• Title/Summary/Keyword: Identification Infrastructure

Search Result 194, Processing Time 0.027 seconds

PBIS: A Pre-Batched Inspection Strategy for spent nuclear fuel inspection robot

  • Bongsub Song;Jongwon Park;Dongwon Yun
    • Nuclear Engineering and Technology
    • /
    • v.55 no.12
    • /
    • pp.4695-4702
    • /
    • 2023
  • Nuclear power plants play a pivotal role in the global energy infrastructure, fulfilling a substantial share of the world's energy requirements in a sustainable way. The management of these facilities, especially the handling of spent nuclear fuel (SNF), necessitates meticulous inspections to guarantee operational safety and efficiency. However, the prevailing inspection methodologies lean heavily on human operators, which presents challenges due to the potential hazards of the SNF environment. This study introduces the design of a novel Pre-Batched Inspection Strategy (PBIS) that integrates robotic automation and image processing techniques to bolster the inspection process. This methodology deploys robotics to undertake tasks that could be perilous or time-intensive for humans, while image processing techniques are used for precise identification of SNF targets and regulating the robotic system. The implementation of PBIS holds considerable promise in minimizing inspection time and enhancing worker safety. This paper elaborates on the structure, capabilities, and application of PBIS, underlining its potential implications for the future of nuclear energy inspections.

Service Identification of Component-Based System for Service-Oriented Architecture (서비스 지향 아키텍처를 위한 컴포넌트기반 시스템의 서비스 식별)

  • Lee, Hyeon-Joo;Choi, Byoung-Ju;Lee, Jung-Won
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.2
    • /
    • pp.70-80
    • /
    • 2008
  • Today, businesses have to respond with flexibility and speed to ever-changing customer demand and market opportunities. Service-oriented architecture (SOA) is the best methodology for minimizing the complexity and the cost of enterprise-level infrastructure and for maximizing the productivity and the flexibility of an enterprise. Most of the enterprise-level SOA delivery strategies deal with the top-down approach, which organization has to define the business processes, to model business services, and to find the required services or to develop new services. However, a lot of peoples want to maximally reuse legacy component-based systems as well as to deliver SOA into their organizations. In this paper, we propose a bottom-up approach for identifying business services with proper granularity. It can improve the reusability and maintenance of services by considering not data I/O of components of legacy applications but GUI event patterns. Our proposed method is applied to MIS with 129 GUIs and 13 components. As a result, the valiance of the coupling value of components is increased five times and three business services are distinctly exposed. It also provides a 49% improvement in reducing the relationship problems between services over a service identification method using only partitioning information of components.

A Study on the Major Symptoms by Each Pattern of Acne Vulgaris (여드름의 변증 유형별 주요 증후에 관한 연구)

  • Jeong, Woo-Yeol;Hong, Eu-Gene;Shin, Jun-Hyuk;Kim, Yoon-Bum;Nam, Hae-Jung;Kim, Kyu-Seok;Lee, Jun-Hee
    • The Journal of Korean Medicine Ophthalmology and Otolaryngology and Dermatology
    • /
    • v.27 no.4
    • /
    • pp.76-86
    • /
    • 2014
  • Objective : This study was performed to find out the differential points of the pattern identification for Acne vulgaris and suggest them to the clinic setting Methods : We searched the papers that suggest patterns identification for Acne vulgaris through China National Knowledge Infrastructure(CNKI), Oriental Medicine Advanced Searching Integrated System(OASIS), Korean Traditional Knowledge Portal(KTKP), Korean Studies Information Service System(KISS). We looked through all the papers, excluded unintended papers, and finally chose some papers that are suitable for inclusion. Then, We extracted all the patterns of Acne vulgaris and chose frequently suggested patterns. Finally we extracted symptoms from selected patterns and arranged them in order of frequency. Results and Conclusions : 1. We found 215 papers and chose 17 papers (Korean : 6, Chinese : 11). 2. We extracted total 67 demonstrations and chose Patterns of Wind-Heat, Damp-Heat, Phlegm and Static blood, Disharmony of the Thoroughfare and Controlling vessels. 3. In Acne vulgaris, the pattern of Wind-Heat tends to have a red papule, sometimes pustule, pain with itching, burning sensation, tidal reddening of the cheeks, white head or black head. The pattern of Damp-Heat tends to have a pustule, node, redness and swelling, pain and greasy skin. The pattern of Phlegm and Static blood has a tendency to be a nodule or cystoma that is hard, dark, painful, long lasting and hard to recover and easy to recur with a scar, pimple, pigmentation. The pattern of Disharmony of the Thoroughfare and Controlling vessels tends to be exacerbated before menstruation, have a small papule that is not easily treated under the chin or around the mouth.

