• Title/Summary/Keyword: Weighted damage

Search Result 93, Processing Time 0.024 seconds

IDENTIFICATION OF EROSION PRONE FOREST AREA - A REMOTE SENSING AND GIS APPROACH

  • Jayakumar, S.;Lee, Jung-Bin;Enkhbaatar, Lkhagva;Heo, Joon
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2008.10a
    • /
    • pp.251-253
    • /
    • 2008
  • Erosion and landslide cause serious damage to forest areas. As a consequence, partial or complete destruction of vegetation occurs, which leads to many cascading problems. In this study, an attempt has been made to identify the forest areas, which are under different risk categories of erosion and landslide, in part of Eastern Ghats of Tamil Nadu. Relevantthematic maps were generated from satellite data, topographical maps, primary and secondary data and weights to each map were assigned appropriately. Weighted overlay analysis was carried out to identify the erosionprone forest areas. The result of erosion and landslide prone model reveals that 4712 ha(17%) of forest area is under high risk category and 15879 ha(58.65%) isunder medium risk category. The results of spatial modeling would be very much useful to the forest officials and conservationist to plan for effective conservation.

  • PDF

Exerted force minimization for weak points in cooperating multiple robot arms

  • Shin, Young-Dal;Chung, Myung-Jin
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1990.10b
    • /
    • pp.1167-1172
    • /
    • 1990
  • This paper discusses a force distribution scheme which minimizes the weighted norm of the forces/torques applied on weak points of cooperating multiple robot arms. The scheme is proposed to avoid the damage or unwanted motion of any weak point of robots or object stemming from excessive forces/torques. Since the proposed scheme can be used for either the joint torque minimization or the exerted force minimization on the object, it can be regarded as a unified force minimization method for multiple robot arms. The computational complexity in this scheme is analyzed using the properties of Jarcobian. Simulation of two identical PUMA robots held an object is carried out to illustrate the proposed scheme. By the proper choice of the weighting matrix in the performance index, we show that force minimization for a weak point can be achieved, and that the exerted force minimization on the object can be changed to the joint torque minimization.

  • PDF

Hierarchical Age Estimation based on Dynamic Grouping and OHRank

  • Zhang, Li;Wang, Xianmei;Liang, Yuyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.7
    • /
    • pp.2480-2495
    • /
    • 2014
  • This paper describes a hierarchical method for image-based age estimation that combines age group classification and age value estimation. The proposed method uses a coarse-to-fine strategy with different appearance features to describe facial shape and texture. Considering the damage to continuity between neighboring groups caused by fixed divisions during age group classification, a dynamic grouping technique is employed to allow non-fixed groups. Based on the given group, an ordinal hyperplane ranking (OHRank) model is employed to transform age estimation into a series of binary enquiry problems that can take advantage of the intrinsic correlation and ordinal information of age. A set of experiments on FG-NET are presented and the results demonstrate the validity of our solution.

Impact of Climate Change on Business Process in the Distribution Industry

  • Kim, Young-Ei
    • Journal of Distribution Science
    • /
    • v.12 no.12
    • /
    • pp.5-17
    • /
    • 2014
  • Purpose - The purpose of this study is to examine the possible ways to minimize damage by analyzing the influence that may be exerted upon the business process of the distribution industry by unexpected climate change. Research design, data, and methodology - The optimum business process is to be implemented after dividing the diversified business process of the distribution industry into the four stages of the Business Continuity Plan (BCP). Results - First, the upper-level risks that would be impacted most sensitively by climate change have been selected. Second, the impact and characteristics of the environment have been discovered. Third, weighted values by criteria item of upper-level business risks have been analyzed. Fourth, it was possible to define the business priority order based on the individual and then to adjust the Recovery Time Objective (RTO). Conclusion - In this study, the priority order has been defined quantitatively by calculating the priority order score. Further, the priority order has been determined depending on whether any targeted business unit is applicable to the items of the business nature criteria.

