• 제목/요약/키워드: g-code

검색결과 849건 처리시간 0.046초

NC 공작기계상에서의 측정 및 검사모듈의 설계와 구현 (Design and Implementation of an On-the-Machine Measuring and Inspection Module)

  • 김경돈;정성종
    • 한국정밀공학회지
    • /
    • 제15권4호
    • /
    • pp.91-97
    • /
    • 1998
  • Design methodology of Interactive Measuring Part Program Generating Tools(IMPPGT) realized on the FANUC 15MA using touch trigger probes and interactive macro functions of the CNC was described in this paper. Measuring G codes were designed according to geometric form, precision attributes, relations between parts, datum hierarchies, and relevant technological data by using measuring arguments. Menu driven measuring and inspection functions of the IMPPGT were studied and implemented on the CNC through the macro executor and ROM writer. Using the developed measuring G code system on the machine tool, untended measurement and inspection operation was able to be realized in precision FMS lines.

  • PDF

Development of ISO14649 Compliant CNC Milling Machine Operated by STEP-NC in XML Format

    • International Journal of Precision Engineering and Manufacturing
    • /
    • 제4권5호
    • /
    • pp.27-33
    • /
    • 2003
  • G-code, another name of ISO6983, has been a popular commanding language for operating machine tools. This G-code, however, limits the usage of today's fast evolving high-performance hardware. For intelligent machines, the communications between machine and CAD/CAM departments become important, but the loss of information during generating G-code makes the production department isolated. The new standard for operating machine tools, named STEP-NC is just about to be standardized as ISO14649. As this new standard stores CAD/CAM information as well as operation commands of CNC machines, and this characteristic makes this machine able to exchange information with other departments. In this research, the new CNC machine operated by STEP-NC was built and tested. Unlike other prototypes of STEP-NC milling machines, this system uses the STEP-NC file in XML file form as data input. This machine loads information from XML file and deals with XML file structure. It is possible for this machine to exchange information to other databases using XML. The STEP-NC milling machines in this research loads information from the XML file, makes tool paths for two5D features with information of STEP-NC, and machines automatically without making G-code. All software is programmed with Visual $C^{++}$, and the milling machine is built with table milling machine, step motors, and motion control board for PC that can be directly controlled by Visual $C^{++}$ commands. All software and hardware modules are independent from each other; it allows convenient substitution and expansion of the milling machine. Example 1 in ISO14649-11 having the full geometry and machining information and example 2 having only the geometry and tool information were used to test the automatic machining capability of this system.

GMW 부호 (GMW CODES)

  • 노종선
    • 한국통신학회논문지
    • /
    • 제18권8호
    • /
    • pp.1128-1135
    • /
    • 1993
  • 본논문에서는 GMW시퀸스 g(t) = tr((trk(a))r)와 그의 순회 천이 시\ulcorner스에의해서 발생되는 GMW부호라는 새로운 이진순회부호가 소개되었다. GMW부호의 부호깊이는 2k-1인데 여기서 k는 복합정수 e.j이다. GMW부호의 차원은 k.(k/J)w-1인데, 여기서 w는 r의 해밍무게이다. 디자인 거리, 최소거리, 그리고 부호의 무게가 GMW시퀸스의 변수에의해 유도되었다. 그리고 GMW시퀸스의 확장이 m시퀸스와 그의 순회 천이 시퀸스들의 견지에서 유도되었고. GMW시퀸스의 특성 다항식이 유도되었다.

