• Title/Summary/Keyword: 자동화 메커니즘

Search Result 71, Processing Time 0.028 seconds

A Study on the Long-Term Behavior Characteristics of Buoyancy-Resistant Permanent Anchor (부력저항 영구앵커의 장기거동 특성에 관한 연구)

  • Huh, Byungjoo;Kim, Chanki;Jung, Yonggun;Chun, Byungsik
    • Journal of the Korean GEO-environmental Society
    • /
    • v.11 no.12
    • /
    • pp.27-35
    • /
    • 2010
  • The structures built under the groundwater level are affected by the buoyancy force, which is hydrostatic pressure in the up direction. Recently, buoyancy-resistant anchor method has been applied in many cases of the construction of the important structure of large size, which is built under the groundwater level so that it takes high uplift pressure. Even if the construction cost of the method is very high, it surely increases the safety rate. However, the diagnosis of the performance of the buoyancy-resistant permanent anchor and the investigation of resistance mechanism are still insufficient. Especially, the long-term behavior of the anchor has not been studied well due to the difficulty in observation procedure. The contribution of this paper is the establishment of reasonable design methodology. We have measured anchor axial forces for 10 years after the construction, by using an automated measurement and a manual measurement by establishing a load cell in anchor head. Through the data collected from the measurements, we analyze the construction-step behavior of the anchor according to the self-weight variation of the building and the long-term behavior (i.e. movement within 10 years after the construction) of the anchor according to the passage of time.

A Study on Previous Plan for Levee Leakage Monitoring Sensors (제방누수감지센서 설치를 위한 사전계획 연구)

  • Park, Kyoung-Won;Jung, Kwan-Su;Lee, Gwang-Man;Hwang, Eui-Ho
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2012.05a
    • /
    • pp.669-673
    • /
    • 2012
  • 제방안전성 모니터링은 제방파괴로부터 국민의 생명과 재산을 보호하는데 필요한 정보를 얻을 수 있는 하나의 방법이 될 수 있다. 근래에 미국은 2005년 허리케인 카타리나에 의해 2,000여명의 인명손실을 경험하였고 2011년 3월 일본은 도후쿠지역의 초강력 지진에 의한 쓰나미로 인해 수만명의 인명과 후쿠시마 원자력 발전소의 침수로 지금까지 방사능 누출 차단작업을 벌이고 있다. 국내에서는 4대강 복원사업으로 주요 국가 하천 구간에서 홍수 및 체제 불안정에 의한 제방붕괴사고위험이 현격하게 줄어들었으나 제방의 안전성은 더욱 강조되고 있다. 즉 신설된 보 주변, 배수통문 신설구간 그리고 제방누수 예상지점 등에서는 아직 안전한 상태라고 확신할 수 없으며 지속적인 모니터링이 요구된다. 따라서 본 연구에서는 광섬유를 이용하여 개발한 간극수압 및 온도 센서 등을 위험예상지점에 설치하고 정보시스템을 통하여 어떻게 관리 할 것인가에 대한 사전 검토를 계획하였다. 이를 위하여 제방에 센서를 설치하기 전에 주요 검토사항에 대하여 연구분석하였다. 주요 검토사항에는 설치하고자 하는 지점의 제방거동 메커니즘 예측, 왜 계측시스템을 설치하는지에 대한 목적에 대한 평가, 설치 지점의 제방의 토질공학적 문제점 파악, 모니터링 대상 매개변수 혹은 항목 선정, 조사대상 항목의 변화정도를 예측하여 거동 범위 확정, 적정 계측기기 설치 지점을 선청, 계측기기 선정, 자동화 혹은 실시간 정보시스템에 필요한 사항 결정, 관측에 영향을 미치는 인자들의 기록 계획, 정보의 타당성 확보를 위한 필요사항 정립, 비용의 결정, 장기 예측 계획, 정기 검 보정 및 관리 계획, 자료수집 및 관리계획, 자원의 공조 및 생애주기 비용 등을 포함하였다.

