• Title/Summary/Keyword: Semi-automatic

Search Result 411, Processing Time 0.027 seconds

Development of Semi-automatic Cabbage Piling System for Tractor Implemented Chinese Cabbage Hervester (트랙터 부착형 배추 수확기용 반자동식 배추 적재시스템 개발)

  • Song, K. S.;Choi, D. Y.;Hwang, H.
    • Journal of Biosystems Engineering
    • /
    • v.27 no.3
    • /
    • pp.211-218
    • /
    • 2002
  • 배추 생산에 있어서 수확, 운반, 적재 작업은 가장 노동이 집약적으로 요구되는 작업들이다. 최근, 여러 종류의 양배추 수화기가 일본과 유럽에서 개발되었다. 하지만 국내에서 재래되는 배추는 크기와 형태에 있어 양배추와는 달라 기 개발 기종의 도입이 어렵다. 또한 수확작업의 생력화 효과는 운반, 정선, 적재 작업과 밀접하게 연계되어 있어 출하시의 작업체계를 고려하여 수화에 따른 수집.반출 시스템을 개발하여야 한다. 수확시의 배추는 중량이 25~45 N 정도로 다 작물에 비하여 무겁고 부피가 크기 때문에 수확작업의 기계화를 위해서는 수확장치와 더불어 연속적으로 수확되는 배추를 적절하게 수집하여 적재하고 반출하는 시스템의 개발이 중요하다. 본 연구에서는 수확작업의 생력화 효과를 높이고 생력화 시스템 비용의 절감을 목적으로 작업자 1인에 의해 작업할 수 있는 반자동 형태의 트랙터 부착형 배추 수집, 적재, 반출시스템 시작기를 개발하였다. 시작기는 배추 이송장치, 적재장치, 팔렛 및 반출장치의 3개 부분과 PLC를 이용한 주 제어기로 구성하였다. 배추 수집용기로는 대략 70개의 배추를 담을 수 있는 크기가 1,050 mm$\times$1.050mm$\times$1,000mm 인 접이식 메쉬 팔렛을 사용하였으며 하단부에 롤러 안내판을 부착하여 적재한 팔렛의 배출이 용이하도록 하였다. 팔렛을 제외한 전체 시작기의 중량은 235 N 이였으며 크기는 3,940mm$\times$520mm$\times$1,630mm 이었다. 본 연구는 수확장치의 기능 및 생력화 효과를 극대화하고 배추의 손상정도를 최소화하는 시스템을 구성하고자 하였다. 이송장치는 트랙터 부착시 횡공간 점유율을 최소화하도록 하였으며 적재장치는 적재시 배추의 손상을 줄이고 배추가 놓이는 자세를 능동적으로 조절할 수 있도록 주름관을 부착하였다. 시작기의 실내시험 결과 이송장치는 0.18 m/s~0.36 m/s의 범위에서 적재장치는 0.4 m/s~2.4 m/s 범위에서 안정적으로 구동하였으며 두 장치를 동시에 구동하여 시험한 결과 이송장치는 0.26 m/s~0.36 m/s, 그리고 적재장치는 0.9 m/s~2.4 m/s 에서 적정하게 안정적으로 구동하였다. 적재장치의 성능에 있어서 1~3단 적재시에는 주름관을 이용하여 적재하고 4~5단 적재시에는 자유낙하에 의한 적재를 수행할 경우 인력에 의한 적재와 거의 동등한 적재량을 보였으며 손상정도는 거의 무시할 정도였다. 트랙터가 0.3 m/s로 주행하는 경우 노지로부터 배추를 뽑아 이송하는 뽑기벨트의 적정속도가 0.46 m/s인 점을 고려할 때 배추 이송 컨베이어는 0.34 m/s 이상의 속도를 유지할 필요가 있었으며 적재 컨베이어는 2 m/s~2.4 m/s의 속도에서 안정적으로 작동하였다. 배추의 주간 거리가 대략 30~40 cm 인 점을 감안하면 적재장치는 초당 1개의 적재성능을 보였다. 실내에서 수행한 시스템의 성능은 배추에 큰 손상없이 전반적으로 성공적으로 구동하였으나 향후 노면이 고르지 못한 포장에서의 성능 시험이 필요하다.

