• Title/Summary/Keyword: SI(System Integration)

Search Result 111, Processing Time 0.022 seconds

Development and Characterization of Vertical Type Probe Card for High Density Probing Test (고밀도 프로빙 테스트를 위한 수직형 프로브카드의 제작 및 특성분석)

  • Min, Chul-Hong;Kim, Tae-Seon
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.19 no.9
    • /
    • pp.825-831
    • /
    • 2006
  • As an increase of chip complexity and level of chip integration, chip input/output (I/O) pad pitches are also drastically reduced. With arrival of high complexity SoC (System on Chip) and SiP (System in Package) products, conventional horizontal type probe card showed its limitation on probing density for wafer level test. To enhance probing density, we proposed new vertical type probe card that has the $70{\mu}m$ probe needle with tungsten wire in $80{\mu}m$ micro-drilled hole in ceramic board. To minimize alignment error, micro-drilling conditions are optimized and epoxy-hardening conditions are also optimized to minimize planarity changes. To apply wafer level test for target devices (T5365 256M SDRAM), designed probe card was characterized by probe needle tension for test, contact resistance measurement, leakage current measurement and the planarity test. Compare to conventional probe card with minimum pitch of $50{\sim}125{\mu}m\;and\;2\;{\Omega}$ of average contact resistance, designed probe card showed only $22{\mu}$ of minimum pitch and $1.5{\Omega}$ of average contact resistance. And also, with the nature of vertical probing style, it showed comparably small contact scratch and it can be applied to bumping type chip test.

The effect of a learning organization within the enterprise to enhance program development capability (기업 내 학습조직이 개발역량강화 향상에 미치는 영향: L기업 사례를 중심으로)

  • Cho, Joonhee;Choi, Jinyoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.933-935
    • /
    • 2013
  • 국내 시스템 구축(System Integration) 및 유지보수(System Maintenance) 사업은 긴 사업 기간과 함께 하나의 사업을 다양한 업체와 함께 협력하여 개발을 하며 운영되고 있다. 이 중 대형 IT서비스업체는 컨설팅 및 제안을 통해 고객의 업무와 요구사항을 파악하며, 프로젝트를 이끌기 위해 방법론을 적용하여 사업 체계 관리 및 운영을 주로 담당한다. 그런데 이와 같은 관리 위주의 사업을 진행함으로써 임직원들의 개발 역량 부족 문제가 발견되고, 이것은 시스템에 대한 이해도 부족으로 다양한 업체와 협력하는데 있어 커뮤니케이션 문제로 직결되어 시스템의 품질 및 결함에 영향을 주기 때문에 이에 대한 대책 및 예방활동이 필요하다. 또한, 작은 국내 시장에서는 이미 경쟁이 심화 되어 포화 되었으며, 대부분의 IT서비스기업은 SI사업에서 솔루션사업으로 변모하기 위해 노력 중이고 국내 시장에서 해외 시장으로 눈을 돌리고 있으므로 직원들에 대한 기술 역량이 시급한 실정이다. 이와 같은 상황에 기업은 준비가 미흡할 뿐만 아니라 해당 활동을 수행하기 위한 필요한 지식 및 방법을 익히는데 어려움이 있는 상황이다. 본 논문에서는 이러한 상황을 극복하기 위해 대형 IT서비스업체에서 진행된 개발역량강화 학습조직 적용 사례에 대해 소개를 하고, 이에 대한 효과 검증을 해보고자 한다.

A study on the Approaches for Social Integration through Overcoming the Migrants' Social Exclusion (이주민의 사회적 배제 극복을 통한 사회통합 방안 연구)

  • Si-Ra Kim
    • Industry Promotion Research
    • /
    • v.8 no.3
    • /
    • pp.61-67
    • /
    • 2023
  • This study is to suggest ways to overcome the social exclusion experienced by migrants in Korean society and achieve social integration, focusing on the fact that social exclusion continues in many fields along with the increasing number of migrants. The research results are as follows. First, the legal system related to migrants must be enacted and revised. As the number of migrants increases, various legal and institutional enactments as well as reorganization of related laws are inevitable. Immigrants should be allowed to overcome social exclusion so that their cultural uniqueness and value are recognized and preserved, and they are given the same qualifications and abilities as the residents. Second, migrants' political participation must be guaranteed. When the political participation of migrants, which is currently only open to a small part, is guaranteed, Korean society can be seen as progressing one step toward a multicultural society. Third, residents and migrants must coexist. As a premise of this, it is necessary to prepare a ground where social exclusion can be overcome so that migrants can coexist. Immigrants should be able to develop a relationship of coexistence in the reality that social exclusion is progressing in each field compared to permanent residents. In conclusion, in order for the increasing number of immigrants to settle in Korean society, social integration can be achieved only when social exclusion imposed on immigrants is overcome.

