• Title/Summary/Keyword: 자동화 기술

Search Result 2,997, Processing Time 0.027 seconds

Who Should Live? Autonomous Vehicles and Moral Decision-Making (자율주행차와 윤리적 의사결정: 누가 사는 것이 더 합당한가?)

  • Shin, Hong Im
    • Science of Emotion and Sensibility
    • /
    • v.22 no.4
    • /
    • pp.15-30
    • /
    • 2019
  • The reduction of traffic accidents is a primary potential benefit of autonomous vehicles (AVs). However, the prevalence of AVs also arouses a key question: to what extent should a human wrest control back from AVs? Specifically, in an unavoidable situation of emergency, should an AV be able to decide between the safety of its own passengers and endangered pedestrians? Should AV programming include well-accepted decision rules about actionsto take in hypothetical situations? The current study (N = 103) examined individual/situational variables that could perform critical decision-making roles in AV related traffic accidents. The individual variable of attitudes toward AVs was assessed using the Self-driving Car Acceptance Scale. To investigate situational influences on decisional processes, the study's participants were assigned to one of two groups: the achievement value was activated in one group and the benevolence value was triggered in the other through the use of a sentence completion task. Thereafter, participants were required to indicate who should be protected from injury: the passengers of the concerned AV, or endangered pedestrians. Participants were also asked to record the extent to which they intended to buy an AV programmed to decide in favor of the greater good according to Utilitarian principles. The results suggested that participants in the "achievement value: driver perspective" groupexpressed the lowest willingness to sacrifice themselves to save several pedestrians in an unavoidable traffic accident. This group of participants was also the most reluctant to buy an AV programmed with utilitarian rules, even though there were significant positive relationships between members' acceptance of AVs and their expressed intention to purchase one. These findings highlight the role of the decisional processes involved in the "achievement value" pertaining to AVs. The paper finally records the limitations of the present study and suggests directions for future research.

A Semiconductor Etching Process Monitoring System Development using OES Sensor (OES 센서를 이용한 반도체 식각 공정 모니터링 시스템 개발)

  • Kim, Sang-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.3
    • /
    • pp.107-118
    • /
    • 2013
  • In this paper, we developed the semiconductor monitoring system for the etching process. Around the world, expert companies are competing fiercely since the semiconductor industry is a leading value-added industry that produces the essential components of electronic products. As a result, many researches have been conducted in order to improve the quality, productivity, and characteristics of semiconductor products. Process monitoring techniques has an important role to give an equivalent quality and productivity to produce semiconductor. In fact, since the etching process to form a semiconductor circuit causes great damage to the semiconductors, it is very necessary to develop a system for monitoring the process. The proposed monitoring system is mainly focused on the dry etching process using plasma and it provides the detailed observation, analysis and feedback to managers. It has the functionality of setting scenarios to match the process control automatically. In addition, it maximizes the efficiency of process automation. The result can be immediately reflected to the system since it performs real-time monitoring. UI (User Interface) provides managers with diagnosis of the current state in the process. The monitoring system has diverse functionalities to control the process according to the scenario written in advance, to stop the process efficiently and finally to increase production efficiency.

Performance Analysis of Intelligence Pain Nursing Intervention U-health System (지능형 통증 간호중재 유헬스 시스템 성능분석)

  • Jung, Hoill;Hyun, Yoo;Chung, Kyung-Yong;Lee, Young-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.4
    • /
    • pp.1-7
    • /
    • 2013
  • A personalized recommendation system is a recommendation system that recommends goods to users' taste by using an automated information filtering technology. A collaborative filtering method in this technology is a method that discriminates certain types, which represent similar patterns. Thus, it is possible to estimate the pain strength based on the data of the patients who have the past similar types and extract related conditions according to the similarity in classified patients. A representative method using the Pearson correlation coefficient for extracting the similarity weight may represent inexact results as the sample data is small according to the amount of data. Also, it has a disadvantage that it is not possible to fast draw results due to the increase in calculations as a square scale as the sample data is large. In this paper, the excellency of the intelligence pain nursing intervention u-health system implemented by comparing the scale and similarity group of the sample data for extracting significant data is verified through the evaluation of MAE and Raking scoring. Based on the results of this verification, it is possible to present basic data and guidelines of the pain of patients recognized by nurses and that leads to improve the welfare of patients.

