• Title/Summary/Keyword: Mapping method

Search Result 2,594, Processing Time 0.031 seconds

Risk Analysis for the Rotorcraft Landing System Using Comparative Models Based on Fuzzy (퍼지 기반 다양한 모델을 이용한 회전익 항공기 착륙장치의 위험 우선순위 평가)

  • Na, Seong Hyeon;Lee, Gwang Eun;Koo, Jeong Mo
    • Journal of the Korean Society of Safety
    • /
    • v.36 no.2
    • /
    • pp.49-57
    • /
    • 2021
  • In the case of military supplies, any potential failure and causes of failures must be considered. This study is aimed at examining the failure modes of a rotorcraft landing system to identify the priority items. Failure mode and effects analysis (FMEA) is applied to the rotorcraft landing system. In general, the FMEA is used to evaluate the reliability in engineering fields. Three elements, specifically, the severity, occurrence, and detectability are used to evaluate the failure modes. The risk priority number (RPN) can be obtained by multiplying the scores or the risk levels pertaining to severity, occurrence, and detectability. In this study, different weights of the three elements are considered for the RPN assessment to implement the FMEA. Furthermore, the FMEA is implemented using a fuzzy rule base, similarity aggregation model (SAM), and grey theory model (GTM) to perform a comparative analysis. The same input data are used for all models to enable a fair comparison. The FMEA is applied to military supplies by considering methodological issues. In general, the fuzzy theory is based on a hypothesis regarding the likelihood of the conversion of the crisp value to the fuzzy input. Fuzzy FMEA is the basic method to obtain the fuzzy RPN. The three elements of the FMEA are used as five linguistic terms. The membership functions as triangular fuzzy sets are the simplest models defined by the three elements. In addition, a fuzzy set is described using a membership function mapping the elements to the intervals 0 and 1. The fuzzy rule base is designed to identify the failure modes according to the expert knowledge. The IF-THEN criterion of the fuzzy rule base is formulated to convert a fuzzy input into a fuzzy output. The total number of rules is 125 in the fuzzy rule base. The SAM expresses the judgment corresponding to the individual experiences of the experts performing FMEA as weights. Implementing the SAM is of significance when operating fuzzy sets regarding the expert opinion and can confirm the concurrence of expert opinion. The GTM can perform defuzzification to obtain a crisp value from a fuzzy membership function and determine the priorities by considering the degree of relation and the form of a matrix and weights for the severity, occurrence, and detectability. The proposed models prioritize the failure modes of the rotorcraft landing system. The conventional FMEA and fuzzy rule base can set the same priorities. SAM and GTM can set different priorities with objectivity through weight setting.

Hydrophobicity and Adhesion of SiO2/Polyurethane Nanocomposites Topcoat for Aircraft De-icing with Different Pre-curing Time (선경화 시간에 따른 항공기 De-icing용 나노실리카/폴리우레탄 복합재료 탑코트의 소수성 및 접착특성 평가)

  • Kim, Jong-Hyun;Shin, Pyeong-Su;Kwon, Dong-Jun;Park, Joung-Man
    • Composites Research
    • /
    • v.33 no.6
    • /
    • pp.365-370
    • /
    • 2020
  • The icing formation at aircraft occur problems such as increasing weight of the body, fuel efficiency reduction, drag reduction, the error of sensor, and etc. The viscosity of polyurethane (PU) topcoat was measured at 60℃ in real time to set the pre-curing time. SiO2 nanoparticles were dispersed in ethanol using ultra-sonication method. The SiO2/ethanol solution was sprayed on PU topcoat that was not cured fully with different pre-curing conditions. Surface roughness of SiO2/PU nanocomposites were measured using surface roughness tester and the surface roughness data was visualized using 3D mapping. The adhesion property between SiO2 and PU topcoat was evaluated using adhesion pull-off test. The static contact angle was measured using distilled water to evaluate the hydrophobicity. Finally, the pre-curing time of PU topcoat was optimized to exhibit the hydrophobicity of SiO2/PU topcoat.

Seismic Vulnerability Assessment and Mapping for 9.12 Gyeongju Earthquake Based on Machine Learning (기계학습을 이용한 지진 취약성 평가 및 매핑: 9.12 경주지진을 대상으로)

  • Han, Jihye;Kim, Jinsoo
    • Korean Journal of Remote Sensing
    • /
    • v.36 no.6_1
    • /
    • pp.1367-1377
    • /
    • 2020
  • The purpose of this study is to assess the seismic vulnerability of buildings in Gyeongju city starting with the earthquake that occurred in the city on September 12, 2016, and produce a seismic vulnerability map. 11 influence factors related to geotechnical, physical, and structural indicators were selected to assess the seismic vulnerability, and these were applied as independent variables. For a dependent variable, location data of the buildings that were actually damaged in the 9.12 Gyeongju Earthquake was used. The assessment model was constructed based on random forest (RF) as a mechanic study method and support vector machine (SVM), and the training and test dataset were randomly selected with a ratio of 70:30. For accuracy verification, the receiver operating characteristic (ROC) curve was used to select an optimum model, and the accuracy of each model appeared to be 1.000 for RF and 0.998 for SVM, respectively. In addition, the prediction accuracy was shown as 0.947 and 0.926 for RF and SVM, respectively. The prediction values of the entire buildings in Gyeongju were derived on the basis of the RF model, and these were graded and used to produce the seismic vulnerability map. As a result of reviewing the distribution of building classes as an administrative unit, Hwangnam, Wolseong, Seondo, and Naenam turned out to be highly vulnerable regions, and Yangbuk, Gangdong, Yangnam, and Gampo turned out to be relatively safer regions.

