• Title/Summary/Keyword: 데이터 부족 솔루션

Search Result 27, Processing Time 0.032 seconds

A TBM data-based ground prediction using deep neural network (심층 신경망을 이용한 TBM 데이터 기반의 굴착 지반 예측 연구)

  • Kim, Tae-Hwan;Kwak, No-Sang;Kim, Taek Kon;Jung, Sabum;Ko, Tae Young
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.23 no.1
    • /
    • pp.13-24
    • /
    • 2021
  • Tunnel boring machine (TBM) is widely used for tunnel excavation in hard rock and soft ground. In the perspective of TBM-based tunneling, one of the main challenges is to drive the machine optimally according to varying geological conditions, which could significantly lead to saving highly expensive costs by reducing the total operation time. Generally, drilling investigations are conducted to survey the geological ground before the TBM tunneling. However, it is difficult to provide the precise ground information over the whole tunnel path to operators because it acquires insufficient samples around the path sparsely and irregularly. To overcome this issue, in this study, we proposed a geological type classification system using the TBM operating data recorded in a 5 s sampling rate. We first categorized the various geological conditions (here, we limit to granite) as three geological types (i.e., rock, soil, and mixed type). Then, we applied the preprocessing methods including outlier rejection, normalization, and extracting input features, etc. We adopted a deep neural network (DNN), which has 6 hidden layers, to classify the geological types based on TBM operating data. We evaluated the classification system using the 10-fold cross-validation. Average classification accuracy presents the 75.4% (here, the total number of data were 388,639 samples). Our experimental results still need to improve accuracy but show that geology information classification technique based on TBM operating data could be utilized in the real environment to complement the sparse ground information.

Attack Datasets for ROS Intrusion Detection Systems (ROS 침입 탐지 시스템을 위한 공격 데이터셋 구축)

  • Hyunghoon Kim;Seungmin Lee;Jaewoong Heo;Hyo Jin Jo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.681-691
    • /
    • 2024
  • In recent decades, research and development in the field of industrial robotics, such as an unmanned ground vehicle (UGV) and an unmanned aerial vehicle (UAV), has been significant progress. In these advancements, it is important to use middleware, which facilitates communication and data management between different applications, and various industrial communication middleware protocols have been released. The robot operating system (ROS) is the most widely adopted as the main platform for robot system development among the communication middleware protocols. However, the ROS is known to be vulnerable to various cyber attacks, such as eavesdropping on communications and injecting malicious messages, because it was initially designed without security considerations. In response, numerous studies have proposed countermeasures to ROS vulnerabilities. In particular, some work has been proposed on generating ROS datasets for intrusion detection systems (IDS), but there is a lack of research in this area. In this paper, in order to contribute to improving the performance of ROS IDSs, we propose a new type of attack scenario that can occur in the ROS and build ROS attack datasets collected from a real robot system and make it available as an open dataset.

Implementation of abnormal behavior detection system based packet analysis for industrial control system security (산업 제어 시스템 보안을 위한 패킷 분석 기반 비정상행위 탐지 시스템 구현)

  • Kim, Hyun-Seok;Park, Dong-Gue
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.47-56
    • /
    • 2018
  • National-scale industrial control systems for gas, electric power, water processing, nuclear power, and traffic control systems increasingly use open networks and open standards protocols based on advanced information and communications technologies. The frequency of cyberattacks increases steadily because of the use of open networks and open standards protocols, but follow-up actions are limited. Therefore, the application of security solutions to an industrial control system is very important. However, it is not possible to apply security solutions to a real system because of the characteristics of industrial control systems. And a security system that can detect attacks without affecting the existing system is imperative. Therefore, in this paper, we propose an intrusion detection system based on packet analysis that can detect anomalous behaviors without affecting the industrial control system, and we verify the effectiveness of the proposed intrusion detection system by applying it in a test bed simulating a real environment.

A Study on providing Open Home IoT Services of Brodcasting Communication Service Provider (방송통신사업자의 개방형 홈 IoT 서비스 제공 방안 연구)

