• 제목/요약/키워드: computer files

검색결과 549건 처리시간 0.026초

피스톤 가공용 CNC 선반 HOT-1000 개발에 관한 연구 (A study on the Development of CNC Lathe HOT-1000)

  • 김경석
    • 한국공작기계학회:학술대회논문집
    • /
    • 한국공작기계학회 1995년도 추계학술대회 논문집
    • /
    • pp.12-17
    • /
    • 1995
  • The purpose of this study si the development of a lathe which can cut any pistons of oval shape with high seed, accuracy and precision by CNC (Computer Numerical Control) method. Yaxis which is the position determinating mechanism with high speed response was added to the CNC lathe and the ovality and profile was cut under the control of C-Y-Z axes at same tile. In the case of ovality of $\Phi$ improved up to 2500rpm(Y axis : 83Hz) by high speed cutting than modeling method. Since a personal computer is used, it is easy to change the shape of piston and can be applied promptly to many types of piston shape by only changing data files.

  • PDF

Development of RADCON and Establishments of Its Related System

  • Kim, Kuk-Ki;Lee, Kun-Jai;Park, Won jong
    • 한국원자력학회:학술대회논문집
    • /
    • 한국원자력학회 1996년도 춘계학술발표회논문집(4)
    • /
    • pp.51-56
    • /
    • 1996
  • In a NNP (Nuclear Power Plant) severe accident, radionuclides are dispersed into the air. The official regulatory institute, KINS (Korea Institute of Nuclear Safety), has been authorized and developing Computerized technical Advisory system for the Radiological Emergency preparedness (CARE). In this paper, in line with the CARE system, we presented the result of a modularized intermediate-level emergency dose assessment computer code. The RADCON (RADiological CONsequence analysis) version 3.0, which is operable on PC, is developed for simulating emergency situation by considering continuous washout phenomena, and provide a function of effective emergency planning. The source files are coded by using C language in order to increase the compatibility with the other computer system and modularized to adjust the functions and characteristics of each module fer easy understanding and further modification.

  • PDF

STEP 기반의 조립정보 추출과 코드 생성 알고리즘 (STEP-based Algorithms for Extraction and Code Generation of Assembly Information)

  • 김광수;최후곤
    • 한국CDE학회논문집
    • /
    • 제10권6호
    • /
    • pp.412-420
    • /
    • 2005
  • The integration of CAD and CAM is critical for computer aided process planning. Recently, STEP has been emerged and utilized as a product data exchange standard format in CAD/CAM areas. The assembly information consists of assembly component relations, assembly features, assembly directions and mating conditions. The purpose of this study is to develop an efficient algorithm to extract assembly information directly from the STEP based files and to generate automatically assembly process plan from the extracted assembly features. The developed algorithms will generate assembly information codes for STEP(AICS). The results from this study can be a reasonable link between design and manufacturing for developing better CAAPP(Computer-Aided Assembly Process Planning) systems.

Web Server에서 Web URL Page의 Image Log File (Image Log Files of the URL Page of Web Server)

  • 유승희;조동섭
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2007년도 심포지엄 논문집 정보 및 제어부문
    • /
    • pp.243-244
    • /
    • 2007
  • 웹 서버에서 로그파일은 웹 서버에 대한 접속정보를 저장한다. 이 정보를 분석하면 웹 서비스를 하는데 있어서 서비스의 질을 높이는데 좋은 참고자료가 될 뿐 아니라 웹 서버에 이상이 생겼을 경우 발생한 오류를 조기에 발견하는 데에도 사용되는 중요한 자료이다. 현재 이러한 로그파일은 텍스트 파일로 저장이 되어있으며 오랜 시간이 지나 그 웹 페이지가 삭제되었을 경우 로그파일에 기록된 그 시각의 웹 페이지를 찾아보기가 어렵다. 본 연구에서는 로그파일에 기록된 그 시각의 웹 페이지의 이미지를 저장하는 방법으로 이러한 단점을 보안하고 오랜 시간이 지난 후에도 그 웹 페이지를 볼 수 있는 방법을 제안한다. 이 아이디어가 구현되어 실현되면 또한 Digital Forensic으로써 범죄 수사에도 많은 도움이 될 뿐만 아니라 휴대전화로 풀 인터넷 브라우징이 가능한 풀브라우저에도 적용될 수 있다.

  • PDF

Bridging the gap between CAD and CAE using STL files

  • Bianconi, Francesco
    • International Journal of CAD/CAM
    • /
    • 제2권1호
    • /
    • pp.55-67
    • /
    • 2002
  • In many areas of industry, it is desirable to have fast and reliable systems in order to quickly obtain suitable solid models for computer- aided analyses. Nevertheless it is well known that the data exchange process between CAD modelers and CAE packages can require significative efforts. This paper presents an approach for geometrical data exchange through triangulated boundary models. The proposed framework is founded on the use of STL file specification as neutral format file. This work is principally focused on data exchange among CAD modelers and FEA packages via STL. The proposed approach involves the definition of a topological structure suitable for the STL representation and the development of algorithms for topology and geometry data processing in order to get a solid model suitable for finite element analysis or other computer aided engineering purposes. Different algorithms for model processing are considered and their pros and cons are discussed. As a case study, a prototype modeler which supports an exporting filter for a commercial CAE package has been implemented.

