• Title/Summary/Keyword: 슬라이싱

Search Result 96, Processing Time 0.018 seconds

Measurement of minimum line width of an object fabricated by metal 3D printer using powder bed fusion type with stainless steal powder (스테인리스강을 사용한 분말 적층 용융 방식의 금속 3차원 프린터에서 제작된 물체의 최소 선폭 측정)

  • Son, BongKuk;Jeong, Youn Hong;Jo, Jae Heung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.10
    • /
    • pp.346-351
    • /
    • 2018
  • Metal three-dimensional (3D) printing technologies are mainly classified as powder bed fusion (PBF) and direct energy deposition (DED) methods according to the method of application of a laser beam to metallic powder. The DED method can be used to fabricate fine and hard 3D metallic structures by applying a strong laser beam to a thin layer of metallic powder. The PBF method involves slicing 3D graphics to be a certain height, laminating metal powders, and making a 3D structure using a laser. While the DED method has advantages such as laser cladding and metallic welding, it causes problems with low density when 3D shapes are created. The PBF method was introduced to address the structural density issues in the DED method and makes it easier to produce relatively dense 3D structures. In this paper, thin lines were produced by using PBF 3D printers with stainless-steel powder of roughly $30{\mu}m$ in diameter with a galvano scanner and fiber-transferred Nd:YAG laser beam. Experiments were carried out to find the optimal conditions for the width of a line depending on the processing times, laser power, spot size, and scan speed. The optimal conditions were two scanning processes in one line structure with a laser power of 30 W, spot size of $28.7{\mu}m$, and scan speed of 200 mm/s. With these conditions, a minimum width of about $85.3{\mu}m$ was obtained.

Development of Design Support Tool for Building 3D printing (건축물 3D 프린팅 설계지원도구 개발)

  • Lee, Dongyoun;Seo, Myoung-Bae;Ju, Ki-Beom
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.10
    • /
    • pp.94-105
    • /
    • 2020
  • Recently, most studies of 3D printing in construction have focused on the development of 3D printers and materials suitable for construction 3D printers. In comparison, there has been little research on design support tools that enable representative BIM data of building modeling tools to be applied to 3D printing. In addition, existing 3D printing slicing programs are commercialized around manufacturing, showing that they are unsuitable for construction 3D printing. Therefore, this research aims to develop a design support tool for 3D printing for buildings. The developed design support tool was validated based on arbitrary BIM data. Verification showed that wall pattern generation was modeled accurately without errors, and a calculation of the construction period showed that the formula presented in this study was valid. Furthermore, the maximum length of the mesh split was set to 100mm to minimize errors when converting to STL files.

A Preprocessor for Detecting Potential Races in Shared Memory Parallel Programs with Internal Nondeterminism (내부적 비결정성을 가진 공유 메모리 병렬 프로그램에서 잠재적 경합탐지를 위한 전처리기)

  • Kim, Young-Joo;Jung, Min-Sub;Jun, Yong-Kee
    • The KIPS Transactions:PartA
    • /
    • v.17A no.1
    • /
    • pp.9-18
    • /
    • 2010
  • Races that occur in shared-memory parallel programs such as OpenMP programs must be detected for debugging because of causing unintended non-deterministic results. Previous works which verify the existence of these races on-the-fly are limited to the programs without internal non-determinism. But in the programs with internal non-determinism, such works need at least N! execution instances for each critical section to verify the existence of races, where N is the degree of maximum parallelism. This paper presents a preprocessor that statically analyzes the locations of non-deterministic accesses using program slicing and can detect apparent races as well as potential races through single execution using the analyzed information. The suggested tool can deterministically monitor non-deterministic accesses to occur in OpenMP programs so that this tool can verify the existence of races even if it is used any race detection protocol which can apply to programs with critical section. To prove empirically this tool, we have experimented using a set of benchmark programs such as synthetic programs that involve non-deterministic accesses, OpenMP Microbenchmark, NAS Parallel Benchmark, and OpenMP application programs.

