• Title/Summary/Keyword: Autonomous Security

Search Result 228, Processing Time 0.026 seconds

Design of Driving Record System using Block Chain (블록체인을 이용한 주행 기록 시스템 설계)

  • Seo, Eui-seong;Jang, Jong-wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.6
    • /
    • pp.916-921
    • /
    • 2018
  • Recently, interest in autonomous vehicle has increased, and autonomous driving capability is also increasing. Depending on the autonomous driving ability, the maximum number of steps is divided into 6 steps. The higher the step, the less the involvement of the person in the running, and the person does not need to be involved at the highest stage. Today's autonomous vehicles have been developed high level, but solutions are not clearly defined in case of an accident, so only the test run is possible. Such an accident occurring during traveling is almost inevitable, and it is judged who has made a mistake in case of an accident, which increases the punishment for the accident. Although a black box is used to clarify such a part, it is easy to delete a record, and it is difficult to solve an accident such as a hit-and-run. In this paper, i design a driving record system using black chain to solve accidents.

Design and Verification Standard for Safety and Cybersecurity of Autonomous Cars: ISO/TR 4804 (자율주행자동차의 안전 및 보안을 위한 설계 및 검증 표준: ISO/TR 4804)

  • Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.25 no.3
    • /
    • pp.571-577
    • /
    • 2021
  • This paper describes ISO/TR 4804, an international standard to describe how to design and verify autonomous cars to ensure safety and cybersecurity. Goals of ISO/TR 4804 are (1) positive risk balance and (2) avoidance of unreasonable risk. It also 12 principles of safety and cybersecurity to achieve these goals. In the design procedures, it describes (1) 13 capabilities to achieve these safety and cybersecurity principles, (2) hardware and software elements to achieve these capabilities, and (3) a generic logical architecture to combine these elements. In the verification procedures, it describes (1) 5 challenges to ensure safety and cybersecurity, (2) test goals, platforms, and solutions to achieve these challenges, (3) simulation and field operation methods, and (4) verification methods for hardware and software elements. Especially, it regards deep neural network as a software component and it describe design and verification methods of autonomous cars.

Research on Basic Concept Design for Digital Twin Ship Platform (디지털트윈 선박 플랫폼 설계를 위한 연구)

  • Yoon, Kyoungkuk;Kim, Jongsu;Jeon, Hyeonmin;Lim, Changkeun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.6
    • /
    • pp.1086-1091
    • /
    • 2022
  • The International Maritime Organization is establishing international agreements on maritime safety and security to prepare for the introduction of autonomous ships. In Korea, the industry is focusing on autonomous navigation system technology development, and to reduce accidents involving coastal ships, research on autonomous ship technology application plans for coastal ships is in progress. Interest in autonomously operated ships is increasing worldwide, and maritime demonstrations for verification of developed technologies are being pursued. In this study, a basic investigation was conducted on the design of a demonstration ship and an onshore platform (remote support center) using digital twin technology for application to coastal ships. To apply digital twin technology, an 8-m small battery-powered electric propulsion ship was selected as the target. The basic design of the twin-integrated platform was developed. The ship navigation and operation data were stored on a server system, and remote-control commands of the electric propulsion ship was achieved through communication between the ship and the onshore platform. Ship performance management, operation and operation optimization, and predictive control are possible using this digital twin technology. This safe and economical digital twin technology is applicable to ships responding to crisis scenarios.

Development of AI based Autonomous Driving System for Outdoor Cleaning Robot (실외 청소 로봇를 위한 인공지능기반 자율 주행 시스템 개발에 관한 연구)

  • KO, Kuk Won;LEE, Ji Yeon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.526-528
    • /
    • 2022
  • 실외 자율주행 청소 로봇을 위한 인공지능기반 자율주행 시스템을 개발하였다. 개발된 시스템은 ROS(Robot Operationg System) 기반으로 이루어졌으며, 3D 라이다와, 초음파 센서를 활용하여 주변의 장애물을 감지하고 GPS와 영상을 활용하여 로봇의 위치 인식을 하여 자율 주행을 진행하였다. 자율주행 실험결과 영상과 RTK-GPS를 사용하여 정해진 경로를 ±20cm이내의 오차를 가지고 추종하면서 청소를 진행하였다.