INTRODUCTION OF THE G-7 PROJECT: Integrated System of Water Quality Management (G-7 과제에 대한 소개 : 수질관리를 위한 통합 시스템)

  • Kim, Kye-Hyun;Kim, Eui-Hong;Lee, Hong-Keun;Lee, In-Seon;Ryu, Joong-Hi
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.1 no.2 s.2
    • /
    • pp.143-152
    • /
    • 1993
  • A long-term water quality study has been initiated by the Korean Ministry of Environment(MOE) - The G-7 Project--in cooperation with two national research institutes, an University research tn and a consulting firm. This study includes the development of computer software for total water quality management system, so called ISWQM (Integrated System of Water Quality Management). ISWQM includes four major components: a GIS database; two artificial intelligence (AI) based expert systems to estimate pollutant loadings and to provide cost-effective wastewater treatment system for small and medium size urban areas; and computer programs to integrate the database and expert systems. ISWQM is to provide user-friendly Decision Support System (DSS) for water quality planners. A GIS was used to create spatial database which stores all the necessary data to n DSS. GIS was also used to integrate the four components of ISWQM from data creation to decision making through Graphic User Interface (GUI). The results from the first phase of this study showed that GIS would provide an effective tool to build DSS using expert system.

  • PDF

A Study of Methodology Based on Role-Based Serucity Agent Medical Information System Security Architecture Design (보안 에이전트 역할 기반에 기초한 의료정보시스템 소프트웨어 보안아키텍쳐 설계방안)

  • Lee, Dae-Sung;Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.77-83
    • /
    • 2011
  • In addition to the rapid development of health information technology services for the development of new medical information, a lot of research is underway. Improve health care services for patients are many ways to help them. However, no information about the security, if only the technology advances in health care systems will create an element of risk and threat. Today's issues and access issues are stable over a public network. Ad hocsensor network using secure, non-integrated health information system's security vulnerabilities does not solve the security vulnerabilities. In the development and utilization of health information systems to be subject to greater restrictions. Different security policies in an environment with a medical information system security policy mechanism that can be resolved if people get here are needed. Context-aware and flexible policy of integration and confidential medical information through the resistance should be guaranteed. Other cross-domain access control policy for telecommunications should be protected. In this paper, that the caller's medical information system, diversification, diversification Security agent in the environment, architecture, design, plan, role-based security system are proposed. The proposed system architecture, design work in the field and in the utilization of one model are expected to be.

STUDY ON THE PREVENTION METHOD FOR HEAT ACCUMULATION FOR PERSONAL RAPID TRANSIT (PRT) VEHICLE UNDER BODY (PRT 차량하부 열부하 저감방안 도출 연구)

  • Kwon, S.B.;Song, J.H.;Kang, S.W.;Jeong, R.G.;Kim, H.B.;Lee, C.H.;Seo, D.K.
    • Journal of computational fluids engineering
    • /
    • v.18 no.1
    • /
    • pp.58-62
    • /
    • 2013
  • Personal Rapid Transit (PRT) is the emerging personal transport vehicle operating on the loop automatically. The PRT system utilize the electrical power from super capacity or battery, it is important to manage the power or energy. In this regards, the management of high temperature occurred by the operation of system is significantly important to prevent from serious damage of component. In this study, we studied the adequate shape of underbody which can reduce the heat accumulation by pickup coil and condenser using natural air cooling. We suggested the additional air pathway, air inlet and flow separator to decrease the temperature of the heat source components. It was found that suggested system can decrease the temperature of PRT under body by 16% during the static mode and by 10% during the running mode at 30km/h. It is expected that the findings of this study will feed into final design of newly built Korean PRT vehicle.

