• Title/Summary/Keyword: 사이버 물리시스템

Search Result 153, Processing Time 0.028 seconds

Verification of X-sight Lung Tracking System in the CyberKnife (사이버나이프에서 폐종양 추적 시스템의 정확도 분석)

  • Huh, Hyun-Do;Choi, Sang-Hyoun;Kim, Woo-Chul;Kim, Hun-Jeong;Kim, Seong-Hoon;Cho, Sam-Ju;Min, Chul-Ki;Cho, Kwang-Hwan;Lee, Sang-Hoon;Choi, Jin-Ho;Lim, Sang-Wook;Shin, Dong-Oh
    • Progress in Medical Physics
    • /
    • v.20 no.3
    • /
    • pp.174-179
    • /
    • 2009
  • To track moving tumor in real time, CyberKnife system imports a technique of the synchrony respiratory tracking system. The fiducial marker which are detectable in X-ray images were demand in CyberKnife Robotic radiosurgery system. It issued as reference markers to locate and track tumor location during patient alignment and treatment delivery. Fiducial marker implantation is an invasive surgical operation that carries a relatively high risk of pneumothorax. Most recently, it was developed a direct lung tumor registration method that does not require the use of fiducials. The purpose of this study is to measure the accuracy of target applying X-sight lung tracking using the Gafchromic film in dynamic moving thorax phantom. The X-sight Lung Tracking quality assurance motion phantom simulates simple respiratory motion of a lung tumor and provides Gafchromic dosimetry film-based test capability at locations inside the phantom corresponding to a typical lung tumor. The total average error for the X-sight Lung Tracking System with a moving target was $0.85{\pm}0.22$ mm. The results were considered reliable and applicable for lung tumor treatment in CyberKnife radiosurgery system. Clinically, breathing patterns of patients may vary during radiation therapy. Therefore, additional studies with a set real patient data are necessary to evaluate the target accuracy for the X-sight Lung Tracking system.

  • PDF

Strategies Building Knowledge_Base to Respond Effectively to Advanced Cyber Threats (고도화된 사이버 위협에 효과적으로 대응하기 위한 Knowledge_Base 구축전략)

  • Lee, Tae-Young;Park, Dong-Gue
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.8
    • /
    • pp.357-368
    • /
    • 2013
  • Our society has evolved into a fully connected society in a mixed reality environment enabling various knowledge sharing / management / control / creation due to the expansion of broadband ICT infrastructure, smart devices, cloud services and social media services. Therefore cyber threats have increased with the convenience. The society of the future can cause more complex and subtle problems, if you do not have an effective response to cyber threats, due to fusion of logical space and physical space, organic connection of the smart object and the universalization of fully connected society. In this paper, we propose the strategy to build knowledge-base as the basis to actively respond to new cyber threats caused by future various environmental changes and the universalization of fully connected society.

Internet of Things (IoT) Based Modeling for Dynamic Security in Nuclear Systems with Data Mining Strategy (데이터 마이닝 전략을 사용하여 원자력 시스템의 동적 보안을 위한 사물 인터넷 (IoT) 기반 모델링)

  • Jang, Kyung Bae;Baek, Chang Hyun;Kim, Jong Min;Baek, Hyung Ho;Woo, Tae Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.1
    • /
    • pp.9-19
    • /
    • 2021
  • The data mining design incorporated with big data based cloud computing system is investigated for the nuclear terrorism prevention where the conventional physical protection system (PPS) is modified. The networking of terror related bodies is modeled by simulation study for nuclear forensic incidents. It is needed for the government to detect the terrorism and any attempts to attack to innocent people without illegal tapping. Although the mathematical algorithm of the study can't give the exact result of the terror incident, the potential possibility could be obtained by the simulations. The result shows the shape oscillation by time. In addition, the integration of the frequency of each value can show the degree of the transitions of the results. The value increases to -2.61741 in 63.125th hour. So, the terror possibility is highest in later time.

Control of Cyber-Physical Systems Under Cyber-Attacks (사이버공격에 강인한 사이버물리시스템의 제어)

  • Lee, Tae H.
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.14 no.5
    • /
    • pp.269-275
    • /
    • 2019
  • This paper addresses the control problem of cyber-physical systems under controller attack. A novel discontinuous Lyapunov functionals are employed to fully utilize sampled-data pattern which characteristic is commonly appeared in cyber-physical systems. By considering the limited resource of networks, cyber-attacks on the controller are considered randomly occurring and are described as an attack function which is nonlinear but assumed to be satisfying Lipschitz condition. Novel criteria for designing controller with robustness for cyber-attacks are developed in terms of linear matrix inequality (LMI). Finally, a numerical example is given to prove the usefulness of the proposed method.

Connectivity Management of a Pedestrian Smartphone App in the Cyber-Physical Intersection Systems (CPIS) (사이버-물리 교차로 시스템에서 보행자를 위한 스마트폰 앱의 연결성 관리)

  • Jeong, Han-You;Suramardhana, Tommy Adhyasa;Nguyen, Hoa-Hung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.9
    • /
    • pp.578-589
    • /
    • 2014
  • In this paper, we introduce the concept of cyber-physical intersection systems (CPIS) which interconnects roadside units (RSU) located at the intersection, on-board units (OBU) of moving vehicles, and the smartphone apps, named the Smartphone Agent (SA). At the pedestrian mode of the SA, the connectivity management schemes, such as a location update and a handover control algorithm, are proposed to better support the CPIS services while minimizing the power consumption of the pedestrian's smartphone. We develop a real prototype of the CPIS, including RSU, OBU, and the SA. Based on the numerical results collected from a pedestrian moving around the Pusan National University campus, we validate that the proposed connectivity management schemes can improve not only the power efficiency of the pedestrian's smartphone, but also the quality of the CPIS services.

