• Title/Summary/Keyword: 프로세스 제어

Search Result 500, Processing Time 0.024 seconds

Modeling and Analysis of Fine Particle Behavior in Ar Plasma (모델링을 통한 Ar 플라즈마 중의 미립자 운동에 관한 연구)

  • 임장섭;소순열
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.18 no.1
    • /
    • pp.52-59
    • /
    • 2004
  • Recently, many researches for fine particles plasma have been focused on the fabrication of the new devices and materials in micro-electronic industry, although reduction or elimination of fine particles was interested in plasma processing until now on. In order to enhance their utilization, it is necessary to control and analyze fine particle behavior. Therefore, we developed simulation model of fine particles in RF Ar plasmas. This model consists of the calculation parts of plasma structure using a two-dimensional fluid model and of fine particle behavior. The motion of fine particles was derived from the charge amount on the fine particles and forces applied to them. In this paper, Ar plasma properties using two-dimensional fluid model without fine particles were calculated at power source voltage 15[V] and pressure 0.5[Torr]. Time-averaged spatial distributions of Ar plasma were shown. The process on the formation of Coulomb crystal of fine particles was investigated and it was explained by combination of ion drag and electrostatic forces. And also analysis on the forces of fine particles was presented.

Ransomware Detection and Recovery System Based on Cloud Storage through File System Monitoring (파일 시스템 모니터링을 통한 클라우드 스토리지 기반 랜섬웨어 탐지 및 복구 시스템)

  • Kim, Juhwan;Choi, Min-Jun;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.357-367
    • /
    • 2018
  • As information technology of modern society develops, various malicious codes with the purpose of seizing or destroying important system information are developing together. Among them, ransomware is a typical malicious code that prevents access to user's resources. Although researches on detecting ransomware performing encryption have been conducted a lot in recent years, no additional methods have been proposed to recover damaged files after an attack. Also, because the similarity comparison technique was used without considering the repeated encryption, it is highly likely to be recognized as a normal behavior. Therefore, this paper implements a filter driver to control the file system and performs a similarity comparison method that is verified based on the analysis of the encryption pattern of the ransomware. We propose a system to detect the malicious process of the accessed process and recover the damaged file based on the cloud storage.

Exploring Cancer-Specific microRNA-mRNA Interactions by Evolutionary Layered Hypernetwork Models (진화연산 기반 계층적 하이퍼네트워크 모델에 의한 암 특이적 microRNA-mRNA 상호작용 탐색)

  • Kim, Soo-Jin;Ha, Jung-Woo;Zhang, Byoung-Tak
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.10
    • /
    • pp.980-984
    • /
    • 2010
  • Exploring microRNA (miRNA) and mRNA regulatory interactions may give new insights into diverse biological phenomena. Recently, miRNAs have been discovered as important regulators that play a major role in various cellular processes. Therefore, it is essential to identify functional interactions between miRNAs and mRNAs for understanding the context- dependent activities of miRNAs in complex biological systems. While elucidating complex miRNA-mRNA interactions has been studied with experimental and computational approaches, it is still difficult to infer miRNA-mRNA regulatory modules. Here we present a novel method, termed layered hypernetworks (LHNs), for identifying functional miRNA-mRNA interactions from heterogeneous expression data. In experiments, we apply the LHN model to miRNA and mRNA expression profiles on multiple cancers. The proposed method identifies cancer-specific miRNA-mRNA interactions. We show the biological significance of the discovered miRNA- mRNA interactions.

Development of A Software Tool for Automatic Trim Steel Design of Press Die Using CATIA API (CATIA API를 활용한 프레스금형 트림스틸 설계 자동화 S/W 모듈 개발)

  • Kim, Gang-Yeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.72-77
    • /
    • 2017
  • This paper focuses on the development of a supporting S/W tool for the automated design of an automotive press trim die. To define the die design process based on automation, we analyze the press die design process of the current industry and group repetitive works in the 3D modeling process. The proposed system consists of two modules, namely the template models of the trim steel parts and UI function for their auto-positioning. Four kinds of template models are developed to adapt to various situations and the rules of the interaction formula which are used for checking and correcting the directions of the datum point, datum curve, datum plane are implemented to eliminate errors. The system was developed using CATIA Knowledgeware, CAA(CATIA SDK) and Visual C++, in order for it to function as a plug-in module of CATIA V5, which is one of the major 3D CAD systems in the manufacturing industry. The developed system was tested by applying it to various panels of current automobiles and the results showed that it reduces the time-cost by 74% compared to the traditional method.

ISIS Architecture for Developing Complex Enterprise Applications (복잡한 엔터프라이즈 응용 개발을 위한 ISIS 아키텍처)

  • Jo, Eun-Hwan;Lee, Kap-Hoon;Lee, Min-Soo;Lee, Bong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.4
    • /
    • pp.392-404
    • /
    • 2010
  • Recently, as both business processes and IT systems become ever more complex. Especially, enterprise applications tend to become unmanageably complex and increasingly costly to maintain. Therefore complexity is the insidious enemy of software development. It is critical to have a methodology that recognizes and manages this enemy effectively. In this paper, we propose ISIS (Integrated System of Independent Subsystems) - the architectural style needed to develop the complex enterprise applications. The ISIS was developed to meet the challenge of reducing the complexity of a larger enterprise application today. It gives us architecture models for reducing development complexity and composite application. The enterprise application is partitioned into a collection of independent subsystems using ISIS decomposition schemes and equivalence relations. We use middleware named ISIS engine that provides a service for subsystems interoperability by enabling the integration of distributed, cross-platform subsystems. We have implemented an ITSM system that achieves our objectives, reducing development complexity, using the ISIS architecture. Finally, ISIS architecture provides greater flexibility and productivity when an organization needs either to change its business processes, or to update the underlying systems.