  • PDF

Improving Malicious Web Code Classification with Sequence by Machine Learning

  • Paik, Incheon
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제3권5호
    • /
    • pp.319-324
    • /
    • 2014
  • Web applications make life more convenient. Many web applications have several kinds of user input (e.g. personal information, a user's comment of commercial goods, etc.) for the activities. On the other hand, there are a range of vulnerabilities in the input functions of Web applications. Malicious actions can be attempted using the free accessibility of many web applications. Attacks by the exploitation of these input vulnerabilities can be achieved by injecting malicious web code; it enables one to perform a variety of illegal actions, such as SQL Injection Attacks (SQLIAs) and Cross Site Scripting (XSS). These actions come down to theft, replacing personal information, or phishing. The existing solutions use a parser for the code, are limited to fixed and very small patterns, and are difficult to adapt to variations. A machine learning method can give leverage to cover a far broader range of malicious web code and is easy to adapt to variations and changes. Therefore, this paper suggests the adaptable classification of malicious web code by machine learning approaches for detecting the exploitation user inputs. The approach usually identifies the "looks-like malicious" code for real malicious code. More detailed classification using sequence information is also introduced. The precision for the "looks-like malicious code" is 99% and for the precise classification with sequence is 90%.

A Syndrome-distribution decoding MOLS L$_{p}$ codes

  • Hahn, S.;Kim, D.G.;Kim, Y.S.
    • 한국수학교육학회지시리즈E:수학교육논문집
    • /
    • 제6권
    • /
    • pp.371-381
    • /
    • 1997
  • Let p be an odd prime number. We introduce simple and useful decoding algorithm for orthogonal Latin square codes of order p. Let H be the parity check matrix of orthogonal Latin square code. For any x ${\in}$ GF(p)$^{n}$, we call xH$^{T}$ the syndrome of x. This method is based on the syndrome decoding for linear codes. In L$_{p}$, we need to find the first and the second coordinates of codeword in order to correct the errored received vector.

  • PDF

3차원 수송계산 코드(RAPTOR-M3G)를 이용한 원자로 압력용기 중성자 조사량 평가 (Neutron Fluence Evaluation for Reactor Pressure Vessel Using 3D Discrete Ordinates Transport Code RAPTOR-M3G)

  • 맹영재;임미정;김병철
    • 한국압력기기공학회 논문집
    • /
    • 제10권1호
    • /
    • pp.107-112
    • /
    • 2014
  • The Code of Federal Regulations, Title 10, Part 50, Appendix H requires surveillance program for reactor pressure vessel(RPV) that the peak neutron fluence at the end of the design life of the vessel will exceed $1.0E+17n/cm^2$ (E>1.0MeV). 2D/1D Synthesis method based on DORT 3.1 transport calculation code has been widely used to determine fast neutron(E>1.0MeV) fluence exposure to RPV in the beltline region. RAPTOR-M3G(RApid Parallel Transport Of Radiation-Multiple 3D Geometries) performing full 3D transport calculation was developed by Westinghouse and KRIST(Korea Reactor Integrity Surveillance Technology) and applied for the evaluations of In-Vessel and Ex-Vessel neutron dosimetry. The reaction rates from measurement and calculation were compared and the results show good agreements each other.

Analysis of C5G7-TD benchmark with a multi-group pin homogenized SP3 code SPHINCS

  • Cho, Hyun Ho;Kang, Junsu;Yoon, Joo Il;Joo, Han Gyu
    • Nuclear Engineering and Technology
    • /
    • 제53권5호
    • /
    • pp.1403-1415
    • /
    • 2021
  • The transient capability of a SP3 based pin-wise core analysis code SPHINCS is developed and verified through the analyses of the C5G7-TD benchmark. Spatial discretization is done by the fine mesh finite difference method (FDM) within the framework of the coarse mesh finite difference (CMFD) formulation. Pin size fine meshes are used in the radial fine mesh kernels. The time derivatives of the odd moments in the time-dependent SP3 equations are neglected. The pin homogenized group constants and Super Homogenization (SPH) factors generated from the 2D single assembly calculations at the unrodded and rodded conditions are used in the transient calculations via proper interpolation involving the approximate flux weighting method for the cases that involve control rod movement. The simplifications and approximations introduced in SPHINCS are assessed and verified by solving all the problems of C5G7-TD and then by comparing with the results of the direct whole core calculation code nTRACER. It is demonstrated that SPHINCS yields accurate solutions in the transient behaviors of core power and reactivity.

