• Title/Summary/Keyword: 기능성 프린팅

Search Result 75, Processing Time 0.027 seconds

Research on The Implementation of Smart Factories through Bottleneck improvement on extrusion production sites using NFC (NFC를 활용한 압출생산현장의 Bottleneck 개선을 통한 스마트팩토리 구현 연구)

  • Lim, Dong-Jin;Kwon, Kyu-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.104-112
    • /
    • 2021
  • For extrusion processes in the process industry, the need to build smart factories is increasing. However, in most extrusion production sites, the production method is continuous, and because the properties of the data are undeed, it is difficult to process the data. In order to solve this problem, we present a methodology utilizing a near field communication (NFC) sensor rather than water-based data entry. To this end, a wireless network environment was built, and a data management method was designed. A non-contact NFC method was studied for the production performance-data input method, and an analysis method was implemented using the pivot function of the Excel program. As a result, data input using NFC was automated, obtaining a quantitative effect from reducing the operator's data processing time. In addition, using the input data, we present a case where a bottleneck is improved due to quality problems.

Gingival mask using 3D Printer for a patient with palatally installed implant in maxillary anterior area (구개측으로 식립된 상악 전치부 임플란트 환자에서 3D 프린터를 이용한 Gingival mask 수복 증례)

  • Jeong, Kyong-Sik;Kim, Na-Hong;Kim, Sung-Yong;Lee, Yong-Sang
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.58 no.4
    • /
    • pp.363-368
    • /
    • 2020
  • The prosthesis of the implant installed in inappropriate positions presents aesthetic and functional problems. If the implants are placed in the wrong position, re-implantation is often limited. There are surgical and non-surgical methods for resolving complications without re-implantation. The surgical costs, healing time, discomfort and unpredictability make this choice unpopular. On the other hand, a gingival mask has the advantage of solving complications quickly and simply. The patient was a 80-year-old male with palatally installed implant in maxillary anterior region and dissatisfied with his unesthetic philtrum and food impaction between the upper lip and the prosthesis. It was difficult to predict the prognosis of surgical operation, and the patient wanted treatment economically and physically burdenless because of his age and financial situation. Thus, the gingival mask was planned and the results were satisfactory.

Detailed patterning formation through Etch resist printing condition reservation (부식 방지막 인쇄 조건 확보를 통한 미세 배선 형성)

  • Lee, Ro-Woon;Park, Jae-Chan;Kim, Yong-Sik;Kim, Tae-Gu;Joung, Jae-Woo
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2006.06a
    • /
    • pp.179-179
    • /
    • 2006
  • 산업기술의 고도화에 따른 IT 산업의 급속한 발전으로 각종 전자, 정보통신기기에 대해 더욱 소형화 고성능화를 요구하고 있다. 이와 같은 경향에 따라 더욱 향상된 기능을 가지고 각종 소자 부품의 개발과 동시에 유독 물질 발생이 없는 청정생산기술 개발에 대한 요구가 끊임없이 제기 되어 왔다. 이러한 요구에 부응하여 기술들이 개발되고 있으며 그 중의 하나로 잉크젯 프린팅 기술이 연구되고 있다. 특히 Dod(Drop on Demand) 방식의 잉크젯은 가정용 프린터로 개발되어 널리 보급된 기술이지만, 이 기술을 PCB 제조기술에 전용하면 친환경 생산공정으로 부품 성장밀도를 증대 시킬 수 있다. 기존의 PCB 제조기술은 전극과 신호 패턴을 형성시키기 위하여 노광공정과 에칭공정을 반복적으로 사용하고 있는데, 노광공정에서 쓰이는 마스크와 유틸리티 설비 유지 비용의 문제가 대두되고 있다. 노즐로부터 분사된 잉크 액적들의 집합으로 기판위에 점/선/면의 인쇄이미지를 구현하게 된다. 그러므로 인쇄 해상도는 잉크액적 및 인쇄 방법, 기판과의 상호작용에 크게 의존하게 된다. 잉크 액적과 기판의 상호작용에 영향을 미치는 요소로는 잉크의 물리화학적 물성(밀도, 점도, 표면장력), 잉크 액적의 충돌 조건(액적 지름, 부피, 속도), 그리고 기판의 특성(친수/소수성, Porous/Nonporous, 표면조도 등)을 들 수 있겠다. 우선적으로 노즐을 통과해서 분사되는 액적의 크기에 따라 기판위에 형성되는 라인의 두께 및 폭이 결정된다. 떨어진 액적이 기판위에서 퍼지는 것을 UV 조사를 통한 가경화 과정을 통해서 최종적으로 라인의 투께 및 폭을 조절하려고 한다. 따라서 선폭 $75{\mu}m$의 일정한 미세 배선을 형성시키기 위해 액적 크기 조절과 탄착 resist 액적 표면의 UV 가경화 조건으로 구현하려고 한다. 또한 DPI(Dot Per Inch) 조절을 통한 인쇄로 탄착 resist의 두께 확보 후 에칭시 박리되는 현상을 억제 시키려 한다.

  • PDF

Full-mouth rehabilitation using digital method to transfer provisional restoration to final fixed implant restoration (디지털 방법을 활용하여 임시수복물을 최종 고정성 임플란트 수복물로 이행한 완전 구강 회복 증례)

  • Cho, Eunhan;Lee, Younghoo;Hong, Seoung-Jin;Paek, Janghyun;Pae, Ahran;Kim, Hyeong-Seob;Kwon, Kung-Rock;Noh, Kwantae
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.60 no.4
    • /
    • pp.362-373
    • /
    • 2022
  • For a full-mouth fixed prosthetic treatment of the edentulous patient, it is essential to confirm the proper tooth position and thorough evaluation of the remaining alveolar bone and soft tissue before surgery. CAD-CAM dentistry and guided implant surgery have such advantages of providing simultaneous planning of surgery and prosthetic treatment to ensure pre-knowledge of the treatment. In this clinical case, using the digital technology, digital temporary denture fabrication, esthetic evaluation before fixed prostheses treatment, and guided surgery planning was possible. After the surgery, previously obtained data was used for fabricating fixed temporary prostheses. Definitive zirconia prostheses transferred from the provisional prostheses were fabricated and functionally and esthetically satisfying results were obtained.

A Preemptive Detection Method for Unknown IoT Botnet Based on Darknet Traffic (다크넷 트래픽 기반의 알려지지 않은 IoT 봇넷 선제탐지 방안)

  • Gunyang Park;Jungsuk Song;Heejun Roh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.267-280
    • /
    • 2023
  • With development of computing and communications technologies, IoT environments based on high-speed networks have been extending rapidly. Especially, from home to an office or a factory, applications of IoT devices with sensing environment and performing computations are increasing. Unfortunately, IoT devices which have limited hardware resources can be vulnerable to cyber attacks. Hence, there is a concern that an IoT botnet can give rise to information leakage as a national cyber security crisis arising from abuse as a malicious waypoint or propagation through connected networks. In order to response in advance from unknown cyber threats in IoT networks, in this paper, We firstly define four types of We firstly define four types of characteristics by analyzing darknet traffic accessed from an IoT botnet. Using the characteristic, a suspicious IP address is filtered quickly. Secondly, the filtered address is identified by Cyber Threat Intelligence (CTI) or Open Source INTelligence (OSINT) in terms of an unknown suspicious host. The identified IP address is finally fingerprinted to determine whether the IP is a malicious host or not. To verify a validation of the proposed method, we apply to a Darknet on real-world SOC. As a result, about 1,000 hosts who are detected and blocked preemptively by the proposed method are confirmed as real IoT botnets.