• Title/Summary/Keyword: Windows Application

Search Result 413, Processing Time 0.027 seconds

A Study on the Vision System Application for Welding Robot (용접 로봇을 위한 비젼 시스템 응용 연구)

  • Park, P. H.;Cheong, S. H.;Ro, S. H.;Choi, S. D.;Choi, H.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2000.11a
    • /
    • pp.678-682
    • /
    • 2000
  • The purpose of this study is to develop a powerful 6-axes general welding robot utilizing a low cost vision system. The developed vision system is composed of a CCD camera, a PC with windows 98 OS, and a PC-Robot communication program using Visual C++. A test was carried out to investigate whether the welding torch can precisely follow up the welding path. It shows that the result of this study can readily be applied to practical welding operations.

  • PDF

Fabrication of a Polymeric Film with Nanofiber-based Porous Window and Its Application to Co-culture (섬유 기반의 다공성 윈도우를 가지는 박막 제작 및 공배양에의 활용)

  • Jeong, Young Hun;Lee, Jongwan;Jin, Songwan
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.13 no.2
    • /
    • pp.21-27
    • /
    • 2014
  • Recently, various biochip environments have been presented. In this study, a novel transparent film with porous membrane windows, which is an essential component in a co-cultured biochip environment, is fabricated using spin-coating, 3D printing, and electrospinning processes. In detail, a transparent polystyrene film was fabricated by means of the spin-coating process followed bywindow cutting, after which apolycaprolactone-chloroform solution was deposited along the window edge to introduce an adhesion layer between the PS film and the PCL nanofibers. Nanofibers were electrospun into the window region using a direct-write electrospinning method. Consequently, it was demonstrated that the fabricated window film could be used in a co-culture biochip environment.

Design and Implementation of a PC/Ethernet-based Communication Protocol for Control Systems (PC/Ethernet 기반의 제어용 통신 프로토콜 설계ㆍ구현)

  • 장태인;곽귀일;변승현;조지용
    • Proceedings of the IEEK Conference
    • /
    • 1999.06a
    • /
    • pp.1129-1132
    • /
    • 1999
  • This paper deals with the design and implementation of an Ethernet-based communication protocol to be used in PC-based I/O interface systems. Recently, the performance of PC systems is being highly improved and Ethernet is used as the stable communication network over the world. We develop a new protocol driver with the capability of accessing Ethernet directly using NDIS(Network Driver Interface Specification), the network interface standard of Windows O.S. in PC, and install it at the application layer of the protocol structure. Its major roles are the supplement of CSMA/CD algorithm, the effective use of the long data frame of Ethernet, and the real-time transmission of data frames. This paper represents the possibility of the real-time control network and systems based on PCs and Ethernet.

  • PDF

LPE meltaback-etch and re-epitaxy of GaAs/AlGaAs for optical micro-lenses fabrication (광소자용 미소렌즈 제작을 위한 GaAs/AlGaAs계 액상식각 및 에피택시)

  • 함성호;권영세
    • Journal of the Korean Institute of Telematics and Electronics D
    • /
    • v.34D no.9
    • /
    • pp.64-71
    • /
    • 1997
  • A new etching technique of meltback was investigated for GaAs lensed optical devices with selective windows opending in the LPE (liquid phase epitaxy) system. In the meltback process, the etch depth and the etch shape were controlled by the degree of under-saturation, etch time and other parameters. A GaAs/AlGaAs DH layer was grown on the selectively etched hemispherical well for optical device application such as lensed surface emitting LED. The regrowth process were related with the coolin grate and the well to well spacing. A novel surface emitting LED with hemispherical AlGaAs lens was fabricated using the meltbakc and regrowth as the key process for AlaAs lens array. The light emitting efficiency of the LED was upto three times higher than the similar structure LED without lens. The meltback and regrowth technique was applicable to manufacture the optical device in LPE.

  • PDF

Scribing and cutting a sapphire wafer by laser-induced plasma-assisted ablation

  • Lee, Jong-Moo
    • Proceedings of the Optical Society of Korea Conference
    • /
    • 2000.02a
    • /
    • pp.224-225
    • /
    • 2000
  • Transparent and hard materials such as sapphire are used for many industrial applications as optical windows, hard materials on mechanical contact against abrasion, and substrate materials for opto-electronic semiconductor devices such as blue LED and blue LD etc. The materials should be cut along the proper shapes possible to be used for each application. In case of blue LED, the blue LED wafer should be cut to thousands of blue LED pieces at the final stage of the manufacturing process. The process of cutting the wafer is usually divided into two steps. The wafer is scribed along the proper shapes in the first step. It is inserted between transparent flexible sheets for easy handling. And then, it is broken and split in the next step. Harder materials such as diamonds are usually used to scribe the wafer, while it has a problem of low depth of scribing and abrasion of the harder material itself. The low depth of scribing can induce failure in breaking the wafer along the scribed line. It was also known that the expensive diamond tip should be replaced frequently for the abrasion. (omitted)

