• Title/Summary/Keyword: 통신관리

Search Result 8,695, Processing Time 0.033 seconds

Research on The Implementation of Smart Factories through Bottleneck improvement on extrusion production sites using NFC (NFC를 활용한 압출생산현장의 Bottleneck 개선을 통한 스마트팩토리 구현 연구)

  • Lim, Dong-Jin;Kwon, Kyu-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.104-112
    • /
    • 2021
  • For extrusion processes in the process industry, the need to build smart factories is increasing. However, in most extrusion production sites, the production method is continuous, and because the properties of the data are undeed, it is difficult to process the data. In order to solve this problem, we present a methodology utilizing a near field communication (NFC) sensor rather than water-based data entry. To this end, a wireless network environment was built, and a data management method was designed. A non-contact NFC method was studied for the production performance-data input method, and an analysis method was implemented using the pivot function of the Excel program. As a result, data input using NFC was automated, obtaining a quantitative effect from reducing the operator's data processing time. In addition, using the input data, we present a case where a bottleneck is improved due to quality problems.

A Study on Court Auction System using Ethereum-based Ether (이더리움 기반의 이더를 사용한 법원 경매 시스템에 관한 연구)

  • Kim, Hyo-Jong;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.2
    • /
    • pp.31-40
    • /
    • 2021
  • Blockchain technology is also actively studied in the real estate transaction field, and real estate transactions have various ways. In this paper, we propose a model that simplifies the authentication procedure of auction systems using Ethereum's Ether to solve the problem of offline court auctions. The proposed model is written in Ethereum's Solidity language, the court registers the sale date and the sale date with the DApp browser, and the bidder accesses the address of the individual's wallet created through Metamask's private key. The bidder then selects the desired sale and enters the bid price amount to participate in the auction. The bidder's record of the highest bid price for the sale he wants is written on the Ethereum test network as a smart contract. and creates a block. Finally, smart contracts written on the network are distributed by the court auction manager to all nodes in the blockchain network, and each node in the blockchain network can be viewed and contract verified. As a result of analyzing the smart contracts of the proposed model and the performance of the system, there are fees incurred due to the creation and use of Ether on platforms using Ethereum, and participation. Ether's changes in value affect the price of the sale, resulting in inconsistent fees in smart contracts each time. However, in future work, we issue our own tokens to solve the market volatility problem and commission problem with the value change of Ether, and refine complex court auction systems.

A Study on the Development of a Training Course for Ship Cyber Security Officers (선박 사이버보안 책임자를 위한 교육과정 개발에 관한 연구)

  • Lee, Eunsu;Ahn, Young-Joong;Park, Sung-ho
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.26 no.7
    • /
    • pp.830-837
    • /
    • 2020
  • With the rapid development of information and communication technology, information exchange between ships and shore has become faster and more convenient, However, accessing ship information has also become easier and concerns about cyber security attacks are growing. When a ship suffers a cyber-attack, it may cause considerable damage and incurs enormous costs and time to repair. In response to this threat, the maritime industry now demands that a cyber security officer be assigned to each ship to take charge of cyber security management onboard. In order to reduce the damage cause by an attack and to respond effectively, a specialized training course for the ship's cyber security officer is required. The purpose of this study was to present a training course for the position of the ship's cyber security officer, and to highlight the necessity of amending current legislation, To this end, domestic and foreign trends, ship cyber security incident cases, and cyber security training courses were investigated, and based on the results a standard training course for a ship's cyber security of icer was developed. Additionally, recommendations on the related amendments to legislation ware established. The results of the study can be used as basic data to establish future training courses for cyber security officers.

Applying a smart livestock system as a development strategy for the animal life industry in the future: A review (미래 동물생명산업 발전전략으로써 스마트축산의 응용: 리뷰)

