DOI QR코드

DOI QR Code

중소기업 환경에서 IoT 기술을 이용한 제조 환경 개선에 관한 분석 연구

A Study on improving manufacturing environment using IoT technology in small business environment

  • 정윤수 (목원대학교 정보통신융합공학부)
  • Jeong, Yoon-Su (Dept. of information Communication Convergence Engineering, Mokwon University)
  • 투고 : 2017.02.23
  • 심사 : 2017.04.03
  • 발행 : 2017.04.28

초록

최근 대기업을 중심으로 가전제품, 스마트폰, 헬스케어 제품에 IoT를 부착한 제품을 출시하여 IoT에 대한 관심이 증가하고 있는 추세이다. 그러나, 우리나라 중소기업 환경은 다른 나라보다 IoT 기술을 적용하기 어려운 환경이기 때문에 IoT 기술을 중소기업 환경에 쉽게 접근할 수 있는 환경 개선 프로세스가 무엇보다도 절실한 상황이다. 본 논문에서는 우리나라 중소기업에서 현재 운영중인 제조 공정을 IoT 기술과 융합하였을 때 생산 효율성을 향상시킬 수 있는 서비스 운영모델을 제안한다. 제안 모델은 전체 제조 공정과정에서 제조 제품 정보와 센서/다바이스 정보를 이용하여 IoT 기술을 활용하는 것을 목적으로 한다. 성능평가 결과, 제안 모델은 기존 모델보다 제조 프로세스의 효율성이 23.1% 향상되었다. 또한, 제조 프로세스가 증가할수록 기존 모델에 비해 업무 처리시간이 평균 17.3% 단축되었다. 마지막으로 제조 공정에 사용되는 인력 감축 비용이 기존 모델보다 평균 19.8% 감소되는 것으로 나타났다.

To launch the product recently attached to IoT consumer electronics, smart phones and healthcare products around the large companies is a trend that is growing interest in the IoT. However, the country's small business environment is what the environmental improvement process that is easily accessible to the small business environment because the IoT technologies are difficult to apply the IoT technologies than any other country environment than desperate situation. In this paper, we propose a service operating model to improve production efficiency when the fusion manufacturing process is currently operating in the country SMEs and IoT technology. Proposed model using the manufacturing product information and sensor / dabayiseu information in the entire manufacturing process has as its object to utilize the IoT technology. Performance evaluation, the proposed model is more efficient than the previous model and 23.1% of the manufacturing process. In addition, it is increasing the manufacturing process was reduced by 17.3%, the average processing time as compared to the previous model. Finally, the personnel cost to be used in the manufacturing process was found to be an average decrease of 19.8% than previous model.

