• Title/Summary/Keyword: Processing Method

Search Result 18,068, Processing Time 0.05 seconds

Effect of AlF3 addition to the plasma resistance behavior of YOF coating deposited by plasma-spraying method (플라즈마-스프레이법에 의해 코팅한 옥시불화이트륨(YOF) 증착층의 플라즈마 내식성에 미치는 불화알루미늄(AlF3) 첨가 효과)

  • Young-Ju Kim;Je Hong Park;Si Beom Yu;Seungwon Jeong;Kang Min Kim;Jeong Ho Ryu
    • Journal of the Korean Crystal Growth and Crystal Technology
    • /
    • v.33 no.4
    • /
    • pp.153-157
    • /
    • 2023
  • In order to manufacture a semiconductor circuit, etching, cleaning, and deposition processes are repeated. During these processes, the inside of the processing chamber is exposed to corrosive plasma. Therefore, the coating of the inner wall of the semiconductor equipment with a plasma-resistant material has been attempted to minimize the etching of the coating and particle contaminant generation. In this study, we mixed AlF3 powder with the solid-state reacted yttrium oxyfluoride (YOF) in order to increase plasma-etching resistance of the plasma spray coated YOF layer. Effects of the mixing ratio of AlF3 with YOF powder on crystal structure, microstructure and chemical composition were investigated using XRD and FE-SEM. The plasma-etching ratios of the plasma-spray coated layers were calculated and correlation with AlF3 mixing ratio was analyzed.

Shear-wave elasticity imaging with axial sub-Nyquist sampling (축방향 서브 나이퀴스트 샘플링 기반의 횡탄성 영상 기법)

  • Woojin Oh;Heechul Yoon
    • The Journal of the Acoustical Society of Korea
    • /
    • v.42 no.5
    • /
    • pp.403-411
    • /
    • 2023
  • Functional ultrasound imaging, such as elasticity imaging and micro-blood flow Doppler imaging, enhances diagnostic capability by providing useful mechanical and functional information about tissues. However, the implementation of functional ultrasound imaging poses limitations such as the storage of vast amounts of data in Radio Frequency (RF) data acquisition and processing. In this paper, we propose a sub-Nyquist approach that reduces the amount of acquired axial samples for efficient shear-wave elasticity imaging. The proposed method acquires data at a sampling rate one-third lower than the conventional Nyquist sampling rate and tracks shear-wave signals through RF signals reconstructed using band-pass filtering-based interpolation. In this approach, the RF signal is assumed to have a fractional bandwidth of 67 %. To validate the approach, we reconstruct the shear-wave velocity images using shear-wave tracking data obtained by conventional and proposed approaches, and compare the group velocity, contrast-to-noise ratio, and structural similarity index measurement. We qualitatively and quantitatively demonstrate the potential of sub-Nyquist sampling-based shear-wave elasticity imaging, indicating that our approach could be practically useful in three-dimensional shear-wave elasticity imaging, where a massive amount of ultrasound data is required.

Metamodeling Construction for Generating Test Case via Decision Table Based on Korean Requirement Specifications (한글 요구사항 기반 결정 테이블로부터 테스트 케이스 생성을 위한 메타모델링 구축화)

  • Woo Sung Jang;So Young Moon;R. Young Chul Kim
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.9
    • /
    • pp.381-386
    • /
    • 2023
  • Many existing test case generation researchers extract test cases from models. However, research on generating test cases from natural language requirements is required in practice. For this purpose, the combination of natural language analysis and requirements engineering is very necessary. However, Requirements analysis written in Korean is difficult due to the diverse meaning of sentence expressions. We research test case generation through natural language requirement definition analysis, C3Tree model, cause-effect graph, and decision table steps as one of the test case generation methods from Korean natural requirements. As an intermediate step, this paper generates test cases from C3Tree model-based decision tables using meta-modeling. This method has the advantage of being able to easily maintain the model-to-model and model-to-text transformation processes by modifying only the transformation rules. If an existing model is modified or a new model is added, only the model transformation rules can be maintained without changing the program algorithm. As a result of the evaluation, all combinations for the decision table were automatically generated as test cases.

