• Title/Summary/Keyword: Efficiency of operations

Search Result 1,344, Processing Time 0.04 seconds

ADS-B Joint Development for Advanced Air Mobility and General Aviation (미래항공모빌리티(AAM) 와 General Aviation 공동 ADS-B 활용)

  • Hi-Seok Yoon
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.5
    • /
    • pp.657-663
    • /
    • 2024
  • Among the components of the international standard navigation system (CNS/ATM), the role and importance of aviation surveillance are increasingly critical for enhancing the efficiency and safety of air traffic operations. Among these, the automatic dependent surveillance-broadcast (ADS-B) system has expanded its usage due to advancements in satellite navigation systems and digital data communication technologies, providing both safety and economic benefits. However, its use domestically remains limited due to infrastructure deficiencies and difficulties in system integration. This paper will examine the usage and advantages of ADS-B in advanced aviation nations, assess the necessity for effective ADS-B system implementation domestically, explore the potential joint use of ADS-B with AAM and General Aviation, and analyze expert opinions to propose a priority list for building the required national ADS-B infrastructure and operational systems.

Case Study on the Application of Chain Saw Machine for the Underground Marble Quarrying (갱내 대리석 채석을 위한 체인쏘머신 적용 사례연구)

  • Ju, Jaeyeol;Lee, Kwangpyo;Kim, Jaedong
    • Tunnel and Underground Space
    • /
    • v.23 no.3
    • /
    • pp.180-191
    • /
    • 2013
  • The purpose of this research was to find an optimal quarrying for marble by analyzing the applicability and the work efficiency of a chain saw machine newly introduced in the underground Baekwoon mine. From the test results of the physical properties of Baekwoon marble, which affects the efficiency of rock cutting, it was found to have similar physical characteristics as the ones which are now being produced in the other areas in Korea. And especially it shows isotropic property, which can be thought to be advantageous as a dimensional stone. To check the long-term quality of the marble as a stone material, several tests such as corrosion resistance test and abrasion test were carried out. It was found to be vulnerable to acid rain with decrease of weight and seismic wave velocity after applying artificial rain at pH 5.6 for 50 times. The percentage of wear from abrasion test was 22.67%. The working time and cutting speed of the chain saw machine were recorded and analyzed during the test-run at the quarry. The overall work cycle was assorted into 9 unit operations and the operating time per each unit was drawn. The operating times for the two cutting patterns, which could be possibly applicable to the work site, were compared. The results indicated that the pattern B, that the cutting sequence was set to minimize the movement of the machine, showed 6% less working hours than the pattern A, which first cuts the outer boundary. With cutting pattern analysis, the ore body in the Baekwoon mine was 3 dimensionally modeled and a quarrying plan considering the existing conditions of the marble was suggested.

An Implementation of an Intelligent Access Point System Based on a Feed Forward Neural Network for Internet of Things (사물인터넷을 위한 신경망 기반의 지능형 액세스 포인트 시스템의 구현)

  • Lee, Youngchan;Lee, SoYeon;Kim, Dae-Young
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.95-104
    • /
    • 2019
  • Various kinds of devices are used for the Internet of Things (IoT) service, and IoT devices mainly use communication technology that uses the frequency of the unlicensed band. There are several types of communication technology in the unlicensed band, but WiFi is most commonly used. Devices used for IoT services vary in computing resources from devices with limited capabilities to smartphones and provide services over wireless networks such as WiFi. Most IoT devices can't perform complex operations for network control, thus they choose a WiFi access point (AP) based on signal strength. This causes a decrease in IoT service efficiency. In this paper, an intelligent AP system that can efficiently control the WiFi connection of the IoT devices is implemented. Based on the network information measured by the IoT device, the access point learns using a feed forward neural network algorithm, and predicts a network connection state to control the WiFi connection. By controlling the WiFi connection at the AP, the service efficiency of the IoT device can be improved.

Study on Customer Satisfaction Performance Evaluation through e-SCM-based OMS Implementation (e-SCM 기반 OMS 구현을 통한 고객 만족 성과평가에 관한 연구)

  • Hyungdo Zun;ChiGon Kim;KyungBae Yoon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.891-899
    • /
    • 2024
  • The Fourth Industrial Revolution is centered on a personalized demand fulfillment economy and is all about transformation and flexible processing that can deliver what customers want in real time across space and time. This paper implements the construction and operation of a packaging platform that can instantly procure the required packaging products based on real-time orders and evaluates its performance. The components of customer satisfaction are flexible and dependent on the situation which requires efficient management of enterprise operational processes based on an e-SCM platform. An OMS optimized for these conditions plays an important role in maximizing and differentiating the efficiency of a company's operations and improving its cost advantage. OMS is a system of mass customization that provides efficient MOT(Moment of Truth) logistics services to meet the eco-friendly issues of many individual customers and achieve optimized logistics operation goals to enhance repurchase intentions and sustainable business. OMS precisely analyzes the collected data to support information and decision-making related to efficiency, productivity, cost and provide accurate reports. It uses data visualization tools to express data visually and suggests directions for improvement of the operational process through statistics and prediction analysis.

