• Title/Summary/Keyword: Automated design system

Search Result 745, Processing Time 0.022 seconds

Mutiagent based on Attacker Traceback System using SOM (SOM을 이용한 멀티 에이전트 기반의 침입자 역 추적 시스템)

  • Choi Jinwoo;Woo Chong-Woo;Park Jaewoo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.3
    • /
    • pp.235-245
    • /
    • 2005
  • The rapid development of computer network technology has brought the Internet as the major infrastructure to our society. But the rapid increase in malicious computer intrusions using such technology causes urgent problems of protecting our information society. The recent trends of the intrusions reflect that the intruders do not break into victim host directly and do some malicious behaviors. Rather, they tend to use some automated intrusion tools to penetrate systems. Most of the unknown types of the intrusions are caused by using such tools, with some minor modifications. These tools are mostly similar to the Previous ones, and the results of using such tools remain the same as in common patterns. In this paper, we are describing design and implementation of attacker-traceback system, which traces the intruder based on the multi-agent architecture. The system first applied SOM to classify the unknown types of the intrusion into previous similar intrusion classes. And during the intrusion analysis stage, we formalized the patterns of the tools as a knowledge base. Based on the patterns, the agent system gets activated, and the automatic tracing of the intrusion routes begins through the previous attacked host, by finding some intrusion evidences on the attacked system.

A Study on the Optimum Design for Preventing Propelling Charge to Military Ammunition Vehicle (탄약운반장갑차의 장약 파손 방지를 위한 최적설계에 관한 연구)

  • Noh, Sang Wan;Kim, Sung Hoon;Park, Young Min;Kim, Byung Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.11
    • /
    • pp.494-500
    • /
    • 2019
  • The purpose of this study was to determine a method to prevent damage during the transfer of loading through optimal design of loading transfer software for an ammunition-carrying armored vehicle. Typically, an ammunition carrier armored car is equipped with an automated charge transfer system. The load is intermittently damaged during the loading of the cargo, and this needs to be improved. The following improvements and verification tests were carried out. As impact speed increased, the loading speed was reduced 60%, and a special fixture utilizing a force gauge was developed and tested. If the maximum current of 11A for the servo controller is output when the load of the conveyor is generated by interference inside the loading tube, there is a possibility of charge breakage. If the maximum current is low, the load cannot be loaded. In the loading test for the ammunition carrier armored car with the actual charge, the improved design was found to be valid, as the load was not damaged and occurred nominally.

Optimization Model for the Mixing Ratio of Coatings Based on the Design of Experiments Using Big Data Analysis (빅데이터 분석을 활용한 실험계획법 기반의 코팅제 배합비율 최적화 모형)

  • Noh, Seong Yeo;Kim, Young-Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.383-392
    • /
    • 2014
  • The research for coatings is one of the most popular and active research in the polymer industry. For the coatings, electronics industry, medical and optical fields are growing more important. In particular, the trend is the increasing of the technical requirements for the performance and accuracy of the coatings by the development of automotive and electronic parts. In addition, the industry has a need of more intelligent and automated system in the industry is increasing by introduction of the IoT and big data analysis based on the environmental information and the context information. In this paper, we propose an optimization model for the design of experiments based coating formulation data objects using the Internet technologies and big data analytics. In this paper, the coating formulation was calculated based on the best data analysis is based on the experimental design, modify the operator with respect to the error caused based on the coating formulation used in the actual production site data and the corrected result data. Further optimization model to correct the reference value by leveraging big data analysis and Internet of things technology only existing coating formulation is applied as the reference data using a manufacturing environment and context information retrieval in color and quality, the most important factor in maintaining and was derived. Based on data obtained from an experiment and analysis is improving the accuracy of the combination data and making it possible to give a LOT shorter working hours per data. Also the data shortens the production time due to the reduction in the delivery time per treatment and It can contribute to cost reduction or the like defect rate reduced. Further, it is possible to obtain a standard data in the manufacturing process for the various models.

