• Title/Summary/Keyword: bridge vulnerability

Search Result 67, Processing Time 0.025 seconds

Seismic Protection for Multiple Span Continuous Steel Bridges using Shape Memory Alloy-Restrainer-Dampers (형상기억합금을 이용한 다경간 연속 강교량의 지진보호)

  • Park, Eunsoo;Kim, Haksoo
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.8 no.1
    • /
    • pp.77-86
    • /
    • 2004
  • This paper introduces a shape memory alloy-restrainer-damper(SMA-RD) to protect multiple span continuous steel bridges from seismic loads. The type of bridges has only one fixed bearing condition on a pier and expansion bearings are located on the other piers and abutments. Due to this state and a big mass of the deck, these bridges are usually very vulnerable to column's damage on which fixed bearings are located and large deformation of abutments in passive action. Two types of SMA-RDs are developed, and their effect is inspected for protecting the bridges through seismic analyses. Conventional steel restrainer cables are also used to reduce the seismic vulnerability of the bridge and the results are compared to those of the SMA-RDs.

Towards high-accuracy data modelling, uncertainty quantification and correlation analysis for SHM measurements during typhoon events using an improved most likely heteroscedastic Gaussian process

  • Qi-Ang Wang;Hao-Bo Wang;Zhan-Guo Ma;Yi-Qing Ni;Zhi-Jun Liu;Jian Jiang;Rui Sun;Hao-Wei Zhu
    • Smart Structures and Systems
    • /
    • v.32 no.4
    • /
    • pp.267-279
    • /
    • 2023
  • Data modelling and interpretation for structural health monitoring (SHM) field data are critical for evaluating structural performance and quantifying the vulnerability of infrastructure systems. In order to improve the data modelling accuracy, and extend the application range from data regression analysis to out-of-sample forecasting analysis, an improved most likely heteroscedastic Gaussian process (iMLHGP) methodology is proposed in this study by the incorporation of the outof-sample forecasting algorithm. The proposed iMLHGP method overcomes this limitation of constant variance of Gaussian process (GP), and can be used for estimating non-stationary typhoon-induced response statistics with high volatility. The first attempt at performing data regression and forecasting analysis on structural responses using the proposed iMLHGP method has been presented by applying it to real-world filed SHM data from an instrumented cable-stay bridge during typhoon events. Uncertainty quantification and correlation analysis were also carried out to investigate the influence of typhoons on bridge strain data. Results show that the iMLHGP method has high accuracy in both regression and out-of-sample forecasting. The iMLHGP framework takes both data heteroscedasticity and accurate analytical processing of noise variance (replace with a point estimation on the most likely value) into account to avoid the intensive computational effort. According to uncertainty quantification and correlation analysis results, the uncertainties of strain measurements are affected by both traffic and wind speed. The overall change of bridge strain is affected by temperature, and the local fluctuation is greatly affected by wind speed in typhoon conditions.

Development of Cyber Security Assessment Methodology for the Instrumentation & Control Systems in Nuclear Power Plants (원전 계측제어시스템에 대한 사이버보안성 평가 방법론 개발)

  • Kang, Young-Doo;Chong, Kil-To
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.9
    • /
    • pp.3451-3457
    • /
    • 2010
  • Cyber security assessment is the process of determining how effectively an entity being assessed meets specific cyber security objectives. Cyber security assessment helps to measure the degree of confidence one has and to identify that the managerial, technical and operational measures work as intended to protect the I&C systems and the information it processes. Recently, needs for cyber security on digitalized nuclear I&C systems are increased. However the overall cyber security program, including cyber security assessment, is not established on those systems. This paper presents the methodology of cyber security assessment which is appropriate for nuclear I&C systems. This methodology provides the qualitative assessments that may formulate recommendations to bridge the security risk gap through the incorporated criteria. This methodology may be useful to the nuclear organizations for assessing the weakness and strength of cyber security on nuclear I&C systems. It may be useful as an index to the developers, auditors, and regulators for reviewing the managerial, operational and technical cyber security controls, also.

