• Title/Summary/Keyword: Machine-being

Search Result 1,057, Processing Time 0.029 seconds

An Experimental Study on the Reinforcement Effect of Installed Micropile under Footing on Dense Sand (조밀한 모래지반의 기초하부에 설치된 마이크로파일 보강효과에 관한 실험적 연구)

  • Lee, Tae-Hyung;Im, Jong-Chul
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.3C
    • /
    • pp.191-200
    • /
    • 2006
  • The micropile, which is a kind of the in-situ manufactured pile with small diameter of 100~300mm, is constructed by installing a steel bar or pipe and injecting grout into a borehole. The application fields of micropile are being gradually expanded in a limited space of down-town area, because the micropile has various advantages with low vibration and noise in method and compact size in machine, etc. Mostly, the micropile has been applied to secure the safety of structures, depending on the increment of bearing capacity and the restraint of displacement. The micropile is expected to be used in various fields due to its effectiveness and potentiality in the future. The model test, focused on the interaction between micropile and soil in this study, was carried out. The micropile is installed under footing(concept of "structure supporting"). With the test results and soil deformation analysis, the reinforcement effect(relating to bearing capacity and settlement) was analysed in a qualitative and quantitative manner, respectively. Consequently, it is hoped to demonstrate the improvement of an efficiency and application in the design and construction of micropile.

Development of Algorithm Patterns for Identifying the Time of Abnormal Low Temperature Generation (이상저온 발생 시점 확인을 위한 알고리즘 패턴 개발)

  • Jeongwon Lee;Choong Ho Lee
    • Journal of Industrial Convergence
    • /
    • v.21 no.8
    • /
    • pp.43-49
    • /
    • 2023
  • Since 2018, due to climate change, heat waves and cold waves have caused gradual damage to social infrastructure. Since the damage caused by cold weather has increased every year due to climate change in recent 4 years, the damage that was limited to a specific area is now appearing all over the country, and a lot of efforts are being concentrated from experts in various fields to minimize this. However, it is not easy to study real-time observation of sudden abnormal low temperature in existing studies to reflect local characteristics in discontinuously measured data. In this study, based on the weather-related data that affects the occurrence of cold-weather damage, we developed an algorithm pattern that can identify the time when abnormal cold temperatures occurred after searching for weather patterns at the time of cold-weather damage. The results of this study are expected to be of great help to the related field in that it is possible to confirm the time when the abnormal low temperature occurs due to the data generated in real time without relying on the past data.

A Taekwondo Poomsae Movement Classification Model Learned Under Various Conditions

  • Ju-Yeon Kim;Kyu-Cheol Cho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.10
    • /
    • pp.9-16
    • /
    • 2023
  • Technological advancement is being advanced in sports such as electronic protection of taekwondo competition and VAR of soccer. However, a person judges and guides the posture by looking at the posture, so sometimes a judgment dispute occurs at the site of the competition in Taekwondo Poomsae. This study proposes an artificial intelligence model that can more accurately judge and evaluate Taekwondo movements using artificial intelligence. In this study, after pre-processing the photographed and collected data, it is separated into train, test, and validation sets. The separated data is trained by applying each model and conditions, and then compared to present the best-performing model. The models under each condition compared the values of loss, accuracy, learning time, and top-n error, and as a result, the performance of the model trained under the conditions using ResNet50 and Adam was found to be the best. It is expected that the model presented in this study can be utilized in various fields such as education sites and competitions.

A Study on the Strategic Trade Policy of Korea, China and Japan in the Era of Digital Trade (디지털무역 시대의 한국·중국·일본의 전략적 무역정책에 관한 연구)

