Journal of The Korean Institute of Defense Technology
/
v.5
no.3
/
pp.8-17
/
2023
The current weapon system is operated as a complex weapon system with various standards and protocols applied, so there is a risk of failure in smooth information exchange during combined and joint operations on the battlefield. The interoperability of weapon systems to carry out precise strikes on key targets through rapid situational judgment between weapon systems is a key element in the conduct of war. Since the Korean military went into service, there has been a need to change the configuration and improve performance of a large number of software and hardware, but there is no verification system for the impact on interoperability, and there are no related test tools and facilities. In addition, during combined and joint training, errors frequently occur during use after arbitrarily changing the detailed operation method and software of the weapon/power support system. Therefore, periodic verification of interoperability between weapon systems is necessary. To solve this problem, rather than having people schedule an evaluation period and conduct the evaluation once, AI should continuously evaluate the interoperability between weapons and power support systems 24 hours a day to advance warfighting capabilities. To solve these problems, To this end, preliminary research was conducted to improve defense interoperability capabilities by applying natural language processing techniques (①Word2Vec model, ②FastText model, ③Swivel model) (using published algorithms and source code). Based on the results of this experiment, we would like to present a methodology (automated evaluation of interoperability requirements evaluation / level measurement through natural language processing model) to implement an automated defense interoperability evaluation tool without relying on humans.
Ki, Myungseok;Seok, Jinwuk;Beack, Seungkwon;Jang, Daeyoung;Lee, Taejin;Kim, Hui Yong;Oh, Hyeju;Lim, Bo-mi;Bae, Byungjun;Kim, Heung Mook;Choi, Jin Soo
Journal of Broadcast Engineering
/
v.22
no.6
/
pp.829-849
/
2017
Due to the large-scale TV display, the convergence of broadcasting and broadband, and the advancement of signal compression and transmission technology, terrestrial digital broadcasting has evolved into UHD broadcasting capable of providing simultaneous broadcasting of fixed UHD and mobile HD. The Korean standard for terrestrial UHDTV broadcasting is based on ATSC 3.0, the broadcasting standard of North America. The terrestrial UHDTV broadcasting standard chose that as a new AV codec standard, HEVC video codec which can compress with higher efficiency compared to AVC, and MPEG-H 3D audio codec for realistic audio. Also, DASH and MMT are adopted as transmission format instead of MPEG-2 TS to support broadband as well as broadcasting network, and in order to provide 4K UHD/mobile HD service simultaneously ROUTE multiplexing technology is applied. In this paper, we propose an audio/video encoder, which is required to provide HDR/WCG supported high quality video service, 10.2 channel/4 object supporting stereo sound service, fixed UHD and mobile HD simultaneous broadcasting service based on ATSC3.0, also we implemented the ATSC 3.0 LDM system for ROUTE/DASH packager, multiplexing system and physical layer transmission/reception, and verified the service ability by applying it to real time broadcast environment.
In recent years, mammography system is changed rapidly from conventional screen-film system to digital system for application to screening and diagnosis. Digital mammography system provides several advantages over screen-film mammography system. According to the information provided by the manufacturer, digital mammography system offers radiation dose reduction in comparison with screen-film mammography system, because of digital detector, particularly direct digital detector has higher x-ray absorption efficiency than screen-film combination or imaging plate(IP). We measured average glandular doses(AGD) in screen-film mammography(SFM) system with slow screen-film combination, computed mammography(CM) system, indirect digital mammography(IDM) system and direct digital mammography(DDM) system using brest tissue-equivalent phantom(glandularity 30%, 50% and 70%). The results were shown as follows : AGD values for DDM system were highest than those for other systems. Although automatic exposure control(AEC) mode was selected, the curve of the AGD values against thickness or glandularity increased significantly for the SFM system with the uniform target/filter(Mo/Mo) combination. Therefore, the AGD values for the high energy examinations were highest in the SFM system, and those for the low energy examinations were highest in the DDM system. But the curve of the AGD values against thickness and glandularity increased gently for CM system with the automatic selection of the target/filter combination (from Mo/Mo to Mo/Rh or from Mo/Rh to Rh/Rh), and the AGD values were lowest. Consequently, the parameters in mammography for each exposure besides detection efficiency play an important role in oder to estimate a patient radiation dose.
