• Title/Summary/Keyword: Electronic Equipment

Search Result 1,563, Processing Time 0.029 seconds

The Design of Smart Factory System using AI Edge Device (AI 엣지 디바이스를 이용한 스마트 팩토리 시스템 설계)

  • Han, Seong-Il;Lee, Dae-Sik;Han, Ji-Hwan;Shin, Han Jae
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.4
    • /
    • pp.257-270
    • /
    • 2022
  • In this paper, we design a smart factory risk improvement system and risk improvement method using AI edge devices. The smart factory risk improvement system collects, analyzes, prevents, and promptly responds to the worker's work performance process in the smart factory using AI edge devices, and can reduce the risk that may occur during work with improving the defect rate when workers perfom jobs. In particular, based on worker image information, worker biometric information, equipment operation information, and quality information of manufactured products, it is possible to set an abnormal risk condition, and it is possible to improve the risk so that the work is efficient and for the accurate performance. In addition, all data collected from cameras and IoT sensors inside the smart factory are processed by the AI edge device instead of all data being sent to the cloud, and only necessary data can be transmitted to the cloud, so the processing speed is fast and it has the advantage that security problems are low. Additionally, the use of AI edge devices has the advantage of reducing of data communication costs and the costs of data transmission bandwidth acquisition due to decrease of the amount of data transmission to the cloud.

A Study on SUS MASK Etching Using Additives (첨가제를 이용한 SUS MASK 에칭에 관한 연구)

  • Lee, Woo-Sik
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.4
    • /
    • pp.243-248
    • /
    • 2022
  • The purpose of this paper is to etching SUS MASK by adding an additive (F300) to FeCl3. The equipment used in the experiment is a self-made automatic liquid management system. The automatic liquid management system is a device capable of controlling the Oxidation Reduction Potential (ORP) and specific gravity in real time and supplying FeCl3 and additives in a quantitative manner. SUS MASK was etched in units from 10 sheets up to 200 sheets for 1 minute. It was confirmed that when the initial SUS MASK was 10 sheets, the ORP value started with 628 mV and measured at 611 mV from the time of 40 sheets being injected, and maintained close to 610 mV up to 200 sheets. The specific gravity was maintained near 1.640. And the SUS MASK was measured close to 0.4 mm from 50 sheets to 200 sheets. The experimental conditions of ORP had a specific gravity of 610 mV, 1.463, an etching pressure of 3.0 kg/cm2, an additive (F300) ratio of 1.2%, and the hole size was measured by up to 200 sheets of 10 sheets at once etching. As a result, the diameter approached 0.4 mm from 20 sheets. Even if the number of SUS MASK was increased, the ORP and specific gravity were well controlled, and it was confirmed that the experimental target value was close to 0.4 mm.

A neck healthy warning algorithm for identifying text neck posture prevention (거북목 자세를 예방하기 위한 목 건강 경고 알고리즘)

  • Jae-Eun Lee;Jong-Nam Kim;Hong-Seok Choi;Young-Bong Kim
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.23 no.3
    • /
    • pp.115-122
    • /
    • 2022
  • With the outbreak of COVID-19 a few years ago, video conferencing and electronic document work have increased, and for this reason, the proportion of computer work among modern people's daily routines is increasing. However, as more and more people work on computers in the wrong posture for a long time, the number of patients with poor eyesight and text neck is increasing. Until recently, many studies have been published to correct posture, but most of them have limitations that users may experience discomfort because they have to correct posture by wearing equipment. A posture correction sensor algorithm is proposed to prevent access to the minimum distance between a computer monitor and a person using an ultrasonic sensor device. At this time, an algorithm for minimizing false alarms among warning alarms that sound at the minimum distance is also proposed. Because the ultrasonic sensor device is used, posture correction can be performed without attaching a device to the body, and the user can relieve discomfort. In addition, experimental results showed that accuracy can be improved by reducing false alarms by removing more than half of the noise generated during distance measurement.

The Impact of Exchange Rate Volatility on Korea's Exports of Machinery Intermediate Goods to East Asian Countries: Around the Global Financial Crisis (환율변동성이 동아시아 국가에 대한 한국의 기계류 중간재 수출에 미치는 영향: 글로벌 금융위기 전후를 중심으로)

  • Jung, Moon-Hyun
    • Korea Trade Review
    • /
    • v.43 no.3
    • /
    • pp.169-198
    • /
    • 2018
  • The purpose of this paper is to investigate the impact of exchange rate volatility on the export of Korean machinery intermediate goods to East Asian countries using the export demand model. In order to secure the validity of the estimation of the exchange rate volatility for the export of machinery intermediate goods, various methods of volatility measurement are used including the GARCH model, the moving average standard deviation and the 12-month fixed average standard deviation. The long-term relationship between variables was analyzed by applying the panel cointegration tests and DOLS & FMOLS panel estimations. Analysis results found that prior to the global financial crisis in 2008, the total exports of machinery and exchange rate volatility positively affect the exports of intermediate goods such as general machinery, electronic machinery and transportation equipment, but did not affect the exports of precision machinery intermediate goods. After the global financial crisis, however, exchange rate volatility negatively affected total exports and the exports of all machinery intermediate goods. When analyzing the period before and after the global financial crisis, it had a positive impact on exports of precision machinery intermediate goods and a negative effect on total exports and the exports of other machinery intermediate goods.

