• Title/Summary/Keyword: Tracking defect

Search Result 39, Processing Time 0.026 seconds

A Study on Development Project Management using Open Source Configuration Management and Defect Tracking Tools (오픈소스 형상도구와 결함추적도구를 이용한 개발 프로젝트 관리에 관한 연구)

  • Lee, Jihyun;Park, Youngsik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1445-1447
    • /
    • 2012
  • 팀으로 구성된 개발 조직은 주어진 시간 안에 가용할 수 있는 인력으로 고객에게 전달될 최종 산출물인 소프트웨어를 개발한다. 개발과 통합을 거친 소프트웨어는 테스트를 거치며 발생되는 결함에 대해 수정 조치한다. 하지만 결함 수정과 병행하여 초기 요구사항은 변경되고 추가되어 개발되는 소프트웨어에 반영되야 함으로 팀에서는 메일, 전화, 또는 게시판 방식으로 결함 사항을 알리고 최종 소프트웨어를 개발해 나간다. 본 논문은 이러한 환경에 결함추적도구를 사용하여 결함 발견 시 등록하고, 해결된 소프트웨어의 버전을 관리하기 위한 방법에 대해 오픈소스 기반의 형상관리도구와 결함추적도구를 활용한 환경을 연구해 나가고자 한다.

Vision-based Joint Defect Tracking by Motion Fault Diagnosis of Collaborative Robots (협동로봇 동작 오류 진단을 통한 비전 기반 조인트 결함 추적 기법)

  • Hui-Chan Yang;Jinse Kim;Dong-Yeon Yoo;Jung-Won Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.595-596
    • /
    • 2023
  • 스마트팩토리의 핵심 설비 기기인 협동로봇의 유지보수를 위해 다양한 센서 데이터를 활용한 딥러닝 기반 결함 진단 연구가 확대되고 있다. 하지만 협동로봇은 기계적 특성과 수행하는 작업의 다양성으로 인해 내부 센서 데이터의 복잡도가 매우 높아 고정적인 결함 진단 기법을 적용하기 어렵다. 따라서 본 논문은 협동로봇의 동작 패턴을 직관적이고 신속하게 인지할 수 있는 비전 기술을 활용하여, 동작 오류 진단을 기반으로 원인이 되는 조인트 결함 위치를 추적하는 딥러닝 기법을 제안한다.

Indoor Positioning Using RFID Technique (RFID 기술을 이용한 실내 위치 추적)

  • Yoon, Chang-sun;Kim, Tae-in;Kim, Hyeon-jin;Hong, Yeon-chan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.1
    • /
    • pp.207-214
    • /
    • 2016
  • RFID technology is a technology perceiving information with the device called reader and tag which is now used in public transportation such as Hi-pass. In this paper, we design a system which tracks indoor location using this technology. GPS, the most frequently used location-tracking system, has a defect that its accuracy decreases when the device is indoor. In suggested experiment, we simulate signals according to the moving of located objects, then compare with the result of the experiment. Based on the extracted data, we inform data which is for the purpose of tracking system based on analysis of the route and errors. Simulations for the tracking were performed with relocation of real objects. In the real experiment, we arrange the readers around the room and move the tagged object that we like to know the location, then analyze the data from the equipment. This paper suggests the analyzed data for the future indoor tag tracking applications. We expect that the RFID based location positioning data will be used for other indoor positioning research and development.

Tracking of Stem Cells from Human Exfoliated Deciduous Teeth Labeled with Molday ION Rhodamine-B during Periodontal Bone Regeneration in Rats

