• Title/Summary/Keyword: Network Operation

Search Result 3,341, Processing Time 0.031 seconds

Design and Implementation of Real-time Digital Twin in Heterogeneous Robots using OPC UA (OPC UA를 활용한 이기종 로봇의 실시간 디지털 트윈 설계 및 구현)

  • Jeehyeong Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.4
    • /
    • pp.189-196
    • /
    • 2023
  • As the manufacturing paradigm shifts, various collaborative robots are creating new markets. Demand for collaborative robots is increasing in all industries for the purpose of easy operation, productivity improvement, and replacement of manpower who do simple tasks compared to existing industrial robots. However, accidents frequently occur during work caused by collaborative robots in industrial sites, threatening the safety of workers. In order to construct an industrial site through robots in a human-centered environment, the safety of workers must be guaranteed, and there is a need to develop a collaborative robot guard system that provides reliable communication without the possibility of dispatch. It is necessary to double prevent accidents that occur within the working radius of cobots and reduce the risk of safety accidents through sensors and computer vision. We build a system based on OPC UA, an international protocol for communication with various industrial equipment, and propose a collaborative robot guard system through image analysis using ultrasonic sensors and CNN (Convolution Neural Network). The proposed system evaluates the possibility of robot control in an unsafe situation for a worker.

A Study on the Perception of Quality of Care Services by Care Workers using Big Data (빅데이터를 활용한 요양보호사의 서비스질 인식에 관한 연구)

  • Han-A Cho
    • Journal of Korean Dental Hygiene Science
    • /
    • v.6 no.1
    • /
    • pp.13-25
    • /
    • 2023
  • Background: This study was conducted to confirm the service quality management of care workers, who are direct service personnel of long-term care insurance for the elderly, using unstructured big data. Methods: Using a textome, this study collected and analyzed unstructured social data related to care workers' service quality. Frequency, TF-IDF, centrality, semantic network, and CONCOR analyses were conducted on the top 50 keywords collected by crawling the data. Results: As a result of frequency analysis, the top-ranked keywords were 'Long-term care services,' 'Care workers,' 'Quality of care services,' 'Long term care,' 'Long term care facilities,' 'Enhancement,' 'Elderly,' 'Treatment,' 'Improvement,' and 'Necessity.' The results of degree centrality and eigenvector centrality were almost the same as those of the frequency analysis. As a result of the CONCOR analysis, it was found that the improvement in the quality of long-term care services, the operation of the long-term care services, the long-term care services system, and the perception of the psychological aspects of the care workers were of high concern. Conclusion: This study contributes to setting various directions for improving the service quality of care workers by presenting perceptions related to the service quality of care workers as a meaningful group.

National Awareness of the 2019 World Swimming Championships using Big Data from Social Network Analysis (소셜네트워크 분석의 빅데이터를 활용한 2019세계수영선수권 대회의 국내 인식조사)

  • Kim, Gi-Tak
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.4
    • /
    • pp.173-184
    • /
    • 2019
  • The data processing of this study is based on the word data search in social media through textom and the big data analysis is carried out and three areas (2019 Gwangju World Swimming Championships, 2019 Gwangju World Swimming Masters Competition, 2019 World Swimming Championships Problem) was consistently handled through data collection and refinement in the web environment. We applied the collected words to the program of Ucinet6, visualized them, and conducted a CONCOR analysis to grasp the similar relationship of words and to identify the cluster of common factors. As a result of the analysis, the clusters related to the 2019 Gwangju World Swimming Championships mainly consisted of four major areas of recognition and perception, mainly searching for operational aspects related to the swimming championship, and the community related to the 2019 Gwangju World Swimming Masters Competition Is mainly searched for the promotion of the Masters Competition and the aspect of the competition divided into two areas of major recognition and peripheral recognition. The cluster related to the problems of the 2019 Gwangju World Swimming Championships is divided into five areas, And they are mainly searching for the place, operation, institution, event, etc. of the problem of the swimming championship.

