• Title/Summary/Keyword: 사용 제어 모델

Search Result 1,913, Processing Time 0.027 seconds

Adjusting Edit Scripts on Tree-structured Documents (트리구조의 문서에 대한 편집스크립트 조정)

  • Lee, SukKyoon;Um, HyunMin
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.24 no.2
    • /
    • pp.1-14
    • /
    • 2019
  • Since most documents used in web, XML, office applications are tree-structured, diff, merge, and version control for tree-structured documents in multi-user environments are crucial tasks. However research on edit scripts which is a basis for them is in primitive stage. In this paper, we present a document model for understanding the change of tree-structured documents as edit scripts are executed, and propose a method of switching adjacent edit operations on tree-structured documents based on the analysis of the effects of edit operations. Mostly, edit scripts which are produced as the results of diff on tree-structured documents only consist of basic operations such as update, insert, delete. However, when move and copy are included in edit scripts, because of the characteristics of their complex operation, it is often that edit scripts are generated to execute in two passes. In this paper, using the proposed method of switching edit operations, we present an algorithm of transforming the edit scripts of X-treeESgen, which are designed to execute in two passes, into the ones that can be executed in one pass.

The Design of the Integrated Module to Cope with Sudden Unintended Acceleration (자동차 급발진을 대비하기 위한 통합 모듈 설계)

  • Cha, Jea-Hui;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.221-223
    • /
    • 2016
  • Currently in the automobile market, models with many convenient functions combined with IT have been released. This change has a strength that there could be many convenient and useful functions related to driving while flaws of vehicles caused by malfunctions of these electronic equipments could trigger serious incidents. Among them, the sudden unintended acceleration considered as the most serious is a serious flaw that could threaten driver's life. However, the causes for sudden acceleration incidents have not been clearly investigated with no coping measures. As manufacturers shift the responsibility to drivers' carelessness, drivers' burden is continuously increasing. Thus, this paper designed the system to cope with sudden acceleration incidents by changing conditions of controlling parts like accelerator and brake, and internal image of the driver's seat into data through the integrated module.

  • PDF

Vibration-Based Signal-Injection Attack Detection on MEMS Sensor (진동 신호를 사용한 MEMS 센서 대상 신호오류 주입공격 탐지 방법)

  • Cho, Hyunsu;Oh, Heeseok;Choi, Wonsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.411-422
    • /
    • 2021
  • The autonomous driving system mounted on the unmanned vehicle recognizes the external environment through several sensors and derives the optimum control value through it. Recently, studies on physical level attacks that maliciously manipulate sensor data by performing signal-injection attacks have been published. signal-injection attacks are performed at the physical level and are difficult to detect at the software level because the sensor measures erroneous data by applying physical manipulations to the surrounding environment. In order to detect a signal-injection attack, it is necessary to verify the dependability of the data measured by the sensor. As so far, various methods have been proposed to attempt physical level attacks against sensors mounted on autonomous driving systems. However, it is still insufficient that methods for defending and detecting the physical level attacks. In this paper, we demonstrate signal-injection attacks targeting MEMS sensors that are widely used in unmanned vehicles, and propose a method to detect the attack. We present a signal-injection detection model to analyze the accuracy of the proposed method, and verify its effectiveness in a laboratory environment.

Verification of Modified Flocking Algorithm for Group Robot Control (집단 로봇 제어를 위한 수정된 플로킹 알고리즘의 시뮬레이션 검증)

  • Lee, Eun-Bok;Shin, Suk-Hoon;You, Yong-Jun;Chi, Sung-Do;Kim, Jae-Ick
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.4
    • /
    • pp.49-58
    • /
    • 2009
  • Top-down approach in the intelligent robot research has focused on the single object intelligence however, it has two weaknesses. One is that has a high cost and a long spending time of sensing, calculating and communications. The other is the difficulty of responding to react changes in the unpredictable environment. we propose the collective intelligence algorithm based on Bottom-up approach for improving these weaknesses and the applied agent model and verify by simulation. The Modified Flocking Algorithm proposed in this research is the algorithm which is modified version of the concept of the Flocking (Craig Reynolds) which is used to model the flocks, herds, and schools in the graphics or games, and simplified the operation of conventional Flocking algorithm to make it easy to apply for the number of group robots. We modeled the Boid agent and verified possibility collectivization of the Modified Flocking Algorithm by simulation. And We validated by the actual multiple mobile robot experiment.