Journal of the Korea Academia-Industrial cooperation Society
/
v.21
no.7
/
pp.262-269
/
2020
Recently, many attempts have been made to reduce the time required for payment in various shopping environments. In addition, for the Fourth Industrial Revolution era, artificial intelligence is advancing, and Internet of Things (IoT) devices are becoming more compact and cheaper. So, by integrating these two technologies, access to building an unmanned environment to save people time has become easier. In this paper, we propose a smart shopping cart system based on low-cost IoT equipment and deep-learning object-detection technology. The proposed smart cart system consists of a camera for real-time product detection, an ultrasonic sensor that acts as a trigger, a weight sensor to determine whether a product is put into or taken out of the shopping cart, an application for smartphones that provides a user interface for a virtual shopping cart, and a deep learning server where learned product data are stored. Communication between each module is through Transmission Control Protocol/Internet Protocol, a Hypertext Transmission Protocol network, a You Only Look Once darknet library, and an object detection system used by the server to recognize products. The user can check a list of items put into the smart cart via the smartphone app, and can automatically pay for them. The smart cart system proposed in this paper can be applied to unmanned stores with high cost-effectiveness.
The Journal of the Institute of Internet, Broadcasting and Communication
/
v.17
no.3
/
pp.9-21
/
2017
The purpose of this study is to identify the current situation and actual condition of the video security industry, The research method was based on interviews with twelve specialists, and examined the market trends, the problems of the video security industry, the improvement plan and the government promotion strategy. The problem with the domestic video security industry is that there are the decline in overseas exports and the slowdown in exports to China, insufficient measures to overcome certification barriers due to the strengthening of national certification system, domestic demand growth slowed, expansion of domestic market share of Chinese products, lack of high-tech development of domestic products, lack of expertise in technology development and operation and inadequate legislation for revitalizing the video security industry. The improvement plan is as follows. Need to implement export expansion support policy, need to build tailored response system for each country, need improvement of security related demand creation system, take measures such as domestic industrial protection policy, certification barriers and tariff barriers, induce future core technology to create high added value. The government also needs to actively support human resources development, and induce stabilization of relevant laws and institutions. This study will contribute to the development of related industries by suggesting the development direction of the video security industry.
Journal of Korean Society of Industrial and Systems Engineering
/
v.40
no.4
/
pp.78-86
/
2017
The new businesses started by the companies usually results in being unsuccessful. The main reasons for that are either aiming targeting wrong customers, unsatisfaction of customers' requesting quality standards, or taking wrong actions against the competitors in the market. Therefore, companies should aim the targets for the newly developing products based on the fulfilling values for the customers when they start the new businesses, and should take good cares for risk managements at the each step of the new business to prevent the failure in advance. In addition to that, the companies starting new businesses not only need to take the customers attributes (CA) into account, but they also should apply the new technologies as one system to initiate a new business to satisfy the basic wants of the customers. This article suggests the New Product Development Pursuing Model using the Indicative Planning methodology and the Quality Management tools. The New Product Development Pursuing Model would be completed by the following steps as below; 1. Drawing the CTQ (Critical To Quality) for setting up the new product development objectives by : i) using the VOC (Voice Of Customers) obtained by the QFD (Quality Function Deploypment) if the market is mature, ii) applying AHP (Analytic Hierarchy Process) to information in the QIS (Quality Information System) if the market is unmature to get enough need information of the customers. 2. Risk Management in NPD : The NPD pursuing model consisted of the IP (indicative planning) is suggested not by the process of top-down-way mandatory planning process, but by the tools used in the administrative science and economic fields, namely by governance. The companies could apply innovative methodology for new products development processes to fulfil the customers satisfaction in the fields, through the CA (Contingency Approach) of the NPD (New Product Development) process.
