• Title/Summary/Keyword: Performance Improvement

Search Result 12,284, Processing Time 0.04 seconds

Correlation Analysis of Cutter Acting Force and Temperature During the Linear Cutting Test Accompanied by Infrared Thermography (선형절삭시험과 적외선 열화상 측정을 통한 픽커터 작용력과 발생 온도의 상관관계 분석)

  • Soo-Ho Chang;Tae-Ho Kang;Chulho Lee;Hoyoung Jeong;Soon-Wook Choi
    • Tunnel and Underground Space
    • /
    • v.33 no.6
    • /
    • pp.519-533
    • /
    • 2023
  • In this study, the linear cutting tests of pick cutters were carried out on a granitic rock with the average compressive strength over 100 MPa. From the tests, the correlation between the cutter acting force and the temperature measured by infrared thermal imaging camera during rock cutting was analyzed. In every experimental condition, the maximum temperature was measured at the rock surface where the chipping occurred, and the temperature generated in the rock was closely correlated with the cutter acting force. On the other hand, the temperature of a pick cutter increased up to only 36℃ above the ambient temperature, and the correlation with the cutter force was not obvious. This can be attributed to the short cutting distance under laboratory conditions and the high thermal conductivity of the tungsten carbide inserts. However, the relatively high temperature of the tungsten carbide inserts was found to be maintained. Therefore, it is recommended that a reinforcement between the insert and the head of a pick cutter or the quality improvement of silvering brazing in the production of a cutter is necessary to maintain the high cutting performance of a pick cutter.

Comparative study of laminar and turbulent models for three-dimensional simulation of dam-break flow interacting with multiarray block obstacles (다층 블록 장애물과 상호작용하는 3차원 댐붕괴흐름 모의를 위한 층류 및 난류 모델 비교 연구)

  • Chrysanti, Asrini;Song, Yangheon;Son, Sangyoung
    • Journal of Korea Water Resources Association
    • /
    • v.56 no.spc1
    • /
    • pp.1059-1069
    • /
    • 2023
  • Dam-break flow occurs when an elevated dam suddenly collapses, resulting in the catastrophic release of rapid and uncontrolled impounded water. This study compares laminar and turbulent closure models for simulating three-dimensional dam-break flows using OpenFOAM. The Reynolds-Averaged Navier-Stokes (RANS) model, specifically the k-ε model, is employed to capture turbulent dissipation. Two scenarios are evaluated based on a laboratory experiment and a modified multi-layered block obstacle scenario. Both models effectively represent dam-break flows, with the turbulent closure model reducing oscillations. However, excessive dissipation in turbulent models can underestimate water surface profiles. Improving numerical schemes and grid resolution enhances flow recreation, particularly near structures and during turbulence. Model stability is more significantly influenced by numerical schemes and grid refinement than the use of turbulence closure. The k-ε model's reliance on time-averaging processes poses challenges in representing dam-break profiles with pronounced discontinuities and unsteadiness. While simulating turbulence models requires extensive computational efforts, the performance improvement compared to laminar models is marginal. To achieve better representation, more advanced turbulence models like Large Eddy Simulation (LES) and Direct Numerical Simulation (DNS) are recommended, necessitating small spatial and time scales. This research provides insights into the applicability of different modeling approaches for simulating dam-break flows, emphasizing the importance of accurate representation near structures and during turbulence.

A Design of Authentication Mechanism for Secure Communication in Smart Factory Environments (스마트 팩토리 환경에서 안전한 통신을 위한 인증 메커니즘 설계)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2024
  • Smart factories represent production facilities where cutting-edge information and communication technologies are fused with manufacturing processes, reflecting rapid advancements and changes in the global manufacturing sector. They capitalize on the integration of robotics and automation, the Internet of Things (IoT), and the convergence of artificial intelligence technologies to maximize production efficiency in various manufacturing environments. However, the smart factory environment is prone to security threats and vulnerabilities due to various attack techniques. When security threats occur in smart factories, they can lead to financial losses, damage to corporate reputation, and even human casualties, necessitating an appropriate security response. Therefore, this paper proposes a security authentication mechanism for safe communication in the smart factory environment. The components of the proposed authentication mechanism include smart devices, an internal operation management system, an authentication system, and a cloud storage server. The smart device registration process, authentication procedure, and the detailed design of anomaly detection and update procedures were meticulously developed. And the safety of the proposed authentication mechanism was analyzed, and through performance analysis with existing authentication mechanisms, we confirmed an efficiency improvement of approximately 8%. Additionally, this paper presents directions for future research on lightweight protocols and security strategies for the application of the proposed technology, aiming to enhance security.