  • Park, Sang-O
    • Journal of the Korean Applied Science and Technology
    • /
    • v.38 no.1
    • /
    • pp.241-262
    • /
    • 2021
  • This paper reviewed the necessity of a information and communication technology (ICT)-based smart livestock system as a development strategy for the animal life industry in the future. It also predicted the trends of livestock and animal food until 2050, 30 years later. Worldwide, livestock raising and consumption of animal food are rapidly changing in response to population growth, aging, reduction of agriculture population, urbanization, and income growth. Climate change can change the environment and livestock's productivity and reproductive efficiencies. Livestock production can lead to increased greenhouse gas emissions, land degradation, water pollution, animal welfare, and human health problems. To solve these issues, there is a need for a preemptive future response strategy to respond to climate change, improve productivity, animal welfare, and nutritional quality of animal foods, and prevent animal diseases using ICT-based smart livestock system fused with the 4th industrial revolution in various aspects of the animal life industry. The animal life industry of the future needs to integrate automation to improve sustainability and production efficiency. In the digital age, intelligent precision animal feeding with IoT (internet of things) and big data, ICT-based smart livestock system can collect, process, and analyze data from various sources in the animal life industry. It is composed of a digital system that can precisely remote control environmental parameters inside and outside the animal husbandry. The ICT-based smart livestock system can also be used for monitoring animal behavior and welfare, and feeding management of livestock using sensing technology for remote control through the Internet and mobile phones. It can be helpful in the collection, storage, retrieval, and dissemination of a wide range of information that farmers need. It can provide new information services to farmers.

IoT data processing techniques based on machine learning optimized for AIoT environments (AIoT 환경에 최적화된 머신러닝 기반의 IoT 데이터 처리 기법)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • Journal of Industrial Convergence
    • /
    • v.20 no.3
    • /
    • pp.33-40
    • /
    • 2022
  • Recently, IoT-linked services have been used in various environments, and IoT and artificial intelligence technologies are being fused. However, since technologies that process IoT data stably are not fully supported, research is needed for this. In this paper, we propose a processing technique that can optimize IoT data after generating embedded vectors based on machine learning for IoT data. In the proposed technique, for processing efficiency, embedded vectorization is performed based on QR such as index of IoT data, collection location (binary values of X and Y axis coordinates), group index, type, and type. In addition, data generated by various IoT devices are integrated and managed so that load balancing can be performed in the IoT data collection process to asymmetrically link IoT data. The proposed technique processes IoT data to be orthogonalized based on hash so that IoT data can be asymmetrically grouped. In addition, interference between IoT data may be minimized because it is periodically generated and grouped according to IoT data types and characteristics. Future research plans to compare and evaluate proposed techniques in various environments that provide IoT services.

A Study on Improving the Data Quality Validation of Underground Facilities(Structure-type) (지하시설물(구조물형) 데이터 품질검증방법 개선방안 연구)

  • Bae, Sang-Keun;Kim, Sang-Min;Yoo, Eun-Jin;Im, Keo-Bae
    • Journal of Cadastre & Land InformatiX
    • /
    • v.51 no.2
    • /
    • pp.5-20
    • /
    • 2021
  • With the available national spatial information that started from the sinkholes that occurred nationwide in 2014 and integrated 15 areas of underground information, the Underground Spatial Integrated Map has been continuously maintained since 2015. However, until recently, as disasters and accidents in underground spaces such as hot water pipes rupture, cable tunnel fires, and ground subsidence continue to occur, there is an increasing demand for quality improvement of underground information. Thus, this paper attempted to prepare a plan to improve the quality of the Underground Spatial Integrated Map data. In particular, among the 15 types of underground information managed through the Underground Spatial Integrated Map, quality validation improvement measures were proposed for underground facility (structure-type) data, which has the highest proportion of new constructions. To improve the current inspection methods that primarily rely on visual inspection, we elaborate on and subdivide the current quality inspection standards. Specifically, we present an approach for software-based automated inspection of databases, including graphics and attribute information, by adding three quality inspection items, namely, quality inspection methods, rules, and flow diagram, solvable error types, to the current four quality inspection items consisting of quality elements, sub-elements, detailed sub-elements, and quality inspection standards.

Development of LoRa IoT Automatic Meter Reading and Meter Data Management System for Smart Water Grid (스마트워터그리드를 위한 LoRa IoT 원격검침 및 계량데이터 시스템 개발)

  • Park, Jeong-won;Park, Jae-sam
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.3
    • /
    • pp.172-178
    • /
    • 2022
  • In this paper, water meter AMR(automatic meter reading), one of the core technologies of smart water grid, using LoRa IoT network is studied. The main content of the research is to develop the network system and show the test results that one PC server receives the readings of water meters from multiple households through LoRa communication and stores them in the database, and at the same time sends the data to the web server database through internet. The system also allows users to monitor the meter readings using their smartphones. The hardware and firmware of the main board of the digital water meter are developed. For a PC server program, MDMS(meter data management system) is developed using Visual C#. The app program running on the user's smartphone is also developed using Android Studio. By connecting each developed parts, the total network system is mounted on a flow test bench in the laboratory and tested. For the fields test, 5 places around the university are selected and the transmission distances are tested. The test result show that the developed system can be applied into the real field. The developed system can be expanded to various social safety nets such as monitoring the living alone or elderly with dementia.