  • PDF

GAN-based Automated Generation of Web Page Metadata for Search Engine Optimization (검색엔진 최적화를 위한 GAN 기반 웹사이트 메타데이터 자동 생성)

  • An, Sojung;Lee, O-jun;Lee, Jung-Hyeon;Jung, Jason J.;Yong, Hwan-Sung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.79-82
    • /
    • 2019
  • This study aims to design and implement automated SEO tools that has applied the artificial intelligence techniques for search engine optimization (SEO; Search Engine Optimization). Traditional Search Engine Optimization (SEO) on-page optimization show limitations that rely only on knowledge of webpage administrators. Thereby, this paper proposes the metadata generation system. It introduces three approaches for recommending metadata; i) Downloading the metadata which is the top of webpage ii) Generating terms which is high relevance by using bi-directional Long Short Term Memory (LSTM) based on attention; iii) Learning through the Generative Adversarial Network (GAN) to enhance overall performance. It is expected to be useful as an optimizing tool that can be evaluated and improve the online marketing processes.

  • PDF

ILVA: Integrated audit-log analysis tool and its application. (시스템 보안 강화를 위한 로그 분석 도구 ILVA와 실제 적용 사례)

  • 차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.3
    • /
    • pp.13-26
    • /
    • 1999
  • Widespread use of Internet despite numerous positive aspects resulted in increased number of system intrusions and the need for enhanced security mechanisms is urgent. Systematic collection and analysis of log data are essential in intrusion investigation. Unfortunately existing logs are stored in diverse and incompatible format thus making an automated intrusion investigation practically impossible. We examined the types of log data essential in intrusion investigation and implemented a tool to enable systematic collection and efficient analysis of voluminous log data. Our tool based on RBDMS and SQL provides graphical and user-friendly interface. We describe our experience of using the tool in actual intrusion investigation and explain how our tool can be further enhanced.

Initial Blank Optimization Design of Square Can Multistage Drawing considering Formability and Product Shape (사각형 캔 드로잉 다단 공정에서 성형성과 제품형상을 동시에 고려한 초기 블랭크 형상 최적 설계)

  • Park, Sang-Min;Kim, Dong Kyu;Hong, Seokmoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.320-326
    • /
    • 2017
  • Multistage deep-drawing technology is used widely in the production of mobile phone battery cases to improve productivity and economy. To ensure adequate capacity and rigidity, such cases are fabricated as a rectangular cup with a high slender ratio. The multistage deep-drawing of a rectangular cup entails a high slender ratio, and the heights of the product sides may be non-uniform because of the complicated deformation mechanisms. This causes problems in product assembly that affects the surface quality of the case. This study examined a blank shape that minimizes the height variations of the product to resolve the aforementioned problems. Optimization design and analysis were performed to identify the shape that yields the least variation. The long and short sides of an oval blank were set as the design variables. The objective function was set to yield the lowest height difference, and the thickness reduction rate of the product was set to the target range. In addition, the height of the final shape was set as a constraint. The height difference was minimized successfully using the optimized design. The design process of the initial blank for all rectangular shapes can be automated in the future.

An automated memory error detection technique using source code analysis in C programs (C언어 기반 프로그램의 소스코드 분석을 이용한 메모리 접근오류 자동검출 기법)

  • Cho, Dae-Wan;Oh, Seung-Uk;Kim, Hyeon-Soo
    • The KIPS Transactions:PartD
    • /
    • v.14D no.6
    • /
    • pp.675-688
    • /
    • 2007
  • Memory access errors are frequently occurred in C programs. A number of tools and research works have been trying to detect the errors automatically. However, they have one or more of the following problems: inability to detect all memory errors, changing the memory allocation mechanism, incompatibility with libraries, and excessive performance overhead. In this paper, we suggest a new method to solve these problems, and then present a result of comparison to the previous research works through the experiments. Our approach consists of two phases. First is to transform source code at compile time through inserting instrumentation into the source code. And second is to detect memory errors at run time with a bitmap that maintains information about memory allocation. Our approach has improved the error detection abilities against the binary code analysis based ones by using the source code analysis technique, and enhanced performance in terms of both space and time, too. In addition, our approach has no problem with respect to compatibility with shared libraries as well as does not need to modify memory allocation mechanism.

