• Title/Summary/Keyword: 룰

Search Result 571, Processing Time 0.028 seconds

The Fuelization Study on the Oil Palm Frond Through Torrefaction (Oil Palm Frond의 반탄화를 통한 연료화 연구)

  • Lee, Myung Suk;Jeong, Gwangsik;Jung, Sang-Jin;Lee, Kwan-Young
    • Korean Chemical Engineering Research
    • /
    • v.51 no.4
    • /
    • pp.465-469
    • /
    • 2013
  • In this study, we investigated the feasibility of torrefied OPF (oil palm fronds) as the fuel. The torrefaction was performed at 200, 250, 300 and $350^{\circ}C$ during 1 and 2 hours, respectively. As raising the torrefaction temperature and increasing the processing time, the GHV (gross heating value) of torrefied OPFs was increased. Moreover, we found that the torrefaction temperature is more important factor than the processing time. However, the proper torrefaction temperature was asked because the higher torrefaction temperature leaded to the lower torrefied OPF yield. TGA (thermo-gravimetric analysis) data released that the torrefaction at $250^{\circ}C$ could significantly decompose the hemicellulose and the almost cellulose was decomposed at $300^{\circ}C$. In addition, the grindability of biomass was improved after torrefaction, so that it can reduce energy consumption in comminution.

A Study on Smart EDR System Security Development (Smart EDR 시스템구축을 위한 보안전략과 발전방안)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.41-47
    • /
    • 2020
  • In the corporate information system environment, detecting and controlling suspicious behaviors occurring at the end point of the actual business application is the most important area to secure the organization's business environment. In order to accurately detect and block threats from inside and outside, it is necessary to be able to monitor all areas of all terminals in the organization and collect relevant information. In other words, in order to maintain a secure business environment of a corporate organization from the constant challenge of malicious code, everything that occurs in a business terminal such as a PC beyond detection and defense-based client security based on known patterns, signatures, policies, and rules that have been universalized in the past. The introduction of an EDR solution to enable identification and monitoring is now an essential element of security. In this study, we will look at the essential functions required for EDR solutions, and also study the design and development plans of smart EDR systems based on active and proactive detection of security threats.

Ultimate Strength varying the Yield Stress of a Ship's Plate (선체판의 항복응력 변화에 따른 최종강도거동에 관한 연구)

  • Ko Jae-Yong;Lee Jun-Kyo;Park Joo-Shin
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2005.05a
    • /
    • pp.179-183
    • /
    • 2005
  • The High-tensile steel has been recognized as a promising concept for structural design of light weight transportation systems such as aircraft high speed trains and fast ships. Using the high-tensile steel has been widely used in ship structures, and this enables to reduce the plate thickness. Using the high-tensile steel effectively for a ship hull, the plate thickness becomes thin so that plate buckling may take place. Therefore, precise assessment of the behavior of plate above primary buckling load is important. In this study, examined closely secondary buckling behavior after initial buckling of thin plate structure which operated compressive load according to the various kinds of yield stress with simply supported boundary condition. Analysis method is F.E.M by commercial program(ANSYS V7.1) and complicated nonlinear behaviour can analyze using art-length method about secondary buckling.

  • PDF

A Case Study on Application of Dispatching Rule-Based Advanced Planning and Scheduling (APS) System (디스패칭 룰 기반의 Advanced Planning and Scheduling (APS) 시스템 활용 사례연구)

  • Lee, Jae-yong;Shin, Moonsoo
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.3
    • /
    • pp.78-86
    • /
    • 2015
  • Up-to-date business environment for manufacturers is very complex and rapidly changing. In other words, companies are facing a variety of changes, such as diversifying customer requirements, shortening product life cycles, and switching to small quantity batch production. In this situation, the companies are introducing the concept of JIT (just-in-time) to solve the problem of on-time production and on-time delivery for survival. Though many companies have introduced ERP (enterprise resource planning) systems and MRP (material requirement planning) systems, the performance of these systems seems to fall short of expectations. In this paper, the case study on introducing an APS (advanced planning and scheduling) system based on dispatching rules to a machining company and on finding a method to establish an efficient production schedule is presented. The case company has trouble creating an effective production plan and schedule, even though it is equipped with an MRP-based ERP system. The APS system is applied to CNC (computer numerical control) machines, which are key machines of the case company. The overall progress of this research is as follows. First, we collect and analyze the master data on individual products and processes of the case company in order to build a production scheduling model. Second, we perform a pre-allocation simulation based on dispatching rules in order to calculate the priority of each order. Third, we perform a set of production simulations applying the priority value in order to evaluate production lead time and tardiness of pre-defined dispatching rules. Finally, we select the optimal dispatching rule suitable for work situation of the case company. As a result, an improved production schedule leads to an increase in production and reduced production lead time.

