• Title/Summary/Keyword: user command

Search Result 251, Processing Time 0.039 seconds

A Study of Analysis of Hacking Attacks on Cyber Terrorism and Prognostic Analysis of Phenomena (사이버테러에 대한 해킹공격 분석과 전조 현상 분석)

  • Noh, Jung Ho;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.123-126
    • /
    • 2013
  • Access control system, when operating the infrastructure manager and the permissions for the user to clearly define the terminology that is. Various IT incidents still happening frequently occur, and these incidents in order to prevent the situation of access control is needed. In this study, the Copy command by hackers hacking incidents, such as walking dangerous limits for instructions attacks in advance, and also the internal administrator accident accidental limit command to walk off the risk in advance and even if the incident occurred access to the command history log and post it as evidence through the analysis techniques that can be utilized are described.

  • PDF

Quadruple-Metric Based Command and Control Information Recommendation System (쿼드러플-메트릭 기반 지휘통제 정보 추천 시스템)

  • Park, Gyudong;Kim, Jongmo;Jeon, Hocheol
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.40-42
    • /
    • 2022
  • Command and control (C2) information is exploding as sensor and network technologies development. In the C2 are a, processing information on time is very important. If it is not possible to process all information on time because of resource limitation, higher priority information should be processed first. For this, recommendation system is available. Because it can select and present information suitable for each user among tons of information in the order of priority. This study extends the triple-metric priority criterion, which is widely used to implement military communication networks, to the quadruple-metric priority criterion, and proposes a C2 information recommendation system based on it, and shows it's feasibility through experiments.

  • PDF

Human Robot Interaction Using Face Direction Gestures

  • Kwon, Dong-Soo;Bang, Hyo-Choong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.171.4-171
    • /
    • 2001
  • This paper proposes a method of human- robot interaction (HRI) using face directional gesture. A single CCD color camera is used to input face region, and the robot recognizes the face directional gesture based on the facial feature´s positions. One can give a command such as stop, go, left and right turn to the robot using the face directional gesture. Since the robot also has the ultra sonic sensors, it can detect obstacles and determine a safe direction at the current position. By combining the user´s command with the sensed obstacle configuration, the robot selects the safe and efficient motion direction. From simulation results, we show that the robot with HRI is more reliable for the robot´s navigation.

  • PDF

Implementation of voice Command System to control the Car Sunroof (자동차 선루프 제어용 음성 명령 시스템 구현)

  • 정윤식;임재열
    • Proceedings of the IEEK Conference
    • /
    • 1999.06a
    • /
    • pp.1095-1098
    • /
    • 1999
  • We have developed a speaker dependent voice command system(VCS) to control the sunroof in the car using RSC-164 VRP(Voice Recognition Processor). VCS consists of control circuits, microphone, speaker and user switch box. The control circuits include RSC-164, input audio preamplifier, memory devices, and relay circuit for sunroof control. It is designed robustly in various car noisy situations like audio volume, air conditioner, and incoming noise when window or sunroof opened. Each two users can control the car sunroof using seven voice commands on the Super TVS model and five voice commands on the Onyx model. It works well when we drive the car at over 100 km/h with the sunroof opened.

  • PDF

Controller Design for a Robot's Safe Contact on an Object (원격조종 로봇의 안전한 물체 접근을 위한 제어기 구성)

  • Shin Wan-Jae;Park Jahng-Hyon
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.23 no.4 s.181
    • /
    • pp.83-90
    • /
    • 2006
  • A robot manipulator is usually operated in two modes: free and constrained motion modes, depending on whether the robot is in contact with an environment or not. At the moment of contact, an impact occurs and can exert harmful effects to the robot or the object. In case of teleoperation, since a user may give an inadequately excessive velocity command to the slave due to insufficient visual information, the robot nay collide the object with an excessive speed and it possibly deteriorates the robot's performance causing vibrations and at worst, shortens its lifetime by its fracture. In this article, a new algorithm is proposed by introducing a command signal modification method on the basis of impedance control and validity of the proposed algorithm is demonstrated by performing simulations and experiments.

