• Title/Summary/Keyword: Common-Use System

Search Result 1,086, Processing Time 0.026 seconds

A Study on the Models for Production Planning of Multiproduct (복합제품의 생산계획을 위한 모형수립에 관한 고찰)

  • 전만술
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.6 no.8
    • /
    • pp.49-53
    • /
    • 1983
  • The purpose of this study is to consider models for the production planning of multiproduct. Because these multiproducts use common facilities, labor, and materials, they are able to be considered jointly instead of planned independently. Initially linear programming models will be considered, followed by some examples of modeling and analysis when the cost structure is nonlinear. Basic model components are the following ; (1) inventory balance equations for each product to link successive time periods, and (2) capacity constraints for each period to represent resource limitations.

  • PDF

A rare case of primary ovarian mesenchymal chondrosarcoma in pregnancy

  • Sepideh Azizi;Elena Ghotbi;Setare Nassiri
    • Clinical and Experimental Reproductive Medicine
    • /
    • v.49 no.4
    • /
    • pp.285-288
    • /
    • 2022
  • Mesenchymal chondrosarcoma is a rare tumor that is more common in young people; it is an uncommon type of chondrosarcoma with a poor prognosis. In two-thirds of cases, it affects the bone, especially the spine. However, parts of the body other than the skeletal system are occasionally involved. These rarer types have a worse prognosis, with a high likelihood of metastasis and death. Due to the possible misdiagnosis of mesenchymal chondrosarcoma, the integrated use of imaging, immunohistochemistry, and pathology can be helpful.

A Methodology for CC-based Security Requirements Analysis and Specification by using Misuse Case Model (Misuse Case 모델을 이용한 CC기반의 보안요구사항 분식 및 명제 방법론)

  • 최상수;장세진;최명길;이강수
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.85-100
    • /
    • 2004
  • All information system is information security system that enforced security function. To improve qualify of information security system, suity requirement analysis and specification must be Performed by consistently and typically at early requirement analysis step. In this paper, we propose a security requirements analysis and specification model and process by using Misuse Case Model that extends UML's Use Case Model. And, we propose a cost-effective security product selection algorithm that security product is sufficient of all constructed security functional requirements. It may raise quality of information security system that developed through proposed model and process.

Performance Evaluation of English Word Pronunciation Correction System (한국인을 위한 외국어 발음 교정 시스템의 개발 및 성능 평가)

  • Kim Mu Jung;Kim Hyo Sook;Kim Sun Ju;Kim Byoung Gi;Ha Jin-Young;Kwon Chul Hong
    • MALSORI
    • /
    • no.46
    • /
    • pp.87-102
    • /
    • 2003
  • In this paper, we present an English pronunciation correction system for Korean speakers and show some of experimental results on it. The aim of the system is to detect mispronounced phonemes in spoken words and to give appropriate correction comments to users. There are several English pronunciation correction systems adopting speech recognition technology, however, most of them use conventional speech recognition engines. From this reason, they could not give phoneme based correction comments to users. In our system, we build two kinds of phoneme models: standard native speaker models and Korean's error models. We also design recognition network based on phonemes to detect Koreans' common mispronunciations. We get 90% detection rate in insertion/deletion/replacement of phonemes, but we cannot get high detection rate in diphthong split and accents.

  • PDF

The Furniture Design Study of Changeable Wall Storage System for a Studio (원룸 형 주거공간을 위한 가변적 Wall Storage System 가구디자인 연구)

  • Kim, Myeong-Tae;Kim, Jun-Hee
    • Journal of the Korea Furniture Society
    • /
    • v.22 no.1
    • /
    • pp.1-12
    • /
    • 2011
  • Recently, the studio which is urban housing form is rapidly growing up by new residential space according to increasing 1~2 person households form because of Modern members who have changing patterns of life and diversification of social values. The resident of the studio who lives or uses the space for a work such as students, office worker and soho-jok has various characters by a society nature changes and a regional peculiarity. The studio form and function is getting change according to variety trend changes and their life styles. The role and use of residential space also have variety such as the resident who lives in the studio. This study is to find the space utilization for them and reasonable housing solution in that structure, furniture and Wall Storage System of existing studio which is based on the common life patterns. The study's purpose is to propose the furniture design of changeable Wall Storage System according to the analysis.

