• Title/Summary/Keyword: Component-based System

Search Result 2,676, Processing Time 0.036 seconds

Visual Programming Environment for Effective Teaching and Research in Image Processing (영상처리에서 효율적인 교육과 연구를 위한 비주얼 프로그래밍 환경 개발)

  • Lee Jeong Heon;Heo Hoon;Chae Oksam
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.1
    • /
    • pp.50-61
    • /
    • 2005
  • With the wide spread use of multimedia device, the demand for the image processing engineers are increasing in various fields. However there are few engineers who can develop practical applications in the image processing area. To teach practical image processing techniques, we need a visual programming environment which can efficiently present the image processing theories and, at the same time, provide interactive experiments for the theory presented. In this paper, we propose a visual programming environment of the integrated environment for image processing. It consists of the theory presentation systems and experiment systems based on the visual programming environment. The theory presentation systems support multimedia data, web documents and powerpoint files. The proposed system provides an integrated environment for application development as well as education. The proposed system accumulates the teaching materials and exercise data and it manages, an ideal image processing education and research environment to students and instructors.

The application study of preventive maintenance during normal operation for APR1400 nuclear power plants considering risk

  • Jung-Wun Kim;YoungJu Lee;Weon Gyu Shin
    • Nuclear Engineering and Technology
    • /
    • v.56 no.10
    • /
    • pp.4327-4334
    • /
    • 2024
  • Preventive Maintenance(PM) for safety component during power operation at nuclear power plants, On-Line Maintenance(OLM) refers to intentionally entering the Limited Condition of Operation(LCO) specified in the Technical Specification(TS) for safety-related systems and components in order to perform preventive maintenance within the Allowed Outage Time (AOT). This study assessed the feasibility of conducting OLM at the domestic APR1400 nuclear power plant. It focused on preventive maintenance duration and risk perspectives. A total of 78 FEGs were developed for 4450 facilities, considering system functions and preventive maintenance scope during output operation for eight safety-related systems. Additionally, maintenance items included in FEGs were selected, designated as targets for OLM, and their maintenance durations were evaluated and compared with AOT for each maintenance item. As a result, the Auxiliary Feedwater and Essential Chilled Water systems were identified as systems allowing OLM. Furthermore, utilizing the Risk Monitoring System (RIMS), the increased risk value due to the unavailability of target equipment during preventive maintenance was analyzed to determine whether it falls within the acceptable range. Regarding the temporary risk increase caused by OLM, it was observed that in all systems, it falls within Zone III according to NUMARC93-01 standards, allowing for normal equipment arrangement for OLM. However, according to the risk increase standards rate in domestic nuclear power plants, when maintaining the A-train in four systems including Component Cooling Water, they are all evaluated as 'Orange,' indicating that measures for risk mitigation are necessary for OLM to be feasible. When considering extending AOT up to 1.6 times the maintenance time, the risk increase falls within Zone III according to permissible change in risk standards, indicating that AOT extension might be feasible based solely on risk changes. To apply OLM within the permissible risk management scope in domestic nuclear power plants, regulatory policies need to allow voluntary LCO entry for preventive maintenance, necessitating clear determination by regulatory agencies using risk-informed policies. While OLM seems viable concerning maintenance duration and quantitative risk aspects, for inducing regulatory policy changes, comprehensive OLM guidelines are necessary, including risk management strategies.

Web Learning Systems Development based on Product Line (프로덕트 라인 기반의 웹 학습 시스템 개발)

  • Kim Haeng-Hon;Kim Su-Youn
    • The KIPS Transactions:PartD
    • /
    • v.12D no.4 s.100
    • /
    • pp.589-600
    • /
    • 2005
  • Application developers need effective reuseable methodology to meet rapidly changes and variety of users requirements. Product Line and CBD(Component Based Development) offer the great benefits on quality and productivity for developing the software that is mainly associate with reusable architectures and components in a specific domain and rapidly changing environments. Product line can dynamically focus on the commonality and variety feature model among the products. The product line uses the feature modeling for discovering, analyzing, and mediating interactions between products. Reusable architectures include many variety plans and mechanisms. In case of those architecture are use in product version for a long time, It is very important in architecture product line context for product line design phase. Application developer need to identify the proper location of architecture changing for variety expression. It is lack of specific variety managements to design the product line architecture until nowdays. In this paper, we define various variety types to identify the proper location of architecture changing for variety expression and to design the reusable architecture. We also propose architecture variety on feature model and describe variety expression on component relations. We implemented the web learning system based on the methodology. We finally describe how these methodology may assist in increasing the efficiency, reusability, productivity and quality to develop an application. In the future, we are going to apply the methodology into various domain and suggest international and domestic's standardization.

