25,642 research outputs found

    On systematic approaches for interpreted information transfer of inspection data from bridge models to structural analysis

    Get PDF
    In conjunction with the improved methods of monitoring damage and degradation processes, the interest in reliability assessment of reinforced concrete bridges is increasing in recent years. Automated imagebased inspections of the structural surface provide valuable data to extract quantitative information about deteriorations, such as crack patterns. However, the knowledge gain results from processing this information in a structural context, i.e. relating the damage artifacts to building components. This way, transformation to structural analysis is enabled. This approach sets two further requirements: availability of structural bridge information and a standardized storage for interoperability with subsequent analysis tools. Since the involved large datasets are only efficiently processed in an automated manner, the implementation of the complete workflow from damage and building data to structural analysis is targeted in this work. First, domain concepts are derived from the back-end tasks: structural analysis, damage modeling, and life-cycle assessment. The common interoperability format, the Industry Foundation Class (IFC), and processes in these domains are further assessed. The need for usercontrolled interpretation steps is identified and the developed prototype thus allows interaction at subsequent model stages. The latter has the advantage that interpretation steps can be individually separated into either a structural analysis or a damage information model or a combination of both. This approach to damage information processing from the perspective of structural analysis is then validated in different case studies

    Responding to Cross Border Child Trafficking in South Asia: An Analysis of the Feasibility of a Technologically Enabled Missing Child Alert System

    Get PDF
    This report examines the feasibility of a technologically enabled system to help respond to the phenomenon of cross-border child trafficking in South Asia, and makes recommendations on how to proceed with a pilot project in the selected areas of Bangladesh, Nepal and India. The study was commissioned by the Missing Child Alert (MCA) programme which is an initiative led by Plan. MCA is an initiative to address cross-border child trafficking in South Asia, led by Plan. The aim of the programme is to link existing institutions, mechanisms and resources in order to tackle the phenomenon from a regional perspective. To achieve this, Plan propose to implement a technologically equipped, institutionalised system of alert that can assist in the rescue, rehabilitation, repatriation and reintegration of children who are at risk of, or are victims of, cross-border trafficking

    Construction safety and digital design: a review

    Get PDF
    As digital technologies become widely used in designing buildings and infrastructure, questions arise about their impacts on construction safety. This review explores relationships between construction safety and digital design practices with the aim of fostering and directing further research. It surveys state-of-the-art research on databases, virtual reality, geographic information systems, 4D CAD, building information modeling and sensing technologies, finding various digital tools for addressing safety issues in the construction phase, but few tools to support design for construction safety. It also considers a literature on safety critical, digital and design practices that raises a general concern about ‘mindlessness’ in the use of technologies, and has implications for the emerging research agenda around construction safety and digital design. Bringing these strands of literature together suggests new kinds of interventions, such as the development of tools and processes for using digital models to promote mindfulness through multi-party collaboration on safet

    Towards a Secure Smart Grid Storage Communications Gateway

    Full text link
    This research in progress paper describes the role of cyber security measures undertaken in an ICT system for integrating electric storage technologies into the grid. To do so, it defines security requirements for a communications gateway and gives detailed information and hands-on configuration advice on node and communication line security, data storage, coping with backend M2M communications protocols and examines privacy issues. The presented research paves the road for developing secure smart energy communications devices that allow enhancing energy efficiency. The described measures are implemented in an actual gateway device within the HORIZON 2020 project STORY, which aims at developing new ways to use storage and demonstrating these on six different demonstration sites.Comment: 6 pages, 2 figure

    A Guide to Distributed Digital Preservation

    Get PDF
    This volume is devoted to the broad topic of distributed digital preservation, a still-emerging field of practice for the cultural memory arena. Replication and distribution hold out the promise of indefinite preservation of materials without degradation, but establishing effective organizational and technical processes to enable this form of digital preservation is daunting. Institutions need practical examples of how this task can be accomplished in manageable, low-cost ways."--P. [4] of cove

    Internet of robotic things : converging sensing/actuating, hypoconnectivity, artificial intelligence and IoT Platforms

