• Title/Summary/Keyword: Cyber physical system

Search Result 220, Processing Time 0.021 seconds

A study on Improving the Performance of Anti - Drone Systems using AI (인공지능(AI)을 활용한 드론방어체계 성능향상 방안에 관한 연구)

  • Hae Chul Ma;Jong Chan Moon;Jae Yong Park;Su Han Lee;Hyuk Jin Kwon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.19 no.2
    • /
    • pp.126-134
    • /
    • 2023
  • Drones are emerging as a new security threat, and the world is working to reduce them. Detection and identification are the most difficult and important parts of the anti-drone systems. Existing detection and identification methods each have their strengths and weaknesses, so complementary operations are required. Detection and identification performance in anti-drone systems can be improved through the use of artificial intelligence. This is because artificial intelligence can quickly analyze differences smaller than humans. There are three ways to utilize artificial intelligence. Through reinforcement learning-based physical control, noise and blur generated when the optical camera tracks the drone may be reduced, and tracking stability may be improved. The latest NeRF algorithm can be used to solve the problem of lack of enemy drone data. It is necessary to build a data network to utilize artificial intelligence. Through this, data can be efficiently collected and managed. In addition, model performance can be improved by regularly generating artificial intelligence learning data.

A DQN-based Two-Stage Scheduling Method for Real-Time Large-Scale EVs Charging Service

  • Tianyang Li;Yingnan Han;Xiaolong Li
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.551-569
    • /
    • 2024
  • With the rapid development of electric vehicles (EVs) industry, EV charging service becomes more and more important. Especially, in the case of suddenly drop of air temperature or open holidays that large-scale EVs seeking for charging devices (CDs) in a short time. In such scenario, inefficient EV charging scheduling algorithm might lead to a bad service quality, for example, long queueing times for EVs and unreasonable idling time for charging devices. To deal with this issue, this paper propose a Deep-Q-Network (DQN) based two-stage scheduling method for the large-scale EVs charging service. Fine-grained states with two delicate neural networks are proposed to optimize the sequencing of EVs and charging station (CS) arrangement. Two efficient algorithms are presented to obtain the optimal EVs charging scheduling scheme for large-scale EVs charging demand. Three case studies show the superiority of our proposal, in terms of a high service quality (minimized average queuing time of EVs and maximized charging performance at both EV and CS sides) and achieve greater scheduling efficiency. The code and data are available at THE CODE AND DATA.

Research Trend on Digital Twin Based on Keyword Frequency and Centrality Analysis : Focusing on Germany, the United States, Korea (키워드 빈도 및 중심성 분석에 기반한 디지털 트윈 연구 동향 : 독일·미국·한국을 중심으로)

  • Lee Taekkyeun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.20 no.2
    • /
    • pp.11-25
    • /
    • 2024
  • This study aims to analyze research trends in digital twin focusing on Germany, the US, and Korea. In Elsevier's Scopus, we collected 4,657 papers about digital twin published in from 2019 to 2023. Keyword frequency and centrality analysis were conducted on the abstracts of the collected papers. Through the obtained keyword frequencies, we tried to identify keywords with high frequency of occurrence and through centrality analysis, we tried to identify central research keywords for each country. In each country, 'digital_twin', 'machine_learning', and 'iot' appeared as research keywords with the highest interest. As a result of the centrality analysis, research on digital twin, simulation, cyber physical system, Internet of Things, artificial intelligence, and smart manufacturing was conducted as research with high centrality in each country. The implication for Korea is that research on virtual reality, digital transformation, reinforcement learning, industrial Internet of Things, robotics, and data analysis appears to have been conducted with low centrality, and intensive research in related areas appears to be necessary.

Next Generation Convergence Security Framework for Advanced Persistent Threat (지능형 지속 위협에 대한 차세대 융합 보안 프레임워크)

