首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
Currently, backhoe excavator operators have to depend on color-coded markings applied by utility locators to expect the location of utilities buried in the ground. As accidents prove time and time again, this method is unreliable. While more efforts should be spent on subsurface engineering and as-built documentation, excavators should have their own tools to “see” cables, wires, and pipes while working underground. This paper presents the result of work aimed at supplying backhoe operators with a device capable of scanning the ground for metallic objects. The “fishfinder” type tool is thought to be the last “barricade” against horrific accidents caused by the damage of buried utilities. The writers not only present the results of extensive tests in the laboratory and the field but also highlight that the outdated contractual principles used by the government, utility companies, and insurers establishes insurmountable barriers for transferring this novel technology into the industry. The relevance of the presented work is in the experimental data that has been collected and analyzed both in the laboratory and in the field.  相似文献   

2.
3.
This paper provides construction industry owners and contractors with information about enhancing their operations using radio frequency identification (RFID) technology. Radio frequency identification involves the use of tags, or transponders, that collect data and manage it in a portable, changeable database; communicate routing instructions and other control requirements to equipment; and can withstand harsh environments. A construction industry-RFID supplier workshop was held to disseminate information about this technology and to generate suitable application ideas for the industry. With the information gathered during the workshop, one application idea was selected and pilot tests conducted to learn more about RFID and its applicability to the material procurement process on a construction site. The pilot tests showed that RFID tags reduced the time required to download data into a company’s material tracking system and could “flag” an item so an entry was not repeated. When scanning the tags, sun glare was not a problem as compared to using bar code labels. Although further analysis is necessary, RFID did show promise of being a beneficial technology as it relates to the materials receiving process. A flowchart is provided to assist contractors and owners in selecting the appropriate RFID system.  相似文献   

4.
预制装配综合管廊结构中,节点是结构的薄弱环节,其力学性能直接影响整体结构的变形和承载力等。本文提出了一种“U型套箍插筋连接”新型装配式双舱综合管廊结构,通过4个节点足尺试件力学性能试验,包括1个底部L型现浇边节点试件,1个底部L型装配边节点试件,1个顶部L型装配节点试件和1个底部T型装配节点试件,以此来验证“U型套箍插筋”连接技术的有效性。试验得到了节点足尺试件的开裂荷载、裂缝发展规律、承载能力、破坏方式、构件延性等力学性能。试验结果表明:新型装配式管廊节点试件都在靠近角点区域发生弯剪破坏,具有较高的承载力和延性;采用“U型套箍插筋”连接性能可靠,能够获得与现浇节点试件相当的力学性能。   相似文献   

5.
The need for better protecting our vital infrastructure from being damaged or destroyed has received increased attention since the terrorist attacks on September 11, 2001. The tragedy of having thousands of innocent people die before the eyes of an entire nation awakened people to the reality of “managed” attacks of unthinkable magnitudes. However, tragedies of a smaller scale are a daily occurrence but accepted as “collateral damage” of work in an unsafe environment. This paper presents a cost-benefit analysis to address the question of how much money should be spent in protecting underground utilities from damage. During the study of an actual incident it was found that the total costs of such accidents are vastly underreported because only costs for emergency responses and repair are tallied up. This paper makes the case that a comprehensive approach for assessing the total economic impact of such incidents on the public, business, and government is the critical stepping stone to a mathematical optimization of expenditure for damage prevention. In addition, the reader will quickly realize that the use of the presented optimization model provides theoretical underpinning for the engineering profession in its effort to better protect our critical infrastructure from terrorist attacks.  相似文献   

6.
The proper functioning of the subsurface infrastructure is vital for the public, industry, and government. As is demonstrated almost daily, small disruptions or malfunctions of public utilities, such as power, gas, or phone, can result in catastrophic events on local, regional, or national levels. This paper addresses a known weak point in protecting buried utilities from damage, the lack of accurate as- builts. It is suggested to take advantage of enabling technologies to automatically create as-built drawings relying on electronic sensory data collected real-time from operating machinery. A significant portion of the paper discusses the development of a spatially integrated trencher, a prototype that was subsequently used to execute field experiments. The encouraging outcome of those tests, which are supported with actual data, demonstrated the soundness of the concept and the level of accuracy that can be expected. The relevance to the industry lies in that it addresses a real and complex problem, proposing and demonstrating a workable technology to close a large gap in the way we track our subsurface infrastructure. It is hoped that researchers will be encouraged to extend the concept to other relevant applications while applying a similar rigorous method of experimental field testing.  相似文献   

