• Title/Summary/Keyword: 자동화 도출

Search Result 370, Processing Time 0.025 seconds

Real-time Fault Detection and Classification of Reactive Ion Etching Using Neural Networks (Neural Networks을 이용한 Reactive Ion Etching 공정의 실시간 오류 검출에 관한 연구)

  • Ryu Kyung-Han;Lee Song-Jae;Soh Dea-Wha;Hong Sang-Jeen
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.7
    • /
    • pp.1588-1593
    • /
    • 2005
  • In coagulant control of water treatment plants, rule extraction, one of datamining categories, was performed for coagulant control of a water treatment plant. Clustering methods were applied to extract control rules from data. These control rules can be used for fully automation of water treatment plants instead of operator's knowledge for plant control. To perform fuzzy clustering, there are some coefficients to be determined and these kinds of studies have been performed over decades such as clustering indices. In this study, statistical indices were taken to calculate the number of clusters. Simultaneously, seed points were found out based on hierarchical clustering. These statistical approaches give information about features of clusters, so it can reduce computing cost and increase accuracy of clustering. The proposed algorithm can play an important role in datamining and knowledge discovery.

Simplified Clearance Formalities based on Global Port B2B Framework (Global Port B2B 프레임워크 기반의 입출항 수속 간소화 방안)

  • 조재형;박남규;박남규;최형림
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2004.04a
    • /
    • pp.371-377
    • /
    • 2004
  • In an effort to simplify, standardize, and make effective use of information on arrival/departure through electronic means developed up to now, this paper suggests ebXML based Global Port B2B Framework, which makes it possible not only to realize e-commerce transactions between ports, but also simultaneously realize standardization and integration. In addition, due to its reusability of information, various reports are to be simplified and automated

  • PDF

Countermeasure to Underlying Security Threats in IoT communication (사물인터넷 통신기술에 내재된 보안위협과 대응 전략)

  • Mun, Hyung-Jin;Choi, Gwang-Houn;Hwang, Yooncheol
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.2
    • /
    • pp.37-43
    • /
    • 2016
  • Due to the remarkable improvement of ICT, with the popularization of mobile devices and every sector of society connected by networks, an era, in which peer to peer, peer to thing, thing to thing can be connected to one another everywhere, has begun. As all the electronic devices are connected to Internet, they have become more intellectualized and automated, making convergence and process of information through the connection of the devices possible to provide a lot better services. However, those devices communicate mutually to send information and they are exposed to various security threats. Therefore, this study analyzes ZigBee, CoAP, MQTT, XMPP, which are communication-related technology of IoT, draws security threats they have, and suggests requirements that components of IoT should have. Plus, it examines real cases about security threats in IoT, and suggests a countermeasure so as to contribute to establishment of a basis for IoT to be used much more safely in the future.

Collaborative security response by interworking between multiple security solutions (보안 솔루션의 상호 연동을 통한 실시간 협력 대응 방안 연구)

  • Kim, JiHoon;Lim, Jong In;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.69-79
    • /
    • 2013
  • Recently, many enterprises are suffering from advanced types of malware and their variants including intelligent malware that can evade the current security systems. This addresses the fact that current security systems have limits on protecting advanced and intelligent security threats. To enhance the overall level of security, first of all, it needs to increase detection ratio of each security solution within a security system. In addition, it is also necessary to implement internetworking between multiple security solutions to increase detection ratio and response speed. In this paper, we suggest a collaborative security response method to overcome the limitations of the previous Internet service security solutions. The proposed method can show an enhanced result to respond to intelligent security threats.

Design Optimization of Cleaning Blade for Minimizing Stress (응력 최소화를 위한 클리닝 블레이드 최적설계)

  • Park, Chang-Hyun;Lee, Jun-Hee;Choi, Dong-Hoon
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.35 no.5
    • /
    • pp.575-582
    • /
    • 2011
  • A cleaning blade is an attachment installed in the toner cartridge of a laser printer for removing the residual toner from an organic photo-conductive drum. There have been many studies on the performance and life of the rubber blade. We focus on optimally designing the blade shape parameters to minimize the maximum stress of the blade while satisfying design constraints on the cleaning performance and part interference. The blade is optimally designed using a design of experiments, meta-models and an optimization algorithm implemented in PIAnO (process integration, automation, and optimization), a commercial PIDO (process integration and design optimization) tool. We integrate the CAE tools necessary for the structural analysis of the cleaning blade, automate the analysis procedure, and optimize the solution using PIAnO. We decreased the maximum stress by 32.6% in comparison with that of the initial design.

Effect of surface treatment on thermo-compression bonding properties of electrodes between printed circuit boards (표면처리에 따른 인쇄회로기판의 열압착 접합 특성 평가)