  • Lee, Moongoo;Bae, Chunsock
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.9
    • /
    • pp.92-99
    • /
    • 2013
  • As a recent cyber attack has a characteristic that is intellectual, advanced, and complicated attack against precise purpose and specified object, it becomes extremely hard to recognize or respond when accidents happen. Since a scale of damage is very large, a corresponding system about this situation is urgent in national aspect. Existing data center or integration security framework of computer lab is evaluated to be a behind system when it corresponds to cyber attack. Therefore, this study suggests a better sophisticated next generation convergence security framework in order to prevent from attacks based on advanced persistent threat. Suggested next generation convergence security framework is designed to have preemptive responses possibly against APT attack consisting of five hierarchical steps in domain security layer, domain connection layer, action visibility layer, action control layer and convergence correspondence layer. In domain connection layer suggests security instruction and direction in domain of administration, physical and technical security. Domain security layer have consistency of status information among security domain. A visibility layer of Intellectual attack action consists of data gathering, comparison, decision, lifespan cycle. Action visibility layer is a layer to control visibility action. Lastly, convergence correspond layer suggests a corresponding system of before and after APT attack. An introduction of suggested next generation convergence security framework will execute a better improved security control about continuous, intellectual security threat.

A Study on the Cyber Museum Organization System for Intangible Cultural Properties I - Focused on the Information system and classification code anger - (무형문화재를 위한 사이버뮤지엄 구성체계에 관한 연구 I - 정보체계 및 분류코드화를 중심으로 -)

  • 한영호;장중식;정용섭;황복득
    • Korean Institute of Interior Design Journal
    • /
    • no.38
    • /
    • pp.266-273
    • /
    • 2003
  • The culture is a product of the century, and so a worldwide-recognized cultural legacy is like an incorporeal property owned by a country. It is a new legacy created In new environment conditions among countries. The meaning of this study is to give wider publicity to our intangible cultural properties through active database research. There are a significant number of museums that manage tangible cultural properties at a national level, but we can find that most stay very superficial in the aspects of database protection, classification system, and demonstration method. This is a critical physical factor that makes it difficult to create an information-oriented management system, or to manage intangible cultural properties as incorporeal entities. The preservation of tangible cultural properties may be a more proper approach of handing down valuable national characteristics to posterity In that they can show those characteristics more readily. Unlike tangible cultural properties, the preservation of intangible cultural properties requires a different approach and process. They are treated as a category of human cultural assets because of their incorporeity and formlessness. Since those intangible cultural properties to be preserved and quantified at a national level, it is an important consideration in the study on cultural properties. The objectives of this study are to present the intangible products by making the best use of the information society's merits; rediscover human elements constituting those products; ultimately help promote our cultural succession and development by databasing such human elements.

A collaborative Serious Game for fire disaster evacuation drill in Metaverse (재난 탈출 협동 훈련 기능성 게임의 메타버스 플랫폼 구현)

  • Lee, Sangho;Ha, Gyutae;Kim, Hongseok;Kim, Shiho
    • Journal of Platform Technology
    • /
    • v.9 no.3
    • /
    • pp.70-77
    • /
    • 2021
  • The purpose of Serious games in immersive Metaverse platform to provide users both fun and intriguing learning experiences. We proposes a serious game for self-trainable fire evacuation drill with collaboration among avatars synchronized with multiple trainees and optionally with real-time supervising placed at different remote physical locations. The proposed system architecture is composed of wearable motion sensors and a Head Mounted Display to synchronize each user's intended motions to her/his avatar activities in a cyberspace in Metaverse environment. The proposed system provides immersive as well as inexpensive environments for easy-to-use user interface for cyber experience-based fire evacuation training system. The proposed configuration of the user-avatar interface, the collaborative learning environment, and the evaluation system on the VR serious game are expected to be applied to other serious games. The game was implemented only for the predefined fire scenario for buildings, but the platform can extend its configuration for various disaster situations that may happen to the public.

A Study on the Factors Influencing the Competitiveness of Small and Medium Companies Applied with Smart Factory System (스마트공장 시스템 구축이 중소기업 경쟁력에 미치는 요인에 관한 연구)

  • Young-Hwan Choi;Sang Hyun Choi
    • Information Systems Review
    • /
    • v.19 no.2
    • /
    • pp.95-113
    • /
    • 2017
  • The advent of information communication technology or the Fourth Industrial Revolution facilitated the fusion of equipment and management systems, such as Manufacturing Execution System, Enterprise Resource Planning, and Product Lifecycle Management, in the successful implementation of smart factories. The government supports the early adoption of these systems in small and medium companies to enhance their global competitiveness in producing products that can be recognized in a dramatically changing manufacturing environment. This study introduces smart factories to improve company competitiveness and address influences from the government assistance, CEO leadership, external consultancy, and organizational participation. We analyzed 101 results received from the questionnaires circulated to small- and medium-sized manufacturing companies. Given a successful smart factory implementation, company competitiveness is the factor that mostly influences organizational participation, government assistance, external consultancy, and CEO leadership. This study suggests several perspectives to implement a smart factory, which is the most important aspect of company competitiveness.

