• Title/Summary/Keyword: drone technology

Search Result 522, Processing Time 0.031 seconds

Development of Flooding and Overflow Simulation Technology for Rainwater Infiltration Storage Block Placement (빗물침투저류블록 설치 최적지 선정을 위한 침수범람 시뮬레이션 기술 개발)

  • Kim, Seongpyo;Ryu, Jungrim;Kim, Hojin;Choi, Heeyong;Lee, Taegyu;Choi, Hyeonggil
    • Journal of the Korea Institute of Building Construction
    • /
    • v.24 no.2
    • /
    • pp.227-238
    • /
    • 2024
  • This study addresses the escalating flood damages prompted by recent climate shifts characterized by extreme weather events and proposes rainwater infiltration blocks as a potential solution. Recognizing the limitations inherent in existing inundation simulation methods, we advocate for the integration of novel functionalities, particularly leveraging drone technology. Our research endeavors encompass experimental assessments of inundation and flooding simulation technologies. These evaluations are conducted within areas where rainwater infiltration storage blocks have been implemented, juxtaposed against existing programs utilizing Digital Elevation Models(DEM) and Digital Surface Models(DSM). Through this comparative analysis and a meticulous scrutiny of the adaptability of inundation and flooding simulation to real-world deployment scenarios, we ascertain the efficacy of the simulation program as a decision-making tool for identifying optimal sites for rainwater infiltration storage block installation.

A Study of Unmanned Aerial Vehicle Path Planning using Reinforcement Learning

  • Kim, Cheong Ghil
    • Journal of the Semiconductor & Display Technology
    • /
    • v.17 no.1
    • /
    • pp.88-92
    • /
    • 2018
  • Currently drone industry has become one of the fast growing markets and the technology for unmanned aerial vehicles are expected to continue to develop at a rapid rate. Especially small unmanned aerial vehicle systems have been designed and utilized for the various field with their own specific purposes. In these fields the path planning problem to find the shortest path between two oriented points is important. In this paper we introduce a path planning strategy for an autonomous flight of unmanned aerial vehicles through reinforcement learning with self-positioning technique. We perform Q-learning algorithm, a kind of reinforcement learning algorithm. At the same time, multi sensors of acceleraion sensor, gyro sensor, and magnetic are used to estimate the position. For the functional evaluation, the proposed method was simulated with virtual UAV environment and visualized the results. The flight history was based on a PX4 based drones system equipped with a smartphone.

Honey bees and their brood: a potentially valuable resource of food, worthy of greater appreciation and scientific attention

  • Ghosh, Sampat;Meyer-Rochow, Victor Benno;Jung, Chuleui
    • Journal of Ecology and Environment
    • /
    • v.45 no.4
    • /
    • pp.293-304
    • /
    • 2021
  • Despite the consumption of bee brood in several parts of the world, particularly in the tropical areas, the practice has received comparatively little attention. We have reviewed all the available information on the nutrient composition and functional properties of different developmental stages of honey bee workers belonging to different species and subspecies. Noticing the competent nutrient composition of, in particular, honey bee brood, pupae, and prepupae, we suggest that they could be a potential source of human nutrition as well as animal feed. Moreover, drone brood is an ideal candidate for use as a food or as food ingredient. However, to analyze the functional properties of different honey bee species remains a task for further analysis.

A Study on the Present Status of Military Facilities for the Introduction of 4th Industrial Revolution Technology (4차 산업혁명 기술 도입을 위한 국방시설분야의 현황파악에 대한 연구)

  • Lim, Chayeon;Park, Young Jun
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2020.06a
    • /
    • pp.46-47
    • /
    • 2020
  • Now a days, Lots of research about 4th industrial revolution are progressing. Attempt of technologies on construction engineering field, such as construction management by drone, building equipments based on the IoT technology and etc., are continuously tried by government and private enterprises. Meanwhile, the application of advanced technologies on the military facilities should be reviewed cautiously, because of the national defense environment such as military security. Therefore, this study aim to understanding of present status of military facilities for introduction of 4th industrial revolution technology. To achieve the aim of the study, question investigation targeting working groups for military facility management is conducted.

  • PDF

Wave Propagation Modeling and Receiving Characteristics for ILS Navigation Signal (ILS 항행안전신호 전파진행 모델링 및 수신 특성 연구)

  • Kyung-Soon Lee;Kyung Heon Koo
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.3
    • /
    • pp.375-378
    • /
    • 2024
  • The instrument landing system (ILS) is an international standard established by the International civil aviation organization (ICAO) as one of the landing support facilities for aircraft. This system consists of a localizer (LOC) that provides orientation information about the runway to indicate the approach direction, a glide path (GP) that indicates the appropriate approach glide slope, and three of marker beacons (MB) that indicates the distance to the runway landing edge. In this study, we predicted the received signal strength by altitude and distance for LOC signals transmitted from the ground and analyzed the difference with the signal strength measured in the actual environment. Our objective is to develop signal strength prediction technology and apply it to the real environment.

