• Title/Summary/Keyword: industrial classification

Search Result 1,449, Processing Time 0.027 seconds

A Study on the Analysis of R&D Trends and the Development Plan of Electronic Attack System (전자공격체계 연구개발 동향 분석과 발전방안에 대한 연구)

  • Sim, Jaeseong;Park, Byoung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.469-476
    • /
    • 2021
  • An electronic attack (EA) system is an essential weapon system for performing electronic warfare missions that contain signal tracking and jamming against multiple threats using electromagnetic waves, such as air defense radars, wireless command and communication networks, and guided missiles. The combat effectiveness can be maximized, and the survivability of militarily protecting combat power can be enhanced through EA mission operations, such as disabling the functions of multiple threats. The EA system can be used as a radio frequency jamming system to respond to drone attacks on the core infrastructure, such as airports, power plants, and communication broadcasting systems, in the civilian field. This study examined the criteria for classification according to the electronic attack missions of foreign EA systems based on an aviation platform. The foreign R&D trends by those criteria were investigated. Moreover, by analyzing the R&D trends of domestic EA systems and future battlefields in the domestic security environments, this paper proposes technological development plans of EA systems suitable for the future battlefield environments compared to the foreign R&D trends.

Human Skeleton Keypoints based Fall Detection using GRU (PoseNet과 GRU를 이용한 Skeleton Keypoints 기반 낙상 감지)

  • Kang, Yoon Kyu;Kang, Hee Yong;Weon, Dal Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.127-133
    • /
    • 2021
  • A recent study of people physically falling focused on analyzing the motions of the falls using a recurrent neural network (RNN) and a deep learning approach to get good results from detecting 2D human poses from a single color image. In this paper, we investigate a detection method for estimating the position of the head and shoulder keypoints and the acceleration of positional change using the skeletal keypoints information extracted using PoseNet from an image obtained with a low-cost 2D RGB camera, increasing the accuracy of judgments about the falls. In particular, we propose a fall detection method based on the characteristics of post-fall posture in the fall motion-analysis method. A public data set was used to extract human skeletal features, and as a result of an experiment to find a feature extraction method that can achieve high classification accuracy, the proposed method showed a 99.8% success rate in detecting falls more effectively than a conventional, primitive skeletal data-use method.

Development of Permit Vehicle Classification System for Bridge Evaluation in Korea (허가차량 통행에 대한 교량의 안전성 평가를 위한 허가차량 분류 체계 개발)

  • Yu, Sang Seon;Kim, Kyunghyun;Paik, Inyeol;Kim, Ji Hyeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.12
    • /
    • pp.845-856
    • /
    • 2020
  • This study proposes a bridge evaluation system for indivisible permit vehicles such as hydraulic cranes. The permit loads for the bridge evaluation are divided into three categories: routine permit loads, special permit 1 loads, and special permit 2 loads. Routine permit and special permit 1 vehicles are allowed to cross a bridge with normal traffic. For these two permits, the standard lane model in the Korean Highway Bridge Design Code was adopted to consider normal traffic in the same lane. Special permit 2 vehicles are assumed to cross a bridge without other traffic. Structural analyses of two prestressed-beam bridges and two steel box girder bridges were conducted for the proposed permit loads. The rating factors of the four bridges for all permit loads were calculated as sufficiently large values for the moment and shear force so that crossing the bridges can be permitted. A reliability assessment of the bridges was performed to identify the reliability levels for the permit vehicles. It was confirmed that the reliability level of the minimum required strength obtained by the load-resistance factors yields the target reliability index of the design code for the permit vehicles.

A Method of Obtaining Correction Factor for Settlement Prediction of Soft Ground Using Correlation of Theoretical and Measured Settlement of Gimhae-Jinyoung through SPSS Analysis (이론 및 계측 침하량의 SPSS 상관분석을 통한 김해진영 연약 지반의 침하량 예측 보정계수 산출법)

  • Jang, Won-Cheol;Kim, Byoung-Il;Kim, Young-Uk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.5
    • /
    • pp.502-508
    • /
    • 2021
  • Predicting the settlement of soft ground is an important aspect of soft ground design. In this study, a method is proposed that increases the reliability of settlement predictions based on-site investigation data, including piezocone penetration test results, at the Gimhae-Jinyoung district, adjacent area to the Nakdong River. Soils in the area waweres classified using the Robertson Chart (1986, 1990), and theoretical settlement was calculated using the equations proposed by Terzaghi (1925) and Sanglerat (1972). SPSS was used to obtain the correlation between theoretical and measured settlements. Results produced settlement prediction errors for the Terzaghi and Sanglerat methods of 17.28% and 26.96%, respectively. A correction factor calculated by SPSS correlation analysis for the relation between and theoretical and measured settlements is proposed that improves the reliability of settlement prediction in soils of the classification examined.

