• Title/Summary/Keyword: monitoring technique

Search Result 2,200, Processing Time 0.032 seconds

Response Characteristics of Forced Vibration Model with Sinusoidal Exciting Force (정현파로 가진한 강제진동 해석과 응답특성)

  • Kim, Jong-Do;Yoon, Moon-Chul
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.131-137
    • /
    • 2020
  • The characteristics of forced vibration with excited sinusoidal force was introduced. Also, numerical analyses and FRF in frequency domain were performed in detail. In this regard, the responses of displacement, velocity and acceleration were investigated in a forced vibration model. The FRF characteristics in real and imaginary part around natural frequency are also discussed. This response approach of forced vibration in time domain is used for the identification and monitoring of sinusoidal forced vibration. For acquiring a displacement, velocity and acceleration, a numerical technique of Runge-Kutta-Gill method was performed. For the FRF(frequency response function), These responses are used. Also, the FRF can represent the intrinsic characteristics of the forced vibration. These performed results and analysis are successful in each damped condition for the forced vibration model. After numerical analysis of the different mass, damping and stiffness, the forced vibration response characteristics with sinusoidal force was discriminated considering its amplitude and frequency simultaneously.

Decision-making system for the resource forecasting and risk management using regression algorithms (회귀알고리즘을 이용한 자원예측 및 위험관리를 위한 의사결정 시스템)

  • Han, Hyung-Chul;Jung, Jae-Hun;Kim, Sin-Ryeong;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.311-319
    • /
    • 2015
  • In this paper, in order to increase the production efficiency of the industrial plant, and predicts the resources of the manufacturing process, we have proposed a decision-making system for resource implementing the risk management effectively forecasting and risk management. A variety of information that occurs at each step efficiently difficult the creation of detailed process steps in the scenario you want to manage, is a frequent condition change of manufacturing facilities for the production of various products even within the same process. The data that is not contiguous products production cycle also not constant occurs, there is a problem that needs to check the variation in the small amount of data. In order to solve these problems, data centralized manufacturing processes, process resource prediction, risk prediction, through a process current status monitoring, must allow action immediately when a problem occurs. In this paper, the range of change in the design drawing, resource prediction, a process completion date using a regression algorithm to derive the formula, classification tree technique was proposed decision system in three stages through the boundary value analysis.

A Study of Informationization Technique for Detecting Flood Inundation Area Using RS (RS를 이용한 홍수범람지역 탐지 정보화 기법 연구)

  • Shin, Hyung-Jin;Chae, Hyo-Sok;Hwang, Eui-Ho;Park, Jae-Yong
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.15 no.1
    • /
    • pp.172-183
    • /
    • 2012
  • In 2011, floods were at the worst stage of devastation in Chao Phraya river basin of Thailand. The purpose of this study is to trace the flood inundation area around Chao Phraya river basin by using Terra MODIS image because it has the ability of spatiotemporal dynamics. The MODIS indices, which included the enhanced vegetation index(EVI), land surface water index(LSWI), and the difference in the values of EVI and LSWI(DVEL), were extracted from MODIS product MOD09 8-day composite datasets with a spatial resolution of 500m from Jul. 29, 2011 to Jan. 09, 2012. We found that combined application of EVI, LSWI, and DVEL was suitable for monitoring flood inundation. For the extracted flood inundation area and water-related area. The result can be used to acquire the flood inundation data scattered and demonstrate the potential for the use of MODIS data for temporal and spatial detection of flood effects.

