Processing math: 100%
  • Title/Summary/Keyword: Digital Automation

Search Result 459, Processing Time 0.027 seconds

The Implementation of Communication Emulate Based on Component For Automation System (자동화시스템을 위한 컴포넌트 기반의 통신 Emulate 구현)

  • Jeong Hwa-Young
    • Journal of Digital Contents Society
    • /
    • v.3 no.2
    • /
    • pp.245-254
    • /
    • 2002
  • Currently, communication field for automation system can be divided by simple serial communication for communication between each internal devices and network base remote control system that is based on TCP/IP. In spite of great development of network, communication part for internal control is using simple RS232 base until present. Also, development techniques of system developed by object oriented program in modular programming techniques of each function unit. Currently, it developed by component base development technique that is parts unit of software. This is presented by the new alternative of software development techniques as techniques to composition independent operation unit including business logic and is connected to development of new system. Therefore, this research implemented internal communication Emulate in RS232C based on GUI that apply development techniques of component base. that is, I maked component to commnication control part between receiving and sending and, as composite it, Control part did to handling between send and receive data.

  • PDF

A Proposal of Methods for Building Databases about the Accumulation of Disuse Utilizing the Political System to Discard Private Information According to the Expiration of In-service Life and Observation of Legal Standards (보존연한 도래 및 법적기준 준수를 위한 개인정보 정책적 폐기시스템을 활용한 폐기 누적현황 데이터베이스 구축에 관한 방안 제안)

  • Seo, Wooseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.3
    • /
    • pp.45-53
    • /
    • 2018
  • The Personal Information Protection Act has been revised continuously since its establishment, and as a way to secure stability properly, the guidelines as well as enforcement ordinances and regulations have been changed, too. It seems that people's recognition and awareness of private information have already evolved to a certain level that is regarded to be fairly high. However, no one can exactly imagine how much ripple effect scrapping discarded paper regarded simply as waste material which is often and easily practiced in our everyday lives exerts and how many socially significant events it may arouse in our lives. Private information is produced, operated, preserved, utilized, distributed within the frame of law unidentified, and then discarded with a particular purpose. While going through a series of processes, each piece of that private information comes to be reproduced melting a lot of information. It is used and also changed beneficially sometimes to richen our lives or as basic material for welfare. Meanwhile, its importance is decided by its weight or mass and then often gets discarded after all. It means that the process of disuse is being done in a way to arouse the possibility of invasion of personal rights and also the second and third and also more exposure of private information. Therefore, approaching the meaning of automation politically, this study aims to suggest how to secure stability in the process of discarding private information in terms of logical automation.

Design and Utilization of Connected Data Architecture-based AI Service of Mass Distributed Abyss Storage (대용량 분산 Abyss 스토리지의 CDA (Connected Data Architecture) 기반 AI 서비스의 설계 및 활용)

  • Cha, ByungRae;Park, Sun;Seo, JaeHyun;Kim, JongWon;Shin, Byeong-Chun
    • Smart Media Journal
    • /
    • v.10 no.1
    • /
    • pp.99-107
    • /
    • 2021
  • In addition to the 4th Industrial Revolution and Industry 4.0, the recent megatrends in the ICT field are Big-data, IoT, Cloud Computing, and Artificial Intelligence. Therefore, rapid digital transformation according to the convergence of various industrial areas and ICT fields is an ongoing trend that is due to the development of technology of AI services suitable for the era of the 4th industrial revolution and the development of subdivided technologies such as (Business Intelligence), IA (Intelligent Analytics, BI + AI), AIoT (Artificial Intelligence of Things), AIOPS (Artificial Intelligence for IT Operations), and RPA 2.0 (Robotic Process Automation + AI). This study aims to integrate and advance various machine learning services of infrastructure-side GPU, CDA (Connected Data Architecture) framework, and AI based on mass distributed Abyss storage in accordance with these technical situations. Also, we want to utilize AI business revenue model in various industries.

