• Title/Summary/Keyword: 자동화 기술

Search Result 3,006, Processing Time 0.035 seconds

Design and Implementation of Psychological Diagnosis Expert System based on the SandTray (모래 상자 놀이 기반 심리 진단 전문가 시스템 설계 및 구현)

  • Son, Se-Jin;Lee, Kang-Hee
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.11
    • /
    • pp.235-244
    • /
    • 2017
  • This paper aims to design a system for psychological diagnosis in sandbox play by applying rule based expert system. Sandbox play is one of play therapy and it is a technique that can be combined with psychological diagnosis and treatment using sand and various kinds of figures. In this technique, we focus on psychological diagnostic factors and try to implement a system that automatically diagnoses psychological types when input values are given. Therefore, six kinds of language objects are set and the rules are created according to the types of figures, arrangement of figures, and production time in the sand box used as a reference element in the diagnosis method. In this system, it is assumed that the client recognizes the finished sandbox as a sensor device. Then, when the recognized state enters the input value, the rules based on the language object are ignited in order. Through this, the client is diagnosed with one of 26 types of psychology. As a result, the diagnostic process is simplified and automated. Accordingly, a more detailed psychological diagnosis and treatments are provided.

An Intelligent Approach for Reorganization Record Classification Schemes in Public Institutions: Case Study on L Institution (공공기관 기록물 분류체계 재정비를 위한 지능화 방안: L 기관 사례를 중심으로)

  • Jinsol Lim;Hui-Jeong Han;Hyo-Jung Oh
    • Journal of the Korean Society for information Management
    • /
    • v.40 no.2
    • /
    • pp.137-156
    • /
    • 2023
  • As social and political paradigms change, public institution tasks and structures are constantly created, integrated, or abolished. From an effective record management perspective, it is necessary to review whether the previously established record classification schemes reflect these changes and remain relevant to current tasks. However, in most institutions, the restructuring process relies on manual labor and the experiential judgment of practitioners or institutional record managers, making it difficult to reflect changes in a timely manner or comprehensively understand the overall context. To address these issues and improve the efficiency of record management, this study proposes an approach using automation and intelligence technologies to restructure the classification schemes, ensuring records are filed within an appropriate context. Furthermore, the proposed approach was applied to the target institution, its results were used as the basis for interviews with the practitioners to verify the effectiveness and limitations of the approach. It is, aiming to enhance the accuracy and reliability of the restructured record classification schemes and promote the standardization of record management.

Smart Cart System for Commodity Browsing and Automatic Calculation (물품검색과 자동계산이 가능한 스마트카트 시스템)

  • Park, Cha-Hun;Hwang, Seong-Hun;Choi, Geon-Woo;Park, Jae-Hwi;Lee, Seung-Hyun;Kim, Sung-Hyeon;Jung, Ui-Hoon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.669-670
    • /
    • 2020
  • 현재 4차 산업이 진행됨으로써 대부분의 사물들이 자율화 기능이 더해지는 시대가 오고 있다. 자율화 기술이 발전됨으로써 모든 사람들은 삶을 살아가면서 스스로 문제를 해결해 나갈수 있으며 기존의 생활속도보다 빨라지는 것을 느낄수 있을 것이다. 그래서 마트에서도 쇼핑을하면서 소비자들이 어떻게 쇼핑을 할 때 현재의 수준보다 쇼핑의 질이 높아 질지 고안해보았다. 본 과제물은 소비자들이 쇼핑을할 때 보다 편리하게 일을 처리할수도록 스마트 기능을 카트와 카운터에 추가하였다. 카트에 디스플레이와 바코드 스캐너를 부착함으로써 검색을 통해 소비자들이 원하는 물품의 가격, 위치등의 정보를 알아 낼 수 있고 현재 카트에 담긴 물품의 총 가격을 알 수 있다. 또한, 쇼핑을 마치고 계산을할 때 계산 대기줄이 길어지는 불편함을 해소하기위해 자동계산 기능이 있다. 쇼핑을 마친 소비자가 카트를 카운터로 끌고가면 카트에 저장되어 있는 쇼핑정보가 카운터의 디스플레이에 표시되고 카트와 카운터의 정보가 일치한다면 소비자가 카트에 요금을 충전해 스스로 계산을 수행할수 있다. 이런 자동화, 스마트 기능들은 소비자들의 편리함과 시간을 단축시킬수 있을 것이다.

  • PDF

AI Automation Smart Access Management System using Personal Authentication and Heat Detector (AI자동화 개인 인증 및 발열 감지기를 이용한 스마트 출입 관리 시스템)

  • Lee, Hyo-Jai;Hong, Changho;Cho, Sung Ho;Kim, Eungsuk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.272-274
    • /
    • 2021
  • Recently, due to COVID-19, the use of non-face-to-face authentication and fever detection systems is increasing. As the number of confirmed cases increases, the government is making it mandatory to authenticate and install a fever detector. It is used for entering and leaving not only general restaurants but also all stores. However, in most cases, the heat detector and the authentication device are separately configured and used, which is very inconvenient. Therefore, this study was conducted to develop an access control system that can simultaneously perform these functions. A smart access control system was developed by combining IOT technology as well as a fever detection function and smart personal recognition function. It is expected to further develop K-Quarantine by distributing it to public facilities and nursing facilities in the future.