  • PDF

Development of Monitoring System for Wind Turbine (풍력발전기 원격모니터링 시스템 구축 및 개발)

  • Cha, Jang-Hyun;Lee, Jeong-Wan;Yoo, Neung-Soo;Nam, Yoon-Su
    • Journal of Industrial Technology
    • /
    • v.26 no.A
    • /
    • pp.63-68
    • /
    • 2006
  • In this paper, remote monitoring system for wind turbine is developed. The developed system consists of data acquisition for wind sensor, and monitoring for site environment. In order to accomplish effective monitoring, the system uses Datasocket, SMB, FTP, Web Server, and G Web Server. Two computer system - one is data acquisition computer using Windows-XP and the other is monitoring computer using UNIX - constraint the distribute system with individual tasks. By using this system, one can perform various monitoring and control tasks in Wind-Turbine application, efficiently.

  • PDF

Application of Bucket-brigades to Order Picking in Warehouses (물류창고에서 Bucket Brigade를 활용한 오더피킹에 대한 연구)

  • Koo, Pyung-Hoi
    • IE interfaces
    • /
    • v.21 no.3
    • /
    • pp.333-342
    • /
    • 2008
  • Warehouses form an important link in a supply chain network. Among a variety of activities in warehouses, order picking is the process of retrieving a number of items out of storage to meet customer orders. Today, as the transactions through direct sales are wide spread, warehouses often receive a large amount of small orders to be handled within tight time windows, which makes fast and efficient order picking more important than ever. This paper examines a new order picking method where the concept of bucket brigade (BB) is applied. Bucket brigade is a way of dynamically coordinating workers who progressively perform a set of operations along a flow line. In bucket brigades, a worker is not assigned his jobs in a static way. Each worker takes a job from his predecessor when he is free. We identify some considerations when bucket brigades are applied to order picking activities. A new BB picking protocol is presented to improve existing BB picking protocols. Through simulation experiments, the performance of BB order picking is evaluated under various logistics environments.

Design and Implementation of Distributed Mutual Exclusion Lock Counter Algorithm (분산 상호 배제 카운트 알고리즘을 이용한 클라이언트 사용자 구분 시스템 개발)

  • Jang, Seung-Ju
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.4
    • /
    • pp.1227-1235
    • /
    • 2000
  • In this paper, we propose new concepts that the distributed counter value with the distributed EC system identify each user who users the distributed system. The web user should register his/her own user ID in the cyber shopping mall system. Instead of registration, this paper proposes the proprietary mechanism that is distributing counter. The counter assigns the distinguished number to each client. The distributed lock algorithm is used for mutual assignment of the counter to each client. The proposed algorithm is the best solution in the distributed environment system such as cyber shopping mall. If a user should register his/her own ID in every EC system, he/she may not try to use these uncomfortable systems. The mutual counter is used to identify each client. All of these features are designed and implemented on Windows NT web server. Also these features were experiments with 5 clients for 300 times. According to the experiments, clients have their own mutual counter value. The proposed algorithm will be more efficient in internet application environment. Moreover, it will improve the number of internet users.

  • PDF

A Chi-Square-Based Decision for Real-Time Malware Detection Using PE-File Features

  • Belaoued, Mohamed;Mazouzi, Smaine
    • Journal of Information Processing Systems
    • /
    • v.12 no.4
    • /
    • pp.644-660
    • /
    • 2016
  • The real-time detection of malware remains an open issue, since most of the existing approaches for malware categorization focus on improving the accuracy rather than the detection time. Therefore, finding a proper balance between these two characteristics is very important, especially for such sensitive systems. In this paper, we present a fast portable executable (PE) malware detection system, which is based on the analysis of the set of Application Programming Interfaces (APIs) called by a program and some technical PE features (TPFs). We used an efficient feature selection method, which first selects the most relevant APIs and TPFs using the chi-square ($KHI^2$) measure, and then the Phi (${\varphi}$) coefficient was used to classify the features in different subsets, based on their relevance. We evaluated our method using different classifiers trained on different combinations of feature subsets. We obtained very satisfying results with more than 98% accuracy. Our system is adequate for real-time detection since it is able to categorize a file (Malware or Benign) in 0.09 seconds.

On the study of depulication method of communication and Backup device for an Electric Car using Flash Disk and Ethernet (Flash DISK와 Ethernet을 이용한 전동차의 통신 이중화 및 백업장치에 관한 연구)

  • Seo, Won-Yong;Yeon, Jun-Sang;Yang, Oh
    • Proceedings of the KIEE Conference
    • /
    • 2002.11c
    • /
    • pp.472-475
    • /
    • 2002
  • This paper presents a high speed ethernet communication and depulication method of communication to prevent decrease of reliability that was generated by high speed communication. Thus communication reliability was improved and this paper was considered that if any physical breakdown of line of communication occurred, other line of communication could operate collect. This paper used Flash memory for setting storage of backup data at Electric Car that have an humidity and a temperature and an impact. also improved reliability and besides matching data format to windows data format realized to confirm application program at PC or note book computer.

  • PDF