• Title/Summary/Keyword: SW engineering

Search Result 832, Processing Time 0.025 seconds

Development of Smart Factory Diagnostic Model Reflecting Manufacturing Characteristics and Customized Application of Small and Medium Enterprises (제조업 특성을 반영한 스마트공장 진단모델 개발 및 중소기업 맞춤형 적용사례)

  • Kim, Hyun-Deuk;Kim, Dong-Min;Lee, Kyung-Geun;Yoon, Je-Whan;Youm, Sekyoung
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.42 no.3
    • /
    • pp.25-38
    • /
    • 2019
  • This study is to develop a diagnostic model for the effective introduction of smart factories in the manufacturing industry, to diagnose SMEs that have difficulties in building their own smart factory compared to large enterprise, to identify the current level and to present directions for implementation. IT, AT, and OT experts diagnosed 18 SMEs using the "Smart Factory Capacity Diagnosis Tool" developed for smart factory level assessment of companies. They analyzed the results and assessed the level by smart factory diagnosis categories. Companies' smart factory diagnostic mean score is 322 out of 1000 points, between 1 level (check) and 2 level (monitoring). According to diagnosis category, Factory Field Basic, R&D, Production/Logistics/Quality Control, Supply Chain Management and Reference Information Standardization are high but Strategy, Facility Automation, Equipment Control, Data/Information System and Effect Analysis are low. There was little difference in smart factory level depending on whether IT system was built or not. Also, Companies with large sales amount were not necessarily advantageous to smart factories. This study will help SMEs who are interested in smart factory. In order to build smart factory, it is necessary to analyze the market trends, SW/ICT and establish a smart factory strategy suitable for the company considering the characteristics of industry and business environment.

Response System for DRDoS Amplification Attacks (DRDoS 증폭 공격 대응 시스템)

  • Kim, Hyo-Jong;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.12
    • /
    • pp.22-30
    • /
    • 2020
  • With the development of information and communication technology, DDoS and DRDoS continue to become security issues, and gradually develop into advanced techniques. Recently, IT companies have been threatened with DRDoS technology, which uses protocols from normal servers to exploit as reflective servers. Reflective traffic is traffic from normal servers, making it difficult to distinguish from security equipment and amplified to a maximum of Tbps in real-life cases. In this paper, after comparing and analyzing the DNS amplification and Memcached amplification used in DRDoS attacks, a countermeasure that can reduce the effectiveness of the attack is proposed. Protocols used as reflective traffic include TCP and UDP, and NTP, DNS, and Memcached. Comparing and analyzing DNS protocols and Memcached protocols with higher response sizes of reflective traffic among the protocols used as reflective traffic, Memcached protocols amplify ±21% more than DNS protocols. The countermeasure can reduce the effectiveness of an attack by using the Memcached Protocol's memory initialization command. In future studies, various security-prone servers can be shared over security networks to predict the fundamental blocking effect.

Analysis of Impact on ERP Customization Module Using CSR Data

  • Yoo, Byung-Keun;Kim, Seung-Hee
    • Journal of Information Processing Systems
    • /
    • v.17 no.3
    • /
    • pp.473-488
    • /
    • 2021
  • The enterprise resource planning (ERP) system is a standardized and advanced business process that many companies are implementing now-a-days through customization. However, it affects the efficiency of operations as these customizations are based on uniqueness. In this study, we analyzed the impact of customized modules and processing time on customer service request (CSR), by utilizing the stacked CSR data during the construction and operation of ERP, focusing on small and medium-sized enterprises (SMEs). As a result, a positive correlation was found between unit companies and the length of ERP implementation; ERP modules and the length of ERP implementation; ERP modules and unit companies; and the type of ERP implementation and ERP module. In terms of CSR, a comparison of CSR processing time of CBO (customized business object) module and STD (standard) module revealed that while the five modules did not display statistically significant differences, one module demonstrated a statistically very significant difference. In sum, the analysis indicates that the CBO-type CSR and its processing cost are higher than those of STD-type CSR. These results indicate that companies planning to implement an ERP system should consider the ERP module and their customization ratio and level. It not only gives the theoretical validity that should be considered as an indicator for decision making when ERP is constructed, but also its implications on the impact of processing time suggesting that the maintenance costs and project scheduling of ERP software must also be considered. This study is the first to present the degree of impact on the operation and maintenance of customized modules based on actual data and can provide a theoretical basis for applying SW change ratio in the cost estimation of ERP system maintenance.