Investigating Key Security Factors in Smart Factory: Focusing on Priority Analysis Using AHP Method (스마트팩토리의 주요 보안요인 연구: AHP를 활용한 우선순위 분석을 중심으로)

  • Jin Hoh;Ae Ri Lee
    • Information Systems Review
    • /
    • v.22 no.4
    • /
    • pp.185-203
    • /
    • 2020
  • With the advent of 4th industrial revolution, the manufacturing industry is converging with ICT and changing into the era of smart manufacturing. In the smart factory, all machines and facilities are connected based on ICT, and thus security should be further strengthened as it is exposed to complex security threats that were not previously recognized. To reduce the risk of security incidents and successfully implement smart factories, it is necessary to identify key security factors to be applied, taking into account the characteristics of the industrial environment of smart factories utilizing ICT. In this study, we propose a 'hierarchical classification model of security factors in smart factory' that includes terminal, network, platform/service categories and analyze the importance of security factors to be applied when developing smart factories. We conducted an assessment of importance of security factors to the groups of smart factories and security experts. In this study, the relative importance of security factors of smart factory was derived by using AHP technique, and the priority among the security factors is presented. Based on the results of this research, it contributes to building the smart factory more securely and establishing information security required in the era of smart manufacturing.

A Study on the Effect of Mobile CCTV Monitoring on Safety Risk Factors (안전 Risk 요인에 대한 이동형 CCTV 모니터링이 미치는 영향 연구)

  • Young Cheol Song;Tae-Gon Kim;Eunseok Lee;Tae-Hun Kim
    • Industry Promotion Research
    • /
    • v.9 no.1
    • /
    • pp.39-45
    • /
    • 2024
  • Dangerous tasks that occur every day at industrial site manufacturing plants, which have recently been making rapid changes, were classified by type, and the effect of mobile circuit television (CCTV) on safety accidents among daily safety management methods was analyzed. The subject of the study is about 3,000 workers who manage the infrastructure facility sector to supply utilities such as gas, water, and electricity to the display manufacturing process located in Asan City, and the study was conducted based on the daily dangerous work from 2019 to 2022, and during this study period, many construction works such as new investment and expansion of construction and manufacturing processes were occurring at the site. As a result, the rate of safety accidents and exposure to risks are expanding, and most of the safety accidents occurred because the sectors that did not follow the basics and the safety measures on the site were not implemented. In this paper, it was confirmed that there is an accident reduction effect according to the relationship between the dangerous work classified according to the work importance and the mobile CCTV shooting rate. Considering the characteristics of the manufacturing plant site, it can be used to play the role of basic data for preventing safety accidents based on the expansion of the introduction of a new safety management culture in the future.

Social Tagging-based Recommendation Platform for Patented Technology Transfer (특허의 기술이전 활성화를 위한 소셜 태깅기반 지적재산권 추천플랫폼)

  • Park, Yoon-Joo
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.3
    • /
    • pp.53-77
    • /
    • 2015
  • Korea has witnessed an increasing number of domestic patent applications, but a majority of them are not utilized to their maximum potential but end up becoming obsolete. According to the 2012 National Congress' Inspection of Administration, about 73% of patents possessed by universities and public-funded research institutions failed to lead to creating social values, but remain latent. One of the main problem of this issue is that patent creators such as individual researcher, university, or research institution lack abilities to commercialize their patents into viable businesses with those enterprises that are in need of them. Also, for enterprises side, it is hard to find the appropriate patents by searching keywords on all such occasions. This system proposes a patent recommendation system that can identify and recommend intellectual rights appropriate to users' interested fields among a rapidly accumulating number of patent assets in a more easy and efficient manner. The proposed system extracts core contents and technology sectors from the existing pool of patents, and combines it with secondary social knowledge, which derives from tags information created by users, in order to find the best patents recommended for users. That is to say, in an early stage where there is no accumulated tag information, the recommendation is done by utilizing content characteristics, which are identified through an analysis of key words contained in such parameters as 'Title of Invention' and 'Claim' among the various patent attributes. In order to do this, the suggested system extracts only nouns from patents and assigns a weight to each noun according to the importance of it in all patents by performing TF-IDF analysis. After that, it finds patents which have similar weights with preferred patents by a user. In this paper, this similarity is called a "Domain Similarity". Next, the suggested system extract technology sector's characteristics from patent document by analyzing the international technology classification code (International Patent Classification, IPC). Every patents have more than one IPC, and each user can attach more than one tag to the patents they like. Thus, each user has a set of IPC codes included in tagged patents. The suggested system manages this IPC set to analyze technology preference of each user and find the well-fitted patents for them. In order to do this, the suggeted system calcuates a 'Technology_Similarity' between a set of IPC codes and IPC codes contained in all other patents. After that, when the tag information of multiple users are accumulated, the system expands the recommendations in consideration of other users' social tag information relating to the patent that is tagged by a concerned user. The similarity between tag information of perferred 'patents by user and other patents are called a 'Social Simialrity' in this paper. Lastly, a 'Total Similarity' are calculated by adding these three differenent similarites and patents having the highest 'Total Similarity' are recommended to each user. The suggested system are applied to a total of 1,638 korean patents obtained from the Korea Industrial Property Rights Information Service (KIPRIS) run by the Korea Intellectual Property Office. However, since this original dataset does not include tag information, we create virtual tag information and utilized this to construct the semi-virtual dataset. The proposed recommendation algorithm was implemented with JAVA, a computer programming language, and a prototype graphic user interface was also designed for this study. As the proposed system did not have dependent variables and uses virtual data, it is impossible to verify the recommendation system with a statistical method. Therefore, the study uses a scenario test method to verify the operational feasibility and recommendation effectiveness of the system. The results of this study are expected to improve the possibility of matching promising patents with the best suitable businesses. It is assumed that users' experiential knowledge can be accumulated, managed, and utilized in the As-Is patent system, which currently only manages standardized patent information.

