• Title/Summary/Keyword: 원격대학원

Search Result 186, Processing Time 0.024 seconds

A Study on Dynamics Analysis and Position Control of 5 D.O.F. Multi-joint Manipulater for Uncontact Remote Working (원격작업을 위한 5자유도 다관절 매니퓰레이터의 동특성 분석 및 위치제어에 관한 연구)

  • Kim, Hee-Jin;Jang, Gi-Wong;Kim, Seong-Il;Han, Sung-Hyun
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.25 no.1
    • /
    • pp.87-99
    • /
    • 2022
  • We propoes a study on the dynamic characteristics analysis and position control of 5-degree multi-joint manipulators for untact remote working at construction sites and manufacturing plants. The main frame of freedom multi-joint manipulator consists of five elements, boom cylinder, boom cylinder, arm cylinder, bucket cylinder, and rotation joint and link. In addition, the main purpose of the proposed system is to realize the work of the manufacturing process or construction site by remote control. Motion control of the entire system is a servo valve control method by hydraulic servo cylinders for one to four joints, and a servo motor control method is applied for five joints. The reliability of the proposed method was verified through performance experiments by computer simulation.

Software Risk Management and Cyber Security for Development of Integrated System Remotely Monitoring and Controlling Ventilators (인공호흡기 원격 통합 모니터링 및 제어 시스템 개발을 위한 소프트웨어 위험관리 및 사이버보안)

  • Ji-Yong Chung;You Rim Kim;Wonseuk Jang
    • Journal of Biomedical Engineering Research
    • /
    • v.44 no.2
    • /
    • pp.99-108
    • /
    • 2023
  • According to the COVID-19, development of various medical software based on IoT(Internet of Things) was accelerated. Especially, interest in a central software system that can remotely monitor and control ventilators is increasing to solve problems related to the continuous increase in severe COVID-19 patients. Since medical device software is closely related to human life, this study aims to develop central monitoring system that can remotely monitor and control multiple ventilators in compliance with medical device software development standards and to verify performance of system. In addition, to ensure the safety and reliability of this central monitoring system, this study also specifies risk management requirements that can identify hazardous situations and evaluate potential hazards and confirms the implementation of cybersecurity to protect against potential cyber threats, which can have serious consequences for patient safety. As a result, we obtained medical device software manufacturing certificates from MFDS(Ministry of Food and Drug Safety) through technical documents about performance verification, risk management and cybersecurity application.

Analysis of algal spatial distribution characteristics using hyperspectral images and machine learning in upstream reach of Baekje weir (초분광영상과 머신러닝을 이용한 백제보 상류구간 조류 공간분포 특성분석)

  • Jang, Wonjin;Kim, Jinuk;Chung, Jeehun;Park, Yongeun;Kim, Seongjoon
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2021.06a
    • /
    • pp.89-89
    • /
    • 2021
  • 부영양화된 호수나 유속이 느린 하천에서 발생하는 녹조의 과도한 발생은 하천 생태계 훼손, 동식물의 건강, 담수의 오염 등 환경 사회 경제적으로 큰 피해를 준다. 현재 수질 측정망은 정해진 지점에서 Chlorophyll-a(Chl-a), Phycocyanin(PC)을 대표농도로 산정하고 조류경보에 활용하고 있으나, 일주일에 한번씩 샘플링을 통해 Chl-a 및 PC를 측정하여 시공간적인 신뢰성의 문제가 제기될 수 있다. 본 연구에서는 기존 점단위 조류 모니터링의 한계점을 개선하기 위해 초분광영상 자료를 머신러닝 기법에 적용하여 Chl-a 및 PC 산정 알고리즘을 개발하였다. 이를 위해 Chl-a와 PC의 최대 흡수, 반사 파장대, 주요 물 흡수 파장대 자료를 조합하여 9개의 파장비를 구축하였으며, 기존 연구에서 활용한 머신러닝 기법인 Partial Least Square, Random Forest, Gradient Boosting, Support Vector Machine, K-Nearest Neighbor, Artificial Neural Network를 검토하여 최적 모델을 선정하였다. 학습된 머신러닝의 성능을 R2, NSE, RMSE 목적함수를 이용해 평가하였으며, 그 결과 ANN이 각각 PC 0.801, 0.755, 11.774 mg/m3, Chl-a 0.733, 0.622, 8.736 mg/m3로 가장 우수한 성능을 보였다. 최적화 된 ANN 모델을 백제보 상류 2016-2017년 항공 초분광영상에 적용하여 시공간에 따른 조류 분포변화를 평가하고자 한다.