A Study on the Design of Smart Contracts mechanism based on the Blockchain for anti-money laundering (자금 세탁 방지를 위한 블록체인 기반 스마트 컨트랙트 메커니즘 설계)

  • Kang, Heejung;Kim, Hye Ri;Hong, Seng-phil
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.1-11
    • /
    • 2018
  • The Blockchain is a technique that prevents data from being manipulated and guarantees the integrity and reliability of the data by all participants in the network jointly owning and validating the data. Since the Blockchain characterized by security, scalability and transparency, it is used in a variety of fields including logistics, distribution, IoT and healthcare, including remittance. In particular, there is a growing interest in smart contract that can create different forms of contracts and automate implementation based on Blockchain. Smart Contract can be used to pre-programme contracts and are implemented immediately when conditions are met. As a result, digital data can be more reliable. In this paper, we are conducting a study on the smart contract design as a way to solve such problems as illegal misuse of funds on virtual currency, which has become an issue recently. Through this process, we applied the customer identification and money laundering prevention process using smart contract, and then check the possibility of preventing money laundering and propose the ASM (AML SmartContract Mechant) design.

Design and Implementation of Security System Based on Intrusion Tolerance Technology : Focus on Wargame System (침입감내기술 기반의 보안시스템 설계 및 구현 : 워게임체계를 중심으로)

  • Lee, Gang-Tack;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.41-48
    • /
    • 2005
  • Objective of this study is to design and implement security system based on intrusion tolerance technology for the improvement of dependability in defense system. In order to do so, I identify and extract core technologies through the research and analysis into characteristics, structures, main functions, and technologies of intrusion tolerance architecture. And I accomplish a design of security system through the redundant system based on these core technologies. To implement and verify intrusion tolerance system, I chose 'wargame system' as a subjected system, and accomplished 'Wargame Intrusion Tolerance System' and verified security required functions through a performance test. By applying showed security system into the development of application software based on intrusion tolerance, systematic and efficient system could be developed. Also applying 'WITDS' can solve the current security problems, and this will be basic model for design of security architecture in the federation system after.

  • PDF

A Study on the Classification of OVAL Definitions for the Application of SCAP to the Korea Security Evaluation System (국내 보안평가체제에 SCAP을 활용하기 위한 OVAL 정의 분류 연구)

  • Kim, Se-Eun;Park, Hyun-Kyung;Ahn, Hyo-Beom
    • Smart Media Journal
    • /
    • v.11 no.3
    • /
    • pp.54-61
    • /
    • 2022
  • With the increase in the types of information systems managed by public institutions and companies, a security certification system is being implemented in Korea to quickly respond to vulnerabilities that may arise due to insufficient security checks. The korea security evaluation system, such as ISMS-P, performs a systematic security evaluation for each category by dividing the categories for technical inspection items. NIST in the United States has developed SCAP that can create security checklists and automate vulnerability checks, and the security checklists used for SCAP can be written in OVAL. Each manufacturer prepares a security check list and shares it through the SCAP community, but it's difficult to use it in Korea because it is not categorized according to the korea security evaluation system. Therefore, in this paper, we present a mechanism to categorize the OVAL definition, which is an inspection item written in OVAL, to apply SCAP to the korea security evaluation system. It was shown that 189 out of 230 items of the Red Hat 8 STIG file could be applied to the korea security evaluation system, and the statistics of the categorized Redhat definition file could be analyzed to confirm the trend of system vulnerabilities by category.

Design of a Displacement and Velocity Measurement System Based on Environmental Characteristic Analysis of Laser Sensors for Automatic Mooring Devices (레이저 센서의 환경적 특성 분석에 기반한 선박 자동계류장치용 변위 및 속도 측정시스템 설계)

  • Jin-Man Kim;Heon-Hui Kim
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.7
    • /
    • pp.980-991
    • /
    • 2023
  • To prevent accidents near the quay caused by a ship, ports are generally designed and constructed through navigation and berthing safety assessment. However, unpredictable accidents such as ship collisions with the quay or personal accidents caused by ropes still occur sometimes during the ship berthing or mooring process. Automatic mooring systems, which are equipped with an attachment mechanism composed of robotic manipulators and vacuum pads, are designed for rapid and safe mooring of ships. This paper deals with a displacement and velocity measurement system for the automatic mooring device, which is essential for the position and speed control of the vacuum pads. To design a suitable system for an automatic mooring device, we first analyze the sensor's performance and outdoor environmental characteristics. Based on the analysis results, we describe the configuration and design methods of a displacement and velocity measurement system for application in outdoor environments. Additionally, several algorithms for detecting the sensor's state and estimating a ship's velocity are developed. The proposed method is verified through some experiments for displacement and speed measurement targeted at a moving object with constant speed.