Automatic Training Corpus Generation Method of Named Entity Recognition Using Knowledge-Bases (개체명 인식 코퍼스 생성을 위한 지식베이스 활용 기법)

  • Park, Youngmin;Kim, Yejin;Kang, Sangwoo;Seo, Jungyun
    • Korean Journal of Cognitive Science
    • /
    • v.27 no.1
    • /
    • pp.27-41
    • /
    • 2016
  • Named entity recognition is to classify elements in text into predefined categories and used for various departments which receives natural language inputs. In this paper, we propose a method which can generate named entity training corpus automatically using knowledge bases. We apply two different methods to generate corpus depending on the knowledge bases. One of the methods attaches named entity labels to text data using Wikipedia. The other method crawls data from web and labels named entities to web text data using Freebase. We conduct two experiments to evaluate corpus quality and our proposed method for generating Named entity recognition corpus automatically. We extract sentences randomly from two corpus which called Wikipedia corpus and Web corpus then label them to validate both automatic labeled corpus. We also show the performance of named entity recognizer trained by corpus generated in our proposed method. The result shows that our proposed method adapts well with new corpus which reflects diverse sentence structures and the newest entities.

  • PDF

A Study on the Strength Evaluation Method of Plate Structures with Penetration-holes (관통구를 갖는 판구조물의 강도평가 방법에 관한 연구)

  • Kim, Ul-Nyeon;Jang, Jun-Tae
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.54 no.6
    • /
    • pp.476-484
    • /
    • 2017
  • The purpose of this paper is to verify the structural integrity of a region with numerous penetration-holes in offshore structures such as semi-submersible rig and FPSO. In order to effectively check the yielding and buckling strength of plate members with penetration-holes, a screening analysis program was developed with the FE analysis tool to generate fine meshed model using the theoretical and analysis methods. When a hole is appeared in the plate structure members, the flow of stress is altered such that concentrations of stress form near the hole. Stress concentrations are of concern during both preliminary and detail design and need to be addressed from the perspectives of strength. To configure the geometrical shape, very fine meshed FE analysis is needed as the most accurate method. However, this method is practically impossible to apply for the strength verifications for all perforated plates. In this paper, screening analysis method was introduced to reduce analysis tasks prior to detailed FE analysis. This method is applied to not only the peak stress calculation combined stress concentration factor with nominal stress but also nominal equivalent stress calculation considering cutout effects. The areas investigated by very fine meshed analysis were to be chosen through screening analysis without any reinforcements for penetration-holes. If screening analysis results did not satisfy the acceptance criteria, direct FE analysis method as the 2nd step approach were applied with one of the coarse meshed model considering hole or with the very fine meshed model considering the hole shape and size. In order to effectively perform the local fine meshed analysis, automatic model generating program was developed based on the MSC/PATRAN which is pre-post FE analysis program. Buckling strength was also evaluated by Common Structure Rule (CSR) adopted by IACS as the stress obtained from very fine meshed FE analysis. Due to development of the screening analysis program and automatic FE modeling program, it was able to reduce the design periods and structural analysis costs.

Preliminary semi-quantitative evaluation of developed latent fingerprints on non-porous surface with natural powders using a densitometric image analysis (비 다공성 표면에서 천연분말로 현출된 잠재지문의 농도계 이미지분석을 이용한 예비적인 반 정량적 평가)