  • PDF

A Message Authentication and Key Distribution Mechanism Secure Against CAN bus Attack (CAN 버스 공격에 안전한 메시지 인증 및 키 분배 메커니즘)

  • Cho, A-Ram;Jo, Hyo Jin;Woo, Samuel;Son, Young Dong;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1057-1068
    • /
    • 2012
  • According to advance on vehicle technology, many kinds of ECU(Electronic Control Unit) are equipped inside the vehicle. In-vehicle communication among ECUs is performed through CAN(Controller Area Networks). CAN have high reliability. However, it has many vulnerabilities because there is not any security mechanism for CAN. Recently, many papers proposed attacks of in-vehicle communication by using these vulnerabilities. In this paper, we propose an wireless attack model using a mobile radio communication network. We propose a secure authentication mechanism for in-vehicle network communication that assure confidentiality and integrity of data packets and also protect in-vehicle communication from the replay attack.

Analysis on the Current Virtual Workplace Design Trends, and a Proposal for the Design Directions of the Future Virtual Workplace - Based on 12 Current Virtual Workplace Platforms - (가상 업무 공간의 디자인 현황 분석 및 향후 디자인 방법에 관한 제언 - 12개의 현행 사례의 비교분석을 중심으로 -)

  • Cho, Kyung hyun;Eum, Yu jeung;Choi, Hyeok jin;Lee, Seung Hyun;Cha, Seung Hyun
    • Journal of KIBIM
    • /
    • v.12 no.4
    • /
    • pp.80-92
    • /
    • 2022
  • Recently, remote work has arisen due to the social atmosphere and advancement of digital technology. Although effective in premeditated communications such as conferences or meetings, the current technology such as messengers and video chats insufficiently supports impromptu communications like a chance encounter, daily conversation with colleagues, or brief instant meetings. This causes various problems such as a decrease in social belonging and an increase in social isolation. The virtual workplace, which emerged as an alternative to this technology, is merely replicating the workplace layouts in reality with an absence of the proper design guideline. Therefore, this paper aims to establish the foundation for the better design of the virtual workplace for remote-work employees. The research compared 12 current workplace cases with the analysis with 5 categories(Spatial Composition, Scale, Individual & Collaboration Workplace, Socializing Space), and discovered the following results: 1) some design principles of the real workplace can be applied on the virtual workplace design, 2) the architectural components of the virtual workplace can differ from them of the real. Based on the results, the research suggests both the appropriate design methodologies of the virtual workplace considering the design principles of the real office layouts, and the design direction for the future of the virtual workplace. This research will be the foundation for the future design of the virtual workplace.

Land Cover Change Detection over Urban Stream's Drainage Area Using Landsat TM and ETM+ Images (Landsat TM과 ETM+ 영상을 이용한 도시하천 집수구역의 토지이용변화 파악)

  • Kim, Jae-Cheol;Park, Cheol-Hyun;Shin, Dong-Hoon;Lee, Kyoo-Seock
    • Korean Journal of Remote Sensing
    • /
    • v.22 no.6
    • /
    • pp.575-579
    • /
    • 2006
  • The land use in suburban area has been changed rapidly due to the urban expansion in Korea during the last few decades. And such land use changes result in various environmental problems such as biodiversity decrease, habitat fragmentation, air pollution and urban heat island. Remote Sensing (RS) and Geographical Information Systems (GIS) can be used for land cover change detection to understand the impact and trend of the land use change. Change detection is the process of identifying differences in the state of an object or phenomenon by observing it at different times and it can provide quantitative and comparative information for the land use/cover change. RS is less expansive than field survey for producing land use maps, and can be accessed quickly and repetitively for large area. Also it can be used for change detection using multi-temporal land use/cover by accumulated data. Therefore, the purpose of this study is to detect and quantitatively evaluate urban land cover change in urban stream watershed area for the last few decades and ultimately to provide the basic data for urban land use planning and management.