  • Kim, Choong-Soo
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2014.11a
    • /
    • pp.45-48
    • /
    • 2014
  • 최근 국내외에서 모든 사물이 인터넷에 연결되는 초(超)연결혁명이 진행 중이며, 앞으로 사물인터넷 기반의 다양한 혁신과 사업기회가 창출될 것으로 전망되고 있다. 하지만 국내의 경우 세계 최고 수준의 광대역 방송통신 인프라 및 IoT 기기 제조역량 등을 갖추고 있으나, 표준 기반의 개방형 IoT 플랫폼의 부재로 국내 기업의 시장 진입이 어려운 상황이다. 대기업은 개별적으로 플랫폼을 개발중이나 글로벌 시장에 대한 주도력이 부족하고, 중소기업은 플랫폼 부재로 시장진입이 어려워 향후 스마트 폰 산업에 이어 IoT 산업마저 글로벌 기업에 종속될 우려가 있다. 이에 본 논문에서는 국내외 다양한 분야의 기업들이 참여하여 다양한 홈 IoT 제품과 서비스를 개발할 수 있도록 특정 플랫폼이나 솔루션에 제약 없이 다양한 IoT 기기를 연결, 제어가 가능한 표준 기반의 개방형 홈 IoT 서비스 제공 방안을 연구하였다. 실험 결과에서는 제안된 개방형 홈 IoT 플랫폼을 통해 Z-Wave, IP, ZigBee, IrDA 등 다양한 통신 방식을 사용하는 홈 IoT 기기를 제어하고 정보 수집하여 사용이 가능함을 보여주었고, 이를 기반으로 플랫폼을 빅데이터 기술 및 기계학습 기능을 추가적으로 고도화하면 다양한 사물로부터 수집된 정보와 방송 정보, 웹 정보 등을 융합한 서비스 제공 등 소비자 중심의 창의적인 신규 방송통신 융합서비스 제공이 가능할 것으로 기대가 된다.

  • PDF

UML기반의 멀티미디어실 이용자 관리 시스템의 설계 및 구축

  • 이현진;장길상;주재훈
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 2001.12a
    • /
    • pp.181-193
    • /
    • 2001
  • 최근 대학도서관들은 정보화 환경에 대한 능동적 대처를 위하여 많은 노력을 기울이고 있다. 교수나 학생의 연구, 교육, 학습에 필요한 각종 전자 정보원을 한 장소에서 검색, 열람이 가능하고 대학의 구성원들에게 새로운 정보기술과 정보의 활용 능력을 교육시키기 위한 다양한 기능을 가진 하나의 복합 공간으로서 전자 정보실 또는 멀티미디어실(이하 멀 티미디어실) 등을 설치, 운영하고 있다 그러나 아직도 대학도서관 내의 멀티미디어실의 역할과 개념이 모호하다는 지적이 나오고 있다. 이러한 가운데 운영면에서도 표준 솔루션의 부재로 관리 전산화가 이루어져 있는 곳이 부족하여 인력 및 시간의 낭비가 초래되고 이용자 관리에 있어서 어려움을 겪고 있는 실정이다. 체계적인 운영이 이루어지지 않고서는 양질의 서비스 제공은 기대하기 어려울 것이다. 따라서 전국 대학 도서관에 적용할 수 있는 표준적인 멀티미디어실 관리 시스템의 개발이 필요하다. 본 연구에서는 UML(Unified Modeling Language) 기반의 정보시스템 구축 방법론을 제시하고, 제시된 방법론의 유효성(effectiveness)을 검증하기 위하여, 본 방법론에 입각하여 동국대학교 경주캠퍼스의 멀티미디어실 업무 프로세스를 분석 설계하였다. 시스템 구현을 위해서, 데이터 베이스로는 Oracle RDBMS를, 개발도구로는 Visual Basic 6.0을 사용하였다 본 논문에서 구현된 시스템을 통하여 멀티미디어실의 효과적인 운영관리에 대한 기반정립에 기여하고, 향후 장기적인 발전계획 수립에 하나의 도구로서 사용될 수 있다고 판단된다.

  • PDF

IoT and Wireless Sensor Network Monitoring for Campus Security (캠퍼스 보안을 위한 IoT 및 무선 센서 네트워크 모니터링)

  • Mateen, Ahmed;Zhu, Qingsheng;Afsar, Salman;Usman, Muhammad
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.33-41
    • /
    • 2018
  • The idea of the Internet of Things as a platform on the Smart Campus has become increasingly popular. It requires an infrastructure consisting of communication networks, sensor nodes and gateways to connect to the Internet. Each sensor node is responsible for gathering data from the environment. This document outlines a network of wireless sensors on the Internet for the application of Smart Campus monitoring. Wireless sensor network Monitoring have become a complete solution to using a low power implementation and integrated systems. The numerous restrictions however result from the low communication range, the limited computing power, the lack of availability of the network protocol, the lack of programming security and the security failures in the areas of confidentiality, integrity and availability. A new security technique and its functionality for WSNM nodes developed. Development in the research of a secure network and suggestions for avoiding denial of service (DOS) and complexity attacks. These systems if properly implemented can provide an energy efficiency mechanism through pre-allocation and a new key from key management models with a secure routine algorithm.