A Study on Big Data Anti-Money Laundering Systems Design through A Bank's Case Analysis (A 은행 사례 분석을 통한 빅데이터 기반 자금세탁방지 시스템 설계)

  • Kim, Sang-Wan;Hahm, Yu-Kun
    • The Journal of Bigdata
    • /
    • v.1 no.1
    • /
    • pp.85-94
    • /
    • 2016
  • Traditional Anti-Money Laundering (AML) software applications monitor bank customer transactions on a daily basis using customer historical information and account profile data to provide a "whole picture" to bank management. With the advent of Big Data, these applications could be benefited from size, variety, and speed of unstructured data, which have not been used in AML applications before. This study analyses the weaknesses of a bank's current AML systems and proposes an AML systems taking advantage of Big Data. For example, early warning of AML risk can be improved by exposing identities and uncovering hidden relationships through predictive and entity analytics on real-time and outside data such as SNS data.

  • PDF

Creative Industry Digital Transformation Case Study: Market Reorganization Strategy and Platform (창작 산업 (Creative Industry) 디지털 트랜스포메이션 사례연구: 시장재편전략과 플랫폼중심으로)

  • Lee, HoGeun;Lee, SeoYoung
    • Journal of Digital Convergence
    • /
    • v.18 no.7
    • /
    • pp.177-188
    • /
    • 2020
  • In the digital world, creative industries such as music, movies, and drama have been the most impacted by digital transformation. As these contents were converted to a digital format of 0s and 1s, the business model changed and so did the rules of competition in the market. Apple, Spotify, and Netflix were quick to ride the digital transformation wave to become market leaders in the creative industry. This study reviews case studies in the creative industry to grasp the important factors necessary for market restructuring using digital technology. It was found that companies that set visions, platform, and open innovation as business strategies were able to achieve critical mass and become market leaders. These three elements are commonly found in the contents industry. On the other hand, companies that did not embrace digital innovation have become victims of digital darwinism. By analysing the experience of digital product innovation through case studies in the creative industry, we can derive implications for digital transformation in the 4th industrial revolution.

Learning of Fuzzy Rules Using Fuzzy Classifier System (퍼지 분류자 시스템을 이용한 퍼지 규칙의 학습)

  • Jeong, Chi-Seon;Sim, Gwi-Bo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.37 no.5
    • /
    • pp.1-10
    • /
    • 2000
  • In this paper, we propose a Fuzzy Classifier System(FCS) makes the classifier system be able to carry out the mapping from continuous inputs to outputs. The FCS is based on the fuzzy controller system combined with machine learning. Therefore the antecedent and consequent of a classifier in FCS are the same as those of a fuzzy rule. In this paper, the FCS modifies input message to fuzzified message and stores those in the message list. The FCS constructs rule-base through matching between messages of message list and classifiers of fuzzy classifier list. The FCS verifies the effectiveness of classifiers using Bucket Brigade algorithm. Also the FCS employs the Genetic Algorithms to generate new rules and modify rules when performance of the system needs to be improved. Then the FCS finds the set of the effective rules. We will verify the effectiveness of the poposed FCS by applying it to Autonomous Mobile Robot avoiding the obstacle and reaching the goal.

  • PDF

An Empirical Analysis on Long Tail Patterns with Online Daily Deals (소셜 커머스 시장의 롱테일 현상에 대한 실증 연구)

  • Jeon, Seongmin
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.1
    • /
    • pp.119-129
    • /
    • 2014
  • The renowned Pareto rule of 80/20 has been challenged in the electronic marketplace with the emergence of long tail economy. Mass customization on top of the Internet infrastructure is expected to explain these changes of product concentration. In this paper, we empirically analyzed the micro-transactional data of a Groupon-like daily deal web site to identify the changes of product and customer concentration. The results show the long tail pattern aligned with the previous research on the e-commerce literature on the long tail. We find that the notification setting on email or SMS about daily deal influences the patterns of sales concentration. The information through email and SMS is expected to enable consumers to know about daily bargains and purchase the coupons eventually. However, the email notification for niche products results in the decreased sales while the SMS notification for overall product promotes overall products.