Matter and Becoming in Gilbert Simondon's Theory of Individuation (물질과 생성: 질베르 시몽동의 개체화론을 중심으로)

  • Kim, Jaehee
    • Journal of Korean Philosophical Society
    • /
    • no.93
    • /
    • pp.231-260
    • /
    • 2011
  • Simondon's theory of individuation and methodology of transduction presents a possibility of contemporary natural philosophy and a new perspective about the relation between philosophy and sciences. According to Simondon's anti-substantial viewpoint, being, as a metastable system charged with potential energy, complicates itself with quantum leaps transversing successive equilibriums. Individuation is the becoming of phases of being which transits from preindividual state to individuated states. Physical individuation as a paradigmatic model of individuation in general demonstrates not only insufficiency of form-oriented hylomorphism, but also spontaneous formational capacity of matter and reality of energetic relational operation immanent in matter. Genesis of a individual (structure or form) occurs as a resolution of the disparation between orders of magnitude, that is, the difference of potentials immanent in nature through the internal resonance, communication by information, transductive relation between the opposites. I'm trying to show that Simondon revives 'physis' of ancient natural philosophy by his own transductive applications of contemporary physics' conceptions, and therefore suggest a new non-reductive materialism. Especially Simondon's 'transduction' which is neither induction, deduction, nor dialectic, but an original ontological process and a peculiar method of thinking, I think, is worthy of note in order to construct network of knowledge and inter-relation between various sciences.

Machine learning model for residual chlorine prediction in sediment basin to control pre-chlorination in water treatment plant (정수장 전염소 공정제어를 위한 침전지 잔류염소농도 예측 머신러닝 모형)

  • Kim, Juhwan;Lee, Kyunghyuk;Kim, Soojun;Kim, Kyunghun
    • Journal of Korea Water Resources Association
    • /
    • v.55 no.spc1
    • /
    • pp.1283-1293
    • /
    • 2022
  • The purpose of this study is to predict residual chlorine in order to maintain stable residual chlorine concentration in sedimentation basin by using artificial intelligence algorithms in water treatment process employing pre-chlorination. Available water quantity and quality data are collected and analyzed statistically to apply into mathematical multiple regression and artificial intelligence models including multi-layer perceptron neural network, random forest, long short term memory (LSTM) algorithms. Water temperature, turbidity, pH, conductivity, flow rate, alkalinity and pre-chlorination dosage data are used as the input parameters to develop prediction models. As results, it is presented that the random forest algorithm shows the most moderate prediction result among four cases, which are long short term memory, multi-layer perceptron, multiple regression including random forest. Especially, it is result that the multiple regression model can not represent the residual chlorine with the input parameters which varies independently with seasonal change, numerical scale and dimension difference between quantity and quality. For this reason, random forest model is more appropriate for predict water qualities than other algorithms, which is classified into decision tree type algorithm. Also, it is expected that real time prediction by artificial intelligence models can play role of the stable operation of residual chlorine in water treatment plant including pre-chlorination process.

A new approach to design isolation valve system to prevent unexpected water quality failures (수질사고 예방형 상수도 관망 밸브 시스템 설계)

  • Park, Kyeongjin;Shin, Geumchae;Lee, Seungyub
    • Journal of Korea Water Resources Association
    • /
    • v.55 no.spc1
    • /
    • pp.1211-1222
    • /
    • 2022
  • Abnormal condition inevitably occurs during operation of water distribution system (WDS) and requires the isolation of certain areas using isolation valves. In general, the determination of the optimal location of isolation valves considered minimization of hydraulic failures as isolation of certain areas causes a change in hydraulic states (e.g., flow direction, velocity, pressure, etc.). Water quality failure can also be induced by changes in hydraulics, which have not been considered for isolation valve system design. Therefore, this study proposes a new isolation valve system design methodology to prevent unexpected water quality failure events. The new methodology considers flow direction change ratio (FDCR), which accounts for flow direction changes after isolation of the area, as a constraint while reliability is used as the objective function. The optimal design model has been applied to a synthetic grid network and the results are compared with the traditional design approach. Results show that considering FDCR can eliminate flow direction changes while average pressure and coefficient of variation of pressure, velocity, and hydraulic geodesic index (HGI) outperform compared to the traditional design approach. The proposed methodology is expected to be a useful approach to minimizing unexpected consequences by traditional design approaches.