Development of the Smart Concrete Using the Voltage Control Type Sensor (전압제어형 센서를 이용한 스마트 콘크리트의 개발)

  • Kim Ie Sung;Lee Soo-Gon;Kim Wha-Jung
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2005.05b
    • /
    • pp.169-172
    • /
    • 2005
  • Today, peoples have much interest about safety while an abnormal weather phenomenon is weighted increased. R.C buildings are consisting of main loaded members. Concrete are brittle materials and they are which come to brittle fracture rapidly by progress of cracks. With the exchange of such research in inside and outside of the country, the structure measurement method of having used PZT and the optical fiber (FBG) will be the actual condition which has accomplished the stock. Specially, seismic activity that gives damage to construction and members happens in on time. Therefore, the purpose of this study is the fundamental research which detects damagesof main members using the compound sensor which consisted of the radio sensors of resistance, PZT, and FM system.

  • PDF

Analysis of the Inner Degradation Pattern by Clustering Algorism at Distribution Line (군집화 알고리즘을 이용한 배전선로 내부 열화 패턴 분석)

  • Choi, Woon-Shik;Kim, Jin-Sa
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.29 no.1
    • /
    • pp.58-61
    • /
    • 2016
  • Degradation in power cables used in distribution lines to the material of the wire, manufacturing method, but also the line of the environment, generates a variety of degradation depending upon the type of load. The local wire deterioration weighted wire breakage accident can occur frequently, causing significant proprietary damage can lead to accidents and precious. In this study, the signal detected by the eddy current aim to develop algorithms capable of determining the signals for the top part and at least part of the signal by using a signal processing technique called K-means algorithm.

A Case Study of Oriental Medicine Treatment on Peripheral Facial Palsy (말초성 안면마비 환자의 한방치료 치험례)

  • Jung, You-jin;Choi, A-ryun;Han, Dong-kun;Kang, A-hyun;Seo, Hye-jin;Sung, Jae-yeon;Song, Woo-sub;Lee, Hyung-chul;Eom, Gook-hyun;Kim, Soo-yeon
    • The Journal of Internal Korean Medicine
    • /
    • v.38 no.5
    • /
    • pp.769-777
    • /
    • 2017
  • Objective: Facial nerve palsy is caused by damage to the 7th cranial nerve. It is the main symptom of facial muscle paralysis on the affected side. Usually, recovery from this disease begins 2-3 weeks after onset and most patients recover in 4-8 weeks. If the patients cannot receive proper treatment, severe permanent impairments, both physical and mental, may remain, so this disease should be treated appropriately. In this study, a patient with facial nerve palsy was admitted to the Korean medicine hospital for treatment. We report on the patient's progress and the effects of treatment. Methods: We cured the patient with herbal medicines, acupuncture, herbal acupuncture therapy, and physical therapy. We used a numerical rating scale, the House Brackmann grading system, and a weighted regional grading system to assess symptom changes. Result: The patient with facial nerve palsy was hospitalized for 23 days and recovered from symptoms without significant problems on the face or in motor function.

Analysis of Landslide and Debris flow Hazard Area using Probabilistic Method in GIS-based (GIS 기반 확률론적 기법을 이용한 산사태 및 토석류 위험지역 분석)

