• Title/Summary/Keyword: IP System

Search Result 2,134, Processing Time 0.027 seconds

Evaluation method for interoperability of weapon systems applying natural language processing techniques (자연어처리 기법을 적용한 무기체계의 상호운용성 평가방법)

  • Yong-Gyun Kim;Dong-Hyen Lee
    • Journal of The Korean Institute of Defense Technology
    • /
    • v.5 no.3
    • /
    • pp.8-17
    • /
    • 2023
  • The current weapon system is operated as a complex weapon system with various standards and protocols applied, so there is a risk of failure in smooth information exchange during combined and joint operations on the battlefield. The interoperability of weapon systems to carry out precise strikes on key targets through rapid situational judgment between weapon systems is a key element in the conduct of war. Since the Korean military went into service, there has been a need to change the configuration and improve performance of a large number of software and hardware, but there is no verification system for the impact on interoperability, and there are no related test tools and facilities. In addition, during combined and joint training, errors frequently occur during use after arbitrarily changing the detailed operation method and software of the weapon/power support system. Therefore, periodic verification of interoperability between weapon systems is necessary. To solve this problem, rather than having people schedule an evaluation period and conduct the evaluation once, AI should continuously evaluate the interoperability between weapons and power support systems 24 hours a day to advance warfighting capabilities. To solve these problems, To this end, preliminary research was conducted to improve defense interoperability capabilities by applying natural language processing techniques (①Word2Vec model, ②FastText model, ③Swivel model) (using published algorithms and source code). Based on the results of this experiment, we would like to present a methodology (automated evaluation of interoperability requirements evaluation / level measurement through natural language processing model) to implement an automated defense interoperability evaluation tool without relying on humans.

  • PDF

Development of ATSC3.0 based UHDTV Broadcasting System providing Ultra-high-quality Service that supports HDR/WCG Video and 3D Audio, and a Fixed UHD/Mobile HD Service (HDR/WCG 비디오와 3D 오디오를 지원하는 초고품질 방송서비스와 고정 UHD/이동 HD 방송 서비스를 제공하는 ATSC 3.0 기반 UHDTV 방송 시스템 개발)

  • Ki, Myungseok;Seok, Jinwuk;Beack, Seungkwon;Jang, Daeyoung;Lee, Taejin;Kim, Hui Yong;Oh, Hyeju;Lim, Bo-mi;Bae, Byungjun;Kim, Heung Mook;Choi, Jin Soo
    • Journal of Broadcast Engineering
    • /
    • v.22 no.6
    • /
    • pp.829-849
    • /
    • 2017
  • Due to the large-scale TV display, the convergence of broadcasting and broadband, and the advancement of signal compression and transmission technology, terrestrial digital broadcasting has evolved into UHD broadcasting capable of providing simultaneous broadcasting of fixed UHD and mobile HD. The Korean standard for terrestrial UHDTV broadcasting is based on ATSC 3.0, the broadcasting standard of North America. The terrestrial UHDTV broadcasting standard chose that as a new AV codec standard, HEVC video codec which can compress with higher efficiency compared to AVC, and MPEG-H 3D audio codec for realistic audio. Also, DASH and MMT are adopted as transmission format instead of MPEG-2 TS to support broadband as well as broadcasting network, and in order to provide 4K UHD/mobile HD service simultaneously ROUTE multiplexing technology is applied. In this paper, we propose an audio/video encoder, which is required to provide HDR/WCG supported high quality video service, 10.2 channel/4 object supporting stereo sound service, fixed UHD and mobile HD simultaneous broadcasting service based on ATSC3.0, also we implemented the ATSC 3.0 LDM system for ROUTE/DASH packager, multiplexing system and physical layer transmission/reception, and verified the service ability by applying it to real time broadcast environment.