7.
Transportation infrastructure asset management efforts have historically focused on collecting data on assets with high capital costs, such as bridges and pavements. Road signs and pavement markings, on the other hand, are high quantity, low capital cost assets but are also critical elements of the transportation infrastructure. These high quantity assets serve a critical function, safety, and thus they are receiving attention. Mandated by law, the Federal Highway Administration has been working to establish minimum retroreflectivity standards for signs and pavement markings. This paper seeks to address the information technology (IT) problems that emerge when developing an overall asset management system for high-quantity, low-cost assets. These IT problems include asset identification, asset location, data availability, data fragmentation, and automated data collection. A discussion of the issues related to these problems is presented to promote awareness of the myriad problems that do exist and to facilitate the development of more comprehensive systems to manage the automation of infrastructure asset management systems.  相似文献   

8.
Automated tracking of materials on construction projects has the potential to both improve project performance and enable effortless derivation of project performance indicators. This paper presents an approach by which materials tagged with radio frequency identification (RFID) tags can be automatically identified and tracked on construction sites, without adding to regular site operations. Essentially, this approach leverages automatic reading of tagged materials by field supervisors or materials handling equipment that are equipped with a RFID reader and a global positioning system receiver. To assess the technical feasibility of this approach, a mathematical model has been formulated such that the job site is represented as a grid and the location of materials within the grid is determined by combining proximity reads from a discrete range. Field experiments were conducted using an off-the-shelf RFID technology, and several metrics were developed to quantify the field performance and compare it with the theoretical positional accuracy derived from the discrete formulation.  相似文献   

9.
This paper presents a Web-based system for supporting the selection of the most suitable routes for buried urban utilities. The aim of the proposed system is to support (not make) decisions through a collaborative semiautomated environment, in which stakeholders can share information and/or study the impacts of different routing alternatives with respect to decision constraints. First, the knowledge relating to route selection for urban utilities is represented through an ontology. The ontology defines the types and attributes of infrastructure products and the surrounding areas. It also defines the impacts of routing options on surrounding areas through a set of decision criteria adopted to evaluate the effectiveness of any route in terms of its potential impacts. A set of constraints are also defined to help represent/study the decision criteria. Second, a GIS-based system has been created to help visualize route data, interact with users, and support the needed discussions among stakeholders. The portal also achieves data interoperability through wrapping existing geospatial data with ontology structures. Finally, a set of reasoners have been created to help quantify/augment some of the constraints. The system is capable of (1)?extracting the attributes of each routing option, (2)?testing the interaction/conflicts between route attributes and the constraints of the surrounding area, (3)?studying the impacts of a route as stipulated in the ontology, (4)?referring users to existing best practices to help enhance routes or address conflicts and, when needed, (5)?develop objective measures for comparing different routes. On the microlevel (street level), route options are evaluated through a “constraint-satisfaction” approach. On the macrolevel (city level), route options are evaluated through a fuzzy inference scoring system. The proposed system focuses on facility life cycle, sustainability, and community impacts. Construction costing, scheduling, labor, and equipment along with other management issues can either be added to the system or, better, analyzed through integrating the system with four-dimensional (4D) modeling tools.  相似文献   

10.
以洛钼九扬地下矿为例,按照地下矿井下无线通信和人员设备实时定位的要求,利用WiFi无线通信技术和RFID无线定位技术,设计了集地下矿井下人员设备定位、监测及语音通讯调度于一体的井下监控调度系统.该系统的实施,不仅可满足矿区移动办公的需要,而且还实现了VOIP语音功能,为井下生产的安全监管和通信调度提供了有力保障.洛钼集...  相似文献   

11.
The private sector has long been involved in delivering public sector projects, whether its role has been as a partner or just as a contractor for the government. Over recent years the interest in adopting public private partnerships (PPPs) has increased internationally. Many research studies have presented positive reasons for the governments and the private sector to welcome this form of procurement, rather than continue adopting the traditional options. This paper aims to explore and compare the key drivers for adopting PPP in China and the Hong Kong Special Administrative Region (referred to as Hong Kong from here onwards). An empirical questionnaire survey was conducted in both of these administrative systems and survey respondents were invited to rate their perceptions on the importance of 15 different drivers identified. Eighty-seven completed survey questionnaires were returned for analysis. The findings indicated that respondents from China rated economy-related drivers higher, whereas Hong Kong respondents tended to rate efficiency-related drivers higher. China’s demand for more public infrastructure and services has imposed great pressure on the government’s budget, and therefore economic drivers were rated higher. On the other hand, with adequate financial reserve in hand and budget surplus over recent years, Hong Kong has tended to prefer paying for projects upfront, and hence efficiency was regarded more significantly. Among the 15 drivers, both of the respondents from China and Hong Kong selected, “provide an integrated solution (for public infrastructure/services)” and “solve the problem of public sector budget restraint” to be within the top three drivers. Despite the general agreement on the ranking pattern, the results of independent two-sample t-test showed that China and Hong Kong shared very different views on the driver “reduce the total project cost.” This driver was ranked rather high by the mainland Chinese respondents, but much lower by the Hong Kong respondents. This finding can be construed that economic drivers are in general rated higher in China as compared to that in Hong Kong.  相似文献   

