• Title/Summary/Keyword: Online damage detection

Search Result 26, Processing Time 0.018 seconds

Application of recursive SSA as data pre-processing filter for stochastic subspace identification

  • Loh, Chin-Hsiung;Liu, Yi-Cheng
    • Smart Structures and Systems
    • /
    • v.11 no.1
    • /
    • pp.19-34
    • /
    • 2013
  • The objective of this paper is to develop on-line system parameter estimation and damage detection technique from the response measurements through using the Recursive Covariance-Driven Stochastic Subspace identification (RSSI-COV) approach. To reduce the effect of noise on the results of identification, discussion on the pre-processing of data using recursive singular spectrum analysis (rSSA) is presented to remove the noise contaminant measurements so as to enhance the stability of data analysis. Through the application of rSSA-SSI-COV to the vibration measurement of bridge during scouring experiment, the ability of the proposed algorithm was proved to be robust to the noise perturbations and offers a very good online tracking capability. The accuracy and robustness offered by rSSA-SSI-COV provides a key to obtain the evidence of imminent bridge settlement and a very stable modal frequency tracking which makes it possible for early warning. The peak values of the identified $1^{st}$ mode shape slope ratio has shown to be a good indicator for damage location, meanwhile, the drastic movements of the peak of $2^{nd}$ mode slope ratio could be used as another feature to indicate imminent pier settlement.

Multi-type object detection-based de-identification technique for personal information protection (개인정보보호를 위한 다중 유형 객체 탐지 기반 비식별화 기법)

  • Ye-Seul Kil;Hyo-Jin Lee;Jung-Hwa Ryu;Il-Gu Lee
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.11-20
    • /
    • 2022
  • As the Internet and web technology develop around mobile devices, image data contains various types of sensitive information such as people, text, and space. In addition to these characteristics, as the use of SNS increases, the amount of damage caused by exposure and abuse of personal information online is increasing. However, research on de-identification technology based on multi-type object detection for personal information protection is insufficient. Therefore, this paper proposes an artificial intelligence model that detects and de-identifies multiple types of objects using existing single-type object detection models in parallel. Through cutmix, an image in which person and text objects exist together are created and composed of training data, and detection and de-identification of objects with different characteristics of person and text was performed. The proposed model achieves a precision of 0.724 and mAP@.5 of 0.745 when two objects are present at the same time. In addition, after de-identification, mAP@.5 was 0.224 for all objects, showing a decrease of 0.4 or more.

U-Bulguksa: Real-Time and Online Early Fire Detection Systems (U-불국사 : 실시간 온라인 화재조기감지시스템)

  • Joo, Jae-Hun;Yim, Jae-Geol
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.3
    • /
    • pp.75-93
    • /
    • 2007
  • This paper presents real-time online early fire warning systems developed for preserving cultural properties of Bulguksa which is a world heritage designated by UNESCO. The system is based on the ubiquitous sensor network employing 900MHz and 2.4GHz bands. In this paper, we analyze requirements that should be considered in building effective management systems of cultural heritages by using wireless sensor network. Finally, we introduce the architecture, sensor and network design, and software design of the fire warning systems which is an initial version of U-Bulguksa. The current version of systems has been operating in Bukguksa for a few months. U-Bukguksa project sponsored by National Information Society Agency is ultimately aimed at developing an integrated system of U-cultural heritage management and U-tourism. The former aims to conserve and manage intangible cultural properties by providing a variety of environmental information such as erosion, crack, and gradient as well as fire which are important causes of loss and damage in real-time and online. The latter refers to the intelligent tourism information and guidance systems allowing tourists to get the personalized content on cultural heritages and help guidance with mobile devices in Bulguksa.

  • PDF

SHM data anomaly classification using machine learning strategies: A comparative study

  • Chou, Jau-Yu;Fu, Yuguang;Huang, Shieh-Kung;Chang, Chia-Ming
    • Smart Structures and Systems
    • /
    • v.29 no.1
    • /
    • pp.77-91
    • /
    • 2022
  • Various monitoring systems have been implemented in civil infrastructure to ensure structural safety and integrity. In long-term monitoring, these systems generate a large amount of data, where anomalies are not unusual and can pose unique challenges for structural health monitoring applications, such as system identification and damage detection. Therefore, developing efficient techniques is quite essential to recognize the anomalies in monitoring data. In this study, several machine learning techniques are explored and implemented to detect and classify various types of data anomalies. A field dataset, which consists of one month long acceleration data obtained from a long-span cable-stayed bridge in China, is employed to examine the machine learning techniques for automated data anomaly detection. These techniques include the statistic-based pattern recognition network, spectrogram-based convolutional neural network, image-based time history convolutional neural network, image-based time-frequency hybrid convolution neural network (GoogLeNet), and proposed ensemble neural network model. The ensemble model deliberately combines different machine learning models to enhance anomaly classification performance. The results show that all these techniques can successfully detect and classify six types of data anomalies (i.e., missing, minor, outlier, square, trend, drift). Moreover, both image-based time history convolutional neural network and GoogLeNet are further investigated for the capability of autonomous online anomaly classification and found to effectively classify anomalies with decent performance. As seen in comparison with accuracy, the proposed ensemble neural network model outperforms the other three machine learning techniques. This study also evaluates the proposed ensemble neural network model to a blind test dataset. As found in the results, this ensemble model is effective for data anomaly detection and applicable for the signal characteristics changing over time.

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.

A Study on the Factors Affecting the Intention of Chinese Users to Discriminate Against Fake News on Social Media - Focusing on attitude, social capital, and risk detection - (중국 이용자 소셜미디어 가짜뉴스 판별의도에 미치는 요인에 관한 연구 -태도, 사회자본, 위험감지를 중심으로-)

  • Tan, KeHong;Lee, Hwa Haeng
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.4
    • /
    • pp.337-351
    • /
    • 2022
  • With the full spread and rapid development of social media, the trend of decentralization of social media information propagation is becoming clearer day by day, and the segmentation of time by audiences using social media information is clearly progressing. Therefore, this study aims to study the influence relationship between social media attitudes toward fake news, social capital, risk perception, and discriminant intentions based on existing studies. Accordingly, the research model presented related research questions and organized a questionnaire to collect a total of 500 valid surveys. The SPSS 26.0 program and the AMOS 24.0 program were used to analyze the data. The research results are as follows. First, the more positive the user's attitude towards the fake news identification intention of social media, the more they want to use various methods or tools to identify the authenticity of online information. Second, the more positive the user's attitude towards social media fake news, the more aware of the potential threats social media fake news poses to their own physical, psychological, financial and so on. At the same time, by raising one's own awareness of the dangers, counterintelligence intentions against fake news on social media will also increase. Third, the richer the social capital the user has, the stronger the information literacy, and therefore the stronger the identification intention of social media fake news. Fourth, the higher the value of social capital Chinese users have, the greater the damage they have suffered from fake news, and the higher the risk awareness of fake news to protect their interests. Fifth, it means that Chinese users recognized information suspected of social media and took corresponding measures.