Configurable Smart Contracts Automation for EVM based Blockchains

  • ZAIN UL ABEDIN;Muhammad Shujat Ali;Ashraf Ali;Sana Ejaz
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.147-156
    • /
    • 2023
  • Electronic voting machines (EVMs) are replacing research ballots due to the errors involved in the manual counting process and the lengthy time required to count the votes. Even though these digital recording electronic systems are advancements, they are vulnerable to tampering and electoral fraud. The suspected vulnerabilities in EVMs are the possibility of tampering with the EVM's memory chip or replacing it with a fake one, their simplicity, which allows them to be tampered with without requiring much skill, and the possibility of double voting. The vote data is shared among all network devices, and peer-to-peer verification is performed to ensure the vote data's authenticity. To successfully tamper with the system, all of the data stored in the nodes must be changed. This improves the proposed system's efficiency and dependability. Elections and voting are fundamental components of a democratic system. Various attempts have been made to make modern elections more flexible by utilizing digital technologies. The fundamental characteristics of free and fair elections are intractability, immutability, transparency, and the privacy of the actors involved. This corresponds to a few of the many characteristics of blockchain-like decentralized ownership, such as chain immutability, anonymity, and distributed ledger. This working research attempts to conduct a comparative analysis of various blockchain technologies in development and propose a 'Blockchain-based Electronic Voting System' solution by weighing these technologies based on the need for the proposed solution. The primary goal of this research is to present a robust blockchain-based election mechanism that is not only reliable but also adaptable to current needs.

The application of a digital relief model to landform classification (LANDFORM 분류를 위한 수치기복모형의 적용)

  • Yang, In-Tae;Kim, Dong-Moon;Yu, Young-Geol;Chun, Ki-Sun
    • Journal of Industrial Technology
    • /
    • v.19
    • /
    • pp.155-162
    • /
    • 1999
  • In the last few years the automatic classification of morpholgical landforms using GSIS and DEM was investigated. Particular emphasis has been put on the morphological point attribute approaches and the extraction of drainage basin variables from digital elevation models. The automated derivation of landforms has become a neccessity for quantitative analysis in geomorphology. Furthermore, the application of GSIS technologies has become an important tool for data management and numerical data analysis for purpose of geomorphological mapping. A process developed by Dikau et al, which automates Hanmond's manual process, was applied to the pyoung chang of the kangwon. Although it produced a classification that has good resemblance to the landforms in the area, it had some problems. For example, it produced a progressive zonation when landform changes from plains to mountains, it does not distinguish open valleys from a plains mountain interface, and it was affected by micro relief. Although automating existing quantitative manual processes is an important step in the evolution automation, definition may need to be calibrated since the attributes are oftem measured differently. A new process is presented that partly solves these problems.

  • PDF

A Method of Sensory Effect Metadata Generation Based on User Feedback Information (사용자 피드백 정보 기반 실감효과 메타데이터 생성 방법)

  • Kim, Cheol Min;Heo, Yong Soo;Kim, Eun Seok
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.7
    • /
    • pp.802-812
    • /
    • 2018
  • Recently, there are several active and vibrant studies on Realistic Media that try to provide the immersion and the presence by adding sensory effects to video. Because existing sensory effects on Realistic Media are produced through experts and automation programs on sensory effects, there is a limit to fill up the gap of user satisfaction which comes from the diversity of cybernauts. In this paper, we propose a method to improve the satisfaction with sensory effects by collecting and analyzing user's response information, and applying the result to the attributes of sensory effects. The proposed method allows you to produce the Sensory Effect Metadata effectively by analyzing users' biometric data and subjective satisfaction with realistic media experience, measuring the weighted value to revise the effects, and applying to the attribute of sensory effect. The experimental result shows that the proposed method improves the satisfaction with realistic content by generating the revised Sensory Effect Metadata in response to user's experiential feedback information.

