    • v.43 no.4
    • /
    • pp.440-444
    • /
    • 2018
  • Purpose: Cloud-computing technology has several advantages, including maintenance, management, accessibility, and computing power. A greenhouse-control system utilizing these advantages was developed using a private cloud-computing system. Methods: A private cloud needs a collection of servers and a suite of software tools to monitor and control cloud-computing resources. In this study, a server farm, operated by OpenStack as a cloud platform, was constructed using servers, and other network devices. Results: The greenhouse-control system was developed according to the fundamental cloud service models: infrastructure as a service, platform as a service, and software as a service. This system has four additional advantages - security, control function, public data use, and data exchange. There are several considerations that must be addressed, such as service level agreement, data ownership, security, and the differences between users. Conclusions: When the advantages are utilized and the considerations are addressed, cloud-computing technology will be beneficial for agricultural use.

Development of Location Based System using Indoor Lenticular Sticker (실내 렌티큘러 스티커를 이용한 위치기반 시스템 개발)

  • Jeong, Seung-Hyuk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.3
    • /
    • pp.601-606
    • /
    • 2019
  • The lenticular Location Based System is related to a location information technology. The system enables users to inform their location in real time wherever in a room, a building, a ship, a basement. In this paper, we analyze limitations and problems of the existing indoor Positioning System and propose a method of user-oriented location service. The proposed method consists of a lenticular sticker, a database(DB) acquisition and analysis technology. The proposed system can be used as an infrastructure to implement various indoor location-based services. In addition to improve user centered positioning accuracy through the development of location-based systems using indoor lenticular systems, it can be used in a disaster situation.

Numerical modeling on the stability of slope with foundation during rainfall

  • Tran, An T.P.;Kim, Ah-Ram;Cho, Gye-Chun
    • Geomechanics and Engineering
    • /
    • v.17 no.1
    • /
    • pp.109-118
    • /
    • 2019
  • The movement of soil along a slope during rainfall can cause serious economic damage and can jeopardize human life. Accordingly, predicting slope stability during rainfall is a major issue in geotechnical engineering. Due to rainwater penetrating the soil, the negative pore water pressure will decrease, in turn causing a loss of shear strength in the soil and ultimately slope failure. More seriously, many constructions such as houses and transmission towers built in/on slopes are at risk when the slopes fail. In this study, the numerical simulation using 2D finite difference program, which can solve a fully coupled hydromechanical problems, was used to evaluate the effects of soil properties, rainfall conditions, and the location of a foundation on the slope instability and slope failure mechanisms during rainfall. A slope with a transmission tower located in Namyangju, South Korea was analyzed in this study. The results showed that the correlation between permeability and rainfall intensity had an important role in changing the pore water pressure via controlling the infiltrated rainwater. The foundation of the transmission tower was stable during rainfall because the slope failure was estimated to occur at the toe of the slope, and did not go through the foundation.

Hierarchical neural network for damage detection using modal parameters

  • Chang, Minwoo;Kim, Jae Kwan;Lee, Joonhyeok
    • Structural Engineering and Mechanics
    • /
    • v.70 no.4
    • /
    • pp.457-466
    • /
    • 2019
  • This study develops a damage detection method based on neural networks. The performance of the method is numerically and experimentally verified using a three-story shear building model. The framework is mainly composed of two hierarchical stages to identify damage location and extent using artificial neural network (ANN). The normalized damage signature index, that is a normalized ratio of the changes in the natural frequency and mode shape caused by the damage, is used to identify the damage location. The modal parameters extracted from the numerically developed structure for multiple damage scenarios are used to train the ANN. The positive alarm from the first stage of damage detection activates the second stage of ANN to assess the damage extent. The difference in mode shape vectors between the intact and damaged structures is used to determine the extent of the related damage. The entire procedure is verified using laboratory experiments. The damage is artificially modeled by replacing the column element with a narrow section, and a stochastic subspace identification method is used to identify the modal parameters. The results verify that the proposed method can accurately detect the damage location and extent.

Security of Web Applications: Threats, Vulnerabilities, and Protection Methods

  • Mohammed, Asma;Alkhathami, Jamilah;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.167-176
    • /
    • 2021
  • This is the world of computer science and innovations. In this modern era, every day new apps, webs and software are being introduced. As well as new apps and software are being introduced, similarly threats and vulnerable security matters are also increasing. Web apps are software that can be used by customers for numerous useful tasks, and because of the developer experience of good programming standards, web applications that can be used by an attacker also have multiple sides. Web applications Security is expected to protect the content of critical web and to ensure secure data transmission. Application safety must therefore be enforced across all infrastructure, including the web application itself, that supports the web applications. Many organizations currently have a type of web application protection scheme or attempt to build/develop, but the bulk of these schemes are incapable of generating value consistently and effectively, and therefore do not improve developers' attitude in building/designing stable Web applications. This article aims to analyze the attacks on the website and address security scanners of web applications to help us resolve web application security challenges.

