• Title/Summary/Keyword: Hardware test

Search Result 1,063, Processing Time 0.026 seconds

Implementation of Cloud-Based Artificial Intelligence Education Platform (클라우드 기반 인공지능 교육 플랫폼 구현)

  • Wi, Woo-Jin;Moon, Hyung-Jin;Ryu, Gab-Sang
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.6
    • /
    • pp.85-92
    • /
    • 2022
  • Demand for big data analysis and AI developers is increasing, but there is a lack of an education base to supply them. In this paper, by developing a cloud-based artificial intelligence education platform, the goal was to establish an environment in which practical practical training can be efficiently learned at low cost at educational institutions and IT companies. The development of the education platform was carried out by planning scenarios for each user, architecture design, screen design, implementation of development functions, and hardware construction. This training platform consists of a containerized workload, service management platform, lecture and development platform for instructors and students, and secured cloud stability through real-time alarm system and age test, CI/CD development environment, and reliability through docker image distribution. The development of this education platform is expected to expand opportunities to enter new businesses in the education field and contribute to fostering working-level human resources in the AI and big data fields.

Robust Wireless Sensor and Actuator Network for Critical Control System (크리티컬한 제어 시스템용 고강건 무선 센서 액추에이터 네트워크)

  • Park, Pangun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.11
    • /
    • pp.1477-1483
    • /
    • 2020
  • The stability guarantee of wireless network based control systems is still challenging due to the lossy links and node failures. This paper proposes a hierarchical cluster-based network protocol called robust wireless sensor and actuator network (R-WSAN) by combining time, channel, and space resource diversity. R-WSAN includes a scheduling algorithm to support the network resource allocation and a control task sharing scheme to maintain the control stability of multiple plants. R-WSAN was implemented on a real test-bed using Zolertia RE-Mote embedded hardware platform running the Contiki-NG operating system. Our experimental results demonstrate that R-WSAN provides highly reliable and robust performance against lossy links and node failures. Furthermore, the proposed scheduling algorithm and the task sharing scheme meet the stability requirement of control systems, even if the controller fails to support the control task.

UML 2.0 Statechart based Modeling and Analysis of Finite State Model for Cryptographic Module Validation (암호모듈 검증을 위한 UML 2.0 상태도 기반의 유한상태모델 명세 및 분석)

  • Lee, Gang-soo;Jeong, Jae-Goo;Kou, Kab-seung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.91-103
    • /
    • 2009
  • A cryptographic module (CM) is an implementation of various cryptographic algorithms and functions by means of hardware or software, When a CM is validated or certified under the CM validation program(CMVP), a finite state model(FSM) of the CM should be developed and provided, However, guides or methods of modeling and analysis of a FSM is not well-known, because the guide is occasionally regarded as a proprietary know-how by developers as well as verifiers of the CM. In this paper, we propose a set of guides on modeling and analysis of a FSM, which is needed for validation of a CM under CMVP, and a transition test path generation algorithm, as well as implement a simple modeling tool (CM-Statecharter). A FSM of a CM is modeled by using the Statechart of UML 2.0, Statechart, overcoming weakness of a FSM, is a formal and easy specification model for finite state modeling of a CM.

Application and Performance Analysis of Machine Learning for GPS Jamming Detection (GPS 재밍탐지를 위한 기계학습 적용 및 성능 분석)

  • Jeong, Inhwan
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.5
    • /
    • pp.47-55
    • /
    • 2019
  • As the damage caused by GPS jamming has been increased, researches for detecting and preventing GPS jamming is being actively studied. This paper deals with a GPS jamming detection method using multiple GPS receiving channels and three-types machine learning techniques. Proposed multiple GPS channels consist of commercial GPS receiver with no anti-jamming function, receiver with just anti-noise jamming function and receiver with anti-noise and anti-spoofing jamming function. This system enables user to identify the characteristics of the jamming signals by comparing the coordinates received at each receiver. In this paper, The five types of jamming signals with different signal characteristics were entered to the system and three kinds of machine learning methods(AB: Adaptive Boosting, SVM: Support Vector Machine, DT: Decision Tree) were applied to perform jamming detection test. The results showed that the DT technique has the best performance with a detection rate of 96.9% when the single machine learning technique was applied. And it is confirmed that DT technique is more effective for GPS jamming detection than the binary classifier techniques because it has low ambiguity and simple hardware. It was also confirmed that SVM could be used only if additional solutions to ambiguity problem are applied.