  • Nan Zhang;Li Xu;Hao Song;Chunqing Bu;Jie Kang;Chuanchen Zhang;Xiaofei Yang;Fabin Han
    • International Journal of Stem Cells
    • /
    • v.16 no.1
    • /
    • pp.93-107
    • /
    • 2023
  • Background and Objectives: Chronic periodontitis can lead to alveolar bone resorption and eventually tooth loss. Stem cells from exfoliated deciduous teeth (SHED) are appropriate bone regeneration seed cells. To track the survival, migration, and differentiation of the transplanted SHED, we used super paramagnetic iron oxide particles (SPIO) Molday ION Rhodamine-B (MIRB) to label and monitor the transplanted cells while repairing periodontal bone defects. Methods and Results: We determined an appropriate dose of MIRB for labeling SHED by examining the growth and osteogenic differentiation of labeled SHED. Finally, SHED was labeled with 25 ㎍ Fe/ml MIRB before being transplanted into rats. Magnetic resonance imaging was used to track SHED survival and migration in vivo due to a low-intensity signal artifact caused by MIRB. HE and immunohistochemical analyses revealed that both MIRB-labeled and unlabeled SHED could promote periodontal bone regeneration. The colocalization of hNUC and MIRB demonstrated that SHED transplanted into rats could survive in vivo. Furthermore, some MIRB-positive cells expressed the osteoblast and osteocyte markers OCN and DMP1, respectively. Enzyme-linked immunosorbent assay revealed that SHED could secrete protein factors, such as IGF-1, OCN, ALP, IL-4, VEGF, and bFGF, which promote bone regeneration. Immunofluorescence staining revealed that the transplanted SHED was surrounded by a large number of host-derived Runx2- and Col II-positive cells that played important roles in the bone healing process. Conclusions: SHED could promote periodontal bone regeneration in rats, and the survival of SHED could be tracked in vivo by labeling them with MIRB. SHED are likely to promote bone healing through both direct differentiation and paracrine mechanisms.

A method for image-based shadow interaction with virtual objects

  • Ha, Hyunwoo;Ko, Kwanghee
    • Journal of Computational Design and Engineering
    • /
    • v.2 no.1
    • /
    • pp.26-37
    • /
    • 2015
  • A lot of researchers have been investigating interactive portable projection systems such as a mini-projector. In addition, in exhibition halls and museums, there is a trend toward using interactive projection systems to make viewing more exciting and impressive. They can also be applied in the field of art, for example, in creating shadow plays. The key idea of the interactive portable projection systems is to recognize the user's gesture in real-time. In this paper, a vision-based shadow gesture recognition method is proposed for interactive projection systems. The gesture recognition method is based on the screen image obtained by a single web camera. The method separates only the shadow area by combining the binary image with an input image using a learning algorithm that isolates the background from the input image. The region of interest is recognized with labeling the shadow of separated regions, and then hand shadows are isolated using the defect, convex hull, and moment of each region. To distinguish hand gestures, Hu's invariant moment method is used. An optical flow algorithm is used for tracking the fingertip. Using this method, a few interactive applications are developed, which are presented in this paper.

Analysis of the Causes of Accidents Related to 3 Phase 170 kV Gas Insulated Switchgears(GIS) and Preventive Measures (3상 170 kV 가스절연개폐장치(GIS)의 사고 원인 분석 및 예방 대책)

  • Choi, Chung-Seog
    • Journal of the Korean Society of Safety
    • /
    • v.26 no.4
    • /
    • pp.41-46
    • /
    • 2011
  • The purpose of this paper is to analyze the causes of accidents related to the 3 phase 170 kV gas insulated switchgear of a power system collected from accident sites to secure data for the prevention of similar accidents and provide important points of view regarding diagnosis for the prevention of accidents involving gas insulated switchgears. The analysis results of the causes of accidents involving gas insulated switchgears showed deformation of the manipulation lever installed at the S-phase, disconnection of the insulation rod connection, melting of the upper conductor, a damaged tulip, damage to the lower spacer and the spacer at the breaker, etc. It is believed from this result that the potential for accidents has expanded due to accumulated energy as a result of repeated deterioration. The carbonization depth of a GIS was formed near the screw (T2, T3) used to secure the lower pole of the S-phase tulip. It is not known what has caused the screws to be extruded and melted. However, it is thought that an unbalanced electromagnetic force, micro-discharge, surface discharge, etc., have occurred at that point. In addition, even though 16 years have passed since its installation, there was no installation defect, act of arson, accidental fire, etc. General periodical inspection and diagnosis failed to find the factors causing the accidents. As a system contained in a closed metal container, it has a high risk factor. Therefore, it is necessary to design, install and operate a GIS in accordance with the standard operational procedure (SOP). In addition, it is necessary to apply conversion technology for periodical SF6 gas analysis and precision safety diagnosis. It is expected that tracking and managing these changes in characteristics by recording the results on the history card will provide a significant accident prevention effect.

