• Title/Summary/Keyword: System Design Process

Search Result 8,601, Processing Time 0.041 seconds

Nonlinear Characteristic Analysis of Charging Current for Linear Type Magnetic Flux Pump Using RBFNN (RBF 뉴럴네트워크를 이용한 리니어형 초전도 전원장치의 비선형적 충전전류특성 해석)

  • Chung, Yoon-Do;Park, Ho-Sung;Kim, Hyun-Ki;Oh, Sung-Kwun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.1
    • /
    • pp.140-145
    • /
    • 2010
  • In this work, to theoretically analyze the nonlinear charging characteristic, a Radial Basis Function Neural Network (RBFNN) is adopted. Based on the RBFNN, an charging characteristic tendency of a Linear Type Magnetic Flux Pump (LTMFP) is analyzed. In the paper, we developed the LTMFP that generates stable and controllable charging current and also experimentally investigated its charging characteristic in the cryogenic system. From these experimental results, the charging current of the LTMFP was also found to be frequency dependent with nonlinear quality due to the nonlinear magnetic behaviour of superconducting Nb foil. On the whole, in the case of essentially cryogenic experiment, since cooling costs loomed large in the cryogenic environment, it is difficult to carry out various experiments. Consequentially, in this paper, we estimated the nonlinear characteristic of charging current as well as realized the intelligent model via the design of RBFNN based on the experimental data. In this paper, we view RBF neural networks as predominantly data driven constructs whose processing is based upon an effective usage of experimental data through a prudent process of Fuzzy C-Means clustering method. Also, the receptive fields of the proposed RBF neural network are formed by the FCM clustering.

Design and Implementation of Cyber Range for Cyber Defense Exercise Based on Cyber Crisis Alert (사이버위기 경보 기반 사이버 방어 훈련장 설계 및 구축 연구)

  • Choi, Younghan;Jang, Insook;Whoang, Inteck;Kim, Taeghyoon;Hong, Soonjwa;Park, Insung;Yang, Jinsoek;Kwon, Yeongjae;Kang, Jungmin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.805-821
    • /
    • 2020
  • Cyber defense exercise should require training on the latest cyber attacks and have a similar process to defense cyber attacks. In addition, it is also important to train on cyber resilience that can perform normal tasks or support equivalent tasks regardless of cyber attacks. In this paper, we proposed and developed a cyber range that can strengthen the elements of cyber resilience by performing cyber defense exercise in real time based on the cyber crisis alert issued when a cyber attack occurs in Korea. When BLUE, YELLOW, ORANGE, and RED warnings are issued according to the cyber crisis, our system performs proactive response, real time response, and post response according to the alarm. It can improve trainee's capability to respond to cyber threats by performing cyber defense exercise in a cyber crisis environment similar to the actual situation of Korea.

A System of Audio Data Analysis and Masking Personal Information Using Audio Partitioning and Artificial Intelligence API (오디오 데이터 내 개인 신상 정보 검출과 마스킹을 위한 인공지능 API의 활용 및 음성 분할 방법의 연구)

  • Kim, TaeYoung;Hong, Ji Won;Kim, Do Hee;Kim, Hyung-Jong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.895-907
    • /
    • 2020
  • With the recent increasing influence of multimedia content other than the text-based content, services that help to process information in content brings us great convenience. These services' representative features are searching and masking the sensitive data. It is not difficult to find the solutions that provide searching and masking function for text information and image. However, even though we recognize the necessity of the technology for searching and masking a part of the audio data, it is not easy to find the solution because of the difficulty of the technology. In this study, we propose web application that provides searching and masking functions for audio data using audio partitioning method. While we are achieving the research goal, we evaluated several speech to text conversion APIs to choose a proper API for our purpose and developed regular expressions for searching sensitive information. Lastly we evaluated the accuracy of the developed searching and masking feature. The contribution of this work is in design and implementation of searching and masking a sensitive information from the audio data by the various functionality proving experiments.