Design of a Position Controller for Two Axis Servo System (2축 서보시스템을 위한 위치제어장치 설계)

  • Chang, Seok-Ho;Kim, Gi-Taek;Kim, Hyoung-Joong
    • Journal of Industrial Technology
    • /
    • v.11
    • /
    • pp.115-124
    • /
    • 1991
  • In this study, we design a position controller for two axis servo system. The position controller performs numerical control(NC)to DC or AC servo motor or step motor, and also has a digital input/output sequence capability. The control program composed of position and sequence command, which is called channel, is programmed easily and user-interactively. And it is interpreted and the straight line and arc position command is interpolated. We develop the Z80 microprocessor based system and the software with assembly and C language, and also PC based graphic simulator for the debugging and educational purposes.

  • PDF

Network Method for Automation Factory Processor (자동화 공정을 위한 네트웍 구현)

  • Kim, Jee-Hong;Hwang, Byung-Hun
    • Proceedings of the KIEE Conference
    • /
    • 2003.07d
    • /
    • pp.2483-2485
    • /
    • 2003
  • As design a network system that should command and response to do tasks by PLC, to make factory automation for being distributed facilities which are not guaranteed procedure, through polling method, commands are send orderly by PLC and responses are answered by each sub-unit. It make a guarantee of sequence and drive a master-slave operation in network. This method help to distribute procedure systems and make possible dividing tasks to each unit. To make this method, network protocol's format have Master or Slave ID and tasking data and Master's command or Slave unit's report. In network interpret algorithm, skip algorithm are included and it make guarantee of protecting data though network are in noise. Data that are made by this method are send to PC to transmit long-distance user by internet.

  • PDF

A Study on Anomaly Detection based on User's Command Analysis (사용자 명령어 분석을 통한 비정상 행위 판정에 관한 연구)

  • 윤정혁;오상현;이원석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.4
    • /
    • pp.59-71
    • /
    • 2000
  • Due to the advance of computer and communication technology, intrusions or crimes using a computer have been increased rapidly while various information has been provided to users conveniently. As a results, many studies are necessary to detect the activities of intruders effectively. In this paper, a new association algorithm for the anomaly detection model is proposed in the process of generating user\`s normal patterns. It is that more recently observed behavior get more affection on the process of data mining. In addition, by clustering generated normal patterns for each use or a group of similar users, it is possible to identify the usual frequency of programs or command usage for each user or a group of uses. The performance of the proposed anomaly detection system has been tested on various system Parameters in order to identify their practical ranges for maximizing its detection rate.

A Study on Implementing Kinect-Based Control for LCD Display Contents (LCD Display 설비 Contents의 Kinect기반 동작제어 기술 구현에 관한 연구)

  • Rho, Jungkyu
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.63 no.4
    • /
    • pp.565-569
    • /
    • 2014
  • Recently, various kinds of new computer controlled devices have been introduced in a wide range of areas, and convenient user interfaces for controlling the devices are strongly needed. To implement natural user interfaces(NUIs) on top of the devices, new technologies like a touch screen, Wii Remote, wearable interfaces, and Microsoft Kinect were presented. This paper presents a natural and intuitive gesture-based model for controlling contents of LCD display. Microsoft Kinect sensor and its SDK are used to recognize human gestures, and the gestures are interpreted into corresponding commands to be executed. A command dispatch model is also proposed in order to handle the commands more naturally. I expect the proposed interface can be used in various fields, including display contents control.

A Voice Controlled Service Robot Using Support Vector Machine

  • Kim, Seong-Rock;Park, Jae-Suk;Park, Ju-Hyun;Lee, Suk-Gyu
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1413-1415
    • /
    • 2004
  • This paper proposes a SVM(Support Vector Machine) training algorithm to control a service robot with voice command. The service robot with a stereo vision system and dual manipulators of four degrees of freedom implements a User-Dependent Voice Control System. The training of SVM algorithm that is one of the statistical learning theories leads to a QP(quadratic programming) problem. In this paper, we present an efficient SVM speech recognition scheme especially based on less learning data comparing with conventional approaches. SVM discriminator decides rejection or acceptance of user's extracted voice features by the MFCC(Mel Frequency Cepstrum Coefficient). Among several SVM kernels, the exponential RBF function gives the best classification and the accurate user recognition. The numerical simulation and the experiment verified the usefulness of the proposed algorithm.

  • PDF