A Study on the Improvement of Airspace Legislation in Korea (우리나라 공역 법제의 개선방안)

  • Kim, Jong-Dae
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.33 no.2
    • /
    • pp.61-114
    • /
    • 2018
  • Recently airspace became a hot issue considering today's international relations. However, there was no data that could be fully explained about a legal system of korean airspace, so I looked at law and practice about korean airspace together. The nation's aviation law sector is comletely separate from those related to civil and military aircraft, at least in legal terms. The Minister of Land, Infrastructure and Transport shall carry out his/her duties with various authority granted by the "Aviation Safety Act". The nation's aviation-related content is being regulated too much by the Ministry of Land, Infrastructure and Transport's notice or regulation, and there are many things that are not well known about which clauses of the upper law are associated with. The notice should be clearly described only in detail on delegated matters. As for the airspace system, the airspace system is too complex for the public to understand, and there seems to be a gap between law and practice. Therefore, I think it would be good to reestablish a simple and practical airspace system. Airspace and aviation related tasks in the military need to be clearly understood by distinguishing between those entrusted by the Minister of Land, Infrastructure and Transport and those inherent in the military. Regarding matters entrusted by the Minister of Land, Infrastructure and Transpor, it is necessary to work closely with the Minister of Land, Infrastructure and Transport when preparing related work guidelines, and to clarify who should prepare the guidelines. Regarding airspace control as a military operation, policies or guidelines that are faithful to military doctrine on airspace control are needed.

A Study on Obtaining Feedback Function of Disaster Information Management using Information & Communication Technology (ICT기술을 이용한 방재정보 관리의 환류기능 확보에 관한 연구)

  • Ko, Jaesun
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.1
    • /
    • pp.73-88
    • /
    • 2015
  • Due to the cases of recent global warming and unusual weather etc., large-scale natural disasters such as typhoons, floods, snow damage occur frequently across the continents such as Southeast Asia and North America, South America etc. and risks of earthquakes and tsunami are also increasing gradually in Korea which has been regarded as a safe zone and disaster types are also being diversified such as typhoons, floods, heat waves, heavy snow and damage scale is also enlarged. In addition, due to geographical characteristics or lack of infrastructure, disasters tended to occur intensively around a specific region or city in the past but disasters occur throughout the country in recent years so preparation for disaster prevention has emerged as an urgent challenge issue. Therefore, considering that the plan of obtaining the effective feedback function of disaster Information is very important in the proactive and software aspects for disaster reduction, this paper analyzed this three aspects of contents, procedural and contextual aspects and proposed the plan. First, in the content aspect, building disaster prevention information communication Infrastructure, building urban and regional disaster prevention system, obtaining concurrency and sharing of information and second, in the procedural aspect, active utilization of ICT(Information and Communication Technology) of the prevention stage, disaster prevention information collection and analysis reinforcement of the preparation stage, improvement of decision-making structure and field command system of the response stage, recovery system related information promotion of the recovery stage were proposed as alternatives and finally, in the contextual aspect, if disaster prevention information is effectively managed through maintenance of disaster prevention information related systems, obtaining domainality by disaster prevention work, improvement of the ability to judge the situation, obtaining comprehensive and feedback function etc, it is considered to significantly contribute to reducing natural disasters.

The Identified Self: Location-Based Technologies, Surveillance, and Non-place (식별되는 자: 위치기반기술, 원격성과 감시의 문제, 그리고 비-장소(non-place))

  • Yi, Doogab
    • Journal of Science and Technology Studies
    • /
    • v.16 no.2
    • /
    • pp.1-31
    • /
    • 2016
  • This essay examines the recent proliferation of location-based services (LBS) within the context the expansion of the technologies of remote identification, monitoring, and tracking. Following the spatial turn in the social sciences, this essay aims to analyze LBS as a surveillance technology that can re-shape the spatial configuration of its users and their identity. The analytic focus of this essay is on LBS within the global information infrastructure, and it utilizes key LBS examples in the US and South Korea. First, as a way to discuss the technical possibilities of LBS for spatial coordination and surveillance, this essay investigates its technical architecture in terms of information flow. It then discusses the issue of privacy in LBS by analyzing some of its key legal and regulatory issues. The combination of the global information infrastructure with location-related technologies has enabled LBS companies to expand the scope of surveillance over the ever-increasing computer-mediated activities, prompting heated discussions over whether LBS is capturing "Every Moment in Your Life." This essay concludes with a discussion on how location technologies have provided a key platform for the rise of surveillance capitalism through the creation of what Marc $Aug{\acute{e}}$ called a "non-place," a place where the identified self is constituted by LBS.

Location Tracking and Visualization of Dynamic Objects using CCTV Images (CCTV 영상을 활용한 동적 객체의 위치 추적 및 시각화 방안)

  • Park, Sang-Jin;Cho, Kuk;Im, Junhyuck;Kim, Minchan
    • Journal of Cadastre & Land InformatiX
    • /
    • v.51 no.1
    • /
    • pp.53-65
    • /
    • 2021
  • C-ITS(Cooperative Intelligent Transport System) that pursues traffic safety and convenience uses various sensors to generate traffic information. Therefore, it is necessary to improve the sensor-related technology to increase the efficiency and reliability of the traffic information. Recently, the role of CCTV in collecting video information has become more important due to advances in AI(Artificial Intelligence) technology. In this study, we propose to identify and track dynamic objects(vehicles, people, etc.) in CCTV images, and to analyze and provide information about them in various environments. To this end, we conducted identification and tracking of dynamic objects using the Yolov4 and Deepsort algorithms, establishment of real-time multi-user support servers based on Kafka, defining transformation matrices between images and spatial coordinate systems, and map-based dynamic object visualization. In addition, a positional consistency evaluation was performed to confirm its usefulness. Through the proposed scheme, we confirmed that CCTVs can serve as important sensors to provide relevant information by analyzing road conditions in real time in terms of road infrastructure beyond a simple monitoring role.