Performance Evaluation of Discovery and Message Transmission of DDS (Data Distribution Service) Security (보안 DDS(Data Distribution Service)의 디스커버리 및 메시지 전송 성능 분석)

  • Im, Jinyong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.5
    • /
    • pp.701-708
    • /
    • 2021
  • In this paper, I investigate the performances of the discovery and the message transmission of the DDS (Data Distribution Service) included the security function. The DDS serves the communication protocol, a publication- subscription method, for the real-time communication in the distributed system. The publication-subscription method is used in the various area in terms of defence, traffic and medical due to the strength such as a performance, scailability and availability. Nowadays, many communication standard has included and re-defined the security function to prepare from dramatically increased a threat of the security, the DDS also publishes the standard included the security function. But it had been not researched that the effect of increased a overhead for legacy systems due to the using of the security DDS function. The experimental results show that the comparative performance of legacy DDS and security DDS in terms of the discovery and the message transmission.

The Improvement of NDF(No Defect Found) on Mobile Device Using Datamining (데이터 마이닝 기법을 활용한 Mobile Device NDF(No Defect Found) 개선)

  • Lee, Jewang;Han, Chang Hee
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.1
    • /
    • pp.60-70
    • /
    • 2021
  • Recently, with the development of technologies for the fourth industrial revolution, convergence and complex technology are being applied to aircraft, electronic home appliances and mobile devices, and the number of parts used is increasing. Increasing the number of parts and the application of convergence technologies such as HW (hardware) and SW (software) are increasing the No Defect Found (NDF) phenomenon in which the defect is not reproduced or the cause of the defect cannot be identified in the subsequent investigation systems after the discovery of the defect in the product. The NDF phenomenon is a major problem when dealing with complex technical systems, and its consequences may be manifested in decreased safety and dependability and increased life cycle costs. Until now, NDF-related prior studies have been mainly focused on the NDF cost estimation, the cause and impact analysis of NDF in qualitative terms. And there have been no specific methodologies or examples of a working-level perspective to reduce NDF. The purpose of this study is to present a practical methodology for reducing NDF phenomena through data mining methods using quantitative data accumulated in the enterprise. In this study, we performed a cluster analysis using market defects and design-related variables of mobile devices. And then, by analyzing the characteristics of groups with high NDF ratios, we presented improvement directions in terms of design and after service policies. This is significant in solving NDF problems from a practical perspective in the company.

Analysis of the Current Status of the AI Major Curriculum at Universities Based on Standard of AI Curriculum

  • Kim, Han Sung;Kim, Doohyun;Kim, Sang Il;Lee, Won Joo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.3
    • /
    • pp.25-31
    • /
    • 2022
  • The purpose of this study is to explore the implications for the systematic operation of the AI curriculum by analyzing the current status of the AI major curriculum in universities. To this end, This study analyzed the relevant curriculum of domestic universities(a total of 51 schools) and overseas QS Top 10 universities based on the industry demand-based standard of AI major curriculum developed through prior research. The main research results are as follows. First, in the case of domestic universities, Python-centered programming subjects were lacking. Second, there were few subjects for advanced learning such as AI application and convergence. Third, the subjects required to perform the AI developer job were insufficient. Fourth, in the case of colleges, the ratio of AI mathematics-related subjects was low. Based on these results, this study presented implications for the systematic operation of the AI major education.

