• Title/Summary/Keyword: 패스트 시스템

Search Result 55, Processing Time 0.019 seconds

Prediction of Lift Performance of Automotive Glass Using Finite Element Analysis (유한요소해석을 통한 자동차용 글라스의 승강성능 예측)

  • Moon, Hyung-Il;Kim, Heon-Young;Choi, Cheon;Lee, In-Heok;Kim, Do-Hyung
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.34 no.11
    • /
    • pp.1749-1755
    • /
    • 2010
  • The performance of power window system was decided by driving characteristics of the window regulator part and reaction by the glass run. The performance of power window system usually has been predicted by experimental methods. In this paper, an analytical method using the explicit code was suggested to overcome the limit of the experimental methods. The friction coefficient of glass run was obtained by the friction test at various conditions and the Mooney-Rivlin model was used. Also, a mechanism of window regulator consisted of the fast belt system and the slip ring elements. And, we conducted the analysis considering characteristic of a motor and obtained the lifting speed of automotive glass with high reliability

The Effect of Customer's Attribution Tendency Toward Self-Service Technology on the Intention to Revisit Fast-Food Restaurants in the COVID-19 Situation: Focused on Shadow Work Perspective (코로나 19 상황에서 고객의 셀프서비스기술에 대한 귀인 경향이 패스트푸드점 재방문의도에 미치는 영향: 그림자노동의 관점을 중심으로)

  • Kim, Hyun Kyu;Chung, Nam Ho;Poe, Baek
    • The Journal of Information Systems
    • /
    • v.31 no.3
    • /
    • pp.109-129
    • /
    • 2022
  • Purpose The purpose of this study is to examine whether customers' shadow work and risk perception have an impact on revisit intention to the fast-food restaurant, with mediating role of different types of attribution tendencies. We also added perceived unfairness in the research model, in order to verify its mediating effect on the relationship between attribution tendencies and revisit intention. Design/methodology/approach Applying the shadow work perspective and attribution theory, we designed a research model to confirm the hypotheses. After collecting the data from 331 customers who have used self-service technology in a fast-food restaurant, we conducted an analysis of measurement model and structural model by using Smart-PLS 3.0. Findings This study confirmed that Forced Use of self-service technology can enhance the tendency of dispositional attribution which would negatively affect perceived unfairness and revisit intention. On the other hand, affective risk perception was proven to affect situational attribution, which positively affects revisit intention.

Design of the Copyright Protection for ePub e-Book System using Certification Information (인증 정보를 이용한 전자책 ePub의 저작권 보호 시스템 설계)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.9
    • /
    • pp.2197-2204
    • /
    • 2015
  • In recent times, the high-tech society has become the most important issue by IT technology and publication network. Today such flows have also been the case in the e-book field. Today's electronic publication is changing day by day. But there are some problems according to the prevalence of e-book. E-book is similar to p-book(paper-book). There is a limit to have perfect feeling of a texture of p-book. In order to purchase an e-book, people use online. People having malicious intent could copy and distribute it illegally. It leads to cyber abuses. This paper aims at the copyright protection of e-book ePub writers. The proposed e-book copyright protection system is designed using e-book production Sigil environment and C program environment. This system uses client-server communication through e-book ePub as authentication information. It discerns whether to permit or not for a client to read the e-book using authentication information. Authentication information includes ID, password, IP address, limited time of authentication information, GUID(Globally Unique Identifier). If authentication information about e-book meets requirements, people can use it. But if not, it blocks people's approach by quitting program.

User Authentication Scheme based on Security-enhanced Biometric Information for C/S System (C/S 시스템에 적합한 보안성이 강화된 생체정보 기반의 사용자 인증 스킴)

  • Yang, Hyung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.43-53
    • /
    • 2015
  • Password-based authentication schemes for server-client system are convenient to use, but vulnerable to dictionary attack or brute-force attack. To solve this vulnerability, Cryptographic secret key is used for security, but difficult to memorize. So, for the first time, Das proposed a biometric-based authentication scheme to solve various problems but it has various vulnerabilities. Afterwards, Jiping et al. improved Das's scheme, but some vulnerabilities remain. In this paper, we analyze the cryptanalysis of Jiping et al.'s authentication scheme and then propose improved biometric based user authentication scheme to resolve the analyzed problem. Moreover, we conduct a security analysis for the proposed scheme and make a comparison between the proposed scheme and other biometric based user authentications.