Smart Browser based on Semantic Web using RFID Technology (RFID 기술을 이용한 시맨틱 웹 기반 스마트 브라우저)

  • Song, Chang-Woo;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.12
    • /
    • pp.37-44
    • /
    • 2008
  • Data entered into RFID tags are used for saving costs and enhancing competitiveness in the development of applications in various industrial areas. RFID readers perform the identification and search of hundreds of objects, which are tags. RFID technology that identifies objects on request of dynamic linking and tracking is composed of application components supporting information infrastructure. Despite their many advantages, existing applications, which do not consider elements related to real.time data communication among remote RFID devices, cannot support connections among heterogeneous devices effectively. As different network devices are installed in applications separately and go through different query analysis processes, there happen the delays of monitoring or errors in data conversion. The present study implements a RFID database handling system in semantic Web environment for integrated management of information extracted from RFID tags regardless of application. Users’ RFID tags are identified by a RFID reader mounted on an application, and the data are sent to the RFID database processing system, and then the process converts the information into a semantic Web language. Data transmitted on the standardized semantic Web base are translated by a smart browser and displayed on the screen. The use of a semantic Web language enables reasoning on meaningful relations and this, in turn, makes it easy to expand the functions by adding modules.

Design of V2I Based Vehicle Identification number In a VANET Environment (VANET 환경에서 차대번호를 활용한 V2I기반의 통신 프로토콜 설계)

  • Lee, Joo-Kwan;Park, Byeong-Il;Park, Jae-Pyo;Jun, Mun-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.12
    • /
    • pp.7292-7301
    • /
    • 2014
  • With the development of IT Info-Communications technology, the vehicle with a combination of wireless-communication technology has resulted in significant research into the convergence of the component of existing traffic with information, electronics and communication technology. Intelligent Vehicle Communication is a Machine-to-Machine (M2M) concept of the Vehicle-to-Vehicle. The Vehicle-to-Infrastructure communication consists of safety and the ease of transportation. Security technologies must precede the effective Intelligent Vehicle Communication Structure, unlike the existing internet environment, where high-speed vehicle communication is with the security threats of a wireless communication environment and can receive unusual vehicle messages. In this paper, the Vehicle Identification number between the V2I and the secure message communication protocol was proposed using hash functions and a time stamp, and the validity of the vehicle was assessed. The proposed system was the performance evaluation section compared to the conventional technique at a rate VPKI aspect showed an approximate 44% reduction. The safety, including authentication, confidentiality, and privacy threats, were analyzed.

Research Trends of Randomized Controlled Trials on Herbal Medicine Treatment for Atopic Dermatitis-Focusing on CNKI (아토피 피부염의 한약 치료에 대한 무작위대조군연구 중심의 연구 동향 - CNKI를 중심으로)

  • Yang, Geum-Jin;Jo, Eun-hee;Kang, Su-Jin;Hong, Jieun;Shim, Yu-Hwa;Lee, Ju-Hyun;Park, Min-cheol
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.34 no.2
    • /
    • pp.102-116
    • /
    • 2020
  • The purpose of this study was to analyze the research trends of randomized controlled trials on herbal medicine treatment for atopic dermatitis in China for the last 5 years. We searched for randomized controlled trials with the intervention of herbal medicine for the treatment of atopic dermatitis in the CNKI (China National Knowledge Infrastructure) from January 2014 to December 2018. For the screening of the paper, we used '特应性皮炎' and '异位性皮炎' which mean atopic dermatitis and search was limited to three areas within Medicine & Public Health: Traditional Chinese Medicine, Traditional Chinese Medicinal Herbs, Combination of Traditional Chinese Medicine with Western Medicine. Among the 136 searched studies, we selected a total of 34 studies and analyzed a year of publication, subject characteristics, study design and intervention, prescribed herbal medicine and herbs, pattern identification, evaluation criteria, and outcomes. Longmu decoction (龍牡湯) and Polia Sclerotium (茯笭) was the most frequently prescribed medicine and herb. The most commonly used pattern identification was Blood deficiency and Wind-dryness (血虛風燥), and among them, the most frequently prescribed herb is Rehmanniae Radix (生地黃). In most studies using the total effectiveness and SCORAD index as an outcome measure, the herbal medicine treatment group showed statistically better results than the control group. As a result of the safety assessment, the herbal medicine treatment group was reported having significantly fewer side effects compared to the control group. Hence, it was confirmed that the intervention including herbal medicine had a significant effect on atopic dermatitis. This study would be able to provide the basis of clinical research on atopic dermatitis and applied to the treatment of atopic dermatitis.