Comparison between Neural Network and Conventional Statistical Analysis Methods for Estimation of Water Quality Using Remote Sensing (원격탐사를 이용한 수질평가시의 인공신경망에 의한 분석과 기존의 회귀분석과의 비교)

  • 임정호;정종철
    • Korean Journal of Remote Sensing
    • /
    • v.15 no.2
    • /
    • pp.107-117
    • /
    • 1999
  • A comparison of a neural network approach with the conventional statistical methods, multiple regression and band ratio analyses, for the estimation of water quality parameters in presented in this paper. The Landsat TM image of Lake Daechung acquired on March 18, 1996 and the thirty in-situ sampling data sets measured during the satellite overpass were used for the comparison. We employed a three-layered and feedforward network trained by backpropagation algorithm. A cross validation was applied because of the small number of training pairs available for this study. The neural network showed much more successful performance than the conventional statistical analyses, although the results of the conventional statistical analyses were significant. The superiority of a neural network to statistical methods in estimating water quality parameters is strictly because the neural network modeled non-linear behaviors of data sets much better.

Vulnerability Analysis of Remote Multi-Server User Authentication System Based on Smart Card and Dynamic ID (스마트 카드 및 동적 ID 기반 멀티서버 원격 사용자 인증 프로토콜의 취약점 분석)

  • Kwon Soon Hyung;Byeon Hae won;Choi Youn Sung
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.43-52
    • /
    • 2023
  • Many businesses and organizations use smartcard-based user authentication for remote access. In the meantime, through various studies, dynamic ID-based remote user authentication protocols for distributed multi-server environments have been proposed to protect the connection between users and servers. Among them, Qiu et al. proposed an efficient smart card-based remote user authentication system that provides mutual authentication and key agreement, user anonymity, and resistance to various types of attacks. Later, Andola et al. found various vulnerabilities in the authentication scheme proposed by Qiu et al., and overcame the flaws in their authentication scheme, and whenever the user wants to log in to the server, the user ID is dynamically changed before logging in. An improved authentication protocol is proposed. In this paper, by analyzing the operation process and vulnerabilities of the protocol proposed by Andola et al., it was revealed that the protocol proposed by Andola et al. was vulnerable to offline smart card attack, dos attack, lack of perfect forward secrecy, and session key attack.

Proposal of design plan to improve immersion in online video education -Focusing on Zoom and Webex- (온라인 화상 교육 몰입도 향상을 위한 디자인 방안 제안 -줌(Zoom)과 웹엑스(Webex)를 중심으로-)

  • Lee, Kaha;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.19 no.7
    • /
    • pp.341-348
    • /
    • 2021
  • This study identified learners' immersion, focusing on online video education platforms, Zoom and Webex, used in colleges after the 'Covid-19', and suggested design improvement measures to improve immersion. Through prior research and literature research, the components of immersion and screen components of the online distance education platform were identified, and measures to improve immersion were suggested through questionnaire surveys and in-depth interviews. The research method was conducted for 5 days from April 7 to 12, 2021 for 50 college students and graduate students in their 20s and 30s who are receiving online education through Zoom and Webex, and 6 people were interviewed in-depth. As a result of the experiment, the communication between learners and lecturers was deduced as the biggest factor, so a design plan to facilitate communication between learners and lecturers was proposed based on Gutenberg's diagram. As online video education is predicted to continue even after the Covid-19, continuous online video education immersion research is needed, and we hope that it can contribute to the direction of the research.

Intrusion Detection Methodology for SCADA system environment based on traffic self-similarity property (트래픽 자기 유사성(Self-similarity)에 기반한 SCADA 시스템 환경에서의 침입탐지방법론)

  • Koh, Pauline;Choi, Hwa-Jae;Kim, Se-Ryoung;Kwon, Hyuk-Min;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.267-281
    • /
    • 2012
  • SCADA system is a computer system that monitors and controls the national infrastructure or industrial process including transportation facilities, water treatment and distribution, electrical power transmission and distribution, and gas pipelines. The SCADA system has been operated in a closed network, but it changes to open network as information and communication technology is developed rapidly. As the way of connecting with outside user extends, the possibility of exploitation of vulnerability of SCADA system gets high. The methodology to protect the possible huge damage caused by malicious user should be developed. In this paper, we proposed anomaly detection based intrusion detection methodology by estimating self-similarity of SCADA system.