• 제목/요약/키워드: Hostile environment

검색결과 106건 처리시간 0.026초

Remote handling teleoperators in hostile environment

  • Lee, J.S.;Yoon, J.S.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1988년도 한국자동제어학술회의논문집(국제학술편); 한국전력공사연수원, 서울; 21-22 Oct. 1988
    • /
    • pp.958-963
    • /
    • 1988
  • Teleoperator as a special robotic system for remote handling in hostile environment is reviewed in this article. Inherent features and prospective applications pertinent to teleoperator are indentified with particular concern for nuclear applications as major area of teleoperator technology exercise. Korean status as well as major world programs of teleoperator R&D are also reviewed with perspectives.

  • PDF

수중 작업에 있어서 극한 환경의 잠수 활동 기준 검토 (A Study on the Diving Standards for Underwater Work in Hostile Environment)

  • 강신영
    • Journal of Advanced Marine Engineering and Technology
    • /
    • 제34권5호
    • /
    • pp.735-742
    • /
    • 2010
  • 본 연구는 극한 환경에서의 잠수 기준에 대해 살펴보고, 2010년 3월 백령도 근해에서 발생한 천안함 침몰사고의 실종자 수색 작업에 적용된 우리 해군의 잠수 방식과 사용 장비, 절차 등에 대한 분석을 하였다. 이번 잠수작업은 국제 기준이나 안전을 고려하면 작업을 해서는 안 되는 조건인데도 불구하고 작업이 시행되었으며, 초기 수색 작업에 있어서 임무의 성격, 신속성, 효율성을 고려하고 세부적으로 수심과 잠수 가능시간, 작업의 종류, 환경 조건, 작업 기간을 검토한 결과, 공기를 사용하는 스쿠버 방식이 적절하였다고 분석되었다.

TriSec: A Secure Data Framework for Wireless Sensor Networks Using Authenticated Encryption

  • Kumar, Pardeep;Cho, Sang-Il;Lee, Dea-Seok;Lee, Young-Dong;Lee, Hoon-Jae
    • Journal of information and communication convergence engineering
    • /
    • 제8권2호
    • /
    • pp.129-135
    • /
    • 2010
  • Wireless sensor networks (WSNs) are an emerging technology and offers economically viable monitoring solution to many challenging applications. However, deploying new technology in hostile environment, without considering security in mind has often proved to be unreasonably unsecured. Apparently, security techniques face many critical challenges in WSNs like data security and secrecy due to its hostile deployment nature. In order to resolve security in WSNs, we propose a novel and efficient secure framework called TriSec: a secure data framework for wireless sensor networks to attain high level of security. TriSec provides data confidentiality, authentication and data integrity to sensor networks. TriSec supports node-to-node encryption using PingPong-128 stream cipher based-privacy. A new PingPong-MAC (PP-MAC) is incorporated with PingPong stream cipher to make TriSec framework more secure. PingPong-128 is fast keystream generation and it is very suitable for sensor network environment. We have implemented the proposed scheme on wireless sensor platform and our result shows their feasibility.

취약면적 기반의 함정 취약성 간이 평가 방법에 관한 연구 (Simplified Vulnerability Assessment Procedure for the Warship Based on the Vulnerable Area Approach)

  • 김광식;이장현;황세윤
    • 대한조선학회논문집
    • /
    • 제48권5호
    • /
    • pp.404-413
    • /
    • 2011
  • It is important to assess and improve the warship survivability for the weapon threats which have a critical effect on warship. The survivability of the warship is defined as the capability of a warship to avoid or withstand a man-made hostile environment. The survivability of the warship consists of three categories (Susceptibility, Vulnerability and Recoverability). Firstly, the susceptibility is defined as the inability of a warship to avoid radars, guns, missiles and etc. Secondly, the vulnerability is defined as the inability of a warship to withstand the man-made hostile environment. Finally, the recoverability is defined as the ability of a warship to recover the damaged components and systems. Among them, this paper has described the vulnerability assessment for the hypothetical system which is composed of critical components. Also, the procedure which is suggested to calculate the vulnerable probability of the damaged warship is based on the Vulnerable Area Method.

환경 적응적 생존 게임의 재미 요소와 사용자 분석 (Analysis of Fun Elements and User Preferences in Environment Adaptive Survival Games)

  • 송두헌
    • 한국정보통신학회논문지
    • /
    • 제23권3호
    • /
    • pp.305-310
    • /
    • 2019
  • 특정한 조건 하에서 생존을 목표로 하는 장르 중에는 공포에서의 탈출과 그에서 얻는 카타르시스를 게임의 근본 재미로 설정하는 공포 생존 게임이 잘 알려져 있으나 설정된 공포가 없거나 중요하지 않고 다만 적대적인 환경적 조건을 다양한 방법으로 타개해 생존이라는 목표를 달성해야 하는 종류의 게임도 있다. 이들을 우리는 환경 적응적 생존게임이라고 분류하기로 한다. 이 논문에서 우리는 특히 다수 사용자들의 협동이 가능한 환경 적응적 생존 게임이 갖는 주요 내적 장치와 생존 요소를 사전 해당 장르 경험 조사를 근거로 스팀 플랫폼 상의 6개의 해당 장르 게임을 대상으로 분석하여 13개의 재미 요소를 추출하였다. 또 해당 게임 관련 카페 등을 통해 주로 30세 이하인 해당 장르 사용자 설문 조사를 통해 플레이 시간 등에서는 남녀간 성차가 거의 나타나지 않았지만 생존 요소 중 여성들이 도구 제작 요소를 더 선호하는 것이 밝혀졌다. 공포 생존 게임은 보통 여성들의 비선호도가 높은 것으로 알려졌지만 공포 요소가 적은 환경 적응형 생존 게임은 여성들의 접근성이 높았다.