  • PDF

Image Restoration using Pattern of Non-noise Pixels in Impulse Noise Environments (임펄스 잡음 환경에서 비잡음 화소의 패턴을 사용한 영상복원)

  • Cheon, Bong-Won;Kim, Marn-Go;Kim, Nam-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.407-409
    • /
    • 2021
  • Under the influence of the 4th industrial revolution, various technologies such as artificial intelligence and automation are being grafted into industrial sites, and accordingly, the importance of data processing is increasing. Digital images may generate noise due to various reasons, and may affect various systems such as image recognition and classification and object tracking. To compensate for these shortcomings, we propose an image restoration algorithm based on pattern information of non-noise pixels. According to the distribution of non-noise pixels inside the filtering mask, the proposed algorithm switched the filtering process by dividing the interpolation method into a pattern that can be applied, a pattern based on region division, and a randomly arranged pixel pattern. preserves and restores the image. The proposed algorithm showed superior performance compared to the existing impulse noise removal algorithm.

  • PDF

A Study on Threat Detection Model using Cyber Strongholds (사이버 거점을 활용한 위협탐지모델 연구)

  • Inhwan Kim;Jiwon Kang;Hoonsang An;Byungkook Jeon
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.19-27
    • /
    • 2022
  • With the innovative development of ICT technology, hacking techniques of hackers are also evolving into sophisticated and intelligent hacking techniques. Threat detection research to counter these cyber threats was mainly conducted in a passive way through hacking damage investigation and analysis, but recently, the importance of cyber threat information collection and analysis is increasing. A bot-type automation program is a rather active method of extracting malicious code by visiting a website to collect threat information or detect threats. However, this method also has a limitation in that it cannot prevent hacking damage because it is a method to identify hacking damage because malicious code has already been distributed or after being hacked. Therefore, to overcome these limitations, we propose a model that detects actual threats by acquiring and analyzing threat information while identifying and managing cyber bases. This model is an active and proactive method of collecting threat information or detecting threats outside the boundary such as a firewall. We designed a model for detecting threats using cyber strongholds and validated them in the defense environment.

Development of the Embedded System-based Real-time Internal Status Identification System for Overhead Bin (임베디드 시스템 기반 오버헤드 빈 내부 상황 실시간 식별 시스템 개발)

  • Jaeeun Kim;Hyejung Lim;Sungwook Cho
    • Journal of Aerospace System Engineering
    • /
    • v.17 no.2
    • /
    • pp.111-119
    • /
    • 2023
  • Internal storage state, weight data, and weight-centered calculation values for overhead bin can all be seen in this paper's real-time internal status identification system. The suggested system offers such valuable data via a range of sensors, including load cells and switch arrays. The proposed system could locate internal free space, locate the center of gravity, and give real-time visual information. It was developed utilizing an embedded system and the C programming language. These features led to the creation of smart overhead bins and real-time cargo loading monitoring technologies, both of which could one day aid in the creation of a cargo loading automation system.

A Study on Yard Truck Dispatching Model in Container Terminal (컨테이너터미널 야드 트럭 배차 모형에 관한 연구)

  • Jae-Young Shin;Hyoung-Jun Park;Su-Bin Lee
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2022.06a
    • /
    • pp.385-386
    • /
    • 2022
  • Currently, global developed countries in shipping and logistics establish smart ports by introducing various digital technologies such as automated terminals and sharing platforms. This means that the importance of efficiency throughout the port by improving resource utilization efficiency and minimizing work idle time is increasing. Therefore, this study proposes a yard truck dispatching method of improving resource utilization efficiency. And we analyze the problems of the existing dispatching rules and develop Y/T dispatching algorithm that comprehensively considers related constraints. In addition, the simulation takes into account the terminal congestion based on the operation data of the Busan New Port, it is conducted using the existing dispatch method and developed Y/T dispatching algorithm. And the operational effects of analysis result are evaluated.

  • PDF

Detection Models and Response Techniques of Fake Advertising Phishing Websites (가짜 광고성 피싱 사이트 탐지 모델 및 대응 기술)

  • Eunbeen Lee;Jeongeun Cho;Wonhyung Park
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.29-36
    • /
    • 2023
  • With the recent surge in exposure to fake advertising phishing sites in search engines, the damage caused by poor search quality and personal information leakage is increasing. In particular, the seriousness of the problem is worsening faster as the possibility of automating the creation of advertising phishing sites through tools such as ChatGPT increases. In this paper, the source code of fake advertising phishing sites was statically analyzed to derive structural commonalities, and among them, a detection crawler that filters sites step by step based on foreign domains and redirection was developed to confirm that fake advertising posts were finally detected. In addition, we demonstrate the need for new guide lines by verifying that the redirection page of fake advertising sites is divided into three types and returns different sites according to each situation. Furthermore, we propose new detection guidelines for fake advertising phishing sites that cannot be detected by existing detection methods.

Examining the Influence of TBM Chamber Condition and Transmission Distance on the Received Strength of Bluetooth Low Energy Signals: A Laboratory Simulation Experiment (TBM 챔버 상태와 전송 거리에 따른 저전력 블루투스 신호의 수신 강도 분석: 실험실 모사 실험)

  • Yosoon Choi;Hoyoung Jeong;Jeongju Kim
    • Tunnel and Underground Space
    • /
    • v.33 no.5
    • /
    • pp.425-434
    • /
    • 2023
  • To measure the wear amount of the TBM disk cutter in real time, it is important not only to automate the measurement using sensors, but also to stably transmit the measured data to the information processing system. In this study, we investigated the viability of utilizing Bluetooth Low Energy (BLE) technology to wirelessly transmit sensor data from the TBM cutter head to a receiver located at the chamber's rear. Through laboratory experiments, we analyzed the Received Signal Strength Index (RSSI) of the receiver considering various signal strength of the transmitter, separation distances between the transmitter and receiver and chamber fill materials. Our results demonstrate that wireless data transmission is feasible across all tested conditions when the transmitter signal strength is 0 dBm or higher.