• Title/Summary/Keyword: Parts Database

Search Result 364, Processing Time 0.027 seconds

A study on configuring deployment of digital repositories for the archives management systems (대량기록물 처리를 위한 영구기록물관리시스템의 디지털저장소 배치형상 연구)

  • Yim, Jin-Hee;Lee, Dae-Wook
    • The Korean Journal of Archival Studies
    • /
    • no.32
    • /
    • pp.177-217
    • /
    • 2012
  • The National Archives of Korea(NAK) has a mission to ingest large-scaled digital records and information from a number of different government agencies annually from 2015. There are important issues related to the digital records and information transfer between NAK and agencies, and one of them is how to configure deployment of digital repositories for the archives management systems. The purpose of this paper is to offer the way to design it by examining the checkpoints through the whole life cycle of digital records and information in the archives management systems and calculating the amount of ingested digital records and information to the systems in 2015 and deploying the digital repositories configured according to the amount the records and information. Firstly, this paper suggests that the archives management systems in NAK should be considered and examined into at least three different parts called Ingest tier, Preservation tier and Access tier in aspects to the characteristics of the flow and process of the digital records and information. Secondly, as a results of the calculation the amount of the digital records and information ingested to the archives management systems in 2015 is sum up to around 2.5 Tera bytes. This research draws several requirements related to the large-scaled data and bulk operations which should be satisfied by the database or database management system implemented on to the archives management systems. Thirdly, this paper configures digital repositories deployment according to the characteristics of the three tiers respectively. This research triggers discussion in depth and gives specific clues about how to design the digital repositories in the archives management systems for preparing the year of 2015.

Development of LoRa IoT Automatic Meter Reading and Meter Data Management System for Smart Water Grid (스마트워터그리드를 위한 LoRa IoT 원격검침 및 계량데이터 시스템 개발)

  • Park, Jeong-won;Park, Jae-sam
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.3
    • /
    • pp.172-178
    • /
    • 2022
  • In this paper, water meter AMR(automatic meter reading), one of the core technologies of smart water grid, using LoRa IoT network is studied. The main content of the research is to develop the network system and show the test results that one PC server receives the readings of water meters from multiple households through LoRa communication and stores them in the database, and at the same time sends the data to the web server database through internet. The system also allows users to monitor the meter readings using their smartphones. The hardware and firmware of the main board of the digital water meter are developed. For a PC server program, MDMS(meter data management system) is developed using Visual C#. The app program running on the user's smartphone is also developed using Android Studio. By connecting each developed parts, the total network system is mounted on a flow test bench in the laboratory and tested. For the fields test, 5 places around the university are selected and the transmission distances are tested. The test result show that the developed system can be applied into the real field. The developed system can be expanded to various social safety nets such as monitoring the living alone or elderly with dementia.

Comparison of vitamin K contents in different meats commonly consumed in Korea (국내에서 소비되는 육류의 부위별 비타민 K 함량 분석 및 비교)

  • Kim, Daedong;Lee, Seogyeong;Kang, Yuri;Shin, Jaehong;Park, Jin Ju;Kim, Hyun Jung
    • Korean Journal of Food Science and Technology
    • /
    • v.54 no.1
    • /
    • pp.109-113
    • /
    • 2022
  • Vitamin K is a group of fat-soluble vitamins that naturally exist in phylloquinone (vitamin K1) and menaquinone (vitamin K2). In this study, the vitamin K content in different meats commonly consumed in Korea was analyzed using HPLC, and the analytical method was validated. Vitamin K1 was not detected in any of the meat samples. Vitamin K2 contents in different cuts of beef ranged from 0.00 to 5.87 ㎍/100 g, whereas the corresponding value in different parts of chicken ranged from 16.59 to 46.64 ㎍/100 g. In the case of pork, vitamin K2 contents varied from 4.33 to 22.90 ㎍/100 g. Among the different types of meat, the highest vitamin K2 content was found in boiled chicken meat and skin (46.64 ㎍/100 g). The analytical method was found to be reliable and had high accuracy. These results provide accurate nutritional information and contribute a food composition database for meat consumption.

Design and Verification of Shear Buckling Test Fixture for Composite Laminate (복합재 적층판의 전단좌굴시험을 위한 치구 설계 및 검증)

  • Park, Sung-Jun;Ko, Myung-Gyun;Kim, Dong-Gwan;Kim, Sang-Kuk;Moon, Chang-Oh;Kweon, Jin-Hwe;Choi, Jin-Ho
    • Composites Research
    • /
    • v.27 no.4
    • /
    • pp.158-167
    • /
    • 2014
  • Final goal of this research is to establish the database for correlation factors which connects the test and analysis results of shear buckling allowables for composite plate. To accomplish the goal, extensive test and analysis works are required. In this paper, as the first step, a frame-type fixture for shear buckling test was designed and validated through the test and analysis. Final configuration of the fixture were determined via parametric study on the effect of specimen size, cross-sectional dimensions, and number of fastening bolts on the shear buckling load. Results of the study showed the designed frame-type fixture successfully induces the shear buckling of composite plate. However, there were deviations between the test results and analysis results for ideal case under pure shear load, which were mainly caused by the difference in plate sizes for both cases. The difference were larger in the plates with larger hole and simply supported boundary condition. It is concluded from the results that while the designed fixture can be used for the clamped plates with acceptable accuracy, it shows larger difference in the simply supported plates.

