• Title/Summary/Keyword: Cyber-physical environment

Search Result 84, Processing Time 0.028 seconds

Development of a Cyber-physical System - A Virtual Autonomous Excavator (사이버 물리적 시스템의 개발 - 가상 자율적 굴삭기)

  • Park, Hong-Seok;Le, Ngoc-Tran
    • Korean Journal of Computational Design and Engineering
    • /
    • v.20 no.3
    • /
    • pp.298-311
    • /
    • 2015
  • Nowadays, automatic digging operation of an excavator is a big challenge due to the complexity of digging environment, the hardness of soil and buried obstacles into the ground. In order to achieve the maximum soil bucket volume, this paper introduces a novel engineering model that was developed as a virtual excavator in the design phase. Through this model, the designs of mechanical and control systems for autonomous excavator are executed and modified easily before developing in real testbed. Based on a concept of an autonomous excavation, a mechanical system of excavator was first designed in SOLIDWORKS, and a soil model also was modeled by finite-element analysis in ANSYS, both modeled models were then exported to ADAMS environment to investigate the digging behavior through virtual simulation. An intelligent control strategy was generated in MATLAB/Simulink to control the excavator operation. The simulation results were demonstrated by effectiveness of the proposed excavator robot in testing scenarios with many soil types and obstacles.

A Study Privacy and Security in Ubiquitous City Environment (Focous on Computing Values Analysis of Personal Information) (유비쿼터스 도시 환경에서 프라시버시 보호 방안에 관한 소고 - 경쟁하는 개인정보가치 분석을 중심으로 -)

  • Jung Chang-Duk;Kang Jang-Mook
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.249-254
    • /
    • 2006
  • As the concept of Ubiquitous City has become an important issue, we need to have a voice in the field of privacy. The Ubiquitous Computing revolution, it is achieved a physical space and an intelligent union of cyber space in the space where an off-line space was integrated with on-line. It is combined with a life space naturally, and Ubiquitous creates a new integrated space. The space is the opportunity space that is limitless as soon as it is the unknown world that mankind was not able to experience yet. According to the recent papers and studies, Privacy or Personal Information sector is mentioned as a major problem for Ubiquitous Computing Society. Therefore, this paper checks Ubiquitous City, the present privacy concept and situation of currently proceeding Ubiquitous computing environment. Also, The main purpose of this paper is to analyze the concepts privacy, personal information. Thus this paper treated the analysis of case, technological or social issue, problem and solution, competing values of privacy and so on.

  • PDF

Web-based Real Environment Monitoring Using Wireless Sensor Networks

  • Lee, Gil-Jae;Kong, Jong-Uk;Kim, Min-Ah;Byeon, Ok-Hwan
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.207-210
    • /
    • 2005
  • Ubiquitous computing is one of the key technology areas in the "Project on Development of Ubiquitous computing and network technology" promoted by the Ministry of Science and Technology as a frontier business of the $21^{st}$ century in Korea, which is based on the new concept merging physical space and computer-based cyber space. With recent advances in Micro Electro Mechanical System (MEMS) technology, low cost and low-power consumption wireless micro sensor nodes have been available. Using these smart sensor nodes, there are many activities to monitor real world, for example, habitat monitoring, earthquake monitoring and so on. In this paper, we introduce web-based real environment monitoring system incorporating wireless sensor nodes. It collects sensing data produced by some wireless sensor nodes and stores them into a database system to analyze. Our environment monitoring system is composed of a networked camera and environmental sensor nodes, which are called Mica2 and developed by University of California at Berkeley. We have modified and ported network protocols over TinyOS and developed a monitoring application program using the MTS310 and MTS420 sensors that are able to observe temperature, relative humidity, light and accelerator. The sensed data can be accessed user-friendly because our environment monitoring system supports web-based user interface. Moreover, in this system, we can setup threshold values so the system supports a function to inform some anomalous events to administrators. Especially, the system shows two useful pre-processed data as a kind of practical uses: a discomfort index and a septicity index. To make both index values, the system restores related data from the database system and calculates them according to each equation relatively. We can do enormous works using wireless sensor technologies, but just environment monitoring. In this paper, we show just one of the plentiful applications using sensor technologies.