Design and Implementation of Green Light Optimal Speed Advisory Based on Reference Mobility Models (GLOSA-RMM) in Cyber-Physical Intersection Systems (CPIS) (사이버-물리 교차로 시스템에서 참조이동모형 기반 녹색신호 최적화 가속도 조언의 설계 및 구현)

  • Jeong, Han-You;Suramardhana, Tommy Adhyasa;Nguyen, Hoa-Hung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.8
    • /
    • pp.544-554
    • /
    • 2014
  • In this paper, we introduce a cyber-physical intersection systems (CPIS) which intimately interconnects roadside units (RSU) located at intersection, on-board units (OBU) of moving vehicles, and smartphone apps. Based on the architecture of CPIS, we also present a green light optimal speed advisory based on the reference mobility models (GLOSA-RMM) to reduce intersection stopping time (IST) and fuel consumption. Based on several reference mobility models, the GLOSA-RMM determines the appropriate speed advisory by taking into account the current mobility and the intersection traffic light status, and then provides screen/voice GLOSA instructions to minimize the driver's distraction. We show that the GLOSA-RMM can reduce both the IST and the fuel consumption through the numerical results obtained from the prototype of the CPIS consisting of the OBU, the RSU and the smartphone app.

Smart Factory for Small Companies (중소기업을 위한 스마트팩토리)

  • Park, Sahnggi;Lee, M.L.
    • Electronics and Telecommunications Trends
    • /
    • v.31 no.6
    • /
    • pp.39-47
    • /
    • 2016
  • 스마트팩토리의 세계시장 규모가 2015년 약 177조에서 2020년 약 437조까지 년 평균 20%씩 성장할 것으로 한 보고서는 예측하였다. 한국은 스마트팩토리 보급을 위해 2020년까지 스마트공장을 1만개까지 확산시킨다는 계획이다. 스마트팩토리의 핵심기술은 IoT와 사이버물리시스템(Cyber Physical System: CPS)으로 구성되고 이에 필요한 핵심 하드웨어는 센서소자/모듈, 무선 센서네트워크로 구성된다. 중소기업을 위한 스마트팩토리의 기본적인 구성요소와 통신구조를 논의한다. 그리고 일부 구성요소를 세 기업에 지원한 사례를 알아보고 스마트팩토리를 중소기업에 적용하는 방안 및 문제점을 논의한다.

  • PDF

신뢰 네트워크 기반 Trusted Information Infrastructure(TII) 기술

  • Hong, Gang-Un;Eom, Tae-Won;Lee, Nam-Gyeong;Lee, Hyeon-U;Choe, Jun-Gyun
    • Information and Communications Magazine
    • /
    • v.33 no.2
    • /
    • pp.3-9
    • /
    • 2016
  • 본 고에서는 고신뢰 사물지능 생태계 창출을 위한 TII S/W 프레임워크를 소개한다. TII 기술은 사람, 사물, 서비스에 대한 신뢰 정보를 용이하게 수집하고, 신뢰 모델링을 통해 물리적, 사이버, 소셜 영역의 사람/사물에 대한 신뢰 데이터 구조화와 복합 신뢰 분석을 수행하며, TSB(Trust Service Broker)의 중재를 통해 상세 개인/사물 정보 제공없이 신뢰 기반 서비스를 이용/제공하는 것을 특징으로 한다. 전체론적 신뢰 관리를 위해 TII 시스템에 신뢰 네트워크를 고려한 구조를 제시한다.

Autonomic Computing for Cyber Physical Systems (사이버 물리 시스템을 위한 자율 컴퓨팅)

  • Yoo, Giljong;Lee, Eunseok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.185-186
    • /
    • 2009
  • 오늘날 분산 컴퓨팅 환경은 유비쿼터스 컴퓨팅 기술을 요구하고 있다. 미국의 경우 최근 몇 년간 CPS에 대한 개념을 도입하여 차세대 임베디드 산업에 대한 새로운 패러다임을 제시하였고, 유비쿼터스 기술은 CPS 기술의 형태로 변화되기 시작하였다. 여기에 더해 실시간의 컴퓨팅 관리와 사용을 위해 자율 컴퓨팅 기술이 필요하며 기존과 달리 CPS 형 자율 컴퓨팅이 요구되고 있다. 본 논문은 기존의 분산 컴퓨팅과 CPS 컴퓨팅에서의 자율 컴퓨팅 요구를 소개하였다. 따라서 CPS 환경을 위해 주목해야 할 요소 기술들을 정리하였다.

Development of Conversion Smart Monitoring App for Elementary School Student (초등학생을 대상으로 한 융복합 스마트 안전지킴이 앱 개발)

  • Cho, Han-Jin;Kim, Jin-Mook
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.211-217
    • /
    • 2015
  • Recently, school violence problem has increased serious. And this is not only an individual issue but also this is a social problem. Realistically, not only physical violence, cyber violence using the smartphone is very serious. And if the elementary school students are exposed to cyber violence, it becomes even more serious problem. Therefore, we proposed an Smart Monitoring app that protect the smart safety such as as a countermeasure against cyber violence to elementary school students. This Conversion Smart app can support grasp service for children using location based service on the smartphone when he will come to the home. And it can support another service that abuse or vulgar language in messenger. Grasps the degree of use of the language that is prohibited friendship in elementary school through this process, it can be derived. And we have future works that is the search rate and response time an inappropriate word on the proposed system.