• Title/Summary/Keyword: Automated analysis system

Search Result 858, Processing Time 0.025 seconds

Dynamic Analysis of ATM Double Bill Detector (ATM기 2매 검지부의 동적 해석)

  • Jeong, Joong-Ki;Suh, Jun-Ho;Baek, Yoon-Kil;Choi, Yeon-Sun
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.16 no.12 s.117
    • /
    • pp.1208-1214
    • /
    • 2006
  • ATM(automated-teller machine) is a machine that receives and pays money directly. The double bill detector(DBD) module of an ATM detects double bills from its thickness. In this paper, the dynamic behavior of the DBD was analyzed, which cannot be simulated correctly by a package program of SAMCEF. And the displacements of the lever was measured for various bills experimentally. The measured dynamic behaviors were analyzed kinematically using a vector equation and simulated dynamically by the derivation of equation of motion with consideration of damping and stiffness of the DBD and bills. The analysis showed that the spring constant of the system is not so influential, instead, the contact angle between the lever and bill needs to be larger than the existing DBD in order to be laster and reliable DBD.

Sharing Information for Event Analysis over the Wide Internet

  • Nagao, Masahiro;Koide, Kazuhide;Satoh, Akihiro;Keeni, Glenn Mansfield;Shiratori, Norio
    • Journal of Communications and Networks
    • /
    • v.12 no.4
    • /
    • pp.382-394
    • /
    • 2010
  • Cross-domain event information sharing is a topic of great interest in the area of event based network management. In this work we use data sets which represent actual attacks in the operational Internet. We analyze the data sets to understand the dynamics of the attacks and then go onto show the effectiveness of sharing incident related information to contain these attacks. We describe universal data acquisition system for event based management (UniDAS), a novel system for secure and automated cross-domain event information sharing. The system uses a generic, structured data format based on a standardized incident object description and exchange format (IODEF). IODEF is an XML-based extensible data format for security incident information exchange. We propose a simple and effective security model for IODEF and apply it to the secure and automated generic event information sharing system UniDAS. We present the system we have developed and evaluate its effectiveness.

A study on the measurement method of raw laver weight using load cell (로드셀을 이용한 생김 중량측정 방법에 관한 연구)

  • Eun-Bi MIN;Tae-Jong KANG;Eun-A YOON;Ok-Sam KIM;Doo-Jin HWANG
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.59 no.3
    • /
    • pp.215-220
    • /
    • 2023
  • This study developed and evaluated a load cell-based automatic weighing system for the automated harvesting of laver (Porphyra tenera) in seaweed aquaculture. The current manual harvesting process was compared with the load cell-based automated system, and quantitative measurements of time, distance, and weight were conducted. The results demonstrated that the load cell-based system reduced the unloading time and increased the throughput compared to the manual method. In addition, statistical analysis confirmed that there was no significant difference from the mean in the weight measurement obtained using the load cell-based system. Based on these findings, the load cell-based automatic weighing system holds potential for efficient production and transactions in laver cultivation, contributing to cost reduction and improving the quality of life for aquaculture workers.

Simulation-based Design Validation and Alternatives Analysis of Release Process of Logistics Automation Warehouse (시뮬레이션을 활용한 물류 자동화 창고의 출고 프로세스 설계 검증 및 대안 분석)

  • Moon-Gi Jeong;JongPil Kim;JinSung Park;Kyung-Min Seo
    • Journal of the Korea Society for Simulation
    • /
    • v.32 no.3
    • /
    • pp.75-91
    • /
    • 2023
  • As the business-to-customer (B2C) online market expands after the COVID-19 pandemic, the logistics industry has been constructing automated warehouses to handle multi-product, low-volume logistics. When constructing a logistics automation warehouse, it is crucial to validate that the facility's performance and operational logic are designed to meet the required throughput of the automated warehouse from the system design phase. This study proposes simulation-based validation and optimal alternatives for an H logistics automation warehouse in Iksan, Jeollabuk-do. Firstly, we focused on the box supply and packing processes, which are related to the release process, among the entire logistic processes. Then, we analyzed the potential bottlenecks in the target process and designed and implemented a discrete-event simulation model based on the analysis results. The simulation experiments showed that the facility parameters and operational logic identified in the system design phase did not satisfy the performance requirements of the entire automated warehouse. Additional experiments were conducted to suggest alternatives to meet the system performance requirements by changing the facility parameters and operational logic. We expect that the proposed study will be utilized in the future, not only in the system design phase but also in the system construction phase, for verification purposes to ensure that the construction proceeds according to the design.