A Study on Vulnerability Analysis and Memory Forensics of ESP32

  • Jiyeon Baek;Jiwon Jang;Seongmin Kim
    • Journal of Internet Computing and Services
    • /
    • v.25 no.3
    • /
    • pp.1-8
    • /
    • 2024
  • As the Internet of Things (IoT) has gained significant prominence in our daily lives, most IoT devices rely on over-the-air technology to automatically update firmware or software remotely via the network connection to relieve the burden of manual updates by users. And preserving security for OTA interface is one of the main requirements to defend against potential threats. This paper presents a simulation of an attack scenario on the commoditized System-on-a-chip, ESP32 chip, utilized for drones during their OTA update process. We demonstrate three types of attacks, WiFi cracking, ARP spoofing, and TCP SYN flooding techniques and postpone the OTA update procedure on an ESP32 Drone. As in this scenario, unpatched IoT devices can be vulnerable to a variety of potential threats. Additionally, we review the chip to obtain traces of attacks from a forensics perspective and acquire memory forensic artifacts to indicate the SYN flooding attack.

A Study on the Development of LDA Algorithm-Based Financial Technology Roadmap Using Patent Data

  • Koopo KWON;Kyounghak LEE
    • Korean Journal of Artificial Intelligence
    • /
    • v.12 no.3
    • /
    • pp.17-24
    • /
    • 2024
  • This study aims to derive a technology development roadmap in related fields by utilizing patent documents of financial technology. To this end, patent documents are extracted by dragging technical keywords from prior research and related reports on financial technology. By applying the TF-IDF (Term Frequency-Inverse Document Frequency) technique in the extracted patent document, which is a text mining technique, to the extracted patent documents, the Latent Dirichlet Allocation (LDA) algorithm was applied to identify the keywords and identify the topics of the core technologies of financial technology. Based on the proportion of topics by year, which is the result of LDA, promising technology fields and convergence fields were identified through trend analysis and similarity analysis between topics. A first-stage technology development roadmap for technology field development and a second-stage technology development roadmap for convergence were derived through network analysis about the technology data-based integrated management system of the high-dimensional payment system using RF and intelligent cards, as well as the security processing methodology for data information and network payment, which are identified financial technology fields. The proposed method can serve as a sufficient reason basis for developing financial technology R&D strategies and technology roadmaps.

A Study on the Status of Market, Technology and Legal System of the UAV and its Useful Policies (무인항공기 시장·기술·법제도 실태분석 및 정책적 대응방안 연구)

  • Park, Cheol-Soon
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.30 no.2
    • /
    • pp.373-401
    • /
    • 2015
  • The UAV(Unmanned Aerial Vehicle, Drone) technology has been undergoing rapid progress, accompanied with a growth in the market. However, domestic industry standards and technology lag behind such progress happening on the international scene, and in particular in developed countries. Related regulations are also deemed lacking to address the issues that arise with such developments. Meanwhile, as the rise of UAV technology is a fairly recent phenomenon, the gap between Korea and developed countries is not too big. As this technology has high relevance to information and communication technologies, it also offers ample leeway for Korea to catch up in the field of UAV. As such, this paper seeks to provide a survey of the overall technology, market and regulations concerning UAV to identify possible measures on how to address any issues that may arise through proper policies. Due to the progress made in the field of UAV technology and increased penetration rate, striking a right balance between putting in place a proper regulatory system and establishing policies that foster growth in the field has risen as a very important issue. While the importance of establishing a legal system that helps prevent possible risks is indeed important, it must also be acknowledged that excessive regulation can also hinder technological progress. This, in turn would stagnate the market and dampen the entrepreneurial spirit in the society. In the case of new, practical technologies such as UAV, a prompt establishment of regulatory systems and policy measures in terms of policies is a requisite. In brief, in order to promote progress in the UAV industry and at the same time, for public safety and the protection of privacy, there should be an appropriate level on the easing and tightening of the regulation.

Review on the Control Methods of Quadcopters (쿼드콥터 제어 방법 고찰)

  • Yoon, Jonghuyn;Lee, Seunghee;Park, Jong Hyeon;Han, Cheolheui
    • Journal of Institute of Convergence Technology
    • /
    • v.5 no.2
    • /
    • pp.13-19
    • /
    • 2015
  • Recently, quadcopters have been popular as aerial drones. The structure of quadcopters is simpler than traditional helicopters and they are easy to construct and maneuver. Various hardware platforms for quadcopters have been developed. However, the controller design is not easy due to the requirement of 6-DOF flights using 4 rotors(control inputs)(under-actuated systems). In order to overcome the underactuation problem, various control methods - PID, LQR, $H_{\infty}$, SMC, backstepping control, and etc. - have been suggested for the control of quadcopters. In this paper, dynamic features and control methods of quadcopters are reviewed and evaluated. Future works are proposed for designing the advanced controllers of quadcopters.

Vulnerability Analysis of Drones Using Wi-Fi (와이파이를 이용하는 드론의 취약점 분석)

  • Jung, In-Su;Hong, Deuk-Jo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.01a
    • /
    • pp.219-222
    • /
    • 2017
  • 드론 기술이 발전하면서 물품 배달에 드론이 이용되는 등 드론은 우리 생활 전반에 자리 잡으려 하고 있다. 하지만 대부분의 드론이 기본적인 사용자 인증 과정도 없이 보안에 매우 취약한 상태이다. 본 논문에서는 드론의 취약점을 증명하기 위해 Parrot사의 AR. Drone을 대상으로 Wi-Fi 연결을 통한 인증해제, telnet을 통한 명령 수행, ftp 서버를 통한 파일 변조 공격을 적용해 보고, 이러한 취약점에 대해 무선 AP의 비밀번호를 복잡하게 설정하는 방법, 무선 침입 방지 시스템을 사용하는 방법, NAP 또는 NAC 솔루션을 구축하는 방법과 같은 적절한 대응 방안을 논의한다.

  • PDF