Design and Implementation of Order Settlement System Using Artificial Intelligence Speaker (인공지능 스피커를 활용한 주문결제 시스템의 설계 및 구현)

  • Kim, Dong-Hyun;Choi, Byung-Hyun;Ban, Chae-Hoon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1181-1186
    • /
    • 2019
  • Recently, we have been able to quickly order and pay with kiosks even at fast food restaurants, small private restaurants and cafes. However, people with disabilities who are uncomfortable with their arms and who are sitting in wheelchairs are difficult to use by pressing graphical buttons to use kiosks. Older people also feel uncomfortable to use kiosks because of their cognitive abilities to accept new information as they get older. In this paper, to solve this problem, we design and implement a order-payment system to add the voice command element of the AI speaker to the visual command element when the user interacts with the kiosk.

Extraction of System-Wide Sybil-Resistant Trust Value embedded in Online Social Network Graph (온라인 소셜 네트워크 그래프에 내포된 시스템-차원 시빌-저항 신뢰도 추출)

  • Kim, Kyungbaek
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.533-540
    • /
    • 2013
  • Anonymity is the one of main reasons for substantial improvement of Internet. It encourages various users to express their opinion freely and helps Internet based distributed systems vitalize. But, anonymity can cause unexpected threats because personal information of an online user is hidden. Especially, distributed systems are threatened by Sybil attack, where one malicious user creates and manages multiple fake online identities. To prevent Sybil attack, the traditional solutions include increasing the complexity of identity generation and mapping online identities to real-world identities. But, even though the high complexity of identity generation increases the generation cost of Sybil identities, eventually they are generated and there is no further way to suppress their activity. Also, the mapping between online identities and real identities may cause high possibility of losing anonymity. Recently, some methods using online social network to prevent Sybil attack are researched. In this paper, a new method is proposed for extracting a user's system-wide Sybil-resistant trust value by using the properties embedded in online social network graphs. The proposed method can be categorized into 3 types based on sampling and decision strategies. By using graphs sampled from Facebook, the performance of the 3 types of the proposed method is evaluated. Moreover, the impact of Sybil attack on nodes with different characteristics is evaluated in order to understand the behavior of Sybil attack.

An Efficient Hand-off Mechanism in Micro-Domain (마이크로 도메인에서의 효율적인 핸드오프 방안)

  • Kim Eung do;Kim Hwa sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.3A
    • /
    • pp.195-202
    • /
    • 2005
  • The third generation cellular system requires the seamless macro/micro mobility support. Mobile IP provides a simple and scalable macro mobility solution but lacks the support for fast handoff control in micro-domain. However, A lot of micro-mobility protocols have been proposed to complement the Mobile IP capability by providing the fast, seamless, and local handoff control. Cellular If also provides the seamless mobility support in limited geographical area. But semi-soft handoff mechanism of Cellular IP produces the packet loss and the duplication problem due to the difference of propagation delay between the new path and the old path. In this paper, we present an efficient handoff mechanism in micro-domain. The proposed handoff mechanism uses the SCD (Suitable Cross Delay) in order to minimize the packet loss and the duplication problem during the handoff. Also, the proposed mechanism is verified by the performance evaluation through the NS-2 Simulation.