Implant-supported fixed prosthesis in patient with severe defects using staged GBR via 2-step augmentations: A case report (심한 결손부의 단계적 골증대술을 통한 임플란트 지지 고정성 보철 수복 증례 보고)

  • Oh, SaeEun;Jun, Ji Hoon;Park, YoungBum
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.60 no.4
    • /
    • pp.382-394
    • /
    • 2022
  • The treatment of patients with severe periodontitis should be proceeded step-bystep through an accurate diagnosis of each patients' individual tooth and with a strategic treatment plan. Implant-supported fixed prosthetic restoration has the advantage of high patient satisfaction and stable vertical dimension compared to the removable partial denture. However, multiple teeth defect areas lacking hard tissue may be disadvantageous in aesthetic failure and longer treatment time. In addition, it takes a certain period of time to manufacture and install a conventional fixed prosthesis, and during this process, the provisional prosthesis must satisfy the mechanical, biological, and aesthetic requirements of teeth. The purpose of this article is to describe the fabrication of implant-supported fixed prosthesis through a step-by-step approach in a partially edentulous patient.

A study on the Private Investigator usage for Cyber Crime (사이버범죄의 효과적인 대응을 위한 민간조사제도의 도입방안)

  • Shin, Hyun-Joo
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.63-86
    • /
    • 2016
  • The object of this study is to propose a study on the Private Investigator usage for Cyber Crime. The latest trend of cyber crime is being evolve in sophisticated and complex way over the global, like internet fraud, cyber gambling, hacking and etc. Hence national investigative authority mobilize high specialized skills and method of criminal investigation by each nation. But it is hard to respond in rapid and effective way because of propoor, distribution of group and insufficient of related legal system. Already in other countries, not considerable amount of services are given to private investigators in detection and tracking part which is inefficient by nation. So it has significantly meaningful to compensate the defect and study about private investigator usage as companion of cooperation policing for effectively respond to cyber-crime. The way to effectively deal with the cyber-crime is reevaluate meaning of partnership policing and need of private investigator usage. Also it is to analyze the main issue about introduction of a system and suggest the effective way of introduction. First, legislation of private investigator usage which is based upon partnership policing should be made up. Moreover, to establish the range of private investigator's business and enhance the reliability, it is to propose introduction of leading professional global certificate and license system with sufficient education and test. We are expecting introduction of private investigator usage can improve efficiency of investigation and promote effective countermeasures of cyber-crime.

  • PDF

Development of LiDAR-Based MRM Algorithm for LKS System (LKS 시스템을 위한 라이다 기반 MRM 알고리즘 개발)

  • Son, Weon Il;Oh, Tae Young;Park, Kihong
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.1
    • /
    • pp.174-192
    • /
    • 2021
  • The LIDAR sensor, which provides higher cognitive performance than cameras and radar, is difficult to apply to ADAS or autonomous driving because of its high price. On the other hand, as the price is decreasing rapidly, expectations are rising to improve existing autonomous driving functions by taking advantage of the LIDAR sensor. In level 3 autonomous vehicles, when a dangerous situation in the cognitive module occurs due to a sensor defect or sensor limit, the driver must take control of the vehicle for manual driving. If the driver does not respond to the request, the system must automatically kick in and implement a minimum risk maneuver to maintain the risk within a tolerable level. In this study, based on this background, a LIDAR-based LKS MRM algorithm was developed for the case when the normal operation of LKS was not possible due to troubles in the cognitive system. From point cloud data collected by LIDAR, the algorithm generates the trajectory of the vehicle in front through object clustering and converts it to the target waypoints of its own. Hence, if the camera-based LKS is not operating normally, LIDAR-based path tracking control is performed as MRM. The HAZOP method was used to identify the risk sources in the LKS cognitive systems. B, and based on this, test scenarios were derived and used in the validation process by simulation. The simulation results indicated that the LIDAR-based LKS MRM algorithm of this study prevents lane departure in dangerous situations caused by various problems or difficulties in the LKS cognitive systems and could prevent possible traffic accidents.