• Title/Summary/Keyword: Document automation

Search Result 65, Processing Time 0.027 seconds

The Development of Interoperability Tester for the IEC 61850 based on TTCN-3 (TTCN-3 적합성 시험 언어를 이용한 IEC61850 상호 연동성 시험기 개발)

  • Song, Byung-Kwen;Lee, Suk-Hee
    • Journal of IKEEE
    • /
    • v.14 no.3
    • /
    • pp.210-218
    • /
    • 2010
  • TTCN-3(Testing & Test Control Notation Version 3) is the international standard testing language defined by ETSI in 2001. TTCN-3 is generally used for protocol conformance test, but it is also possible to be applied to the platform and API tests based on CORBA. Moreover, it can be also applied to the various testings such as interworking testing, repetition testing, platform testing, etc. IEC 61850 is the protocol proposed for SAS(Substation Automation System) of SCADA(Supervisory Control And Data Acquisition) system. In this paper, a IEC 61850 interoperability Tester based TTCN-3 is developed under the Window environment. IEC 61850 Server Simulator of Linux operating system is used as SUT(System Under Test). Conformance testing items in this paper are the Positive test case_Srv5 of "Server, Logical device, Logical node, and data model" in the testing group of "IEC 61850 - Part10" document.

A Proposal of Methods for Building Databases about the Accumulation of Disuse Utilizing the Political System to Discard Private Information According to the Expiration of In-service Life and Observation of Legal Standards (보존연한 도래 및 법적기준 준수를 위한 개인정보 정책적 폐기시스템을 활용한 폐기 누적현황 데이터베이스 구축에 관한 방안 제안)

  • Seo, Wooseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.3
    • /
    • pp.45-53
    • /
    • 2018
  • The Personal Information Protection Act has been revised continuously since its establishment, and as a way to secure stability properly, the guidelines as well as enforcement ordinances and regulations have been changed, too. It seems that people's recognition and awareness of private information have already evolved to a certain level that is regarded to be fairly high. However, no one can exactly imagine how much ripple effect scrapping discarded paper regarded simply as waste material which is often and easily practiced in our everyday lives exerts and how many socially significant events it may arouse in our lives. Private information is produced, operated, preserved, utilized, distributed within the frame of law unidentified, and then discarded with a particular purpose. While going through a series of processes, each piece of that private information comes to be reproduced melting a lot of information. It is used and also changed beneficially sometimes to richen our lives or as basic material for welfare. Meanwhile, its importance is decided by its weight or mass and then often gets discarded after all. It means that the process of disuse is being done in a way to arouse the possibility of invasion of personal rights and also the second and third and also more exposure of private information. Therefore, approaching the meaning of automation politically, this study aims to suggest how to secure stability in the process of discarding private information in terms of logical automation.

BIM-based Lift Planning Workflow for On-site Assembly in Modular Construction Projects

  • Hu, Songbo;Fang, Yihai;Moehler, Robert
    • International conference on construction engineering and project management
    • /
    • 2020.12a
    • /
    • pp.63-74
    • /
    • 2020
  • The assembly of modular construction requires a series of thoroughly-considered decisions for crane lifting including the crane model selection, crane location planning, and lift path planning. Traditionally, this decision-making process is empirical and time-consuming, requiring significant human inputs. Recently, research efforts have been dedicated to improving lift planning practices by leveraging cutting-edge technologies such as automated data acquisition, Building Information Modelling (BIM) and computational algorithms. It has been demonstrated that these technologies have advanced lift planning to some degree. However, the advancements tend to be fragmented and isolated. There are two hurdles prevented a systematic improvement of lift planning practices. First, the lack of formalized lift planning workflow, outlining the procedure and necessary information. Secondly, there is also an absence of a shared information environment, enabling storages, updates and the distribution of information to stakeholders in a timely manner. Thus, this paper aims to overcome the hurdles. The study starts with a literature review in combination with document analysis, enabling the initial workflow and information flow. These were contextualised through a series of interviews with Australian practitioners in the crane-related industry, and systematically analysed and schematically validated through an expert panel. Findings included formalized workflow and corresponding information exchanges in a traditional lift planning practice via a Business Process Model and Notation (BPMN). The traditional practice is thus reviewed to identify opportunities for further enhancements. Finally, a BIM-based lift planning workflow is proposed, which integrates the scattered technologies (e.g. BIM and computational algorithms) with the aim of supporting lift planning automation. The resulting framework is setting out procedures that need to be developed and the potential obstacles towards automated lift planning are identified.