Code Refactoring Techniques Based on Energy Bad Smells for Reducing Energy Consumption (Energy Bad Smells 기반 소모전력 절감을 위한 코드 리팩토링 기법)

  • Lee, Jae-Wuk;Kim, Doohwan;Hong, Jang-Eui
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.5
    • /
    • pp.209-220
    • /
    • 2016
  • While the services of mobile devices like smart phone, tablet, and smart watch have been increased and varied, the software embedded into such devices has been also increased in size and functional complexity. Therefore, increasing operation time of mobile devices for serviceability became an important issue due to the limitation of battery power. Recent studies focus on the software development having efficient behavioral patterns because the energy consumption of mobile devices is caused by software behaviors which control the hardware operations. However, it is often difficult to develop the embedded software with considering energy-efficiency and behavior optimization due to the short development cycle of the mobile services in many cases. Therefore, this paper proposes the refactoring techniques for reducing energy consumption, and enables to fulfill the energy requirements during software development and maintenance. We defined energy bad smells with the code patterns that can excessively consume the energy, and our refactoring techniques are to remove these bad smells. We performed some case studies to verify the usefulness of our refactoring techniques.

A Study on the Possibilities of PRT Applications (소형궤도차량(PRT)의 국내 적용시 정책적 검토 사항 연구)

  • Lee, Jin-Sun;Kim, Kyoung-Tae
    • Journal of the Korean Society for Railway
    • /
    • v.12 no.4
    • /
    • pp.526-534
    • /
    • 2009
  • PRT(Personal Rapid Transit) can be described as a system of driverless taxicabs, that. automatically take passengers to their destinations along dedicated guideways, without intermediate stops.It is ideally suited as a short feeder transportation for on-demand circulation operations at train stations, airports, office complex, amusement park and shopping center. This PRT study do suggest that a PRT system could provide a high level of mobility to the commuters making work trips, workers making work, shopping and other non-work trips, residents making shopping and other non-work trips and recreational riders.This study presents the possibilities of PRT applications in national level. As the technology continues to advance, there may be opportunities to improve the reliability, and efficiency of our future public transportation systems.

High Speed Implementation of LEA on ARM Cortex-M3 processor (ARM Cortex-M3 프로세서 상에서의 LEA 암호화 고속 구현)

  • Seo, Hwa-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.8
    • /
    • pp.1133-1138
    • /
    • 2018
  • Lightweight Encryption Algorithm (LEA) is one of the most promising lightweight block cipher algorithm due to its high efficiency and security level. There are many works on the efficient LEA implementation. However, many works missed the secure application services where the IoT platforms perform secure communications between heterogeneous IoT platforms. In order to establish the secure communication channel between them, the encryption should be performed in the on-the-fly method. In this paper, we present the LEA implementation performing the on-the-fly method over the ARM Cortex-M3 processors. The general purpose registers are fully utilized to retain the required variables for the key scheduling and encryption operations and the rotation operation is optimized away by using the barrel-shifter technique. Since the on-the-fly method does not store the round keys, the RAM requirements are minimized. The implementation is evaluated over the ARM Cortex-M3 processor and it only requires 34 cycles/byte.

A Tag Response Loss Detection Scheme for RFID Group Proof (RFID 그룹증명을 위한 응답손실 감지기법)

  • Ham, Hyoungmin
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.9
    • /
    • pp.637-645
    • /
    • 2019
  • The RFID group proof is an extension of the yoking proof proving that multiple tags are scanned by a reader simultaneously. Existing group proof schemes provide only delayed tag loss detection which detects loss of tag response in a verification phase. However, delayed tag loss detection is not suitable for real-time applications where tag loss must be detected immediately. In this study, I propose a tag response loss detection scheme which detects loss of tag response in the proof generation process quickly. In the proposed scheme, the tag responds with the sequence number assigned to the tag group, and the reader detects the loss of the tag response through the sequence number. Through an experiment for indistinguishability, I show that the sequence number is secure against an analyzing message attack to distinguish between specific tags and tag groups. In terms of efficiency, the proposed scheme requires fewer transmissions and database operations than existing techniques to determine which tags response is lost.

UAV Path Planning for ISR Mission and Survivability (무인항공기의 생존성을 고려한 감시정찰 임무 경로 계획)

  • Bae, Min-Ji
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.7
    • /
    • pp.211-217
    • /
    • 2019
  • In an complicated battlefield environment, information from enemy's camp is an important factor in carrying out military operations. For obtaining this information, the number of UAVs that can be deployed to the mission without our forces' loss and at low cost is increasing. Because the mission environment has anti-aircraft weapons, mission space is needed for UAV to guarantee survivability without being killed. The concept of Configuration Space is used to define the mission space considering with range of weapons and detect range of UAV. UAV must visit whole given area to obtain the information and perform Coverage Path Planning for this. Based on threats to UAV and importance of information that will be obtained, area that UAV should visit first is defined. Grid Map is generated and mapping threat information to each grid for UAV path planning. On this study, coverage conditions and path planning procedures are presented based on the threat information on Grid Map, and mission space is expanded to improve detection efficiency. Finally, simulations are performed, and results are presented using the suggested UAV path planning method in this study.

A Simulation Study on Handshake Location in an AS/RS with Twin Cranes for Mixed-model Production in an Automotive Plant (자동차 공장의 혼류생산을 고려한 AS/RS 내 트윈크레인 Handshake 작업영역 위치 결정에 관한 시뮬레이션 연구)

  • Jeongtae Park;Bosung Kim;Taehoon Lee;Seonghwan Lee;Soondo Hong
    • Journal of the Korea Society for Simulation
    • /
    • v.32 no.4
    • /
    • pp.11-18
    • /
    • 2023
  • This study analyzes the effect of a handshake location of an AS/RS with twin cranes for mixed-model production line at an automobile plant. Implementing a handshake operation has the advantage for preventing route interference between twin cranes that operate without crossing into each other's working areas. However the handshake operation requires additional unloading and loading processes to retrieve assembly parts beyond the handshake area. Therefore the decision regarding the handshake location is crucial to improve efficiency of storage and retrieval operations. Simulation results show that the handshake operation with the optimal handshake location reduces the average response time of storage requests to 87% compared to non-handshake operation.