Comparison of Average Glandular Dose in Screen-Film and Digital Mammography Using Breast Tissue-Equivalent Phantom (유방조직등가 팬텀을 이용한 Screen-Film과 Digital Mammography에서의 평균 유선선량)

  • Shin, Gwi-Soon;Kim, Jung-Min;Kim, You-Hyun;Choi, Jong-Hak;Kim, Chang-Kyun
    • Journal of radiological science and technology
    • /
    • v.30 no.1
    • /
    • pp.13-23
    • /
    • 2007
  • In recent years, mammography system is changed rapidly from conventional screen-film system to digital system for application to screening and diagnosis. Digital mammography system provides several advantages over screen-film mammography system. According to the information provided by the manufacturer, digital mammography system offers radiation dose reduction in comparison with screen-film mammography system, because of digital detector, particularly direct digital detector has higher x-ray absorption efficiency than screen-film combination or imaging plate(IP). We measured average glandular doses(AGD) in screen-film mammography(SFM) system with slow screen-film combination, computed mammography(CM) system, indirect digital mammography(IDM) system and direct digital mammography(DDM) system using brest tissue-equivalent phantom(glandularity 30%, 50% and 70%). The results were shown as follows : AGD values for DDM system were highest than those for other systems. Although automatic exposure control(AEC) mode was selected, the curve of the AGD values against thickness or glandularity increased significantly for the SFM system with the uniform target/filter(Mo/Mo) combination. Therefore, the AGD values for the high energy examinations were highest in the SFM system, and those for the low energy examinations were highest in the DDM system. But the curve of the AGD values against thickness and glandularity increased gently for CM system with the automatic selection of the target/filter combination (from Mo/Mo to Mo/Rh or from Mo/Rh to Rh/Rh), and the AGD values were lowest. Consequently, the parameters in mammography for each exposure besides detection efficiency play an important role in oder to estimate a patient radiation dose.

  • PDF

Implementation of Smart Shopping Cart using Object Detection Method based on Deep Learning (딥러닝 객체 탐지 기술을 사용한 스마트 쇼핑카트의 구현)

  • Oh, Jin-Seon;Chun, In-Gook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.7
    • /
    • pp.262-269
    • /
    • 2020
  • Recently, many attempts have been made to reduce the time required for payment in various shopping environments. In addition, for the Fourth Industrial Revolution era, artificial intelligence is advancing, and Internet of Things (IoT) devices are becoming more compact and cheaper. So, by integrating these two technologies, access to building an unmanned environment to save people time has become easier. In this paper, we propose a smart shopping cart system based on low-cost IoT equipment and deep-learning object-detection technology. The proposed smart cart system consists of a camera for real-time product detection, an ultrasonic sensor that acts as a trigger, a weight sensor to determine whether a product is put into or taken out of the shopping cart, an application for smartphones that provides a user interface for a virtual shopping cart, and a deep learning server where learned product data are stored. Communication between each module is through Transmission Control Protocol/Internet Protocol, a Hypertext Transmission Protocol network, a You Only Look Once darknet library, and an object detection system used by the server to recognize products. The user can check a list of items put into the smart cart via the smartphone app, and can automatically pay for them. The smart cart system proposed in this paper can be applied to unmanned stores with high cost-effectiveness.

A Study on the Promotion Method of Domestic Video Security Industry (국내 영상보안산업 활성화 방안 연구)

  • Yoo, Soonduck;Ryu, Daehyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.3
    • /
    • pp.9-21
    • /
    • 2017
  • The purpose of this study is to identify the current situation and actual condition of the video security industry, The research method was based on interviews with twelve specialists, and examined the market trends, the problems of the video security industry, the improvement plan and the government promotion strategy. The problem with the domestic video security industry is that there are the decline in overseas exports and the slowdown in exports to China, insufficient measures to overcome certification barriers due to the strengthening of national certification system, domestic demand growth slowed, expansion of domestic market share of Chinese products, lack of high-tech development of domestic products, lack of expertise in technology development and operation and inadequate legislation for revitalizing the video security industry. The improvement plan is as follows. Need to implement export expansion support policy, need to build tailored response system for each country, need improvement of security related demand creation system, take measures such as domestic industrial protection policy, certification barriers and tariff barriers, induce future core technology to create high added value. The government also needs to actively support human resources development, and induce stabilization of relevant laws and institutions. This study will contribute to the development of related industries by suggesting the development direction of the video security industry.