3D Reconstruction of Pipe-type Underground Facility Based on Stereo Images and Reference Data (스테레오 영상과 기준데이터를 활용한 관로형 지하시설물 3차원 형상 복원)

  • Cheon, Jangwoo;Lee, Impyeong
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.6_1
    • /
    • pp.1515-1526
    • /
    • 2022
  • Image-based 3D reconstruction is to restore the shape and color of real-world objects, and image sensors mounted on mobile platforms are used for positioning and mapping purposes in indoor and outdoor environments. Due to the increase in accidents in underground space, the location accuracy problem of underground spatial information has been raised. Image-based location estimation studies have been conducted with the advantage of being able to determine the 3D location and simultaneously identify internal damage from image data acquired from the inside of pipeline-type underground facilities. In this study, we studied 3D reconstruction based on the images acquired inside the pipe-type underground facility and reference data. An unmanned mobile system equipped with a stereo camera was used to acquire data and image data within a pipe-type underground facility where reference data were placed at the entrance and exit. Using the acquired image and reference data, the pipe-type underground facility is reconstructed to a geo-referenced 3D shape. The accuracy of the 3D reconstruction result was verified by location and length. It was confirmed that the location was determined with an accuracy of 20 to 60 cm and the length was estimated with an accuracy of about 20 cm. Using the image-based 3D reconstruction method, the position and line-shape of the pipe-type underground facility will be effectively updated.

Flood Mapping Using Modified U-NET from TerraSAR-X Images (TerraSAR-X 영상으로부터 Modified U-NET을 이용한 홍수 매핑)

  • Yu, Jin-Woo;Yoon, Young-Woong;Lee, Eu-Ru;Baek, Won-Kyung;Jung, Hyung-Sup
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.6_2
    • /
    • pp.1709-1722
    • /
    • 2022
  • The rise in temperature induced by global warming caused in El Nino and La Nina, and abnormally changed the temperature of seawater. Rainfall concentrates in some locations due to abnormal variations in seawater temperature, causing frequent abnormal floods. It is important to rapidly detect flooded regions to recover and prevent human and property damage caused by floods. This is possible with synthetic aperture radar. This study aims to generate a model that directly derives flood-damaged areas by using modified U-NET and TerraSAR-X images based on Multi Kernel to reduce the effect of speckle noise through various characteristic map extraction and using two images before and after flooding as input data. To that purpose, two synthetic aperture radar (SAR) images were preprocessed to generate the model's input data, which was then applied to the modified U-NET structure to train the flood detection deep learning model. Through this method, the flood area could be detected at a high level with an average F1 score value of 0.966. This result is expected to contribute to the rapid recovery of flood-stricken areas and the derivation of flood-prevention measures.

NDVI Based on UAVs Mapping to Calculate the Damaged Areas of Chemical Accidents (화학물질사고 피해영역 산출을 위한 드론맵핑 기반의 정규식생지수 활용방안 연구)

  • Lim, Eontaek;Jung, Yonghan;Kim, Seongsam
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.6_3
    • /
    • pp.1837-1846
    • /
    • 2022
  • The annual increase in chemical accidents is causing damage to life and the environment due to the spread and residual of substances. Environmental damage investigation is more difficult to determine the geographical scope and timing than human damage investigation. Considering the reality that there is a lack of professional investigation personnel, it is urgent to develop an efficient quantitative evaluation method. In order to improve this situation, this paper conducted a chemical accidents investigation using unmanned aerial vehicles(UAV) equipped with various sensors. The damaged area was calculated by Ortho-image and strength of agreement was calculated using the normalized difference vegetation index image. As a result, the Cohen's Kappa coefficient was 0.649 (threshold 0.7). However, there is a limitation in that analysis has been performed based on the pixel of the normalized difference vegetation index. Therefore, there is a need for a chemical accident investigation plan that overcomes the limitations.