Information Retrieval System for R2SS (R2SS 기반의 정보검색 시스템)

  • Hong, Seok-Joo;Park, Young-Bae
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.12
    • /
    • pp.39-51
    • /
    • 2009
  • This study matters the design and implementation of an intelligent information search engine that is based on the $R^2SS$(Reverse Really Simple Syndication). Apart from to the previous method, where the user inputs the RSS address that one intends and obtains limited RSS information, the user just types in the information that one appoints to acquire the RSS information of standard documents that the user is interested among several RSS addresses by a Reverse RSS(Really Simple Syndication) method, which is drawn by the automated RSS address collection server in realtime. Through the proposed $R^2SS$(Really Reverse Simple Syndication) based intelligent information search engine, time can be significantly saved along with obtaining information with good quality, furthermore, it has the effects of having a personal secretary.

A Study on the Emotion-Responsive Interior Design centered on a Color Coordinate Digital Wall (감성반응형 실내디자인에 관한 연구 - 감성어휘별 색채배색에 의한 디지털 벽면을 중심으로 -)

  • 김주연;이현수
    • Science of Emotion and Sensibility
    • /
    • v.6 no.2
    • /
    • pp.1-7
    • /
    • 2003
  • The objectives of this study is to develop an adaptable digital wall model whose color can be changed dynamically according to the identified emotional state of a user. This study addresses how to capture a specific user's emotion through the web and use it for modifying VR model mainly for color adaptation. This adaptation process of a VR model consists of three phases: 1) identification of the user's emotional state projected onto the list of emotional keywords 2) translation of those captured emotional keywords into a pertinent set of color coordinations, and finally, 3) automated color adaptation process for the given model. This process derives an on-line viewer's emotional state, which can be utilized to find a new color scheme reflecting the identified emotion.

  • PDF

The impact of technology on resource sharing (정보기술이 자원공유에 미치는 영향)

  • 이영자
    • Journal of Korean Library and Information Science Society
    • /
    • v.22
    • /
    • pp.205-244
    • /
    • 1995
  • Originally the concept of the traditional resource sharing has been discussed in the context of bibliographic materials, and has been labor-intensive and high-cost activities. The technology has had a great impact on such pattern of the resource sharing, and has expanded the limited scope of the traditional concept into the sharing of library information in the levels of local, regional and national systems, and expertise, materials, facilities, equipments and personnels of the library system. While the traditional circulation service as a basic method to share library materials by users can provide the resource to a single person at a time, the electronic resource can be shared, by multi-users at a time anytime anywhere. The maximization of the electronic resource sharing requires that publishing process should be fundamentally changed and articles, books, chapters, speech manuscripts, music scores, maps, sound, and other formats of materials should be prepared in machine readable format. This study examined the positive effects of the technology on the resource sharing, but not investigate the concrete and complex problems as to the cost, guidelines, detailed procedures, design details, and intellectual properties and protection involved in the resource sharing. Some findings extracted from the study can be summarized as follows; (1) ILL will lose its meaning as a method to share the materials if they are all in the electronic format and the phrase 'networked information resource' becomes omnipresent. (2) The technology keeps on changing the concept of resource sharing. Today, the scope of resource sharing not only encompasses the sharing of the primary and secondary materials but also the sharing of the processings(eg. cataloging), expertise, user education, special facilities, and the integrated automated library systems. (3) The sharing of the networked resource will be a method to provide better services for library users in the low cost. (4) The a n.0, pplication of the technology to the resource sharing should be focus on the method which allows an end-users to do the direct access to the needed materials, and to be delivered the primary document as soon as possible.