Study on security requirements for the web based operation system of a shipping company (웹 기반 해운 선사 운영시스템 보안 요구사항 연구)

  • Chung, Up;Moon, Jongsub
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.49-68
    • /
    • 2022
  • The operation system of a shipping company is still maintaining the mainframe based terminal access environment or the client/server based environment. Nowadays shipping companies that try to migrate it into a web-based environment are increasing. However, in the transition, if the design is processed by the old configuration and knowledge without considering the characteristics of the web-based environment and shipping business, various security vulnerabilities will be revealed at the actual system operation stage, and system maintenance costs to fix them will increase significantly. Therefore, in the transition to a web-based environment, a security design must be carried out from the design stage to ensure system safety and to reduce security-related maintenance costs in the future. This paper examines the characteristics of various threat modeling techniques, selects suitable modeling technique for the operation system of a shipping company, applies data flow diagram and STRIDE threat modeling technique to shipping business, derives possible security threats from each component of the data flow diagram in the attacker's point of view, validates the derived threats by mapping them with attack library items, represents the attack tree having various attack scenarios that attackers can attempt to achieve their final goals, organizes into the checklist that has security check items, associated threats and security requirements, and finally presents 23 security requirements that can respond to threats. Unlike the existing general security requirements, the security requirements presented in this paper reflect the characteristics of shipping business because they are derived by analyzing the actual business of a shipping company and applying threat modeling technique. Therefore, I think that the presented security requirements will be of great help in the security design of shipping companies that are trying to proceed with the transition to a web-based environment in the future.

Effect of Anodized Carbon Fiber Surfaces on Interfacial Adhesion of Carbon Fiber-reinforced Composites (양극산화된 탄소섬유가 복합재료의 계면결합력에 미치는 영향)

  • 박수진;김문한;최선웅;이재락
    • Polymer(Korea)
    • /
    • v.24 no.4
    • /
    • pp.499-504
    • /
    • 2000
  • The effect of anodic oxidation on high strength PAN-based carbon fibers has been studied in terms of surface functionality and surface energetics of the fiber surfaces, resulting in improving the mechanical properties of composites. According to FT-IR and XPS measurements, it reveals that the oxygen functional groups on fiber surfaces induced by an anodic oxidation largely influence the surface energetics of fibers or the mechanical interfacial properties of composites, such as the interlaminar shear strength (ILSS) of composites. According to the contact angle measurements based on the wicking rate of a test liquid, it is observed that anodic oxidation does lead to an increase in surface free energy of the carbon fibers, mainly due to the increase of its specific (or polar) component. From the surface energetic point of view, it is found that good wetting plays an important role in improving the degree of adhesion at interfaces between fiber and epoxy resin matrix of the resulting composites. Also, a direct linear relationship is shown between 01s/01s ratio and ILSS or between specific component and ILSS of the composites for this system.

  • PDF

A Study on Gesture Recognition using Edge Orientation Histogram and HMM (에지 방향성 히스토그램과 HMM을 이용한 제스처 인식에 관한 연구)

  • Lee, Kee-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.12
    • /
    • pp.2647-2654
    • /
    • 2011
  • In this paper, the algorithm that recognizes the gesture by configuring the feature information obtained through edge orientation histogram and principal component analysis as low dimensional gesture symbol was described. Since the proposed method doesn't require a lot of computations compared to the existing geometric feature based method or appearance based methods and it can maintain high recognition rate by using the minimum information, it is very well suited for real-time system establishment. In addition, to reduce incorrect recognition or recognition errors that occur during gesture recognition, the model feature values projected in the gesture space is configured as a particular status symbol through clustering algorithm to be used as input symbol of hidden Markov models. By doing so, any input gesture will be recognized as the corresponding gesture model with highest probability.