Security Frameworks for Industrial Technology Leakage Prevention (산업기술 유출 방지를 위한 보안 프레임워크 연구)

  • YangKyu Lim;WonHyung Park;Hwansoo Lee
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.33-41
    • /
    • 2023
  • In recent years, advanced persistent threat (APT) attack organizations have exploited various vulnerabilities and attack techniques to target companies and institutions with national core technologies, distributing ransomware and demanding payment, stealing nationally important industrial secrets and distributing them on the black market (dark web), selling them to third countries, or using them to close the technology gap, requiring national-level security preparations. In this paper, we analyze the attack methods of attack organizations such as Kimsuky and Lazarus that caused industrial secrets leakage damage through APT attacks in Korea using the MITRE ATT&CK framework, and derive 26 cybersecurity-related administrative, physical, and technical security requirements that a company's security system should be equipped with. We also proposed a security framework and system configuration plan to utilize the security requirements in actual field. The security requirements presented in this paper provide practical methods and frameworks for security system developers and operators to utilize in security work to prevent leakage of corporate industrial secrets. In the future, it is necessary to analyze the advanced and intelligent attacks of various APT attack groups based on this paper and further research on related security measures.

The Design of Manufacturing Simulation Modeling Based on Digital Twin Concept (Digital Twin 개념을 적용한 제조환경 시뮬레이션 모형 설계)

  • Hwang, Sung-Bum;Jeong, Suk-Jae;Yoon, Sung-Wook
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.2
    • /
    • pp.11-20
    • /
    • 2020
  • As the manufacturing environment becomes more complex, traditional simulation models alone are having a lot of difficulties in reflecting real-time manufacturing situations. Although the Digital Twin concept is actively discussed as an alternative to overcome theses issues, many studies are being carried out only in the product design phase. This research presents a Digital Twin-based manufacturing environment framework for applying the Digital Twin concept to the manufacturing process. Twin model that is operated in virtual space, physical system and databases describing the actual manufacturing environment, are proposed as detailed components that make up the framework. To check the applicability of proposed framework, a simple Digital Twin-based manufacturing system was simulated in a conveyor system using Arena software and Excel VBA. Experiment results have shown that the twin model is transmitted real time data from the physical system via DB and were operating in the same time unit. The Excel VBA fitted parameters defined by cycle time based on historical data that real-time and training data are being accumulated together. This study proposes operating method of digital twin model through the simple experiment examples. The results lead to the applicability of Digital twin model.

A Study on the Productivity Improvement of the Dicing Blade Production Process (다이싱 블레이드 제조공정의 생산성향상에 관한 연구)

  • Mun, Jung-Su;Park, Soo-Yong;Lee, Dong-Hyung
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.3
    • /
    • pp.147-155
    • /
    • 2016
  • Industry 4.0's goal is the 'Smart Factory' that integrates and controls production process, procurement, distribution and service based on the fundamental technology such as internet of the things, cyber physical system, sensor, etc. Basic requirement for successful promotion of this Industry 4.0 is the large supply of semiconductor. However, company I who produces dicing blades has difficulty to meet the increasing demand and has hard time to increase revenue because its raw material includes high price diamond, and requires very complex and sensitive process for production. Therefore, this study is focused on understanding the problems and presenting optimal plan to increase productivity of dicing blade manufacturing processes. We carried out a study as follows to accomplish the above purposes. First, previous researches were investigated. Second, the bottlenecks in manufacturing processes were identified using simulation tool (Arena 14.3). Third, we calculate investment amount according to added equipments purchase and perform economic analysis according to cost and sales increase. Finally, we derive optimum plan for productivity improvement and analyze its expected effect. To summarize these results as follows : First, daily average blade production volume can be increased two times from 60 ea. to 120 ea. by performing mixing job in the day before. Second, work flow can be smoother due to reduced waiting time if more machines are added to improve setting process. It was found that average waiting time of 23 minutes can be reduced to around 9 minutes from current process. Third, it was found through simulation that the whole processing line can compose smoother production line by performing mixing process in advance, and add setting and sintering machines. In the course of this study, it was found that adding more machines to reduce waiting time is not the best alternative.