• Title/Summary/Keyword: Acquisition Procedure

Search Result 215, Processing Time 0.025 seconds

Study on Identification Procedure for Unidentified Underwater Targets Using Small ROV Based on IDEF Method (소형 ROV를 이용한 IDEF0 기반의 수중 미확인 물체 식별절차에 관한 연구)

  • Baek, Hyuk;Jun, Bong-Huan;Yoon, Suk-Min;Noh, Myounggyu
    • Journal of Ocean Engineering and Technology
    • /
    • v.33 no.3
    • /
    • pp.289-299
    • /
    • 2019
  • Various sizes of ROVs are being utilized in offshore industrial, scientific, and military applications all around the world. Because of innovative developments in science and technology, image acquisition devices such as sonar devices and cameras have been reduced in size and their performance has been improved. Thus, we can expect better accuracy and higher resolution even in the case of exploration using a small ROV. The purpose of this paper is to prepare a standard procedure for the identification of unidentified hazardous materials found during the National Oceanographic Survey. In this paper, we propose an IDEF (Integrated DEFinition) method modeling technique to identify unidentified targets using a small ROV. In accordance with the proposed procedure, an ROV survey was carried out on target No.16 with a four-ton-class fishing boat as a support vessel on September 18th of 2018 in the sea near Daebu Island. Unidentified targets, which were not known by the multi-beam data obtained from the ship, could be identified as concrete pipes by analyzing the HD camera and high-resolution sonar images acquired by the ROV. The whole proposed procedure could be verified, and the survey with the small ROV required about 10 days to identify the target in one place.

A Study on Requirement Management of Naval Surface Ships by Using QFD (QFD를 활용한 함정 요구조건 관리 방안 연구)

  • Jeong, Yeon Hwan
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.15 no.2
    • /
    • pp.57-65
    • /
    • 2019
  • The weapon system applies the rule that the system engineering procedure must be applied at the acquisition stage. Naval ships, which are one of the important naval weapon systems, take a long period of time to acquire, and the leadership must be commissioned. Therefore, in order to acquire a naval ship, high risk management is necessary, and it is necessary to promote business success through effective application of system engineering which is a scientific management method. However, in the case of naval ships, there are no specific procedures and methods for applying the system engineering. Therefore, research on application method of system engineering which can be easily used by person in charge is necessary. This should have a simple approach to ensure effective business performance by systematically refining and simplifying existing works. QFD (Quality Function Deployment) is a way to improve product satisfaction, impress customers, reduce defective products, reduce design errors, and reduce costs. This systematically develops these mutual relationships by converting the needs of customers into quality characteristics of products and defining them as the design quality of products considering the functions, quality, and process elements of parts. The purpose of this research is to present concrete methodology at the practical level using QFD in a way to ensure traceability of requirements which is an important element of system engineering.

A Study on Knowledge Map Development Methodology Focused on Knowledge Acquisition (Knowledge 추출을 중심으로 한 Knowledge Map 작성 방법론에 관한 연구)

  • Yeon, Sung-Il;Suh, Eui-Ho;Kim, Su-Yeon
    • IE interfaces
    • /
    • v.13 no.1
    • /
    • pp.37-43
    • /
    • 2000
  • With the rapid changes of business environments and the tremendous amount of information generated from those environments, most companies must learn to manage those changes and information more effectively. Furthermore, within those amounts of information, the information that meets with achieving the goal of each company should be selected and managed as a core competency, i.e. the knowledge, visible and invisible assets of the company. Knowledge management, as a tool of creating, sharing, and applying such knowledge, has pursued those requirements of companies and been studied by many researchers and consultants, especially focusing on the Knowledge Map'. It is said that a knowledge map is a powerful tool for scanning and managing the knowledge that exists in a company and that it is the most important part of establishing a knowledge management base. Until now, however, there have been no specific or practical models for establishing a knowledge map, in spite of the concern. For this reason, this paper suggests a practical model for establishing a knowledge map in terms of a knowledge acquisition procedure based on the traditional research concerning concept maps. In addition to this, for examining the validity of the model, a case study on the 'P' steel and iron company has been performed. This paper's methodology on developing a knowledge map and the procedures to apply them to the real business environment will suggest a cornerstone in the field of practical implementation of knowledge management.