Towards Carbon-Neutralization: Deep Learning-Based Server Management Method for Efficient Energy Operation in Data Centers (탄소중립을 향하여: 데이터 센터에서의 효율적인 에너지 운영을 위한 딥러닝 기반 서버 관리 방안)

  • Sang-Gyun Ma;Jaehyun Park;Yeong-Seok Seo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.4
    • /
    • pp.149-158
    • /
    • 2023
  • As data utilization is becoming more important recently, the importance of data centers is also increasing. However, the data center is a problem in terms of environment and economy because it is a massive power-consuming facility that runs 24 hours a day. Recently, studies using deep learning techniques to reduce power used in data centers or servers or predict traffic have been conducted from various perspectives. However, the amount of traffic data processed by the server is anomalous, which makes it difficult to manage the server. In addition, many studies on dynamic server management techniques are still required. Therefore, in this paper, we propose a dynamic server management technique based on Long-Term Short Memory (LSTM), which is robust to time series data prediction. The proposed model allows servers to be managed more reliably and efficiently in the field environment than before, and reduces power used by servers more effectively. For verification of the proposed model, we collect transmission and reception traffic data from six of Wikipedia's data centers, and then analyze and experiment with statistical-based analysis on the relationship of each traffic data. Experimental results show that the proposed model is helpful for reliably and efficiently running servers.

A Study on IP Camera Security Issues and Mitigation Strategies (IP 카메라 보안의 문제점 분석 및 보완 방안 연구)

  • Seungjin Shin;Jungheum Park;Sangjin Lee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.3
    • /
    • pp.111-118
    • /
    • 2023
  • Cyber attacks are increasing worldwide, and attacks on personal privacy such as CCTV and IP camera hacking are also increasing. If you search for IP camera hacking methods in spaces such as YouTube, SNS, and the dark web, you can easily get data and hacking programs are also on sale. If you use an IP camera that has vulnerabilities used by hacking programs, you easily get hacked even if you change your password regularly or use a complex password including special characters, uppercase and lowercase letters, and numbers. Although news and media have raised concerns about the security of IP cameras and suggested measures to prevent damage, hacking incidents continue to occur. In order to prevent such hacking damage, it is necessary to identify the cause of the hacking incident and take concrete measures. First, we analyzed weak account settings and web server vulnerabilities of IP cameras, which are the causes of IP camera hacking, and suggested solutions. In addition, as a specific countermeasure against hacking, it is proposed to add a function to receive a notification when an IP camera is connected and a function to save the connection history. If there is such a function, the fact of damage can be recognized immediately, and important data can be left in arresting criminals. Therefore, in this paper, we propose a method to increase the safety from hacking by using the connection notification function and logging function of the IP camera.

Evaluation of occlusal strength using T-Scan Novus and Dental prescale II in dental prosthodontic treatments: A case report (보철물 수복 형태에 따른 T-Scan Novus와 Dental prescale II를 이용한 교합력 평가 활용 증례)

  • Su-Hyun Choi;Yu-Sung Choi;Jong-Hyuk Lee;Seung-Ryong Ha
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.61 no.2
    • /
    • pp.160-178
    • /
    • 2023
  • Diagnosis and analysis of occlusal relationships are important factors in prosthetic treatment. A thorough occlusion analysis and evaluation should be performed before treatment to restore a stable interocclusal relationship. Analysis and evaluation are essential during the treatment process and at regular follow-ups. Recently, with the development of dental equipment and digital processing methods, new quantitative analysis methods that can record the patient's occlusal relationship have been introduced. Among them, the T-Scan Novus (Tekscan Inc., S. Boston, MA, USA) displays the strength of the initial contact point and the occlusal contact point of the teeth using a pressure sensor. With this, occlusal contact time of the teeth, anteroposterior and left-right balance of occlusal force can be compared. The Dental prescale II (GC Co., Tokyo, Japan) scans the occlusal contact point using a pressure-sensing film and analyzes the density of the contact point. It can measure the distribution and strength of the occlusal force of the teeth in the most natural occlusion state. Based on this, appropriate prosthetic treatment (four-unit fixed partial denture, removable partial denture, complete denture, and complete oral restoration cases) was performed according to the area and extent of the patient's tooth loss. The patient's occlusion at the first visit, treatment stage, right after treatment, and regular follow-up were compared and evaluated using a quantitative method for appropriate occlusion analysis using T-Scan Novus and Dental prescale II. This report enhances the understanding of occlusion analysis during prosthetic restoration. The results satisfied both the clinician and patients in terms of function and aesthetics.

