• Title/Summary/Keyword: Computer operation

Search Result 4,108, Processing Time 0.039 seconds

Analysis of Operation System Establishment Cases for Efficient use of Risk Assessment at Construction Sites - H Focusing on Construction Company Cases (건설현장의 위험성평가 효율적 활용을 위한 운영 시스템 구축사례 분석 - H 건설사 사례중심으로)

  • Jae-Bung Lee
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.4
    • /
    • pp.828-838
    • /
    • 2022
  • Purpose: Through the establishment of a computerized system of risk assessment, the purpose is to analyze the case of whether the co-workers who are subject to the risk assessment at the construction site can easily fill it out and expect disaster reduction through efficient risk assessment activities. Method: By providing the risk factors and safety measures for the work by selecting the type of work, the risk estimation and the establishment of countermeasures can be made, and a system has been established to enable practical disaster prevention activities by presenting disaster cases for the work. Result: Through the analysis of the change in the scaled disaster rate for the years following the on-site application after the establishment of the risk assessment computer system of H Construction Company, it was confirmed that the scaled disaster rate of the domestic construction industry increased, while the conversion disaster rate of H Construction Company decreased. Conclusion: Through the computational systemization of risk assessments, workers in the field can easily access the risk assessment, evaluate the risk factors of the process and establish risk prevention measures, and it has been analyzed that there is an impact on the reduction of the disaster rate during the operational analysis period.

Design and Implementation of Real-time Digital Twin in Heterogeneous Robots using OPC UA (OPC UA를 활용한 이기종 로봇의 실시간 디지털 트윈 설계 및 구현)

  • Jeehyeong Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.4
    • /
    • pp.189-196
    • /
    • 2023
  • As the manufacturing paradigm shifts, various collaborative robots are creating new markets. Demand for collaborative robots is increasing in all industries for the purpose of easy operation, productivity improvement, and replacement of manpower who do simple tasks compared to existing industrial robots. However, accidents frequently occur during work caused by collaborative robots in industrial sites, threatening the safety of workers. In order to construct an industrial site through robots in a human-centered environment, the safety of workers must be guaranteed, and there is a need to develop a collaborative robot guard system that provides reliable communication without the possibility of dispatch. It is necessary to double prevent accidents that occur within the working radius of cobots and reduce the risk of safety accidents through sensors and computer vision. We build a system based on OPC UA, an international protocol for communication with various industrial equipment, and propose a collaborative robot guard system through image analysis using ultrasonic sensors and CNN (Convolution Neural Network). The proposed system evaluates the possibility of robot control in an unsafe situation for a worker.

Log Collection Method for Efficient Management of Systems using Heterogeneous Network Devices (이기종 네트워크 장치를 사용하는 시스템의 효율적인 관리를 위한 로그 수집 방법)

  • Jea-Ho Yang;Younggon Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.119-125
    • /
    • 2023
  • IT infrastructure operation has advanced, and the methods for managing systems have become widely adopted. Recently, research has focused on improving system management using Syslog. However, utilizing log data collected through these methods presents challenges, as logs are extracted in various formats that require expert analysis. This paper proposes a system that utilizes edge computing to distribute the collection of Syslog data and preprocesses duplicate data before storing it in a central database. Additionally, the system constructs a data dictionary to classify and count data in real-time, with restrictions on transmitting registered data to the central database. This approach ensures the maintenance of predefined patterns in the data dictionary, controls duplicate data and temporal duplicates, and enables the storage of refined data in the central database, thereby securing fundamental data for big data analysis. The proposed algorithms and procedures are demonstrated through simulations and examples. Real syslog data, including extracted examples, is used to accurately extract necessary information from log data and verify the successful execution of the classification and storage processes. This system can serve as an efficient solution for collecting and managing log data in edge environments, offering potential benefits in terms of technology diffusion.

Improvement of Encoding Detection Algorithm for Multi-byte Encoded Data with Errors (오류가 발생한 멀티바이트 인코딩 데이터의 인코딩 기법 판별 알고리즘 개선)

  • Bae, Junwoo;Kim, Seonbeom;Park, Heejin
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.2
    • /
    • pp.18-25
    • /
    • 2017
  • In computer science, an encoding is a standardization of converting information to one format for audio, video or text. Therefore, the encoding information of the data should be known to open and read it and there are algorithms detecting encoder of the data. However, some informations of data could be disappeared by packet loss when transmitted on network, especially, if the data is snatched by packet sniffing or eavesdropping from wireless communications. In this paper, we improve the performance of encoding detection algorithm of 'uchardet' program for multi-byte encoded data with errors based on bit-shift algorithm. To simulate the performance, we generated Korean and Japanese text data with errors that is removed some random bits at random positions. Then the detection algorithm are tested using the data and 'uchardet-bitshift' showed better performance than 'uchardet'. When Korean texts are used, 'uchardet' could detect perfectly with ≤0.005% errors but it showed 0% detection rate with ≥1% errors while 'uchardet-bitshift' detected perfectly with ≤0.05% errors and it showed correct detection cases with ≥1% errors. Japanese texts with errors tend to report falsely as Chinese encoding because Japanese texts include lots of Chinese characters. As a results, we improved encoding detection algorithms by applying bit shift operation.