A Study on the Measuring of Combat Effectiveness for Naval Frigates Using Analytic Hierarchy Process (AHP를 이용한 해군 호위함 전투효과 측정에 관한 연구)

  • Kim, Kitae;Lim, Yojoon
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.1
    • /
    • pp.9-16
    • /
    • 2021
  • Modern combat has been extended to the concept of real-time response to a variety of threats simultaneously occurring in vast areas. In order to quick command determination and accurate engagement in these threats, the combat system has emerged in frigate. Frigates conduct anti-surface, anti-submarine, and anti-aircraft as the core forces of the fleet. In this study, the combat effectiveness measures naval frigates using AHP (analytic hierarchy process) method. A hierarchical structure for measuring the combat effectiveness was developed, and weights of criteria were calculated by expert surveys and pair-wise comparisons. In addition, the combat effectiveness of frigates was synthesized and compared. The weights for each attribute were calculated, and the weights for the three main attributes were in the order of act (0.594), evaluate (0.277), and see (0.129). As a result of calculating the weight, anti surface warfare (0.203) was the highest. The combat effectiveness of FFG Batch-III, which has advanced hardware and software and improved combat system capabilities, see (1.73 to 2.56 times), evaluate (1.68 to 2.08 times), and act (1.31 to 3.80 times) better than the comparative frigate. In summarizing the combat effects of the frigate, FFG Batch-III was 1.41~2.95 times superior to the comparative frigate. In particular, a group of experts evaluated the act importantly, resulting in better combat effectiveness.

Operation System Design of Distribution Feeder with Distributed Energy Resources (분산전원이 연계된 배전선로의 운영시스템 설계)

  • Kim, Seong-Man;Chang, Young-Hak;Kim, Kyeong-Hun;Kim, Sul-Ki;Moon, Chae-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.6
    • /
    • pp.1183-1194
    • /
    • 2021
  • Traditionally, electric power systems have been known as the centralized structures, which is organized into placing customers at the end of the supply chain. However, recent decades have witnessed the emergence of distributed energy resources(:DERs) such as rooftop solar, farming PV system, small wind turbines, battery energy storage systems and smart home appliances. With the emergence of distributed energy resources, the role of distributed system operators(:DSOs) will expand. The increasing penetration of DERs could lead to a less predictable and reverse flow of power in the system, which can affect the traditional planning and operation of distribution and transmission networks. This raises the need for a change in the role of the DSOs that have conventionally planned, maintained and managed networks and supply outages. The objective of this research is to designed the future distribution operation system with multi-DERs and the proposed distribution system model is implemented by hardware-in-the-loop simulation(HILS). The test results show the normal operation domain and reduction of distribution line loss.

Design of a Robust Precision Aerial Delivery System Soft Landing Algorithm (외란에 강인한 정밀공중물자수송시스템 연착륙 알고리즘 설계)

  • Kim, Taewook
    • Journal of Aerospace System Engineering
    • /
    • v.16 no.4
    • /
    • pp.77-87
    • /
    • 2022
  • The Precision Aerial Delivery System is an instrument designed to improve the poor landing accuracy of aerial delivery system with conventional circular parachutes, and is equipped with an Airborne Guidance Unit to safely transport supplies to the desired destination. Currently, the landing accuracy of the PADS product is reported as CEP50 100m and also differs significantly, depending on the actual topography and weather environment. In this study, HILS was constructed based on the 6DOF nonlinear modeling of PADS to analyze the maneuver characteristics of Ram Air Parachute under wind environments. By using the new algorithm a precision soft landing algorithm including Energy Management and Final Approach is designed. HILS results show that it is possible to achieve a precise soft landing within CEP50 40m, and it can be exploited to develop an actual PADS drop test.