Wearing Performance of Garment for Emotional Knitted Fabrics Made of PTT/Tencel/Cotton MVS Blended Yarns (II) (PTT/Tencel/Cotton 친환경 MVS 혼방사 편성물의 물성에 관한 연구 (II))

  • Kim, Hyun Ah
    • Fashion & Textile Research Journal
    • /
    • v.17 no.6
    • /
    • pp.1020-1029
    • /
    • 2015
  • This paper investigated the wearing performance of knitted fabrics made of air vortex yarns using PTT/tencel/cotton fibres in comparison with ring and compact yarns for emotional garment. Wicking property of knitted fabric made of MVS yarns was worse than those by ring and compact yarns, however, drying property of knitted fabric made of MVS yarns was better than those by ring and compact yarns, which was explained as more water vapor transport due to larger openness between fibres in the MVS yarns than those in the ring and compact yarns. Thermal conductivity of knitted fabric made of MVS was lower than those of ring and compact yarns and maximum heat flow(Qmax) at the transient state of MVS knitted fabric was lower than those of ring and compact yarns, which may be attributed to MVS yarn structure that has parallel fibres in the core part of the yarn and fasciated fibre bundles on the sheath part with roughness on the yarn surface. However, pilling of MVS knitted fabric was better than those by ring and compact yarns, which was caused by less and shorter hairy fibres protruded from MVS yarn surface than those of ring and compact yarns. It was observed that tactile hand of MVS yarn knitted fabrics was stiffer than those of ring and compact yarns knitted fabrics. It was explained by low extensibility and compressibility and high bending and shear rigidities of the MVS yarn knitted fabrics, which resulted in bad wearing performance of MVS knitted fabric.

Development of Robot Simulator for Palletizing Operation Management S/W and Fast Algorithm for 'PLP' (PLP 를 위한 Fast Algorithm 과 팔레타이징 작업 제어 S/W 를 위한 로봇 시뮬레이터 개발)

  • Lim, Sung-Jin;Kang, Maing-Kyu;Han, Chang-Soo;Song, Young-Hoon;Kim, Sung-Rak;Han, Jeong-Su;Yu, Seung-Nam
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.31 no.5
    • /
    • pp.609-616
    • /
    • 2007
  • Palletizing is necessary to promote the efficiency of storage and shipping tasks. These are, however some of the most monotonous, heavy and laborious tasks in the factory. Therefore many types of robot palletizing systems have been developed, but many robot motion commands still depend on the teaching pendent. That is, an operator inputs the motion command lines one by one. It is very troublesome, and most of all, the user must know how to type the code. That is why we propose a new GUI (Graphic User Interface) Palletizing System. To cope with this issue, we proposed a 'PLP' (Pallet Loading Problem) algorithm, Fast Algorithm and realize 3D auto-patterning visualization interface. Finally, we propose the robot palletizing simulator. Internally, the schematic of this simulator is as follows. First, an user inputs the physical information of object. Second, simulator calculates the optimal pattern for the object and visualizes the result. Finally, the calculated position data of object is passed to the robot simulator. To develop the robot simulator, we use an articulated robot, and analyze the kinematics and dynamics. Especially, All problem including thousands of boxes were completely calculated in less than 1 second and resulted in optimal solutions by the Fast Algorithm.

Parallel lProcessing of Pre-conditioned Navier-Stokes Code on the Myrinet and Fast-Ethernet PC Cluster (Myrinet과 Fast-Ethernet PC Cluster에서 예조건화 Navier-Stokes코드의 병렬처리)

  • Lee, G.S.;Kim, M.H.;Choi, J.Y.;Kim, K.S.;Kim, S.L.;Jeung, I.S.
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.30 no.6
    • /
    • pp.21-30
    • /
    • 2002
  • A preconditioned Navier-Stokes code was parallelized by the domain decomposition technique, and the accuracy of the parallelized code was verified through a comparison with the result of a sequential code and experimental data. Parallel performance of the code was examined on a Myrinet based PC-cluster and a Fast-Ethernet system. Speed-up ratio was examined as a major performance parameter depending on the number of processor and the network communication topology. In this test, Myrinet system shows a superior parallel performance to the Fast-Ethernet system as was expected. A test for the dependency on problem size also shows that network communication speed in a crucial factor for parallel performance, and the Myrinet based PC-cluster is a plausible candidate for high performance parallel computing system.