Review of International Cases for Managing Input Data in Safety Assessment for High-Level Radioactive Waste Deep Disposal Facilities (고준위방사성폐기물 심층처분시설 안전성평가 입력자료 관리를 위한 해외사례 분석)

  • Mi Kyung Kang;Hana Park;Sunju Park;Hae Sik Jeong;Woon Sang Yoon;Jeonghwan Lee
    • Economic and Environmental Geology
    • /
    • v.56 no.6
    • /
    • pp.887-897
    • /
    • 2023
  • Leading waste disposal countries, such as Sweden, Switzerland, and the United Kingdom, conduct safety assessments across all stages of High-Level Radioactive Waste Deep Geological Disposal Facilities-from planning and site selection to construction, operation, closure, and post-closure management. As safety assessments are repeatedly performed at each stage, generating vast amounts of diverse data over extended periods, it is essential to construct a database for safety assessment and establish a data management system. In this study, the safety assessment data management systems of leading countries, were analyzed, categorizing them into 1) input and reference data for safety assessments, 2) guidelines for data management, 3) organizational structures for data management, and 4) computer systems for data management. While each country exhibited differences in specific aspects, commonalities included the classification of safety assessment input data based on disposal system components, the establishment of organizations to supply, use, and manage this data, and the implementation of quality management systems guided by instructions and manuals. These cases highlight the importance of data management systems and document management systems for securing the safety and enhancing the reliability of High-Level Radioactive Waste Disposal Facilities. To achieve this, the classification of input data that can be flexibly and effectively utilized, ensuring the consistency and traceability of input data, and establishing a quality management system for input data and document management are necessary.

Research on Security System for Safe Communication in Maritime Environment (해상환경에서 안전한 통신을 위한 보안체계 연구)

  • Seoung-Pyo Hong;Hoon-Jae Lee;Young-Sil Lee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.5
    • /
    • pp.21-27
    • /
    • 2023
  • As a means of helping ships navigate safely, navigational aids in operation in the maritime envirionment require periodic management, and due to the nature of the environment, it is difficult to visually check the exact state. As a result, the smart navigation aid system, which improves route safety and operational efficiency, utillizes expertise including sensors, communications, and information technology, unlike general route markings. The communication environment of the smart navigation aid system, which aims to ensure the safety of the navigators operating the ship and the safety of the ship, uses a wireless communication network in accordance with the marine environment. The ship collects the information necessary for the maritime environment on the land and operates. In this process, there is a need to consider the wireless communication security guideline. Basically, based on IHO S-100 a standard for facilitating data exchange and SECOM, which provides an interface for safe communication. This paper research a security system for safe communication in a maritime environment. The security system for the basic interface based on the document was presented, and there were some vulnerabillties to data exchange due to the wireless communication characteristics of the maritime environment, and the user authetication part was added considering the vulnerability that unauthorized users can access the service.

A Study on Application Methodology of SPDL Based on IEC 62443 Applicable to SME Environment (중소기업환경에서 적용 가능한 IEC 62443 기반의 개발 보안 생애주기 프로세스 적용 방안 연구)

  • Jin, Jung Ha;Park, SangSeon;Kim, Jun Tae;Han, Keunhee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.6
    • /
    • pp.193-204
    • /
    • 2022
  • In a smart factory environment in a small and medium-sized enterprise (SME) environment, sensors and actuators operating on actual manufacturing lines, programmable logic controllers (PLCs) to manage them, human-machine interface (HMI) to control and manage such PLCs, and consists of operational technology server to manage PLCs and HMI again. PLC and HMI, which are in charge of control automation, perform direct connection with OT servers, application systems for factory operation, robots for on-site automation, and production facilities, so the development of security technology in a smart factory environment is demanded. However, smart factories in the SME environment are often composed of systems that used to operate in closed environments in the past, so there exist a vulnerable part to security in the current environment where they operate in conjunction with the outside through the Internet. In order to achieve the internalization of smart factory security in this SME environment, it is necessary to establish a process according to the IEC 62443-4-1 Secure Product Development Life cycle at the stage of smart factory SW and HW development. In addition, it is necessary to introduce a suitable development methodology that considers IEC 62443-4-2 Component security requirements and IEC 62443-3 System security requirements. Therefore, this paper proposes an application plan for the IEC 62443 based development security process to provide security internalization to smart factories in an SME environment.