  • Kim, Eun-Mi;Heo, Bo-Reum;Ok, Yun-Seok;Kim, Jin-Kyung;Joung, In-Nam;Choi, Sung-Woon
    • Analytical Science and Technology
    • /
    • v.29 no.6
    • /
    • pp.283-292
    • /
    • 2016
  • Conventional fingerprint powders used during crime scene investigations pose potential health hazards. Thus, multiple natural replacement powders, including squid ink powder, indigo and rice powder were used to develop (visualize) latent fingerprints on non-porous surfaces (e.g., glass, plastic and tile). Fingerprints developed using the natural powders were compared using the Automatic Fingerprint Identification System (AFIS) with those developed with traditional black powder. The peak areas of ridges were also compared using densitometric image analyses. Collectively, objective and quantitative evaluation methods were developed. The effectiveness of natural powders varied depending on the surface but, in general, squid ink powder performed well on most surfaces. Indigo powder performed well on tile surfaces, while rice powder performed well on glass surfaces. Plastic was the most difficult surface from which to develop fingerprints. Image analysis using Field Emission Scanning Electron Microscopy (SEM) demonstrated the importance of the size and shape of natural powder particles to properly adhere to the ridges. Although densitometric image analyses did not correlate the number of minutiae and ridge peak areas, an unbiased, objective evaluation method would be possible using image analyses with a reference image. Additional experimentation will yield safe and cost-effective natural powders with which adequate fingerprint development can be performed.

Automatic Generator for Component-Based Web Database Applications (컴포넌트 기반 웹 데이터베이스 응용의 자동 생성기)

  • Eum, Doo-Hun;Ko, Min-Jeung;Kang, I-Zzy
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.371-380
    • /
    • 2004
  • E-commerce is in wide use with the rapid advance of internet technology. The main component of an e-commerce application is a Web-based database application. Currently, it takes a lot of time in developing Web applications since developers should write codes manually or semi-automatically for user interface forms and query processing of an application. Therefore, the productivity increase of Web-based database applications has been demanded. In this paper, we introduce a software tool, which we call the WebSiteGen2, that automatically generates the forms that we used as user interfaces and the EJB/JSP components that process the query made through the forms for an application that needs a new database or uses an existing database. The WebSiteGen2 thus increases the productivity, reusability, expandibility, and portability of an application by automatically generating a 3-tier application based on component technology. Moreover, one user interface form that are generated by the WebSiteGen2 provides information on an interested entity as well as information on all the directly or indirectly related entities with the interested one. In this paper, we explain the functionality and implementation of the WebSiteGen2 and then show the merits by comparing the WebSiteGen2 to the other commercial Web application generators.

A Study of Standard eBook Contents Conversion (전자책 표준간의 컨텐츠 변환에 관한 연구)

  • Ko, Seung-Kyu;Sohn, Won-Sung;Lim, Soon-Bum;Choy, Yoon-Chul
    • The KIPS Transactions:PartD
    • /
    • v.10D no.2
    • /
    • pp.267-276
    • /
    • 2003
  • Many countries have established eBook standards adequate to their environments. In USA, OEB PS is announced for distribution and display of eBooks, in Japan, JepaX is announced for storage and exchange, and in Korea, EBKS is made for clear exchange of eBook contents. These diverse objectives lead to different content structures. These variety of content structure will cause a problem in exchanging them. To correctly exchange eBook contents, the content structure should be considered. So, In this paper, we study conversion methods of standard eBooks contents based on Korean eBook standard, with contemplating content structure. To convert contents properly, the mapping relations should be clearly defined. For this, we consider standard's structure and extension mechanisms, and use path notations and namespaces for precise description. Moreover, through analysis of each mapping relationships, we classify conversion cases into automatic, semi-automatic, and manual conversions. Finally we write up conversion scripts and experiment with them.

Development of Cloud-Based Medical Image Labeling System and It's Quantitative Analysis of Sarcopenia (클라우드기반 의료영상 라벨링 시스템 개발 및 근감소증 정량 분석)

  • Lee, Chung-Sub;Lim, Dong-Wook;Kim, Ji-Eon;Noh, Si-Hyeong;Yu, Yeong-Ju;Kim, Tae-Hoon;Yoon, Kwon-Ha;Jeong, Chang-Won
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.7
    • /
    • pp.233-240
    • /
    • 2022
  • Most of the recent AI researches has focused on developing AI models. However, recently, artificial intelligence research has gradually changed from model-centric to data-centric, and the importance of learning data is getting a lot of attention based on this trend. However, it takes a lot of time and effort because the preparation of learning data takes up a significant part of the entire process, and the generation of labeling data also differs depending on the purpose of development. Therefore, it is need to develop a tool with various labeling functions to solve the existing unmetneeds. In this paper, we describe a labeling system for creating precise and fast labeling data of medical images. To implement this, a semi-automatic method using Back Projection, Grabcut techniques and an automatic method predicted through a machine learning model were implemented. We not only showed the advantage of running time for the generation of labeling data of the proposed system, but also showed superiority through comparative evaluation of accuracy. In addition, by analyzing the image data set of about 1,000 patients, meaningful diagnostic indexes were presented for men and women in the diagnosis of sarcopenia.