Innovation Strategy For New Product Development Process by Indicative Planning & QM Tools (유도계획과 QM 도구들을 활용한 신제품 개발과정의 혁신 전략)

  • Ryu, Ji-Hyun;Jung, Tae Wook;Song, In-Cheol;Oh, Hyun-Seung;Lee, Sae-Jae;Cho, Jin-Hyung
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.4
    • /
    • pp.78-86
    • /
    • 2017
  • The new businesses started by the companies usually results in being unsuccessful. The main reasons for that are either aiming targeting wrong customers, unsatisfaction of customers' requesting quality standards, or taking wrong actions against the competitors in the market. Therefore, companies should aim the targets for the newly developing products based on the fulfilling values for the customers when they start the new businesses, and should take good cares for risk managements at the each step of the new business to prevent the failure in advance. In addition to that, the companies starting new businesses not only need to take the customers attributes (CA) into account, but they also should apply the new technologies as one system to initiate a new business to satisfy the basic wants of the customers. This article suggests the New Product Development Pursuing Model using the Indicative Planning methodology and the Quality Management tools. The New Product Development Pursuing Model would be completed by the following steps as below; 1. Drawing the CTQ (Critical To Quality) for setting up the new product development objectives by : i) using the VOC (Voice Of Customers) obtained by the QFD (Quality Function Deploypment) if the market is mature, ii) applying AHP (Analytic Hierarchy Process) to information in the QIS (Quality Information System) if the market is unmature to get enough need information of the customers. 2. Risk Management in NPD : The NPD pursuing model consisted of the IP (indicative planning) is suggested not by the process of top-down-way mandatory planning process, but by the tools used in the administrative science and economic fields, namely by governance. The companies could apply innovative methodology for new products development processes to fulfil the customers satisfaction in the fields, through the CA (Contingency Approach) of the NPD (New Product Development) process.

Development of a Prototype Patient Monitoring System with Module-Based Bedside Units and Central Stations: Overall Architecture and Specifications (모듈형 환자감시기와 중앙 환자감시기로 구성되는 환자감시시스템 시제품의 개발: 전체구조 및 사양)

  • Woo, E.J.;Park, S.H.;Jun, B.M.;Moon, C.W.;Lee, H.C.;Kim, S.T.;Kim, H.J.;Seo, J.J.;Chae, K.M.;Park, J.C.;Choi, K.H.;Lee, W.J.;Kim, K.S.
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1996 no.05
    • /
    • pp.315-319
    • /
    • 1996
  • We have developed a prototype patient monitoring system including module-based bedside units, interbed network, and central stations. A bedside unit consists of a color monitor and a main CPU unit with peripherals including a module controller. It can also include up to 3 module cases and 21 different modules. In addition to the 3-channel recorder module, six different physiological parameters of ECG, respiration, invasive blood pressure, noninvasive blood pressure, body temperature, and arterial pulse oximetry with plethysmogaph are provided as parameter modules. Modules and a module controller communicate with up to 1Mbps data rate through an intrabed network based on RS-485 and HDLC protocol. Bedside units can display up to 12 channels of waveforms with any related numeric informations simultaneously. At the same time, it communicates with other bedside units and central stations through interbed network based on 10Mbps Ethernet and TCP/IP protocol. Software far bedside units and central stations fully utilizes gaphical user interface techniques and all functions are controlled by a rotate/push button on bedside unit and a mouse on central station. The entire system satisfies the requirements of AAMI and ANSI standards in terms of electrical safety and performances. In order to accommodate more advanced data management capabilities such as 24-hour full disclosure, we are developing a relational database server dedicated to the patient monitoring system. We are also developing a clinical workstation with which physicians can review and examine the data from patients through various kinds of computer networks far diagnosis and report generation. Portable bedside units with LCD display and wired or wireless data communication capability will be developed in the near future. New parameter modules including cardiac output, capnograph, and other gas analysis functions will be added.