Mutiagent based on Attacker Traceback System using SOM (SOM을 이용한 멀티 에이전트 기반의 침입자 역 추적 시스템)

  • Choi Jinwoo;Woo Chong-Woo;Park Jaewoo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.3
    • /
    • pp.235-245
    • /
    • 2005
  • The rapid development of computer network technology has brought the Internet as the major infrastructure to our society. But the rapid increase in malicious computer intrusions using such technology causes urgent problems of protecting our information society. The recent trends of the intrusions reflect that the intruders do not break into victim host directly and do some malicious behaviors. Rather, they tend to use some automated intrusion tools to penetrate systems. Most of the unknown types of the intrusions are caused by using such tools, with some minor modifications. These tools are mostly similar to the Previous ones, and the results of using such tools remain the same as in common patterns. In this paper, we are describing design and implementation of attacker-traceback system, which traces the intruder based on the multi-agent architecture. The system first applied SOM to classify the unknown types of the intrusion into previous similar intrusion classes. And during the intrusion analysis stage, we formalized the patterns of the tools as a knowledge base. Based on the patterns, the agent system gets activated, and the automatic tracing of the intrusion routes begins through the previous attacked host, by finding some intrusion evidences on the attacked system.

Considerations on a Transportation Simulation Design Responding to Future Driving (미래 교통환경 변화에 대응하는 교통 모의실험 모형 설계 방향)

  • Kim, Hyoungsoo;Park, Bumjin
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.14 no.6
    • /
    • pp.60-68
    • /
    • 2015
  • Recent proliferation of advanced technologies such as wireless communication, mobile, sensor technology and so on has caused significant changes in a traffic environment. Human beings, in particular drivers, as well as roads and vehicles were advanced on information, intelligence and automation thanks to those advanced technologies; Intelligent Transport Systems (ITS) and autonomous vehicles are the results of changes in a traffic environment. This study proposed considerations when designing a simulation model for future transportation environments, which are difficult to predict the change by means of advanced technologies. First of all, approximability, flexibility and scalability were defined as a macroscopic concept for a simulation model design. For actual similarity, calibration is one of the most important steps in simulation, and Physical layer and MAC layer should be considered for the implementation of the communication characteristics. Interface, such as API, for inserting the additional models of future traffic environments should be considered. A flexible design based on compatibility is more important rather than a massive structure with inherent many functions. Distributed computing with optimized H/W and S/W together is required for experimental scale. The results of this study are expected to be used to the design of future traffic simulation.

Development of Intelligent Learning Tool based on Human eyeball Movement Analysis for Improving Foreign Language Competence (외국어 능력 향상을 위한 사용자 안구운동 분석 기반의 지능형 학습도구 개발)

  • Shin, Jihye;Jang, Young-Min;Kim, Sangwook;Mallipeddi, Rammohan;Bae, Jungok;Choi, Sungmook;Lee, Minho
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.11
    • /
    • pp.153-161
    • /
    • 2013
  • Recently, there has been a tremendous increase in the availability of educational materials for foreign language learning. As part of this trend, there has been an increase in the amount of electronically mediated materials available. However, conventional educational contents developed using computer technology has provided typically one-way information, which is not the most helpful thing for users. Providing the user's convenience requires additional off-line analysis for diagnosing an individual user's learning. To improve the user's comprehension of texts written in a foreign language, we propose an intelligent learning tool based on the analysis of the user's eyeball movements, which is able to diagnose and improve foreign language reading ability by providing necessary supplementary aid just when it is needed. To determine the user's learning state, we correlate their eye movements with findings from research in cognitive psychology and neurophysiology. Based on this, the learning tool can distinguish whether users know or do not know words when they are reading foreign language sentences. If the learning tool judges a word to be unknown, it immediately provides the student with the meaning of the word by extracting it from an on-line dictionary. The proposed model provides a tool which empowers independent learning and makes access to the meanings of unknown words automatic. In this way, it can enhance a user's reading achievement as well as satisfaction with text comprehension in a foreign language.

Research Trend of Soft Magnetic Composite Materials with High Energy Efficiency (고에너지효율 연자성 복합 분말 소재의 연구개발 동향)