  • PDF

A Study on the Analysis of Vulnerabilities in the Program Source Code (프로그램 소스코드 취약성 분석에 관한 연구)

  • 하경휘;최진우;우종우;김홍철;박상서
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.3-8
    • /
    • 2004
  • The majority of recent intrusions reveal that the attackers do not use the previous intrusion techniques or network flaw, rather they tend to use the vulnerabilities residing inside the program, which are the running programs on the system or the processes for the service. Therefore, the security managers must focus on updating the programs with lots of time and efforts. Developers also need to patch continuously to update the program, which is a lot of burden for them. In order to solve the problem, we need to understand the vulnerabilities in the program, which has been studied for some time. And also we need to analyze the functions that contains some vulnerabilities inside. In this paper, we first analyzed the vulnerabilities of the standard C library, and Win32 API functions used in various programs. And then we described the design and implementation of the automated scanning tool for writing secure source code based on the analysis.

  • PDF

Development of Construction Material Naming Ontology for Automated Building Energy Analysis (건축물 에너지 분석 자동화를 위한 건축 자재명 온톨로지 구축)

  • Kim, Ka-Ram;Kim, Gun-Woo;Yoo, Dong-Hee;Yu, Jung-Ho
    • Korean Journal of Construction Engineering and Management
    • /
    • v.12 no.5
    • /
    • pp.137-145
    • /
    • 2011
  • BIM Data exchange using standard format can provide a user friendly and practical way of integrating the BIM tools in the life cycle of a building on the currently construction industry which is participated various stakeholder. It used IFC format to exchange the BIM data from Design software to energy analysis software. However, since we can not use the material name data in the library of an energy analysis directly, it is necessary to input the material property data for building energy analysis. In this paper, to matching the material named of name of DOE-2 default library, rhe extracted material names from BIM file are inferred by the ontology With this we can make the reliable input data of the engine by development a standard data and also increase the efficient of building energy analysis process. The methodology can enable to provide a direction of BIM-based information management system as a conceptual study of using ontology in the construction industry.

An Investigation on the Acquisition and Preservation of Online Serials (온라인 연속간행자료수집 및 보존에 관한 연구)

  • Lee, Chi-Ju
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.41 no.2
    • /
    • pp.359-386
    • /
    • 2007
  • This study is to develop the operation models collection and preservation of serials only distributed online. In order to identify all of the requisite items for collection and preservation of the online serials, it conducts Delphi Technique researches with panels of experts from public institutions, organizations, and research institutions. It also deduces the 68 necessary detailed items to develop the operation models for preserving the online serials, and suggests 57 detailed items selected from the compatibility analysis with the investigation and examination of compatibility and urgency. It suggests the automated collection plan of contents with the application of RSS technology of transfer protocol to provide users the updated information from the sites where the contents and data have been constantly and frequently updated. This study strives to design the collection and preservation processes suitable for the online serials.

A Robot End-effector for Biopsy Procedure Automation with Spring-Triggered Biopsy Gun Mechanism (스프링 격발형 생검총 구조를 가진 생검 시술 자동화 로봇 말단장치)

  • Won, Jong-Seok;Moon, Youngjin;Park, Sang Hoon;Choi, Jaesoon
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.22 no.8
    • /
    • pp.590-596
    • /
    • 2016
  • Biopsy is a typical needle type intervention procedure performed under radiographic image equipment such as computed tomography (CT) and cone-beam CT. This minimal invasive procedure is a simple and effective way for identifying cancerous condition of a suspicious tissue but radiation exposure for the patients and interventional radiologists is a critical problem. In order to overcome such trouble and improve accuracy in targeting of the needle, there have been various attempts using robot technology. Those devices and systems, however, are not for full procedure automation in biopsy without consideration for tissue sampling task. A robotic end-effector of a master-slave tele-operated needle type intervention robot system has been proposed to perform entire biopsy procedure by the authors. However, motorized sampling adopted in the device has different cutting speed from that of biopsy guns used in the conventional way. This paper presents the design of a novel robotic mechanism and protocol for the automation of biopsy procedure using spring-triggered biopsy gun mechanism. An experimental prototype has been successfully fabricated and shown its feasibility of the automated biopsy sequence.