• Title/Summary/Keyword: Functional Elements

Search Result 796, Processing Time 0.034 seconds

Rotor design functional standard of Synchronous Reluctance Motor according to torque/volume using FEM & SUMT (유한요소법과 SUMT를 이용한 동기형 릴럭턴스 전동기의 단위부피당 토크에 따른 회전자 설계기준의 함수화)

  • Lee, Rae-Hwa;Lee, Jung-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2006.07b
    • /
    • pp.709-710
    • /
    • 2006
  • This paper deals with an automatic rotor design functional standard computation based on torque/volume for a synchronous reluctance motor (SynRM). The focus of this paper is the design relative to the torque/volume on the basis of each rated watt according to the rotor diameters of a SynRM. The coupled finite elements analysis (FEA) & sequential unconstrained minimization technique (SUMT) have been used to evaluate design solutions. The proposed procedure allows to define the rotor geometric design function according to the rotor diameter and rated watt starting from an existing motor or a preliminary design.

  • PDF

Cyber Attack and Defense Modeling Using Vulnerability Metrics (취약성 매트릭스를 이용한 사이버 공격 및 방어 모델링)

  • Lee Jang-Se;Chi Sung-Do;Choi Gyoo-Seok
    • Journal of the Korea Society for Simulation
    • /
    • v.13 no.3
    • /
    • pp.11-20
    • /
    • 2004
  • The major objective of this paper is to perform modeling of cyber attack and defense using vulnerability metrics. To do this, we have attempted command level modeling for realizing an approach of functional level proposed by Nong Ye, and we have defined vulnerability metrics that are able to apply to DEVS(Discrete Event System Specification) and performed modeling of cyber attack and defense using this. Our approach is to show the difference from others in that (i) it is able to analyze behaviors of systems being emerged by interaction between functional elements of network components, (ii) it is able to analyze vulnerability in quantitative manner, and (iii) it is able to establish defense suitably by using the analyzed vulnerability. We examine an example of vulnerability analysis on the cyber attack and defense through case study.

  • PDF

Development of fundamental technologies on high precision mold for micro functional elements and parts (기능성 초정밀 핵심 요소부품 제조 초정밀 금형 기반기술 개발)

  • Je, T.J.;Lee, E.S.;Choi, D.S.;Kim, J.G.;Whang, K.H.;Yoon, J.S.;Chang, S.H.
    • Proceedings of the Korean Society for Technology of Plasticity Conference
    • /
    • 2009.05a
    • /
    • pp.74-77
    • /
    • 2009
  • Demands for high quality and productivity of precision mechanical parts are increasing greatly nowadays due to the rapid growth of information technologies and convergence industries. Therefore, core technologies for fabrication of precision mechanical parts are the fundamental issues, which are the precision machining, micro powder injection molding technologies, MR polishing, micro polymer processes, micro actuation modules and so on. These technologies are directly related to the mass production of high functional devices and machineries. Therefore, this study investigates the fabrication technologies of micro precision molds for advanced devices for possible commercialization in a near future.

  • PDF

Cyber Attack and Defense Modeling Using Vulnerability Metrics (취약성 매트릭스를 이용한 사이버 공격 및 방어 모델링)

  • 이장세;지승도
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2003.06a
    • /
    • pp.191-198
    • /
    • 2003
  • The major objective of this paper is to perform modeling of cyber attack and defense using vulnerability metrics. To do this, we have attempted command level modeling for realizing an approach of functional level proposed by Nong Ye, and we have defined vulnerability metrics that are able to apply to DEVS(Discrete Event System Specification) and performed modeling of cyber attack and defense using this. Our approach is to show the difference from others in that (ⅰ) it is able to analyze behaviors of system emerged by interaction with functional elements of components composing network and each other, (ⅱ) it is able to analyze vulnerability in quantitative manner, and (ⅲ) it is able to establish defense suitably by using the analyzed vulnerability. We examine an example of vulnerability analysis on the cyber attack and defense through case study.

  • PDF

Some Comments on and an Extension to Activity Structures for Intelligent Systems

  • Hall, Lawrence O.
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.3 no.1
    • /
    • pp.23-28
    • /
    • 1993
  • Activity structures are a set of functional structures which may be used to provide a uniform framework for the description of information processing systems. The interaction of some aspects of activity structures is discussed. Intelligent systems, a subset of information handling systems, are the primary emphasis of this work. An extension to the functional structures of the activity structures is proposed. The proposed structure is a met a-structure which affects most elements of an intelligent system. The structure is concerned with describing the way uncertainty in an environment is handled by a system. An example is given which shows the importance of describing the uncertainty handling method(s) of an intelligent system.

