• Title/Summary/Keyword: 목표기반시나리오

Search Result 161, Processing Time 0.025 seconds

Adaptive Enhancement of Low-light Video Images Algorithm Based on Visual Perception (시각 감지 기반의 저조도 영상 이미지 적응 보상 증진 알고리즘)

  • Li Yuan;Byung-Won Min
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.2
    • /
    • pp.51-60
    • /
    • 2024
  • Aiming at the problem of low contrast and difficult to recognize video images in low-light environment, we propose an adaptive contrast compensation enhancement algorithm based on human visual perception. First of all, the video image characteristic factors in low-light environment are extracted: AL (average luminance), ABWF (average bandwidth factor), and the mathematical model of human visual CRC(contrast resolution compensation) is established according to the difference of the original image's grayscale/chromaticity level, and the proportion of the three primary colors of the true color is compensated by the integral, respectively. Then, when the degree of compensation is lower than the bright vision precisely distinguishable difference, the compensation threshold is set to linearly compensate the bright vision to the full bandwidth. Finally, the automatic optimization model of the compensation ratio coefficient is established by combining the subjective image quality evaluation and the image characteristic factor. The experimental test results show that the video image adaptive enhancement algorithm has good enhancement effect, good real-time performance, can effectively mine the dark vision information, and can be widely used in different scenes.

An Ontology-based Generation of Operating Procedures for Boiler Shutdown : Knowledge Representation and Application to Operator Training (온톨로지 기반의 보일러 셧다운 절차 생성 : 지식표현 및 훈련시나리오 활용)

  • Park, Myeongnam;Kim, Tae-Ok;Lee, Bongwoo;Shin, Dongil
    • Journal of the Korean Institute of Gas
    • /
    • v.21 no.4
    • /
    • pp.47-61
    • /
    • 2017
  • The preconditions of the usefulness of an operator safety training model in large plants are the versatility and accuracy of operational procedures, obtained by detailed analysis of the various types of risks associated with the operation, and the systematic representation of knowledge. In this study, we consider the artificial intelligence planning method for the generation of operation procedures; classify them into general actions, actions and technical terms of the operator; and take into account the sharing and reuse of knowledge, defining a knowledge expression ontology. In order to expand and extend the general operations of the operation, we apply a Hierarchical Task Network (HTN). Actual boiler plant case studies are classified according to operating conditions, states and operating objectives between the units, and general emergency shutdown procedures are created to confirm the applicability of the proposed method. These results based on systematic knowledge representation can be easily applied to general plant operation procedures and operator safety training scenarios and will be used for automatic generation of safety training scenarios.

Development of Information Security Practice Contents for Ransomware Attacks in Digital Twin-Based Smart Factories (디지털트윈 기반의 스마트공장에서 랜섬웨어 공격과 피해 분석을 위한 정보보안 실습콘텐츠 시나리오 개발)

  • Nam, Su Man;Lee, Seung Min;Park, Young Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.1001-1010
    • /
    • 2021
  • Smart factories are complex systems which combine latest information technology (IT) with operation technology (OT). A smart factory aims to provide manufacturing capacity improvement, customized production, and resource reduction with these complex technologies. Although the smart factory is able to increase the efficiency through the technologies, the security level of the whole factory is low due to the vulnerability transfer from IT. In addition, the response and restoration of the business continuity plan are insufficient in case of damage due to the absence of factory security experts. The cope with the such problems, we propose an information security practice content for analyzing the damage by generating ransomware attacks in a digital twin-based smart factory similar to the real world. In our information security content, we introduce our conversion technique of physical devices into virtual machines or simulation models to build a practical environment for the digital twin. This content generates two types of the ransomware attacks according to a defined scenario in the digital twin. When the two generated attacks are successfully completed, at least 8 and 5 of the 23 virtual elements are take damage, respectively. Thus, our proposed content directly identifies the damage caused by the generation of two types of ransomware in the virtual world' smart factory.

