• Title/Summary/Keyword: G-code

Search Result 858, Processing Time 0.021 seconds

Design and Implementation of an On-the-Machine Measuring and Inspection Module (NC 공작기계상에서의 측정 및 검사모듈의 설계와 구현)

  • 김경돈;정성종
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.15 no.4
    • /
    • pp.91-97
    • /
    • 1998
  • Design methodology of Interactive Measuring Part Program Generating Tools(IMPPGT) realized on the FANUC 15MA using touch trigger probes and interactive macro functions of the CNC was described in this paper. Measuring G codes were designed according to geometric form, precision attributes, relations between parts, datum hierarchies, and relevant technological data by using measuring arguments. Menu driven measuring and inspection functions of the IMPPGT were studied and implemented on the CNC through the macro executor and ROM writer. Using the developed measuring G code system on the machine tool, untended measurement and inspection operation was able to be realized in precision FMS lines.

  • PDF

Development of ISO14649 Compliant CNC Milling Machine Operated by STEP-NC in XML Format

    • International Journal of Precision Engineering and Manufacturing
    • /
    • v.4 no.5
    • /
    • pp.27-33
    • /
    • 2003
  • G-code, another name of ISO6983, has been a popular commanding language for operating machine tools. This G-code, however, limits the usage of today's fast evolving high-performance hardware. For intelligent machines, the communications between machine and CAD/CAM departments become important, but the loss of information during generating G-code makes the production department isolated. The new standard for operating machine tools, named STEP-NC is just about to be standardized as ISO14649. As this new standard stores CAD/CAM information as well as operation commands of CNC machines, and this characteristic makes this machine able to exchange information with other departments. In this research, the new CNC machine operated by STEP-NC was built and tested. Unlike other prototypes of STEP-NC milling machines, this system uses the STEP-NC file in XML file form as data input. This machine loads information from XML file and deals with XML file structure. It is possible for this machine to exchange information to other databases using XML. The STEP-NC milling machines in this research loads information from the XML file, makes tool paths for two5D features with information of STEP-NC, and machines automatically without making G-code. All software is programmed with Visual $C^{++}$, and the milling machine is built with table milling machine, step motors, and motion control board for PC that can be directly controlled by Visual $C^{++}$ commands. All software and hardware modules are independent from each other; it allows convenient substitution and expansion of the milling machine. Example 1 in ISO14649-11 having the full geometry and machining information and example 2 having only the geometry and tool information were used to test the automatic machining capability of this system.

GMW CODES (GMW 부호)

  • 노종선
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.8
    • /
    • pp.1128-1135
    • /
    • 1993
  • In this paper, new binary cyclic codes (hereafter, refered to as GMW code) which are generated by using GMW sequence, g(t) = tr((trk(a))r), and its cyclic shifts are introduced. Code length of GMW codes is 2a-1, where k is composite integer, e·J. Dimension of the GMW codes is k(k/j)w-1, where w is a Hamming weight of r. Several properties of GMW codes such as designed distance, minimum distance, and weights of code words are obtained in terms of parameters of GMW sequences. And expansion of GMW sequences in terms of m-sequence and its decimation sequences are introduced and characteristic polynomials of GMW sequences are also derived.

  • PDF

Improving Malicious Web Code Classification with Sequence by Machine Learning

  • Paik, Incheon
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.5
    • /
    • pp.319-324
    • /
    • 2014
  • Web applications make life more convenient. Many web applications have several kinds of user input (e.g. personal information, a user's comment of commercial goods, etc.) for the activities. On the other hand, there are a range of vulnerabilities in the input functions of Web applications. Malicious actions can be attempted using the free accessibility of many web applications. Attacks by the exploitation of these input vulnerabilities can be achieved by injecting malicious web code; it enables one to perform a variety of illegal actions, such as SQL Injection Attacks (SQLIAs) and Cross Site Scripting (XSS). These actions come down to theft, replacing personal information, or phishing. The existing solutions use a parser for the code, are limited to fixed and very small patterns, and are difficult to adapt to variations. A machine learning method can give leverage to cover a far broader range of malicious web code and is easy to adapt to variations and changes. Therefore, this paper suggests the adaptable classification of malicious web code by machine learning approaches for detecting the exploitation user inputs. The approach usually identifies the "looks-like malicious" code for real malicious code. More detailed classification using sequence information is also introduced. The precision for the "looks-like malicious code" is 99% and for the precise classification with sequence is 90%.

A Syndrome-distribution decoding MOLS L$_{p}$ codes

  • Hahn, S.;Kim, D.G.;Kim, Y.S.
    • Communications of Mathematical Education
    • /
    • v.6
    • /
    • pp.371-381
    • /
    • 1997
  • Let p be an odd prime number. We introduce simple and useful decoding algorithm for orthogonal Latin square codes of order p. Let H be the parity check matrix of orthogonal Latin square code. For any x ${\in}$ GF(p)$^{n}$, we call xH$^{T}$ the syndrome of x. This method is based on the syndrome decoding for linear codes. In L$_{p}$, we need to find the first and the second coordinates of codeword in order to correct the errored received vector.