Design of Test Site for Large-Scale Wind Turbine Performance Verification (초대형 풍력터빈 시험을 위한 실증시험장 설계)

  • Sang-Man Kim;Tae-Yoon Jeong;Chae-Joo Moon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.3
    • /
    • pp.397-404
    • /
    • 2023
  • This paper designs a wind turbine test site based on international regulations for the certification of wind turbine prototypes. The maximum height of the meteorological mast installed at the test site is 140m, and power facilities capable of testing up to three wind turbines of 5MW or more are installed. The weather resources measured at the mast can be recorded and analyzed using a monitoring system. Wind turbine manufacturers can use this test site during the certification period, and the installed wind turbines can be used for continuous power generation projects. Therefore, this test site can provide fundamental data for measuring the long-term performance and durability of wind turbines, which can be used to improve models or develop new wind turbines.

Real-time Anomaly Detection System Using HITL Simulation-Based UAV Packet Data (HITL 시뮬레이션 기반 무인비행체 패킷 데이터를 활용한 실시간 이상 탐지 시스템)

  • Daekyeong Park;Byeongjin Kim
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.103-113
    • /
    • 2023
  • In recent years, Unmanned Aerial Vehicles (UAV) have been widely used in various industries. However, as the depend ence on UAV increases rapidly, concerns about the security and safety of UAV are growing. Currently, various vulnerabili ties such as stealing the control right of the UAV or the right to communicate with the UAV in the web application are being disclosed. However, there is a lack of research related to the security of UAV. Therefore, in this paper, a study was conducted to determine whether the packet data was normal or abnormal by collecting packet data of an unmanned aerial vehicle in a HITL(Hardware In The Loop) simulation environment similar to the real environment. In addition, this paper proposes a method for reducing computational cost in the modeling process and increasing the ease of data interpretation, a machine learning-based anomaly detection model that detects abnormal data by learning only normal data, and optimized hyperparameter values.

A Study on Trend Using Time Series Data (시계열 데이터 활용에 관한 동향 연구)

  • Shin-Hyeong Choi
    • Advanced Industrial SCIence
    • /
    • v.3 no.1
    • /
    • pp.17-22
    • /
    • 2024
  • History, which began with the emergence of mankind, has a means of recording. Today, we can check the past through data. Generated data may only be generated and stored at a certain moment, but it is not only continuously generated over a certain time interval from the past to the present, but also occurs in the future, so making predictions using it is an important task. In order to find out trends in the use of time series data among numerous data, this paper analyzes the concept of time series data, analyzes Recurrent Neural Network and Long-Short Term Memory, which are mainly used for time series data analysis in the machine learning field, and analyzes the use of these models. Through case studies, it was confirmed that it is being used in various fields such as medical diagnosis, stock price analysis, and climate prediction, and is showing high predictive results. Based on this, we will explore ways to utilize it in the future.

Gadolinium-Enhanced Magnetic Resonance Imaging of Atherosclerotic Plaques in Comparison with Histopathology: An In Vivo Study in Aorta of Rabbits (조직병리와 비교한 죽상경화반의 가돌리니움 조영증강 자기공명영상: 토끼 대동맥을 이용한 생체 실험)