  • PDF

Controller Area Network (CAN) Protocol for Personal Robot Middleware (퍼스널 로봇 미들웨어를 위한 CAN(Controller Area Network) Protocol)

  • Park, Tai-Kyu;Li, Vitaly;Park, Hong-Seong
    • Proceedings of the KIEE Conference
    • /
    • 2004.05a
    • /
    • pp.80-82
    • /
    • 2004
  • Personal robot consist of various modules that have independent functions. Because personal robot has requirement that support various construction for user's tendency. Therefore, Middleware mechanism at support not only personal robot's main functional element but also embedded modules functional elements is required. Each module have various heterogeneous network interfaces and variable services and variables. Therefore, Middleware must support these various network interfaces. This paper, pointed in Controller Area Network(CAN) inreface that usually used in embedded system for control. For connect various heterogeneous network interfaces (Ethernet, RS232 etc..), it is necessary to modify bagic CAN frame format. And also make some kind of BUS topology for CAN network.

  • PDF

Effects of Agricultural Product Brand Image on the Brand Trust and Loyalty : a Case of 'Sky Green' (농산물 브랜드이미지가 브랜드신뢰 및 충성도에 미치는 영향 : 천안 '하늘그린'을 중심으로)

  • Kang, Seong-Pil;Yang, Sung-Bum;Kim, Ho
    • Korean Journal of Organic Agriculture
    • /
    • v.22 no.4
    • /
    • pp.629-643
    • /
    • 2014
  • This study analyzed how the brand image elements influenced upon forming the brand trust and the brand loyalty of the 'Sky Green' the joint agricultural product brand Cheonan, Chungnam. The brand image was classified into functional image, symbolical image and origin - associated image. And what element of the brand image element influences upon forming the brand image loyalty by the consumers who are using 'Sky Green'. In the analysis results, the functional image, symbolical image and the image associated with the origin have influenced on forming the brand trust and the brand loyalty. All variables composing the brand image have positive influences on both brand trust and brand loyalty. It means that brand image influences on brand loyalty directly but the greater influence can be exerted through the effects of the parameter of brand trust.

Responsive Pneumatic Facade with Adaptive Openings for Natural Ventilation (창호의 개폐조절을 기반으로 한 리스펀시브 뉴메틱 파사드)

  • Lee, Jisun;Lee, Hyunsoo
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.33 no.12
    • /
    • pp.29-39
    • /
    • 2017
  • The building skins are important architectural elements in both functional and aesthetical aspects. This study focuses on developing a responsive facade with autonomous opening and closing behaviors in accordance with environmental conditions and user requirements for natural ventilation for the office building. The pneumatic ETFE panels are applied as the skin materials taking advantage of the efficiency of the inflatable skin of lightness, architectural performance and sustainable material properties. The biomimetic design methodology is taken for its innovative and visionary concept for the facade design. The interpretation of the building facade in analogy to natural organisms delivers functional and aesthetic characters. By exploring the structural movements of the plant pores, the facade control is developed to be autonomous by the parameter values. The facade opening and closing configurations are derived through parametric modeling and visualization programming. Through the application of this study, expected results are to improve user comfort and energy efficiency.

A Study on Requirement Analysis of Unmanned Combat Vehicles: Focusing on Remote-Controlled and Autonomous Driving Aspect (무인전투차량 요구사항분석 연구: 원격통제 및 자율주행 중심으로)

  • Dong Woo, Kim;In Ho, Choi
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.18 no.2
    • /
    • pp.40-49
    • /
    • 2022
  • Remote-controlled and autonomous driving based on artificial intelligence are key elements required for unmanned combat vehicles. The required capability of such an unmanned combat vehicle should be expressed in reasonable required operational capability(ROC). To this end, in this paper, the requirements of an unmanned combat vehicle operated under a manned-unmanned teaming were analyzed. The functional requirements are remote operation and control, communication, sensor-based situational awareness, field environment recognition, autonomous return, vehicle tracking, collision prevention, fault diagnosis, and simultaneous localization and mapping. Remote-controlled and autonomous driving of unmanned combat vehicles could be achieved through the combination of these functional requirements. It is expected that the requirement analysis results presented in this study will be utilized to satisfy the military operational concept and provide reasonable technical indicators in the system development stage.

Exploring Factors and Elements of Coordination between Key Account Management Units and Non-key Account Management Units: Case Study in an IT-related Machinery and System Vendor

  • Tonai, Shoko
    • Asia Marketing Journal
    • /
    • v.18 no.1
    • /
    • pp.1-22
    • /
    • 2016
  • Studies in key account management (KAM) have identified the importance of cross-functional coordination in firms to effectively implement KAM. However, these studies have ignored how companies integrate KAM and other customer management (non-KAM). This paper explores coordination design between KAM units and non-KAM units by analyzing a case study through three dimensions: front-end coordination, back-end-coordination, and organizational translation at the beginning of research. The case study shows that non-KAM conditions can require a modification of the coordination design. This research performs an in-depth analysis of changes in the implementation of sales reforms for an IT-related machinery and system vendor in Japan. Data sources include interviews with KAM units and non-KAM sales units and an analysis of secondary data. This paper suggests that studying the coordination between KAM units and non-KAM units will further our understanding of internal coordination in KAM research.