• Title/Summary/Keyword: Automated Data Analysis

Search Result 586, Processing Time 0.028 seconds

An Automated Design Technique of Box Culverts for the Railroad (철도암거 자동화 설계)

  • 김진구;이종민;조선규
    • Proceedings of the KSR Conference
    • /
    • 2002.10a
    • /
    • pp.660-665
    • /
    • 2002
  • A concrete box culvert has been widely used as a typical structure in case of crossing the railroad and highway. Due to the simplicity of it's own shape, in company with the development of computers many studies on the computer-aided automatic design have been continuously carried out. In this paper, an automated design algorithm has been proposed by the analysis of the existed design data of box culverts. From a viewpoint of the users, a data base system has been constructed to carry out the total design process completely through the minimum input data and by means of direct input method on the monitor screen. And an automatic design program for railroad box culverts, in which one-stop process from the structural calculation to the quantity estimation is possible, has been developed.

  • PDF

Optimization of Sandwich Structures of a Small Aircraft Wing using Automated Aero- Structure Interaction Systems (자동화된 공력-구조 연계 시스템을 이용한 소형항공기 날개 샌드위치구조 최적설계)

  • Park, Chan Woo;Chu, Jae Myeong;Shul, Chang Won;Jun, Seung Moon
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.30 no.10
    • /
    • pp.1061-1068
    • /
    • 2013
  • In this research, the design optimization of a composite sandwich has been performed for using as an airplane wing skin. Automated analysis framework for aero-structure interaction is used for calculating load data on the wing. For automated analysis framework, FLUENT is used for computational fluid dynamics (CFD) analysis. CFD mesh is generated automatically by using parametric modeling of CATIA and GAMBIT. A computational structure mechanics (CSM) mesh is generated automatically by the parametric method of the CATIA and visual basic script of NASTRAN-FX. The structure is analyzed by ABAQUS. Composite sandwich optimization is performed by NASTRAN SOL200. Design variables are thicknesses of the sandwich core and composite skin panel plies. The objective is to minimize the weight of the wing and constraints are applied for wing tip displacement, global failure index and local failure indexes.

A Study of the DSSAD Data Elements Derivation through Autonomous Driving Data Analysis on Expressways (자동차 전용도로 자율주행 데이터 분석을 통한 DSSAD 기록항목 도출)

  • Seunghwa Hyun;Jinwoo Son;Youngchul Oh;Byungyong You
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.23 no.3
    • /
    • pp.97-106
    • /
    • 2024
  • The Data Storage System for Automated Driving(DSSAD) is a system that records driving information of Lv.4 or higher autonomous vehicles and is different from EDR that records car information in emergency situations. The study of DSSAD recordings is important for responding to various events that may occur in the future commercialization of Lv.4 autonomous vehicles. Therefore, in this study, we conducted a expressway automated driving demonstration and analyzed the collected data to derive the recording elements of DSSAD. During our two-year demonstration of autonomous driving on expressways, we collected and analyzed instances of disengagement. Our findings indicate that 51.6% of disengagement on expressways occurred during lane changes. From the study, we have identified DSSAD record elements for analyzing disengagement situations. Furthermore, implications of future research direction of disengagement analysis were presented.

A Survey and Analysis on Installation and Implementation States and Several operational Conditions for Automated Storage/Retrieval Systems in the Domestic Industry and Organization (입체자동창고시스템에 대한 국내 업계 및 관련기관의 제작/설치 현황 및 운영실태의 분석)

  • Ahn, Byung-Duk;Lim, Joon-Mook;Kim, Dong-Jin;Kim, Jung-Hoon;Nam, Kyung-Hee
    • IE interfaces
    • /
    • v.11 no.1
    • /
    • pp.131-143
    • /
    • 1998
  • Automated Storage/Retrieval Systems(AS/RS) are widely utilized to increase the efficiency of logistics system. In this paper, to offer the basic data required for the standardization and automation of AS/RS, we look into the conditions of several domestic AS/RS manufacturing companies and examine the national and international market conditions and the technical levels of domestic companies. And also, for the domestic companies, government departments and logistics related organizations, we survey and analyze the present state for the installation, implementation and operation of AS/RS and the related equipment systems, and the degree of recognition for the relational aspects.

  • PDF

Hybrid Learning Architectures for Advanced Data Mining:An Application to Binary Classification for Fraud Management (개선된 데이터마이닝을 위한 혼합 학습구조의 제시)

  • Kim, Steven H.;Shin, Sung-Woo
    • Journal of Information Technology Application
    • /
    • v.1
    • /
    • pp.173-211
    • /
    • 1999
  • The task of classification permeates all walks of life, from business and economics to science and public policy. In this context, nonlinear techniques from artificial intelligence have often proven to be more effective than the methods of classical statistics. The objective of knowledge discovery and data mining is to support decision making through the effective use of information. The automated approach to knowledge discovery is especially useful when dealing with large data sets or complex relationships. For many applications, automated software may find subtle patterns which escape the notice of manual analysis, or whose complexity exceeds the cognitive capabilities of humans. This paper explores the utility of a collaborative learning approach involving integrated models in the preprocessing and postprocessing stages. For instance, a genetic algorithm effects feature-weight optimization in a preprocessing module. Moreover, an inductive tree, artificial neural network (ANN), and k-nearest neighbor (kNN) techniques serve as postprocessing modules. More specifically, the postprocessors act as second0order classifiers which determine the best first-order classifier on a case-by-case basis. In addition to the second-order models, a voting scheme is investigated as a simple, but efficient, postprocessing model. The first-order models consist of statistical and machine learning models such as logistic regression (logit), multivariate discriminant analysis (MDA), ANN, and kNN. The genetic algorithm, inductive decision tree, and voting scheme act as kernel modules for collaborative learning. These ideas are explored against the background of a practical application relating to financial fraud management which exemplifies a binary classification problem.

