• Title/Summary/Keyword: industrial environment

Search Result 8,090, Processing Time 0.036 seconds

Development and Application of a Generation Method of Human Models for Ergonomic Product Design in Virtual Environment (가상환경상의 인간공학적 제품설계를 위한 인체모델군 생성기법 개발 및 적용)

  • Ryu, Tae-Beum;Jung, In-Jun;You, Hee-Cheon;Kim, Kwang-Jae
    • IE interfaces
    • /
    • v.16 no.spc
    • /
    • pp.144-148
    • /
    • 2003
  • A group of digital human models with various sizes which properly represents a population under consideration is needed in the design process of an ergonomic product in virtual environment. The present study proposes a two-step method which produces a representative group of human models in terms of stature and weight. The proposed method first generates a designated number of pairs of stature and weight within an accommodation range from the bivariate normal distribution of stature and weight of the target population. Then, from each pair of stature and weight, the method determines the sizes of body segments by using 'hierarchical' regression models and corresponding prediction distributions of individual values. The suggested method was applied to the 1988 US Army anthropometric survey data and implemented to a web-based system which generates a representative group of human models for the following parameters: nationality, gender, accommodation percentage, and number of human models.

On the Application of Channel Characteristic-Based Physical Layer Authentication in Industrial Wireless Networks

  • Wang, Qiuhua;Kang, Mingyang;Yuan, Lifeng;Wang, Yunlu;Miao, Gongxun;Choo, Kim-Kwang Raymond
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2255-2281
    • /
    • 2021
  • Channel characteristic-based physical layer authentication is one potential identity authentication scheme in wireless communication, such as used in a fog computing environment. While existing channel characteristic-based physical layer authentication schemes may be efficient when deployed in the conventional wireless network environment, they may be less efficient and practical for the industrial wireless communication environment due to the varying requirements. We observe that this is a topic that is understudied, and therefore in this paper, we review the constructions and performance of several commonly used test statistics and analyze their performance in typical industrial wireless networks using simulation experiments. The findings from the simulations show a number of limitations in existing channel characteristic-based physical layer authentication schemes. Therefore, we believe that it is a good idea to combine machine learning and multiple test statistics for identity authentication in future industrial wireless network deployment. Four machine learning methods prove that the scheme significantly improves the authentication accuracy and solves the challenge of choosing a threshold.

An Empirical Study on Consumers' Perceptions on the Changes of Marketing Environment (마케팅환경변화에 대하여 소비자의 인식패턴에 관한 실증적 연구)

  • 최윤홍
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.19 no.40
    • /
    • pp.37-52
    • /
    • 1996
  • Nowadays the marketing environment has become an important factor which should be seriously considered by all the managers of modern firms. The survivals of modern firms are basically influenced by the changes of marketing environment. Particularly, it is necessary for firms to pursue the rational and efficient managerial activities since the recent environment is characterized by the stiff competition and rapid changes. First of all, this paper is trying to theoretically examine how the environment of the marketing system has been changing in terms of different periods and macro-levels. Secondly, in order to understand the patterns of consumers' perceptions on the environmental changes, some hypotheses have been established and relevant data have been collected. And, in order to analyse the results of this study, the followings have been implemented : Pilot analyses on the experimental environment and variables, the selection of research methodology, the test hypotheses, and the summary of the results. Finally, some practical implications have been suggested in order to help marketing managers formulate the efficient marketing strategic.

  • PDF

Implementation of Environment Education Software using the Ruins Original Form Restoration Technique (유적원형 복원 기법을 이용한 환경교육용 소프트웨어의 구현)

  • Lee, Gi-Sung;Lee, Keun-Wang
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.3
    • /
    • pp.1367-1372
    • /
    • 2011
  • This paper designed 3D animation in consideration of human characteristics to stimulate their interest and to be more understandable to them. It was also confirmed that, using the 3D animation contents, general people came to recognize the problem of environment pollution and developed desirable attitude and behavior for protecting the environment. Furthermore, this paper suggested the ruins original form restoration technique of the residential environment and the natural environment of Hanyang in the Joseon Dynasty period using the 3D virtual reality digital recovery techniques.

A Study on Physical Service Environment and Customer's Satisfaction in Multiplex (멀티플렉스에서의 물리적 서비스환경과 고객의 만족에 관한 연구)

  • Chang Kyung;Ko Hyun-Min
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.27 no.2
    • /
    • pp.29-36
    • /
    • 2004
  • As Lately movie industry and related market becomes larger and people have had more spare time, people's interest in multiplex grows higher, This paper studies relationships between physical service environment and customer's satisfaction in multiplex. The number of subjects in this study is 346 persons stayed at four multiplexes, among which we obtained valid responses from 326 persons through questionnaire investigation. We held hypotheses for the relationships, and for the testing, used methods are Spearman's correlation, Mann-Whitney test, etc, and for statistical analysis, SPSS 10.1 software was used. Thus, we found statistically significant results, that is, the relation between physical service environment and customer's satisfaction is positive: the higher evaluation about physical service environment is, the more customer's universal satisfaction is. Information about the significant relation's intensity of many indicators in physical service environment, which is given in this paper, can be used for attaining higher customer satisfaction and spreading more effective management activities in multiplex.

