Leveraging a digital twin with machine learning to revitalize bridges

In this blog, we will explore how Thomas Braml, Professor of Civil Engineering and the team at the University of the Bundeswehr Munich have used Cisco technology to implement a repeatable solution for bridges that reduces the cost of bridge maintenance and optimizes the design of new bridges to align with real data rather than forecasted use.
Despite the strong materials used in bridge construction, wear and tear occurs over time, which can lead to costly bridge maintenance or even rebuilding.
Either way, this is costly, and the data collected represents just one point in time.
Today stakeholders must make hard decisions about bridge maintenance with this limited data set, which could result in a significant repair job or a complete rebuild.
To better understand the historical and day-to-day wear, the industry is moving towards a standard of leveraging a variety of sensors to measure key data points across a bridge.
The team at the university has now created a model using this digital twin approach, which gives stakeholders a data-driven framework to accurately validate when and if a bridge needs maintenance.
The sensors being leveraged provide data such as acceleration, temperature and strain measurements to create a picture of the current state of the bridge.
Before this data can make it to its destination, Cisco Edge Intelligence software can process, buffer, aggregate, and eventually enrich this data at the edge through its Data Logic feature - allowing customers to write scripts to quickly adjust data payloads in-transit before the data leaves the edge.
Once the data is ready for transit, Cisco Catalyst IR1101 Rugged Series Routers provide the critical network infrastructure and connectivity to a central data center.
These industrial routers provide trusted Cisco networking, while also being certified for a wide range of temperatures that can be experienced at these bridges.
After this data is collected in the data center, the digital twin model developed by the University of the Bundeswehr Munich team is leveraged to provide live and historical insights.
These insights can identify key historical events which might lead to maintenance concerns, and the digital twin also allows customers to predict and forecast issues.
With the ability to accurately model the variety of scenarios occurring on the bridge - combined with the real telemetry from sensors - customers now can accurately predict and plan for a variety of scenarios without ever leaving their office.
The price tag of refurbishing or rebuilding a bridge.
The impact on the environment associated with the construction.
By adding sensors to a bridge and connecting it to a digital twin model, customers now have a real-time and historical model of their bridge's life story.
They can identify the exact moment a bridge needs maintenance and possibly extend its life by decades.
We can help our planet by making sure construction occurs only when necessary, which can reduce CO2e emissions.
The solution created by the University of the Bundeswehr Munich in partnership with Cisco allows for implementation of an intelligent digital twin for bridges.
This model provides critical telemetry information and historical data to inform precise maintenance windows, which can reduce emissions by reducing required construction projects.


This Cyber News was published on feedpress.me. Publication date: Tue, 09 Jan 2024 17:13:06 +0000


Cyber News related to Leveraging a digital twin with machine learning to revitalize bridges