  • Oh, Chae-Yeon;Jun, Kye-Won
    • Journal of the Korean Society of Safety
    • /
    • v.27 no.6
    • /
    • pp.172-177
    • /
    • 2012
  • In areas around Deoksan Li and Deokjeon Li, Inje Eup, Inje Gun, located between $38^{\circ}2^{\prime}55^{{\prime}{\prime}}N$ and $38^{\circ}5^{\prime}50^{{\prime}{\prime}}N$ in latitude and $128^{\circ}11^{\prime}20^{{\prime}{\prime}}E$ and $128^{\circ}18^{\prime}20^{{\prime}{\prime}}E$ in longitude, large-sized avalanche disasters occurred due to Typhoon Ewiniar in 2006. As a result, 29 people were dead or missing, along with a total of 37.25 billion won of financial loss(Gangwon Province, 2006). To evaluate such landslide and debris flow risk areas and their vulnerability, this study applied a technique called 'Weight of Evidence' based on GIS. Especially based on the overlay analysis of aerial images before the occurrence of landslides and debris flows in 2005 and after 2006, this study extracted 475 damage-occurrence areas in a shape of point, and established a DB by using such factors as topography, hydrologic, soil and forest physiognomy through GIS. For the prediction diagram of debris flow and landslide risk areas, this study calculated W+ and W-, the weighted values of each factor of Weight Evidence, while overlaying the weighted values of factors. Besides, the diagram showed about 76% in prediction accuracy, and it was also found to have a relatively high correlationship with the areas where such natural disasters actually occurred.

Usefulness of subtraction pelvic magnetic resonance imaging for detection of ovarian endometriosis

  • Lee, Hyun Jung
    • Journal of Yeungnam Medical Science
    • /
    • v.37 no.2
    • /
    • pp.90-97
    • /
    • 2020
  • Background: To minimize damage to the ovarian reserve, it is necessary to evaluate the follicular density in the ovarian tissue surrounding endometriosis on preoperative imaging. The purpose of the present study was to evaluate the usefulness of subtraction pelvic magnetic resonance imaging (MRI) to detect ovarian reserve. Methods: A subtracted T1-weighted image (subT1WI) was obtained by subtracting unenhanced T1WI from contrast-enhanced T1WI (ceT1WI) with similar parameters in 22 patients with ovarian endometriosis. The signal-to-noise ratio (SNR) in ovarian endometriosis, which was classified into the high signal intensity and iso-to-low signal intensity groups on the T2-weighted image, was compared to that in normal ovarian tissue. To evaluate the effect of contrast enhancement, a standardization map was obtained by dividing subT1WI by ceT1WI. Results: On visual assessment of 22 patients with ovarian endometriosis, 16 patients showed a high signal intensity, and 6 patients showed an iso-to-low signal intensity on T1WI. Although SNR in endometriosis with a high signal intensity was higher than that with an iso-to-low signal intensity, there was no difference in SNR after the subtraction (13.72±77.55 vs. 63.03±43.90, p=0.126). The area of the affected ovary was smaller than that of the normal ovary (121.10±22.48 vs. 380.51±75.87 ㎟, p=0.002), but the mean number of pixels in the viable remaining tissue of the affected ovary was similar to that of the normal ovary (0.53±0.09 vs. 0.47±0.09, p=0.682). Conclusion: The subtraction technique used with pelvic MRI could reveal the extent of endometrial invasion of the normal ovarian tissue and viable remnant ovarian tissue.

Machine Learning-Based Malicious URL Detection Technique (머신러닝 기반 악성 URL 탐지 기법)

  • Han, Chae-rim;Yun, Su-hyun;Han, Myeong-jin;Lee, Il-Gu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.555-564
    • /
    • 2022
  • Recently, cyberattacks are using hacking techniques utilizing intelligent and advanced malicious codes for non-face-to-face environments such as telecommuting, telemedicine, and automatic industrial facilities, and the damage is increasing. Traditional information protection systems, such as anti-virus, are a method of detecting known malicious URLs based on signature patterns, so unknown malicious URLs cannot be detected. In addition, the conventional static analysis-based malicious URL detection method is vulnerable to dynamic loading and cryptographic attacks. This study proposes a technique for efficiently detecting malicious URLs by dynamically learning malicious URL data. In the proposed detection technique, malicious codes are classified using machine learning-based feature selection algorithms, and the accuracy is improved by removing obfuscation elements after preprocessing using Weighted Euclidean Distance(WED). According to the experimental results, the proposed machine learning-based malicious URL detection technique shows an accuracy of 89.17%, which is improved by 2.82% compared to the conventional method.