• 제목/요약/키워드: System technique

검색결과 17,381건 처리시간 0.044초

수주-생산-출하업무 프로세스 혁신 재설계 방법 및 추진사례 (A Reengineering Technique for Logistics Process Innovation and Case Study)

  • 박연기
    • 산업경영시스템학회지
    • /
    • 제22권50호
    • /
    • pp.293-302
    • /
    • 1999
  • This paper presents an efficient reengineering technique for the logistics process innovation which is the foundation of supply-chain management. Based on consulting experience on the domestic manufacturing firms, this paper provides promotion step for logistics innovation and six reengineering points including check system for customer's credit limit, check system of real-time inventory information, automatic system for sequential production plan, automatic order-release system, automatic packing system, and happy-call system for order-forward information. For each reengineering point, application cases in domestic industry are also presented.

  • PDF

이동객체의 궤적에 대한 연속 최근접 질의에 관한 연구 (Study on Continuous Nearest Neighbor Query on Trajectory of Moving Objects)

  • 정지문
    • 한국디지털정책학회:학술대회논문집
    • /
    • 한국디지털정책학회 2005년도 춘계학술대회
    • /
    • pp.517-530
    • /
    • 2005
  • Researches for NN(nearest neighbor) query which is often used in LBS system, have been worked. However, Conventional NN query processing techniques are usually meaningless in moving object management system for LBS since their results may be invalidated as soon as the query and data objects move. To solve these problems, in this paper we propose a new nearest neighbor query processing technique, called CTNN, which is possible to meet continuous trajectory nearest neighbor query processing. The proposed technique consists of Approximate CTNN technique which has quick response time, and Exact CTNN technique which makes it possible to search accurately nearest neighbor objects. Experimental results using GSTD datasets showed that the Exact CTNN technique has high accuracy, but has a little low performance for response time. They also showed that the Approximate CTNN technique has low accuracy comparing with the Exact CTNN, but has high response time.

  • PDF

A Steganographic Data Hiding Method in Timestamps by Bit Correction Technique for Anti-Forensics

  • Cho, Gyu-Sang
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권8호
    • /
    • pp.75-84
    • /
    • 2018
  • In this research, a bit correction technique of data hiding method in timestamp of MFT entry in NTFS file system is proposed. This method is proposed in two ways, depending on the number of bytes of data to hide. A basic data hiding method using a bit correction technique to solve the problems of the conventional 2-byte technique is proposed. In order to increase the capacity of the data, a 3-byte data hiding method using an extended bit correction technique is proposed. The data hiding method in the timestamps is based on the fact that is not revealed in the Windows explorer window and the command prompt window even if any data is hidden in the timestamp area of less than one second. It is shown that the validity of the proposed method through the experimental two cases of the basic data hiding method by the bit correction method and the 3-byte data hiding method by the extended bit correction method.

A Web Cache Replacement Technique of the Divided Scope Base that Considered a Size Reference Characteristics of Web Object

  • Seok, Ko-Il
    • 한국콘텐츠학회:학술대회논문집
    • /
    • 한국콘텐츠학회 2003년도 춘계종합학술대회논문집
    • /
    • pp.335-339
    • /
    • 2003
  • We proposed a Web cache replacement technique of a divided scope base that considered a size reference characteristics of a Web object for efficient operation of a Web base system and, in this study, analyzed performance of the replacement technique that proposed it though an experiment. We analyzed a reference characteristics of size to occur by a user reference characteristics through log analysis of a Web Base system in an experiment. And we divide storage scope of a cache server as its analysis result and tested this replacement technique based n divided scope. The proposed technique has a flexibility about a change of a reference characteristics of a user. Also, experiment result, we compared it with LRU and the LRUMIN which were an existing replacement technique and confirmed an elevation of an object hit ratio.

  • PDF

주파수를 고려한 전력 조류 계산 및 감도에 의한 상정사고 해석 (DEVELOPMENT OF A NEW LOAD FLOW TECHNIQUE CONSIDERING FREQUENCY AND CONTINGENCY ANALYSIS USING SENSITIVITY)

  • 박영문;손명기;추진부;윤용범;이경재
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1992년도 하계학술대회 논문집 A
    • /
    • pp.201-204
    • /
    • 1992
  • In the conventional load flow technique, it is assumed that the generator at the slack bus is used to supply the transmission losses and the change of power due to the generator outage. The assumption is not true in physical sense. This paper presents a new load flow technique that considers the governor-frequency characteristics and load-frequency characteristics and the technique is consistent with the actual power system phenomenon. This paper proposes an efficient methodology using sensitivity with the new technique for contingency analysis, which is used to calculate the line flows. Computational results of this technique applied to IEEE 14-bus system are presented.