Product Family Design based on Analytic Network Process (Analytic Network Process에 기초한 제품가족 디자인)

  • Kim, Tai-Oun
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.1-17
    • /
    • 2011
  • In order to maintain customer satisfaction and to remain productive and efficient in today's global competition, mass customization is adopted in many leading companies. Mass customization through product family and product platform enables companies to develop new products with flexibility, efficiency and quick responsiveness. Thus, product family strategy based on product platform is well suited to realize the mass customization. Product family is defined as a group of related products that share common features, components, and subsystems; and satisfy a variety of market niches. The objective is to propose a product family design strategy that provides priority weights among product components by satisfying customer requirements. The decision making process for a new product development requires a multiple criteria decision making technique with feedback. An analytical network process is adopted for the decision making modeling and procedure. For the implementation, a netbook product known as a small PC which is appropriate for the product family model is adopted. According to the proposed architecture, the priority weight of each component for each product family is derived. The relationship between the customer requirement and product component is analyzed and evaluated using QFD model.

Application of Concurrent Engineering for Conceptual design of a Future Main Battle Tank (차세대 주력전차의 개념설계를 위한 동시공학의 적용)

  • 김진우;소한균
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.2 no.1
    • /
    • pp.38-60
    • /
    • 1999
  • The main objective of this study is systemization of the technique of ROC quantification and optimization of baseline design by applying CE principle to the acquisition process of a weapon system. QFD and TOA techniques can be employed to a good working example of the conceptual design of a future main battle tank. In this paper, Product Planning Phase, the first phase of four QFD phases, is deployed in terms of eight steps including customer requirements and final product control characteristics. TOA is carried out considering only combat weight. In order to perform combat weight analysis and performance TOA, Preliminary Configuration Synthesis Methodology is used. Preliminary Configuration Synthesis Methodology employs the method of least squares and described linear equations of weight interrelation equation for each component of tank. As a result of QFD based upon the ROC, it was cleared that armor piercing power, main armament, type of ammunition, cruising range, combat weight, armor protection, power loading, threat detection and cost are primary factors influencing design and that combat weight is the most dominant one. The results of TOA based on the combat weight constraint show that 5100 lb reduction was required to satisfy the ROC. The baseline design of a future main battle tank is illustrated with assumption that all phases of QFD are employed to development and production process of subsystems, components, and parts of main battle tank. TOA is applied in iterative process between initial baseline design and ROC. The detailed design of each component is illustrated for a future main battle tank.

  • PDF

Performance of an Adaptive D2D Channel Modeling Scheme for Satellite Wireless Package Systems (이동단말용 위성 통신 무선 패키지 시스템을 위한 적응적 D2D 채널 모델링 기법의 성능)

  • Hwang, Yu Min;Cha, Jae Sang;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.1
    • /
    • pp.17-21
    • /
    • 2015
  • In this paper, we introduce satellite communication for new wireless disaster network to be built on the basis of amateur radio HR (HAM Radio) as a wireless package system, and channel environments of a D2D terminal that tries to connect and communicate with the wireless disaster network. In this disaster network, we propose a LOS component ratio based adaptive channel modeling approach to accurately estimate a variety of channels whose the D2D terminal could have and smoothly transfer to the level of multimedia data based on the Okumura-Hata channel model. As a result of computer simulation, performance of the proposed method was compared with the that of Okumura-Hata model of open area and urban area model and we were confirmed that there is a gain of BER performance from the results of the computer simulation.

A Study on Eigenspace Face Recognition using Wavelet Transform and HMM (웨이블렛 변환과 HMM을 이용한 고유공간 기반 얼굴인식에 관한 연구)

  • Lee, Jung-Jae;Kim, Jong-Min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2121-2128
    • /
    • 2012
  • This paper proposed the real time face area detection using Wavelet transform and the strong detection algorithm that satisfies the efficiency of computation and detection performance at the same time was proposed. The detected face image recognizes the face by configuring the low-dimensional face symbol through the principal component analysis. The proposed method is well suited for real-time system construction because it doesn't require a lot of computation compared to the existing geometric feature-based method or appearance-based method and it can maintain high recognition rate using the minimum amount of information. In addition, in order to reduce the wrong recognition or recognition error occurred during face recognition, the input symbol of Hidden Markov Model is used by configuring the feature values projected to the unique space as a certain symbol through clustering algorithm. By doing so, any input face will be recognized as a face model that has the highest probability. As a result of experiment, when comparing the existing method Euclidean and Mahananobis, the proposed method showed superior recognition performance in incorrect matching or matching error.