• Title/Summary/Keyword: 표준화 절차

Search Result 411, Processing Time 0.026 seconds

Application Status and Prospects of CNC-Based Technologies in Gas Turbine Industry (가스터빈 산업에서의 CNC 기반기술 응용현황 및 전망)

  • Kang, Sin-Ho
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.35 no.3
    • /
    • pp.331-336
    • /
    • 2011
  • The three-dimensional complex curvature of the airfoil complicates the manufacture and repair of gas-turbine components. As a result of the developments in computer technology since the early 1990s, CNC-based technologies for machine tools and related programs have been increasingly applied in the gas turbine industry. In particular, fiveaxis simultaneous machines with adaptive functions have proven its excellent flexibility and productivity due to the capability in determining the 3D data from the unknown curvature. A well-organized robot system with eight-axis simultaneous control can lead to powerful standardization and high productivity. We summarize and review CNC technologies and their applications in the gas turbine industry, with a discussion of the manufacture and repair of gas turbine parts.

A Method for Selecting a Structural Optimal Flood Mitigation Plan Using Analytic Hierarchy Process (계층화분석기법을 통한 구조물적 홍수방어 최적대안 선정 방안 연구)

  • Lee, Jeong-Ho;Jun, Young-Joon;Ahn, Jae-Hyun;Kim, Tae-Woong
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.9 no.3
    • /
    • pp.117-126
    • /
    • 2009
  • Various dimensions of watershed structural/non-structural planning can be applied in comprehensive flood mitigation plan in a river basin. Especially structural counterplans have very broad and diverse nature as flood control facilities. It is not easy to find the optimum alternative to maximize the ability of a basin to reduce flood risk using a combination of structural counterplans. In addition, there is no standard for evaluating the performance of structural counterplans and for selecting optimal combination of them. This study focused on how to select the best alternative of a comprehensive watershed structural plan from various flood defense alternative candidates. By introducing an analytic hierarchy process, we would like to show how we decide the best alternative using standard worksheets developed in this study for economics and policy evaluation, and Expert Choice 11.5, which calculates weights for evaluation items. Based on the results from this study, we would like to suggest the best practice of a standardized watershed plan for flood protection.

Parallel Interworking Model and Performance Analysis of a Connection Control Protocol for Broadband Access Network (광대역 액세스 망을 위한 연결 제어 프로토콜의 병렬형 연동 모델과 성능 분석)

  • Kim, Chun-Hui;Cha, Yeong-Uk;Kim, Jae-Geun;Han, Gi-Jun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.12
    • /
    • pp.1529-1538
    • /
    • 1999
  • 광대역 액세스 망은 B-ISDN 환경에서 다양한 유형의 가입자들을 서비스 노드로 집선하는 기능을 수행한다. ITU-T의 SG13에서는 광대역 액세스 망과 서비스 노드 사이에서 ATM 자원의 동적인 할당 및 해제를 위하여 연결 제어 프로토콜의 표준화를 수행하고 있다. ATM 연결의 설정을 위한 연결 제어 프로토콜과 신호 프로토콜의 연동 기능은 서비스 노드에서 수행되며, ITU-T에서는 순차적 연동 모델을 채택하고 있다. 순차적 연동 모델은 SN에서 각 프로토콜의 절차가 순차적 방식으로 연동되므로 연결 지연이 크다. 본 논문에서는 광대역 액세스 망의 도입으로 인한 연결 설정 지연을 최소화하기 위하여 병렬형으로 수행되는 연동 모델을 제시하였다. 그리고 본 논문에서 제안한 병렬형 연동 모델의 성능 분석을 통하여 순차적 연동 모델과의 연결 설정 지연 및 완료비에 대한 비교, 분석을 수행하였다. 성능 분석에서 사용된 워크로드 파라미터는 RACE MAGIC 프로젝트의 결과를 적용하였다. Abstract In B-ISDN environment, various subscribers are concentrated into a service node via a broadband access network. The SG13 of ITU-T is standardizing a connection control protocol which provides dynamic allocation of ATM resources between an access network and a service node. To establish an ATM connection, interworking functions between the connection control protocol and the signaling protocol are performed at the service node. ITU-T adopts the sequential interworking model. In this paper, we propose the parallel interworking model which minimizes the overall connection setup delay by introducing the access network. Using the performance analysis, we compare our proposed parallel model with the existing sequential model in terms of connection setup delay and completion ratio. The workload parameters of RACE MAGIC project are applied to the analysis and simulation.

