• Title/Summary/Keyword: Smart Framework

Search Result 682, Processing Time 0.029 seconds

Improvement Trend of a Humanoid Robot Platform HUBO2+ (휴머노이드 로봇플랫폼 HUBO2+의 기술 개선 추이)

  • Lim, Jeongsoo;Heo, Jungwoo;Lee, Jungho;Bae, Hyoin;Oh, Jun-Ho
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.20 no.3
    • /
    • pp.356-363
    • /
    • 2014
  • This paper covers improvement of the humanoid robot platform HUBO2, known as the HUBO2+. As a necessity of the growth of the humanoid platform, a robust, reliable and user friendly platform is needed. From this standpoint, HUBO2+ is the most improved humanoid robot platform in the HUBO series. The mechanical design has been changed to increase the movable range and to stop joint compulsion. Additionally, all of the electrical parts are re-designed to be un-breakable in an unexpected situation. A smart power controller with robot status check panel is attached on the back. Additionally, a diagnosis tool, the HUBO-i, has been developed. Moreover, each joint motor controller of HUBO2+ has a Protection Function and a PODO system is provided for handling the robot easily.

Design of Trajectory Data Indexing and Query Processing for Real-Time LBS in MapReduce Environments (MapReduce 환경에서의 실시간 LBS를 위한 이동궤적 데이터 색인 및 검색 시스템 설계)

  • Chung, Jaehwa
    • Journal of Digital Contents Society
    • /
    • v.14 no.3
    • /
    • pp.313-321
    • /
    • 2013
  • In recent, proliferation of mobile smart devices have led to big-data era, the importance of location-based services is increasing due to the exponential growth of trajectory related data. In order to process trajectory data, parallel processing platforms such as cloud computing and MapReduce are necessary. Currently, the researches based on MapReduce are on progress, but due to the MapReduce's properties in using batch processing and simple key-value structure, applying MapReduce framework for real time LBS is difficult. Therefore, in this research we propose a suitable system design on efficient indexing and search techniques for real time service based on detailed analysis on the properties of MapReduce.

Classifier Combination Based Source Identification for Cell Phone Images

  • Wang, Bo;Tan, Yue;Zhao, Meijuan;Guo, Yanqing;Kong, Xiangwei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5087-5102
    • /
    • 2015
  • Rapid popularization of smart cell phone equipped with camera has led to a number of new legal and criminal problems related to multimedia such as digital image, which makes cell phone source identification an important branch of digital image forensics. This paper proposes a classifier combination based source identification strategy for cell phone images. To identify the outlier cell phone models of the training sets in multi-class classifier, a one-class classifier is orderly used in the framework. Feature vectors including color filter array (CFA) interpolation coefficients estimation and multi-feature fusion is employed to verify the effectiveness of the classifier combination strategy. Experimental results demonstrate that for different feature sets, our method presents high accuracy of source identification both for the cell phone in the training sets and the outliers.

Towards Cyber Security Risks Assessment in Electric Utility SCADA Systems

  • Woo, Pil Sung;Kim, Balho H.;Hur, Don
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.3
    • /
    • pp.888-894
    • /
    • 2015
  • This paper presents a unified model based assessment framework to quantify threats and vulnerabilities associated with control systems, especially in the SCADA (Supervisory Control and Data Acquisition) system. In the past, this system was primarily utilized as an isolated facility on a local basis, and then it started to be integrated with wide-area networks as the communication technology would make rapid progress. The introduction of smart grid, which is an innovative application of digital processing and communications to the power grid, might lead to more and more cyber threats originated from IT systems. However, an up-to-date power system often requires the real-time operations, which clearly implies that the cyber security would turn out to be a complicated but also crucial issue for the power system. In short, the purpose of this paper is to streamline a comprehensive approach to prioritizing cyber security risks which are expressed by the combination of threats, vulnerabilities, and values in the SCADA components.

Numerical buckling temperature prediction of graded sandwich panel using higher order shear deformation theory under variable temperature loading

  • Sahoo, Brundaban;Sahoo, Bamadev;Sharma, Nitin;Mehar, Kulmani;Panda, Subrata Kumar
    • Smart Structures and Systems
    • /
    • v.26 no.5
    • /
    • pp.641-656
    • /
    • 2020
  • The finite element solutions of thermal buckling load values of the graded sandwich curved shell structure are reported in this research using a higher-order kinematic model including the shear deformation effect. The numerical buckling temperature has been computed using an in-house specialized code (MATLAB environment) prepared in the framework of the current mathematical formulation. In addition, the mathematical model includes the excess structural distortion under the influence of elevated environment via Green-Lagrange nonlinear strain. The corresponding eigenvalue equation has been solved to predict the critical buckling temperature of the graded sandwich structure. The numerical stability and the accuracy of the current solution have been confirmed by comparing with the available published results. Thereafter, the model is extended to bring out the influences of structural parameters i.e. the curvature ratio, core-face thickness ratio, support conditions, power-law indices and sandwich types on the thermal buckling behavior of graded sandwich curved shell panels.

