• Title/Summary/Keyword: 무인선

Search Result 263, Processing Time 0.031 seconds

Flexible Formation Algorithm for Multiple UAV Using the Packing (패킹을 이용한 다수 무인기의 유동적 대형 형성 알고리즘)

  • Kim, Hyo-Jung;Kim, Jeong-Hun;Kim, Moon-Jung;Ryoo, Chang-Kyung
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.3
    • /
    • pp.211-216
    • /
    • 2021
  • Multiple UAV System has been used for various purposes such as reconnaissance, networking and aerial photography. In such systems, it is essential to form and maintain the formation of multiple UAVs. This paper proposes the algorithm that produces an autonomous distributed control for each vehicle for a flexible formation. This command is a repulsive force in the form of the second-order system by the nearest UAV or mission area. The algorithm uses the relative position/speed through sensing and communication for calculating the command without external intervention. The command allows each UAV to follow the reference distance and fill the mission area as densely as possible without overlapping. We determine the reference distance via optimization technique solving the packing problem. The mission area comprises the desired formation outline and can be set flexibly depending on the mission. Numerical simulation is carried out to verify the performance of the proposed algorithm under a complex and flexible environment. The formation is formed in 26.94 seconds and has a packing density of 71.91%.

Development of Agricultural Production Environmental Controller (농업생산 시설의 무인 관리용 제어시스템의 개발)

  • 전재근;전정렬
    • Proceedings of the Korean Society for Bio-Environment Control Conference
    • /
    • 1993.05a
    • /
    • pp.11-11
    • /
    • 1993
  • 농업 생산시설의 환경제어장치를 one chip microcomputer를 사용하여 설계, 제작하였으며 실시간 복합 제어 기능을 수행할 수 있는 운영 프로그램을 개발하였다. 제어 장치의 microcomputer 는 6 개의 analog input 선을 포함하여 45 개의 입.출력선을 가진 8 bit microcomputer chip을 사용하였다. 농업환경인 온도, 습도, 조도는 센서를 직접 접속하여 계측 할 수 있도록 계측 module을 포함시켰다. (중략)

  • PDF

Power Line Extraction based on thermal Image (열영상 기반의 전력선검출)

  • Kim, Dong-Wook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.3
    • /
    • pp.245-250
    • /
    • 2010
  • In this paper, an efficient extraction technique of power lines is proposed. Power line extraction technique is used to operate unmanned autonomous vehicles. To achieve the extraction of power lines, an angle space segmentation and grouping method of Hough transform are developed. In simulation results for the proposed algorithm, our algorithm shows a good detection results in experiments for several aerial images which contain different line components.

Power Line Detection of Arial Images Using Hough Transform (하프변환을 이용한 항공영상의 전력선 검출)

  • Kim, Dong-Wook;Kang, Jeong-Hyuck
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.2
    • /
    • pp.171-179
    • /
    • 2010
  • Effective monitoring and maintenance operation of towers, power lines and other defects to ensure high quality and reliability of electric power supplied to customers is becoming one of the most important tasks of today's power industry. One specific technology that has the potential to automate the entire surveillance process is unmanned aerial vehicles. In this paper, we propose a new power line extraction method using the directivity of a power line and Hough transform to detect efficiently power lines from thermal aerial images. In simulation results for several aerial images, the proposed method shows good performance in extracting power line detection.

콘텐츠라인-시큐리티월드엑스포2005 개막

  • Gwon, Gyeong-Hui
    • Digital Contents
    • /
    • no.5 s.144
    • /
    • pp.100-101
    • /
    • 2005
  • ‘시큐리티월드엑스포2005’가 지난달 19일부터 21일까지 3일간 삼성동 코엑스에서 열렸다. 정보통신부가 주최하고 전자신문사가 주관한 이번 행사에는 영상보안·생체인식·무인 경비 시스템∙네트워크 보안 등 다양한 솔루션이 대거 선을 보였다. IP서베일런스와 여러 기능을 탑재한 다중 보안 시스템 등 차세대 디지털 보안장비들도 전시됐다.

  • PDF

The Efficient Ship Wireless Sensor Network Using Drone (드론을 활용한 효율적인 선박 센서 네트워크)

  • Hong, Sung-Hwa;Kim, Byoung-Kug
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.1
    • /
    • pp.122-127
    • /
    • 2022
  • Currently, the drone is considered as a mobile base station of USN as a method to act as a base station using USN in existing LTE-M and LTE networks for data transmission in unmanned ships. Therefore, the drone, which is a mobile base station, is a sink node equipped with an LTE modem or a short-range communication modem, and can collect safety information of ship operation from the sensor node and transmit the safety information to the ship or transmit the information between the ships. As, if a short-range network is formed by using drones, it will form a communication network around unmanned ships and will be advantageous for collecting information using security and environmental sensors. In this paper, we propose a method to transmit environmental sensor data and to utilize communication between ships using drones to secure the surrounding information necessary for AI operation of unmanned ships in the future.

AI Security Vulnerabilities in Fully Unmanned Stores: Adversarial Patch Attacks on Object Detection Model & Analysis of the Defense Effectiveness of Data Augmentation (완전 무인 매장의 AI 보안 취약점: 객체 검출 모델에 대한 Adversarial Patch 공격 및 Data Augmentation의 방어 효과성 분석)

  • Won-ho Lee;Hyun-sik Na;So-hee Park;Dae-seon Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.245-261
    • /
    • 2024
  • The COVID-19 pandemic has led to the widespread adoption of contactless transactions, resulting in a noticeable increase in the trend towards fully unmanned stores. In such stores, all operational processes are automated, primarily using artificial intelligence (AI) technology. However, this AI technology has several security vulnerabilities, which can be critical in the environment of fully unmanned stores. This paper analyzes the security vulnerabilities that AI-based fully unmanned stores may face, focusing particularly on the object detection model YOLO, demonstrating that Hiding Attacks and Altering Attacks using adversarial patches are possible. It is confirmed that objects with adversarial patches attached may not be recognized by the detection model or may be incorrectly recognized as other objects. Furthermore, the paper analyzes how Data Augmentation techniques can mitigate security threats by providing a defensive effect against adversarial patch attacks. Based on these results, we emphasize the need for proactive research into defensive measures to address the inherent security threats in AI technology used in fully unmanned stores.