• 제목/요약/키워드: Operation key

검색결과 1,728건 처리시간 0.024초

UAM 교통관제시스템 개발 동향 및 설계 개념 연구 (A Study on UAM Traffic Management System Development Trends and Concept Design)

  • 허창환;강광천;윤형근
    • Journal of Information Technology Applications and Management
    • /
    • 제30권6호
    • /
    • pp.81-90
    • /
    • 2023
  • In aviation, with the rapid transformation of the mobility industry, UAMs are emerging to operate green low-altitude airspace in urban environments. In order for UAM aircraft to fly safely transporting passengers and cargo in low-altitude urban airspace, a traffic control system that supports the safe operation of the aircraft is essential. In particular, traffic control systems that reflect the characteristics of the flight environment, such as operating at low altitude in urban environments for a short period of time, are required. In this study, we define the definition of UATM and its main services that perform traffic control for the safe operation of UAMs. In addition, we analyzed the development trends of UATM systems based on domestic and overseas cases. Based on these analyses, we present the results of the concept design of the UATM system. After analyzing UATM development cases, we found that there is no commercialized UATM system, but overseas development is focused on systems that can integrate ATM and UTM. And we identified key stakeholders and interface data, and performed UATM system architecture and functional design based on the identified data. Finally, as a necessary element for the future development of UATM systems, we propose the establishment and advancement of UAM traffic flow management systems, the establishment of integrated control systems, and the development of interface with aircraft operation systems in preparation for the unmanned UAM aircraft.

상태지수의 경향성 분류에 기반한 풍력발전기 베어링 잔여수명 추정 (Estimation of Remaining Useful Life for Bearing of Wind Turbine based on Classification of Trend)

  • 서윤호;김상렬;마평식;우정한;김동준
    • 풍력에너지저널
    • /
    • 제14권3호
    • /
    • pp.34-42
    • /
    • 2023
  • The reduction of operation and maintenance (O&M) costs is a critical factor in determining the competitiveness of wind energy. Predictive maintenance based on the estimation of remaining useful life (RUL) is a key technology to reduce logistic costs and increase the availability of wind turbines. Although a mechanical component usually has sudden changes during operation, most RUL estimation methods use the trend of a state index over the whole operation period. Therefore, overestimation of RUL causes confusion in O&M plans and reduces the effect of predictive maintenance. In this paper, two RUL estimation methods (load based and data driven) are proposed for the bearings of a wind turbine with the results of trend classification, which differentiates constant and increasing states of the state index. The proposed estimation method is applied to a bearing degradation test, which shows a conservative estimation of RUL.

Power 소자 기술

  • 이상기
    • 전자공학회지
    • /
    • 제42권7호
    • /
    • pp.45-53
    • /
    • 2015
  • Power 소자 기술은 digital & mixed signal device와 on-chip 구현을 위해서 CMOS 공정에 대한 기본 이해가 필요하다. CMOS 공정 기반 위에 power device 공정을 추가하면서 다양한 operation voltage의 power 소자를 구현하고, passive device 들을 동일 공정에서 구현하여 다양한 components 들로 power IC 제품을 design 할 수 있도록 modular process를 제공하는 것이 중요하다. 또한 power device로 주로 사용되는 LDMOS 소자에 대한 performance 개선을 위해 simulation을 통해 key device parameter들의 특성을 예측하고, 구조를 설계하는 것이 Si process 전에 중요한 일 중의 하나이다. 아울러 power management가 potable power, consumer electronics 및 green energy에서 가장 빠르게 성장하는 분야이므로, 차별화된 power 소자 기술을 확보하여 급변하는 시장 환경에 대응하는 것이 필요하다.

원거리 학습을 이용한 실시간 PLC 실습 (On-line PLC Laboratories Using Distance Learning)

  • 이성열
    • 한국경영과학회:학술대회논문집
    • /
    • 한국경영과학회/대한산업공학회 2005년도 춘계공동학술대회 발표논문
    • /
    • pp.310-315
    • /
    • 2005
  • This paper describes the development of on-line Programmable Logic Controller (PLC) laboratories to teach the detailed operation of a PLC using distance learning approach. The PLC has become a key component to provide intelligence for machines in CIM environment. This study introduces a case study that teaches PLC programming in distance learning environment. The study describes the contents of PLC laboratories and workstation set ups. The study concludes with problems found and proposes the ways to improve the on-line laboratories.