Using Requirements Engineering to support Non-Functional Requirements Elicitation for DAQ System

  • Kim, Kyung-Sik;Lee, Seok-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.3
    • /
    • pp.99-109
    • /
    • 2021
  • In recent machine learning studies, in order to consider the quality and completeness of data, derivation of non-functional requirements for data has been proposed from the viewpoint of requirements engineering. In particular, requirements engineers have defined data requirements in machine learning. In this study, data requirements were derived at the data acquisition (DAQ) stage, where data is collected and stored before data preprocessing. Through this, it is possible to express the requirements of all data required in the existing DAQ system, the presence of tasks (functions) satisfying them, and the relationship between the requirements and functions. In addition, it is possible to elicit requirements and to define the relationship, so that a software design document can be produced, and a systematic approach and direction can be established in terms of software design and maintenance. This research using existing DAQ system cases, scenarios and use cases for requirements engineering approach are created, and data requirements for each case are extracted based on them, and the relationship between requirements, functions, and goals is illustrated through goal modeling. Through the research results, it was possible to extract the non-functional requirements of the system, especially the data requirements, from the DAQ system using requirements engineering.

Projection of Temporal and Spatial Precipitation Characteristic Change in Urban Area according to Extreme Indices (극한기후 지수에 따른 도시지역의 시공간적 강우 특성 변화 전망)

  • Soo Jin Moon;In Hee Yeo;Ji Hoon Choi
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.316-316
    • /
    • 2023
  • 2022년 8월 수도권 이상폭우로 인해 서울 도심지역의 지하시설, 도로, 주택 등에 침수가 발생하면서 인명 및 재산피해가 발생하였으며, 특히 동서로 가로지르는 정체전선으로 좁고 긴 비구름이 집중되면서 국지적으로 피해가 집중되었다. 서울시의 경우 도시화에 따른 불투수지역 증가 및 내수배제 불량에 따른 빗물 역류로 인한 피해가 지속적으로 발생하고 있으며, 최근에는 기후변화에 따른 방재성능목표 강우량을 초과하는 빈도의 이상폭우로 인해 하천범람과 내수배제 불량에 따른 복합적인 원인으로 침수피해 가중되고 있는 실정이다. 또한 서울시의 경우 전체 자연적, 사회적, 경제적, 환경적 요인 등의 지역적 편차가 매우 큰 도시로 지형적인 특성뿐만 아니라 취약시설(병원, 학교 등), 수방시설물(하천, 배수시설, 빗물펌프장 등) 및 방재시설(대피소, 구호소 등) 밀도 등에 따른 침수 취약성 및 위험성 등의 편차가 매우 크기 때문에 지역특성에 대한 피해사례가 다원화 되고 있는 실정이다. 본 연구에서는 30년 이상의 종관기상관측(ASOS)과 서울시 자치구별 20년 이상의 방재기상관측(AWS)자료를 기반으로 CMIP6 SSP(Shared Socioeconomic Pathways, 공통사회 경제경로)시나리오에 따른 극한기후 지수(강수강도, 호우일수, 지속기간, 1일 최대강수량, 95퍼센타일 강수일수 등)에 대한 재현성을 평가하고 공간자기상관분석 등 시공간적인 강우특성에 대한 변화를 전망하였다. 특히 여름철 강우의 경우 자치구별 편차가 크게 나타났고 이를 통해 대도시의 도심지역의 경우 세분화하여 지역의 정확한 강우특성을 파악하는 것이 필요하다는 것을 확인할 수 있었다. 본 연구의 결과는 도심지의 방재성능 초과강우 정의와 기준을 수립하고, 장기적인 수자원 및 도시계획 차원의 대책을 마련하는데 활용될 수 있을 것으로 판단된다. 기후위기에 따른 기록적인 호우(지역별 방재성능을 초과하는 강우)에 따른 재해는 구조적인 대책을 통해 모두 저감할 수 없는 한계가 있다. 하지만 인명피해를 최소화하는 것을 목표로 기후위기에 대한 적응단계로 인식하고 수리·수문학적, 사회경제학적 등 지역특성에 따른 방재성능목표 강우량에 대한 재검토와 더불어 법제도(풍수해보험, 저류조설치 의무화 등), 개인별 재해예방, 취약계층 안전망 확보, 반지하주택 침수안전대책, 재해지도 개선 등 구조적/비구조적인 대책을 통합 수립 및 보완하는 것이 필요한 시점이다.