Comparative Research on the Health Information Manager(HIM) Duties of One Malaysian Hospital and Similar Scale Korean hospitals (말레이시아 1개 병원과 병상규모가 유사한 한국의 병원 간 보건정보관리자 직무 비교연구)

  • Kim, Hey-Kyung;Lee, Hyun-Ju
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.10
    • /
    • pp.6158-6167
    • /
    • 2014
  • The aim of this study was to perform comparative analysis of the duties of 7 new roles of HIMs in Malaysian and Korean hospitals of a similar scale. A Malaysian general hospital with a scale of 272 hospital beds was chosen. The researcher visited a Malaysian hospital in person and interviewed the staff in charge over a 2 week period from July 22nd 2013 to August 2nd 2013. For domestic hospitals, 13 general hospitals with 270 hospital beds, similar to the Malaysian general hospital, were chosen. Phone interviews with the department recorded the duty recording work. Regarding 7 new roles of Health Information Manager (HIM), although the role as a Health information manager and Security Officer in Malaysian general hospital was not defined, 30.8% performed their role in Korean general hospitals. The classification of disease & procedure within the role of Clinical data specialist was performed by both countries, and while the tumor registry was done in a Malaysian general hospital, only 15.4% of Korean general hospitals were operating. The statistics of the discharged patients were not measured in the Malaysian general hospital but 76.9% of Korean general hospitals recorded these statistics. Although 22.1% of Korean general hospitals operated registration work of special disease, Malaysian general hospital not only had a total legal contagious disease registration, but also took charge of information registration of hospital births and deceased ones. Other than these, the Patient Information Coordinator, Data Quality Manager, Document and Repository Manager, Research and Decision Support Analyst roles were not done by either country. The new role of HIM is operated in a low percentage in Korean middle and small hospitals. Therefore, to clearly establish the role of HIM in Korea, and have middle and small hospitals to operate such a role, it is essential for the related association to give continuous education and provide support to clarify the role within the hospital working environment. It is desirable to benchmark Malaysian general hospital's registration work on special diseases and others, and expand the work to improve overall.

Anomaly Detection for User Action with Generative Adversarial Networks (적대적 생성 모델을 활용한 사용자 행위 이상 탐지 방법)