Hierarchical IoT Edge Resource Allocation and Management Techniques based on Synthetic Neural Networks in Distributed AIoT Environments (분산 AIoT 환경에서 합성곱신경망 기반 계층적 IoT Edge 자원 할당 및 관리 기법)

  • Yoon-Su Jeong
    • Advanced Industrial SCIence
    • /
    • v.2 no.3
    • /
    • pp.8-14
    • /
    • 2023
  • The majority of IoT devices already employ AIoT, however there are still numerous issues that need to be resolved before AI applications can be deployed. In order to more effectively distribute IoT edge resources, this paper propose a machine learning-based approach to managing IoT edge resources. The suggested method constantly improves the allocation of IoT resources by identifying IoT edge resource trends using machine learning. IoT resources that have been optimized make use of machine learning convolution to reliably sustain IoT edge resources that are always changing. By storing each machine learning-based IoT edge resource as a hash value alongside the resource of the previous pattern, the suggested approach effectively verifies the resource as an attack pattern in a distributed AIoT context. Experimental results evaluate energy efficiency in three different test scenarios to verify the integrity of IoT Edge resources to see if they work well in complex environments with heterogeneous computational hardware.

Bit Register Based Algorithm for Thread Pool Management (스레드 풀 관리를 위한 비트 레지스터 기반 알고리즘)

  • Shin, Seung-Hyeok;Jeon, Jun-Cheol
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.2
    • /
    • pp.331-339
    • /
    • 2017
  • This paper proposes a thread pool management technique of an websocket server that is applicable to embedded systems. WebSocket is a proposed technique for consisting a dynamic web, and is constructed using HTML5 and jQuery. Various studies have been progressing to construct a dynamic web by Apache, Oracle and etc. Previous web service systems require high-capacity, high-performance hardware specifications and are not suitable for embedded systems. The node.js which is consist of HTML5 and jQuery is a typical websocket server which is made by open sources, and is a java script based web application which is composed of a single thread. The node.js has a limitation on the performance for processing a high velocity data on the embedded system. We make up a multi-thread based websoket server which can solve the mentioned problem. The thread pool is managed by a bit register and suitable for embedded systems. To evaluate the performance of the proposed algorithm, we uses JMeter that is a network test tool.

Asymmetric Signal Scanning Scheme to Detect Invasive Attacks (침투 공격 검출을 위한 비대칭 신호 스캐닝 기법)

  • Da Bin Yang;Ga Young Lee;Young-woo Lee
    • Smart Media Journal
    • /
    • v.12 no.1
    • /
    • pp.17-23
    • /
    • 2023
  • Design-For-Security (DFS) methodology is to protect integrated circuits from physical attacks, and that can be implemented by adding a security circuit to detect abnormal external access. Among the abnormal accesses called invasive attack, microprobing and FIB circuit editing are classified as the most powerful methods because they have direct access. Microprobing deliberately inject defects into the wire of circuit through probes, or reads and changes data. FIB circuit editing is methods of reconnecting or destroying circuits to neutralize security circuits or to access data. Previous DFS methodology have responded to the attacks by detecting arrival time asymmetry between the two signals or by comparing input/output data based on encrypted communication. This study conducted to reduce hardware overhead, and the proposed circuit detects the reflected signal asymmetry generated through probe or FIB circuit editing and detects the attacks through comparison. Since the proposed security circuit reduces the size and test cycle of the circuit compared to previous studies, the cost used for security can be reduced.