Verification of Ground Subsidence Risk Map Based on Underground Cavity Data Using DNN Technique (DNN 기법을 활용한 지하공동 데이터기반의 지반침하 위험 지도 작성)

  • Han Eung Kim;Chang Hun Kim;Tae Geon Kim;Jeong Jun Park
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.2
    • /
    • pp.334-343
    • /
    • 2023
  • Purpose: In this study, the cavity data found through ground cavity exploration was combined with underground facilities to derive a correlation, and the ground subsidence prediction map was verified based on the AI algorithm. Method: The study was conducted in three stages. The stage of data investigation and big data collection related to risk assessment. Data pre-processing steps for AI analysis. And it is the step of verifying the ground subsidence risk prediction map using the AI algorithm. Result: By analyzing the ground subsidence risk prediction map prepared, it was possible to confirm the distribution of risk grades in three stages of emergency, priority, and general for Busanjin-gu and Saha-gu. In addition, by arranging the predicted ground subsidence risk ratings for each section of the road route, it was confirmed that 3 out of 61 sections in Busanjin-gu and 7 out of 68 sections in Sahagu included roads with emergency ratings. Conclusion: Based on the verified ground subsidence risk prediction map, it is possible to provide citizens with a safe road environment by setting the exploration section according to the risk level and conducting investigation.

Development of Integrated Management System Based on GIS on Soft Ground (GIS 기법을 이용한 연약 지반 시공 관리 시스템의 개발)

  • Chun, Sung-Ho;Woo, Sang-Inn;Chung, Choong-Ki;Choi, In-Gul
    • Journal of the Korean Geotechnical Society
    • /
    • v.23 no.7
    • /
    • pp.37-46
    • /
    • 2007
  • In the practice of preloading method for soft ground improvement, field engineers need information of ground properties, construction works and field monitoring on ground behaviors of the site. So, integrating all these informations into one database can provide more efficient way for managing and utilizing the data for construction management. In this study, integrated system for construction management of ground improvement sites under preloading is developed. The developed system consists of database (DB) and application program. The database contains all collected data in a construction site and processed data in the system with their geographic information. All informations in the database are standardized from the result of data characterization. Application program performs various functions on managing and utilizing information in the database; pre- and post- data processing with graphic visualization of output, spatial data interpolation, and prediction of ground behavior using field measuring data. And by providing integrating informations and predictions over entire project area with comprehensible visual displays, the applicability and effectiveness of the developed system for construction management were confirmed.

Establishment of a Standard Procedure for Safety Inspections of Bridges Using Drones (드론 활용 교량 안전점검을 위한 표준절차 정립)

  • Lee, Suk Bae;Lee, Kihong;Choi, Hyun Min;Lim, Chi Sung
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.42 no.2
    • /
    • pp.281-290
    • /
    • 2022
  • In Korea, the number of national facilities for which a safety inspection is mandatory is increasing, and a safer safety inspection method is needed. This study aimed to increase the efficiency of the bridge safety inspection by enabling rapid exterior inspection while securing the safety of inspectors by using drones to perform the safety inspections of bridges, which had mainly relied on visual inspections. For the research, the Youngjong Grand Bridge in Incheon was selected as a test bed and was divided into four parts: the warren truss, suspension bridge main cable, main tower, and pier. It was possible to establish a five-step standard procedure for drone safety inspections. The step-by-step contents of the standard procedure obtained as a result of this research are: Step 1, facility information collection and analysis, Step 2, analysis of vulnerable parts and drone flight planning, Step 3, drone photography and data processing, Step 4, condition evaluation by external inspection, Step 5, building of external inspection diagram and database. Therefore, if the safety inspections of civil engineering facilities including bridges are performed according to this standard procedure, it is expected that these inspection can be carried out more systematically and efficiently.

The Development of Gender Identity Scale in Sports Participants (스포츠 참여자의 성 정체성 측정도구 개발)

  • Ahn, Byoung-Wook
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.7
    • /
    • pp.267-278
    • /
    • 2017
  • The aim of this paper was to develop a scale for measuring gender identity among sports participants (114 male, 193 female). Gender similarities and latent mean analysis was used to validate the gender identity measurement method. Data processing was carried out by way of frequency analysis, exploratory and confirmatory factor analysis, reliability, correlation, normal distribution of questions, and latent mean analysis using SPSS 18.0 and AMOS 18.0. The results of this study were as follows: First, the equivalence had revealed the configurable, metric, and scalar invariance of the scale that can be used in multi-groups in the same way. Second, women had a more open inclination than men when it came to participating in sports activities (p<.001). Third, women participating in sports activities tended to be more conservative than men (p<.001). Fourth, women who participated in sports activities showed a higher subjective tendency than men (p<.001). Fifth, there was no statistical difference in the outward tendency when participating in sports activities (p<.05). The results of this study suggest that gender identity among sports participants is not influenced by the changing times and the advancement of women in society.