We have developed a prototype patient monitoring system including module-based bedside units, interbed network, and central stations. A bedside unit consists of a color monitor and a main CPU unit with peripherals including a module controller. It can also include up to 3 module cases and 21 different modules. In addition to the 3-channel recorder module, six different physiological parameters of ECG, respiration, invasive blood pressure, noninvasive blood pressure, body temperature, and arterial pulse oximetry with plethysmogaph are provided as parameter modules. Modules and a module controller communicate with up to 1Mbps data rate through an intrabed network based on RS-485 and HDLC protocol. Bedside units can display up to 12 channels of waveforms with any related numeric informations simultaneously. At the same time, it communicates with other bedside units and central stations through interbed network based on 10Mbps Ethernet and TCP/IP protocol. Software far bedside units and central stations fully utilizes gaphical user interface techniques and all functions are controlled by a rotate/push button on bedside unit and a mouse on central station. The entire system satisfies the requirements of AAMI and ANSI standards in terms of electrical safety and performances. In order to accommodate more advanced data management capabilities such as 24-hour full disclosure, we are developing a relational database server dedicated to the patient monitoring system. We are also developing a clinical workstation with which physicians can review and examine the data from patients through various kinds of computer networks far diagnosis and report generation. Portable bedside units with LCD display and wired or wireless data communication capability will be developed in the near future. New parameter modules including cardiac output, capnograph, and other gas analysis functions will be added.
The quality of image from the system that creates medical images by using X-ray depends on the various different reasons such as the X-ray generator, the subject and the image transmission medium. In other words, thereare various factors existing that can influence on the quality of image from the moment when the X-ray is generated and until the final image is created. Therefore, the operator who creates images at the clinical site should make continuous evaluation and observation from the final image. There are various methods of evaluating the medical images, but it is assumed that the MTF measurement method can be suitable for measuring actual or effective resolution. So in this study, the MTF measurement method by using X-ray film has been avoided and the MTF features according to the deterioration of the X-ray system have been measured by using the software (the program used Borland C++ builder software and LEAD tools software) that can measure the MTF of the digital medical images. As the result of this measurement, it has been found out through the MTF graph that the resolution and sharpness from the old x-ray generator with a many years of using and many numbers of times of using were deteriorated for the quality of image comparing to those from the new system. Also a simple and easy measurement method for the MTF from the digital medical images can be obtained in this study.
In order to manage information security risk, various information security level evaluation and information security management system certification have been conducted on a larger scale than ever. However, there are continuous cases of infringement of information protection for companies with excellent information security evaluation and companies with excellent information security management system certification. The existing information security risk management methodology identifies and analyzes risks by identifying information assets inside the information system. Existing information security risk management methodology lacks a review of where cyber threats come from and whether security devices are properly operated for each route. In order to improve the current risk management plan, it is necessary to look at where cyber threats come from and improve the containment level for each inflow section to absolutely reduce unnecessary cyber threats. In addition, it is essential to measure and improve the appropriate configuration and operational level of security equipment that is currently overlooked in the risk management methodology. It is necessary to block and enter cyber threats as much as possible, and to detect and respond to cyber threats that inevitably pass through open niches and use security devices. Therefore, this paper proposes additional evaluation items for evaluating the containment level against cyber threats in the ISMS-P authentication items and vulnerability analysis and evaluation items for major information and communication infrastructures, and evaluates the level of security equipment configuration for each inflow.
This study was an attempt to control and monitor Computerized Numerical Controller (CNC) machines anywhere and anytime for the development of a ubiquitous machine (u-machine). With a Personal Digital Assistant (PDA) phone, the machine status and machining data of CNC machines can be monitored in wired and wireless environments, including the environments of IMT2000 and Wireless LAN. Moreover, CNC machines can be controlled anywhere and anytime. The concept of the anywhere-anytime controlling and monitoring of a manufacturing system was implemented in this study for the purpose of u-manufacturing and u-machines. In this concept, the communication between the CNC controller and the PDA phone was successfully performed anywhere and anytime for the real-time monitoring and control of CNC machines. In addition, the interface between the CNC controller and the developed application module was implemented by Object linking and embedding for Process Control (OPC) and shared CNC memory. For communication, the design of a server contents module within the target CNC was based on a TCP/IP. Furthermore, the client contents module within the PDA phone was designed with the aid of embedded c++ programming for mobile communication. For the interface, the monitoring data, such as the machine status, the machine running state, the name of the Numerical Control (NC) program, the alarm and the position of the stage axes, were acquired in real time from real machines with the aid of the OPC method and by sharing the CNC memory. The control data, such as the start, hold, emergency stop, reserved start and reserved stop, were also applied to the CNC domain of the real machine. CNC machines can therefore be controlled and monitored in real time, anywhere and anytime. Moreover, prompt notification from CNC machines to mobile phones, including cellular phones and PDA phones, can be automatically realized in emergencies.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.