• Title/Summary/Keyword: IT Techniques

Search Result 13,579, Processing Time 0.045 seconds

Application of Creativity Techniques to New Product Development (신제품개발에 있어서 창조성기법의 활용에 관한 연구)

  • 박영택;김성대
    • Journal of Korean Society for Quality Management
    • /
    • v.26 no.4
    • /
    • pp.202-218
    • /
    • 1998
  • It is well-known that leading firms are more innovative than others, with far more sales from new products. This paper suggests that what kinds of creatively techniques can be a, pp.ied to new product development process for the purpose of commercial success. Both divergent and convergent techniques are considered at each stage of new product development process. Some typical creativity techniques such as boundary examination, bug list, manipulative verbs, morphological analysis, SCAMPER, and TRIZ are explained with case examples.

  • PDF

Micro Mold System for Functional Polymer (기능성 고분자소재 성형용 마이크로 금형 시스템)

  • Heo Y. M.;Shin K. H.;Yoon G. S.;Jung W. C.
    • Proceedings of the Korean Society for Technology of Plasticity Conference
    • /
    • 2004.10a
    • /
    • pp.267-270
    • /
    • 2004
  • In Micro injection process, it is needed to the technique of making micro die, Rapid Thermal Pressing (RTP) and other techniques. Those techniques are independent. But the mutual connected system of techniques is needed. The target of this paper is the design of micro mold and the development of the entire micro injection techniques for functional polymer.

  • PDF

Blockchain-based SCADA system security (블록체인 기반의 SCADA 시스템 보안)

  • Ji, Seungwon;Lee, Wongi;Ko, TaeGwang;Park, Sohee;Oh, Gooyeon;Kim, Jongmin;Kim, DongMin
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.55-61
    • /
    • 2019
  • This paper studied security measures to protect the SCADA network from the increasingly sophisticated threats. Currently, SCADA system security uses methods that are almost like regular IT security systems. While there may be some common security techniques, security techniques are needed only for SCADA systems that are different from typical IT systems. Therefore, this paper will explore the security techniques currently used in SCADA systems, and the problems that arise when the current security techniques are used will be identified through the damage cases resulting from attacks in SCADA systems. Finally, as a new solution to ensure the availability and integrity required for current SCADA systems, we proposed linking Blockchain and SCADA systems.

Applications of artificial intelligence and data mining techniques in soil modeling

  • Javadi, A.A.;Rezania, M.
    • Geomechanics and Engineering
    • /
    • v.1 no.1
    • /
    • pp.53-74
    • /
    • 2009
  • In recent years, several computer-aided pattern recognition and data mining techniques have been developed for modeling of soil behavior. The main idea behind a pattern recognition system is that it learns adaptively from experience and is able to provide predictions for new cases. Artificial neural networks are the most widely used pattern recognition methods that have been utilized to model soil behavior. Recently, the authors have pioneered the application of genetic programming (GP) and evolutionary polynomial regression (EPR) techniques for modeling of soils and a number of other geotechnical applications. The paper reviews applications of pattern recognition and data mining systems in geotechnical engineering with particular reference to constitutive modeling of soils. It covers applications of artificial neural network, genetic programming and evolutionary programming approaches for soil modeling. It is suggested that these systems could be developed as efficient tools for modeling of soils and analysis of geotechnical engineering problems, especially for cases where the behavior is too complex and conventional models are unable to effectively describe various aspects of the behavior. It is also recognized that these techniques are complementary to conventional soil models rather than a substitute to them.

Analysing and Neutralizing the Stuxnet's Stealthing Techniques (Stuxnet의 파일 은닉 기법 분석 및 무력화 방법 연구)

  • Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.6
    • /
    • pp.838-844
    • /
    • 2010
  • This paper introduces Stuxnet, a malicious ware that presently stimulates severity of the cyber warfare worldwide, analyses how it propagates and what it affects if infected and proposes a process to cure infected systems according to its organization. Malicious wares such as Stuxnet secretes themselves within the system during propagation and it is required to analyze file hiding techniques they use to detect and remove them. According to the result of the analysis in this paper, Stuxnet uses the library hooking technique and the file system filter driver technique on both user level and kernel level, respectively, to hide its files. Therefore, this paper shows the results of the Stuxnet's file hiding approach and proposes an idea for countermeasure to neutralize it. A pilot implementation of the idea afterward shows that the stealthing techniques of Stuxnet are removed by the implementation.