A Performance Study on CPU-GPU Data Transfers of Unified Memory Device (통합메모리 장치에서 CPU-GPU 데이터 전송성능 연구)

  • Kwon, Oh-Kyoung;Gu, Gibeom
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.5
    • /
    • pp.133-138
    • /
    • 2022
  • Recently, as GPU performance has improved in HPC and artificial intelligence, its use is becoming more common, but GPU programming is still a big obstacle in terms of productivity. In particular, due to the difficulty of managing host memory and GPU memory separately, research is being actively conducted in terms of convenience and performance, and various CPU-GPU memory transfer programming methods are suggested. Meanwhile, recently many SoC (System on a Chip) products such as Apple M1 and NVIDIA Tegra that bundle CPU, GPU, and integrated memory into one large silicon package are emerging. In this study, data between CPU and GPU devices are used in such an integrated memory device and performance-related research is conducted during transmission. It shows different characteristics from the existing environment in which the host memory and GPU memory in the CPU are separated. Here, we want to compare performance by CPU-GPU data transmission method in NVIDIA SoC chips, which are integrated memory devices, and NVIDIA SMX-based V100 GPU devices. For the experimental workload for performance comparison, a two-dimensional matrix transposition example frequently used in HPC applications was used. We analyzed the following performance factors: the difference in GPU kernel performance according to the CPU-GPU memory transfer method for each GPU device, the transfer performance difference between page-locked memory and pageable memory, overall performance comparison, and performance comparison by workload size. Through this experiment, it was confirmed that the NVIDIA Xavier can maximize the benefits of integrated memory in the SoC chip by supporting I/O cache consistency.

A Study on the Blockchain-Based Access Control Using Random-List in Industrial Control System (산업제어시스템에서 랜덤리스트를 이용한 블록체인 기반 접근제어 방식에 관한 연구)

  • Kang, Myung Joe;Kim, Mi Hui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.5
    • /
    • pp.147-156
    • /
    • 2022
  • Industrial control systems that manage and maintain various industries were mainly operated in closed environment without external connection, but with the recent development of the Internet and the introduction of ICT technology, the access to the industrial control system of external or attackers has become easier. Such incorrect approaches or attacks can undermine the availability, a major attribute of the industrial control system, and violation of availability can cause great damage. In this paper, when issuing commands in an industrial control system, a verification group is formed using a random list to verify and execute commands, and a trust score technique is introduced that applies feedback to the verification group that conducted verification using the command execution result. This technique can reduce overhead generated by random generation in the process of requesting command verification, give flexibility to the verification process, and ensure system availability. For the performance analysis of the system, we measured the time and gas usage when deploying a smart contract, gas usage when verifying a command. As a result, we confirmed that although the proposed system generates a random list compared to the legacy system, there was little difference in the time when it took to deploy smart contract and that the gas used to deploy smart contract increased by about 1.4 times in the process of generating a random list. However, the proposed system does not perform random operations even though the operation of command verification and confidence score technique is performed together during the command verification process, thus it uses about 9% less gas per verification, which ensures availability in the verification process.

A study on the correction of the connection part of the underground facility 3D model and the correction of irregularities (지하시설물 3차원 모델 연결부 보정 및 요철보정에 관한 연구)

  • Kim, Sung Su;Han, Kyu Won;Heo, Sung Seo;Han, Sang Hoon
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.39 no.6
    • /
    • pp.429-435
    • /
    • 2021
  • The integrated underground space map shows the underground facility(water supply, sewage, gas, electric power, communication, heating), underground structures (subway, underpass, underground walkway, underground parking lot, underground shopping mall, common ward), ground(drilling, coffin, geology) refers to a map constructed so that a total of 15 types of underground information can be checked at a glance on a three-dimensional basis. The purpose of this study is to develop a technology to correct the problem of curved surface processing and the unevenness of underground facility pipelines that occur in converting 2D underground facility data into 3D-based underground space integrated map(3D underground facility model). do it with. To this end, we first investigated and reviewed the domestic and foreign status of technologies that generate data on underground facilities based on three dimensions, and developed a surface correction algorithm and an unevenness correction algorithm to solve practical problems. Algorithms to verify the developed algorithm This applied correction program was developed. Based on the above process, the three-dimensional model of the underground facility could be produced identically to reality. This study is judged to have significance as a basic study to improve the utilization of the underground spatial integration map.