A Firm's Environmental Determinants Impacting the Information Security Management and the Moderating Effects of Regulatory Influence (정보보안관리에 영향을 미치는 기업환경요소와 규제자 영향의 조절효과)

  • Kim, Sang-Hyun;Kim, Geun-A
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.37 no.3
    • /
    • pp.79-94
    • /
    • 2012
  • According to the higher dependence of contemporary firms on data digitalization and the information technology, the role and importance of Information Security Management (ISM) is getting higher. Thus, there is a need to arrange proper procedure and a series of device within the organization in order to reduce diverse security risks, which take place from the inside and the outside of firm. In other words, prior examination for reinforcing recognition of ISM, and of a systematic performance method in the refined form is important. This study investigate the key variables influencing the ISM. Thus, this study suggests firm environmental factors that include four exogenous variables, market volatility, task interdependence, perceived benefits, and coordination mechanism affecting awareness of ISM. In addition, it proposes a concept of the ISM process with awareness, development, and performance, and examines the moderating effects of regulatory influence. The research model was tested by using Structural Equation Modeling, via SmartPLS 2.0 analysis on a sample collected from 186 employees in various industries. The research results provide the evidence that supports the tested hypotheses except significance of coordination mechanism. The implications of the findings suggest a new theoretical framework of the ISM and offers important solutions for the practical application guidelines.

Analysis on Constitutes and Contents of Mobile Application for Reading (독서용 모바일 애플리케이션 구성과 내용 분석)

  • Lim, Seong-Gwan
    • Journal of Korean Library and Information Science Society
    • /
    • v.48 no.1
    • /
    • pp.397-421
    • /
    • 2017
  • The utilization and integration of different reading technologies has increased exponentially in recent years with no limits in the foreseeable future. This is no surprise, as the versatility of new technology devices makes information accessible at any minute of any day anywhere in the world. The possible reading uses for such devices are immeasurable, and have already seen widespread usage by readers all over the country. While these statements are more or less obvious, more research must be conducted to discover which means are the most effective and why. This study aims to provide a basic framework for analyzing the organization and quality of mobile application devices for reading comprehension purposes. The study also hopes to highlight and/or clarify more effective reading means with differing technologies.

Study on factors affecting acceptance intention of smartphone - Focused on TAM Model - (스마트폰의 수용의도에 영향을 미치는 요인에 관한 연구)

  • Noh, Young;Lee, Kyung Keun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.4
    • /
    • pp.273-288
    • /
    • 2012
  • In recent years, smartphone is the most widely used ubiquitous functionality. People do not want to just call other people any more by using a cellular phone; they want to connect to the Internet and use various applications. Hence, cellular phones need to become smart. A smartphone has an operating system and many applications. Specifically the goals of this research are; (1) to suggest theory framework of acceptance about smartphone based on TAM, (2) to examine relationships between exogenous variables. The research model and hypotheses were developed based on the theories of technology acceptance model. Questionnaire was used to collect data. The analysis of this study is designed as individual level to examine the causal relationship among variables. The the reliability and validity of data was tested by explanatory factor analysis, Cronbach's alpha coefficient, confirmatory factor analysis, and correlation analysis. Also, the structural equation model(SEM) analysis was performed to test the usefulness of the model. The analysis results revealed that social norms and individual innovation are major influential variables on the perceived usefulness of smartphone. Also, social norms are influential variables on the perceived enjoyment of smartphone.

A Task Planning System of a Steward Robot with a State Partitioning Technique (상태 분할 기법을 이용한 집사 로봇의 작업 계획 시스템)

  • Kim, Yong-Hwi;Lee, Hyong-Euk;Kim, Heon-Hui;Park, Kwang-Hyun;Bien, Z. Zenn
    • The Journal of Korea Robotics Society
    • /
    • v.3 no.1
    • /
    • pp.23-32
    • /
    • 2008
  • This paper presents a task planning system for a steward robot, which has been developed as an interactive intermediate agent between an end-user and a complex smart home environment called the ISH (Intelligent Sweet Home) at KAIST (Korea Advanced Institute of Science and Technology). The ISH is a large-scale robotic environment with various assistive robots and home appliances for independent living of the elderly and the people with disabilities. In particular, as an approach for achieving human-friendly human-robot interaction, we aim at 'simplification of task commands' by the user. In this sense, a task planning system has been proposed to generate a sequence of actions effectively for coordinating subtasks of the target subsystems from the given high-level task command. Basically, the task planning is performed under the framework of STRIPS (Stanford Research Institute Problem Solver) representation and the split planning method. In addition, we applied a state-partitioning technique to the backward split planning method to reduce computational time. By analyzing the obtained graph, the planning system decomposes an original planning problem into several independent sub-problems, and then, the planning system generates a proper sequence of actions. To show the effectiveness of the proposed system, we deal with a scenario of a planning problem in the ISH.

  • PDF

Verification and Validation to develop Safety-critical Software (안전에 중요한 소프트웨어 개발을 위한 확인 및 검증)

  • Lee Jong-Bok;Suh Sang-Moon;Keum Jong-Yong
    • Proceedings of the Korean Society for Quality Management Conference
    • /
    • 2004.04a
    • /
    • pp.114-119
    • /
    • 2004
  • Software verification and validation(V&V) is a means to develop high-quality software and assure safety and reliability for software. Also, we can achieve the desired software quality through systematic V&V activities. The software to be applied safety critical system like nuclear power plants is required to setup the V&V methodology that comply with licensing requirements for nuclear power plants and should be performed V&V activities according to it. In this paper, we classified safety-critical, safety-related and non-safety for software according to safety function to be peformed and define V&V activities to be applied software grade. Also, we defined V&V activities, procedures and documentation for each phase of software development life cycle and showed techniques and management to perform V&V. Finally, we propose the V&V framework to be applied software development of SMART(System-integrated Modular Advanced ReacTor) MMIS (Man-Machine Interface System) and to comply with domestic licensing requirements.

  • PDF