Efficient Mining of Frequent Subgraph with Connectivity Constraint

  • Moon, Hyun-S.;Lee, Kwang-H.;Lee, Do-Heon
    • Proceedings of the Korean Society for Bioinformatics Conference
    • /
    • 2005.09a
    • /
    • pp.267-271
    • /
    • 2005
  • The goal of data mining is to extract new and useful knowledge from large scale datasets. As the amount of available data grows explosively, it became vitally important to develop faster data mining algorithms for various types of data. Recently, an interest in developing data mining algorithms that operate on graphs has been increased. Especially, mining frequent patterns from structured data such as graphs has been concerned by many research groups. A graph is a highly adaptable representation scheme that used in many domains including chemistry, bioinformatics and physics. For example, the chemical structure of a given substance can be modelled by an undirected labelled graph in which each node corresponds to an atom and each edge corresponds to a chemical bond between atoms. Internet can also be modelled as a directed graph in which each node corresponds to an web site and each edge corresponds to a hypertext link between web sites. Notably in bioinformatics area, various kinds of newly discovered data such as gene regulation networks or protein interaction networks could be modelled as graphs. There have been a number of attempts to find useful knowledge from these graph structured data. One of the most powerful analysis tool for graph structured data is frequent subgraph analysis. Recurring patterns in graph data can provide incomparable insights into that graph data. However, to find recurring subgraphs is extremely expensive in computational side. At the core of the problem, there are two computationally challenging problems. 1) Subgraph isomorphism and 2) Enumeration of subgraphs. Problems related to the former are subgraph isomorphism problem (Is graph A contains graph B?) and graph isomorphism problem(Are two graphs A and B the same or not?). Even these simplified versions of the subgraph mining problem are known to be NP-complete or Polymorphism-complete and no polynomial time algorithm has been existed so far. The later is also a difficult problem. We should generate all of 2$^n$ subgraphs if there is no constraint where n is the number of vertices of the input graph. In order to find frequent subgraphs from larger graph database, it is essential to give appropriate constraint to the subgraphs to find. Most of the current approaches are focus on the frequencies of a subgraph: the higher the frequency of a graph is, the more attentions should be given to that graph. Recently, several algorithms which use level by level approaches to find frequent subgraphs have been developed. Some of the recently emerging applications suggest that other constraints such as connectivity also could be useful in mining subgraphs : more strongly connected parts of a graph are more informative. If we restrict the set of subgraphs to mine to more strongly connected parts, its computational complexity could be decreased significantly. In this paper, we present an efficient algorithm to mine frequent subgraphs that are more strongly connected. Experimental study shows that the algorithm is scaling to larger graphs which have more than ten thousand vertices.

  • PDF

Customized Configuration with Template and Options (맞춤구성을 위한 템플릿과 Option 기반의 추론)

  • 이현정;이재규
    • Journal of Intelligence and Information Systems
    • /
    • v.8 no.1
    • /
    • pp.119-139
    • /
    • 2002
  • In electronic catalogs, each item is represented as an independent unit while the parts of the item can be composed of a higher level of functionality. Thus, the search for this kind of product database is limited to the retrieval of most similar standard commodities. However, many industrial products need to configure optional parts to fulfill the required specifications. Since there are many paths in finding the required specifications, we need to develop a search system via the configuration process. In this system, we adopt a two-phased approach. The first phase finds the most similar template, and the second phase adjusts the template specifications toward the required set of specifications by the Constraint and Rule Satisfaction Problem approach. There is no guarantee that the most similar template can find the most desirable configuration. The search system needs backtracking capability, so the search can stop at a satisfied local optimal satisfaction. This framework is applied to the configuration of computers and peripherals. Template-based reasoning is basically the same as case-based reasoning. The required set of specifications is represented by a list of criteria, and matched with the product specifications to find the closest ones. To measure the distance, we develop a thesaurus of values, which can identify the meaning of numbers, symbols, and words. With this configuration, the performance of the search by configuration algorithm is evaluated in terms of feasibility and admissibility.