Review for Remediation Techniques of Contaminated Soil with Heavy Metals (중금속 오염토양의 복원기술에 대한 고찰)

  • Jeon, Choong
    • Journal of the Korea Organic Resources Recycling Association
    • /
    • v.21 no.3
    • /
    • pp.53-63
    • /
    • 2013
  • It is well known that problem for contaminated soil with heavy metals is mainly produced from agricultural land around abandoned metal mine and the cost to solve them is much higher than those of water and air pollution in addition, it takes much more time to clarify the contaminated soil. Until now, economical and practical many techniques to remediate contaminated soils with heavy metals have been developed and proposed. Therefore, in this study, characteristic, merit and weakness for various techniques which are developing and commercializing recently in domestic/foreign country will be reviewed.

A PRACTICAL LOOK AT MONTE CARLO VARIANCE REDUCTION METHODS IN RADIATION SHIELDING

  • Olsher Richard H.
    • Nuclear Engineering and Technology
    • /
    • v.38 no.3
    • /
    • pp.225-230
    • /
    • 2006
  • With the advent of inexpensive computing power over the past two decades, applications of Monte Carlo radiation transport techniques have proliferated dramatically. At Los Alamos, the Monte Carlo codes MCNP5 and MCNPX are used routinely on personal computer platforms for radiation shielding analysis and dosimetry calculations. These codes feature a rich palette of variance reduction (VR) techniques. The motivation of VR is to exchange user efficiency for computational efficiency. It has been said that a few hours of user time often reduces computational time by several orders of magnitude. Unfortunately, user time can stretch into the many hours as most VR techniques require significant user experience and intervention for proper optimization. It is the purpose of this paper to outline VR strategies, tested in practice, optimized for several common radiation shielding tasks, with the hope of reducing user setup time for similar problems. A strategy is defined in this context to mean a collection of MCNP radiation transport physics options and VR techniques that work synergistically to optimize a particular shielding task. Examples are offered in the areas of source definition, skyshine, streaming, and transmission.

Recovery Methods in Main Memory DBMS

  • Kim, Jeong-Joon;Kang, Jeong-Jin;Lee, Ki-Young
    • International journal of advanced smart convergence
    • /
    • v.1 no.2
    • /
    • pp.26-29
    • /
    • 2012
  • Recently, to efficiently support the real-time requirements of RTLS( Real Time Location System) services, interest in the main memory DBMS is rising. In the main memory DBMS, because all data can be lost when the system failure happens, the recovery method is very important for the stability of the database. Especially, disk I/O in executing the log and the checkpoint becomes the bottleneck of letting down the total system performance. Therefore, it is urgently necessary to research about the recovery method to reduce disk I/O in the main memory DBMS. Therefore, In this paper, we analyzed existing log techniques and check point techniques and existing main memory DBMSs' recovery techniques for recovery techniques research for main memory DBMS.

Detecting DNA hydroxymethylation: exploring its role in genome regulation

  • Sun-Min Lee
    • BMB Reports
    • /
    • v.57 no.3
    • /
    • pp.135-142
    • /
    • 2024
  • DNA methylation is one of the most extensively studied epigenetic regulatory mechanisms, known to play crucial roles in various organisms. It has been implicated in the regulation of gene expression and chromatin changes, ranging from global alterations during cell state transitions to locus-specific modifications. 5-hydroxymethylcytosine (5hmC) is produced by a major oxidation, from 5-methylcytosine (5mC), catalyzed by the ten-eleven translocation (TET) enzymes, and is gradually being recognized for its significant role in genome regulation. With the development of state-of-the-art experimental techniques, it has become possible to detect and distinguish 5mC and 5hmC at base resolution. Various techniques have evolved, encompassing chemical and enzymatic approaches, as well as third-generation sequencing techniques. These advancements have paved the way for a thorough exploration of the role of 5hmC across a diverse array of cell types, from embryonic stem cells (ESCs) to various differentiated cells. This review aims to comprehensively report on recent techniques and discuss the emerging roles of 5hmC.

Selection of the Optimum Working Condition for Hydraulic Actuator Parts using Statistical Techniques (통계적 기법을 이용한 유압구동 부재의 최적 작동조건의 선정)

  • 류을현;배효준;서영백;박흥식
    • Tribology and Lubricants
    • /
    • v.20 no.1
    • /
    • pp.21-26
    • /
    • 2004
  • The average frictional coefficient was used generally to analyze the working process of the lubricated machine parts. But it is difficult of taking the correct frictional coefficient because the average frictional coefficient of it is progressed always unstably with a large amplitude on working condition. If the correct analysis of frictional coefficient on working condition for the lubricated machine parts can be possible, it can be effect on condition diagnosis of lubricated machine system. This study was carried out to get the optimum working condition of the hydraulic actuator parts using statistical techniques. From this result, it has the lowest friction coefficient in case of applied load of 3 kg and sliding speed of 120 mm/sec.