A Study on the Implementation of PDM Integration Environment in Heterogeneous Distributed Environment (이기종 분산환경에서 PDM 통합환경 구현에 관한 연구)

  • 김형선
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.21 no.45
    • /
    • pp.33-45
    • /
    • 1998
  • The typical characteristic of PDM(Product Data Management) System seperates the databases to store the meta data and applications. Therefore, meta data contains the information for the location of file, user profiles, relationships between the files, and process. PDM utilizes these information efficiently and does file management, configuration management, and process management. In this view, the integration strategy of PDM is to merge data and process. In the view of architecture, the interface between data and application and the actions of each application execute seamlessly. This architecture is viewed as integrated data and process among enterprises and implemented with client/server technology in distributed process environment that interfaced with open object-oriented technology which is developed with business object in the object-oriented infrastructure. In this paper, we studied the definition, function, and scope of PDM and researched the core technologies to implement the PDM integration environment. We also researched the PDM utilization in distributed enterprise environment and implementation of PDM integration environment with this technical background.

  • PDF

A Methodology for the Ship System Integration with Open Architecture : Focusing on the Total Ship Computing Environment based Architecture Building and Validation (개방형 구조(OA)를 이용한 함정체계통합 구축 방법론 : 통합함정컴퓨팅환경(TSCE)기반 아키텍처 구축 및 검증을 중심으로)

  • Park, Gang-Soo;Yoo, Byeong-Chun;Kim, Kyeongtaek;Choi, Bong-Wan
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.43 no.3
    • /
    • pp.68-76
    • /
    • 2020
  • In a series of recent launch tests, North Korea has been improving the firepower of its missiles that can target South Korea. North Korea's missiles and submarines are capable of threatening targets in South Korea and are likely faster and more covert than the systems previously seen in North Korea. The advanced threats require that ROK Navy should not only detect them earlier than ever but also response quicker than ever. In addition to increasing threats, the number of young man that can be enlisted for military service has been dramatically decreasing. To deal with these difficulty, ROK navy has been making various efforts to acquire a SMART warship having enhanced defense capability with fewer human resources. For quick response time with fewer operators, ROK Navy should improve the efficiency of systems and control tower mounted on the ship by promoting the Ship System Integration. Total Ship Computing Environment (TSCE) is a method of providing single computing environment for all ship systems. Though several years have passed since the first proposal of TSCE, limited information has been provided and domestic research on the TSCE is still in its infancy. In this paper, we apply TSCE with open architecture (OA) to solve the problems that ROK Navy is facing in order to meet the requirements for the SMART ship. We first review the level of Ship System Integration of both domestic and foreign ships. Then, based on analyses of integration demands for SMART warship, we apply real time OA to design architecture for TSCE from functional view and physical view. Simulation result shows that the proposed architecture has faster response time than the response time of the existing architecture and satisfies its design requirements.

Fit Tests for Second-class Half Masks (2급 방진마스크 밀착도 평가)

  • Cho, Kee Hong;Kim, Hyun Soo;Choi, Ah Rum;Chun, Ji Young;Kang, Tae Won;Kim, Min Su;Park, Kyeong Hak;Kim, Ze One
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.32 no.2
    • /
    • pp.146-152
    • /
    • 2022
  • Objectives: The purpose of this study is to confirm whether there is a factor to affect the evaluation of fit test of a 2nd class half masks using a OPC test method. Methods: Total 34 adults including Males and Females were tested using OPC-based fit testing equipment while wearing a 2nd class half filtered mask. Results: 1. The result of measuring face dimensions using different tools such as a 3D scanner and digital calipers revealed that the variation of lip width was not statistically significant because there was only a difference of about 4 mm. However, it showed that a difference in face length was statistically significant enough with 10 mm(p<0.000). 2. The fit factor for each exercise stage according to gender was the highest at 124.54(p<0.001) in Step 3, and the fit factor was the lowest at 73.75 in Step 1. 3. In the evaluation of the degree of fit factor according to gender, female passed 67.44%, which was higher than the value in male(p<0.038). 4. The acceptance rate of the group having a face length of shorter than 110 mm was 91.67%. On the other hand, the acceptance rate of the group with a face length of longer than 110 mm was 47.27%(p<0.000). 5. The fit test was possible because the fit factor with 2nd class half masks corresponding to FFP1(Filtering Face Piece 1) was passed 55% or more. Conclusions: The test results showed that using a 2nd class half filtered mask, it is important to wear a properly designed mask so that face size does not affect the fit factor.

Industrial Technology Leak Detection System on the Dark Web (다크웹 환경에서 산업기술 유출 탐지 시스템)

  • Young Jae, Kong;Hang Bae, Chang
    • Smart Media Journal
    • /
    • v.11 no.10
    • /
    • pp.46-53
    • /
    • 2022
  • Today, due to the 4th industrial revolution and extensive R&D funding, domestic companies have begun to possess world-class industrial technologies and have grown into important assets. The national government has designated it as a "national core technology" in order to protect companies' critical industrial technologies. Particularly, technology leaks in the shipbuilding, display, and semiconductor industries can result in a significant loss of competitiveness not only at the company level but also at the national level. Every year, there are more insider leaks, ransomware attacks, and attempts to steal industrial technology through industrial spy. The stolen industrial technology is then traded covertly on the dark web. In this paper, we propose a system for detecting industrial technology leaks in the dark web environment. The proposed model first builds a database through dark web crawling using information collected from the OSINT environment. Afterwards, keywords for industrial technology leakage are extracted using the KeyBERT model, and signs of industrial technology leakage in the dark web environment are proposed as quantitative figures. Finally, based on the identified industrial technology leakage sites in the dark web environment, the possibility of secondary leakage is detected through the PageRank algorithm. The proposed method accepted for the collection of 27,317 unique dark web domains and the extraction of 15,028 nuclear energy-related keywords from 100 nuclear power patents. 12 dark web sites identified as a result of detecting secondary leaks based on the highest nuclear leak dark web sites.