Effective Multi-Modal Feature Fusion for 3D Semantic Segmentation with Multi-View Images (멀티-뷰 영상들을 활용하는 3차원 의미적 분할을 위한 효과적인 멀티-모달 특징 융합)

  • Hye-Lim Bae;Incheol Kim
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.12
    • /
    • pp.505-518
    • /
    • 2023
  • 3D point cloud semantic segmentation is a computer vision task that involves dividing the point cloud into different objects and regions by predicting the class label of each point. Existing 3D semantic segmentation models have some limitations in performing sufficient fusion of multi-modal features while ensuring both characteristics of 2D visual features extracted from RGB images and 3D geometric features extracted from point cloud. Therefore, in this paper, we propose MMCA-Net, a novel 3D semantic segmentation model using 2D-3D multi-modal features. The proposed model effectively fuses two heterogeneous 2D visual features and 3D geometric features by using an intermediate fusion strategy and a multi-modal cross attention-based fusion operation. Also, the proposed model extracts context-rich 3D geometric features from input point cloud consisting of irregularly distributed points by adopting PTv2 as 3D geometric encoder. In this paper, we conducted both quantitative and qualitative experiments with the benchmark dataset, ScanNetv2 in order to analyze the performance of the proposed model. In terms of the metric mIoU, the proposed model showed a 9.2% performance improvement over the PTv2 model using only 3D geometric features, and a 12.12% performance improvement over the MVPNet model using 2D-3D multi-modal features. As a result, we proved the effectiveness and usefulness of the proposed model.

Receiving System Design of ILS Navigation Signal Using SDR (SDR을 이용한 ILS 항행신호 수신 시스템 설계)

  • Minsung Kim;Ji-hye Kang;Kyung Heon Koo;Kyung-Soon Lee
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.3
    • /
    • pp.254-261
    • /
    • 2024
  • Accurate guidance during landing and take-off is important, and instrument landing system (ILS) has been used for stability and verification. Regular inspections are conducted for stable operation, and there is research to perform inspection using drones in addition to ground vehicles and measurement aircraft. Using SDR and single board computer, which can receive wide frequency range, we designed a small system that receives and processes localizer signals through GNU Radio. To check signal processing characteristics through GNU Radio, we simulated with MATLAB Simulink and confirmed the theoretical values. Difference in depth of modulation (DDM) and approach angle can be calculated when the aircraft enters the runway. And GNU Radio implemented real-time signal processing wirelessly using transmission control protocol (TCP). This gives the results within the error of 0.5% when the aircraft entered the runway center line and 0.27% for the angle of 1° degree. Compared to the inspecting and maintaining ILS signals using aircraft or ground vehicles, it is possible to implement a receiving system using small SDR that can be mounted for drone.

Design and Implementation of Game Server using the Efficient Load Balancing Technology based on CPU Utilization (게임서버의 CPU 사용율 기반 효율적인 부하균등화 기술의 설계 및 구현)

  • Myung, Won-Shig;Han, Jun-Tak
    • Journal of Korea Game Society
    • /
    • v.4 no.4
    • /
    • pp.11-18
    • /
    • 2004
  • The on-line games in the past were played by only two persons exchanging data based on one-to-one connections, whereas recent ones (e.g. MMORPG: Massively Multi-player Online Role-playings Game) enable tens of thousands of people to be connected simultaneously. Specifically, Korea has established an excellent network infrastructure that can't be found anywhere in the world. Almost every household has a high-speed Internet access. What made this possible was, in part, high density of population that has accelerated the formation of good Internet infrastructure. However, this rapid increase in the use of on-line games may lead to surging traffics exceeding the limited Internet communication capacity so that the connection to the games is unstable or the server fails. expanding the servers though this measure is very costly could solve this problem. To deal with this problem, the present study proposes the load distribution technology that connects in the form of local clustering the game servers divided by their contents used in each on-line game reduces the loads of specific servers using the load balancer, and enhances performance of sewer for their efficient operation. In this paper, a cluster system is proposed where each Game server in the system has different contents service and loads are distributed efficiently using the game server resource information such as CPU utilization. Game sewers having different contents are mutually connected and managed with a network file system to maintain information consistency required to support resource information updates, deletions, and additions. Simulation studies show that our method performs better than other traditional methods. In terms of response time, our method shows shorter latency than RR (Round Robin) and LC (Least Connection) by about 12%, 10% respectively.

  • PDF