Leveraging a digital twin with machine learning to revitalize bridges - In this blog, we will explore how Thomas Braml, Professor of Civil Engineering and the team at the University of the Bundeswehr Munich have used Cisco technology to implement a repeatable solution for bridges that reduces the cost of bridge ...
10 months ago Feedpress.me
The Role of Machine Learning in Cybersecurity - Machine learning plays a crucial role in cybersecurity by enhancing defense mechanisms and protecting sensitive information. The key advantage of using machine learning in cybersecurity is its ability to constantly adapt and learn from new threats. ...
9 months ago Securityzap.com
Teaching Digital Ethics: Navigating the Digital Age - In today's digital age, where technology permeates every aspect of our lives, the need for ethical behavior in the digital realm has become increasingly crucial. This article explores the significance of digital ethics education in our society and ...
10 months ago Securityzap.com
The Role of AI in Personalized Learning - Artificial Intelligence is playing an increasingly significant role in the field of education, particularly in personalized learning. In this article, we will explore the role of AI in personalized learning, with a focus on AI-driven adaptive ...
10 months ago Securityzap.com
The Role of IoT in Modern Education - From smart classrooms equipped with IoT devices to personalized learning platforms, IoT has paved the way for a more immersive and tailored educational experience. Overall, the integration of IoT in education holds great promise in transforming the ...
10 months ago Securityzap.com
Digital Citizenship Lessons for Students - This article aims to emphasize the significance of digital citizenship lessons for students, focusing on three key aspects: the definition and scope of digital citizenship, online etiquette, and safe online behavior. By equipping students with ...
10 months ago Securityzap.com
Building a Culture of Digital Responsibility in Schools - In today's technologically-driven world, schools have a critical role in cultivating a culture of digital responsibility among students. Promoting digital responsibility involves educating students about the potential risks and consequences ...
10 months ago Securityzap.com
How machine learning helps us hunt threats | Securelist - In this post, we will share our experience hunting for new threats by processing Kaspersky Security Network (KSN) global threat data with ML tools to identify subtle new Indicators of Compromise (IoCs). The model can process and learn from millions ...
1 month ago Securelist.com
Digital Learning Tools for Cybersecurity Education - In the field of cybersecurity education, digital learning tools have become indispensable. This article explores various digital learning tools tailored specifically to cybersecurity education. These digital learning tools play a crucial role in ...
10 months ago Securityzap.com
Online Learning Security Best Practices - The rapid increase in remote learning has raised security concerns surrounding online learning platforms. The security of online learning platforms involves implementing robust measures to protect against unauthorized access and data breaches. By ...
11 months ago Securityzap.com
Strengthening Cybersecurity: The Role of Digital Certificates and PKI in Authentication - Data protection remains integral in our wide digital world. This has been possible because of the increasing awareness amidst enterprises, small and large, across industries on the paramount need for the protection of sensitive data, securing digital ...
10 months ago Feeds.dzone.com
Page not found - Leveraging a digital twin with machine learning to revitalize bridges Learn how the University of the Bundeswehr Munich used Cisco technology to develop a digital twin model for bridges that predicts maintenance windows based on telemetry, reducing ...
10 months ago Feedpress.me
For the Love of Learning: We're Here for You at Cisco Live 2024 Las Vegas! - Cisco Live is all about learning, as are Cisco Learning & Certifications and Cisco U. We're here to provide the opportunities you need to learn everything you can and apply your newfound knowledge as soon as possible in the tech career you want. ...
5 months ago Feedpress.me
Cybersecurity Challenges in Remote Learning - The increasing prevalence of remote learning in the education sector has brought about new cybersecurity challenges that must be addressed. This article aims to delve into the various cyber threats faced in remote learning and provide practical ...
10 months ago Securityzap.com
JFrog, AWS team up for machine learning in the cloud - Software supply chain provider JFrog is integrating with the Amazon SageMaker cloud-based machine learning platform to incorporate machine learning models into the software development lifecycle. The JFrog platform integration with Amazon SageMaker, ...
10 months ago Infoworld.com
What a Digital ID Means to How Australians Interact With Businesses Online - Australia is about to get a national online ID system - the Digital ID - which promises to improve the security and privacy of data online. In just a few months, Australians will have access to a new form of ID, which aims to make identification ...
11 months ago Techrepublic.com
Does Your App Accept Digital Wallets? - Digital wallets are electronic systems that securely store payment information digitally. Digital wallets are designed for convenience and often include security features to protect your financial data. How Digital Wallets Function Digital wallets ...
11 months ago Feeds.dzone.com
Australian charged for 'Evil Twin' WiFi attack on plane - An Australian man was charged by Australia's Federal Police for allegedly conducting an 'evil twin' WiFi attack on various domestic flights and airports in Perth, Melbourne, and Adelaide to steal other people's email or social media credentials. The ...
4 months ago Bleepingcomputer.com
Exploring Technology in Classroom Learning - This article aims to explore the effective utilization of technology to enhance classroom learning experiences. Technology plays a crucial role in facilitating effective and engaging learning experiences in the classroom. With the advancement of ...
11 months ago Securityzap.com
Teaching Digital Literacy and Online Safety - It is crucial for educators to prioritize teaching online safety to ensure that students are equipped with the necessary skills to protect themselves online. This article aims to explore the importance of teaching digital literacy and online safety, ...
11 months ago Securityzap.com
A Deep Dive Into How Digital Pound Can Menace Financial Stability - The UK's expedition into releasing a digital pound has triggered a strong debate among policymakers and finance experts. The House of Commons Treasury Committee has shown concerns, cautioning that bringing a central bank digital currency in the UK ...
11 months ago Cysecurity.news
5 Tips for Pi Day Savings at the Cisco Learning Network Store - Save 25% on select training products from the Cisco Learning Network Store for 24 hours only. Two new multicloud training courses are now available in the Cisco Learning Network Store-and they're included in the Pi Day Sale. If you are an active ...
8 months ago Feedpress.me
Privacy-Preserving AI: Protocols to Practice - At the same time, it increases the possibility of personal information misuse, reaching unprecedented levels of power and speed in analyzing and spreading individuals' data. Machine learning employs algorithms to analyze data, improve performance, ...
9 months ago Feeds.dzone.com
Online safety laws: What's in store for children's digital playgrounds? - As children's safety and privacy online becomes a matter of increasing urgency, lawmakers around the world push ahead on new regulations in the digital realm. Tomorrow is Safer Internet Day, an annual awareness campaign that started in Europe in 2004 ...
1 year ago Welivesecurity.com
Electronic Frontier Alliance Comes Back Strong: 2023 in Review - The Electronic Frontier Alliance is a loose network of local groups fighting for digital rights in the United States, chaired by EFF. Members' efforts have been recovering from the limitations put on local organizing caused by the pandemic. More EFA ...
11 months ago Eff.org

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)