23 resultados para Damage Detection
Resumo:
This study discusses structural damage diagnosis of real steel truss bridges by measuring trafficinduced vibration of bridges and utilizing a damage indicator derived from linear system parameters of a time series model. On-site damage experiments were carried out on real steel truss bridges. Artificial damage was applied to the bridge by severing a truss member with a cutting machine.Vehicle-induced vibrations of the bridges before and after applying damagewere measured and used in structural damage diagnosis of the bridges. Changes in the damage indicator are detected by Mahalanobis-Taguchi system (MTS) which is one of multivariate outlier analyses. The damage indicator and outlier detection was successfully applied to detect anomalies in the steel truss bridges utilizing vehicle-induced vibrations. Observations through this study demonstrate feasibility of the proposed approach for real world applications.
Resumo:
The synthesis and photophysical evaluation of a new lanthanide luminescence imaging agent is presented. The agent, a terbium-based cyclen complex can, through the use of an iminodiacetate moiety, bind to damaged bone surface via chelation to exposed Ca(II) sites, enabling the imaging of the damage using confocal fluorescence scanning microscopy.
Resumo:
In this work, the use of a compliant web design for improved damage tolerance in stiffener run-outs is investigated. Firstly, a numerical study that incorporates the possibility of debonding and delamination (using VCCT) is used to select a favourable compliant run-out configuration. Then, three different configurations are compared to establish the merits of the compliant design: a baseline configuration, a configuration with optimised tapering and the selected compliant configuration. The performance of these configurations, in terms of strength and damage tolerance, was compared numerically using a parametric finite element analysis. The energy release rates for debonding and delamination, for different crack lengths across the specimen width, were used for this comparison. The three configurations were subsequently manufactured and tested. In order to monitor the failure process, acoustic emission (AE) equipment was used and proved valuable in the detection and analysis of failure. The predicted failure loads, based on the energy release rates, showed good agreement with the experiments, particularly when the distribution of energy release rate across the width of the specimen was taken into account. As predicted numerically, the compliant configuration failed by debonding and showed improved damage tolerance compared to the baseline and tapered stiffener run-outs.
Resumo:
PURPOSE: To evaluate the clinical agreement in the detection of optic disk changes in patients with glaucoma using simultaneous stereophotographs. DESIGN: Masked-observer variability study. METHODS: Ten glaucoma specialists examined pairs of simultaneous stereophotographs of glaucomatous and control optic disks to determine whether there were changes compatible with progression of glaucomatous damage. RESULTS: Intraobserver agreement had a kappa value ranging from 0.55 to 0.78. Interobserver agreement among the glaucoma specialists had a kappa value ranging from 0.34 to 0.68. CONCLUSION: Clinical examination of stereophotographs to detect optic disk changes in glaucoma patients has limitations associated with suboptimal reproducibility. © 2003 by Elsevier Inc. All rights reserved.
Resumo:
Purpose: This study was designed to evaluate the clinical agreement in the detection of optic disc changes and the ability of computerized image analysis to detect glaucomatous deterioration of the optic disc. Methods: Pairs of stereophotographs of 35 glaucomatous optic discs taken 5 years apart and of 5 glaucomatous discs photographed twice on the same day. Two glaucoma specialists examined the pairs of stereophotographs (35 cases and 5 controls) in a masked manner and judged whether the optic disc showed changes in the optic disc compatible with progression of glaucomatous damage. The stereophotographs of the five optic discs photographed twice on the same day (which by definition did not change) and of five cases judged to have deteriorated by both glaucoma specialists were analyzed by computerized image analysis with the Topcon ImageNet system. Intra- and inter-observer agreement in the detection of optic disc changes (evaluated using kappa statistic), and changes in the rim area to disc area ratio (evaluated using descriptive statistics and paired t-test). Results: Intra-observer agreement had a kappa value of 0.75 for observer 1 and 0.60 for the observer 2. Inter-observer agreement between the glaucoma specialists had a kappa value of 0.60. The image analyzer did not discriminate between controls and cases with clinically apparent glaucomatous change of the optic disc. Conclusion: Clinical agreement in detecting changes in the optic disc was moderate to substantial. Computerized image analysis with the Topcon ImageNet system appeared not to be useful in detecting glaucomatous changes of the optic disc.
Resumo:
Synchrophasor systems will play a crucial role in next generation Smart Grid monitoring, protection and control. However these systems also introduce a multitude of potential vulnerabilities from malicious and inadvertent attacks, which may render erroneous operation or severe damage. This paper proposes a Synchrophasor Specific Intrusion Detection System (SSIDS) for malicious cyber attack and unintended misuse. The SSIDS comprises a heterogeneous whitelist and behavior-based approach to detect known attack types and unknown and so-called ‘zero-day’ vulnerabilities and attacks. The paper describes reconnaissance, Man-in-the-Middle (MITM) and Denial-of-Service (DoS) attack types executed against a practical synchrophasor system which are used to validate the real-time effectiveness of the proposed SSIDS cyber detection method.
Resumo:
Radiotherapy is an important treatment option for many human cancers. Current research is investigating the use of molecular targeted drugs in order to improve responses to radiotherapy in various cancers. The cellular response to irradiation is driven by both direct DNA damage in the targeted cell and intercellular signalling leading to a broad range of bystander effects. This study aims to elucidate radiation-induced DNA damage response signalling in bystander cells and to identify potential molecular targets to modulate the radiation induced bystander response in a therapeutic setting. Stalled replication forks in T98G bystander cells were visualised via bromodeoxyuridine (BrdU) nuclear foci detection at sites of single stranded DNA. γH2AX co-localised with these BrdU foci. BRCA1 and FANCD2 foci formed in T98G bystander cells. Using ATR mutant F02-98 hTERT and ATM deficient GM05849 fibroblasts it could be shown that ATR but not ATM was required for the recruitment of FANCD2 to sites of replication associated DNA damage in bystander cells whereas BRCA1 bystander foci were ATM-dependent. Phospho-Chk1 foci formation was observed in T98G bystander cells. Clonogenic survival assays showed moderate radiosensitisation of directly irradiated cells by the Chk1 inhibitor UCN-01 but increased radioresistance of bystander cells. This study identifies BRCA1, FANCD2 and Chk1 as potential targets for the modulation of radiation response in bystander cells. It adds to our understanding of the key molecular events propagating out-of-field effects of radiation and provides a rationale for the development of novel molecular targeted drugs for radiotherapy optimisation.
Resumo:
Cyber threats in Supervisory Control and Data Acquisition (SCADA) systems have the potential to render physical damage and jeopardize power system operation, safety and stability. SCADA systems were originally designed with little consideration of escalating cyber threats and hence the problem of how to develop robust intrusion detection technologies to tailor the requirements of SCADA is an emerging topic and a big challenge. This paper proposes a stateful Intrusion Detection System (IDS) using a Deep Packet Inspection (DPI) method to improve the cyber-security of SCADA systems using the IEC 60870-5-104 protocol which is tailored for basic telecontrol communications. The proposed stateful protocol analysis approach is presented that is designed specifically for the IEC 60870-5-104 protocol. Finally, the novel intrusion detection approach are implemented and validated.