  • Lee, Jong-Gun;Lee, Jong-Bum;Choi, Jung-Hyun;Jung, Seong-Boo
    • Proceedings of the KWS Conference
    • /
    • 2010.05a
    • /
    • pp.81-81
    • /
    • 2010
  • 전자 패키징은 미세화, 경량화, 저가화를 지향하고 신뢰성의 향상을 위해 발전해 왔다. 이러한 경향은 전자부품 자체의 성능 향상 뿐 아니라 전자부품을 장착, 고정할 수 있게 하는 인쇄회로 기판(PCB : Printed Circuit Board)의 성능에 많은 관심을 가지게 되었다. 전기적 신호의 손실을 줄이기 위해 전기, 전자 산업체에서는 가볍고 굴곡성이 우수한 연성인쇄회로기판(FPCB : Flexible PCB)과 가격이 싸고 신뢰성이 입증된 경성인쇄회로기판(RPCB : Rigid PCB)이 그 대상이다. 본 논문에서는 이 PCB중에서도 RPCB와 FPCB간의 열압착 방식으로 접합 시 전극간의 접합 양상을 보았다. 이 열압착 방식은 기존에 PCB를 접합하는데 사용하고 있는 connector를 이용한 체결법을 대체하는 기술로써 솔더를 중간층(interlayer)로 이용하여 열과 압력으로 접합하는 방식이다. 이 방식을 connector를 사용하는 방식에 비해 그 부피가 작고 I/O개수에 크게 영향 받지 않으며 자동화 공정이 쉬운 장점을 가지고 있다. 접합의 대상 중 RPCB의 경우는 무전해 니켈 금도금(ENIG : Electroless Nickle Immersion Gold)로 제작하였으며 FPCB의 경우는 ENIG와 유기보호피막(OSP : Organic solderability preservation) 처리하였다. 실험에 사용한 PCB는 $300\;{\mu}m$ pitch의 미세피치이며 솔더의 조성은 Sn-3.0Ag-0.5Cu (in wt%)과 Sn-3.0Ag (in wt%)를 사용하였다. 접합 온도와 접합 시간 그리고 접합 압력에 따라 최적의 접합 조건을 도출하였다. 접합 강도는 $90^{\circ}$ Peel Test를 통해서 측정하였으며 접합면 및 파괴면은 SEM과 EDS를 통하여 분석하였다.

  • PDF

A Study on Behavioral Intention and Application of Information Systems Audit technology Using the Technology Acceptance Model (TAM) (기술수용모델 (TAM)을 이용한 정보시스템 감리기술의 사용의도 수준이 활용에 미치는 영향에 관한 연구)

  • Jeon, Soon-Cheon
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.6
    • /
    • pp.609-618
    • /
    • 2014
  • Information system audit, by checking overall matters about constructing and managing information system, has to contribute to improvement of information system's quality and improving performance of projects. For this, an auditor has to present objective corroborative facts which back up result of audit and ways of improvement, but in reality, general(especially businessmen's) cognition is that audit is biased by way too subjective opinions. Local experience and theoretical research until now propose that tools of automating audit will be an active means of systematically collecting and proposing these objective evidences of audit. This research not only verified that in the field of audit, phenomenon of technology application can be explained and predicted by applying TAM, but it also contributed in extending theoretical base on information technology and audit by distinguishing several characteristics which appear in the process of the model's application and analysis.

Development of Theme Park Management Automation System Using RFID (RFID를 이용한 공원관리 자동화 시스템 개발 연구)

  • Lee, Yang-Weon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.4
    • /
    • pp.871-876
    • /
    • 2005
  • Theme park automation system is developed by using the RFID sensor reader, IIS web server, ASP.NET and MSSQL database in this paper. Its operation is that park entrance people checked automatically when he who possessed the ta8 passed the reader acquisition bound and its tag information is sent to the host computer through the RS-232 data acquisition system. Tag information and time data will be stored in the RFID database tables and reused to extract and distribute the entrance people for the purpose of each arrangement of each entertainment devices. First of all, we developed interface program between host and reader and then, programmed the related web site and database connection function using ASP.NET with $C\#$ and MSSQ. We also design and make an production of external Ant. to extend the acquisition range up to $30\~40$ cm using copper PCB plate. We confirmed the performance through the RFID test bed site.

A Development of Component Vulnerability Analysis Program for Armored Fighting Vehicle using Criticality based on FMECA (FMECA 기반 위험도를 활용한 전차의 구성 부품별 취약성 분석 프로그램의 개발)

  • Hwang, Hun-Gyu;Kang, Ji-Won;Lee, Jang-Se
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.8
    • /
    • pp.1973-1980
    • /
    • 2015
  • The combat system has a different purpose depending on its mission. All functions of combat system are important, but, the components that related main functions for the purpose, are important than other components. Also, the hit probability of component is proportional to area of the component. Therefore, when we analyze vulnerability of combat system, to consider the importance and hit probability of component. Thus to improve reliability of combat system, we apply the analyzed result to design combat system. In this paper, we develop a vulnerability analysis program based on criticality which calculated from importance and hit probability of components by related researches. To do this, we propose a methodology to apply criticality of components, and define classification rates for calculating criticality based on FMECA. Additionally, we propose a technique of vulnerability analysis using criticality of components, and apply the proposed technique to develop and test the vulnerability analysis program for automation of analysis.

An Analysis on Process Type for Construction Logistics Using RFID Technology (RFID를 이용한 건설 물류관리 프로세스 타입 분석)

  • Koo, Do-Hyung;Yoon, Su-Won;Chin, Sang-Yoon
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2006.11a
    • /
    • pp.161-166
    • /
    • 2006
  • Recently various applications have been proposed to improve supply chain process and management by not only using various management theories such as JIT(just In Time) and SCM(Supply Chain Management) but also utilizing emerging technology like RFID(Radio Frequency Identification). But existing research was merely focused on the use of the theories and technology on a particular work or material. Therefore, the objective of this study is to derive basic types of construction supply chain management which spans from manufacturing to installation at the construction site. This research proposes the seven types of construction supply chain processes, which has been derived based on the progress management theory and budget items for construction project. It is expected that the result of this study can be applied for RFID-based construction supply chain management as well as more efficiencies in various management areas.

  • PDF