Cox Model Improvement Using Residual Blocks in Neural Networks: A Study on the Predictive Model of Cervical Cancer Mortality (신경망 내 잔여 블록을 활용한 콕스 모델 개선: 자궁경부암 사망률 예측모형 연구)

  • Nang Kyeong Lee;Joo Young Kim;Ji Soo Tak;Hyeong Rok Lee;Hyun Ji Jeon;Jee Myung Yang;Seung Won Lee
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.6
    • /
    • pp.260-268
    • /
    • 2024
  • Cervical cancer is the fourth most common cancer in women worldwide, and more than 604,000 new cases were reported in 2020 alone, resulting in approximately 341,831 deaths. The Cox regression model is a major model widely adopted in cancer research, but considering the existence of nonlinear associations, it faces limitations due to linear assumptions. To address this problem, this paper proposes ResSurvNet, a new model that improves the accuracy of cervical cancer mortality prediction using ResNet's residual learning framework. This model showed accuracy that outperforms the DNN, CPH, CoxLasso, Cox Gradient Boost, and RSF models compared in this study. As this model showed accuracy that outperformed the DNN, CPH, CoxLasso, Cox Gradient Boost, and RSF models compared in this study, this excellent predictive performance demonstrates great value in early diagnosis and treatment strategy establishment in the management of cervical cancer patients and represents significant progress in the field of survival analysis.

Three-Dimensional Printing of Congenital Heart Disease Models for Cardiac Surgery Simulation: Evaluation of Surgical Skill Improvement among Inexperienced Cardiothoracic Surgeons

  • Ju Gang Nam;Whal Lee;Baren Jeong;Eun-Ah Park;Ji Yeon Lim;Yujin Kwak;Hong-Gook Lim
    • Korean Journal of Radiology
    • /
    • v.22 no.5
    • /
    • pp.706-713
    • /
    • 2021
  • Objective: To evaluate the impact of surgical simulation training using a three-dimensional (3D)-printed model of tetralogy of Fallot (TOF) on surgical skill development. Materials and Methods: A life-size congenital heart disease model was printed using a Stratasys Object500 Connex2 printer from preoperative electrocardiography-gated CT scans of a 6-month-old patient with TOF with complex pulmonary stenosis. Eleven cardiothoracic surgeons independently evaluated the suitability of four 3D-printed models using composite Tango 27, 40, 50, and 60 in terms of palpation, resistance, extensibility, gap, cut-through ability, and reusability of. Among these, Tango 27 was selected as the final model. Six attendees (two junior cardiothoracic surgery residents, two senior residents, and two clinical fellows) independently performed simulation surgeries three times each. Surgical proficiency was evaluated by an experienced cardiothoracic surgeon on a 1-10 scale for each of the 10 surgical procedures. The times required for each surgical procedure were also measured. Results: In the simulation surgeries, six surgeons required a median of 34.4 (range 32.5-43.5) and 21.4 (17.9-192.7) minutes to apply the ventricular septal defect (VSD) and right ventricular outflow tract (RVOT) patches, respectively, on their first simulation surgery. These times had significantly reduced to 17.3 (16.2-29.5) and 13.6 (10.3-30.0) minutes, respectively, in the third simulation surgery (p = 0.03 and p = 0.01, respectively). The decreases in the median patch appliance time among the six surgeons were 16.2 (range 13.6-17.7) and 8.0 (1.8-170.3) minutes for the VSD and RVOT patches, respectively. Summing the scores for the 10 procedures showed that the attendees scored an average of 28.58 ± 7.89 points on the first simulation surgery and improved their average score to 67.33 ± 15.10 on the third simulation surgery (p = 0.008). Conclusion: Inexperienced cardiothoracic surgeons improved their performance in terms of surgical proficiency and operation time during the experience of three simulation surgeries using a 3D-printed TOF model using Tango 27 composite.