Research on Gas Injection Mold using CAE Analysis of Steering wheel Parts (자동차핸들 제품의 CAE해석을 활용한 가스 사출성형에 관한연구)

  • Kang, Sae-Ho;Woo, Chang-Ki;Kim, Ok-Rae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.11
    • /
    • pp.7729-7735
    • /
    • 2015
  • As plastic injection mold parts is suitable system mass production making mold. So thick steering wheel parts is desirable to carry out gas injection molding. Gas injection mold is skill to inject nitrogen gas postfilling melting raw material into mold. Gas injection mold have many advantage like retrenchment of material cost, upgrading the guality. etc. It was decided gate position to minimize warpage of parts analysis injection mold process using mold flow software and incase doing gas injection mold using normal p.p material. it occur big warpage. so it is object minimizing warpage of injection parts to change p.p material containing mineral 18% and removing fingering phenomenon trouble as changing gate position. Also in case carrying out gas injection mold, I did comparison and analysis to grasp shape flow in gas setting a standard gate after flowing in raw material. Through this study, I found out changing of thickness by parts shape and it can occur warpage of parts by plastic material even though it carry out gas injection mold and it had a direct influence on trouble of parts by gate position.

Energy Efficient Distributed Intrusion Detection Architecture using mHEED on Sensor Networks (센서 네트워크에서 mHEED를 이용한 에너지 효율적인 분산 침입탐지 구조)

  • Kim, Mi-Hui;Kim, Ji-Sun;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.151-164
    • /
    • 2009
  • The importance of sensor networks as a base of ubiquitous computing realization is being highlighted, and espicially the security is recognized as an important research isuue, because of their characteristics.Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop security Intrusion Detection System (IDS) that can survive malicious attacks from "insiders" who have access to keying materials or the full control of some nodes, taking their charateristics into consideration. In this perper, we design a distributed and adaptive IDS architecture on sensor networks, respecting both of energy efficiency and IDS efficiency. Utilizing a modified HEED algorithm, a clustering algorithm, distributed IDS nodes (dIDS) are selected according to node's residual energy and degree. Then the monitoring results of dIDSswith detection codes are transferred to dIDSs in next round, in order to perform consecutive and integrated IDS process and urgent report are sent through high priority messages. With the simulation we show that the superiorities of our architecture in the the efficiency, overhead, and detection capability view, in comparison with a recent existent research, adaptive IDS.

A Study on the Radiation Source Effect to the Radiation Shielding Analysis for a Spent-Fuel Cask Design with Burnup-Credit (연소도이득효과를 적용한 사용후핵연료 수송용기의 방사선원별 차폐영향 분석)

  • Kim, Kyung-O;Kim, Soon-Young;Ko, Jae-Hoon;Lee, Gang-Ug;Kim, Tae-Man;Yoon, Jeong-Hyun
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.9 no.2
    • /
    • pp.73-80
    • /
    • 2011
  • The radiation shielding analysis for a Burnup-credit (BUC) cask designed under the management of Korea Radioactive Waste Management Corporation (KRMC) was performed to examine the contribution of each radiation source affecting dose rate distribution around the cask. Various radiation sources, which contain neutron and gamma-ray sources placed in active fuel region and the activation source, and imaginary nuclear fuel were all considered in the MCNP calculation model to realistically simulate the actual situations. It was found that the maximum external and surface dose rates of the spent fuel cask were satisfied with the domestic standards both in normal and accident conditions. In normal condition, the radiation dose rate distribution around the cask was mainly influenced by activation source ($^{60}Co$ radioisotope); in another case, the neutron emitted in active fuel region contributed about 90% to external dose rate at 1m distance from side surface of the cask. Besides, the contribution level of activation source was dramatically increased to the dose rates in top and bottom regions of the cask. From this study, it was recognized that the detailed investigation on the radiation sources should be performed conservatively and accurately in the process of radiation shielding analysis for a BUC cask.

The Design of a Complex Event Model for Effective Service Monitoring in Enterprise Systems (엔터프라이즈 시스템에서 효과적인 서비스 모니터링을 위한 복합 이벤트 모델의 설계)

  • Kum, Deuk-Kyu;Lee, Nam-Yong
    • The KIPS Transactions:PartD
    • /
    • v.18D no.4
    • /
    • pp.261-274
    • /
    • 2011
  • In recent competitive business environment each enterprise has to be agile and flexible. For these purposes run-time monitoring ofservices provided by an enterprise and early decision making through this becomes core competition of the enterprise. In addition, in order to process various innumerable events which are generated on enterprise systems techniques which make filtering of meaningful data are needed. However, the existing study related with this is nothing but discovering of service faults by monitoring depending upon API of BPEL engine or middleware, or is nothing but processing of simple events based on low-level events. Accordingly, there would be limitations to provide useful business information. In this paper, through situation detection an extended complex event model is presented, which is possible to provide more valuable and useful business information. Concretely, first of all an event processing architecture in an enterprise system is proposed, and event meta-model which is suitable to the proposed architecture is going to be defined. Based on the defined meta-model, It is presented that syntax and semantics of constructs in our event processing language including various and progressive event operators, complex event pattern, key, etc. In addition, an event context mechanism is proposed to analyze more delicate events. Finally, through application studies application possibility of this study would be shown and merits of this event model would be present through comparison with other event model.