Design Study of a Small Scale Soft Recovery System

  • Yoo, Il-Yong;Lee, Seung-Soo;Cho, Chong-Du
    • Journal of Mechanical Science and Technology
    • /
    • 제20권11호
    • /
    • pp.1961-1971
    • /
    • 2006
  • A soft recovery system (SRS) is a device that stops a high speed projectile without damaging the projectile. The SRS is necessary to verify the shock resistant requirements of microelectronics and electro-optic sensors in smart munitions, where the projectiles experience over 20,000 g acceleration inside the barrel. In this study, a computer code for the performance evaluation of a SRS based on ballistic compression decelerator concept has been developed. It consists of a time accurate compressible one-dimensional Euler code with use of deforming grid and a projectile motion analysis code. The Euler code employs Roe's approximate Riemann solver with a total variation diminishing (TVD) method. A fully implicit dual time stepping method is used to advance the solution in time. In addition, the geometric conservation law (GCL) is applied to predict the solutions accurately on the deforming mesh. The equation of motion for the projectile is solved with the four-stage Runge-Kutta time integration method. A small scale SRS to catch a 20 mm bullet fired at 500 m/s within 1,600 g-limit has been designed with the proposed method.

헬스케어 특허의 IPC 코드 기반 사회 연결망 분석(SNA)을 이용한 기술 융복합 분석 (Technology Convergence Analysis by IPC Code-Based Social Network Analysis of Healthcare Patents)

  • 심재륜
    • 한국정보전자통신기술학회논문지
    • /
    • 제15권5호
    • /
    • pp.308-314
    • /
    • 2022
  • 본 연구는 국내에 출원된 헬스케어 특허의 기술 융복합 분석에 관한 것으로 사회 연결망 분석(Social Network Analysis)을 이용하여 핵심 기술간 관계를 시각화하였다. 헬스케어 특허의 서브클래스 수준에서 복합 IPC 코드를 가지는 특허는 1,155건(49.4%)으로 조사되었고, 이를 대상으로 사회 연결망 분석을 실시한 결과 연결 중심성이 가장 큰 IPC 코드는 A61B, G16H, G06Q 순이고, 매개 중심성이 가장 큰 IPC 코드는 A61B, G16H, G06Q 순이다. 또한 헬스케어 특허는 두 개의 큰 기술 집합(Cluster)으로 구성되어 있다는 것을 확인할 수 있었다. Cluster-1은 A61B와 G16H 및 G06Q를 중심으로 헬스케어 인포매틱스 관련 기술을 이용한 진단, 수술 등 관련 비즈니스 모델에 해당하고, Cluster-2는 H04L과 H04W 및 H04B로 구성된 디지털 통신 기반의 헬스케어 사물인터넷 기술이다. 헬스케어 특허의 기술 융복합 핵심 쌍은 Cluster-1에서 [G16H-A61B]와 [G16H-G06Q] 이고, Cluster-2에서는 [H04L-H04W] 이다. 본 연구는 헬스케어 특허의 기술 개발 동향과 앞으로의 특허 출원에 기여할 수 있다.

QR코드 기반 가상패션점포의 지각된 혜택과 위험요소에 대한 탐색적 연구 (An Exploratory Study of Perceived Benefits and Risks for QR Code based Virtual Fashion Stores)

  • 김은영;이미영
    • 한국생활과학회지
    • /
    • 제22권5호
    • /
    • pp.477-490
    • /
    • 2013
  • This study explores critical and success factor of benefits and risks for predicting the acceptance of QR code virtual fashion stores. As an exploratory approach, this study conducted focus group interviews(FGI) with 21 panels who had experience with selected QR virtual stores (e.g., Home plus, 11th Street, Pin & Fit). Content analysis was used to generate 184 excerpts and classify into benefits and risks related to QR code virtual stores. With respect to benefits, content analysis identified four factors: Affective appeal, perceived usefulness, ubiquity, and brand promotion. Also, contents regarding perceived risks were classified into four factors: Complexity, lack of information, lack of technology infrastructure, and perceived cost. A managerial implication was discussed for predicting consumer technology acceptance of a QR code virtual store in the fashion retailing market.