Threat Diagnostic Checklists of Security Service in 5G Communication Network Virtualization Environment (5G 통신 네트워크 가상화 환경에서 보안 서비스의 위협 진단 체크리스트)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.144-150
    • /
    • 2021
  • The purpose of this paper is to review the direction of the slicing security policy, which is a major consideration in the context of standardization in 5G communication network security, to derive security vulnerability diagnosis items, and to present about analyzing and presenting the issues of discussion for 5G communication network virtualization. As for the research method, the direction of virtualization security policy of 5G communication network of ENISA (European Union Agency for Cybersecurity), a European core security research institute, and research contents such as virtualization security policy and vulnerability analysis of 5G communication network from related journals were used for analysis. In the research result of this paper, the security structure in virtualization security of 5G communication network is arranged, and security threats and risk management factors are derived. In addition, vulnerability diagnosis items were derived for each security service in the risk management area. The contribution of this study is to summarize the security threat items in 5G communication network virtualization security that is still being discussed, to be able to gain insights of the direction of European 5G communication network cybersecurity, and to derive vulnerabilities diagnosis items to be considered for virtualization security of 5G communication network. In addition, the results of this study can be used as basic data to develop vulnerability diagnosis items for virtualization security of domestic 5G communication networks. In the future, it is necessary to study the detailed diagnosis process for the vulnerability diagnosis items of 5G communication network virtualization security.

IBN-based: AI-driven Multi-Domain e2e Network Orchestration Approach (IBN 기반: AI 기반 멀티 도메인 네트워크 슬라이싱 접근법)

  • Khan, Talha Ahmed;Muhammad, Afaq;Abbas, Khizar;Song, Wang-Cheol
    • KNOM Review
    • /
    • v.23 no.2
    • /
    • pp.29-41
    • /
    • 2020
  • Networks are growing faster than ever before causing a multi-domain complexity. The diversity, variety and dynamic nature of network traffic and services require enhanced orchestration and management approaches. While many standard orchestrators and network operators are resulting in an increase of complexity for handling E2E slice orchestration. Besides, there are multiple domains involved in E2E slice orchestration including access, edge, transport and core network each having their specific challenges. Hence, handling of multi-domain, multi-platform and multi-operator based networking environments manually requires specified experts and using this approach it is impossible to handle the dynamic changes in the network at runtime. Also, the manual approaches towards handling such complexity is always error-prone and tedious. Hence, this work proposes an automated and abstracted solution for handling E2E slice orchestration using an intent-based approach. It abstracts the domains from the operators and enable them to provide their orchestration intention in the form of high-level intents. Besides, it actively monitors the orchestrated resources and based on current monitoring stats using the machine learning it predicts future utilization of resources for updating the system states. Resulting in a closed-loop automated E2E network orchestration and management system.

Making Aids of Magnetic Resonacnce Image Susing 3D Printing Technology (3D 프린트를 활용한 자기공명영상검사 보조기구 제작)

  • Choi, Woo jeon;Ye, Soo young;Kim, Dong hyun
    • Journal of the Korean Society of Radiology
    • /
    • v.10 no.6
    • /
    • pp.403-409
    • /
    • 2016
  • MRI scan is a useful method in the diagnosis of musculoskeletal excellent contrast of the organization. Depending on the patient's musculoskeletal examinations state the type of aids provided the aid is used there is also challenging as well as the costs do not vary. This study was produced by the use of 3D printing technology, an MRI aids. Aids in the production process, then through 3D modeling and then convert stl files using (3D MAX.2014, Fusion360) slicing programs (Cubicreater 2.1ver., Cura 15.4ver) converted to G-code printed on the FDM scheme (Cubicon Style, output was MICRO MAKE). Output is, but in the FDM to evaluate the SNR on the MRI images were compared to the test is the case before use, and then to produce a Water Phantom case of a PLA, ABS, a TPU thickness 3mm, using aids before, It was evaluated in a clinical image after qualitatively. Obtaining an image of SNR Warter Phantom appeared to have been evaluated as T1 NON $123.778{\pm}28.492$, PLA $123.522{\pm}28.373$, ABS $124.461{\pm}25.716$, TPU $124.843{\pm}27.272$. T2 NON $127.421{\pm}26.949$, was rated as PLA $124.501{\pm}27.768$, ABS $128.663{\pm}26.549$, TPU $130.171{\pm}25.998$. The results did not show statistically significant differences. The use of assistive devices before and after images Clinical evaluation method palliative $3.20{\pm}0.88$, $3.95{\pm}0.76$ after using the aids used to aid improved the quality of the image. Production of the auxiliary mechanism using a future 3D printing is expected are thought to be used clinically, it can be an aid making safe and comfortable than the inspection of the patient is an alternative to improve the problems of the aids used in the conventional do.