• Title/Summary/Keyword: rules and requirements

Search Result 280, Processing Time 0.025 seconds

Multi-Dimensional Dynamic Programming Algorithm for Input Lot Formation in a Semiconductor Wafer Fabrication Facility (반도체 팹에서의 투입 로트 구성을 위한 다차원 동적계획 알고리듬)

  • Bang, June-Young;Lim, Seung-Kil;Kim, Jae-Gon
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.1
    • /
    • pp.73-80
    • /
    • 2016
  • This study focuses on the formation of input release lots in a semiconductor wafer fabrication facility. After the order-lot pegging process assigns lots in the fab to orders and calculates the required quantity of wafers for each product type to meet customers' orders, the decisions on the formation of input release lots should be made to minimize the production costs of the release lots. Since the number of lots being processed in the wafer fab directly is related to the productivity of the wafer fab, the input lot formation is crucial process to reduce the production costs as well as to improve the efficiency of the wafer fab. Here, the input lot formation occurs before every shift begins in the semiconductor wafer fab. When input quantities (of wafers) for product types are given from results of the order-lot pegging process, lots to be released into the wafer fab should be formed satisfying the lot size requirements. Here, the production cost of a homogeneous lot of the same type of product is less than that of a heterogeneous lot that will be split into the number of lots according to their product types after passing the branch point during the wafer fabrication process. Also, more production cost occurs if a lot becomes more heterogeneous. We developed a multi-dimensional dynamic programming algorithm for the input lot formation problem and showed how to apply the algorithm to solve the problem optimally with an example problem instance. It is necessary to reduce the number of states at each stage in the DP algorithm for practical use. Also, we can apply the proposed DP algorithm together with lot release rules such as CONWIP and UNIFORM.

Determination of Cutting Parameters Considering Machining Safety in Milling Operation (밀링작업에서 가공 안전성을 고려한 가공조건의 결정)

  • Park, Byoung-Tae
    • Journal of the Korean Society of Safety
    • /
    • v.21 no.6 s.78
    • /
    • pp.116-121
    • /
    • 2006
  • In metal cutting processes, cutting conditions have an influence on reducing the production cost and deciding the quality of a final product. Process planners usually make modification to recommended cutting parameters obtained from machining data handbooks in order to satisfy requirements for individual operation. The modified cutting parameters also need to be examined for the safe machining. In this paper, a new operation planning system that allows the generation and check of modified cutting parameters is proposed for the milling process. A neural network methodology is introduced to identify mathematical models for generation of the modified cutting parameters, and several simplified rules and equations are presented for the check of the cutting parameters. Finally, the results are demonstrated with an example part.

Development and Analysis of the Balance Game for Elderlies: Based on Proposal of the Game-Aided (노인용 밸런스게임 개발 및 효능 연구: 복지형 게임 제언 중심으로)

  • Oh, Seong-Suk;Kim, Kyung-Sik
    • Journal of Korea Game Society
    • /
    • v.11 no.6
    • /
    • pp.33-42
    • /
    • 2011
  • In this study, game-aided human life type game design method is suggested. It mainly deals with the permissiveness of the game rules and coenesthesia of the game that are fitted with the agility of the elders such as the performance of a selective response. And 'Rolling hoops Balance Game' has been implemented by applying the game-aided human life type game. Since the pressure sensors are installed on each parts of the chair type game controller, to play the game, a gamer simply uses her hands and feet to press the sensors without requirements of the complex movements. The goal of the game are the leg muscles strength and improvement of the body balancing ability. In addition, the game graphics consists of sensory stimuli package(Namazi, Haynes, reminiscence therapy, 1994) to make friendly mood for elders. We have tested 50 elders who were more than 65 years old. 74% of them answered they were satisfied totally for the game play. It is a meaningful result that 88% of participants replied they would like to play the game again.

Analytical Study on Software Static/Dynamic Verification Methods for Deriving Enhancement of the Software Reliability Test of Weapon System (무기체계 소프트웨어 신뢰성 시험 개선점 도출을 위한 소프트웨어 정적/동적 검증 분석 사례연구)

  • Park, Jihyun;Choi, Byoungju
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.7
    • /
    • pp.265-274
    • /
    • 2019
  • The reliability test performed when developing the weapon system software is classified into static test and dynamic test. In static test, checking the coding rules, vulnerabilities and source code metric are performed without executing the software. In dynamic test, its functions are verified by executing the actual software based on requirements and the code coverage is measured. The purpose of this static/dynamic test is to find out defects that exist in the software. However, there still exist defects that can't be detected only by the current reliability test on the weapon system software. In this paper, whether defects that may occur in the software can be detected by static test and dynamic test of the current reliability test on the weapon system is analyzed through experiments. As a result, we provide guidance on improving the reliability test of weapon system software, especially the dynamic test.

Policy-based In-Network Security Management using P4 Network DataPlane Programmability (P4 프로그래머블 네트워크를 통한 정책 기반 인-네트워크 보안 관리 방법)

  • Cho, Buseung
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.3-10
    • /
    • 2020
  • Recently, the Internet and networks are regarded as essential infrastructures that constitute society, and security threats have been constantly increased. However, the network switch that actually transmits packets in the network can cope with security threats only through firewall or network access control based on fixed rules, so the effective defense for the security threats is extremely limited in the network itself and not actively responding as well. In this paper, we propose an in-network security framework using the high-level data plane programming language, P4 (Programming Protocol-independent Packet Processor), to deal with DDoS attacks and IP spoofing attacks at the network level by monitoring all flows in the network in real time and processing specific security attack packets at the P4 switch. In addition, by allowing the P4 switch to apply the network user's or administrator's policy through the SDN (Software-Defined Network) controller, various security requirements in the network application environment can be reflected.