A Study on Instruction Method for Mutual Exclusion Using Simulation Based on Graphic (그래픽 기반 시뮬레이션을 활용한 상호배제 교육방법 연구)

  • Lee, Young-Suk;Nam, Young-Ho
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.6
    • /
    • pp.9-21
    • /
    • 2010
  • Concurrent processes come into conflict with each other when they are competing for the use of the same resources. In the case of competing processes three control problems must be faced: mutual exclusion, deadlock, and starvation. The concurrency is a subject rather difficult to understand. In addition, because concurrent programs included in most of OS texts are described by pseudocode and are not being able to execute directly, almost learners are difficult to understand behaviour of concurrent programs. The purpose of this study is to propose instruction method for mutual exclusion using SDL and MSC base on graphic. In order to verify the effectiveness of the proposed materials, we compare with materials based on pseudocode. The results indicated that the proposed materials is more effective than materials based on pseudocode in teaching-learning for mutual exclusion mechanisms.

  • PDF

A Research on Activating Factor for Cultivating a Proactive Organizational Security Culture (조직의 능동적 보안문화 형성을 위한 활성화 요인에 관한 연구)

  • Ahn, Byunggoo;Yu, Harang;Chang, Hangbae
    • Convergence Security Journal
    • /
    • v.20 no.2
    • /
    • pp.3-13
    • /
    • 2020
  • Organizations are facing a new, diverse security threat as ICT based industrial environment arises. As a way of effective countermeasure for security threat, organizations are making an effort to establish internalization of security culture, targeting a organizational members. However, members' awareness toward security receptiveness is low as inconvenience exists in business process and existing security culture focuses on controlling and regulating. Accordingly, this research desires to develop a participatory security culture which can higher the efficiency of security work process and induce members' voluntary participation. A comparative analysis on security culture related prior researches is conducted and based on a drawn components, statistical verification is accomplished. It is expected to contribute on future research on measuring a security culture level.

A Study on Molecular Dynamics Method for Improving Characteristics of Ion Implantation (이온주입 특성 개선을 위한 분자동역학적 연구)

  • Yang, Young-Joon;Lee, Chi-Woo
    • Journal of Energy Engineering
    • /
    • v.18 no.2
    • /
    • pp.125-131
    • /
    • 2009
  • Physical characteristics of metals such as hardness, wear-resistance and corrosion-resistance can be artificially controlled by ion implantation. The interaction between ion and solid surface was modeled in molecular scale and simulated by the molecular dynamics method in order to understand the ion implantation mechanism. From the microscopic point of view, the molecular behaviors were observed for improving characteristics of ion implantation. For these purposes, the implantation mechanism and the influences of incident energy, surface temperature and molecular weight were discussed in this study. As the results, the penetration probability was even decreased if incident energy was exceeded any values in the case of high temperature of solid surface. Moreover, it was confirmed that ion implantation into solid surface with amorphous state could be more effective for some conditions.

Design and Implementation of Charger Monitoring System Based on CAN Protocol (CAN 통신 기반 충전 모니터링 시스템 설계 및 구현)

  • Choo, Yeon-Gyu;Kim, Hyun-Deok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.3
    • /
    • pp.541-548
    • /
    • 2012
  • On this paper, we proposed a design rule of charger monitoring system which allow us to watch the charging status and verify it for building the electric chargers infrastructure by spread of electric vehicle. Gathering the charging status of battery by proposed system makes us to enhance the charging algorithm, to interface with BMS(Battery Management System) of electric vehicle, to control the charging process with users. Because the technology of rapid charging is dependant upon various factors such as a performance and stability of battery. We proposed the monitoring system of rapid charger based on CAN protocol that can watch a working status of rapid charger including the charging status of battery with real time and can reduce the charging time of battery with optimized status. We also implement it and evaluate its performance.

Performance improvement of Software Build through Software Configuration Management and Work Information Reporting (소프트웨어 형상관리와 작업정보 리포팅을 통한 소프트웨어 제작 성능 향상)

  • Kim, Jeong-Il;Lee, Eun-Seok
    • The KIPS Transactions:PartD
    • /
    • v.12D no.7 s.103
    • /
    • pp.1039-1048
    • /
    • 2005
  • A software configuration management(SCM) is essential for processing large scale project. The scope of SCM involves each developer's work space management, software building management, and development process control as wet] as version control. In this paper we focus on what parts should be controlled systematically for the optimized software build that is an important part of the SCM. We also analyze that to increase the efficiency of software build, what kind of configuration management information should be reported. Based on the analysis, we have actually designed and implemented a new reporting system and evaluated it. The evaluation includes comparative evaluation in efficiency based on the analysis about the related functions provided by existing tools and some additional qualitative evaluation through the questionnaires from stakeholders.