MC Design Standards and Practices for Design Standardization of Domestic Modular Housing (국내 모듈러주택의 설계표준화를 위한 구조대 모듈정합 설계기준 및 사례)

  • Chung, Joon-Soo;Lim, Seok-Ho;Baek, Cheong-Hoon;Seol, Wook-Je
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.34 no.4
    • /
    • pp.19-25
    • /
    • 2018
  • At present, there are many companies that can produce modular housing. However, if the housing projects are conducted without design standards and principles, each company will supply housing according to its own design standards, resulting in a loss of opportunity to promote standardization at a national level. Korea's modular construction technology is still in its infancy, and there is a lack of MC design applications due to the limited construction market. In recent years, however, related R&D has been carried out by the Ministry of Land, Infrastructure and Transport in order to activate modular construction. As a result, test-beds for public rental housing are currently being built, and the public rental housing applied with the modular construction method is expected to spread in the near future. In this regard, this study seeks to promote more economical and efficient production and supply of modular housing. To this end, it investigates the current status of modular construction, analyzes the problems and proposes a serious of MC design standards as part of the design standardization and open system for modular housing industry to solve the problems.

A Study on Building an Optimized Defense System According to the Application of Integrated Security Policy Algorithm (통합 보안정책 알고리즘 적용에 따른 최적화 방어 시스템 구축에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.39-46
    • /
    • 2011
  • This study is conducted to examine the optimal integrated security policy based on network in case of attacks by implementing unique security policies of various network security equipments as an algorithm within one system. To this end, the policies conduct the experiment to implement the optimal security system through the process of mutually integrating the unique defense policy of Firewall, VPN(Virtual Private Network), IDS(Intrusion Detection System), and IPS(Intrusion Prevention System). In addition, this study is meaningful in that it designs integrated mechanism for rapid detection of system load caused by establishment of the security policy and rapid and efficient defense and secures basic network infrastructure implementation.

KEPCO's Movement on Distribution Sector Regarding Renewable Energy Transition of Distribution Network in Korea (국내 배전망 정책 및 환경변화를 고려한 배전부분 발전방향 연구)

  • Hyun, Seung-Yoon;Kim, Chang-Hwan;Lee, Byung-Sung
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.7 no.1
    • /
    • pp.93-99
    • /
    • 2021
  • The government has proposed a mission to enhance intelligent power networks, decrease coal-fired generation, expand distributed energy resources, and promote energy prosumer into the distribution network in Korea. Installation cost of facility expansion to guaranteed interconnection with small distributed energy resources increases dramatically on KEPCO's distribution sector. And it is hard to withdraw in time. In addition, there are explicit research is required to meet the reliability on grid corresponding to the increase of distributed power. Infrastructure support for accommodating energy prosumer is also needed. Therefore, KEPCO is pushing transition to DSO by expanding distribution management scope and changing its roles. In addition, KEPCO is proactively preparing for integrated operation between distribution network and existing distributed power which is accommodated passively. KEPCO is also trying to accept multiple network users, e.g. building platforms, to manage a data and promote new markets. In the long term, transition to DSO will achieve saving investment costs for accommodating distributed sources and maintaining stable electrical quality. And it will be possible to create new business model using the platform to secure revenue.

Contribution to the development of tiles made of paper board sludge

  • Velumani, P.;Manikandan, P.
    • Advances in environmental research
    • /
    • v.9 no.4
    • /
    • pp.285-294
    • /
    • 2020
  • Growth of any country rest in the consumption of industrial wastes for its infrastructure amenities. Countries like India positively desires a vital utilization of industrial waste resembling paper sludge in the construction industry to make various building materials. Also, it is the duty of all civil engineers or researchers to attach them in mounting new materials from the waste dumped as land fillings. In every construction project, about 70% of cost accounts for the procurement of materials. If this, can be minimized consequently the cost of construction will certainly be condensed. Research has established that the waste paper sludge can be reused in the construction field for a probable scope. The construction diligences munch through a massive quantity of non-renewable resources. On the additional dispense, more waste paper board sludge ends up in landfills or dumpsites than those recycled. Consequently, waste paper sludge for use as a construction material composes a step towards sustainable development. Keeping this in mind an endeavor has been made to utilize paper board sludge acquired from the paper board industry and used with several pozzolanic and cementitious materials for a specific purpose. The addition of paper sludge has been varied from 0% to 20% by weight of cement. The tests done with the samples expose that four samples showed significant outcomes with remarkable strength and durability properties which guide to move for the next phase of research for producing lightweight tiles.