Characteristic Analysis on Urban Road Networks Using Various Path Models (다양한 경로 모형을 이용한 도시 도로망의 특성 분석)

  • Bee Geum;Hwan-Gue Cho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.6
    • /
    • pp.269-277
    • /
    • 2024
  • With the advancement of modern IT technologies, the operation of autonomous vehicles is becoming a reality, and route planning is essential for this. Generally, route planning involves proposing the shortest path to minimize travel distance and the quickest path to minimize travel time. However, the quality of these routes depends on the topological characteristics of the road network graph. If the connectivity structure of the road network is not rational, there are limits to the performance improvement that routing algorithms can achieve. Real drivers consider psychological factors such as the number of turns, surrounding environment, traffic congestion, and road quality when choosing routes, and they particularly prefer routes with fewer turns. This paper introduces a simple path algorithm that seeks routes with the fewest turns, in addition to the traditional shortest distance and quickest time routes, to evaluate the characteristics of road networks. Using this simple path algorithm, we compare and evaluate the connectivity characteristics of road networks in 20 major cities worldwide. By analyzing these road network characteristics, we can identify the strengths and weaknesses of urban road networks and develop more efficient and safer route planning algorithms. This paper comprehensively examines the quality of road networks and the efficiency of route planning by analyzing and comparing the road network characteristics of each city using the proposed simple path algorithm.

Attention Based Collaborative Source-Side DDoS Attack Detection (어텐션 기반 협업형 소스측 분산 서비스 거부 공격 탐지)

  • Hwisoo Kim;Songheon Jeong;Kyungbaek Kim
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.4
    • /
    • pp.157-165
    • /
    • 2024
  • The evolution of the Distributed Denial of Service Attack(DDoS Attack) method has increased the difficulty in the detection process. One of the solutions to overcome the problems caused by the limitations of the existing victim-side detection method was the source-side detection technique. However, there was a problem of performance degradation due to network traffic irregularities. In order to solve this problem, research has been conducted to detect attacks using a collaborative network between several nodes based on artificial intelligence. Existing methods have shown limitations, especially in nonlinear traffic environments with high Burstness and jitter. To overcome this problem, this paper presents a collaborative source-side DDoS attack detection technique introduced with an attention mechanism. The proposed method aggregates detection results from multiple sources and assigns weights to each region, and through this, it is possible to effectively detect overall attacks and attacks in specific few areas. In particular, it shows a high detection rate with a low false positive of about 6% and a high detection rate of up to 4.3% in a nonlinear traffic dataset, and it can also confirm improvement in attack detection problems in a small number of regions compared to methods that showed limitations in the existing nonlinear traffic environment.

Analysis of the Effectiveness of Big Data-Based Six Sigma Methodology: Focus on DX SS (빅데이터 기반 6시그마 방법론의 유효성 분석: DX SS를 중심으로)

  • Kim Jung Hyuk;Kim Yoon Ki
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.13 no.1
    • /
    • pp.1-16
    • /
    • 2024
  • Over recent years, 6 Sigma has become a key methodology in manufacturing for quality improvement and cost reduction. However, challenges have arisen due to the difficulty in analyzing large-scale data generated by smart factories and its traditional, formal application. To address these limitations, a big data-based 6 Sigma approach has been developed, integrating the strengths of 6 Sigma and big data analysis, including statistical verification, mathematical optimization, interpretability, and machine learning. Despite its potential, the practical impact of this big data-based 6 Sigma on manufacturing processes and management performance has not been adequately verified, leading to its limited reliability and underutilization in practice. This study investigates the efficiency impact of DX SS, a big data-based 6 Sigma, on manufacturing processes, and identifies key success policies for its effective introduction and implementation in enterprises. The study highlights the importance of involving all executives and employees and researching key success policies, as demonstrated by cases where methodology implementation failed due to incorrect policies. This research aims to assist manufacturing companies in achieving successful outcomes by actively adopting and utilizing the methodologies presented.