  • PDF

Development of Exit Burr Identification Algorithm on Multiple Feature Workpiece and Multiple Tool Path (복합형상 및 다중경로에 대한 Exit Burr 판별 알고리듬의 개발- 스플라인을 포함한 Exit Burr의 해석 -)

  • Kim, Ji-Hwan;Lee, Jang-Beom;Kim, Young-Jin
    • IE interfaces
    • /
    • v.18 no.3
    • /
    • pp.247-252
    • /
    • 2005
  • In the automated production environment in the present days, the minimization of manual operation becomes a very important factor in increasing the efficiency of the production system. The exit burr produced through the milling operation on the edge of workpiece usually requires manual deburring process to enhance the level of precision of the resulting product. So far, researchers have developed various methods to understand the formation of exit burr in cutting process. One method to analytically identify the formation of exit burr was to use the geometrical information of CAD and CAM data used in automated machining. This method, in turn, generated the information resulting from the analysis such as burr type, cutting region, and exit angle. Up to now, the geometrical data were restricted to the single feature and single path. In this paper, a method to deal with the complicated geometric features such as line segment, arc, hole, and spline will be presented and validated using the field data. This method also deals with the complex workpiece shape which is a combination of multiple features. As for the cutting path, multiple tool path is analyzed in order to simulate the real cutting process. All this analysis is combined into a Windows based software and real data are used to validate the program in the conclusion.

Automated Test Data Generation for Dynamic Branch Coverage (동적 분기 커버리지를 위한 테스트 데이터 자동 생성)

  • Chung, In Sang
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.7
    • /
    • pp.451-460
    • /
    • 2013
  • In order to achieve high test coverage, it is usual to generate test data using various techniques including symbolic execution, data flow analysis or constraints solving. Recently, a technique for automated test data generation that fulfills high coverage effectively without those sophisticated means has been proposed. However, the technique shows its weakness in the generation of test data that leads to high coverage for programs having branch conditions where different memory locations are binded during execution. For certain programs with flag conditions, in particular, high coverage can not be achieved because specific branches are not executed. To address the problem, this paper presents dynamic branch coverage criteria and a test data generation technique based on the notion of dynamic branch. It is shown that the proposed technique compared to the previous approach is more effective by conducting experiments involving programs with flag conditions.

ILVA: Integrated audit-log analysis tool and its application. (시스템 보안 강화를 위한 로그 분석 도구 ILVA와 실제 적용 사례)

  • 차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.3
    • /
    • pp.13-26
    • /
    • 1999
  • Widespread use of Internet despite numerous positive aspects resulted in increased number of system intrusions and the need for enhanced security mechanisms is urgent. Systematic collection and analysis of log data are essential in intrusion investigation. Unfortunately existing logs are stored in diverse and incompatible format thus making an automated intrusion investigation practically impossible. We examined the types of log data essential in intrusion investigation and implemented a tool to enable systematic collection and efficient analysis of voluminous log data. Our tool based on RBDMS and SQL provides graphical and user-friendly interface. We describe our experience of using the tool in actual intrusion investigation and explain how our tool can be further enhanced.

Benefit/Cost Analysis of Robot-based Automated Construction System (로봇 크레인 기반 시공자동화공법의 편익/비용 분석)

  • Kim, Tae-Hoon;Lee, Ung-Kyun;Yoo, Wi-Sung;An, Sung-Hoon;Doh, Nak-ju;Cho, Hun-hee;Kang, Kyung-In
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2011.11a
    • /
    • pp.133-134
    • /
    • 2011
  • While researches related with construction automation have dramatically increased, a Robot-based Automatic Construction system (RCA system) has developed for high-rise buildings in Korea. At the aspect that wide adoption of the RCA system is dependent on economic efficiency comparing with a conventional method, feasibility study on the RCA system should be implemented. However, due to practical limitations, the RCA system has tested to a seven story building. Based on the test results, this study implements a cost/benefits analysis to a simulated forty story building in order to derive more reliable data on the RCA system's practicability.

  • PDF

Automated Methodology for Campus Network Design and Performance Analysis (캠퍼스 네트워크의 구성 및 성능분석 자동화 방법론)

  • 지승도
    • Journal of the Korea Society for Simulation
    • /
    • v.7 no.2
    • /
    • pp.1-16
    • /
    • 1998
  • This paper presents an automated methodology for campus network design and performance analysis using the rule-based SES and DEVS modeling & simulation techniques. Proposed methodology for structural design and performance analysis can be utilized not only in the early stage of network design for selecting configurable candidate from all possible design alternatives, but also in simulation verification for generating performance data. Our approach supercedes conventional methodologies in that, first, it can support the configuration automation by utilizing the knowledge of design expert ; second, it can provide the simulation-based performance evaluation ; third, it is established on the basis of the well-formalized framework so that it can support a hierarchical and modular system design. Several simulation tests performed on a campus network example will illustrate our technique.

  • PDF