12.
After a natural disaster strikes buildings, it is vital to immediately retrieve the related local information for efficient search and rescue (S&R) operations. Although it seems convenient to store the required local information (e.g., information about neighborhood, buildings) in a centralized database, S&R teams usually cannot access centralized databases because the information infrastructure is usually damaged or overloaded immediately after a disaster. This paper describes the search and rescue data access point (SR-DAP) system that was designed for storing and retrieving the required local information in/from data storage units that are deployed at buildings. In the paper, the developed approach is presented, and two key technologies (i.e., radio-frequency identification (RFID) tags and wireless sensor nodes) that are used as local storage mediums in SR-DAP are empirically evaluated. The results of the field experiments show that current technologies can be effectively utilized in the developed system. However, comparison of the technologies highlights the fact that the current wireless sensor technology is advantageous over RFID technology.  相似文献   

13.
Objective: Research has examined various aspects of the validity of the research criteria for binge eating disorder (BED) but has yet to evaluate the utility of Criterion C, “marked distress about binge eating.” This study examined the significance of the marked distress criterion for BED using 2 complementary comparison groups. Method: A total of 1,075 community volunteers completed a battery of self-report instruments as part of an Internet study. Analyses compared body mass index (BMI), eating-disorder psychopathology, and depressive levels in 4 groups: 97 participants with BED except for the distress criterion (BED–ND), 221 participants with BED including the distress criterion (BED), 79 participants with bulimia nervosa (BN), and 489 obese participants without binge eating or purging (NBPO). Parallel analyses compared these study groups using the broadened frequency criterion (i.e., once weekly for binge/purge behaviors) proposed for the 5th edition of the Diagnostic and Statistical Manual of Mental Disorders (DSM–5) and the 4th edition (DSM–IV) twice-weekly frequency criterion. Results: The BED group had significantly greater eating-disorder psychopathology and depressive levels than the BED–ND group. The BED group, but not the BED–ND group, had significantly greater eating-disorder psychopathology than the NBPO comparison group. The BN group had significantly greater eating-disorder psychopathology and depressive levels than all 3 other groups. The group differences in eating-disorder psychopathology existed even after controlling for depression levels, BMI, and demographic variables, although some differences between the BN and BED groups were attenuated when controlling for depression levels. Conclusions: These findings provide support for the validity of the “marked distress” criterion for the diagnosis of BED. (PsycINFO Database Record (c) 2011 APA, all rights reserved)  相似文献   

14.
Comments on the original article, "Assessing yourself as an emotional eater: Mission impossible?" by C. Evers, D. T. D. de Ridder, and M. A. Adriaanse (see record 2009-20990-009). Results of a functional MRI study (Bohon, Stice, & Spoor, 2009) contradict the assertion that it is "impossible" to self-assess emotional eating because the self-report emotional eating scale of the Dutch Eating Behavior Questionnaire (DEBQ-em) predicted important individual differences in reward response during negative moods. Evers et al advance their argument in the context of results of four experiments where self-reported “emotional eaters” (DEBQ-em) did not eat more food during emotional encounters as compared to control conditions or “no emotional eaters.” However, the core characteristic of emotional eaters is not that they eat so much during distress (though binge eaters may do), but that they do not show the typical stress response of eating less (the typical stress response being loss of appetite because of physiological effects that mimic satiety) (Gold & Chrousos, 2002). Accordingly, the moderator effect of emotional eating during distress would be that. “No emotional eaters” eat less and “emotional eaters” eat the same or more compared to control conditions. Close inspection of the results of Evers et al reveals that their “no emotional eaters” did not show the typical stress response of eating less. This opens the possibility that the null findings of Evers et al may be simply explained by misclassification of “no emotional eaters” versus “emotional eaters” because of their use of median splits (a procedure notorious for possible misclassification of subjects into distinct groups). (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   

15.
Limitations in data transfer between maintenance workers and a central facility management (FM) system result in lower data quality, longer service process times, and ineffective capturing of component maintenance history. Radio frequency identification (RFID) technology provides an opportunity to meet the current needs for uniquely identifying facility components, storing some maintenance history information on the component, and accessing this information on-demand within a facility. There have not been any research studies that tested the performance of active ultrahigh frequency RFID technology on facility components during operations and maintenance phase repetitively over an extended period of time. The objectives of this study were to identify how RFID technology can improve current FM processes and to determine technological feasibility of using RFID within a facility repetitively on a daily basis. The writers tagged fire valves in a facility with RFID tags and conducted a longevity test for sixty consecutive days by simulating tag identification, data access, and entry in real-life conditions. The results demonstrate that current commercially available active RFID technology performs well in a building environment where metallic objects and different obstructions are present. The observed reading distances were approximately half of the reading range expected in open air provided that there are not any massive obstructions between the reader and the tag.  相似文献   