  • PDF

Neutron Fluence Evaluation for Reactor Pressure Vessel Using 3D Discrete Ordinates Transport Code RAPTOR-M3G (3차원 수송계산 코드(RAPTOR-M3G)를 이용한 원자로 압력용기 중성자 조사량 평가)

  • Maeng, Young Jae;Lim, Mi Joung;Kim, Byoung Chul
    • Transactions of the Korean Society of Pressure Vessels and Piping
    • /
    • v.10 no.1
    • /
    • pp.107-112
    • /
    • 2014
  • The Code of Federal Regulations, Title 10, Part 50, Appendix H requires surveillance program for reactor pressure vessel(RPV) that the peak neutron fluence at the end of the design life of the vessel will exceed $1.0E+17n/cm^2$ (E>1.0MeV). 2D/1D Synthesis method based on DORT 3.1 transport calculation code has been widely used to determine fast neutron(E>1.0MeV) fluence exposure to RPV in the beltline region. RAPTOR-M3G(RApid Parallel Transport Of Radiation-Multiple 3D Geometries) performing full 3D transport calculation was developed by Westinghouse and KRIST(Korea Reactor Integrity Surveillance Technology) and applied for the evaluations of In-Vessel and Ex-Vessel neutron dosimetry. The reaction rates from measurement and calculation were compared and the results show good agreements each other.

Analysis of C5G7-TD benchmark with a multi-group pin homogenized SP3 code SPHINCS

  • Cho, Hyun Ho;Kang, Junsu;Yoon, Joo Il;Joo, Han Gyu
    • Nuclear Engineering and Technology
    • /
    • v.53 no.5
    • /
    • pp.1403-1415
    • /
    • 2021
  • The transient capability of a SP3 based pin-wise core analysis code SPHINCS is developed and verified through the analyses of the C5G7-TD benchmark. Spatial discretization is done by the fine mesh finite difference method (FDM) within the framework of the coarse mesh finite difference (CMFD) formulation. Pin size fine meshes are used in the radial fine mesh kernels. The time derivatives of the odd moments in the time-dependent SP3 equations are neglected. The pin homogenized group constants and Super Homogenization (SPH) factors generated from the 2D single assembly calculations at the unrodded and rodded conditions are used in the transient calculations via proper interpolation involving the approximate flux weighting method for the cases that involve control rod movement. The simplifications and approximations introduced in SPHINCS are assessed and verified by solving all the problems of C5G7-TD and then by comparing with the results of the direct whole core calculation code nTRACER. It is demonstrated that SPHINCS yields accurate solutions in the transient behaviors of core power and reactivity.

Design Study of a Small Scale Soft Recovery System

  • Yoo, Il-Yong;Lee, Seung-Soo;Cho, Chong-Du
    • Journal of Mechanical Science and Technology
    • /
    • v.20 no.11
    • /
    • pp.1961-1971
    • /
    • 2006
  • A soft recovery system (SRS) is a device that stops a high speed projectile without damaging the projectile. The SRS is necessary to verify the shock resistant requirements of microelectronics and electro-optic sensors in smart munitions, where the projectiles experience over 20,000 g acceleration inside the barrel. In this study, a computer code for the performance evaluation of a SRS based on ballistic compression decelerator concept has been developed. It consists of a time accurate compressible one-dimensional Euler code with use of deforming grid and a projectile motion analysis code. The Euler code employs Roe's approximate Riemann solver with a total variation diminishing (TVD) method. A fully implicit dual time stepping method is used to advance the solution in time. In addition, the geometric conservation law (GCL) is applied to predict the solutions accurately on the deforming mesh. The equation of motion for the projectile is solved with the four-stage Runge-Kutta time integration method. A small scale SRS to catch a 20 mm bullet fired at 500 m/s within 1,600 g-limit has been designed with the proposed method.

Technology Convergence Analysis by IPC Code-Based Social Network Analysis of Healthcare Patents (헬스케어 특허의 IPC 코드 기반 사회 연결망 분석(SNA)을 이용한 기술 융복합 분석)

  • Shim, Jaeruen
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.5
    • /
    • pp.308-314
    • /
    • 2022
  • This study deals with the technology Convergence Analysis by IPC Code-Based Social Network Analysis of Healthcare Patents filed in Korea. The relationship between core technologies is visualized using Social Network Analysis. At the subclass level of healthcare patents, 1,155 cases (49.4%) of patents with complex IPC codes were investigated, and as a result of Social Network Analysis on them, the IPC codes with the highest Degree Centrality were A61B, G16H, and G06Q, in that order. The IPC codes with the highest Betweenness Centrality are in the order of A61B, G16H, and G06Q. In addition, it was confirmed that healthcare patents consist of two large technology clusters. Cluster-1 corresponds to related business models centered on A61B, G16H and G06Q, and Cluster-2 is consisting of H04L, H04W and H04B. The technology convergence core pairs of the healthcare patent is [G16H-A61B] and [G16H-G06Q] in Cluster-1, and [H04L-H04W] in Cluster-2. The results of this study can contribute to the development of core technologies for healthcare patents.

An Exploratory Study of Perceived Benefits and Risks for QR Code based Virtual Fashion Stores (QR코드 기반 가상패션점포의 지각된 혜택과 위험요소에 대한 탐색적 연구)

  • Kim, Eun Young;Lee, MiYoung
    • Korean Journal of Human Ecology
    • /
    • v.22 no.5
    • /
    • pp.477-490
    • /
    • 2013
  • This study explores critical and success factor of benefits and risks for predicting the acceptance of QR code virtual fashion stores. As an exploratory approach, this study conducted focus group interviews(FGI) with 21 panels who had experience with selected QR virtual stores (e.g., Home plus, 11th Street, Pin & Fit). Content analysis was used to generate 184 excerpts and classify into benefits and risks related to QR code virtual stores. With respect to benefits, content analysis identified four factors: Affective appeal, perceived usefulness, ubiquity, and brand promotion. Also, contents regarding perceived risks were classified into four factors: Complexity, lack of information, lack of technology infrastructure, and perceived cost. A managerial implication was discussed for predicting consumer technology acceptance of a QR code virtual store in the fashion retailing market.