Tabu 탐색 기법을 이용한 분산 컴퓨팅 시스템 설계 (Design of Distributed Computer Systems Using Tabu Search Method)

  • 홍진원;김재련
    • 산업경영시스템학회지
    • /
    • 제18권36호
    • /
    • pp.143-152
    • /
    • 1995
  • This paper determines the allocation of computers and data files to minimize the sum of processing and communication costs which occur in processing jobs at each node. The problem of optimally configuring a distributed computer system belongs to the class of NP-Complete problems and the object function of this paper is nonlinear function and is hard to solve. This paper seeks the solution of distributed processing system by Tabu Search. Firstly, it presents the method of generating the starting solution proper to the distributed processing system. Secondly, it develops the method of searching neighborhood solutions. Finally, it determines the Tabu restriction appropriate to the distributed processing system. According to the experimental results, this algorithm solves a sized problems in reasonable time and is effective in the convergence of the solution. The algorithm developed in this paper is also applicable to the general allocation problems of the distributed processing system.

  • PDF

Development of Preprocessor Program for Articulated Total Body

  • Lee, Dong-Jea;Son, Kwon;Jeon, Kyu-Nam;Choi, Kyung-Hyun
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2001년도 ICCAS
    • /
    • pp.69.5-69
    • /
    • 2001
  • Computer simulations are widely used to analyze passenger safety in traffic accidents. ATB(articulated total body) is a computer simulation model developed to predict gross human body response to such dynamic environments as vehicle crashes and pilot ejections. ATB, whose code is open, has high flexibility and application capability that users can easily insert defined modules and functions. ATB is, however, inconvenient as it was coded in FORTRAN and it needs a formatted input file. Moreover, it takes much time to make input files and to modify coding errors. This study aims to increase user friendliness by adding a preprocessor program, WINATB(WiNdow ATB), to the conventional ATB. WINATB programmed in Visual C++ and OpenGL uses ATB IV as a dynamic solver ...

  • PDF

Using Highly Secure Data Encryption Method for Text File Cryptography

  • Abu-Faraj, Mua'ad M.;Alqadi, Ziad A.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.53-60
    • /
    • 2021
  • Many standard methods are used for secret text files and secrete short messages cryptography, these methods are efficient when the text to be encrypted is small, and the efficiency will rapidly decrease when increasing the text size, also these methods sometimes have a low level of security, this level will depend on the PK length and sometimes it may be hacked. In this paper, a new method will be introduced to improve the data protection level by using a changeable secrete speech file to generate PK. Highly Secure Data Encryption (HSDE) method will be implemented and tested for data quality levels to ensure that the HSDE destroys the data in the encryption phase, and recover the original data in the decryption phase. Some standard methods of data cryptography will be implemented; comparisons will be done to justify the enhancements provided by the proposed method.

동물 이미지를 위한 향상된 딥러닝 학습 (An Improved Deep Learning Method for Animal Images)

  • 왕광싱;신성윤;신광성;이현창
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2019년도 제59차 동계학술대회논문집 27권1호
    • /
    • pp.123-124
    • /
    • 2019
  • This paper proposes an improved deep learning method based on small data sets for animal image classification. Firstly, we use a CNN to build a training model for small data sets, and use data augmentation to expand the data samples of the training set. Secondly, using the pre-trained network on large-scale datasets, such as VGG16, the bottleneck features in the small dataset are extracted and to be stored in two NumPy files as new training datasets and test datasets. Finally, training a fully connected network with the new datasets. In this paper, we use Kaggle famous Dogs vs Cats dataset as the experimental dataset, which is a two-category classification dataset.

  • PDF

Social Media Security and Attacks

  • Almalki, Sarah;Alghamdi, Reham;Sami, Gofran;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • 제21권1호
    • /
    • pp.174-183
    • /
    • 2021
  • The advent of social media has revolutionized the speed of communication between millions of people around the world in various cultures and disciplines. Social media is the best platform for exchanging opinions and ideas, interacting with other users of similar interests and sharing different types of media and files. With the phenomenal increase in the use of social media platforms, the need to pay attention to protection and security from attacks and misuse has also increased. The present study conducts a comprehensive survey of the latest and most important research studies published from 2018-20 on security and privacy on social media and types of threats and attacks that affect the users. We have also reviewed the recent challenges that affect security features in social media. Furthermore, this research pursuit also presents effective and feasible solutions that address these threats and attacks and cites recommendations to increase security and privacy for the users of social media.