  • Kim, Hwi-Jun
    • Journal of the Korean Magnetics Society
    • /
    • v.21 no.2
    • /
    • pp.77-82
    • /
    • 2011
  • The use of soft magnetic materials have been increasing in the various industrial fields according to the increasing demand for high performance, automatic, miniaturing equipments in the recent our life. In this study, we investigated the effect of factors on the core loss and magnetic properties of electrical steel and soft magnetic composites. Furthermore, we reviewed the major efforts to reduce the core loss and improve the soft magnetic properties in the two main soft magnetic materials. Domain purification which results from reduced density of defects in cleaner electrical steels is combined with large grains to reduce hysteresis loss. The reduced thickness and the high electrical conductivity reduce the eddy current component of loss. Furthermore, the coating applied to the surface of electrical steel and texture control lead to improve high permeability and low core loss. There is an increasing interest in soft magnetic composite materials because of the demand for miniaturization of cores for power electronic applications. The SMC materials have a broad range of potential applications due to the possibility of true 3-D electromagnetic design and higher frequency operation. Grain size, sintering temperature, and the degree of porosity need to be carefully controlled in order to optimize structure-sensitive properties such as maximum permeability and low coercive force. The insulating coating on the powder particles in SMCs eliminates particle-to-particle eddy current paths hence minimizing eddy current losses, but it reduces the permeability and to a small extent the saturation magnetization. The combination of new chemical composition with optimum powder manufacturing processes will be able to result in improving the magnetic properties in soft magnetic composite materials, too.

A study on vulnerability analysis and incident response methodology based on the penetration test of the power plant's main control systems (발전소 주제어시스템 모의해킹을 통한 취약점 분석 및 침해사고 대응기법 연구)

  • Ko, Ho-Jun;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.295-310
    • /
    • 2014
  • DCS (Distributed Control System), the main control system of power plants, is an automated system for enhancing operational efficiency by monitoring, tuning and real-time operation. DCS is becoming more intelligent and open systems as Information technology are evolving. In addition, there are a large amount of investment to enable proactive facility management, maintenance and risk management through the predictive diagnostics. However, new upcoming weaponized malware, such as Stuxnet designed for disrupting industrial control system(ICS), become new threat to the main control system of the power plant. Even though these systems are not connected with any other outside network. The main control systems used in the power plant usually have been used for more than 10 years. Also, this system requires the extremely high availability (rapid recovery and low failure frequency). Therefore, installing updates including security patches is not easy. Even more, in some cases, installing security updates can break the warranty by the vendor's policy. If DCS is exposed a potential vulnerability, serious concerns are to be expected. In this paper, we conduct the penetration test by using NESSUS, a general-purpose vulnerability scanner under the simulated environment configured with the Ovation version 1.5. From this result, we suggest a log analysis method to detect the security infringement and react the incident effectively.

An Experimental Environment for Simulation of Stealthy Deception Attack in CPS Using PLCitM (PLC in the Middle) (중간자 PLC를 이용한 CPS 은닉형 공격 실험환경 구축 방안)

  • Chang, Yeop;Lee, Woomyo;shin, Hyeok-Ki;Kim, Sinkyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.123-133
    • /
    • 2018
  • Cyber-Physical System (CPS) is a system in which a physical system and a cyber system are strongly integrated. In order to operate the target physical system stably, the CPS constantly monitors the physical system through the sensor and performs control using the actuator according to the current state. If a malicious attacker performs a forgery attack on the measured values of the sensors in order to conceal their attacks, the cyber system operated based on the collected data can not recognize the current operation status of the physical system. This causes the delay of the response of the automation system and the operator, and then more damage will occur. To protect the CPS from increasingly sophisticated and targeted attacks, countermeasures must be developed that can detect stealthy deception attacks. However, in the CPS environment composed of various heterogeneous devices, the process of analyzing and demonstrating the vulnerability to actual field devices requires a lot of time. Therefore, in this study, we propose a method of constructing the experiment environment of the PLCitM (PLC in the middle) which can verify the performance of the techniques to detect the CPS stealthy deception attack and present the experimental results.

A Study on Optical Condition and preprocessing for Input Image Improvement of Dented and Raised Characters of Rubber Tires (고무타이어 문자열 입력영상 개선을 위한 전처리와 광학조건에 관한 연구)

  • 류한성;최중경;권정혁;구본민;박무열
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.1
    • /
    • pp.124-132
    • /
    • 2002
  • In this paper, we present a vision algorithm and method for input image improvement and preprocessing of dented and raised characters on the sidewall of tires. we define optical condition between reflect coefficient and reflectance by the physical vector calculate. On the contrary this work will recognize the engraved characters using the computer vision technique. Tire input images have all most same grey levels between the characters and backgrounds. The reflectance is little from a tire surface. therefore, it's very difficult segment the characters from the background. Moreover, one side of the character string is raised and the other is dented. So, the captured images are varied with the angle of camera and illumination. For optimum Input images, the angle between camera and illumination was found out to be with in 90$^{\circ}$. In addition, We used complex filtering with low-pass and high-pass band filters to improve input images, for clear input images. Finally we define equation reflect coefficient and reflectance. By doing this, we obtained good images of tires for pattern recognition.