  • PDF

Segmentation-free Recognition of Touching Numeral Pairs (두자 접촉 숫자열의 분할 자유 인식)

  • Choi, Soon-Man;Oh, Il-Seok
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.5
    • /
    • pp.563-574
    • /
    • 2000
  • Recognition of numeral fields is a very important task for many document automation applications. Conventional methods are based on the two-steps process, segmentation of touching numerals and recognition of the individual numerals. However, due to a large variation of touching types this approach has not produced a robust result. In this paper, we present a new segmentation-free method for recognizing the two touching numerals. In this approach, two touching numerals are regarded as a single pattern coming from 100 classes ('00', '01', '02', ..., '98', '99'). For the test set, we manually extract two touching numerals from the data set of NIST numeral fields. Due to the limitation of conventional neural network in case of large-set classification, we use a modular neural network and Drove its superiority through recognition experimen.

  • PDF

Designing an expert system for library classification (문헌분류 전문가시스팀의 설계에 대한 연구)

  • 김정현
    • Journal of Korean Library and Information Science Society
    • /
    • v.21
    • /
    • pp.459-483
    • /
    • 1994
  • The purpose of the study is to design and implement a prototype expert system for library classification in the literature field of the DDC 20. The system was largely consisted of a knowledge base, an inference engine, a knowledge acquisition facility, an explanation facility and an user interface facility. The knowledge base was represented by inference rules and frames. The name file for authors and titles was designed separately. The forward chaining technique was chosen for the inference engine and the menu-driven dialog technique was also taken for the user interface. The conclusions of the study can be summarized as follows: 1) The difficulty of document classification work is due to the complex and stringent classification rules. Such problems can be considerably alleviated by using the present system. 2) Even the novice with a knowledge about the DDC 20 can easily access the system. And also librarian other than the professional classifier can easily be accustomed to the classification work. 3) The system can be used as an online classification scheme. 4) By adding any local language other than English or Hangeul on the menu screen, the language problem relating classification can be overcome. 5) The system can be employed as the intensification tool for the education of classification as well as library automation.

  • PDF

A study of the existing problems of digital libraries and their future environment (현존하는 디지털도서관의 문제점과 미래환경에 관한 연구)

  • 박일종
    • Journal of Korean Library and Information Science Society
    • /
    • v.27
    • /
    • pp.391-421
    • /
    • 1997
  • Information scientists need not to answer whether future libraries will be a digital library or not, but to answer how they are structured and served effectively to users currently. 'The library with walls' or 'the library as place' need to be existed in the future, but 'digital library without the wall' or 'virtual library' will need to be studied continuously. This study has tried to reveal the existing problems of digital libraries and their future environment after considering the ambiguous concepts of various types of electronic libraries and their efforts for library automation, and the changed information retrieval circumstances during the last 30 to 40 years through a qualitative document study. As a result, the major findings and suggestions are prepared. The library of the future will be a part of local and national cooperative systems, be filled with the intelligent use of old and new technologies, and be able to su n.0, pport both a place with extensive collections and convenient, easy, & free access to remote intellectual resources. Also, the information storage and retrieval (ISAR) to the future library system would easily provide users with any types of data retrieval system by anybody rather than by an expert or a specialist, so called 'A&E retrieval' in the coming 21th century. It will be highly possible that the future society changes to the information marketplace whose data may be recognized as an intangible assets.

  • PDF

CALS Implementation Policy for Information-based Management of Small and Medium Companies (중소기업의 정보화를 위한 CALS 도입 정책 방안)

  • 김철환
    • The Journal of Society for e-Business Studies
    • /
    • v.2 no.1
    • /
    • pp.1-20
    • /
    • 1997
  • This study aims to suggest CALS implementation strategies and policies for information-based management of small and medium companies in Korea. At the turning point from traditional document-based management to recent digital-based one, it is well known that implementation of CALS concept is crucial for advancing business management of small and medium enterprises In order to attack the aim, this paper critically analyzes the empirical difficulties and obstacles of the current information-based management of small and medium companies in Korea. On the basis of the above analysis, this paper suggests the strategic plans and policies of CALS implementation for small and medium enterprises in Korea as follows. First, government should provide the supporting policies and proper system so that the large enterprise can be linked with small and medium companies for sharing necessary information. Second, similar enterprises should be integrated on the basis of information and automation evaluation. Third, implementation strategies and plans should be advanced on the basis of the informationalized phases with respect to the technology level of small and medium enterprises. For more efficient CALS implementation, this paper also proposes the following subsidiary policies. First, it is substantially important to publicize the nation-wide spreading of CALS mind. Second, it is strongly recommended to educate and train CALS specialist on a consistant basis. Third, government should support the enterprises by providing sufficient fund for CALS implementation. Fourth, the ideal CALS implementation models for small and medium enterprises should be developed. Fifth, the consulting and training program for CALS implementation should be established through ECRC (Electronic Commerce Resource Center). My study was based upon the enterprises' responses to the questionaires I made