Log Collection Method for Efficient Management of Systems using Heterogeneous Network Devices (이기종 네트워크 장치를 사용하는 시스템의 효율적인 관리를 위한 로그 수집 방법)

  • Jea-Ho Yang;Younggon Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.119-125
    • /
    • 2023
  • IT infrastructure operation has advanced, and the methods for managing systems have become widely adopted. Recently, research has focused on improving system management using Syslog. However, utilizing log data collected through these methods presents challenges, as logs are extracted in various formats that require expert analysis. This paper proposes a system that utilizes edge computing to distribute the collection of Syslog data and preprocesses duplicate data before storing it in a central database. Additionally, the system constructs a data dictionary to classify and count data in real-time, with restrictions on transmitting registered data to the central database. This approach ensures the maintenance of predefined patterns in the data dictionary, controls duplicate data and temporal duplicates, and enables the storage of refined data in the central database, thereby securing fundamental data for big data analysis. The proposed algorithms and procedures are demonstrated through simulations and examples. Real syslog data, including extracted examples, is used to accurately extract necessary information from log data and verify the successful execution of the classification and storage processes. This system can serve as an efficient solution for collecting and managing log data in edge environments, offering potential benefits in terms of technology diffusion.

Study on security framework for cyber-hacking control facilities (제어시설 사이버공격 대응을 위한 사이버보안 프레임워크 (Framework) 연구)

  • Lee, Sang-Do;Shin, Yongtae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.4
    • /
    • pp.285-296
    • /
    • 2018
  • Among many hacking attempts carried out in the past few years, the cyber-attacks that could have caused a national-level disaster were the attacks against nuclear facilities including nuclear power plants. The most typical one was the Stuxnet attack against Iranian nuclear facility and the cyber threat targeting one of the facilities operated by Korea Hydro and Nuclear Power Co., Ltd (Republic of Korea; ROK). Although the latter was just a threat, it made many Korean people anxious while the former showed that the operation of nuclear plant can be actually stopped by direct cyber-attacks. After these incidents, the possibility of cyber-attacks against industrial control systems has become a reality and the security for these systems has been tightened based on the idea that the operations by network-isolated systems are no longer safe from the cyber terrorism. The ROK government has established a realistic control systems defense concept and in the US, the relevant authorities have set up several security frameworks to prepare for the threats. This paper presented various cyber security attack cases and their scenarios against control systems, along with the analysis of countermeasures for them. Though this task, we attempt to identify the items that need to be considered when designing a domestic security framework to improve security and secure stability.

Improvement of Encoding Detection Algorithm for Multi-byte Encoded Data with Errors (오류가 발생한 멀티바이트 인코딩 데이터의 인코딩 기법 판별 알고리즘 개선)

  • Bae, Junwoo;Kim, Seonbeom;Park, Heejin
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.2
    • /
    • pp.18-25
    • /
    • 2017
  • In computer science, an encoding is a standardization of converting information to one format for audio, video or text. Therefore, the encoding information of the data should be known to open and read it and there are algorithms detecting encoder of the data. However, some informations of data could be disappeared by packet loss when transmitted on network, especially, if the data is snatched by packet sniffing or eavesdropping from wireless communications. In this paper, we improve the performance of encoding detection algorithm of 'uchardet' program for multi-byte encoded data with errors based on bit-shift algorithm. To simulate the performance, we generated Korean and Japanese text data with errors that is removed some random bits at random positions. Then the detection algorithm are tested using the data and 'uchardet-bitshift' showed better performance than 'uchardet'. When Korean texts are used, 'uchardet' could detect perfectly with ≤0.005% errors but it showed 0% detection rate with ≥1% errors while 'uchardet-bitshift' detected perfectly with ≤0.05% errors and it showed correct detection cases with ≥1% errors. Japanese texts with errors tend to report falsely as Chinese encoding because Japanese texts include lots of Chinese characters. As a results, we improved encoding detection algorithms by applying bit shift operation.

A Development of Optimum Operation Models for Express-Rail Systems (급행열차 도입을 통한 최적운행방안 수립에 관한 연구 - 수도권 광역 도시철도를 중심으로 -)

  • Park, Jeong-Soo;Lee, Hoon-Hee;Won, Jai-Mu
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.4D
    • /
    • pp.679-686
    • /
    • 2006
  • Recently, the city railway in the Seoul Metropolitan Area (SMA) has offered a low quality of service as a passage time, because it was operated slowly. So, the people who live in modern society are not satisfied about passage time, therefore, this study tried to make that the subway in the SMA becomes a more functional and effective wide-area-transportation-network through an express train introduction's method which examined cases from abroad and current system. and then presented how express train could be applied to current system. In a case study, We used the An-San Line and Su-In Line as a examples and developed a schedule which can minimize the delaying time of subway by using Branch & Bound Algorithm. The train operational plan was loaded to consider a railroad siding, Obtained site, and the dispatch interval(three to ten minutes) for the express and local lines and finally, We presented an alternative operational plan which made by those factors.