  • PDF

Feasibility Analysis on the Attack Graph Applicability in Selected Domains

  • Junho Jang;Saehee Jun;Huiju Lee;Jaegwan Yu;SungJin Park;Su-Youn Hong;Huy Kang Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.5
    • /
    • pp.57-66
    • /
    • 2023
  • In this paper, a research trend of attack graph studies for Cyber-Physical System (CPS) environments is surveyed, and we analyse the limitations of previous works and prospect the future directions. 35 among around 150 attack graph studies conducted within 5 years target CPS, and we inspect key features of CPS environment in the security aspect. Also, we categorize and analyze target studies in the aspect of modelling physical systems and considering air gaps, which are derived as key features of the security aspects of CPS. Half of 20 research that we surveyed do not reflect those two features, and other studies only consider one of the two features. In this circumstance, we examine challenges that attack graph studies on CPS environment face. Finally, we expect state-led studies or studies targeting open-spec commercial CPS will dominate.

Disparities in Workplace Hazards and Organizational Protection Resources by Enterprise Size: A National Representative Study of South Korean Manufacturing Workers

  • Hye-Lin Lee;Ji-Hwan Kim;Taesun Kang;Garin Lee;Hayoung Lee;Hee Won Kim;Seung-Sup Kim
    • Safety and Health at Work
    • /
    • v.15 no.3
    • /
    • pp.284-291
    • /
    • 2024
  • Background: This study aimed to identify the prevalence of workplace hazards and organizational protection resources according to the size of the enterprise in the manufacturing industry of the Republic of Korea. Methods: We analyzed data of waged workers (weighted N = 5,879) from the Fifth Korean Working Conditions Survey (2017). Enterprise sizes were categorized as "micro enterprises" (less than five employees), "small enterprises" (5-49 employees) and "medium-large enterprises" (50 or more employees). Self-reported exposure to 18 physical, chemical, ergonomic, and psychological hazards were measured. The presence of organizational protection resources such as a labor union, a safety delegate working at the company, designated spaces to deal with safety, and the provision of health and safety information was evaluated. Results: Compared to workers in medium-large enterprises, those in micro enterprises showed a higher proportion of exposure to most of physical, chemical, ergonomic, and psychological hazards, except for exposure to solvents, prolonged sitting, and experiencing a state of emotional unrest. On the other hand, workers in micro enterprises had the lowest proportion of access to organizational protection resources. Conclusion: Our study demonstrates that manufacturing workers at the micro enterprise in the Republic of Korea are exposed to the most hazardous work environment and yet have access to the fewest organizational protection resources.

A Study on Enterprise and Government Information Security Enhancement with Information Security Management System (정보보호관리체계를 통한 기업 및 정부 정보보안 강화 방안에 관한 연구)

  • Park, Chung-Soo;Lee, Dong-Bum;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.6
    • /
    • pp.1220-1227
    • /
    • 2011
  • According to the development of IT technology, life itself is becoming the change to Knowledge-based systems or information-based systems. However, the development of IT technology, the cyber attack techniques are improving. And DDoS a crisis occurs frequently, such as cyber terrorism has become a major data leakage. In addition, the various paths of attack from malicious code entering information in the system to work for your company for loss and damage to information assets is increasing. In this environment, the need to preserve the organization and users of information assets to perform ongoing inspections risk management processes within the organization should be established. Processes and managerial, technical, and physical systems by establishing an information security management system should be based. Also, we should be introduced information security product for protecting internal assets from the threat of malicious code incoming to inside except system and process establishment. Therefore we proposed enterprise and government information security enhancement scheme through the introduction of information security management system and information security product in this paper.

