• Title/Summary/Keyword: Traditional Rule

Search Result 330, Processing Time 0.081 seconds

Application of Bucket Brigades in Assembly Cells for Self Work Balancing (자율적인 밸런싱을 실현하는 Bucket Brigade 기반의 조립셀 운영방식)

  • Koo, Pyung-Hoi
    • IE interfaces
    • /
    • v.22 no.2
    • /
    • pp.144-152
    • /
    • 2009
  • Assembly line has been recognized as an efficient production system in mass production. However, the recent production environment characterized as mass customization urges production managers to transform a long assembly line to a number of short assembly cells. To maximize the utilization of resources in an assembly cell, it is important to have the line balanced. This paper presents a bucket brigade-based assembly cell. Bucket brigade is a way of coordinating workers who progressively perform a set of assembly operations on a flow line. Each worker follows a simple rule: perform assembly operations on a product until the next worker downstream takes it over; then go back to the previous worker upstream to take over a new assembly job. In this way, the line balances itself. The bucket brigade assembly cell is analyzed and compared with traditional assembly lines and general assembly cells. The paper also discusses some prerequisite requirements and limitations when the bucket brigade assembly cells are employed.

Quantizing Personal Privacy in Ubiquitous Computing

  • Ma, Tinghuai;Tian, Wei;Guan, Donghai;Lee, Sung-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.9
    • /
    • pp.1653-1667
    • /
    • 2011
  • Privacy is one of the most important and difficult research issues in ubiquitous computing. It is qualitative rather than quantitative. Privacy preserving mainly relies on policy based rules of the system, and users cannot adjust their privacy disclosure rules dynamically based on their wishes. To make users understand and control their privacy measurement, we present a scheme to quantize the personal privacy. We aim to configure the person's privacy based on the numerical privacy level which can be dynamically adjusted. Instead of using the traditional simple rule engine, we implement this scheme in a complex way. In addition, we design the scenario to explain the implementation of our scheme. To the best of our knowledge, we are the first to assess personal privacy numerically to achieve precision privacy computing. The privacy measurement and disclosure model will be refined in the future work.

Discretization technique for stability analysis of complex slopes

  • Hou, Chaoqun;Zhang, Tingting;Sun, Zhibin;Dias, Daniel;Li, Jianfei
    • Geomechanics and Engineering
    • /
    • v.17 no.3
    • /
    • pp.227-236
    • /
    • 2019
  • In practice, the natural slopes are frequently with soils of spatial properties and irregular features. The traditional limit analysis method meets an inherent difficulty to deal with the stability problem for such slopes due to the normal condition in the associated flow rule. To overcome the problem, a novel technique based on the upper bound limit analysis, which is called the discretization technique, is employed for the stability evaluation of complex slopes. In this paper, the discretization mechanism for complex slopes was presented, and the safety factors of several examples were calculated. The good agreement between the discretization-based and previous results shows the accuracy of the proposed mechanism, proving that it can be an alternative and reliable approach for complex slope stability analysis.

A Study on Video Length in Pre-class Homework for Effective Application of Flipped Learning (효과적인 플립러닝 적용을 위한 사전 학습 영상 길이에 관한 연구)

  • Park, Jun Hyun
    • Journal of Engineering Education Research
    • /
    • v.26 no.6
    • /
    • pp.79-86
    • /
    • 2023
  • In our research, we delved into the impact of video length assigned for pre-class assignments on students' level of engagement. What we discovered is that as the length of the video increases, student engagement tends to decrease and the time allocated for homework preparation does not significantly influence engagement, as many students tend to complete their assignments just before the due date. Interestingly, the well-known "6-minute rule" often advocated for online educational videos does not align with the dynamics of real university settings. Whether in traditional lecture-based classes or flipped learning environments, students exhibit a high degree of self-responsibility when it comes to video consumption. Our findings strongly suggest that, in the context of flipped learning, it is advisable to create videos that are shorter than 15 minutes in length.

Construct of Fuzzy Inference Network based on the Neural Logic Network (신경 논리 망을 기반으로 한 퍼지 추론 망 구성)

  • 이말례
    • Korean Journal of Cognitive Science
    • /
    • v.13 no.1
    • /
    • pp.13-21
    • /
    • 2002
  • Fuzzy logic ignores some information in the reasoning process. Neural network is powerful tools for the pattern processing, but, not appropriate for the logical reasoning. To model human knowledge, besides pattern processing capability, the logical reasoning capability is equally important. Another new neural network called neural logic network is able to do the logical reasoning. Because the fuzzy inference is a fuzzy logical reasoning, we construct fuzzy inference network based on the neural logic network, extending the existing rule-inference network. And the traditional propagation rule is modified. Experiments are performed to compare search costs by sequential searching and searching by priority. The experimental results show that the searching by priority is more efficient than the sequential searching as the size of the fuzzy inference network becomes larder and an the number of searching increases.

  • PDF

An active intrusion-confronting method using fake session and Honeypot (거짓 세션과 허니팟을 이용한 능동적 침입 대응 기법)

  • 이명섭;신경철;박창현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7C
    • /
    • pp.971-984
    • /
    • 2004
  • In the coming age of information warfare, information security patterns need to be changed such as to the active approach using offensive security mechanisms rather than traditional passive approach just protecting the intrusions. In an active security environment, it is essential that, when detecting an intrusion, the immediate confrontation such as analysing the intrusion situation in realtime, protecting information from the attacks, and even tracing the intruder. This paper presents an active intrusion-confronting system using a fake session and a honeypot. Through the fake session, the attacks like Dos(Denial of Service) and port scan can be intercepted. By monitoring honeypot system, in which the intruders are migrated from the protected system and an intrusion rule manager is being activated, new intrusion rules are created and activated for confronting the next intrusions.

