• Title/Summary/Keyword: S-SMART system

Search Result 2,401, Processing Time 0.03 seconds

Unsupervised one-class classification for condition assessment of bridge cables using Bayesian factor analysis

  • Wang, Xiaoyou;Li, Lingfang;Tian, Wei;Du, Yao;Hou, Rongrong;Xia, Yong
    • Smart Structures and Systems
    • /
    • v.29 no.1
    • /
    • pp.41-51
    • /
    • 2022
  • Cables are critical components of cable-stayed bridges. A structural health monitoring system provides real-time cable tension recording for cable health monitoring. However, the measurement data involve multiple sources of variability, i.e., varying environmental and operational factors, which increase the complexity of cable condition monitoring. In this study, a one-class classification method is developed for cable condition assessment using Bayesian factor analysis (FA). The single-peaked vehicle-induced cable tension is assumed to be relevant to vehicle positions and weights. The Bayesian FA is adopted to establish the correlation model between cable tensions and vehicles. Vehicle weights are assumed to be latent variables and the influences of different transverse positions are quantified by coefficient parameters. The Bayesian theorem is employed to estimate the parameters and variables automatically, and the damage index is defined on the basis of the well-trained model. The proposed method is applied to one cable-stayed bridge for cable damage detection. Significant deviations of the damage indices of Cable SJS11 were observed, indicating a damaged condition in 2011. This study develops a novel method to evaluate the health condition of individual cable using the FA in the Bayesian framework. Only vehicle-induced cable tensions are used and there is no need to monitor the vehicles. The entire process, including the data pre-processing, model training and damage index calculation of one cable, takes only 35 s, which is highly efficient.

Establishment of a Standard Nitrogen Application Rate for Zoysia matrella Using Growth Responses to Various Fertilization Level (질소 시비 수준별 금잔디의 생육과 질소 시비량 설정)

  • Kim, Young-Sun;Choi, Mun-Jin;Youn, Jeong-Ho;Lee, Geung-Joo
    • Korean Journal of Environmental Agriculture
    • /
    • v.41 no.3
    • /
    • pp.167-176
    • /
    • 2022
  • BACKGROUND: Nitrogen (N) is an important element for turfgrass (Zoysia matrella) growth; however, standard N application rate for turfgrass is not established yet. This study was conducted to evaluate the effect of N application rates on the growth and quality of turfgrass for establishment of standard N application rate. METHODS AND RESULTS: Treatments were as follows; control (0 N g/m2/month), 1N (1 N g/m2/month), 2N(2 N g/m2/month), 3N (3 N g/m2/month), 4N (4 N g/m2/month), and 5N (5 N g/m2/month). N application improved visual turfgrass quality. Compared with the control, clipping yield of all N treatments increased by 90~194%. The grass shoot weight of 3N, 4N, and 5N treatments increased by 52%, 43%, and 111%, respectively, and the stolon weight of 4N and 5N treatments increased by 412% and 201%, respectively, compared to the control. The N uptake amount and N recovery rate were estimated to be 4.10~6.28 g/m2 and 14~58%, respectively. CONCLUSION(S): These results indicate that considering visual quality, clipping yield, N uptake amount, and N recovery, the application rate of 2~3 N g/m2/month was suggested to be suitable for Z. matrella production.

An Application of RASA Technology to Design an AI Virtual Assistant: A Case of Learning Finance and Banking Terms in Vietnamese

  • PHAM, Thi My Ni;PHAM, Thi Ngoc Thao;NGUYEN, Ha Phuong Truc;LY, Bao Tuyen;NGUYEN, Truc Linh;LE, Hoanh Su
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.5
    • /
    • pp.273-283
    • /
    • 2022
  • Banking and finance is a broad term that incorporates a variety of smaller, more specialized subjects such as corporate finance, tax finance, and insurance finance. A virtual assistant that assists users in searching for information about banking and finance terms might be an extremely beneficial tool for users. In this study, we explored the process of searching for information, seeking opportunities, and developing a virtual assistant in the first stages of starting learning and understanding Vietnamese to increase effectiveness and save time, which is also an innovative business practice in Use-case Vietnam. We built the FIBA2020 dataset and proposed a pipeline that used Natural Language Processing (NLP) inclusive of Natural Language Understanding (NLU) algorithms to build chatbot applications. The open-source framework RASA is used to implement the system in our study. We aim to improve our model performance by replacing parts of RASA's default tokenizers with Vietnamese tokenizers and experimenting with various language models. The best accuracy we achieved is 86.48% and 70.04% in the ideal condition and worst condition, respectively. Finally, we put our findings into practice by creating an Android virtual assistant application using the model trained using Whitespace tokenizer and the pre-trained language m-BERT.