A Study on Digital Space Design Method and System using Virtual Reality (가상현실을 활용한 디지털 공간 디자인 기법과 체계 연구)

  • 김연정
    • Archives of design research
    • /
    • v.17 no.3
    • /
    • pp.255-262
    • /
    • 2004
  • The history of design has been closely related with the development of technology. The digital revolution requires design to be as innovative and inventive as the Industrial Revolution had been. In the current society demanding innovation and a new role for design, a successful result can be obtained in the interrelationship between digital and physical environments. In this point of view, exhibition design as a part of space design has had the method of analogue virtual reality, which induces spectators' experiences by creating a virtual environment, as its main expression means before digital technology was introduced. This method was developed from plane images or models to picture techniques according to the development of media technology. Nowadays, the exhibition method introducing multimedia, which enables interactions, is being developed. The main purpose of this study is to identify the meaning and role of virtual space in the view of space design and to analyze its functional interaction. Through this, it attempts to actively promote organic integration and development of widely used cyber space and traditional space design.

  • PDF

Enhancing on Security Monitoring & Control Redundancy Facilities Config uration & Operation in the COVDI-19 Pandemic Environment (코로나19 환경에서 무중단 보안관제센터 구성 및 운영 강화 연구)

  • Kang, Dongyoon;Lee, Jeawoo;Park, Wonhyung
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.25-31
    • /
    • 2021
  • The purpose of this study was to keep the Security Control Center, which operates under a shift system, uninterrupted during the COVID-19 virus epidemic. Security facilities responding to cybersecurity threats are essential security facilities that must be operated 24 hours a day, 365 days a day in real time, and are critical to security operations and management. If security facilities such as infectious disease epidemic, system failure, and physical impact are closed or affected, they cannot respond to real-time cyberattacks and can be fatal to security issues. Recently, there have been cases in which security system facilities cannot be operated, such as the closure of facilities due to the COVID-19 virus epidemic and the availability of security systems due to the rainy season, and other cases need to be prepared. In this paper, we propose a plan to configure a security system facility as a multiplexing facility and operate it as an alternative in the event of a closed situation.

The Impact of Job Satisfaction of Vocational Rehabilitation Professionals on the Quality of Life (장애인직업재활시설 종사자의 직무만족이 삶의 질에 미치는 영향)

  • Nam, Hee Soo
    • Journal of Agricultural Extension & Community Development
    • /
    • v.20 no.1
    • /
    • pp.41-69
    • /
    • 2013
  • The analytical result indicates that their sociological variables including education background, age and marital status, and job satisfaction factors including employment term, job title, compensation, organization, promotion, colleague, job transfer have a significant impact on the quality of their life. This means that their job satisfaction affects the quality of life. In other words, it is necessary to create an environment which can offset their complaints about job environment and conditions and furthermore, generate a sense of pride and a rewarding experience. The study suggests transparent, fair HR system and continuous training and management in consideration of employees' qualification, experience and interest to boost a sense of pride and social recognition and increase the level of job satisfaction as a result. In line with this approach, their dedication to bringing positive changes in local communities is also essential.

A Study on analysis framework development for yield improvement in discrete manufacturing (이산 제조 공정에서의 수율 향상을 위한 분석 프레임워크의 개발에 관한 연구)

  • Song, Chi-Wook;Roh, Geum-Jong;Park, Dong-Jin
    • The Journal of Information Systems
    • /
    • v.26 no.2
    • /
    • pp.105-121
    • /
    • 2017
  • Purpose It is a major goal to improve the product yields during production operations in the manufacturing industry. Therefore, factory is trying to keep the good quality materials and proper production resources, also find the proper condition of facilities and manufacturing environment for yields improvement. Design/methodology/approach We propose the hybrid framework to analyze to dataset extracted from MES. Those data is about the alarm information generated from equipment, both measurement and equipment process value from production and cycle/pitch time measured from production data these covered products during production. We adapt a data warehousing techniques for organizing dataset, a logistic regression for finding out the significant factors, and a association analysis for drawing the rules which affect the product yields. And then we validate the framework by applying the real data generated from the discrete process in secondary cell battery manufacturing. Findings This paper deals with challenges to apply the full potential of modeling and simulation within CPPS(Cyber-Physical Production System) and Smart Factory implementation. The framework is being applied in one of the most advanced and complex industrial sectors like semiconductor, display, and automotive industry.