  • Jia-Jia Liu;Nak-Hyun Han
    • Korea Trade Review
    • /
    • v.47 no.6
    • /
    • pp.335-353
    • /
    • 2022
  • There are two aspects of digital trade: the digitalisation of goods/services being traded and the digitalisation of the transactional act. Digital data (i.e. machine-readable industrial data and transactional data) is the major driving force for both aspects of digital trade. Digital data is a non-rivalrous input, whether for production or marketing activities, and is thus able to be used by many firms or government agencies without limiting the use of others. Digital platforms provide online infrastructure for the interactions between groups, for instance, consumers and producers. The externality effect refers to the situation in which prosperity in one group on a given platform will improve the returns of other groups on the same platform. In the era of the data-driven economy, strategic trade policy can involve data-related policies. The major objective of these policies is to improve the competitiveness of domestic firms. For instance, firms may be subsidised if they use cloud services provided by specific platforms. This strand of strategic trade policies might be useful for increasing the competitiveness of small-and medium-sized enterprises (SMEs) via the digitalisation of production/marketing processes. Alternatively, strategic trade policy may also exploit the externality effect via platform economy-related policies. Further, some countries may form data coalitions to facilitate cross-border data flow. This paper uses cases in Asian countries to illustrate which role these strategic trade policies can play in the digital economy.

Blockchain-based Important Information Management Techniques for IoT Environment (IoT 환경을 위한 블록체인 기반의 중요 정보 관리 기법)

  • Yoon-Su Jeong
    • Advanced Industrial SCIence
    • /
    • v.3 no.1
    • /
    • pp.30-36
    • /
    • 2024
  • Recently, the Internet of Things (IoT), which has been applied to various industrial fields, is constantly evolving in the process of automation and digitization. However, in the network where IoT devices are built, research on IoT critical information-related data sharing, personal information protection, and data integrity among intermediate nodes is still being actively studied. In this study, we propose a blockchain-based IoT critical information management technique that is easy to implement without burdening the intermediate node in the network environment where IoT is built. The proposed technique allocates a random value of a random size to the IoT critical information arriving at the intermediate node and manages it to become a decentralized P2P blockchain. In addition, the proposed technique makes it easier to manage IoT critical data by creating licenses such as time limit and device limitation according to the weight condition of IoT critical information. Performance evaluation and proposed techniques have improved delay time and processing time by 7.6% and 10.1% on average compared to existing techniques.

Analysis of deep learning-based deep clustering method (딥러닝 기반의 딥 클러스터링 방법에 대한 분석)

  • Hyun Kwon;Jun Lee
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.61-70
    • /
    • 2023
  • Clustering is an unsupervised learning method that involves grouping data based on features such as distance metrics, using data without known labels or ground truth values. This method has the advantage of being applicable to various types of data, including images, text, and audio, without the need for labeling. Traditional clustering techniques involve applying dimensionality reduction methods or extracting specific features to perform clustering. However, with the advancement of deep learning models, research on deep clustering techniques using techniques such as autoencoders and generative adversarial networks, which represent input data as latent vectors, has emerged. In this study, we propose a deep clustering technique based on deep learning. In this approach, we use an autoencoder to transform the input data into latent vectors, and then construct a vector space according to the cluster structure and perform k-means clustering. We conducted experiments using the MNIST and Fashion-MNIST datasets in the PyTorch machine learning library as the experimental environment. The model used is a convolutional neural network-based autoencoder model. The experimental results show an accuracy of 89.42% for MNIST and 56.64% for Fashion-MNIST when k is set to 10.

A Study of Automatic Deep Learning Data Generation by Considering Private Information Protection (개인정보 보호를 고려한 딥러닝 데이터 자동 생성 방안 연구)

  • Sung-Bong Jang
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.435-441
    • /
    • 2024
  • In order for the large amount of collected data sets to be used as deep learning training data, sensitive personal information such as resident registration number and disease information must be changed or encrypted to prevent it from being exposed to hackers, and the data must be reconstructed to match the structure of the built deep learning model. Currently, these tasks are performed manually by experts, which takes a lot of time and money. To solve these problems, this paper proposes a technique that can automatically perform data processing tasks to protect personal information during the deep learning process. In the proposed technique, privacy protection tasks are performed based on data generalization and data reconstruction tasks are performed using circular queues. To verify the validity of the proposed technique, it was directly implemented using C language. As a result of the verification, it was confirmed that data generalization was performed normally and data reconstruction suitable for the deep learning model was performed properly.