A Study on the Improvement of Geriatric Sarcopenia by Non-face-to-face Intervention Method (비대면 중재 방법에 따른 노인성 근감소증의 개선에 대한 연구)

  • Myung-Chul Kim;Ju-Hyung Park;Min-Ji Kwon;Beom-Seok Kim;Min-Kyung Park;Seo-Yoon Park;Sung-Jin Park;;Si-Yeon Park;Jung-Hu Park;Joon-Woo Song;Jong-Hyun Yu;Jung-Hyun Lee;Ji-Hyung Lee;Hae-In Kim
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.12 no.1
    • /
    • pp.49-62
    • /
    • 2024
  • Purpose : This study was conducted to compare two non-face-to-face exercise interventions depending on whether mobile applications and wearable exercise aids are used to find out which interventions are more effective in improving senile sarcopenia. Ultimately, it was conducted to provide basic data for developing non-face-to-face intervention methods to improve sarcopenia. Method : In this study, 18 elderly sarcopenia and possible sarcopenia aged 65 or older were randomly assigned to the digital and self-exercise intervention groups. The digital exercise intervention group performed eight exercise programs with mobile applications and wearable exercise aids to record and manage the elderly performing the programs in real time. And the self-exercise intervention group performed the same program on its own as implemented in the digital exercise group. The intervention was applied for 8 weeks, and before and after the intervention, sarcopenia evaluation and physical function evaluation were performed. Results : In the digital exercise intervention group, arm muscle mass, skeletal muscle index, SPPB, 5TSTS, and BBS were improved, and in the self-exercise intervention group, grip strength, SPPB, 5TSTS, and BBS were improved. Conclusion : It was confirmed that both groups are effective in improving physical performance and physical function, the digital exercise intervention is effective in improving muscle mass and self-exercise intervention is effective in improving muscle strength. Therefore, this study proposes to apply intervention methods separately according to the indicators to improve and prevent sarcopenia, and also simplify the instructions of applications used to improve sarcopenia and to create an environment where users can be trained regularly on how to use it. And, In the future, studies for the development of devices to be designed to help non-face-to-face exercise interventions or studies on the differences between face-to-face and non-face-to-face exercise interventions should be conducted in terms of the effect of improving sarcopenia.

A Performance Improvement Method using Variable Break in Corpus Based Japanese Text-to-Speech System (가변 Break를 이용한 코퍼스 기반 일본어 음성 합성기의 성능 향상 방법)

  • Na, Deok-Su;Min, So-Yeon;Lee, Jong-Seok;Bae, Myung-Jin
    • The Journal of the Acoustical Society of Korea
    • /
    • v.28 no.2
    • /
    • pp.155-163
    • /
    • 2009
  • In text-to-speech systems, the conversion of text into prosodic parameters is necessarily composed of three steps. These are the placement of prosodic boundaries. the determination of segmental durations, and the specification of fundamental frequency contours. Prosodic boundaries. as the most important and basic parameter. affect the estimation of durations and fundamental frequency. Break prediction is an important step in text-to-speech systems as break indices (BIs) have a great influence on how to correctly represent prosodic phrase boundaries, However. an accurate prediction is difficult since BIs are often chosen according to the meaning of a sentence or the reading style of the speaker. In Japanese, the prediction of an accentual phrase boundary (APB) and major phrase boundary (MPB) is particularly difficult. Thus, this paper presents a method to complement the prediction errors of an APB and MPB. First, we define a subtle BI in which it is difficult to decide between an APB and MPB clearly as a variable break (VB), and an explicit BI as a fixed break (FB). The VB is chosen using the classification and regression tree, and multiple prosodic targets in relation to the pith and duration are then generated. Finally. unit-selection is conducted using multiple prosodic targets. In the MOS test result. the original speech scored a 4,99. while proposed method scored a 4.25 and conventional method scored a 4.01. The experimental results show that the proposed method improves the naturalness of synthesized speech.