Design of MTP memory IP using vertical PIP capacitor (Vertical PIP 커패시터를 이용한 MTP 메모리 IP 설계)

  • Kim, Young-Hee;Cha, Jae-Han;Jin, Hongzhou;Lee, Do-Gyu;Ha, Pan-Bong;Park, Mu-Hun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.1
    • /
    • pp.48-57
    • /
    • 2020
  • MCU used in applications such as wireless chargers and USB type-C require MTP memory with a small cell size and a small additional process mask. Conventional double poly EEPROM cells are small in size, but additional processing masks of about 3 to 5 sheets are required, and FN tunneling type single poly EEPROM cells have a large cell size. In this paper, a 110nm MTP cell using a vertical PIP capacitor is proposed. The erase operation of the proposed MTP cell uses FN tunneling between FG and EG, and the program operation uses CHEI injection method, which reduces the MTP cell size to 1.09㎛2 by sharing the PW of the MTP cell array. Meanwhile, MTP memory IP required for applications such as USB type-C needs to operate over a wide voltage range of 2.5V to 5.5V. However, the pumping current of the VPP charge pump is the lowest when the VCC voltage is the minimum 2.5V, while the ripple voltage is large when the VCC voltage is 5.5V. Therefore, in this paper, the VPP ripple voltage is reduced to within 0.19V through SPICE simulation because the pumping current is suppressed to 474.6㎂ even when VCC is increased by controlling the number of charge pumps turned on by using the VCC detector circuit.

Baseline Wander Removing Method Based on Morphological Filter for Efficient QRS Detection (효율적인 QRS 검출을 위한 형태 연산 기반의 기저선 잡음 제거 기법)

  • Cho, Ik-Sung;Kim, Joo-Man;Kim, Seon-Jong;Kwon, Hyeog-Soong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.1
    • /
    • pp.166-174
    • /
    • 2013
  • QRS detection of ECG is the most popular and easy way to detect cardiac-disease. But it is difficult to analyze the ECG signal because of various noise types. The important problem in recording ECG signal is a baseline wandering, which is occurred by rhythm of respiration and muscle contraction attaching to an electrode. Particularly, in the healthcare system that must continuously monitor people's situation, it is necessary to process ECG signal in realtime. In other words, the design of algorithm that exactly detects QRS region using minimal computation by analyzing the person's physical condition and/or environment is needed. Therefore, baseline wander removing method based on morphological filter for efficient QRS detection method is presented in this paper. For this purpose, we detected QRS through the preprocessing method using morphological filter, adaptive threshold, and window. The signal distortion ratio of the proposed method is compared with other filtering method. Also, R wave detection is evaluated by using MIT-BIH arrhythmia database. Experiment result show that proposed method removes baseline wanders effectively without significant morphological distortion.

FMECA Procedure for Failure Analysis of Train High-Speed Circuit Breaker (전동차 고속차단기 고장 분석을 위한 FMECA 기법)

  • Kim, Sung-Ryeol;Moon, Yong-Sun;Choi, Kyu-Hyoung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.5
    • /
    • pp.3370-3377
    • /
    • 2015
  • FMECA(Failure Mode, Effects and Criticality Analysis) techniques to make quantitative evaluation of failure effects severity and criticality have been applied to systematic failure analysis for reliability improvement of train which should provide regular service and secure high level of safety as a mass transportation system. These FMECA techniques do not fully reflect the inherent train operation and maintenance circumstances because they are based on the FMECA standards devised for other industries such as automobile industry and FMECA standard dedicated to train industry has not been established yet. This paper analyzes FMECA standards for various industries, and suggests a FMECA technique dedicated to train industry which makes failure effect analysis and criticality analysis step by step and makes criticality analysis placing emphasis on the severity of the failure effect. The proposed technique is applied to FMECA of high-speed current breaker which is a core safety device of train using field failure data for 15 years of train maintenance. The FMECA results show that breakage of arc chute has the highest risk with 3rd severity class and 5th criticality class among all the components of high-speed circuit breaker. Damage and poor contact of electronic valve, and cylinder breakage with 3rd severity class and 4th criticality class are followed by. These results can be applied to improvement of design and maintenance process for high-speed circuit breaker of train.