A Fault Diagnosis Technique of an Inverter-fed PMSM under Winding Shorted Turn and Inverter Switch Open Fault (권선 단락 및 스위치 개방 고장 시의 인버터 구동 영구자석 동기전동기의 고장 진단 기법)

  • Kim, Kyeong-Hwa
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.24 no.5
    • /
    • pp.94-105
    • /
    • 2010
  • To detect faults in an inverter-fed permanent magnet synchronous motor (PMSM) drive under the circumstance having faults in a stator winding and inverter switch, an on-line basis fault detecting scheme during operation is presented. The proposed scheme is achieved by monitoring the second-order harmonic component in q-axis current and the fault is detected by comparing these components with those in normal conditions. The linear interpolation method is employed to determine the harmonic data in normal operating conditions. As soon as the fault is detected, the operating mode is changed to identify a fault type using the phase current waveform. To verify the effectiveness of the proposed fault detecting scheme, a test motor to allow inter-turn short in the stator winding has been built. The entire control algorithm is implemented using DSP TMS320F28335. Without requiring an additional hardware, the fault can be effectively detected by the proposed scheme during operation so long as the steady-state condition is satisfied.

Methodology for Intercepting the Ransomware Attacks Using File I/O Intervals (파일 I/O Interval을 이용한 랜섬웨어 공격 차단 방법론)

  • Youn, Jung-moo;Jo, Je-geong;Ryu, Jae-cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.645-653
    • /
    • 2016
  • Ransomware was first created in 1999, but its existence become widely known in Korean by 2015. As information and communication technology have developed, the storage capacity of computer has enlarged, it accordingly is getting more important to effectively manage these information, rather than the information itself. In such situation, the ransomware break into other people's computer and encrypt an files without a user's permission. So, it adversely affect the user. In this paper, we monitor an access of a specific process to the file. And on the basis of this monitoring information, we detect whether the abnormal approach happened. Through the detection result, we block the permission about access to the file for a specific process. Using this method, we propose a blocking technique for the ransomeware's abnormal approach and encryption to the files.

Implimentation of MMS using JNI (JNI를 이용한 MMS 구현)

  • Jang, Kyung-Soo;Shin, Dong-Ryeol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.135-145
    • /
    • 2000
  • Manufacturing Message Specification (MMS) is designed as a communication standard protocol, ISO/IEC 9506, on factory automation for messaging between heterogeneous programmable unit controller, PLC, NC, Robot, of different vendors on the networks. MMS is also a standard protocol of OSI reference model application layer, In this paper, we show an implementation of MMS over TCP/IP using ANSI-C programming language on the unix environment, and make java classification using java native interface (NJI) with MMS library. The use of java classification provides a basic environment ot overcome a difficult programming with different MMS application programming interface (MMS-I) which requires a siklled programming technique of graphic user interface (GUI). In this paper, we implement a MMS application program of the automated assembly model for printed circuit board based on WWW which shows the operation, control and monitoring of real manufacturing device (RMD) with web browser providing users for consistent user interface.

  • PDF

A Simple Metric for Assessing the Severity of Partial Discharge Activity Based on Time-Sequence-Analysis-Discharge Level Patterns

  • Stewart Brian G;Yang Lily;Judd Martin D;Reid Alistair;Fouracre Richard A
    • Transactions on Electrical and Electronic Materials
    • /
    • v.7 no.6
    • /
    • pp.313-318
    • /
    • 2006
  • This paper introduces a partial discharge (PD) severity metric, S, based on the evaluation of time-sequence PD data capture and resulting Time-Sequence-Analysis Discharge (TSAD) level distributions. Basically based on an IEC60270 measurement technique, each PD event is time stamped and the discharge level noted. By evaluating the time differences between a previous and subsequent discharge, a 3D plot of time-sequence activity and discharge levels can be produced. From these parameters a measurement of severity, which takes into account dynamic or instantaneous variations in both the time of occurrence and the level of discharge, rather than using standard repetition rate techniques, can be formulated. The idea is to provide a measure of the severity of PD activity for potentially measuring the state of insulation within an item of plant. This severity measure is evaluated for a simple point-plane geometry in $SF_{6}$ as a function of gap distance and applied high voltage. The results show that as the partial discharge activity increases, the severity measure also increases. The importance of future investigations, quantifications and evaluations of the robustness, sensitivity and importance of such a severity measurement, as well as comparing it with typical repetition rate assessment techniques, and other monitoring techniques, are also very briefly discussed.