  • PDF

Analysis of the acceleration of KHST prototype on the high speed test line (한국형 고속전철의 진동가속도 시험 연구)

  • Park Chankyounn;Kim Youngguk;Kim Seogwon
    • Proceedings of the KSR Conference
    • /
    • 2003.05a
    • /
    • pp.567-573
    • /
    • 2003
  • Korean High Speed Train (KHST) has been tested on high speed line in JungBu site since it was developed in 2002. The data acquisition system was developed to accomplish successfully this on-line test for proving the dynamic Performance of KHST. This system was consist of the personal computers based on National Instrument PXI modules and the test programs based on Labview 6i. This paper shows that this system is efficient to acquire the test data through the multi-channels connected the accelerometers which located in long distance places and flexible to change and add channels for data acquisition. The dynamic analysis of an on-line test is very complicate because the environmental conditions, as examples radius of curve, inclination of the track, tunnels, bridges, and so forth, and running conditions, as examples driving, braking, the number of working motors, and so forth, have an effect on the results. Therefor, the analysis method is important and this paper proposes the efficient procedure graphically, showing the proposed method simplify the accelerations of 5th bogie frame acquired during the on-line test for KHST.

  • PDF

Real-Time Power Electronics Remote Wiring and Measurement Laboratory (PermLAB) Using 3-D Matrix Switching Algorithms

  • Asumadu, Johnson A.;Tanner, Ralph;Ogunley, Hakeem
    • Journal of Power Electronics
    • /
    • v.10 no.6
    • /
    • pp.611-620
    • /
    • 2010
  • This paper presents a new architecture, called "Power Electronics Remote Wiring and Measurement Laboratory (PermLAB)", that translates a common gateway interface (CGI) string from a remote web user to a web server connected to a 3-dimension switching matrix board, can be used to switch on and off, and to control a cluster of instruments and components. PermLAB addresses real-time connection, switching, and data acquisition over the Internet instead of using simulated data. A software procedure uses a signature system to identify each instrument and component in a complex system. The Web-server application is developed in HTML, JavaScript and Java, and in C language for the CGI interface, which resides in a controller portion of LabVIEW. The LabVIEW software fully integrates the Web sever, LabVIEW data acquisition boards and controllers, and the 3-dimensional switching matrix board. The paper will analyze a half-wave rectifier (AC - DC converter) circuit connected over the Internet using the PermLAB. PermLAB allows students to obtain real data by real-time wiring of real circuits in the laboratory using a "virtual breadboard" on the Web. The software for the Web-based 3-dimensional system is flexible, portable, can be integrated into many laboratory applications or expanded, and easily accessible worldwide.

Design and control performance validation of HILS system based on MATLAB/Simulink (MATLAB/Simulink기반 HILS 환경 구축 및 제어 성능 검증)

  • Min-Woo Ham;Insu Paek
    • Journal of Wind Energy
    • /
    • v.15 no.1
    • /
    • pp.60-68
    • /
    • 2024
  • In this study, a hardware-in-the-loop simulation (HILS) environment was established using MATLAB/Simulink to simulate and verify the power performance of a wind turbine. The target wind turbine was selected as the NREL 5 MW model, and modeling was performed based on the disclosed specifications. The HILS environment consists of a PC equipped with a MATLAB/Simulink program, a programmable logic controller (PLC) for uploading and linking control algorithms, and data acquisition (DAQ) equipment to manage wind turbine data input and output. The operation of the HILS environment was carried out as a procedure of operation (PC) of the target wind turbine modeled based on MATLAB/Simulink, data acquisition (PLC) of control algorithms, control command calculation (PLC), and control command input (PC). The simulation was performed using the HILS environment under turbulent wind conditions and compared with the simulation results performed under the same conditions in the HILS environment using the commercial program Bladed for performance verification. From the comparison, it was found that the dynamic simulation results of the Bladed HILS and the MATLAB HILS were close in power performances and the errors in the average values of rotor rotation speed and power generation between the two simulations were about 0.44 % and 3.3 %, respectively.