  • Choi, Byoung-Wook;Hur, Jin;Lee, Hye-Jeong;Kim, Young-Jin;Kim, Tae-Hoon;Choe, Kyu-Ok
    • Investigative Magnetic Resonance Imaging
    • /
    • v.13 no.1
    • /
    • pp.81-87
    • /
    • 2009
  • Purpose : We sought to evaluate enhancement of plaque with gadolinium-based contrast agent by magnetic resonance imaging (MRI) in comparison with histopathology, namely lipid-rich and macrophage-rich components that were two representative characteristics of plaque vulnerability using atherosclerotic rabbit aorta in order to determine which histopathologic component is relevant to the enhancement. Materials and Methods : New Zealand white rabbit (n=4, weight 3.0 to 3.5 kg, all male) was used for animal model of atherosclerosis. Atherosclerotic aortic lesions were induced by high-cholesterol diet and double balloon injury. T1-weight axial images were acquired before and after gadolinium-based contrast agent using a 3-T MRI. MR images and the matched histopathological sections (n=35) were divided into 4 quadrants or 3 (n=130). Enhancement ratio (ER, ER=SIpost/SIpre) on MRI was calculated for each quadrant and compared with histopathology in regard to lipid-rich and macrophage-rich areas. Results : Lipid-rich quadrants were 72 and fibrous quadrants were 58. The number of quadrants which had macrophage-rich areas was 105 and that of quadrants which did not have macrophage-rich areas was 25. ER was significantly higher in lipid-rich quadrants than in fibrous quadrants (mean ER 2.25c$\pm$0.41 vs. 2.72$\pm$0.65, p=0.013). ER poorly correlated with macrophage-rich areas when lipid-component was controlled (correlation coefficient -0.203, p=0.236). Conclusion : Lipid-rich plaques showed stronger enhancement than fibrous plaques using a standard gadolinium-based extracellular contrast agent. Macrophage infiltration did not correlate with degree of enhancement. Further study is warranted that account for optimal time of imaging after contrast injection using various plaque models from early to advanced stages and all possible parameters associated with contrast enhancement.

  • PDF

Cracking Behavior and Flexural Performance of RC Beam with Strain Hardening Cement Composite and High-Strength Reinforcing Bar (고강도 철근과 변형경화형 시멘트복합체를 사용한 보의 균열거동 및 휨 성능)

  • Jang, Seok-Joon;Kang, Su-Won;Yun, Hyun-Do
    • Journal of the Korea Concrete Institute
    • /
    • v.27 no.1
    • /
    • pp.37-44
    • /
    • 2015
  • This paper describes the effect of strain hardening cement composite (SHCC) material on structure performance of reinforced concrete (RC) beams with high-strength reinforcing bar. Also, this paper explores the structure application of SHCC in order to mitigation cracking damage and improve the ductility of flexural RC members. The prediction model for flexural strength of doubly reinforced SHCC beams are investigated in this study. To achieve the these objectives, a total of 6 rectangular beam specimens were tested under four point monotonic loading condition. The main parameters included the types of cement composite and reinforcing bar. Test results indicated that reinforced beam specimens with SHCC material were improved the structure performances and damage characteristics. Specifically, replacement of conventional high-strength concrete with SHCC materials has the potential of high-strength steel bar as flexural reinforcement on RC members. It is remarkable that suggested method of reinforced SHCC beams with high-strength reinforcing bar could be used usefully to the structure design.

Performance Evaluation of the MAC Protocols for WDM Metro Ring with Wavelength-Shared Nodes Connecting Broadband Access Networks (대역 액세스 망을 연결하는 파장 공유 노드 기반 WDM 메트로 링의 MAC 프로토콜 성능 평가)

  • So Won-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.1 s.343
    • /
    • pp.111-120
    • /
    • 2006
  • In this paper, a node architecture of WDM metro network for connecting broadband access networks to converge wire/wireless networks. In consideration of the proposed node architecture and network requirements we proposed and evaluated medium access control protocols. We review WDM related technologies of sub-carrier multiplexing and optical components in order to resolve the bottleneck between optical backbone networks md access networks, and a access node architecture sharing common wavelength is introduced. Source-stripping (SS) MAC protocol Is evaluated under the proposed functional node architecture. DS+IS (Destination-Stripping and Source-Stripping) and DS+IS (Destination-Stripping and Intermediate-Stripping) MAC protocols are described to increase the slot-reuse factor which is low on SS MAC protocol. The key function of new MAC protocols regards the optical switch module of proposed node architecture and helps intermediate or source access nodes for dropping slots to destinations of different wavelength group. Thus, slot-reuse factor increases as the MAC protocols reduce the unnecessary ring-rotation of transferred slots. We use a numerical analysis to expect bandwidth efficiency and maximum throughput by slot-reuse factor Throughput network simulation, the verification of throughput, queuing delay, and transmission fairness are compared among MAC protocols.