Deformation Characteristics of Construction Joint of Paved Track on Earthwork Section using the Accelerated Track Test (궤도가속실험을 통한 포장궤도 토공구간 시공이음매부의 변형특성 연구)

  • Lee, Il-Wha;Jang, Seung-Yup;Kang, Yoon-Suk;Um, Ju-Hwan;Kim, Eun
    • Journal of the Korean Society for Railway
    • /
    • v.13 no.5
    • /
    • pp.521-527
    • /
    • 2010
  • The Paved Track is applied to reduce maintenance cost of conventional line. The Paved Track could be used in all types of lines including earthwork, bridge, tunnel and turnout sections. In case of earthwork section, the construction joint is the most critical factor to track durability. The construction joint does not affect to the track structure directly, but the gap due to discontinuity of slabs may affect to the long-term serviceability. To evaluate this problem, the accelerated track test has been performed on the construction joint and the middle part to of the real scale Paved Track. The purpose of this test is that evaluate the vulnerability of construction joint section comparing the trends of settlement and earth pressure under repeated loads of construction joint with those of the middle slab part.

A Wireless Sensor Network Architecture and Security Protocol for Monitoring the State of Bridge (교량감시를 위한 무선 센서 네트워크 구조 및 보안 프로토콜)

  • Lim Hwa-Jung;Jeon Jin-Soon;Lee Heon-Guil
    • Journal of the Korea Computer Industry Society
    • /
    • v.6 no.3
    • /
    • pp.465-476
    • /
    • 2005
  • The wireless sensor network consists of a number of sensor nodes which have physical constraints. Each sensor node senses surrounding environments and sends the sensed information to Sink. In order to alleviate the inherent vulnerability in security of the wireless sensor nodes with the hardware constraints, the lightweight security protocol is needed and a variety of research is ongoing. In this paper, we propose a non-hierarchical sensor network and a security protocol that is suitable for monitoring man-made objects such as bridges. This paper, furthermore, explores a two-layer authentication, key distribution scheme which distributes the key and location of a sensor node in advance, and an effective security routing protocol which can take advantage of the Sleep and Awake state. This also results in the increased data transfer rate by increasing the number of alternative routing paths and the reduced energy consumption rate.

  • PDF

Detection of Levee Displacement and Estimation of Vulnerability of Levee Using Remote Sening (원격탐사를 이용한 하천 제방 변위량 측정과 취약지점 선별)

  • Bang, Young Jun;Jung, Hyo Jun;Lee, Seung Oh
    • Journal of Korean Society of Disaster and Security
    • /
    • v.14 no.1
    • /
    • pp.41-50
    • /
    • 2021
  • As a method of predicting the displacement of river levee in advance, Differential Interferometry (D-InSAR) kind of InSAR techniques was used to identify weak points in the area of the levee collapes near Gumgok Bridge (Somjin River) in Namwon City, which occurred in the summer of 2020. As a result of analyzing the displacement using five images each in the spring and summer of 2020, the Variation Index (V) of area where the collapse occurred was larger than that of the other areas, so the prognostic sysmptoms was detected. If the levee monitoring system is realized by analyzing the correlations with displacement results and hydrometeorological factors, it will overcome the existing limitations of system and advance ultra-precise, automated river levee maintenance technology and improve national disaster management.

Design and Implementation of Interface System for Swarm USVs Simulation Based on Hybrid Mission Planning (하이브리드형 임무계획을 고려한 군집 무인수상정 시뮬레이션 시스템의 연동 인터페이스 설계 및 구현)

  • Park, Hee-Mun;Joo, Hak-Jong;Seo, Kyung-Min;Choi, Young Kyu
    • Journal of the Korea Society for Simulation
    • /
    • v.31 no.3
    • /
    • pp.1-10
    • /
    • 2022
  • Defense fields widely operate unmanned systems to lower vulnerability and enhance combat effectiveness. In the navy, swarm unmanned surface vehicles(USVs) form a cluster within communication range, share situational awareness information among the USVs, and cooperate with them to conduct military missions. This paper proposes an interface system, i.e., Interface Adapter System(IAS), to achieve inter-USV and intra-USV interoperability. We focus on the mission planning subsystem(MPS) for interoperability, which is the core subsystem of the USV to decide courses of action such as automatic path generation and weapon assignments. The central role of the proposed system is to exchange interface data between MPSs and other subsystems in real-time. To this end, we analyzed the operational requirements of the MPS and identified interface messages. Then we developed the IAS using the distributed real-time middleware. As experiments, we conducted several integration tests at swarm USVs simulation environment and measured delay time and loss ratio of interface messages. We expect that the proposed IAS successfully provides bridge roles between the mission planning system and other subsystems.