Design and Implementation of Mechanism for Effectively Exchanging Cybersecurity Information between Independent Security Management Domains (독립적인 보안관리 도메인간 효과적인 사이버보안정보 교환 방법의 설계 및 구현)

  • An, Gae-Il;Seo, Dae-Hee;Lim, Sun-Hee;Kim, Jong-Hyun;Seo, Dong-Il;Cho, Hyun-Sook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1489-1497
    • /
    • 2011
  • As a way for defending against cyber security threats, there has been a research on cybersecurity information exchange between security management domains in order to raise security performance of the whole network. One of the hottest issues in exchanging cybersecurity information between security management domains is that the requirements of those domains on information sharing are different with each other because each is autonomous domain. This paper proposes a mechanism for effective cybersecurity Information exchange between independent security management domains, which can satisfy their requirements on information sharing through sharing policy and sharing policy control protocol, proposed in this paper. In this paper we have developed an integrated security control system that supports the proposed mechanism. Through the system the performance of the proposed mechanism is measured and evaluated.

A Conceptual Study on Disaster Detection and Response System (재난전조 감지 및 재난대응 시스템에 관한 개념연구)

  • Park, Mi-yun;Koo, Won-yong;Park, Wan-soon;Kwon, Se-gon
    • Journal of Korean Society of Disaster and Security
    • /
    • v.7 no.2
    • /
    • pp.35-41
    • /
    • 2014
  • If a disaster occurs in the underground like subway, disaster response system should minimize the casualties. It must quickly guide passengers to a safe evacuation route. But sometimes the system does not work properly. And then they need distributed disaster response system which make decision autonomously. We perform conceptual research about distributed autonomous decision-making disaster detection and response system and disaster detection method.

Object detection technology trend and development direction using deep learning

  • Kwak, NaeJoung;Kim, DongJu
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.119-128
    • /
    • 2020
  • Object detection is an important field of computer vision and is applied to applications such as security, autonomous driving, and face recognition. Recently, as the application of artificial intelligence technology including deep learning has been applied in various fields, it has become a more powerful tool that can learn meaningful high-level, deeper features, solving difficult problems that have not been solved. Therefore, deep learning techniques are also being studied in the field of object detection, and algorithms with excellent performance are being introduced. In this paper, a deep learning-based object detection algorithm used to detect multiple objects in an image is investigated, and future development directions are presented.

Detecting Doors Edges in Diverse Environments for Visually Disabled People

  • Habib, Mohamed Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.9-15
    • /
    • 2021
  • It is a challenge for visually impaired people to access unfamiliar environments independently, hence the quality of life is reduced, and safety of life is compromised. An accurate and reliable door detection system comprising of way finding and indoor navigation can be beneficial for a large number of autonomous and mobile applications for visually impaired people. This paper illustrates an image-based door detection scheme for visually impaired people using stable features (edges and corners) including color averaging and image resizing. Simulation results show that the proposed scheme shows a significant improvement when compared with existing scheme.

Experiment on countermeasures against cyber security vulnerabilities using redundancy of ISO 19847 Shipboard Data Server (ISO 19847 선박 데이터 서버 이중화를 통한 사이버 보안 취약성 대응 방안 실험)

  • Lee, ChangUi;Lee, Seojeong
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.6
    • /
    • pp.793-806
    • /
    • 2022
  • As the IMO introduced MASS (Maritime Autonomous Surface Ships), ISO(International Organization for Standardization) announced ISO 19847 of a maritime data sharing standard for collecting and remotely managing data of ship systems. Previous literature evaluated the risk using HAZOP for ISO 19847 and proved that risk assessment is useful through experiments. However, redundancy of ISO 19847 ship data server which is one of the risk reduction method suggested in previous literature, was designed but couldn't tested due to the limitations of the conditions. So, in this study, to prove the usefulness of the ship data server redundancy of ISO 19847 which was not tested in previous literature. It based on the design of previous literature, and the network of ship data servers was modeled using the SES/DEVS format and simulated using the DEVS# open source library.

Processes of Outflow of the Boiling Steam-Water Mixture in the Widening Part of Hydro-Steam Turbine Nozzles

  • Leonid, Serejkin;Boris, Shifrin;Victor, Perov;Alexandr, Goldin
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.178-184
    • /
    • 2022
  • Renewable energy sources based on solar radiation, wind energy, geothermal energy, and biomass energy have now reached the level of industrial application. A new way to generate electricity using low-potential heat is to install a hydro-steam turbine. In hydro-steam turbines, hot water is supplied directly to turbine rotor nozzles without prior separation into steam and water in separators, which significantly increases the efficiency of hot water energy use. Such turbines are suggested to be used as autonomous energy sources in geothermal heating systems, heating water boilers and cooling systems of chemical reactors, metallurgical furnaces, etc. The authors conclude that the installation of hydro-steam turbines in heating plants and process boiler plants can also be effective if the used exhaust steam-water mixture at the turbine outlet is used to heat the network water or as return water.