Laboratorial technique for fabrication of outer diameter stress corrosion cracking on steam generator tubing (증기발생기 전열관 2차측 응력부식균열의 실험실적 모사 방법)

  • Lee, Jae-Min;Kim, Sung-Woo;Hwang, Seong-Sik;Kim, Hong-Pyo;Kim, Hong-Deok
    • Corrosion Science and Technology
    • /
    • v.13 no.3
    • /
    • pp.112-119
    • /
    • 2014
  • In this work, it is aimed to develop the fabrication method of axial stress corrosion cracking (SCC) defects having various sizes, on the outer diameter surface of the steam generator (SG) tubings. To control the length of the artificial SCC defect, the specific area of the SG tubing samples was exposed to an acidic solution after a sensitization heat treatment. During the exposure to an acidic solution, a direct current potential drop (DCPD) method was adopted to monitor the crack depth. The size of the SCC defect was first evaluated by an eddy current test (ECT), and then confirmed by a destructive examination. From the comparison, it was found that the actual crack length was well controlled to be similar to the length of the surface exposed to an acidic solution (5, 10, 20 or 30 mm in this work) with small standard deviation. From in-situ monitoring of the crack depth using the DCPD method, it was possible to distinguish a non-through wall crack from a through wall crack, even though the depth of the non-through wall crack was not able to be precisely controlled. The fabrication method established in this work was useful to simulate the SCC defect having similar size and ECT signals as compared to the field cracks in the SG tubings of the operating Korean PWRs.

Smart System Identification of Super High-Rise Buildings using Limited Vibration Data during the 2011 Tohoku Earthquake

  • Ikeda, A.;Minami, Y.;Fujita, K.;Takewaki, I.
    • International Journal of High-Rise Buildings
    • /
    • v.3 no.4
    • /
    • pp.255-271
    • /
    • 2014
  • A method of smart system identification of super high-rise buildings is proposed in which super high-rise buildings are modeled by a shear-bending system. The method is aimed at finding the story shear and bending stiffnesses of a specific story only from the horizontal floor accelerations. The proposed method uses a set of closed-form expressions for the story shear and bending stiffnesses in terms of the limited floor accelerations and utilizes a reduced shear-bending system with the same number of elements as the observation points. A difficulty of prediction of an unstable specific function in a low frequency range can be overcome by introducing an ARX model and discussing its relation with the Taylor series expansion coefficients of a transfer function. It is demonstrated that the shear-bending system can simulate the vibration records with a reasonable accuracy. It is also shown that the vibration records at two super high-rise buildings during the 2011 Tohoku (Japan) earthquake can be simulated with the proposed method including a technique of inserting degrees of freedom between the vibration recording points. Finally it is discussed further that the time-varying identification of fundamental natural period and stiffnesses can be conducted by setting an appropriate duration of evaluation in the batch least-squares method.

Security tendency analysis techniques through machine learning algorithms applications in big data environments (빅데이터 환경에서 기계학습 알고리즘 응용을 통한 보안 성향 분석 기법)

  • Choi, Do-Hyeon;Park, Jung-Oh
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.269-276
    • /
    • 2015
  • Recently, with the activation of the industry related to the big data, the global security companies have expanded their scopes from structured to unstructured data for the intelligent security threat monitoring and prevention, and they show the trend to utilize the technique of user's tendency analysis for security prevention. This is because the information scope that can be deducted from the existing structured data(Quantify existing available data) analysis is limited. This study is to utilize the analysis of security tendency(Items classified purpose distinction, positive, negative judgment, key analysis of keyword relevance) applying the machine learning algorithm($Na{\ddot{i}}ve$ Bayes, Decision Tree, K-nearest neighbor, Apriori) in the big data environment. Upon the capability analysis, it was confirmed that the security items and specific indexes for the decision of security tendency could be extracted from structured and unstructured data.