    Get PDF
    The Internet of Things (IoT) concept is evolving rapidly and influencing newdevelopments in various application domains, such as the Internet of MobileThings (IoMT), Autonomous Internet of Things (A-IoT), Autonomous Systemof Things (ASoT), Internet of Autonomous Things (IoAT), Internetof Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc.that are progressing/advancing by using IoT technology. The IoT influencerepresents new development and deployment challenges in different areassuch as seamless platform integration, context based cognitive network integration,new mobile sensor/actuator network paradigms, things identification(addressing, naming in IoT) and dynamic things discoverability and manyothers. The IoRT represents new convergence challenges and their need to be addressed, in one side the programmability and the communication ofmultiple heterogeneous mobile/autonomous/robotic things for cooperating,their coordination, configuration, exchange of information, security, safetyand protection. Developments in IoT heterogeneous parallel processing/communication and dynamic systems based on parallelism and concurrencyrequire new ideas for integrating the intelligent “devices”, collaborativerobots (COBOTS), into IoT applications. Dynamic maintainability, selfhealing,self-repair of resources, changing resource state, (re-) configurationand context based IoT systems for service implementation and integrationwith IoT network service composition are of paramount importance whennew “cognitive devices” are becoming active participants in IoT applications.This chapter aims to be an overview of the IoRT concept, technologies,architectures and applications and to provide a comprehensive coverage offuture challenges, developments and applications

    Codifying Information Assurance Controls for Department of Defense (DoD) Supervisory Control and Data Acquisition (SCADA) Systems (U)

    Get PDF
    Protecting DoD critical infrastructure resources and Supervisory Control and Data Acquisition (SCADA) systems from cyber attacks is becoming an increasingly challenging task. DoD Information Assurance controls provide a sound framework to achieve an appropriate level of confidentiality, integrity, and availability. However, these controls have not been updated since 2003 and currently do not adequately address the security of DoD SCADA systems. This research sampled U.S. Air Force Civil Engineering subject matter experts representing eight Major Commands that manage and operate SCADA systems. They ranked 30 IA controls in three categories, and evaluated eight SCADA specific IA controls for inclusion into the DoD IA control framework. Spearman’s Rho ranking results (ρ = .972414) indicate a high preference for encryption, and system and information integrity as key IA Controls to mitigate cyber risk. Equally interesting was the strong agreement among raters on ranking certification and accreditation dead last as an effective IA control. The respondents strongly favored including four new IA controls of the eight considered

    A GEO-DATABASE FOR 3D-AIDED MULTI-EPOCH DOCUMENTATION OF BRIDGE INSPECTIONS

    Get PDF
    The recent collapse of bridges in Italy has prompted numerous studies on monitoring and maintenance. Many structures in Italy have been in service for over 50 years, necessitating new approaches to ensure their safety. To address this issue, Italy's Consiglio Superiore dei Lavori Pubblici (Superior Council of Public Works) has developed the Guidelines for Risk Classification and Management, proposing a multi-level approach to bridge management within a complex geomorphological environment. The guidelines outline a multi-level process that includes surveying the structures, conducting detailed inspections, and assigning risk classes based on hazard, exposure, and vulnerability. Current inspection processes are time-consuming and costly. Therefore, alternative monitoring technologies are crucial. Unmanned aerial vehicles equipped with cameras, laser technologies, and GPS systems offer flexible and cost-effective solutions for visual inspection. These technologies enable the collection of both quantitative and qualitative data, such as size, material properties, and overall condition. In this context, efficient data management and exploration systems are necessary to handle the vast amount of geo-referenced information. Multi-epoch databases play a crucial role in documenting the conditions of bridges and supporting a maintenance and structural health monitoring workflow. These databases can be utilized within a Bridge Management System to aid road managers in decision-making processes. Additionally, 3D exploration platforms provide visual analysis and highlight areas of interest within the structure. This work presents a multi-epoch geo-database that adheres to the Italian guidelines, offering optimized data management and queryability for 2D and 3D information. The entire process is designed using open-source and reproducible solutions

    Structural Performance Monitoring Using a Dynamic Data-Driven BIM Environment

    Get PDF
    Structural health monitoring data has not been fully leveraged to support asset management due to a lack of effective integration with other datasets. A Building Information Modelling (BIM) approach is presented to leverage structural monitoring data in a dynamic manner. The approach allows for the automatic generation of parametric BIM models of structural monitoring systems that include time-series sensor data; and it enables data-driven and dynamic visualisation in an interactive 3D environment. The approach supports dynamic visualisation of key structural performance parameters, allows for the seamless updating and long-term management of data, and facilitates data exchange by generating Industry Foundation Classes (IFC) compliant models. A newly-constructed bridge near Stafford, UK, with an integrated fibre-optic sensor based monitoring system was used to test the capabilities of the developed approach. The case study demonstrated how the developed approach facilitates more intuitive data interpretation, provides a user-friendly interface to communicate with various stakeholders, allows for the identification of malfunctioning sensors thus contributing to the assessment of monitoring system durability, and forms the basis for a powerful data-driven asset management tool. In addition, this project highlights the potential benefits of investing in the development of data-driven and dynamic BIM environments
    • 

    corecore