The Usage Intention of Combined Guard System - Focusing on GOP Scientific Guard System - (통합경계시스템의 이용의도에 미치는 영향 요인 분석 - 한국군 GOP 과학화 경계시스템을 중심으로 -)

  • Jang, Jin-Hyuk;Moon, Hee-Jin;Lee, Choong-J.
    • The Journal of Information Systems
    • /
    • v.19 no.4
    • /
    • pp.183-206
    • /
    • 2010
  • The technology acceptance model (TAM) is a lot of cited in information technology adoption and usage researches. But TAM has been conducted primarily in volitional environments of the adoption of new technology. This paper discusses technology acceptance in accounting information systems to examine TAM with Characteristics of Organizations and Individuals in mandated using Combined Guard System. Combined Guard System is a scientific guard system that is composed of automated surveillance system, automated sensing system and control system. GOP Scientific Guard System is operated by GOP unit in Korean Army O Division from 2006. In this study, using the extended technology acceptance model, we have analyzed factors which affect the usage intention of GOP Scientific Guard System in mandated using environment. Based upon previous researches, we have selected Support of management unit, Training, Perceived Risk, Subjective Knowledge and Computer Self-efficacy, perceived usefulness, perceived ease of use, and usage intention as variables and proposed a research model. We collected 253 survey questionnaires from Korean army officer and soldier who are serviced at GOP unit in O Division, and analyzed the data using SPSS 12.0 and SmartPLS 2.0M3. According to the results by PLS analysis, According to the results by PLS analysis, Training and Subjective Knowledge did not affect Perceived usefulness, but the other hypotheses were accepted. And Perceived usefulness, and Ease of use influenced the Usage intention. The results of this study will increase Characteristics of Organizations and Individuals on GOP Scientific Guard System and eventually contribute to establishing the activation of Combined Guard System.

Implementation of Automatic Tool for S/W Change Impact Analysis in Railway System (철도시스템 소프트웨어 변경영향 분석을 위한 자동화 도구 개발)

  • Jo, Hyun-Jeong;Hwang, Jong-Gyu;Kim, Yong-Kyu
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.58 no.2
    • /
    • pp.95-100
    • /
    • 2009
  • Recent advances in computer technology have brought more dependence on software to railway systems. Hence, the safety assurance of the vital software running on the railway system is very critical task and yet, not many works have been done. While much efforts have been reported to improve electronic hardware's safety, not so much systematic approaches to evaluate software's safety. In this paper, we suggested an automated analysis tool for S/W change impact in railway system, and presented its result of implementation. The analysis items in the implemented tool had referred to the international standards in relation to the software for railway system, such as IEC 61508 and IEC 62279. In these international standards, 'change impact analysis' for railway system S/W has to be required mandatorily. The proposed tool can be utilized at the assessment stage and also the software development stage.

Design and Implementation of GIS Based Automatic Terrain Analysis System for Field Operation

  • Kim, Kyoung-Ok;Yang, Young-Kyu;Lee, Jong-Hoon;Choi, Kyoung-Ho;Jung, In-Sook;Kim, Tae-Kyun
    • Korean Journal of Remote Sensing
    • /
    • v.10 no.2
    • /
    • pp.121-132
    • /
    • 1994
  • A GIS based tactical terrain analysis system named ATTAS(Army Tactical Terrain Analysis Software) has been designed and implemented to support the field commanders for enhancing the capabiliy of their unit and efficiency of weapon system. This system is designed to provide computer graphics environment in which the analyst can interactively operate the entire analyzing process such as selecting the area of interest, performing analysis functions, simulating required battlefield operation and display the results. This system can be divided into three major sections; the terrain analysis modules, utilites, and graphic editor. The terrain analysis module inclused surface analysis, line of sight analysis, enemy disposition, 3D display, radar coverage, logistic route analysis, shortest path analysis, atmospheric phenomena prediction, automated IPB (Inteligence preparation of Battlefield), and other applied analysis. A combination of 2D and 3D computer graphics techniques using the X-window system with OSF/Motif in UNIX workstation was adopted as the user interface. The integration technique of remotely sensed images and GIS data such as precision registration, overlay, and on-line editing was developed and implemented. An efficient image and GIS data management technique was also developed and implemented using Oracle Database Management System.

Automatic Generation of MAEC and STIX Standards for Android Malware Threat Intelligence

  • Park, Jungsoo;Nguyen Vu, Long;Bencivengo, George;Jung, Souhwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.8
    • /
    • pp.3420-3436
    • /
    • 2020
  • Due to the increasing number of malicious software (also known as malware), methods for sharing threat information are being studied by various organizations. The Malware Attribute Enumeration and Characterization (MAEC) format of malware is created by analysts, converted to Structured Threat Information Expression (STIX), and distributed by using Trusted Automated eXchange of Indicator Information (TAXII) protocol. Currently, when sharing malware analysis results, analysts have to manually input them into MAEC. Not many analysis results are shared publicly. In this paper, we propose an automated MAEC conversion technique for sharing analysis results of malicious Android applications. Upon continuous research and study of various static and dynamic analysis techniques of Android Applications, we developed a conversion tool by classifying parts that can be converted automatically through MAEC standard analysis, and parts that can be entered manually by analysts. Also using MAEC-to-STIX conversion, we have discovered that the MAEC file can be converted into STIX. Although other researches have been conducted on automatic conversion techniques of MAEC, they were limited to Windows and Linux only. In further verification of the conversion rate, we confirmed that analysts could improve the efficiency of analysis and establish a faster sharing system to cope with various Android malware using our proposed technique.