  • PDF

The MTF Measurement of the Conventional X-ray System by using the Computed Radiography (CR을 이용한 일반촬영장치의 MTF 측정)

  • Kim, Chang-Bok
    • Journal of radiological science and technology
    • /
    • v.28 no.2
    • /
    • pp.111-115
    • /
    • 2005
  • The quality of image from the system that creates medical images by using X-ray depends on the various different reasons such as the X-ray generator, the subject and the image transmission medium. In other words, thereare various factors existing that can influence on the quality of image from the moment when the X-ray is generated and until the final image is created. Therefore, the operator who creates images at the clinical site should make continuous evaluation and observation from the final image. There are various methods of evaluating the medical images, but it is assumed that the MTF measurement method can be suitable for measuring actual or effective resolution. So in this study, the MTF measurement method by using X-ray film has been avoided and the MTF features according to the deterioration of the X-ray system have been measured by using the software (the program used Borland C++ builder software and LEAD tools software) that can measure the MTF of the digital medical images. As the result of this measurement, it has been found out through the MTF graph that the resolution and sharpness from the old x-ray generator with a many years of using and many numbers of times of using were deteriorated for the quality of image comparing to those from the new system. Also a simple and easy measurement method for the MTF from the digital medical images can be obtained in this study.

  • PDF

A study for Information Security Risk Assessment Methodology Improvement by blockade and security system level assessment (봉쇄와 보안장비 수준평가를 통한 정보보호 위험평가 개선 연구)

  • Han, Choong-Hee;Han, ChangHee
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.187-196
    • /
    • 2020
  • In order to manage information security risk, various information security level evaluation and information security management system certification have been conducted on a larger scale than ever. However, there are continuous cases of infringement of information protection for companies with excellent information security evaluation and companies with excellent information security management system certification. The existing information security risk management methodology identifies and analyzes risks by identifying information assets inside the information system. Existing information security risk management methodology lacks a review of where cyber threats come from and whether security devices are properly operated for each route. In order to improve the current risk management plan, it is necessary to look at where cyber threats come from and improve the containment level for each inflow section to absolutely reduce unnecessary cyber threats. In addition, it is essential to measure and improve the appropriate configuration and operational level of security equipment that is currently overlooked in the risk management methodology. It is necessary to block and enter cyber threats as much as possible, and to detect and respond to cyber threats that inevitably pass through open niches and use security devices. Therefore, this paper proposes additional evaluation items for evaluating the containment level against cyber threats in the ISMS-P authentication items and vulnerability analysis and evaluation items for major information and communication infrastructures, and evaluates the level of security equipment configuration for each inflow.

Ubiquitous-Based Mobile Control and Monitoring of CNC Machines for Development of u-Machine

  • Kim Dong-Hoon;Song Jun-Yeob
    • Journal of Mechanical Science and Technology
    • /
    • v.20 no.4
    • /
    • pp.455-466
    • /
    • 2006
  • This study was an attempt to control and monitor Computerized Numerical Controller (CNC) machines anywhere and anytime for the development of a ubiquitous machine (u-machine). With a Personal Digital Assistant (PDA) phone, the machine status and machining data of CNC machines can be monitored in wired and wireless environments, including the environments of IMT2000 and Wireless LAN. Moreover, CNC machines can be controlled anywhere and anytime. The concept of the anywhere-anytime controlling and monitoring of a manufacturing system was implemented in this study for the purpose of u-manufacturing and u-machines. In this concept, the communication between the CNC controller and the PDA phone was successfully performed anywhere and anytime for the real-time monitoring and control of CNC machines. In addition, the interface between the CNC controller and the developed application module was implemented by Object linking and embedding for Process Control (OPC) and shared CNC memory. For communication, the design of a server contents module within the target CNC was based on a TCP/IP. Furthermore, the client contents module within the PDA phone was designed with the aid of embedded c++ programming for mobile communication. For the interface, the monitoring data, such as the machine status, the machine running state, the name of the Numerical Control (NC) program, the alarm and the position of the stage axes, were acquired in real time from real machines with the aid of the OPC method and by sharing the CNC memory. The control data, such as the start, hold, emergency stop, reserved start and reserved stop, were also applied to the CNC domain of the real machine. CNC machines can therefore be controlled and monitored in real time, anywhere and anytime. Moreover, prompt notification from CNC machines to mobile phones, including cellular phones and PDA phones, can be automatically realized in emergencies.