A Study on Next-Generation Data Protection Based on Non File System for Spreading Smart Factory (스마트팩토리 확산을 위한 비파일시스템(None File System) 기반의 차세대 데이터보호에 관한 연구)

  • Kim, Seungyong;Hwang, Incheol;Kim, Dongsik
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.1
    • /
    • pp.176-183
    • /
    • 2021
  • Purpose: The introduction of smart factories that reflect the 4th industrial revolution technologies such as AI, IoT, and VR, has been actively promoted in Korea. However, in order to solve various problems arising from existing file-based operating systems, this research will focus on identifying and verifying non-file system-based data protection technology. Method: The research will measure security storage that cannot be identified or controlled by the operating system. How to activate secure storage based on the input of digital key values. Establish a control unit that provides input and output information based on BIOS activation. Observe non-file-type structure so that mapping behavior using second meta-data can be performed according to the activation of the secure storage. Result: First, the creation of non-file system-based secure storage's data input/output were found to match the hash function value of the sample data with the hash function value of the normal storage and data. Second, the data protection performance experiments in secure storage were compared to the hash function value of the original file with the hash function value of the secure storage after ransomware activity to verify data protection performance against malicious ransomware. Conclusion: Smart factory technology is a nationally promoted technology that is being introduced to the public and this research implemented and experimented on a new concept of data protection technology to protect crucial data within the information system. In order to protect sensitive data, implementation of non-file-type secure storage technology that is non-dependent on file system is highly recommended. This research has proven the security and safety of such technology and verified its purpose.

Real-time Interactive Animation System for Low-Priced Motion Capture Sensors (저가형 모션 캡처 장비를 이용한 실시간 상호작용 애니메이션 시스템)

  • Kim, Jeongho;Kang, Daeun;Lee, Yoonsang;Kwon, Taesoo
    • Journal of the Korea Computer Graphics Society
    • /
    • v.28 no.2
    • /
    • pp.29-41
    • /
    • 2022
  • In this paper, we introduce a novel real-time, interactive animation system which uses real-time motion inputs from a low-cost motion-sensing device Kinect. Our system generates interaction motions between the user character and the counterpart character in real-time. While the motion of the user character is generated mimicking the user's input motion, the other character's motion is decided to react to the user avatar's motion. During a pre-processing step, our system analyzes the reference motion data and generates mapping model in advance. At run-time, our system first generates initial poses of two characters and then modifies them so that it could provide plausible interacting behavior. Our experimental results show plausible interacting animations in that the user character performs a modified motion of user input and the counterpart character properly reacts against the user character. The proposed method will be useful for developing real-time interactive animation systems which provide a better immersive experience for users.

Analysis of Water Quality Impact of Hapcheon Dam Reservoir According to Changes in Watershed Runoff Using ANN (ANN을 활용한 유역유출 변화에 따른 합천댐 저수지 수질영향 분석)

  • Jo, Bu Geon;Jung, Woo Suk;Lee, Jong Moon;Kim, Young Do
    • Journal of Wetlands Research
    • /
    • v.24 no.1
    • /
    • pp.25-37
    • /
    • 2022
  • Climate change is becoming increasingly unpredictable. This has led to changes in various systems such as ecosystems, human life and hydrological cycles. In particular, the recent unpredictable climate change frequently causes extreme droughts and torrential rains, resulting in complex water resources disasters that cause water pollution due to inundation and retirement rather than primary disasters. SWAT was used as a watershed model to analyze future runoff and pollutant loads. The climate scenario analyzed the RCP4.5 climate scenario of the Meteorological Agency standard scenario (HadGEM3-RA) using the normal quantitative mapping method. Runoff and pollutant load analysis were performed by linkage simulation of climate scenario and watershed model. Finally, the results of application and verification of linkage model and analysis of future water quality change due to climate change were presented. In this study, we simulated climate change scenarios using artificial neural networks, analyzed changes in water temperature and turbidity, and compared the results of dams with artificial neural network results through W2 model, a reservoir water quality model. The results of this study suggest the possibility of applying the nonlinearity and simplicity of neural network model to Hapcheon dam water quality prediction using climate change.

Improvement of ISMS Certification Components for Virtual Asset Services: Focusing on CCSS Certification Comparison (안전한 가상자산 서비스를 위한 ISMS 인증항목 개선에 관한 연구: CCSS 인증제도 비교를 중심으로)

  • Kim, Eun Ji;Koo, Ja Hwan;Kim, Ung Mo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.8
    • /
    • pp.249-258
    • /
    • 2022
  • Since the advent of Bitcoin, various virtual assets have been actively traded through virtual asset services of virtual asset exchanges. Recently, security accidents have frequently occurred in virtual asset exchanges, so the government is obligated to obtain information security management system (ISMS) certification to strengthen information protection of virtual asset exchanges, and 56 additional specialized items have been established. In this paper, we compared the domain importance of ISMS and CryptoCurrency Security Standard (CCSS) which is a set of requirements for all information systems that make use of cryptocurrencies, and analyzed the results after mapping them to gain insight into the characteristics of each certification system. Improvements for 4 items of High Level were derived by classifying the priorities for improvement items into 3 stages: High, Medium, and Low. These results can provide priority for virtual asset and information system security, support method and systematic decision-making on improvement of certified items, and contribute to vitalization of virtual asset transactions by enhancing the reliability and safety of virtual asset services.