The Design of Operation and Control Solution with Intelligent Inference Capability for IED based Digital Switchgear Panel (IED를 기반으로 하는 디지털 수배전반의 지적추론기반 운전제어 솔루션 설계)

  • Ko, Yun-Seok
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.55 no.9
    • /
    • pp.351-358
    • /
    • 2006
  • In this paper, DSPOCS(Digital Switchgear-Panel Operation and Control Solution) is designed, which is the intelligent inference based operation and control solution to obtain the safety and reliability of electric power supply in substation based on IED. DSPOCS is designed as a scheduled monitoring and control task and a real-time alarm inference task, and is interlinked with BRES(Bus Reconfiguration Expert System) in the required case. The intelligent alarm inference task consists of the alarm knowledge generation part and the real-time pattern matching part. The alarm knowledge generation part generates automatically alarm knowledge from DB saves it in alarm knowledge base. On the other hand, the pattern matching part inferences the real-time event by comparing the real-time event information furnished from IEDs of substation with the patterns of the saved alarm knowledge base.; Especially, alarm knowledge base includes the knowledge patterns related with fault alarm, the overload alarm and the diagnosis alarm. In order to design the database independently in substation structure, busbar is represented as a connectivity node which makes the more generalized graph theory possible. Finally, DSPOCS is implemented in MS Visual C++, MFC, the effectiveness and accuracy of the design is verified by simulation study to the typical distribution substation.

A Study on Security Framework in Digital Home Environments (디지털홈 환경에서의 보안 프레임워크 연구)

  • 김도우;한종욱;주홍일;이윤경
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.724-727
    • /
    • 2004
  • With the development of modem communication and networking technology, more and more computing and communication facilities, automation equipments, hone information appliances and different type of networking terminals come into home all over the world. The user can control information appliances in home environments. The home environment can communicate with the external network via phone line, wired LAN, wireless LAN, or mixed. However, home information appliances that are connected to the external network are under attack and need to be secured. So specifying suitable security requirements and policies for digital home environment is critical in hone networking environments. This paper analyzes the possible vulnerability to home network, and specifies the security requirements derived from the vulnerability analysis for digital home environment

  • PDF

A Study on Character Design Using [Midjourney] Application

  • Chen Xi;Jeanhun Chung
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.2
    • /
    • pp.409-414
    • /
    • 2023
  • In recent years, the emergence of a number of AI image generation software represented by [Midjourney] has brought great impetus to the development of the field of AI-assisted art creation. Compared with the traditional hand-painted digital painting with the aid of electronic equipment, broke the traditional sense of animation character creation logic.This paper analyzes the application of AI technology in the field of animation character design through the practice of two-dimensional animation character . This is having a significant impact on the productivity and innovation of animation design and character modeling. The key results of the analysis indicate that AI technology, particularly through the utilization of "Midjourney,"enables the automation of certain design tasks, provides innovative approaches, and generates visually appealing and realistic characters. In conclusion, the integration of AI technology, specifically the application of "Midjourney," brings a new dimension to animation character design. The utilization of AI image generation software facilitates streamlined workflows, sparks creativity, and improves the overall quality of animated characters. As the animation industry continues to evolve, AI-assisted tools like "Midjourney" hold great potential for further advancement and innovation.

A Study on Automatic Classification System of Red Blood Cell for Pathological Diagnosis in Blood Digitial Image (혈액영상에서 병리진단을 위한 적혈구 세포의 자동분류에 관한 연구)

  • 김경수;김동현
    • Journal of the Korea Society of Computer and Information
    • /
    • v.4 no.1
    • /
    • pp.47-53
    • /
    • 1999
  • In medical field, the computer has been used in the automatic processing of data derived in hospital. the automation of diagonal devices, and processing of medical digital images. In this paper, we classify red blood cell into 16 class including normal cell to the automation of blood analysis to diagnose disease. First, using UNL Fourier and invariant moment algorithm, we extract features of red blood cell from blood cell image and then construct multi-layer backpropagation neural network to recognize. We proof that the system can give support to blood analyzer through blood sample analysis of 10 patients.

  • PDF