A Study on an innovative model of qualification based on NCS within cooperate (NCS 기반 사업 내 자격 혁신모형에 관한 연구)

  • Joo, Kang Seok;Jeong, seon Jeong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.3
    • /
    • pp.553-556
    • /
    • 2018
  • This study proposes a 'NCS-based corporate qualification system for elementary and maintenance tasks manual' applicable to industry in order to establish standards for corporate qualification system which perform education and evaluation for industry-specialized technic, and for corporate qualification system which practice structured training for corporate specialized tasks to reflect the demand of industries' on-site training more precisely, and set up standardized policy and process manuals within various corporations in order to improve credibility and objectivity. Prior research has focused on on-site visits to companies and institutes in Japan that employ corporate qualification systems. Research analyses on current practices, structures and outcomes of qualification systems, online, and 1:1 interviews with administrators responsible for qualification systems, which lead to simulate the qualification system for elementary and maintenance tasks model of NCS and corporate, and establish NCS based corporate qualification for elementary and maintenance system manual, and suggested recommendation to promote this standard manual for use by analyzing current practices.

A Study on the Concept of Social Engineering Cyber Kill Chain for Social Engineering based Cyber Operations (사회공학 사이버작전을 고려한 사회공학 사이버킬체인 개념정립 연구)

  • Shin, Kyuyong;Kim, Kyoung Min;Lee, Jongkwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1247-1258
    • /
    • 2018
  • The Cyber Kill Chain originally proposed by Lockheed Martin defines the standard procedure of general cyber attacks and suggests tailored defensive actions per each step, eventually neutralizing the intent of the attackers. Defenders can effectively deal with Advanced Persistent Threat(APT)s which are difficult to be handled by other defensive mechanisms under the Cyber Kill Chain. Recently, however, social engineering techniques that exploits the vulnerabilities of humans who manage the target systems are prevail rather than the technical attacks directly attacking the target systems themselves. Under the circumstance, the Cyber Kill Chain model should evolve to encompass social engineering attacks for the improved effectiveness. Therefore, this paper aims to establish a definite concept of Cyber Kill Chain for social engineering based cyber attacks, called Social Engineering Cyber Kill Chain, helping future researchers in this literature.

Comparison of the Average Latency Time of Overlay Multicast for Internet Broadcasting Service (인터넷방송 서비스를 위한 오버레이 멀티캐스트 기법의 평균 대기시간 비교)

  • Cho, Hye-Ran;Song, Bok-Sob;Kim, Jeong-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.7
    • /
    • pp.58-65
    • /
    • 2008
  • The overlay multicast that has been recently presented as an alternative for the IP multicast has been getting much attention by the advancement of network techniques to enforce routing in application-levels. In this paper, we verified the efficiency of Internet broadcasting through comparing latency time of TBCP with mOBCP that have distributed Tree-first based spanning-tree structures in overlay multicast techniques. We also propose effective tree structures that minimize latency time and provide competent service by choosing optimum parent nodes early in the base of these two methods over the same time slot in multi-user connection. The results of our comparison showed that average latency time in mOBCP techniques declined by 36% from those of TBCP technique.

Establishment and Standardization of Evaluation Procedure for Urban Flooding Analysis Model Using Available Inundation Data (가용 침수 자료를 활용한 도심지 침수 해석 모형의 평가 절차 수립 및 표준화)