A Study on Mapping Relations between eBook Contents for Conversion (전자책 문서 변환을 위한 컨텐츠 대응 관계에 관한 연구)

  • 고승규;임순범;김성혁;최윤철
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.2
    • /
    • pp.99-111
    • /
    • 2003
  • By virtue of diverse advantages derived from digital media, eBook is getting started to use. And many market research agencies have predicted that its market will be greatly expanded soon. But against those expectations, copyright-related problems and the difficulties of its accessing inherited from various eBook content formats become an obstacle to its diffusion. The first problems can be solved by DRM technology. And to solve the second problems, each nation has published its own content standard format. But the domestic standards are useful only the domestic level, they still leave the problems in the national level. The variety of content formats has created a demand for mechanisms that allow the exchange of eBook contents. Therefore we study the mapping relations between eBook contents for conversion. To define the mapping relations, first we extract the mapping both between eBook contents and between normal XML documents. From those mappings, we define seven mapping relations and classify them by cardinality. And we analyze the classified relations, which can be generated by automatic, or not. Using these results, we also classify the eBook content conversion as automatic, semi-automatic, and manual. Besides, we provide the conversion templates for mapping relations for automatic generation of conversion scripts. To show the feasibility of conversion templates, we apply them to the eBook content conversion. Experiment shows that our conversion templates generate the conversion scripts properly. We expected that defined mapping relations and conversion templates can be used not only in eBook content conversion , but also in normal XML document conversion.

  • PDF

Inferring Undiscovered Public Knowledge by Using Text Mining-driven Graph Model (텍스트 마이닝 기반의 그래프 모델을 이용한 미발견 공공 지식 추론)

  • Heo, Go Eun;Song, Min
    • Journal of the Korean Society for information Management
    • /
    • v.31 no.1
    • /
    • pp.231-250
    • /
    • 2014
  • Due to the recent development of Information and Communication Technologies (ICT), the amount of research publications has increased exponentially. In response to this rapid growth, the demand of automated text processing methods has risen to deal with massive amount of text data. Biomedical text mining discovering hidden biological meanings and treatments from biomedical literatures becomes a pivotal methodology and it helps medical disciplines reduce the time and cost. Many researchers have conducted literature-based discovery studies to generate new hypotheses. However, existing approaches either require intensive manual process of during the procedures or a semi-automatic procedure to find and select biomedical entities. In addition, they had limitations of showing one dimension that is, the cause-and-effect relationship between two concepts. Thus;this study proposed a novel approach to discover various relationships among source and target concepts and their intermediate concepts by expanding intermediate concepts to multi-levels. This study provided distinct perspectives for literature-based discovery by not only discovering the meaningful relationship among concepts in biomedical literature through graph-based path interference but also being able to generate feasible new hypotheses.

A Study on Quantitative Security Assessment after Privacy Vulnerability Analysis of PC (PC의 개인정보보호 취약점 분석과 정량화된 보안진단 연구)

  • Seo, Mi-Sook;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.456-460
    • /
    • 2012
  • Privacy Protection Act of 30 March 2012 was performed. In general, personal information management to enhance security in the DB server has a security system but, PC for the protection of the privacy and security vulnerability analysis is needed to research on self-diagnosis. In this paper, from a PC to search information relating to privacy and enhance security by encrypting and for delete file delete recovery impossible. In pc found vulnerability analysis is Check user accounts, Checking shared folders ,Services firewall check, Screen savers, Automatic patch update Is checked. After the analysis and quantification of the vulnerability checks through the expression, enhanced security by creating a checklist for the show, PC security management, server management by semi-hwahayeo activates. In this paper the PC privacy and PC security enhancements a economic damage and of the and Will contribute to reduce complaints.

  • PDF