• Title/Summary/Keyword: 시스템 신뢰도

Search Result 7,810, Processing Time 0.031 seconds

Methodology for Estimating Highway Traffic Performance Based on Origin/Destination Traffic Volume (기종점통행량(O/D) 기반의 고속도로 통행실적 산정 방법론 연구)

  • Howon Lee;Jungyeol Hong;Yoonhyuk Choi
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.23 no.2
    • /
    • pp.119-131
    • /
    • 2024
  • Understanding accurate traffic performance is crucial for ensuring efficient highway operation and providing a sustainable mobility environment. On the other hand, an immediate and precise estimation of highway traffic performance faces challenges because of infrastructure and technological constraints, data processing complexities, and limitations in using integrated big data. This paper introduces a framework for estimating traffic performance by analyzing real-time data sourced from toll collection systems and dedicated short-range communications used on highways. In particular, this study addresses the data errors arising from segmented information in data, influencing the individual travel trajectories of vehicles and establishing a more reliable Origin-Destination (OD) framework. The study revealed the necessity of trip linkage for accurate estimations when consecutive segments of individual vehicle travel within the OD occur within a 20-minute window. By linking these trip ODs, the daily average highway traffic performance for South Korea was estimated to be248,624 thousand vehicle kilometers per day. This value shows an increase of approximately 458 thousand vehicle kilometers per day compared to the 248,166 thousand vehicle kilometers per day reported in the highway operations manual. This outcome highlights the potential for supplementing previously omitted traffic performance data through the methodology proposed in this study.

A Method for Extracting Equipment Specifications from Plant Documents and Cross-Validation Approach with Similar Equipment Specifications (플랜트 설비 문서로부터 설비사양 추출 및 유사설비 사양 교차 검증 접근법)

  • Jae Hyun Lee;Seungeon Choi;Hyo Won Suh
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.29 no.2
    • /
    • pp.55-68
    • /
    • 2024
  • Plant engineering companies create or refer to requirements documents for each related field, such as plant process/equipment/piping/instrumentation, in different engineering departments. The process-related requirements document includes not only a description of the process but also the requirements of the equipment or related facilities that will operate it. Since the authors and reviewers of the requirements documents are different, there is a possibility that inconsistencies may occur between equipment or parts design specifications described in different requirement documents. Ensuring consistency in these matters can increase the reliability of the overall plant design information. However, the amount of documents and the scattered nature of requirements for a same equipment and parts across different documents make it challenging for engineers to trace and manage requirements. This paper proposes a method to analyze requirement sentences and calculate the similarity of requirement sentences in order to identify semantically identical sentences. To calculate the similarity of requirement sentences, we propose a named entity recognition method to identify compound words for the parts and properties that are semantically central to the requirements. A method to calculate the similarity of the identified compound words for parts and properties is also proposed. The proposed method is explained using sentences in practical documents, and experimental results are described.

Measurement and Discrimination Method for the Evaluation of Aero-Pulsation Noise Generated by the Turbocharger System (터보차저의 공기맥동음 평가를 위한 측정 및 판별법)

  • Kim, Jae-Heon;Lee, Jong-Kyu
    • The Journal of the Acoustical Society of Korea
    • /
    • v.26 no.7
    • /
    • pp.361-365
    • /
    • 2007
  • Aero-pulsation noise, generally caused by geometric asymmetry of a rotating device, is one of considerable sources of annoyance in passenger cars using the turbocharged diesel engine. Main source of this noise is the compressor wheel in the turbocharger system, and can be reduced by after-treatment devices such as silencers, but which may increase the manufacturing cost. More effective solution is to improve the geometric symmetry over all, or to control the quality of components by sorting out inferior ones. The latter is more simple and reasonable than the former in view of manufacturing. Thus, an appropriate discrimination method should be needed to evaluate aero-pulsation noise level at the production line. In this paper, we introduce the accurate method which can measure the noise level of aero-pulsation and also present its evaluation criteria. Besides verifying the reliability of a measurement system - a rig test system-, we analyze the correlation between the results from rig tests and those from vehicle tests. The gage R&R method is carried out to check the repeatability of measurements over 25 samples. From the result, we propose the standard specification which can discriminate inferior products from superior ones on the basis of aero-pulsation noise level.