  • PDF

Development of LiDAR-Based MRM Algorithm for LKS System (LKS 시스템을 위한 라이다 기반 MRM 알고리즘 개발)

  • Son, Weon Il;Oh, Tae Young;Park, Kihong
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.1
    • /
    • pp.174-192
    • /
    • 2021
  • The LIDAR sensor, which provides higher cognitive performance than cameras and radar, is difficult to apply to ADAS or autonomous driving because of its high price. On the other hand, as the price is decreasing rapidly, expectations are rising to improve existing autonomous driving functions by taking advantage of the LIDAR sensor. In level 3 autonomous vehicles, when a dangerous situation in the cognitive module occurs due to a sensor defect or sensor limit, the driver must take control of the vehicle for manual driving. If the driver does not respond to the request, the system must automatically kick in and implement a minimum risk maneuver to maintain the risk within a tolerable level. In this study, based on this background, a LIDAR-based LKS MRM algorithm was developed for the case when the normal operation of LKS was not possible due to troubles in the cognitive system. From point cloud data collected by LIDAR, the algorithm generates the trajectory of the vehicle in front through object clustering and converts it to the target waypoints of its own. Hence, if the camera-based LKS is not operating normally, LIDAR-based path tracking control is performed as MRM. The HAZOP method was used to identify the risk sources in the LKS cognitive systems. B, and based on this, test scenarios were derived and used in the validation process by simulation. The simulation results indicated that the LIDAR-based LKS MRM algorithm of this study prevents lane departure in dangerous situations caused by various problems or difficulties in the LKS cognitive systems and could prevent possible traffic accidents.

The Establishment of Service Cloud Based Expansion and Developing Plan for National Spatial Data Infrastructure (서비스 클라우드 기반 국가공간정보통합체계 확대발전방안 수립)

  • Youn, Junhee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.1
    • /
    • pp.367-373
    • /
    • 2016
  • The construction of National Spatial Data Infrastructure (NSDI) started from 2008 and was completed at 2012, with the aim of co-utilizing public agencies' national spatial information by integrating and linking. Despite the existence of the NSDI, an update of spatial data is not fully reflected because the spatial information has not been updated simultaneously by NSDI and public agencies. By examining the public agencies' services using the spatial information, a national budget is wasted because the re-usable similar services are duplicated. These issues could be solved by adopting a cloud system, whose concept is co-utilizing IT resources, to the NSDI. This study examined the service cloud based expansion and development plan for NSDI. The plan included an implementation strategy for a spatial information service cloud system and an establishment plan for a governance system. The service scenarios, concept diagram, and service functions for the system were derived in a system implementation plan. For the service functions, the unit functions of two modules were proposed and specific functions were derived. In the establishment of a governance system, the business roles and business processes were defined for organizations managing service cloud based NSDI. The business role and process were defined and derived by each service life-cycle step. With the proposed system implementation plan, a detail system design and composition of the organization could be possible, and a service cloud-based NSDI system could be implemented.

