a cyber use for neesr project data from a pi perspective

10
A cyber use for NEESR project data from a PI perspective John W. van de Lindt The University of Alabama

Upload: ceri

Post on 15-Feb-2016

23 views

Category:

Documents


0 download

DESCRIPTION

A cyber use for NEESR project data from a PI perspective. John W. van de Lindt The University of Alabama. Dynamic E-Journal: Making reading interactive. Start with what looks like a typical journal article e.g. Paper from recent tests in Japan. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: A cyber use for NEESR project data from a PI perspective

A cyber use for NEESR project data from a PI perspective

John W. van de LindtThe University of Alabama

Page 2: A cyber use for NEESR project data from a PI perspective

Dynamic E-Journal: Making reading interactive

Page 3: A cyber use for NEESR project data from a PI perspective

Start with what looks like a typical journal article

e.g. Paper from recent tests in Japan.

Can someone do more than just read it ? Manipulate the data.

inDEED & an “interactive e-Journal”? – it seems close already!

Page 4: A cyber use for NEESR project data from a PI perspective

Hypertext to indicate

Hyperfigures

Clicking starts investigative or interactive process for the reader…

Page 5: A cyber use for NEESR project data from a PI perspective
Page 6: A cyber use for NEESR project data from a PI perspective

Clicking a floor plan brings up a data set menu…

Another example at the sub-

assembly level:

Page 7: A cyber use for NEESR project data from a PI perspective

Sub-Assembly Level

Page 8: A cyber use for NEESR project data from a PI perspective

Damage Photos for Wall X

Data Sets Available:•Uplift•Hold Down Rod Forces•Shear Deformation•Damage Photographs

- Shake 1- Shake 2- Shake 3- Shake 4- Shake 5

Page 9: A cyber use for NEESR project data from a PI perspective

Could this be an extension of inDEED ?

• Could cameras with GPS provide the necessary metadata automatically ?

• Is there metadata coding that could be put in place prior to the experiment ?– We do this anyway just to keep track of sensors

• Could the filenames simply create the linkage with sensors?

Page 10: A cyber use for NEESR project data from a PI perspective

Just a thought…

Thank you!

John W. van de [email protected]