  • PDF

Physicochemical Properties and Freshness of Spent Hen's Meat under Frozen or Refrigeration Conditions after Thawing

  • Gu, Hyo-Jung;Gu, Ja-Gyeong;Park, Jung-Min;Yoon, Su-Jin;Lee, Jeong-Soo;An, Ji-Hui;Kim, Jang-Mi;An, Byoung-Ki;Kang, Chang-Won;Kim, Jin-Man
    • Food Science of Animal Resources
    • /
    • v.32 no.4
    • /
    • pp.396-403
    • /
    • 2012
  • This study was conducted in order to investigate the effect of storage temperature abuse on the freshness of refrigerated and frozen spent hen's meat. After a room temperature storage condition, two different storage temperature were followed: refrigeration and frozen storage. All parts of the spent hen's meats were thawed at 4 d intervals up to 3 times (2, 6, and 10 d) for 24 h. The level of bacteria on the different parts of the refrigerated and frozen meats was higher than 6 Log CFU/g under the following storage conditions: refrigerated - breast, 12 h; leg, 6 h; wing, 12 h at the $1^{st}$ analysis, frozen - breast, 12 h at the $2^{nd}$ analysis; leg, 24 h at the $1^{st}$ analysis; wing, 12 h at the $1^{st}$ analysis. The pH value for the leg meat was higher than breast and wing meats. In the color measurements, under the room temperature storage condition, lightness and redness values decreased but the yellowness increased in refrigerated meats (p<0.05). The K-value regarding refrigerated leg meats exceeded 60%, which is the threshold value to evaluate the degree of freshness, during the $1^{st}$ analysis (p<0.05). The VBN value of refrigerated leg meat was the highest and reached up to 96.93 mg%. Thus, studies regarding the possible decline in quality according to the change of storage temperature could be used in order to establish a basic database for the quality control of spent hen meat being traded with other countries.

Establishment of a Standard Procedure for Safety Inspections of Bridges Using Drones (드론 활용 교량 안전점검을 위한 표준절차 정립)

  • Lee, Suk Bae;Lee, Kihong;Choi, Hyun Min;Lim, Chi Sung
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.42 no.2
    • /
    • pp.281-290
    • /
    • 2022
  • In Korea, the number of national facilities for which a safety inspection is mandatory is increasing, and a safer safety inspection method is needed. This study aimed to increase the efficiency of the bridge safety inspection by enabling rapid exterior inspection while securing the safety of inspectors by using drones to perform the safety inspections of bridges, which had mainly relied on visual inspections. For the research, the Youngjong Grand Bridge in Incheon was selected as a test bed and was divided into four parts: the warren truss, suspension bridge main cable, main tower, and pier. It was possible to establish a five-step standard procedure for drone safety inspections. The step-by-step contents of the standard procedure obtained as a result of this research are: Step 1, facility information collection and analysis, Step 2, analysis of vulnerable parts and drone flight planning, Step 3, drone photography and data processing, Step 4, condition evaluation by external inspection, Step 5, building of external inspection diagram and database. Therefore, if the safety inspections of civil engineering facilities including bridges are performed according to this standard procedure, it is expected that these inspection can be carried out more systematically and efficiently.

Palmprint Identification Algorithm using Hu Invariant Moments (Hu 불변 모멘트를 이용한 장문인식 알고리즘)

  • SHIN Kwang Gyu;RHEE Kang Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.2 s.302
    • /
    • pp.31-38
    • /
    • 2005
  • Recently, Biometrics-based personal identification is regarded as an effective method of person's identity with recognition automation and high performance. In this paper, the palmprint recognition method based on Hu invariant moment is proposed. And the low-resolution(750dpi) palmprint image$(5.5Cm\times5.5Cm)$ is used for the small scale database of the effectual palmprint recognition system. The proposed system is consists of two parts: firstly, the palmprint fixed equipment for the acquisition of the correctly palmprint image and secondly, the algorithm of the efficient processing for the palmprint recognition. And the palmprint identification step is limited 3 times. As a results, when the coefficient is 0.001 then FAR and GAR are $0.038\%$ and $98.1\%$ each other. The authors confirmed that FAR is improved $0.002\%$ and GAR is $0.1\%$ each other compared with [3].

Design and Development of Network for Housing Estate Security System

  • Nachin, Awacharin;Mitatha, Somsak;Dejhan, Kobchai;Kirdpipat, Patchanon;Miyanaga, Yoshikazu
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1480-1484
    • /
    • 2003
  • This paper presents the design and development of network for housing estate security system. The system can cover up to 961 houses which can be up to 1,200 meters long transfer rate of 9,600 bps. This system uses checking and warning the abnormal situation. More over this system has ability to control switch on/off the electrical equipment in the house via AC line control system. The system consists of 4 parts. The first part is a security system of each house using MCS-51 microcontroller as a central processing unit scan 32 sensors and control 8 appliances and send alarm. The MCS-51 microcontroller received control signal via telephone used DTMF circuit. The second part is distributed two levels master/slave network implementing after RS-485 serial communication standard. The protocol its base on the OSI (Open Systems Interconnection) 7 layers protocol model design focus on speed, reliability and security of data that is transferred. The network security using encrypt by DES algorithm, message sequence, time stamp checking and authentication system when user to access and when connect new device to this system. Flow control in system is Poll/Select and Stop-and-Wait method. The third part is central server that using microcomputer which its main function are storing event data into database and can check history event. The final part is internet system which users can access their own homes via the Internet. This web service is based on a combination of SOAP, HTTP and TCP/IP protocols. Messages are exchanged using XML format [6]. In order to save the number of IP address, the system uses 1 IP address for the whole village in which all homes and appliance in this village are addressed using internal identification numbers. This proposed system gives the data transfer accuracy over 99.8% and maximum polling time is 1,120 ms.

  • PDF