  • PDF

3D Simulation Study to Develop Automated System for Robotic Application in Food Sorting and Packaging Processes (식품계량 및 포장 공정 로봇 적용 자동화 시스템 개발을 위한 3D 시뮬레이션 연구)

  • Seunghoon Baek;Seung Eel Oh;Ki Hyun Kwon;Tae Hyoung Kim
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.5
    • /
    • pp.230-238
    • /
    • 2023
  • Small and medium-sized food manufacturing enterprises are largely reliant on manual labor, from inputting raw materials to palletizing the final product. Recently, there has been a trend toward smartness and digitization through the implementation of robotics and sensor data technology. In this study, we examined the effectiveness of improvement through 3D simulation on two repetitive work processes within a food manufacturing company. These processes involve workers whose speed cannot match the capacity of the applied equipment. Two manual processes were selected: the weighing and packing process performed by workers after skewer assembly, and the manual batch process of counting randomly delivered frozen foods, packing (both internal and external), and palletizing. The production volume, utilization rate, and number of workers were chosen as verification indicators. As a result of the simulation for improving the 3D process, production increased by 13.5% and 56.8% compared to the existing process, respectively. This was particularly evident in the process of applying palletizing robots. In both processes, as the utilization rate and number of input workers decreased, robots could replace tasks with high worker fatigue, thereby reducing work overload. This study demonstrates the potential to visually compare the process flow improvement using 3D simulations and confirms the possibility of pre-validation for improvement.

Development of a General Occupational Safety and Health (OSH) Guide for Maintenance Work at Electronics Industry Processing Facilities (전자산업 공정 설비 작업 안전보건가이드 개발)

  • Soyeon Kim;Seunghee Lee;Jeongyeon Park;Taek-hyeon Han;Jae-jin Moon;Ingyun Jung;Kyung Ehi Zoh;Seyoung Kwon;Kwang Jae Chung;Dong-Uk Park
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.34 no.1
    • /
    • pp.18-25
    • /
    • 2024
  • Objectives: The primary aim of this study is to create an Occupational Safety and Health (OSH) guide for high-risk maintenance tasks, specifically one designed for maintenance work (MW) in the electronics industry. Methods: The methodology involved a literature review, field investigations, and discussions. An initial draft of the OSH guide was created and then refined through consultations with experts possessing extensive experience in MW for electronic processes. Results: Specific MW tasks within electronics processing facilities identified as high-risk by the research were selected. A comprehensive OSH guide for these tasks was developed consisting of approximately 11 to 12 components and encompassing about 20-25 pages. Implementing safety and health measures before, during, and after MW is crucial for the protection of maintenance personnel. The guide is enriched with real-case scenarios of industrial accidents and occupational diseases to enhance maintenance workers' comprehension of the OSH principles. For a clearer understanding of and adherence to the safety protocols, the guide incorporates visual aids, including cartoons and photographs. Conclusions: This OSH guide is designed to ensure the protection of workers involved in maintenance activities in the electronics industry. It aligns with global standards set by the International Organization for Standardization (ISO) and Semiconductor Equipment and Material International (SEMI) to ensure a high level of safety and compliance.

GPR Development for Landmine Detection (지뢰탐지를 위한 GPR 시스템의 개발)

  • Sato, Motoyuki;Fujiwara, Jun;Feng, Xuan;Zhou, Zheng-Shu;Kobayashi, Takao
    • Geophysics and Geophysical Exploration
    • /
    • v.8 no.4
    • /
    • pp.270-279
    • /
    • 2005
  • Under the research project supported by Japanese Ministry of Education, Culture, Sports, Science and Technology (MEXT), we have conducted the development of GPR systems for landmine detection. Until 2005, we have finished development of two prototype GPR systems, namely ALIS (Advanced Landmine Imaging System) and SAR-GPR (Synthetic Aperture Radar-Ground Penetrating Radar). ALIS is a novel landmine detection sensor system combined with a metal detector and GPR. This is a hand-held equipment, which has a sensor position tracking system, and can visualize the sensor output in real time. In order to achieve the sensor tracking system, ALIS needs only one CCD camera attached on the sensor handle. The CCD image is superimposed with the GPR and metal detector signal, and the detection and identification of buried targets is quite easy and reliable. Field evaluation test of ALIS was conducted in December 2004 in Afghanistan, and we demonstrated that it can detect buried antipersonnel landmines, and can also discriminate metal fragments from landmines. SAR-GPR (Synthetic Aperture Radar-Ground Penetrating Radar) is a machine mounted sensor system composed of B GPR and a metal detector. The GPR employs an array antenna for advanced signal processing for better subsurface imaging. SAR-GPR combined with synthetic aperture radar algorithm, can suppress clutter and can image buried objects in strongly inhomogeneous material. SAR-GPR is a stepped frequency radar system, whose RF component is a newly developed compact vector network analyzers. The size of the system is 30cm x 30cm x 30 cm, composed from six Vivaldi antennas and three vector network analyzers. The weight of the system is 17 kg, and it can be mounted on a robotic arm on a small unmanned vehicle. The field test of this system was carried out in March 2005 in Japan.