VDI deployment and performance analysys for multi-core-based applications (멀티코어 기반 어플리케이션 운용을 위한 데스크탑 가상화 구성 및 성능 분석)

  • Park, Junyong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.10
    • /
    • pp.1432-1440
    • /
    • 2022
  • Recently, as Virtual Desktop Infrastructure(VDI) is widely used not only in office work environments but also in workloads that use high-spec multi-core-based applications, the requirements for real-time and stability of VDI are increasing. Accordingly, the display protocol used for remote access in VDI and performance optimization of virtual machines have also become more important. In this paper, we propose two ways to configure desktop virtualization for multi-core-based application operation. First, we propose a codec configuration of a display protocol with optimal performance in a high load situation due to multi-processing. Second, we propose a virtual CPU scheduling optimization method to reduce scheduling delay in case of CPU contention between virtual machines. As a result of the test, it was confirmed that the H.264 codec of Blast Extreme showed the best and stable frame, and the scheduling performance of the virtual CPU was improved through scheduling optimization.

Water consumption prediction based on machine learning methods and public data

  • Kesornsit, Witwisit;Sirisathitkul, Yaowarat
    • Advances in Computational Design
    • /
    • v.7 no.2
    • /
    • pp.113-128
    • /
    • 2022
  • Water consumption is strongly affected by numerous factors, such as population, climatic, geographic, and socio-economic factors. Therefore, the implementation of a reliable predictive model of water consumption pattern is challenging task. This study investigates the performance of predictive models based on multi-layer perceptron (MLP), multiple linear regression (MLR), and support vector regression (SVR). To understand the significant factors affecting water consumption, the stepwise regression (SW) procedure is used in MLR to obtain suitable variables. Then, this study also implements three predictive models based on these significant variables (e.g., SWMLR, SWMLP, and SWSVR). Annual data of water consumption in Thailand during 2006 - 2015 were compiled and categorized by provinces and distributors. By comparing the predictive performance of models with all variables, the results demonstrate that the MLP models outperformed the MLR and SVR models. As compared to the models with selected variables, the predictive capability of SWMLP was superior to SWMLR and SWSVR. Therefore, the SWMLP still provided satisfactory results with the minimum number of explanatory variables which in turn reduced the computation time and other resources required while performing the predictive task. It can be concluded that the MLP exhibited the best result and can be utilized as a reliable water demand predictive model for both of all variables and selected variables cases. These findings support important implications and serve as a feasible water consumption predictive model and can be used for water resources management to produce sufficient tap water to meet the demand in each province of Thailand.

Design and Development of Management System Standard Software for Aids to Navigation Based on S-201 (S-201 기반 항로표지 관리운영시스템 표준 SW 설계 및 개발)

  • Yeo, Ji-Min;Chae, Jeong-Geun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.12
    • /
    • pp.1927-1934
    • /
    • 2021
  • The AtoN are installed and operated on the sea in order to help the safe navigation of ships. With the development of maritime ICT, to monitor and control the condition of AtoN from land using multiplex communication network such as AtoN AIS, CDMA, and LTE. Currently, The information of AtoN is difficult to integrated manage because AtoN management systems has been independently developed and operatie according to the operating conditions of the Regional Office of Oceans and Fisheries. In addition, in preparation for the introduction for e-navigation and MASS, systematic and unified information of AtoN is required. In this paper, we study to design and develop standard software for AtoN management system based on the international standard for navigation information(S-201). Through this study, it will be possible to provide continuous AtoN information and effective AtoN management.

A Design and Implementation of SpO2 Wearable Device for Companion Animals in PPG Signals

  • Kim, Woo-Chan;Chang, Jin-Wook;Kwon, Hoon;Lee, Won Joo;Kwak, Ho-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.11
    • /
    • pp.191-198
    • /
    • 2022
  • The most basic thing to measure the condition of a companion animal is to check the breathing and pulse. There are several methods to measure the breathing and pulse of a companion animal, and the PPG method is generally used to measure the oxygen saturation (SpO2) in a companion animal. However, since the input PPG signal is inputted with various information as well as oxygen saturation, it is necessary to separate and extract oxygen saturation information from the PPG signal in order to measure the oxygen saturation. Therefore, in this paper, a wearable measuring device for companion animals that can be measured by applying the PPG method was designed and implemented, and an algorithm for separating oxygen saturation information from the PPG signal input through the wearable measuring device was proposed.