  • PDF

원거리 학습을 이용한 실시간 PLC 실습환경 개발 및 적용사례 (A Case Study of On-line PLC Laboratories Using Distance Learning)

  • 이성열
    • 산업공학
    • /
    • 제18권4호
    • /
    • pp.412-417
    • /
    • 2005
  • This paper describes the development of on-line Programmable Logic Controller(PLC) laboratories to teach the detailed operation of a PLC using distance learning approach. The PLC has become a key component to provide intelligence for machines in CIM environment. This study introduces a case study that teaches PLC programming in distance learning environment. The study describes the contents of PLC laboratories and workstation set ups. The study concludes with problems found and proposes the ways to improve the on-line laboratories.

A Study on the Threshold of Avoidance Sector in the New Evaluation of Collision Risk

  • Jeong Tae-Gweon
    • 한국항해항만학회지
    • /
    • 제28권9호
    • /
    • pp.799-802
    • /
    • 2004
  • Evaluation of the quantitative risk of collision plays a key role in developing the expert system of navigation and collision avoidance. This study analysed thoroughly how to determine the threshold of avoidance sector as described in the new evaluation of collision risk, and suggested the collision risk obtained by the alteration of course and/or speed in order to pass clear qf each danger zone as the threshold of avoidance sector.

A Study on the Threshold of Avoidance Time in the New Evaluation of Collision Risk

  • Jeong, Tae-Gweon
    • 한국항해항만학회지
    • /
    • 제27권6호
    • /
    • pp.619-624
    • /
    • 2003
  • Evaluating the risk of collision quantitatively plays a key role in developing the expert system of navigation and collision avoidance. This study analysed thoroughly how to determine the threshold function related to the avoidance time as described in the new evaluation of collision risk using sech function, and developed the appropriate equation as applicable.

광역 방어시스템의 통신 트래픽 모사와 분석 (Simulation and Analysis of the Network Traffic of a Power Infrastructure Defense System)

  • 백윤기;이건영
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2006년도 제37회 하계학술대회 논문집 A
    • /
    • pp.179-180
    • /
    • 2006
  • The real time monitoring of the power systems covering wide area are essential for the stable operation and control of the power system. Synchronized phasor measurement is a key for the precise monitoring and control of the power systems. In this paper, to suggest an appropriate network topology of Power Infrastructure Defense System(PIDS) and to estimate the maximum network bandwidth with using the network analyzer, we simulate a PIDS and analyze the network traffic.

  • PDF

자상에 의한 양심실 파열의 수술 치험 -1례 보고- (Survival After Biventricular Stab Wound)

  • 정원석;임승균;현명섭
    • Journal of Chest Surgery
    • /
    • 제28권6호
    • /
    • pp.630-632
    • /
    • 1995
  • Bichamber cardiac rupture is less frequent compared to unichamber cardiac rupture. We report a patient who was successfully treated after the diagnosis of penetrating stab wound of both ventricles. The key to improved outcome of management of cardiac trauma lies in the rapid transportation to a general hospital where cardiac surgery is available. Aggressive primary intervention and immediate operation are also major factors.

  • PDF

CALS체계의 정보보호 구조 연구 (A Study on the Security Architecture of CALS System)

  • 남길현
    • 한국전자거래학회지
    • /
    • 제4권2호
    • /
    • pp.197-208
    • /
    • 1999
  • With developing computer and communication technologies, the concept of CALS system has been popular not only to military but also to commercial industries. The security problem is one of the most critical issues to construct CALS infrastructure. The CALS system needs some security functions such that data confidentiality, integrity, authenticity, availability, and non-repudiation. This paper proposes a security architecture model in CALS. The security architecture model is composed of 5 submodels such that network security model, authentication and key management model, operation and audit model, integrated database security model, and risk analysis model.

  • PDF