An Analysis of Policies on the Acquisition of Private Records at State/Provincial Archives in the U. S., Canada, and Australia (미국, 캐나다, 호주 주립기록관의 민간기록물 수집정책 분석)

  • Kim, Jihyun
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.14 no.3
    • /
    • pp.105-126
    • /
    • 2014
  • This study analyzed policies and guides related to the acquisition of private records at state/provincial archives in the U.S., Canada, and Australia. The purpose of this study is to examine the current status of collecting private records in the governmental archives. The analysis was made based on policies and guides from 14 state/provincial archives, including five in the US, seven in Canada, and two in Australia. From the analysis, the study examined collection areas, types of private records, and colleting methods, such as donation or deposit. It also studied the considerations on transferring copyright, placing access restrictions, and disposing of records. The study made the following suggestions for collecting private records at public archives in Korea: (1) define the collecting areas of private records relevant to the characteristics of a region; (2) determine the acquisition methods, including donation or deposit, and establish a procedure to make an agreement for the transfer of ownership, including copyright, access restriction, and disposal of records; (3) develop cooperation among the related institutions within a region.

Analysis on ISMS Certification and Organizational Characteristics based on Information Security Disclosure Data (정보보호 공시 데이터를 이용한 정보보호 관리체계 인증과 조직의 특성 분석)

  • SunJoo Kim;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.205-231
    • /
    • 2023
  • The Information Security Management System (ISMS) is a protection procedure and process that keeps information assets confidential, flawless, and available at any time. ISMS-P in Korea and ISO/IEC 27001 overseas are the most representative ISMS certification systems. In this paper, in order to understand the relationship between ISMS certification and organizational characteristics, data were collected from Korea Internet & Security Agency (KISA), Ministry of Science and ICT, Information Security Disclosure System (ISDS), Financial Supervisory Service, Data Analysis, Retrieval and Transfer System (DART), and probit regression analysis was performed. In the probit analysis, the relationship with four independent variables was confirmed for three cases: ISMS-P acquisition, ISO/IEC 27001 acquisition, and both ISMS-P and ISO/IEC 27001 acquisition. As a result of the analysis, it was found that companies that acquired both ISMS-P and ISO/IEC 27001 had a positive correlation with the total number of employees and a negative correlation with business history. In addition, the improvement direction of the ISMS-P certification system and information security disclosure system could also be confirmed.

Union and Division using Technique in Fingerprint Recognition Identification System

  • Park, Byung-Jun;Park, Jong-Min;Lee, Jung-Oh
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.2
    • /
    • pp.140-143
    • /
    • 2007
  • Fingerprint Recognition System is made up of Off-line treatment and On-line treatment; the one is registering all the information of there trieving features which are retrieved in the digitalized fingerprint getting out of the analog fingerprint through the fingerprint acquisition device and the other is the treatment making the decision whether the users are approved to be accessed to the system or not with matching them with the fingerprint features which are retrieved and database from the input fingerprint when the users are approaching the system to use. In matching between On-line and Off-line treatment, the most important thing is which features we are going to use as the standard. Therefore, we have been using "Delta" and "Core" as this standard until now, but there might have been some deficits not to exist in every person when we set them up as the standards. In order to handle the users who do not have those features, we are still using the matching method which enables us to make up of the spanning tree or the triangulation with the relations of the spanned feature. However, there are some overheads of the time on these methods and it is not sure whether they make the correct matching or not. In this paper, introduces a new data structure, called Union and Division, representing binary fingerprint image. Minutiae detecting procedure using Union and Division takes, on the average, 32% of the consuming time taken by a minutiae detecting procedure without using Union and Division.

A Knowledge-based Question-Answering System: With A View To Constructing A Fact Database (지식기반 (Knowledge-based) 질의응답시스템: 사실 자료 (Faet Database)구축을 중심으로)

  • 신효필
    • Korean Journal of Cognitive Science
    • /
    • v.13 no.1
    • /
    • pp.41-51
    • /
    • 2002
  • In this paper, I describe a knowledge-based question-answering system and significance of the system with a view to constructing a fact database. The knowledge-based system takes advantage of existing NLP-resources such as conceptual structures of ontologies along with morphotogical, syntactic and semantic analysis. The use of conceptual structures allows us to select right answers through inferences basically made by expansions of concepts. However, the work of constructing factual knowledge requires a great amount of acquisition time in large-scale applications because of the nature of human interference. This is why the procedure of acquiring factual knowledge cannot be fully automated. Apart from efficiency considerations. the knowledge-based system deserves serious consideration, I point out benefits of the system and describe the whole procedure of building the system in terms of a fact database.

  • PDF