Privacy-Preserving Cloud Data Security: Integrating the Novel Opacus Encryption and Blockchain Key Management

  • S. Poorani;R. Anitha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.3182-3203
    • /
    • 2023
  • With the growing adoption of cloud-based technologies, maintaining the privacy and security of cloud data has become a pressing issue. Privacy-preserving encryption schemes are a promising approach for achieving cloud data security, but they require careful design and implementation to be effective. The integrated approach to cloud data security that we suggest in this work uses CogniGate: the orchestrated permissions protocol, index trees, blockchain key management, and unique Opacus encryption. Opacus encryption is a novel homomorphic encryption scheme that enables computation on encrypted data, making it a powerful tool for cloud data security. CogniGate Protocol enables more flexibility and control over access to cloud data by allowing for fine-grained limitations on access depending on user parameters. Index trees provide an efficient data structure for storing and retrieving encrypted data, while blockchain key management ensures the secure and decentralized storage of encryption keys. Performance evaluation focuses on key aspects, including computation cost for the data owner, computation cost for data sharers, the average time cost of index construction, query consumption for data providers, and time cost in key generation. The results highlight that the integrated approach safeguards cloud data while preserving privacy, maintaining usability, and demonstrating high performance. In addition, we explore the role of differential privacy in our integrated approach, showing how it can be used to further enhance privacy protection without compromising performance. We also discuss the key management challenges associated with our approach and propose a novel blockchain-based key management system that leverages smart contracts and consensus mechanisms to ensure the secure and decentralized storage of encryption keys.

Adsorption process efficiency of activated carbon from date pits in removing pollutants from dye wastewater

  • A. Ahsan;I.K. Erabee;F.B. Nazrul;M. Imteaz;M.M. El-Sergany;S. Shams;Md. Shafiquzzaman
    • Membrane and Water Treatment
    • /
    • v.14 no.4
    • /
    • pp.163-173
    • /
    • 2023
  • The presence of high amounts of organic and inorganic contaminants in textile wastewater is a major environmental concern. Therefore, the treatment of textile wastewater is an urgent issue to save the aquatic environment. The disposal of large quantities of untreated textile wastewater into inland water bodies can cause serious water pollution. In this study, synthetic dye wastewater samples were prepared using orange dye in the laboratory. The synthetic samples were then treated by a batch adsorption process using the prepared activated carbon (AC) from date pits. The wastewater parameters studied were the pH, total dissolved solids (TDS), total suspended solids (TSS), electrical conductivity (EC) and salinity. The activated adsorption process showed that the maximum removal efficiencies of electric conductivity (EC), salinity, TDS and TSS were 65%, 92%, 89% and 90%, respectively. The removal efficiencies were proportional to the increase in contact time (30-120 min) and AC adsorbent dose (1, 3 and 5 g/L). The adsorption profile indicates that 5 g/L of adsorbent delivers better results for TDS, EC, TSS and salinity at contact time of 120 min. The adsorption characteristics are better suited to the pseudo-second-order kinetic model than to the pseudo-first-order kinetic model. The Langmuir and Freundlich isotherms were well suited for describing the adsorption or contact behavior of EC and TSS within the studied system.

The Effect of Managerial Information Security Intelligence on the Employee's Information Security Countermeasure Awareness (경영진의 정보보안 지능이 조직원의 보안대책 인식에 미치는 영향)

  • Jin Young Han;Hyun-Sun Ryu
    • Information Systems Review
    • /
    • v.18 no.3
    • /
    • pp.137-153
    • /
    • 2016
  • Organizations depend on smart working environments, such as mobile networks. This development motivates companies to focus on information security. Information leakage negatively affects companies. To address this issue, management and information security researchers focus on compliance of employees with information security policies. Countermeasures in information security are known antecedents of intention to comply information security policies. Despite the importance of this topic, research on the antecedents of information security countermeasures is scarce. The present study proposes information security intelligence as an antecedent of information security countermeasures. Information security intelligence adapted the concept of safety intelligence provided by Kirwan (2008). Information security intelligence consists of problem solving skills, social skills, and information security knowledge related to information security. Results show that problem solving skills and information security knowledge have positive effects on the awareness of employees of information security countermeasures.

Digital Forensic Investigation of HBase (HBase에 대한 디지털 포렌식 조사 기법 연구)

  • Park, Aran;Jeong, Doowon;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.2
    • /
    • pp.95-104
    • /
    • 2017
  • As the technology in smart device is growing and Social Network Services(SNS) are becoming more common, the data which is difficult to be processed by existing RDBMS are increasing. As a result of this, NoSQL databases are getting popular as an alternative for processing massive and unstructured data generated in real time. The demand for the technique of digital investigation of NoSQL databases is increasing as the businesses introducing NoSQL database in their system are increasing, although the technique of digital investigation of databases has been researched centered on RDMBS. New techniques of digital forensic investigation are needed as NoSQL Database has no schema to normalize and the storage method differs depending on the type of database and operation environment. Research on document-based database of NoSQL has been done but it is not applicable as itself to other types of NoSQL Database. Therefore, the way of operation and data model, grasp of operation environment, collection and analysis of artifacts and recovery technique of deleted data in HBase which is a NoSQL column-based database are presented in this paper. Also the proposed technique of digital forensic investigation to HBase is verified by an experimental scenario.