키워드

참고문헌

  1. R. F. Powers and G. W. Dickson, “MIS Project Management : Myths, Opinions and Reality,” California Management Review, Vol. 15, No. 3, pp. 147-156, Jan. 1971. DOI: 10.2307/41164448.
  2. ] Y. S. Jeong, Y. T. Kim and G. C. Park, “A Design of Service Improvement Model for Emergency Medical System using Augmented Reality,” Journal of Convergence Society for SMB, Vol. 7, No. 2, pp. 9-15, Jun. 2016. DOI: 10.22156/CS4SMB.2016.6.2.009
  3. J. Y. Lee and K. I. Kim, "The Effects of Accounting Service Worker's Professionalism and Accounting Information System's Level on the Quality of Customer's Accounting Information," Journal of Convergence Society for SMB, Vol. 6, No. 2, pp. 9-15, Jun. 2016. DOI: 10.22156/CS4SMB.2016.6.2.009
  4. L. Raymond and N. Magnenat-Talmann, “Information Systems in Small Business : Are They Used in Managerial Decision?,” American Journal of Small Business, Vol. 6, No. 4, pp. 20-26, Apr. 1982. https://doi.org/10.1177/104225878200600405
  5. F. Marc, M. Trevor, M. Devvie, E. Gerry, A. Teo, M. David, H. Kevin, B. Joseph, W. Paul, J. Eric and K. L. Mo, Symantec Internet Security Threat Report Trends for 2010, Symantec Corp., Vol. 16, Apr. 2011.
  6. L. Nataraj, S. Karthikeyan, G. Jacob and B. Manjunath, "Malware images: Visualization and automatic classification," Proceedings of the 8th International Symposium on Visualization for Cyber Security(VizSec '11), No. 4, pp. 1-15, Jul. 2011. DOI: 10.1145/2016904.2016908
  7. D. A. Quist and L. M. Liebrock, "Visualizing compiled executables for malware analysis," Proceedings of the 6th International Workshop on Visualization for Cyber Security, 2009 (VizSec 2009), pp. 27-32, 2009. DOI: 10.1109/VIZSEC.2009.5375539
  8. G. I. Kim, Y. C. Kim and J. K. Lee, "An Efficiency Authentication Security Mechanism of VANET in Highway," Journal of Convergence Society for SMB, Vol. 6, No. 2, Jun. 2016. DOI: 10.22156/CS4SMB.2016.6.2.009
  9. Y. S. Jeong, “A Study of An Efficient Clustering Processing Scheme of Patient Disease Information for Cloud Computing Environment,” Journal of Convergence Society for SMB, Vol. 6, No. 1, pp. 33-38, Mar. 2016. DOI: 10.22156/CS4SMB.2016.6.1.033
  10. X. Jiang, X. Wang and D. Xu, "Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction," Proceedings of the 14th ACM conference on Computer and communications security (CCS '07), pp. 128-138, 2007. DOI: 10.1145/1315245.1315262
  11. V. P. Nair, H. Jain, Y. K. Golecha, M. S. Gaur and V. Laxmi, "MEDUSA: MEtamorphic malware dynamic analysis using signature from API," Proceedings of the 3rd international conference on Security of information and networks(SIN '10), pp. 263-269, 2010. DOI: 10.1145/1854099.1854152
  12. P. Trinius, T. Holz, J. Gobel And F. C. Freiling, "Visual analysis of malware behavior using treemaps and thread graphs," Proceedings of the 6th International Workshop on Visualization for Cyber Security 2009(VizSec 2009), pp. 33-38, 2009. DOI: 10.1109/VIZSEC.2009.5375540
  13. F. Y. Zhang, D. Y. Qi and J. L. Hu, "Using IRP for Malware Detection," Recent Advances in Intrusion Detection in Lecture Notes in Computer Science, Springer Berlin/Heidelberg, pp. 514-515, 2010. DOI: 10.1007/978-3-642-15512-3_39
  14. I. Ahmed and K. S. Lhee, "Classification of packet contents for malware detection," Journal in Computer Virology, pp. 279-295, 2011. DOI: 10.1007/s11416-011-0156-6
  15. M. Skrzewski, "Flow Based Algorithm for Malware Traffic Detection," Journal of the Computer Networks in Communications in Computer and Information Science, Springer Berlin Heidelberg, pp. 271-280, 2011. DOI: 10.1007/978-3-642-21771-5_29
  16. S. D. Yoo and K. D. Choi, "Research on the CBI, senior technology entrepreneurship promotion - Based on Finland Bridge Program-," Journal of digital Convergence, Vol. 13, No. 1, pp. 1-10, 2015. DOI : 10.14400/JDC.2015.13.1.1
  17. T. I. Han, "A Study on the Technical Evaluation of the Quality Certification for e-Learning Contents," Journal of digital Convergence, Vol. 13, No. 1, pp. 49-66, 2015. DOI : 10.14400/JDC.2015.13.1.49
  18. S. K. Kwon, "Legal Issues of Electronic Commerce Chapters of the Korea․US FTA and Tasks of the Digital Contents Industry," Journal of digital Convergence, Vol. 13, No. 5, pp. 21-29, May. 2015. DOI : 10.14400/JDC.2015.13.5.21
  19. Y. K. Lee and K. H. Youn, "Searching Role of Government for Promoting IoT Industry -Utilizing Importance of Individual Sub-Policies using AHP-," Journal of the Korea Convergence Society, Vol. 14. No. 5, pp. 47-55, May. 2016. DOI: 10.14400/JDC.2016.14.5.47
  20. Y. I. Kim, Yeong-Chang Choe, Yun-Jin Choi, “A study on the Convergence Factors Which Influence on the Sustainability of Volunteer Activities -Focused on Ansan Volunteer Center-,” Journal of digital Convergence, Vol. 13, No. 10, pp. 41-50, 2015. DOI: 10.14400/JDC/2015.13.10.41
  21. H. L. Roh and M. N. Choi, "A study the convergent effects of team interaction and team metacognition affecting a continuous participation in university learning community," Journal of digital Convergence, Vol. 14, No. 4, pp. 69-78, 2016. DOI: 10.14400/JDC.2016.14.4.69