  • PDF

Establishment of Integrated Design Bases Management System of APR1400 Using BIM based Algorithm (BIM기반 Algorithm을 활용한 APR1400 설계기준 통합관리 체계 구축)

  • Shin, Jaeseop;Choi, Jaepil
    • Korean Journal of Construction Engineering and Management
    • /
    • v.20 no.5
    • /
    • pp.52-60
    • /
    • 2019
  • The APR1400 is a 1400MWe nuclear power plant developed through national technology development project over a period about 10years. Approximately 65,000 design drawings are produced for APR1400 construction. In order to maintain consistency among numerous drawings, the highest level of design bases drawings (DBDs) are created according to design bases and this is used in the subsequent design. However, DBDs are produced and managed on a document basis and they are managed various field, it was difficult to accurately reflect the design bases information in the subsequent design. Therefore, this study recognizes limitations of the document based DBDs and develops a system that can accurately reflect the design bases information to subsequent design by adopting BIM based design bases integrated information system. Especially, by introducing DBIL(Design Bases Information Layer) concept, DBIL was created and analyzed based on five design bases(Physical protection, Fire protection, Internal missile protection, Internal flood protection, Radiation protection) applied to APR1400. In the final result DBIL set and Datasheet are integrated of room, design bases information, building data(wall, slab, door, window, penetrations). So it can be used for subsequent design automation and design verification. Furthermore, it is expected that APR1400 DBILs data can be used extensively in constructability and design economics analysis through comparison with next generation nuclear power plant.

Problems of Applying Information Technologies in Public Governance

  • Goshovska, Valentyna;Danylenko, Lydiia;Hachkov, Andrii;Paladiiichuk, Sergii;Dzeha, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.71-78
    • /
    • 2021
  • The relevance of research provides the necessity to identify the basic problems in the public governance sphere and information technology relations, forasmuch as understanding such interconnections can indicate the consequences of the development and spreading information technologies. The purpose of the research is to outline the issues of applying information technologies in public governance sphere. 500 civil servants took part in the survey (Ukraine). A two-stage study was conducted in order to obtain practical results of the research. The first stage involved collecting and analyzing the responses of civil servants on the Mentimeter online platform. In the second stage, the administrator used the SWOT-analysis system. The tendencies in using information technologies have been determined as follows: the institutional support development; creation of analytical portals for ensuring public control; level of accountability, transparency, activity of civil servants; implementation of e-government projects; changing the philosophy of electronic services development. Considering the threats and risks to the public governance system in the context of applying information technologies, the following aspects generated by societal requirements have been identified, namely: creation of the digital bureaucracy system; preservation of information and digital inequality; insufficient level of knowledge and skills in the field of digital technologies, reducing the publicity of the state and municipal governance system. Weaknesses of modern public governance in the context of IT implementation have been highlighted, namely: "digitization for digitalization"; lack of necessary legal regulation; inefficiency of electronic document management (issues caused by the imperfection of the interface of reporting interactive forms, frequent changes in the composition of indicators in reporting forms, the desire of higher authorities to solve the problem of their introduction); lack of data analysis infrastructure (due to imperfections in the organization of interaction between departments and poor capacity of information resources; lack of analytical databases), lack of necessary digital competencies for civil servants. Based on the results of SWOT-analysis, the strengths have been identified as follows: (possibility of continuous communication; constant self-learning); weaknesses (age restrictions for civil servants; insufficient acquisition of knowledge); threats (system errors in the provision of services through automation); opportunities for the introduction of IT in the public governance system (broad global trends; facilitation of the document management system). The practical significance of the research lies in providing recommendations for eliminating the problems of IT implementation in the public governance sphere outlined by civil servants..

Generative AI service implementation using LLM application architecture: based on RAG model and LangChain framework (LLM 애플리케이션 아키텍처를 활용한 생성형 AI 서비스 구현: RAG모델과 LangChain 프레임워크 기반)

  • Cheonsu Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.4
    • /
    • pp.129-164
    • /
    • 2023
  • In a situation where the use and introduction of Large Language Models (LLMs) is expanding due to recent developments in generative AI technology, it is difficult to find actual application cases or implementation methods for the use of internal company data in existing studies. Accordingly, this study presents a method of implementing generative AI services using the LLM application architecture using the most widely used LangChain framework. To this end, we reviewed various ways to overcome the problem of lack of information, focusing on the use of LLM, and presented specific solutions. To this end, we analyze methods of fine-tuning or direct use of document information and look in detail at the main steps of information storage and retrieval methods using the retrieval augmented generation (RAG) model to solve these problems. In particular, similar context recommendation and Question-Answering (QA) systems were utilized as a method to store and search information in a vector store using the RAG model. In addition, the specific operation method, major implementation steps and cases, including implementation source and user interface were presented to enhance understanding of generative AI technology. This has meaning and value in enabling LLM to be actively utilized in implementing services within companies.