  • PDF

A Bit of Factory Automation : Manufacturing Cost Estimation Using Group Technology (공장 자동화에 관한 소고 : 그룹 테크놀로지를 이용한 생산원가 추정)

  • Lee, Sung-Youl
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.15 no.2
    • /
    • pp.77-86
    • /
    • 1989
  • A fully automated cost estimation system(FACES) has been developed. Since speed, accuracy, and consistency are essential factors in automating a cost estimation, the use of computers in cost estimation system(CES) has grown rapidly in the last few years. FACES is a micro computer based cost estimation system that employs a manufacturing knowledge base. A Group Technology(GT) based part classification and coding(C&C) scheme is used to automate the process planning aspects of cost estimation. Variant process planning methods are employed to generate workstation routings from form features of the part. The system has been tested for an assembly of six machined parts. Results indicate that the system could provide a substantial improvement in accuracy, productivity, and performance over the more traditional full dialog approach to cost estimation. It also provides a good foundation for a factory automation by using a common GT based database through design to production.

  • PDF

Design and Implementation of Intelligent Agent System for Pattern Classification

  • Kim, Dae-su;Park, Ji-hoon;Chang, Jae-khun;Na, Guen-sik
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.11 no.7
    • /
    • pp.598-602
    • /
    • 2001
  • Recently, due to the widely use of personal computers and internet, many computer users requested intelligent system that can cope with various types of requirements and user-friendly interfaces. Based on this background, researches on the intelligent agent are now activating in various fields. In this paper, we modeled, designed and implemented an intelligent agent system for pattern classification by adopting intelligent agent concepts. We also investigated the pattern classification method by utilizing some pattern classification algorithms for the common data. As a result, we identified that 300 3-dimensional data are applied to three pattern classification algorithms and returned correct results. Our system showed a distinguished user-friendly interface feature by adopting various agents including graphic agent.

  • PDF

Assessment of Electrical Safety for Grounding System by Investigation on the Spot (현장조사에 의한 접지시스템의 전기안전성 평가)

  • Gil, Hyoung-Jun;Kim, Dong-Woo;Kim, Dong-Ook;Lee, Ki-Yeon;Kim, Hyang-Kon
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2008.05a
    • /
    • pp.361-364
    • /
    • 2008
  • This paper deals with assessment of electrical safety for grounding system of buildings by investigation on the spot at construction site. The investigation was carried out for grounding method, grounding type, shape of grounding electrode, grounding for lightning protection system, continuity of steelwork in reinforced concrete structure and so on. The investigation on the spot was performed by researcher, engineer with over fifteen years of industry experience all over the country. As a result of investigation on the spot to 13 buildings, common grounding method was dominant. A new grounding system based on international standards includes unity grounding system, structure grounding utilizing steel reinforced concrete, equipotential bonding. use of surge protective device.

  • PDF

An Experimental Study for Material Properties of Elastomer Bearing Using Next Genration Helicopter rotor system (차세대 헬리콥터 로터용 탄성체베어링 소재 특성에 관한 실험적 연구)

  • 정정교;김영석;박건록;김두훈;이명규;김덕관
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2003.05a
    • /
    • pp.325-329
    • /
    • 2003
  • Nowadays many peoples are using helicopter in various fields, not only military use but also common people applications such as air-measurement, photography, transportation of goods and persons, saving life and fire fighting etc. And it will be expected more popular than now. Most important part of helicopter to increasing performance and to reducing noise is rotor hub-system. Hub system consists of rotor-blade and rotor-hub. We participate to develop next-generation rotor hub system with elastomeric bearing, part of rotor hub. In this paper we introduce about the role and shape of elastomeric bearing in next-generation helicopter hub system. Then we study about bearing-material requirements and measuring methods. Finally we represent some experimental results.

  • PDF

Design and Implementation of Intrusion Detection System of Packet Reduction Method (패킷 리덕션 방식의 침입탐지 시스템 설계 및 구현)

  • JUNG, Shin-Il;KIM, Bong-Je;KIM, Chang-Soo
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.17 no.2
    • /
    • pp.270-280
    • /
    • 2005
  • Many researchers have proposed the various methods to detect illegal intrusion in order to improve internet environment. Among these researches, IDS(Intrusion Detection System) is classified the most common model to protect network security. In this paper, we propose new log format instead of Apache log format for SSL integrity verification. We translate file-DB log format into R-DB log format. Using these methods we can manage Web server's integrity, and log data is transmitted verification system to be able to perform both primary function of IDS and Web server's integrity management at the same time. The proposed system in this paper is also able to use for wire and wireless environment based on PDA.