Microstructural and corrosion behavior of D3 tools steel and 440C SS for blade application

  • Nur Maizatul Shima Adzali;Nurul Abidah Mohamad Khapeli;Alina Rahayu Mohamed
    • Advances in materials Research
    • /
    • v.13 no.3
    • /
    • pp.183-194
    • /
    • 2024
  • D3 tools steel and 440C stainless steel (SS) are normally being employed for application such as knife blade and cutting tools. These steels are iron alloys which have high carbon and high chromium content. In this study, lab work focused on the microstructural and corrosion behavior of D3 tools steel and 440C SS after went through heat treatment processes. Heat treatments for both steels were started with normalizing at 1020 ℃, continue with hardening at 1000 ℃followed by oil quenching. Cryogenic treatment was carried out in liquid nitrogen for 24 hours. The addition of cryogenic heat treatment is believed to increase the hardness and corrosion resistance for steels. Both samples were then tempered at two different tempering temperatures, 160 ℃ and 426 ℃. For corrosion test, the samples were immersed in NaCl solution for 30 days to study the corrosion behavior of D3 tool steel and 440C SS after heat treatment. The mechanical properties of these steels have been investigated using Rockwell hardness machine before heat treatment, after heat treatment (before corrosion) and after corrosion test. Microstructure observation of samples was carried out by scanning electron microscopy. The corrosion rate of these steels was calculated after the corrosion test completed. From the results, the highest hardness is observed for D3 tool steel which tempered at 160 ℃(54.1 HRC). In terms of microstructural analysis, primary carbide and pearlite in the as-received samples transform to tempered martensite and cementite after heat treatment process. From this research, for corrosion test, heat treated 440C SS sample tempered with 426 ℃possessed the excellent corrosion resistance with corrosion rate 0.2808 mm/year.

Real-Time Comprehensive Assistance for Visually Impaired Navigation

  • Amal Al-Shahrani;Amjad Alghamdi;Areej Alqurashi;Raghad Alzahrani;Nuha imam
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.1-10
    • /
    • 2024
  • Individuals with visual impairments face numerous challenges in their daily lives, with navigating streets and public spaces being particularly daunting. The inability to identify safe crossing locations and assess the feasibility of crossing significantly restricts their mobility and independence. Globally, an estimated 285 million people suffer from visual impairment, with 39 million categorized as blind and 246 million as visually impaired, according to the World Health Organization. In Saudi Arabia alone, there are approximately 159 thousand blind individuals, as per unofficial statistics. The profound impact of visual impairments on daily activities underscores the urgent need for solutions to improve mobility and enhance safety. This study aims to address this pressing issue by leveraging computer vision and deep learning techniques to enhance object detection capabilities. Two models were trained to detect objects: one focused on street crossing obstacles, and the other aimed to search for objects. The first model was trained on a dataset comprising 5283 images of road obstacles and traffic signals, annotated to create a labeled dataset. Subsequently, it was trained using the YOLOv8 and YOLOv5 models, with YOLOv5 achieving a satisfactory accuracy of 84%. The second model was trained on the COCO dataset using YOLOv5, yielding an impressive accuracy of 94%. By improving object detection capabilities through advanced technology, this research seeks to empower individuals with visual impairments, enhancing their mobility, independence, and overall quality of life.

A counting-time optimization method for artificial neural network (ANN) based gamma-ray spectroscopy

  • Moonhyung Cho;Jisung Hwang;Sangho Lee;Kilyoung Ko;Wonku Kim;Gyuseong Cho
    • Nuclear Engineering and Technology
    • /
    • v.56 no.7
    • /
    • pp.2690-2697
    • /
    • 2024
  • With advancements in machine learning technologies, artificial neural networks (ANNs) are being widely used to improve the performance of gamma-ray spectroscopy based on NaI(Tl) scintillation detectors. Typically, the performance of ANNs is evaluated using test datasets composed of actual spectra. However, the generation of such test datasets encompassing a wide range of actual spectra representing various scenarios often proves inefficient and time-consuming. Thus, instead of measuring actual spectra, we generated virtual spectra with diverse spectral features by sampling from categorical distribution functions derived from the base spectra of six radioactive isotopes: 54Mn, 57Co, 60Co, 134Cs, 137Cs, and 241Am. For practical applications, we determined the optimum counting time (OCT) as the point at which the change in the Kullback-Leibler divergence (ΔKLDV) values between the synthetic spectra used for training the ANN and the virtual spectra approaches zero. The accuracies of the actual spectra were significantly improved when measured up to their respective OCTs. The outcomes demonstrated that the proposed method can effectively determine the OCTs for gamma-ray spectroscopy based on ANNs without the need to measure actual spectra.