An Event-Driven Dynamic Monitor for Efficient Service Monitoring (효율적인 서비스 모니터링을 위한 이벤트 주도 동적 모니터)

  • Kum, Deuk-Kyu;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.12
    • /
    • pp.892-908
    • /
    • 2010
  • Services in SOA are typically perceived as black-box to service consumers, and can be dynamically evolved at runtime, and run on a number of unknown and heterogeneous environments. Because of these characteristics of the services, effective and efficient monitoring of various aspects on services is an essential functionality for autonomous management of service. But the problem with or limitation in conventional or existing approaches is, that they focus on services themselves, ignoring the effects by business processes. Consequently, there is a room for service monitoring which provides more useful information of business level by acquisition of only external monitoring data that depend on specific BPEL engine and middleware. Moreover, there is a strong demand to present effective methods to reduce monitoring overhead which can degrade quality of services. EDA can cope with such limitations in SOA by collecting and analyzing events efficiently. In this paper, we first describe EDA benefits in service monitoring, and classify monitorring target, and present an appropriate monitoring method for each monitoring target. Also to provide the applicability of our approach, an event meta-model is defined, and event processing model and architecture based on the meta-model are proposed. And, with the proposed architecture and method, we implement a prototype of an event-driven dynamic monitoring framework which can collect and process internal and external data at runtime. Finally, we present the result of a case study to demonstrate the effectiveness and applicability of the proposed approach.

The Model of Network Packet Analysis based on Big Data (빅 데이터 기반의 네트워크 패킷 분석 모델)

  • Choi, Bomin;Kong, Jong-Hwan;Han, Myung-Mook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.5
    • /
    • pp.392-399
    • /
    • 2013
  • Due to the development of IT technology and the information age, a dependency of the network over the most of our lives have grown to a greater extent. Although it provides us to get various useful information and service, it also has negative effectiveness that can provide network intruder with vulnerable roots. In other words, we need to urgently cope with theses serious security problem causing service disableness or system connected to network obstacle with exploiting various packet information. Many experts in a field of security are making an effort to develop the various security solutions to respond against these threats, but existing solutions have a lot of problems such as lack of storage capacity and performance degradation along with the massive increase of packet data volume. Therefore we propose the packet analysis model to apply issuing Big Data technology in the field of security. That is, we used NoSQL which is technology of massive data storage to collect the packet data growing massive and implemented the packet analysis model based on K-means clustering using MapReudce which is distributed programming framework, and then we have shown its high performance by experimenting.

A Study on the Effect of HMD VR Technology on Design Application: Focusing on 3DEXPERIENCE Platform VR (HMD VR 기술이 디자인 활용에 미치는 영향에 관한 연구: 3DEXPERIENCE 플랫폼의 VR을 중심으로)

  • Lee, Kyoung-Soon;Yoon, Jeong Shick
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.4
    • /
    • pp.49-55
    • /
    • 2020
  • Recently, companies are growing by introducing rational and optimized technology for all processes, including design. In particular, the emergence of ICT-based cloud platforms has given rise to solutions that are equipped with all the necessary business services in corporations and schools, affecting technical education and corporate growth that have not been experienced thus far. The virtual reality technology and convergence of HMD devices utilizing this platform is a new turning point in corporate development. Therefore, this study tested the VR functions used in design based on 3DEXP and HMD VR devices. Second, design utilization and this issue were examined through a survey based on the experimental data. The results showed that 3DEXP and HMD VR technologies are closely related in terms of design utilization and have demonstrated their mediated effects through statistical analysis. Nevertheless, it is not enough to generalize some engineering students as a result of the study. On the other hand, the introduction of HMD VR technology is one of the pillars of education and the implementation of virtual reality technology.

Development of IoT Smart Mobility Service Design for People with Disabilities in the Era of Digital Transformation (디지털 트랜스포메이션 시대 교통약자를 위한 IoT 스마트 모빌리티 서비스 디자인 개발)

  • Lee, Woong-Hee;Kim, Jung-Woo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.1
    • /
    • pp.163-173
    • /
    • 2021
  • In the era of digital transformation, the transportation underprivileged remains as an underprivileged class without the benefits of technological advances. Electric assist devices for the People with disability are inadequate to provide services suitable for the current traffic environment, although the mobility of the People with disability is improved. In this paper, we develop IoT smart mobility by deriving essential elements through user satisfaction surveys to efficiently move physical distances based on the experience of users using existing electric assistive devices. Based on the data collected through user satisfaction survey, quantitative analysis using TF-IFD and qualitative analysis based on QFD are performed to determine the importance of user requirements. For the evaluation of IoT smart mobility design results reflecting essential functions, usability verification is conducted by forming an expert evaluation team in various fields. In the future, we plan to conduct a service design study that can improve mobility convenience and provide mobility service solutions by designing to provide efficient public services by utilizing IoT smart mobility to the People with disability.