A Case Study on the Implementation of Context-aware based on Home Robot Service (상황인식 기반 홈 로봇 서비스의 구현사례)

  • Kim, Hyoung-Sun
    • Journal of Service Research and Studies
    • /
    • v.4 no.1
    • /
    • pp.49-59
    • /
    • 2014
  • Context-aware computing is an emerging paradigm to achieve ubiquitous computing environments by enabling computer systems to understand their situational contexts. A context-aware system uses context to provide relevant information and services to the user depending on the user's task. In this paper, we propose an ontology-based context-aware modeling methodology that transmits low-level contexts acquired by directly accessing various sensors in the physical environments to high-level contexts. With these high-level contexts, context-aware application can provides proactive and intelligent services using ECA (Event-Condition-Action) rules. We implemented a home robot service in smart office environment.

  • PDF

논제 부정 Access에 대한 Firewall의 과제와 대책

  • 변성준;서정석;최원석
    • Proceedings of the Korea Database Society Conference
    • /
    • 2000.11a
    • /
    • pp.227-238
    • /
    • 2000
  • Firewall은 다양한 부정Access의 방지책으로서 확실히 유효한 수단이지만 이 Firewall은 사용자로부터 지시된 설정을 충실히 실행하는 것으로 설정 오류, 소프트웨어의 정지, 허가된 룰을 악용한 침입 등 반드시 사용자가 바라는 작용을 무조건적 상태에서 보증해 주는 것은 아니다. 따라서 사용자는 도입 후 에도 운용시에 Access log를 감시하고 본래의 Security Policy에 반하는 행위를 매일 매일 체크하지 않으면 안될 상황에 처해 있다. 본 연구는 이러한 부정Access에 대한 이와 같은 Firewall의 현상에 대한 과제 중에서 "부정Access를 어떻게 하면 일찍, 정확히 체크할 수 있는가\ulcorner"라는 주제를 선택하여 Firewall의 한계와 그 대응책을 실제로 부정Access를 시험해 보는 것으로 검증하기로 하였다. 실험결과에서 (1)Port Scan이나 전자메일 폭탄(서비스정지공격)등은 Firewall로 방지하는 것은 불가능하거나 혹은 Checking이 곤란하다. (2)공격마다 로그 수집을 했음에도 관계없이 Firewall의 로그는 번잡하므로 단시간에 사태의 발견이 대단히 곤란하다고 하는 Firewall의 한계를 인식하였다. 그리고 그 대책으로서 우리는 체크 툴의 유효성에 착안하여 조사한 결과, 결국 무엇이 부정Access인가에 대해서는 어디까지나 이용하는 측이 판단하여 Firewall 상에 설정하지 않으면 안되지만 체크 툴은 이 부정Access 정보를 데이터베이스로서 갖고 있음으로써 '무엇이 부정Access인가'를 이용자 대신에 판단하고 툴에 따라서는 설정을 자동적으로 변경하여 부정 Access의 저지율을 향상시킨다. 이처럼 체크 툴은 Firewall의 수비능력을 보강하는 위치에 있다고 생각할 수 있다.다. 4 장에서는 3장에서 제기한 각각의 문제점에 대해 RAD 의 관점에 비추어 e-business 시스템의 단기개발을 실현하기 위한 고려사항이나 조건 해결책을 제안한다. 본 논문이 지금부터 e-business 를 시작하려고 하는 분, e-business 시스템의 개발을 시작하려고 하는 분께 단기간의 e-business 실현을 위한 하나의 지침이 된다면 다행이겠다.formable template is used to optimize the matching. Then, clustering the similar shapes by the distance between each centroid, papaya can be completely detected from the background.uage ("Association of research for algorithm of calculating machine (1992)"). As a result, conventional NN and CNN were available for interpolation of sampling data. Moreover, when nonlinear intensity is not so large under the field condition of small slope, interpolation performance of CNN was a little not so better than NN. However, when nonlinear intensity is large under the field condition of large slope, interpolation performance of CNN was relatively better than NN.콩과 자연 콩이 성분 분석에서 차이를

  • PDF