Exploratory Study on Enhancing Cyber Security for Busan Port Container Terminals (부산항 컨테이너 터미널 사이버 보안 강화를 위한 탐색적 연구)

  • Do-Yeon Ha;Yul-Seong Kim
    • Journal of Navigation and Port Research
    • /
    • v.47 no.6
    • /
    • pp.437-447
    • /
    • 2023
  • By actively adopting technologies from the Fourth Industrial Revolution, the port industry is trending toward new types of ports, such as automated and smart ports. However, behind the development of these ports, there is an increasing risk of cyber security incidents and threats within ports and container terminals, including information leakage through cargo handling equipment and ransomware attacks leading to disruptions in terminal operations. Despite the necessity of research to enhance cyber security within ports, there is a lack of such studies in the domestic context. This study focuses on Busan Port, a representative port in South Korea that actively incorporates technology from the Fourth Industrial Revolution, in order to discover variables for improving cyber security in container terminals. The research results categorized factors for enhancing cyber security in Busan Port's container terminals into network construction and policy support, standardization of education and personnel training, and legal and regulatory factors. Subsequently, multiple regression analysis was conducted based on these factors, leading to the identification of detailed factors for securing and enhancing safety, reliability, performance, and satisfaction in Busan Port's container terminals. The significance of this study lies in providing direction for enhancing cyber security in Busan Port's container terminals and addressing the increasing incidents of cyber security attacks within ports and container terminals.

Application of Matrix-assisted Laser Desorption/Ionization Time-of-flight Mass Spectrometry (Matrix-assisted Laser Desorption/Ionization Time-of-flight Mass Spectrometry의 활용)

  • Pil Seung KWON
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.55 no.4
    • /
    • pp.244-252
    • /
    • 2023
  • The timeliness and accuracy of test results are crucial factors for clinicians to decide and promptly administer effective and targeted antimicrobial therapy, especially in life-threatening infections or when vital organs and functions, such as sight, are at risk. Further research is needed to refine and optimize matrix-assisted laser desorption/ionization time-of-flight mass spectrometry (MALDI-TOF MS)-based assays to obtain accurate and reliable results in the shortest time possible. MALDI-TOF MS-based bacterial identification focuses primarily on techniques for isolating and purifying pathogens from clinical samples, the expansion of spectral libraries, and the upgrading of software. As technology advances, many MALDI-based microbial identification databases and systems have been licensed and put into clinical use. Nevertheless, it is still necessary to develop MALDI-TOF MS-based antimicrobial-resistance analysis for comprehensive clinical microbiology characterization. The important applications of MALDI-TOF MS in clinical research include specific application categories, common analytes, main methods, limitations, and solutions. In order to utilize clinical microbiology laboratories, it is essential to secure expertise through education and training of clinical laboratory scientists, and database construction and experience must be maximized. In the future, MALDI-TOF mass spectrometry is expected to be applied in various fields through the use of more powerful databases.

The Effect of Technostress on User Resistance and End-User Performance (테크노스트레스가 사용자 저항과 성과에 미치는 영향)

  • Kyoung-June Kim;Ki-Dong Lee
    • Information Systems Review
    • /
    • v.19 no.4
    • /
    • pp.63-85
    • /
    • 2017
  • Recent information technology achieves remarkable progress in almost all areas where it can be applied. However, this technology also causes technostress, such as fear and pressure to individuals, due to events, such as the threat of job loss. This technostress is becoming an important factor that can affect user performance and productivity in future society where information technology will be the focus. This kind of stress should be studied considerably in academic and practical applications. The effects of technostress on individual performance remain ambiguous. Therefore, academic research is needed to prove these effects. This study aimed to clarify the direct and indirect effects of technostress on information technology end-users. We developed a research model that integrates innovation resistance and technostress theory through previous studies and analyzed the questionnaire of 317 people. The PLS structural equation model and the study results of Baron and Kenny (1986) indicated that rapid change, connectivity, reliability, and complexity are crucial factors affecting the technostress of information technology. Technostress was analyzed indirectly only through innovation resistance, which affected the performance of end-users. This study will provide new implications for the relationship between technostress and performance or productivity in the IS field.

Evaluation of hydrologic risk of drought in Boryeong according to climate change scenarios using scenario-neutral approach (시나리오 중립 접근법을 활용한 기후변화 시나리오에 따른 보령시 가뭄의 수문학적 위험도 평가)

  • Kim, Jiyoung;Han, Young Man;Seo, Seung Beom;Kim, Daeha;Kim, Tae-Woong
    • Journal of Korea Water Resources Association
    • /
    • v.57 no.3
    • /
    • pp.225-236
    • /
    • 2024
  • To prepare for the impending climate crisis, it is necessary to establish policies and strategies based on scientific predictions and analyses of climate change impacts. For this, climate change should be considered, however, in conventional scenario-led approach, researchers select and utilize representative climate change scenarios. Using the representative climate change scenarios makes prediction results high uncertain and low reliable, which leads to have limitations in applying them to relevant policies and design standards. Therefore, it is necessary to utilize scenario-neutral approach considering possible change ranges due to climate change. In this study, hydrologic risk was estimated for Boryeong after generating 343 time series of climate stress and calculating drought return period from bivariate drought frequency analysis. Considering 18 scenarios of SSP1-2.6 and 18 scenarios of SSP5-8.5, the results indicated that the hydrologic risks of drought occurrence with maximum return period ranged 0.15±0.025 within 20 years and 0.3125±0.0625 within 50 years, respectively. Therefore, it is necessary to establish drought policies and countermeasures in consideration of the corresponding hydrologic risks in Boryeong.