Study on security requirements for the web based operation system of a shipping company (웹 기반 해운 선사 운영시스템 보안 요구사항 연구)

  • Chung, Up;Moon, Jongsub
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.49-68
    • /
    • 2022
  • The operation system of a shipping company is still maintaining the mainframe based terminal access environment or the client/server based environment. Nowadays shipping companies that try to migrate it into a web-based environment are increasing. However, in the transition, if the design is processed by the old configuration and knowledge without considering the characteristics of the web-based environment and shipping business, various security vulnerabilities will be revealed at the actual system operation stage, and system maintenance costs to fix them will increase significantly. Therefore, in the transition to a web-based environment, a security design must be carried out from the design stage to ensure system safety and to reduce security-related maintenance costs in the future. This paper examines the characteristics of various threat modeling techniques, selects suitable modeling technique for the operation system of a shipping company, applies data flow diagram and STRIDE threat modeling technique to shipping business, derives possible security threats from each component of the data flow diagram in the attacker's point of view, validates the derived threats by mapping them with attack library items, represents the attack tree having various attack scenarios that attackers can attempt to achieve their final goals, organizes into the checklist that has security check items, associated threats and security requirements, and finally presents 23 security requirements that can respond to threats. Unlike the existing general security requirements, the security requirements presented in this paper reflect the characteristics of shipping business because they are derived by analyzing the actual business of a shipping company and applying threat modeling technique. Therefore, I think that the presented security requirements will be of great help in the security design of shipping companies that are trying to proceed with the transition to a web-based environment in the future.

Damage estimation for structural safety evaluation using dynamic displace measurement (구조안전도 평가를 위한 동적변위 기반 손상도 추정 기법 개발)

  • Shin, Yoon-Soo;Kim, Junhee
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.23 no.7
    • /
    • pp.87-94
    • /
    • 2019
  • Recently, the advance of accurate dynamic displacement measurement devices, such as GPS, computer vision, and optic laser sensor, has enhanced the structural monitoring technology. In this study, the dynamic displacement data was used to verify the applicability of the structural physical parameter estimation method through subspace system identification. The subspace system identification theory for estimating state-space model from measured data and physics-based interpretation for deriving the physical parameter of the estimated system are presented. Three-degree-freedom steel structures were fabricated for the experimental verification of the theory in this study. Laser displacement sensor and accelerometer were used to measure the displacement data of each floor and the acceleration data of the shaking table. Discrete state-space model generated from measured data was verified for precision. The discrete state-space model generated from the measured data extracted the floor stiffness of the building after accuracy verification. In addition, based on the story stiffness extracted from the state space model, five column stiffening and damage samples were set up to extract the change rate of story stiffness for each sample. As a result, in case of reinforcement and damage under the same condition, the stiffness change showed a high matching rate.

Designing Smart Sportswear to Support the Prevention of Sports Injuries in Badminton Club Activities (배드민턴 동호회의 스포츠 상해 예방을 지원하는 스마트의류 디자인 제안)

  • Kim, Shin-Hye;Lee, Joo-Hyeon
    • Science of Emotion and Sensibility
    • /
    • v.23 no.3
    • /
    • pp.37-46
    • /
    • 2020
  • This study was aimed at investigating the activities of a badminton club and designing smart wear to prevent sports injuries during badminton club activities. Everyone is familiar with sports in an aging society and clubs are gradually developing. Popular badminton club activities lead to frequent sports injuries, especially ankle injuries, which are a serious problem that hampers members' participation in sports. Therefore, this study aims to propose a prototype design for smart wear to prevent sports injuries, including ankle injuries. First, we identified the characteristics and considerations of members of badminton clubs, and the components of smart wear to prevent sports injuries. Second, members of the badminton clubs and an elite badminton player participated in a survey on the issues and requirements associated with wearing smart wear. Third, usage scenarios for smart wear were created based on literature reviews and the user assessment lists. Fourth, a prototype of the smart wear to prevent sports injuries including ankle injuries was created based on the scenarios. With the proposed smart wear, members of badminton clubs who may require assistance with sports injuries will be able to monitor said injuries, as well as their health condition, as avatars in visual games through a smart terminal. The visual game system will provide easier access to information about sports injuries and health. This smart sportswear will allow members of badminton clubs to prevent sports injuries and review their performance. This study can be utilized to design smart wear to prevent sports injuries and monitor sporting activities or bio-signals.