Automated Generation of Software Systems in Systems Construction (시스템 구축 과정에서 소프트웨어 자동생성 도구의 적용)

  • 정일주
    • Journal of Information Technology Application
    • /
    • v.3 no.4
    • /
    • pp.63-92
    • /
    • 2001
  • This paper makes an attempt to look at the process of automatically generating an application software system based on the Entity-Relationship (E-R) model. Basically, the process consists of five steps as follows: First, the designer develops an E-R model of an real-world system. Second, the software generator automatically generates a stereo-type application system. Third, the generator produces database schema and link information between application programs. Fourth, the designer designs the user interface including menu, screen design and so on. Finally, the generator completes the process integrating all the elements of an application system. Five basic program generation rules, three extended rules and a database generation rule have been suggested. By following each rule with the generator, the designer can build an application with an extremely efficient manner compared with traditional approaches. A case study has been included in order to show the applicability of the automated software generation process suggested in this paper. It has been demonstrated from the case study that the idea of applying an automated generator in systems development based upon the E-R model worked well.

  • PDF

The Qi and the Physiological Signals measured on acupoint (경혈점에서 측정되는 생리신호와 기(氣))

  • Jang, K.S.;Na, C.S.;Yun, Y.C.;Choi, J.H.;So, C.H.
    • The Journal of Korean Medicine
    • /
    • v.18 no.2
    • /
    • pp.108-118
    • /
    • 1997
  • In our study, we tried to quantify Qi through establishing the interpretive method which would be used for inspecting the interrelationship between the Qi in Oriental Medicine and the physiological signals measured at the acupoint. We found out that some physiological signals measured at the acupoint of Meridian could be considered as a scientific Qi. Circulation rules of Qi probating the linkage between physiological signals and Qi are presented as promoting and counteracting rules of the Five Evolutive Phases within the traditional Oriental medicine literatures. We found that promoting and counteracting relations of the Five Evolutive Phases based on the New table about the rule of causing unbalance state(nTRCUS) can be widely used as a interpreting device for verifying the interrelation of human physiological signals and Qi. Standardizing the measured physiological signals into percentage could make relative comparison and judgement of the Five Evolutive Phases deviation possible. Though the physiological signals measured by instruments have different physical values, we could have the interpretation by the same promoting and counteracting rules of the Five Enolutive Phases. We measured EAV indices for 24 hours and discussed them in the view of Qi Circulation in Meridian.

  • PDF

A Study on Characteristic of the Modern Culture Space during Japanese Ruling Era of Korea (일제강점기 근대 문화공간 표현 특성에 관한 연구)

  • Lee, Keun-Hye;Oh, In-Wook
    • Korean Institute of Interior Design Journal
    • /
    • v.17 no.2
    • /
    • pp.3-12
    • /
    • 2008
  • Most of these cultural spaces are Western architecture which is completely unrelated to our traditional style. In Japan's colonial rule of Korea these Western formation flowed in and passed on by them. Therefore before the understanding of modem cultural space built in Japan's colonial rule of Korea, it's essential to study about the background of the western period in that time, architecture and trend of interior. Due to Great Depression and other reasons the economical modernism of architecture raised in this period. In this thesis, based on such background of period, cultural space has been divided into assembly, theatre and exhibition spaces. Those spaces were studied according to its expressional characteristics and brought to following conclusion from the analysis. The cultural spaces were created around 1930 due to an increase of demand when the modernism started to establish. Like other buildings cultural space expressed modernized elevation and space formation with ferroconcrete building. However until Japan's colonial period the cultural areas were not used for public but for Japanese authority class's social gatherings only. Consequently, unlike other buildings the classical elements that could express these characters were more used in cultural spaces especially in theater and exhibition areas. This distinctiveness didn't appear separately but according to type of rooms in one space. Once more, place like assembly space was expressed with modernism, special or recreation rooms where people pursue a comfort were expressed with decorative style. Also a special theater which was used for only one person was generally expressed with western style to represent the stem character such as power.

Numerical Analysis for the Characteristic Investigation of Homogenization Techniques Used for Equivalent Material Properties of Functionally Graded Material (기능경사 소재 등가 물성치 예측을 위한 균질화 기법의 특성분석을 위한 수치해석)

  • Cho, Jin-Rae;Choi, Joo-Hyoung;Shin, Dae-Sub
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.21 no.1
    • /
    • pp.13-20
    • /
    • 2008
  • Graded layers in which two different constituent particles are mixed are inserted into functionally graded material such that the volume fractions of constituent particles vary continuously and functionally over the entire material domain. The material properties of this dual-phase graded region, which is essential for the numerical analysis of the thermo-mechanical behavior of FGM, have been predicted by traditional homogenization methods. But, these methods are limited to predict the global equivalent material properties of FGMs because the detailed geometry information such as the particel shape and the dispersion structure is not considered. In this context, this study intends to investigate the characteristics of these homogenization methods through the finite element analysis utilizing the discrete micromechanics models of the graded layer, for various volume fractions and external loading conditions.