Anomaly Detection Using Visualization-based Network Forensics (비정상행위 탐지를 위한 시각화 기반 네트워크 포렌식)

  • Jo, Woo-yeon;Kim, Myung-jong;Park, Keun-ho;Hong, Man-pyo;Kwak, Jin;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.25-38
    • /
    • 2017
  • Many security threats are occurring around the world due to the characteristics of industrial control systems that can cause serious damage in the event of a security incident including major national infrastructure. Therefore, the industrial control system network traffic should be analyzed so that it can identify the attack in advance or perform incident response after the accident. In this paper, we research the visualization technique as network forensics to enable reasonable suspicion of all possible attacks on DNP3 control system protocol, and define normal action based rules and derive visualization requirements. As a result, we developed a visualization tool that can detect sudden network traffic changes such as DDoS and attacks that contain anormal behavior from captured packet files on industrial control system network. The suspicious behavior in the industrial control system network can be found using visualization tool with Digital Bond packet.

A Web-based Open API Framework for RCS-e Session Establishment (RCS-e 세션 수립을 위한 웹 기반 오픈 API 프레임워크)

  • Lee, Dongcheul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.5
    • /
    • pp.125-131
    • /
    • 2015
  • In order to vitalize the Rich Communication Service-e(RCS-e) service, RCS-e users need various ways to use RCS including RCS-e apps. A RCS standards organization has suggested Application Program Interface(API). Since it only dealt with functional requirements, it was not enough to implement the API. This paper suggests an open API framework that can utilize RCS-e through a web interface. By using the framework, web developers can implement various RCS-e-enabled web applications. A system architecture is defined for the framework. Call flows for establishing a RCS-e session between the framework and other nodes are defined. Also, rules and examples for translating protocols between them are provided. Finally, performance evaluation proves that the proposed framework does not add loads to the existing network infrastructure.

A Study of Customer Review Analysis for Product Development based on Korean Language Processing (한글 정형화 방법에 기반한 상품평 감성분석의 제품 개발 적용 방법 연구)

  • Woo, JeHyuk;Jeong, MinKyu;Lee, JaeHyun;Suh, HyoWon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.1
    • /
    • pp.49-62
    • /
    • 2022
  • Online customer review data can be easily collected on the Internet and also they describe sentimental evaluation of a product in different aspects. Previous sentiment analysis studies evaluate the degree of sentiment with review data, which may have multiple sentences describing different product aspects. Since different aspects of a product can be described in a sentence, the proposed method suggested analyzing a sentence to build a pair of a product aspect terms and sentimental terms. Bidirectional LSTM and CRF algorithms were used in this paper. A pair of aspect terms and sentimental terms are evaluated by pre-defined evaluation rules. The paper suggested using the result of evaulation as inputs of QFD, so that the quantified customer voices effect on the requirements of a new product. Online reviews for a hair dryer were used as an example showing that the proposed approach can derive reasonable sentiment analysis results.

Evacuation Analysis for a Passenger Ship Using a Cellular Automata Model with Group Behavior (집단 행동을 나타내는 Cellular Automata 모델을 사용한 여객선 승객 탈출 분석)

  • Cha, Ju-Hwan;Ha, Sol;Lee, Kyu-Yeul
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.4
    • /
    • pp.149-155
    • /
    • 2011
  • This paper presents simulations of advance evacuation analysis using a cellular automata model for passenger behavior in an emergency of passenger ship. The proposed cellular automata model divides the space in a uniform grid called "cell." Each passenger is located in a cell and moves to another cell according to a set of local rules assumed to be associated with the individual and crowd behaviors of the passengers. To verify the usefulness of the proposed cellular automata model, 11 tests, all of which are specified in International Maritime Organization Maritime Safety Committee/ Circulation 1238 (IMO MSC/Circ. 1238), were implemented, and it was confirmed that all the requirements of these tests had been met.

An Intrusion Detection System based on the Artificial Neural Network for Real Time Detection (실시간 탐지를 위한 인공신경망 기반의 네트워크 침입탐지 시스템)

  • Kim, Tae Hee;Kang, Seung Ho
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.31-38
    • /
    • 2017
  • As the cyber-attacks through the networks advance, it is difficult for the intrusion detection system based on the simple rules to detect the novel type of attacks such as Advanced Persistent Threat(APT) attack. At present, many types of research have been focused on the application of machine learning techniques to the intrusion detection system in order to detect previously unknown attacks. In the case of using the machine learning techniques, the performance of the intrusion detection system largely depends on the feature set which is used as an input to the system. Generally, more features increase the accuracy of the intrusion detection system whereas they cause a problem when fast responses are required owing to their large elapsed time. In this paper, we present a network intrusion detection system based on artificial neural network, which adopts a multi-objective genetic algorithm to satisfy the both requirements: accuracy, and fast response. The comparison between the proposing approach and previously proposed other approaches is conducted against NSL_KDD data set for the evaluation of the performance of the proposing approach.