• Title/Summary/Keyword: Cyber-Physical systems

Search Result 183, Processing Time 0.023 seconds

A Development of Diagnosis and Treatment System for Swallowing Disorder and Extraction of Analysis Parameters (연하장애의 진단 및 치료를 위한 시스템의 개발 및 분석 파라미터 추출)

  • Shin, D.I.;Song, Y.J.;Choi, K.H.;Cheong, H.C.;Huh, S.J.
    • Journal of Biomedical Engineering Research
    • /
    • v.30 no.1
    • /
    • pp.41-48
    • /
    • 2009
  • In this paper, we present the diagnosis system for swallowing disorder. There are some types of diagnosis device for swallowing disorder, for example, the video fluoroscopy, the nuclear medicine inspection, the endoscopy, EMG and motion analysis. But these systems need heavy devices or have dangerous nuclear exposure, so are uncomfortable for handicapped person. Our system has advantages of simplicity, accuracy and quantitative analysis. In addition to the diagnosis aspect, this system can be used to biofeedback treatment.

Analyzing the Major Issues of the 4th Industrial Revolution

  • Jeon, Jeonghwan;Suh, Yongyoon
    • Asian Journal of Innovation and Policy
    • /
    • v.6 no.3
    • /
    • pp.262-273
    • /
    • 2017
  • Recently, the attention to the $4^{th}$ Industrial Revolution has been increasing. In the $4^{th}$ Industrial Revolution era, the boundaries between physical space, digital space, and biological space are becoming blurred because of the active convergence between various fields. There are many issues about the $4^{th}$ Industrial Revolution such as artificial intelligence, Internet of things, big data, and cyber physical system. To cope with the $4^{th}$ Industrial Revolution, an accurate analysis and technology planning need to be undertaken from a broad point of view. However, there is little research on the analysis of the major issues about the 4th Industrial Revolution. Accordingly, this study aims to analyse these major issues. Data mining such as topic modelling method is used for this analysis. This study is expected to be helpful for the researcher and policy maker of the 4th Industrial Revolution.

qPALS: Quality-Aware Synchrony Protocol for Distributed Real-Time Systems

  • Kang, Woochul;Sha, Lui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.10
    • /
    • pp.3361-3377
    • /
    • 2014
  • Synchronous computing models provided by real-time synchrony protocols, such as TTA [1] and PALS [2], greatly simplify the design, implementation, and verification of real-time distributed systems. However, their application to real systems has been limited since their assumptions on underlying systems are hard to satisfy. In particular, most previous real-time synchrony protocols hypothesize the existence of underlying fault tolerant real-time networks. This, however, might not be true in most soft real-time applications. In this paper, we propose a practical approach to a synchrony protocol, called Quality-Aware PALS (qPALS), which provides the benefits of a synchronous computing model in environments where no fault-tolerant real-time network is available. qPALS supports two flexible global synchronization protocols: one tailored for the performance and the other for the correctness of synchronization. Hence, applications can make a negotiation flexibly between performance and correctness. In qPALS, the Quality-of-Service (QoS) on synchronization and consistency is specified in a probabilistic manner, and the specified QoS is supported under dynamic and unpredictable network environments via a control-theoretic approach. Our simulation results show that qPALS supports highly reliable synchronization for critical events while still supporting the efficiency and performance even when the underlying network is not stable.

Time Synchronization Scheme of Cyber-Physical Systems for Military Training Systems (국방 훈련체계용 가상물리시스템 시간 동기화 기법)

  • Hong, Seok-Joon;Lee, Woo-Yeob;Joe, In-Whee;Kim, Won-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.12
    • /
    • pp.1814-1823
    • /
    • 2016
  • LVC(live-virtual-constructive) integrated training system is a representative cyber-physical system. Each systems in a LVC system has different time domain, resolution and operation methods. So, it is very important to integrate different middlewares as a common middleware for heterogeneous systems using inter-working GWs. Especially, since the LVC system uses different time, it is necessary to study the method for guaranteeing causality and time synchronization among the events from different systems. In this study, we propose an time synchronization scheme to integrate the virtual and constructive system which use the simulation time of HLA (High Level Architecture)/ RTI (Run Time Infrastructure) into the live system based on the OMG DDS (Data Distribution Service). We propose a precise time synchronization scheme based on HLA time management and clock federate between participants and federates which are the communication objects of DDS and HLA/RTI respectively. In addition, we verified that time is well-synchronized among heterogeneous systems using the suggested scheme by implementing and demonstrating simulation applications on each middleware.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Establishing a stability switch criterion for effective implementation of real-time hybrid simulation

  • Maghareh, Amin;Dyke, Shirley J.;Prakash, Arun;Rhoads, Jeffrey F.
    • Smart Structures and Systems
    • /
    • v.14 no.6
    • /
    • pp.1221-1245
    • /
    • 2014
  • Real-time hybrid simulation (RTHS) is a promising cyber-physical technique used in the experimental evaluation of civil infrastructure systems subject to dynamic loading. In RTHS, the response of a structural system is simulated by partitioning it into physical and numerical substructures, and coupling at the interface is achieved by enforcing equilibrium and compatibility in real-time. The choice of partitioning parameters will influence the overall success of the experiment. In addition, due to the dynamics of the transfer system, communication and computation delays, the feedback force signals are dependent on the system state subject to delay. Thus, the transfer system dynamics must be accommodated by appropriate actuator controllers. In light of this, guidelines should be established to facilitate successful RTHS and clearly specify: (i) the minimum requirements of the transfer system control, (ii) the minimum required sampling frequency, and (iii) the most effective ways to stabilize an unstable simulation due to the limitations of the available transfer system. The objective of this paper is to establish a stability switch criterion due to systematic experimental errors. The RTHS stability switch criterion will provide a basis for the partitioning and design of successful RTHS.