  • PDF

Hardware Software Co-Simulation of the Multiple Image Encryption Technique Using the Xilinx System Generator

  • Panduranga, H.T.;Naveen, Kumar S.K.;Sharath, Kumar H.S.
    • Journal of Information Processing Systems
    • /
    • 제9권3호
    • /
    • pp.499-510
    • /
    • 2013
  • Hardware-Software co-simulation of a multiple image encryption technique shall be described in this paper. Our proposed multiple image encryption technique is based on the Latin Square Image Cipher (LSIC). First, a carrier image that is based on the Latin Square is generated by using 256-bits of length key. The XOR operation is applied between an input image and the Latin Square Image to generate an encrypted image. Then, the XOR operation is applied between the encrypted image and the second input image to encrypt the second image. This process is continues until the nth input image is encrypted. We achieved hardware co-simulation of the proposed multiple image encryption technique by using the Xilinx System Generator (XSG). This encryption technique is modeled using Simulink and XSG Block set and synthesized onto Virtex 2 pro FPGA device. We validated our proposed technique by using the hardware software co-simulation method.

전력용 기기의 예방진단을 위한 부분방전측정 (The measurement of partial discharge for preventive diagnosis in power machinery)

  • 김태성;구할본;임장섭;정우성
    • E2M - 전기 전자와 첨단 소재
    • /
    • 제7권1호
    • /
    • pp.42-48
    • /
    • 1994
  • The preventive diagnosis technique for power system is being highlighted as a research area for deterioration of insulation in machinery because of high-voltage power system. We make efforts to develop not only diagnosis of aging state but also detection of defects in the initial stage from preventive diagnosis technique. Especially, partial discharge is actively studied as a non-destructive diagnosis technique and very useful because partial discharge measurement reduces damage than conventional diagnosis technique. The loaded stress during this test is smaller than that of other diagnosis techniques. But the continuous research for various complicated analysis method is required because partial discharge has very small signals and its signals have complex forms. In this paper, the measurement of partial discharge was investigated and studied on many specimens with void. We made samples having artificial voids and measured partial discharge. In order to use as a practical diagnosis technique, we studied ways of measurement, measured illustrations and types of partial discharge which could be used in order to diagnose defects of power machinery.

  • PDF

농산물의 저온진공건조 열적 특성에 관한 연구 - 고추를 중심으로 - (A Study on the Thermal Characteristics of Agriculture Products in the Process of Low Temperature Vacuum Drying - With Cayenne as the Object Product for Drying -)

  • 최순열
    • 동력기계공학회지
    • /
    • 제5권1호
    • /
    • pp.44-49
    • /
    • 2001
  • Low temperature vacuum drying technique shows very excellent energy efficiency and prominent drying performances compared with the conventional hot air drying technique. This study was focused on the thermal characteristics of the low temperature vacuum drying technique. From the results of this study, it was confirmed that the time consumption for drying with the new drying technique could be shortened to about 1/3 of the time consumption with the conventional hot air drying technique under the same drying conditions for wet products. Also, the maximum drying rate with the new drying technique reached to about $0.35kg/m^2h$ at about 400% of moisture content.

  • PDF

이동객체의 궤적에 대한 연속 최근접 질의에 관한 연구 (Study on Continuous Nearest Neighbor Query on Trajectory of Moving Objects)

  • 정지문
    • 디지털융복합연구
    • /
    • 제3권1호
    • /
    • pp.149-163
    • /
    • 2005
  • Researches for NN(nearest neighbor) query which is often used in LBS system, have been worked. However. Conventional NN query processing techniques are usually meaningless in moving object management system for LBS since their results may be invalidated as soon as the query and data objects move. To solve these problems, in this paper we propose a new nearest neighbor query processing technique, called CTNN, which is possible to meet continuous trajectory nearest neighbor query processing. The proposed technique consists of Approximate CTNN technique which has quick response time, and Exact CTNN technique which makes it possible to search accurately nearest neighbor objects. Experimental results using GSTD datasets shows that the Exact CTNN technique has high accuracy, but has a little low performance for response time. They also shows that the Approximate CTNN technique has low accuracy comparing with the Exact CTNN, but has high response time.

  • PDF

시간 동기 비터비 빔 탐색을 위한 인식 시간 감축법 (Recognition Time Reduction Technique for the Time-synchronous Viterbi Beam Search)

  • 이강성
    • 한국음향학회지
    • /
    • 제20권6호
    • /
    • pp.46-50
    • /
    • 2001
  • 본 논문은 HMM (Hidden Markov Model) 음성 인식 시스템에 적용할 수 있는 새로운 인식 시간 알고리즘인 스코아 캐쉬기법을 제안한다. 다른 많은 기법들이 인식 시간을 줄이면서 계산량을 줄이기 위하여 어느 정도의 인식율 저하를 감수하는 반면에 제안하는 스코아 캐쉬기법은 인식율 저하를 전혀 일으키지 않으면서 인식 시간을 상당량 줄일 수 있는 기법이다. 단독어 인식 시스템에 적용 가능할 뿐 아니라 연속어 인식에도 적용이 가능하며, 기존에 이미 설계된 인식 시스템의 구조를 전혀 흩트리지 않고 간단히 하나의 함수만 대치함으로서 인식시간을 크게 감축할 수 있다 또한 기존의 계산량 감축 알고리즘과 함께 적용 가능하므로 추가의 계산량 감소를 얻을 수 있다. 스코아 캐쉬 기법을 적용한 결과 최대 54% 만큼 계산량을 줄일 수 있었다.

  • PDF