16.
Horizontal directional drilling is rapidly becoming the method of choice for installing new underground systems including water, sewer, electrical, telephone, fiber-optic cables, and gas lines. Due to its minimal impact to surface activities and competitive cost, this technique is being utilized worldwide. Unfortunately, poor drilling practices by some contractors have caused utility strikes that have resulted in major legal ramifications and subsequent negative image of the technique. Just one incident alone can result in significant monetary judgments due not only to the reparation for repairing the damaged utility, but also for damages due to “loss of use.” This paper presents theories of legal liability and recoverable damages applied to incidents of damages to underground facilities by the contractor. Recommendations for preventing the repetition of these types of incidents through the discussion of prior identification of potential hazards and proper drilling practices are discussed.  相似文献   

17.
One of the greatest challenges facing municipal engineers is the condition rating of buried infrastructure assets, particularly water mains. This is because water mains are typically underground, operated under pressure, and usually inaccessible. Condition rating is a mandatory process to establish and employ management strategies for any asset. To assess the condition of water mains, current research considers physical, environmental, and operational factors and their effect on different types of mains (i.e., cast iron, ductile iron, and asbestos). A condition rating model is developed to assess and set up rehabilitation priority for water mains using the artificial neural network (ANN) approach. Data are collected from different municipalities to train the developed model. The ANN input factors incorporate pipe type, size, age, breakage rate, Hazen-Williams factor, excavation depth, soil type, and top road surface; however, the output is pipe condition. The trained ANN shows robust performance (learning rate = 0.005, R2 = 0.931, correlation coefficient r = 0.9653). Results show that the breakage rate has the highest relative contribution factor among the others. The developed model is relevant to researchers and practitioners (municipal engineers, consultants, and contractors) in order to prioritize pipe inspection and rehabilitation planning for existing water mains.  相似文献   

18.
In order to build a 3D model environment of a pneumatic caisson for excavator operators and managers, a modeling and measuring 3D surface system of unmanned pneumatic caisson was presented in this paper. The whole system is based on two 3D laser scanners for the pneumatic caisson by acquiring the surface data of pneumatic caisson and successive data processing for surface reconstruction and measurement. Registration and reconstruction are also discussed in this paper. In order to convert two point sets into one common coordinate, Hough transforms were used to extract planes and then by using their parameters to register the two point sets. As for surface reconstruction using triangular meshing, a new method based on curves was presented. When combined with the real-time pose and location of the excavators, the 3D environment can be used as a “virtual reality” operating environment for excavation operators. The whole system has been applied in a pneumatic caisson of an underground project in a Shanghai subway, which proved to be working well, with less than 16-s work cycle (period of a single 180° 3D laser scan), at an estimated resolution of less than 20 mm.  相似文献   

19.
Critical infrastructure represents important national assets for producing or distributing continuous flows of essential goods or services. When one aspect of the critical infrastructure shuts down due to an external disruption, other portions of the system that need those goods or services are likely to stop shortly thereafter, thus exacerbating the damage caused by the external disruption. Literature on critical infrastructure interdependency (CII) shows a need for analyzing failure records with time information from different types of critical infrastructure. This paper presents a knowledge discovery process for CII to extract records of frequent patterns of critical infrastructure failure that are directly or indirectly triggered by external disruptions. The knowledge discovery process, including integration of critical infrastructure failure records and their transformation into the data format needed by a data mining algorithm, is described. The paper includes a discussion on a disaster mitigation approach that could be used to stop CII-related failure events, and it includes the analysis of the results of sample critical infrastructure failure records. Disaster mitigation officials can employ the proposed approach to explore CII and to design countermeasures when a disaster hits.  相似文献   

20.
We report two experiments in which errors and interaction latencies were recorded during routinization of hierarchically structured computer-based tasks. Experiment 1 demonstrates that action selection is slowed at subtask transitions, especially when selecting lower frequency actions. This frequency effect is compounded by concurrent performance of a secondary, attentionally demanding, task. Experiment 2 replicates these results in a more complex task and further demonstrates that the effects are reduced by experience. Several other factors were also found to affect latencies, including the availability of an external disambiguation cue and the temporal distance over which task context needs to be internally maintained. The results support a “dual-systems” account of action selection in which a “routine” system, sensitive to frequency, context, and experience, is selectively modulated by an attentionally demanding “nonroutine” system. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号