Monitoring system for packet analysis on Wi-Fi environment (Wi-Fi 환경에서 패킷 분석을 위한 모니터링 시스템)

  • Seo, Hee-Suk;Kim, Hee-Wan;Ahn, Woo-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.227-234
    • /
    • 2011
  • Many technologies for wireless internet are increasing as more and more laptop computers, net books, smart phone and other terminals, which provide wireless network, are created. IEEE 802.11 is computer wireless network technology that used in small area, called wireless LAN or Wi-Fi. IEEE 802.11 is a set of standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6 and 5 GHz frequency bands. They are created and maintained by the IEEE LAN/MAN Standards Committee (IEEE 802). AP (Access Point) is installed at cafes and public places providing wireless environment. It is more convenient to use wireless internet, however, It can be seen easily around us and possible to communicate with AP. IEEE 802.11 has many vulnerability, such as packet manipulation and information disclosure, so we should pay more attention when using IEEE 802.11. Therefore this paper developing monitoring system which can find out AP and Stations that connect with it, and capturing AP's information to find out vulnerability. This paper suggests monitoring system which traffic analysis in wireless environment.

An XML based Mobile Information Visualization System for Mobile Devices using Information layout Techniques (Rectangle Layout을 이용한 XML 기반 모바일 정보 시각화 시스템)

  • Yoo Hee-Yong;Cheon Suh-Hyun
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.9
    • /
    • pp.776-786
    • /
    • 2006
  • This paper proposes XML based mobile information visualization system using rectangle layout to show effectively XML based information to user on mobile devices which do not have a rich display feature. We define XML schema that can describes information in graph with cycle as well as information in tree form. It suggests using rectangle layout method that is an improvement of the traditional method of the radial layout because the specificity of the mobile display should be considered when XML information is rendered on the screen. And then, it applies DOI of fisheye view algorithm to information on the rectangle layout to represent all and user interest information. And it also suggests an effective method considering capability of mobile devices to decrease user's confusion and improve awareness of user when a user Interest target selected. The proposed information visualization system in the form of focus+context supports an effective interface for information retrieval via mobile devices, such as PDA, cellular phone and smart phone, that usually have less power of CPU than that of PC and the constraints of display and memory. In this paper, it performs experiments and makes an evaluation comparing information visualization method between the traditional radial layout and the proposed rectangle layout.

Three-Dimensional Positional Accuracy Analysis of UAV Imagery Using Ground Control Points Acquired from Multisource Geospatial Data (다종 공간정보로부터 취득한 지상기준점을 활용한 UAV 영상의 3차원 위치 정확도 비교 분석)

  • Park, Soyeon;Choi, Yoonjo;Bae, Junsu;Hong, Seunghwan;Sohn, Hong-Gyoo
    • Korean Journal of Remote Sensing
    • /
    • v.36 no.5_3
    • /
    • pp.1013-1025
    • /
    • 2020
  • Unmanned Aerial Vehicle (UAV) platform is being widely used in disaster monitoring and smart city, having the advantage of being able to quickly acquire images in small areas at a low cost. Ground Control Points (GCPs) for positioning UAV images are essential to acquire cm-level accuracy when producing UAV-based orthoimages and Digital Surface Model (DSM). However, the on-site acquisition of GCPs takes considerable manpower and time. This research aims to provide an efficient and accurate way to replace the on-site GNSS surveying with three different sources of geospatial data. The three geospatial data used in this study is as follows; 1) 25 cm aerial orthoimages, and Digital Elevation Model (DEM) based on 1:1000 digital topographic map, 2) point cloud data acquired by Mobile Mapping System (MMS), and 3) hybrid point cloud data created by merging MMS data with UAV data. For each dataset a three-dimensional positional accuracy analysis of UAV-based orthoimage and DSM was performed by comparing differences in three-dimensional coordinates of independent check point obtained with those of the RTK-GNSS survey. The result shows the third case, in which MMS data and UAV data combined, to be the most accurate, showing an RMSE accuracy of 8.9 cm in horizontal and 24.5 cm in vertical, respectively. In addition, it has been shown that the distribution of geospatial GCPs has more sensitive on the vertical accuracy than on horizontal accuracy.