A Marketing Strategy Implementation for Korea Postal Service (마케팅 전략실행을 통한 우정서비스 경쟁력 강화방안)

  • Kim Yong-Shik
    • Management & Information Systems Review
    • /
    • v.3
    • /
    • pp.257-285
    • /
    • 1999
  • Korea Postal Service(KPS) nowadays lies in competitive environment with alternative business such as door-to-door delivery service. Customers began to complain about postal service quality and ask the government to reform a public firm through management innovation. But, Korea Postal Service has not met the break-even point between it's revenue and expenditure because the service is under the government system and cannot independently make major decisions on products, pricing, services, personnel management, financial policies and etc. The objective of this study is to provide marketing planners and practitioners with some guidelines when they establish marketing strategies and to help marketers on theories and practical instructions about postal service marketing when they interact with customers. I. A field survey on both customer satisfaction and internal staff satisfaction was conducted to get some ideas for the marketing strategy planning. II. Practical guidelines and instructions were made for marketers to communicate with customers in various areas such as pricing, product, service demand, marketing channel, promotion, and etc. III. Some suggestions on marketing policies for planners and mangers in the marketing strategy were described including personnel resource as well as physical resource. IV. Special issues on small packet market and direct mail market were discussed and some alternative solutions were proposed. V. Database marketing strategy was emphasized to get new business opportunities such as direct mail, and to provide differential services to customers as much as their contribution into the profitability for KPS. VI. Cyber Post Office should be constructed on Internet to provide new services which are combined with physical material flow and information technologies.

  • PDF

Author Co-citation Analysis for Digital Twin Studies (디지털 트윈 연구의 저자 동시인용 분석)

  • Kim, Sumin;Suh, Chang-Kyo
    • The Journal of Information Systems
    • /
    • v.28 no.3
    • /
    • pp.39-58
    • /
    • 2019
  • Purpose A digital twin is a digital replication of a physical system. Gartner identified the digital twin as one of the Gartner Top 10 Strategic Technology Trend for three years from 2017. The rapid development of the digital twin market is expected to bring about innovation and change throughout society, and much research has been done recently in academia. In this research, we tried to explore the main research trends for digital twin research. Design/methodology/approach We collected the digital twin research from Web of Science, and analyzed 804 articles that was published during time span of 2010-2018. A total of 41 key authors were selected based on the frequency of citation. We created a co-citation matrix for the core authors, and performed multivariate analysis such as cluster analysis and multidimensional scaling. We also conducted social network analysis to find the influential researchers in digital twin research. Findings We identified four major sub- areas of digital twin research: "Infrastructure", "Prospects and Challenges", "Security", and "Smart Manufacturing". We also identified the most influential researchers in digital twin research: Lee EA, Rajkumar R, Wan J, Karnouskos S, Kim K, and Cardenas AA. Limitation and further research suggestion were also discussed as a concluding remarks.

Practical Swarm Optimization based Fault-Tolerance Algorithm for the Internet of Things

  • Luo, Shiliang;Cheng, Lianglun;Ren, Bin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.735-748
    • /
    • 2014
  • The fault-tolerance routing problem is one of the most important issues in the application of the Internet of Things, and has been attracting growing research interests. In order to maintain the communication paths from source sensors to the macronodes, we present a hybrid routing scheme and model, in which alternate paths are created once the previous routing is broken. Then, we propose an improved efficient and intelligent fault-tolerance algorithm (IEIFTA) to provide the fast routing recovery and reconstruct the network topology for path failure in the Internet of Things. In the IEIFTA, mutation direction of the particle is determined by multi-swarm evolution equation, and its diversity is improved by the immune mechanism, which can improve the ability of global search and improve the converging rate of the algorithm. The simulation results indicate that the IEIFTA-based fault-tolerance algorithm outperforms the EARQ algorithm and the SPSOA algorithm due to its ability of fast routing recovery mechanism and prolonging the lifetime of the Internet of Things.

Smart Service System-based Architecture Design of Smart Factory (스마트 서비스 시스템 기반 스마트 팩토리 아키텍처 설계)

  • Lee, Heeje;Lee, Joongyoon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.13 no.2
    • /
    • pp.57-64
    • /
    • 2017
  • A new paradigm based on distributed manufacturing services is emerging. This paradigm shift can be realized by smart functions and smart technologies such as Cyber Physical System (CPS), Artificial Intelligence (AI), and Cloud Computing. Most architectures define stack levels from Level 0 (equipment) to Level 4 (business area) and specify the services to be provided between them. Because of their a rough technical specification, there is a limitation on how to actually utilize a technology to actually implement a smart factory service with this architecture. In this paper, we propose a smart factory architecture that can be utilized directly from the perspective of a smart service system by making the use of System Engineering Process and System Modeling Language (SysML).