Rifle performance improvement cost estimation through Relation between the accuracy and Engagement results Using the Engagement class simulation model (명중률과 교전결과의 상관관계분석을 통한 개인화기 성능개선비용 추정 : 교전급 분석모델을 중심으로)

  • TaeKyeom Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.289-295
    • /
    • 2024
  • This study analyzes the correlation between the accracy of rifle and the result of engagement. And estimates the improvement cost of the rifle accordingly. For this experiment, an engagement class simulation model(AWAM: Army Weapon Effectiveness Analysis Model) was used. We also selected the rifle, which is a portable weapon for the experiment. Prior to this experiment, we conducted a reliability test(VV&A: Verification, Validation and Accreditation) on the model. The VV&A process is mainly done during the development of the DM&S model, which is also necessary for the operation of the M&S. We confirmed the need for VV&A during the experiment and obtained reliable experimental results using the corrected values. In the Accuracy Experiment we found that the 20% improvement is the most effective. And we were able to estimate the cost of acquiring a rifle with a 20% higher accuracy. The cost was estimated by simple regression analysis based on the price of the current rifle. Through this study, we could know the impact of the accuracy of rifle on the experimental results and estimate the cost of improved rifle.

Study on Method to Develop Case-based Security Threat Scenario for Cybersecurity Training in ICS Environment (ICS 환경에서의 사이버보안 훈련을 위한 사례 기반 보안 위협 시나리오 개발 방법론 연구)

  • GyuHyun Jeon;Kwangsoo Kim;Jaesik Kang;Seungwoon Lee;Jung Taek Seo
    • Journal of Platform Technology
    • /
    • v.12 no.1
    • /
    • pp.91-105
    • /
    • 2024
  • As the number of cases of applying IT systems to the existing isolated ICS (Industrial Control System) network environment continues to increase, security threats in the ICS environment have rapidly increased. Security threat scenarios help to design security strategies in cybersecurity training, including analysis, prediction, and response to cyberattacks. For successful cybersecurity training, research is needed to develop valid and reliable security threat scenarios for meaningful training. Therefore, this paper proposes a case-based security threat scenario development methodology for cybersecurity training in the ICS environment. To this end, we develop a methodology consisting of five steps based on analyzing actual cybersecurity incident cases targeting ICS. Threat techniques are standardized in the same form using objective data based on the MITER ATT&CK framework, and then a list of CVEs and CWEs corresponding to the threat technique is identified. Additionally, it analyzes and identifies vulnerable functions in programming used in CWE and ICS assets. Based on the data generated up to the previous stage, develop security threat scenarios for cybersecurity training for new ICS. As a result of verification through a comparative analysis between the proposed methodology and existing research confirmed that the proposed method was more effective than the existing method regarding scenario validity, appropriateness of evidence, and development of various scenarios.

  • PDF

Development of a Lower Limb Magnet System Capable of Polarity Conversion (극성변환이 가능한 하지의지 자석락 시스템 개발)

  • Beom-ki Hong;Seung-Gi Kim;Se-Hoon Park
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.25 no.2
    • /
    • pp.77-85
    • /
    • 2024
  • The suspension device that connects the prosthetic leg and the residual limb allows lower limb amputees to wear prosthetic limbs, and is the most sensitive part when using prosthetic limbs as it is always in contact with the residual limb not only while walking but also in everyday life. In this paper, using the principles of attraction and repulsion of permanent magnets, we developed a magnetic lock suspension device that can fix the amputees and prosthetic legs of lower limb amputees by changing the polarity of the magnet. The operation method of the magnetic lock is that when neodymium magnets are placed on the left and right as NNSS based on a non-magnetic brass core, the magnetic force flows outward beyond the brass core using the adsorption member as a medium to generate bonding force. When rotated 90 degrees, the magnet moves to NSNS. The principle is that as the position moves, the magnetic force flows inward and cancels out.Based on this, we conducted a bonding test using tensile strength and a short-term comparative evaluation of the prosthesis with the shuttle lock suspension system, which was a comparison group, to verify reliability and evaluate satisfaction with the prototype. As a result, the tensile strength exceeding the appropriate bonding strength was confirmed, and the magnetic lock showed higher satisfaction than the shuttle lock. In the future, we plan to conduct long-term ADL clinical trials for commercialization and develop a product that can be distributed to actual amputees.