  • Shin, Eun Taek;Jang, Dong Min;Park, Sung Won;Eum, Tae Soo;Song, Chang Geun
    • Journal of the Korean Society of Safety
    • /
    • v.35 no.2
    • /
    • pp.100-110
    • /
    • 2020
  • Recently, the frequency of typhoon and torrential rain due to climate change is increasing. In addition, the upsurge in the complexity of urban sewer network and impervious surfaces area aggravates the inland flooding damage. In response to these worsening situations, the central and local governments are conducting R&D tasks related to predict and mitigate the flood risk. Researches on the analysis of inundation in urban areas have been implemented through various ways, and the common features were to evaluate the accuracy and justification of the model by comparing the model results with the actual inundation data. However, the evaluation procesure using available urban flooding data are not consistent, and if there are no quantitative urban inundation data, verification has to be performed by using press releases, public complaints, or photos of inundation occurring through 'CCTV'. Because theses materials are not quantitative, there is a problem of low reliability. Therefore, this study intends to develop a comparative analysis procedure on the quantitative degree and applicability of the verifiable inundation data, and a systematic framework for the performance assessment of urban flood analysis model was proposed. This would contribute to the standardization of the evaluation and verification procedure for urban flooding modelling.

Design of Vehicle Security Authentication System Using Bluetooth 4.0 Technology (블루투스 4.0 기술을 이용한 차량용 보안인증 시스템 설계)

  • Yu, Hwan-Shin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.325-330
    • /
    • 2017
  • Bluetooth 4.0 is a technology suitable for the Internet of things that is used for communication between various devices. This technology is suitable for developing a service by combining with automobiles. In this study, a security authentication system was designed by linking Bluetooth 4.0 technology and a vehicle system as an implementation example of an object internet service. A procedure was designed for security authentication and an authentication method is proposed using a data server. When the security authentication function is provided, various additional services can be developed using the information collection function of the risk notification and user action history. In addition, BLE (Bluetooth Low Energy) technology, which is a wireless communication technology that enables low-power communication and low-power communication in the process of the standardization and development of Bluetooth technology and technology, improves the battery life through the use of RFID or NFC This study expanded the range possible. The security service can be extended by expanding the scope of authentication by the contactless type. Using the proposed system, a customized service can be provided while overcoming the problems of an existing radio frequency (RF)-based system, portability, and battery usage problem.

A Study on the Acquisition of Usage Statistics based on SUSHI Project (SUSHI 기반 학술정보 이용통계 수집 모델 연구)

  • Kim, Sun-Tae;Lim, seok-Jong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.35-39
    • /
    • 2007
  • Recently Usage statistics are widely available from online content providers. However. the statistics are not yet available in a consistent data container and the administrative cost of individual provider-by-provider downloads is high. The Standardized Usage Statistics Harvesting Initiative (SUSHI) is developing an automated request and response protocol for moving Project COUNTER (Counting Online Usage of Networked Electronic Resources) Code of Practice usage statistics from providers to library electronic repositories. SUSHI will help libraries make better decisions by reducing the administrative overhead of using Project COUNTER statistics. Publishers in the recording and exchange of usage statistics for electronic resources, initially journals and databases. By following COUNTER's Code of Practice, vendors can provide library customers with Excel or CSV (comma delimited) files of usage data using COUNTER's standardized formats and data elements. The result is a consistent, credible, and compatible set of usage data from multiple content providers. On this study, We propose the acquisition model of usage data based on SUSHI for KESLI that is overseas electronic journal consortium in korea.

  • PDF

Design and Implementation of Web-Based MINI-PACS using the DICOM (DICOM을 이용한 웹 기반 MINI-PACS 설계 및 구현)

  • 지연상;이성주
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.5
    • /
    • pp.1095-1104
    • /
    • 2000
  • In recent years, medical procedures have become more complex, while financial pressures for shortened hospital stays and increased efficiency in patient care have increased. As a result, several shortcomings of present film-based systems for managing medical images have become apparent. Maintaining film space is labor intensive and consumes valuable space. Because only single copies of radiological examinations exist, they are prone to being lost or misplaced, thereby consuming additional valuable time and expense. In this paper, mini-PACS for image archiving, transmission, and viewing offers a solution to these problems. Proposed mini-PACS consists of mainly four parts such as web module, client-server module, internal module, acquisition module. In addition, mini-PACS system includes DICOM converter that non-DICOM file format converts standard file format. In client-server module case, proposed system is combined both SCU (service class user: client) part and SCP(service class provider: sewer)part therefore this system provides the high resolution image processing techniques based on windows platform. Because general PACS system is too expensive for medium and small hospitals to install and operate the full-PACS. Also, we constructed web module for database connection through the WWW.

  • PDF