  • Choi, Nam woong;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.3
    • /
    • pp.43-62
    • /
    • 2019
  • At one time, the anomaly detection sector dominated the method of determining whether there was an abnormality based on the statistics derived from specific data. This methodology was possible because the dimension of the data was simple in the past, so the classical statistical method could work effectively. However, as the characteristics of data have changed complexly in the era of big data, it has become more difficult to accurately analyze and predict the data that occurs throughout the industry in the conventional way. Therefore, SVM and Decision Tree based supervised learning algorithms were used. However, there is peculiarity that supervised learning based model can only accurately predict the test data, when the number of classes is equal to the number of normal classes and most of the data generated in the industry has unbalanced data class. Therefore, the predicted results are not always valid when supervised learning model is applied. In order to overcome these drawbacks, many studies now use the unsupervised learning-based model that is not influenced by class distribution, such as autoencoder or generative adversarial networks. In this paper, we propose a method to detect anomalies using generative adversarial networks. AnoGAN, introduced in the study of Thomas et al (2017), is a classification model that performs abnormal detection of medical images. It was composed of a Convolution Neural Net and was used in the field of detection. On the other hand, sequencing data abnormality detection using generative adversarial network is a lack of research papers compared to image data. Of course, in Li et al (2018), a study by Li et al (LSTM), a type of recurrent neural network, has proposed a model to classify the abnormities of numerical sequence data, but it has not been used for categorical sequence data, as well as feature matching method applied by salans et al.(2016). So it suggests that there are a number of studies to be tried on in the ideal classification of sequence data through a generative adversarial Network. In order to learn the sequence data, the structure of the generative adversarial networks is composed of LSTM, and the 2 stacked-LSTM of the generator is composed of 32-dim hidden unit layers and 64-dim hidden unit layers. The LSTM of the discriminator consists of 64-dim hidden unit layer were used. In the process of deriving abnormal scores from existing paper of Anomaly Detection for Sequence data, entropy values of probability of actual data are used in the process of deriving abnormal scores. but in this paper, as mentioned earlier, abnormal scores have been derived by using feature matching techniques. In addition, the process of optimizing latent variables was designed with LSTM to improve model performance. The modified form of generative adversarial model was more accurate in all experiments than the autoencoder in terms of precision and was approximately 7% higher in accuracy. In terms of Robustness, Generative adversarial networks also performed better than autoencoder. Because generative adversarial networks can learn data distribution from real categorical sequence data, Unaffected by a single normal data. But autoencoder is not. Result of Robustness test showed that he accuracy of the autocoder was 92%, the accuracy of the hostile neural network was 96%, and in terms of sensitivity, the autocoder was 40% and the hostile neural network was 51%. In this paper, experiments have also been conducted to show how much performance changes due to differences in the optimization structure of potential variables. As a result, the level of 1% was improved in terms of sensitivity. These results suggest that it presented a new perspective on optimizing latent variable that were relatively insignificant.

A Study on Web-based Technology Valuation System (웹기반 지능형 기술가치평가 시스템에 관한 연구)

  • Sung, Tae-Eung;Jun, Seung-Pyo;Kim, Sang-Gook;Park, Hyun-Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.1
    • /
    • pp.23-46
    • /
    • 2017
  • Although there have been cases of evaluating the value of specific companies or projects which have centralized on developed countries in North America and Europe from the early 2000s, the system and methodology for estimating the economic value of individual technologies or patents has been activated on and on. Of course, there exist several online systems that qualitatively evaluate the technology's grade or the patent rating of the technology to be evaluated, as in 'KTRS' of the KIBO and 'SMART 3.1' of the Korea Invention Promotion Association. However, a web-based technology valuation system, referred to as 'STAR-Value system' that calculates the quantitative values of the subject technology for various purposes such as business feasibility analysis, investment attraction, tax/litigation, etc., has been officially opened and recently spreading. In this study, we introduce the type of methodology and evaluation model, reference information supporting these theories, and how database associated are utilized, focusing various modules and frameworks embedded in STAR-Value system. In particular, there are six valuation methods, including the discounted cash flow method (DCF), which is a representative one based on the income approach that anticipates future economic income to be valued at present, and the relief-from-royalty method, which calculates the present value of royalties' where we consider the contribution of the subject technology towards the business value created as the royalty rate. We look at how models and related support information (technology life, corporate (business) financial information, discount rate, industrial technology factors, etc.) can be used and linked in a intelligent manner. Based on the classification of information such as International Patent Classification (IPC) or Korea Standard Industry Classification (KSIC) for technology to be evaluated, the STAR-Value system automatically returns meta data such as technology cycle time (TCT), sales growth rate and profitability data of similar company or industry sector, weighted average cost of capital (WACC), indices of industrial technology factors, etc., and apply adjustment factors to them, so that the result of technology value calculation has high reliability and objectivity. Furthermore, if the information on the potential market size of the target technology and the market share of the commercialization subject refers to data-driven information, or if the estimated value range of similar technologies by industry sector is provided from the evaluation cases which are already completed and accumulated in database, the STAR-Value is anticipated that it will enable to present highly accurate value range in real time by intelligently linking various support modules. Including the explanation of the various valuation models and relevant primary variables as presented in this paper, the STAR-Value system intends to utilize more systematically and in a data-driven way by supporting the optimal model selection guideline module, intelligent technology value range reasoning module, and similar company selection based market share prediction module, etc. In addition, the research on the development and intelligence of the web-based STAR-Value system is significant in that it widely spread the web-based system that can be used in the validation and application to practices of the theoretical feasibility of the technology valuation field, and it is expected that it could be utilized in various fields of technology commercialization.