Design and Implementation of an OSGi-based Old Age Patient Care System in Embedded Programming on RFIDs and Infrared Sensors (RFID와 적외선 센서의 임베디드 프로그래밍을 통한 OSGi 기반 노령 환자 케어 시스템의 설계 및 구현)

  • Cha, Si-Ho;Kim, Dae-Young;Choi, Jae-Ho;Lee, Jong-Eon;Kim, Kyu-Ho;Cho, Kuk-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.11B
    • /
    • pp.1005-1012
    • /
    • 2008
  • According to an aging population has dramatically increased in over the world, silver care becomes more important than other field. In this paper, we design and implement an old age patient care system that allows a carer to instantly monitor the status of proteges and notifies emergency of a patient to a medical institute. The system uses RFIDs and infrared sensors implemented in embedded software to analyze the activity and movement detection of the elderly. And the home gateway allows easy integration with heterogeneous devices by employing OSGi that is a middleware standard for home gateways. We can verify the information on the activity per day and the activity per week by Web browsers and view realtime video on the elderly by Web Cam using the implemented system. The system also can send us cell phone messages and E-mail in case of emergency.

Development of Quality Improvement Process based on the Maintenance Data of Weapon Systems (무기체계 정비 데이터를 활용한 품질 개선 프로세스 개발)

  • Kim, HunGil;Kwon, SeMin;Cho, KyoungHo;Sung, Si-Il
    • Journal of Korean Society for Quality Management
    • /
    • v.43 no.4
    • /
    • pp.499-510
    • /
    • 2015
  • Purpose: This paper treats the improvement of the quality and reliability of military weapon systems based on the maintenance data. Methods: The proposed method of the data integration and refinement are used to obtain the component reliability information and to find the frequently failed components based on the Pareto analysis. Based on the reliability information and the number of failed component frequencies, the target components of quality improvement are determined and improved by multiple methods such as engineering changes, special meetings, additional training and revising maintenance manuals. Results: Based on the proposed process, we find some components which need to be improved in order to enhance the quality and reliability. Conclusion: A process is developed for improving the quality and reliability of weapon systems. This process will be adopted by various weapon systems to enhance the quality and reliability, as well as reduce military spending.

Building Custom Development Environment for Improving the Utilization Efficiency of Embedded Software Development Tools (임베디드 소프트웨어 개발 도구의 활용 편의 향상을 위한 맞춤형 개발 환경 구축)

  • Kim, Jeong-Si;Lim, ChaeDeok
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.6 no.3
    • /
    • pp.183-189
    • /
    • 2011
  • For the rapid development of embedded software, a variety of development tools have been developed. But, the embedded software developers do not use the available tools fluently and do not improve software productivity as expect because there are short of supporting utilization convenience of development tools. In this paper, we suggest a tool of building custom development environment for improving the utilization convenience of embedded software development tools. The custom development environment helps developers to rapid selection and access of appropriate tools required to develop the embedded software on the specific embedded system. In addition, it enables developers to handle the outputs from development tools associatively. Moreover it is very flexible in extension and integration because it's implementation based on Eclipse technology. We also perform the evaluation of our tool and successfully validate the utilization convenience of embedded development tools. Therefore, we expect that this tool enables developers to use the embedded development tools efficiently, and then it help improving embedded software productivity.

A Study of Software Architecture Design Methods for Multiple Access Con trol under Web-based Medical Information System Environment (웹 기반 의료정보시스템 다중 접근제어를 위한 소프트웨어아키텍쳐 설계방법)

  • Noh, Si-Choon;Hwang, Jeong-Hee
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.43-49
    • /
    • 2011
  • Web-based health information provides a lot of conveniences, however the security vulnerabilities that appear in the network environment without the risk of exposure in the use of information are growing. Web-based medical information security issues when accessing only the technology advances, without attempting to seek a safe methodology are to increase the threat element. So it is required. to take advantage of web-based information security measures as a web-based access control security mechanism-based design. This paper is based on software architecture, design, ideas and health information systems were designed based on access control security mechanism. The methodologies are to derive a new design procedure, to design architecture and algorithms that make the mechanism functio n. To accomplish this goal, web-based access control for multiple patient information architecture infrastructures is needed. For this software framework to derive features that make the mechanism was derived based on the structure. The proposed system utilizes medical information, medical information when designing an application user retrieves data in real time, while ensuring integration of encrypted information under the access control algorithms, ensuring the safety management system design.