Impacts of R&D and Smallness of Scale on the Total Factor Productivity by Industry (R&D와 규모의 영세성이 산업별 총요소생산성에 미치는 영향)

  • Kim, Jung-Hwan;Lee, Dong-Ki;Lee, Bu-Hyung;Joo, Won
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.2 no.4
    • /
    • pp.71-102
    • /
    • 2007
  • There were many comprehensive analyses conducted within the existing research activities wherein factors affecting technology progress including investment in R&D vis-${\Box}$-vis their influences act as the determinants of TFP. Note, however, that there were few comprehensive analysis in the industrial research performed regarding the impact of the economy of scale as it affects TFP; most of these research studies dealt with the analysis of the non -parametric Malmquist productivity index or used the stochastic frontier production function models. No comprehensive analysis on the impacts of individual independent variables affecting TFP was performed. Therefore, this study obtained the TFP increase rate of each industry by analyzing the factors of the existing growth accounting equation and comprehensively analyzed the TFP determinants by constructing a comprehensive analysis model considering the investment in R&D and economy of scale (smallness by industry) as the influencers of TFP by industry. First, for the TFP increase rate of the 15 industries as a whole, the annual average increase rate for 1993${\sim}$ 1997 was approximately 3.8% only; during 1999${\sim}$ 2000 following the foreign exchange crisis, however, the annual increase rate rose to approximately 7.8%. By industry, the annual average increase rate of TFP between 1993 and 2000 stood at 11.6%, the highest in the electrical and electronic equipment manufacturing business and IT manufacturing sector. In contrast, a -0.4% increase rate was recorded in the furniture and other product manufacturing sectors. In the case of the service industry, the TFP increase rate was 7.3% in the transportation, warehousing, and communication sectors. This is much higher than the 2.9% posted in the electricity, water, and gas sectors and -3.7% recorded in the wholesale, food, and hotel businesses. The results of the comprehensive analysis conducted on the determinants of TFP showed that the correlations between R&D and TFP in general were positive (+) correlations whose significance has yet to be validated; in the model where the self-employed and unpaid family workers were used as proxy variables indicating the smallness of industry out of the total number of workers, however, significant negative (-) correlations were noted. On the other hand, the estimation factors of variables surrogating the smallness of scale in each industry showed that a consistently high "smallness of scale" in an industry means a decrease in the increase rate of TFP in the same industry.

  • PDF

Using CR System at the Department of Radiation Oncology PACS Evaluation (방사선 종양학과에서 CR System을 이용한 PACS 유용성 평가)

  • Hong, Seung-Il;Kim, Young-Jae
    • Journal of the Korean Society of Radiology
    • /
    • v.6 no.2
    • /
    • pp.143-149
    • /
    • 2012
  • Today each hospital is trend that change rapidly by up to date, digitization and introducing newest medical treatment equipment. So, we introduce new CR system and supplement film system's shortcoming and PACS, EMR, RTP system's network that is using in hospital harmoniously and accomplish quality improvement of medical treatment and service elevation about business efficiency enlargement and patient Accordingly, we wish to introduce our case that integrate reflex that happen with radiation oncology here upon to PACS using CR system and estimate the availability. We measured that is Gantry, Collimator Star Shot, Light vs. Radiation, HDR QA(Dwell position accuracy) with Medical LINAC(MEVATRON-MX) Then, PACS was implemented on the digital images on the monitor that can be confirmed through the QA. Also, for cooperation with OCS system that is using from present source and impose code that need in treatment in each treatment, did so that Order that connect to network, input to CR may appear, did so that can solve support data mistake (active Pinacle's case supports DICOM3 file from present source but PACS does not support DICOM3 files.) of Pinacle and PACS that is Planning System and look at Planning premier in PACS. All image and data constructed integration to PACS as can refer and conduct premier in Hospital anywhere using CR system. Use Dosimetry IP in Filmless environment and QA's trial such as Light/Radition field size correspondence, gantry rotation axis' accuracy, collimator rotation axis' accuracy, brachy therapy's Dwell position check is available. Business efficiency by decrease and so on of unnecessary human strength consumption was augmented accordingly with session shortening as that integrate premier that is neted with radiation oncology using CR system to PACS. and for the future patient information security is essential.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF