Journal of the Korea Institute of Information and Communication Engineering
/
v.21
no.11
/
pp.2176-2183
/
2017
The value of Big-Data which is a main factor of the fourth Industrial Revolution enhances industrial productivity in private sector and provides administrative services for nations and corporates in public sector. ICT-developed countries are coming up with Big-Data application in public sector rapidly. Especially, when it comes to social crisis management, they are equipped with pre-forcasting system. Korean Government also emphasizes Big-Data application in public sector for the social crisis management. But the reality where the overall infrastructure vulnerability reveals requires preparation and operation of measurement for social problems. Accordingly, we need to analyze Big-Data application problem and benchmark the precedented cases, thereby, direct policy diversity. Hence, this paper proposes the roles and rules of E-government analyzing problems from Big-Data application. The following policy proposes open Information and legal&institutional improvement, Big-Data service considerations threatening privacy issues in Big-Data ecosystem, necessity of operational and analytical technology for Big-Data and related technology in technical implication of Big-Data.
This study developed a software platform using machine learning of artificial intelligence to optimize the distillation column system. The distillation column is representative and core process in the petrochemical industry. Process stabilization is difficult due to various operating conditions and continuous process characteristics, and differences in process efficiency occur depending on operator skill. The process control based on the theoretical simulation was used to overcome this problem, but it has a limitation which it can't apply to complex processes and real-time systems. This study aims to develop an empirical simulation model based on machine learning and to suggest an optimal process operation method. The development of empirical simulations involves collecting big data from the actual process, feature extraction through data mining, and representative algorithm for the chemical process. Finally, the platform for the distillation column was developed with verification through a developed model and field tests. Through the developed platform, it is possible to predict the operating parameters and provided optimal operating conditions to achieve efficient process control. This study is the basic study applying the artificial intelligence machine learning technique for the chemical process. After application on a wide variety of processes and it can be utilized to the cornerstone of the smart factory of the industry 4.0.
Kim, Youngse;Cho, Gyusun;Jun, Jinwoo;Kim, Byungjick;Lee, Joonwon;Park, Kyoshik
Korean Chemical Engineering Research
/
v.58
no.4
/
pp.604-609
/
2020
The purpose of this study is to check the priority control status of the current operation process alarm by comparing the priority of the alarm set up in PV high trip point, which is being installed and operated in the domestic petrochemical industry, with the criteria presented in ISA 18.2 International Standard or EEMUA 191 Guidelines. In the event of a process problem, excessively set high alarm is provided to the driver in a short period of time, making it difficult to identify the alarm that needs to be handled first. As a result, it is likely that the operator will not be able to carry out appropriate actions within the specified time frame, and many cases have been reported leading to unexpected process shutdowns or process accidents. Therefore, this study aims to introduce international standards related to alarm management and identify the level of alarm control used at the domestic petrochemical industry site to inform potential risks that may occur in the petrochemical process of the national industrial complex in the future and suggest ways to reduce risk factors. This paper was submitted to Professor Lee Inbeom's retirement anniversary issue.
Journal of the Korea Academia-Industrial cooperation Society
/
v.17
no.12
/
pp.511-517
/
2016
Current oil-type potential transformers for trains are filled with insulating oil, which could have problems like explosions due to rising inner pressure during train operation. Therefore, mold and dry-type potential transformers are being developed to prevent explosions. One problem in manufacturing mold-type transformers is preventing void formation around the coiled core inside the mold during epoxy filling, which could cause an electrical spark. Micro voids can remain in the resin after filling, and macro voids can occur due to the structure shape. A transformer that is being developed has a cavity at the junction of the core and the coil for better performance, and when highly viscous epoxy flows inside the cavity channel, macro voids can form inside it. Therefore, in this study, the free-surface flow of the mold filling procedure was analyzed numerically by applying the VOF method. The results were used to understand the phenomena of void formation inside the cavity and to modify the process conditions to reduce voids.
Journal of the Korea Academia-Industrial cooperation Society
/
v.19
no.4
/
pp.85-92
/
2018
Reductions of the electricity charge are achieved by demand management of the load. The demand management method of the load using ESS involves peak shifting, which shifts from a high demand time to low demand time. By shifting the load, the peak load can be lowered and the energy charge can be saved. Electricity charges consist of the energy charge and the basic charge per contracted capacity. The energy charge and peak load are minimized by Linear Programming (LP) and Quadratic Programming (QP), respectively. On the other hand, each optimization method has its advantages and disadvantages. First, the LP cannot separate the efficiency of the ESS. To solve these problems, the charge and discharge efficiency of the ESS was separated by Mixed Integer Linear Programming (MILP). Nevertheless, both methods have the disadvantages that they must assume the reduction ratio of peak load. Therefore, QP was used to solve this problem. The next step was to optimize the formula combination of QP and LP to minimize the electricity charge. On the other hand, these two methods have disadvantages in that the charge and discharge efficiency of the ESS cannot be separated. This paper proposes an optimization method according to the situation by analyzing quantitatively the advantages and disadvantages of each optimization method.
Journal of the Korea Academia-Industrial cooperation Society
/
v.19
no.4
/
pp.117-122
/
2018
A large-capacity three-phase system air conditioner recently includes an inverter circuit to reduce power consumption. The inverter circuit uses a DC voltage that comes from DC-link power capacitor with the function of rectifying, which means AC voltage to DC voltage using a diode. An electrolytic capacitor is generally used to satisfy the voltage ripple and current ripple conditions of a DC-link power capacitor used for rectifying. Reducing the capacitance of the capacitor decreases the size, weight, and cost of the circuit. This paper proposes an algorithm to reduce the input ripple current by combining the minimum point estimation phase locked loop (PLL) phase control and the average voltage d axis current control technique. When this algorithm was used, the input ripple current decreased by almost 90%. The current ripple of the DC-link capacitor decreased due to the decrease in input ripple current. The capacitor capacity can be reduced but the electrolytic capacitor has a heat generation problem and life-time limitations because of its large equivalent series resistance (ESR). This paper proposes a method to select a film capacitor considering the current ripple at DC-link stage instead of an electrolytic capacitor. The capacitance was selected considering the voltage limitation, RMS (Root Mean Square) current capacity, and RMS current frequency analysis. A $1680{\mu}F$ electrolytic capacitor can be reduced to a $20{\mu}F$ film capacitor, which has the benefit of size, weight and cost. These results were verified by motor operation.
KIPS Transactions on Software and Data Engineering
/
v.5
no.4
/
pp.171-180
/
2016
As social networking services such as twitter become increasingly popular, data streams are widely prevalent these days. In order to search data accumulated from data streams efficiently, the use of an index structure is essential. In this paper, we propose an update-efficient, disk-based inverted index structure for efficient keyword search on data streams. When new data arrive at the data stream, the index needs to be updated to incorporate the new data. The traditional inverted index is very inefficient to update in terms of disk I/O, because all index data stored in the disk need to be read and written to the disk each time the index is updated. To solve this problem, we divide the whole inverted index into a sequence of inverted indices with exponentially increasing size. When new data arrives, it is first inserted into the smallest index and, later, the small indices are merged with the larger indices, which leads to a small amortize update cost for each new data. Furthermore, when indices stored in the disk are merged with each other, we minimize the disk I/O cost incurred for the merge operation, resulting in an even smaller update cost. Through various experiments, we compare the update efficiency of the proposed index structure with the previous one, and show the performance advantage of the proposed structure in terms of the update cost.
KIPS Transactions on Software and Data Engineering
/
v.5
no.12
/
pp.623-634
/
2016
Most of existing frequent pattern mining methods address time efficiency and greatly rely on the primary memory. However, in the era of big data, the size of real-world databases to mined is exponentially increasing, and hence the primary memory is not sufficient enough to mine for frequent patterns from large real-world data sets. To solve this problem, there are some researches for frequent pattern mining method based on disk, but the processing time compared to the memory based methods took very time consuming. There are some researches to improve scalability of frequent pattern mining, but their processes are very time consuming compare to the memory based methods. In this paper, we present PPFP as a novel disk-based approach for mining frequent itemset from big data; and hence we reduced the main memory size bottleneck. PPFP algorithm is based on FP-growth method which is one of the most popular and efficient frequent pattern mining approaches. The mining with PPFP consists of two setps. (1) Constructing an IFP-tree: After construct FP-tree, we assign index number for each node in FP-tree with novel index numbering method, and then insert the indexed FP-tree (IFP-tree) into disk as IFP-table. (2) Mining frequent patterns with PPFP: Mine frequent patterns by expending patterns using stack based PUSH-POP method (PPFP method). Through this new approach, by using a very small amount of memory for recursive and time consuming operation in mining process, we improved the scalability and time efficiency of the frequent pattern mining. And the reported test results demonstrate them.
Registered security guards carry out police duties as civilian police who are in charge of security service, and so they have a two-fold status: a civilian in terms of a social standing and a policeman in the way that they execute the authority of security. The problem caused by this legal position is that their legal rights and obligation can be unclear in the task-action and working relationship. This paper attempts to study their functions, rights, and legal duties through the interpretation of the related positive law so as to reveal the problems that may spring from this ambiguous status of registered security guards. This endeavor illuminates their legal status specified in the positive law in and around the Act on the police assigned for special guard, observing their functions and the legal duties in the pursuit of their tasks, and ending up pointing out the problems of the positive law. As a result of research work, the most significant problems, even if multifarious, are the avoidance of the state reparation in the responsibility for the illegal behavior in connection with their operation; the unconstitutionality of the disciplinary punishment regulation originated from the entrust with full powers; the imperfection of the rules about the cooperative ties with the police; the possibility of human rights abuse caused by the ban on the labor dispute; the equality problems from the dual pay system; and the inadequacy of the codes about the recruitment qualification and method. This research is intended to help achieve the purpose of the security of national critical facilities through the smooth execute of duties as well as the protection of the guards' rights. Besides, the key focuses posed in this paper are worthy of being developed more accurately through the following researches.
A 36 year old blindman, engineer was admitted with chief complaints of hemoptysis, recurrent sore throat, pyoderma in genital organ, uveitis and thrombophlebitis for 10 years. Above the chief complaints were remission or exacerbation during hospitalization. Physicalexamination showed that left radial, ulnar & brachial pulse was not palpable. No bruit or murmur was obtained over the mass. Neurologic examination revealed no significant finding.On admission, chest P-A showed hen egg sized round & oval compact hazy density on left upper lung field. Bronchogram revealed no pathological finding and Lt. tomogram showed well define large,ovoid mass density in the superior mediastinum. Fluoroscopy finding showed nonpulsatile on left upper lung field. Pre-op. aortography was not taken, under the impression of lung Ca. rule out .sortie aneurysm, exploratory operation was performed through the 2nd intercostal space, Lt. It was performed that the mass was ascending sortie aneurysm of saccular type. Direct aneurysmectomy with multiple figure of eight suture were done without any prosthetic graft. Post-op. control I.V.C graphy showed completely obstruction sign. Postopcontrol aortography revealed good surgical result. Final, histopathological answered non-specific sortie aneurysm, saccular type. Post-op. courses were uneventful except mild neurologic disturbance with subclavian steal syndrome and associated with both lower leg pitting edema due to inferior vena cava obstruction. After op, 3 month later, discharged to home, with big systemic problem. Behcet`s syndrome reviewed with related literatures. The coexistence of mouth and genital ulceration with hypopyon mentioned by hippocrates and described by various workers in the early part of this century was first defined as a syndrome by Behcet in 1937. In 1937 Behcet described a chronic relapsing triple symptom complex of oral ulceration, genital ulceration, and ocular inflammation. The place of the syndrome as part of a systemic disorder in now clearer, and the under lying pathology appears to be a vasculitis. The disease runs a- chronic course, blindness being the greatest disability and control nervous system involvement a cause of death. Thrombophlebitis is fairly frequent, france et al [1951] giving an incidence of 25% and Dowling [1961] 12%, superficial thrombophlebitis migrans and thrombosis of large veins, including venae cavae [Thomas, 1947: Boolukos 1960] are recorded. Little attention has been paid to arterial involvement. Mishima et al. [1961] described resection cf an aortic aneurysm in a 38 year old man with Behcet`s syndorme. Mounsey in a clinicopathological conference described a case [Brit, med. J., 1966] of ruptured aortic aneurysm in Bechcet`s syndrome treated by aorto-iliac graft. Also, Shikano and Oshima et al [1963] recorded two aneyrysm of smaller arteries. Unfrequently, aortic aneurysm was presumed to be secondary to osteomyelitis of the lumber spine, though the possible association between aortic aneurysm and Behcet`s syndrome was raised. A further case is reported here, in which ascending aortic aneurysm with Behcet`s Ds. appeared to form part of this generalized disease. This is a case report of surgical experience of Behcet`s Ds. with ascending aortic aneurysm which had nearly all the typical clinical features. Above mentioned and was reviewed with related literatures.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.