Environment Modeling for Autonomous Welding Robotus

  • Kim, Min-Y.;Cho, Hyung-Suk;Kim, Jae-Hoon
    • Transactions on Control, Automation and Systems Engineering
    • /
    • 제3권2호
    • /
    • pp.124-132
    • /
    • 2001
  • Autonomous of welding process in shipyard is ultimately necessary., since welding site is spatially enclosed by floors and girders, and therefore welding operators are exposed to hostile working conditions. To solve this problem, a welding robot that can navigate autonomously within the enclosure needs to be developed. To achieve the welding ra나, the robotic welding systems needs a sensor system for the recognition of the working environments and the weld seam tracking, and a specially designed environment recognition strategy. In this paper, a three-dimensional laser vision system is developed based on the optical triangulation technology in order to provide robots with work environmental map. At the same time a strategy for environment recognition for welding mobile robot is proposed in order to recognize the work environment efficiently. The design of the sensor system, the algorithm for sensing the structured environment, and the recognition strategy and tactics for sensing the work environment are described and dis-cussed in detail.

  • PDF

3개의 모터로 구동되는 극한작업용 이동로보트의 개발 (The development of mobile robot for hostile environment controlled by three motors)

  • 권대갑;차영엽;염도성
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1990년도 한국자동제어학술회의논문집(국내학술편); KOEX, Seoul; 26-27 Oct. 1990
    • /
    • pp.704-709
    • /
    • 1990
  • This study presents the structure and the gate control algorithm of KAMOBOT (KAIST Mobile Robot). The mobile robot has a six-legged, cylindrical configuration, each leg of which is equiped with a wheel at the bottom. The robot can go up and down stairs, go over obstacles, move along curvilinear paths and rotate around it's geometric center. Such maneuverability can be achieved by using only three electric motors.

  • PDF

다기능 원격 임팩트 렌치 개발 (Development of multi-functioned remote impact wrench)

  • 윤지섭;이재설;박현수
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1990년도 한국자동제어학술회의논문집(국내학술편); KOEX, Seoul; 26-27 Oct. 1990
    • /
    • pp.298-301
    • /
    • 1990
  • This paper presents technologies to improve the control of an impact wrench. Impact wrench is a tool which is held by the electro-mechanical manipulator and used to fasten and loosen the bolts for remote maintenance of equipment in hostile environment. Vision system was developed to measure the distance and improve the positioning of the impact wrench. The vision system used two laser beams with a CCTV camera. Also, a torque adjusting method was developed to limit the fastening torque.

  • PDF

무선 Ad-Hoc 망의 프로토콜 설계 및 보안 모델 해석 (Analyses of Security Model and Design of Protocol for Wireless Ad-Hoc Network)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2005년도 춘계종합학술대회
    • /
    • pp.860-863
    • /
    • 2005
  • Ad-Hoc networks are a new generation of networks offering unrestricted mobility without any underlying infrastructure. Primary applications of Ad-Hoc networks are in military, tractical and other security sensitive operations, where the environment is hostile. Hence, security is a critical issue. In this paper, we ahve identified certain misbehaviors caused by mallicious node for reactive routing protocol. We also discuss the intrusion detection and intrusion prevention model to prevent several identified attacks in the networks

  • PDF

ELiSyR: Efficient, Lightweight and Sybil-Resilient File Search in P2P Networks

  • Kim, Hyeong-S.;Jung, Eun-Jin;Yeom, Heon-Y.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제4권6호
    • /
    • pp.1311-1326
    • /
    • 2010
  • Peer-to-peer (P2P) networks consume the most bandwidth in the current Internet and file sharing accounts for the majority of the P2P traffic. Thus it is important for a P2P file sharing application to be efficient in bandwidth consumption. Bandwidth consumption as much as downloaded file sizes is inevitable, but those in file search and bad downloads, e.g. wrong, corrupted, or malicious file downloads, are overheads. In this paper, we target to reduce these overheads even in the presence of high volume of malicious users and their bad files. Sybil attacks are the example of such hostile environment. Sybil attacker creates a large number of identities (Sybil nodes) and unfairly influences the system. When a large portion of the system is subverted, either in terms of the number of users or the number of files shared in the system, the overheads due to the bad downloads rapidly increase. We propose ELiSyR, a file search protocol that can tolerate such a hostile environment. ELiSyR uses social networks for P2P file search and finds benign files in 71% of searches even when more than half of the users are malicious. Furthermore, ELiSyR provides similar success with less bandwidth than other general efforts against Sybil attacks. We compare our algorithm to SybilGuard, SybilLimit and EigenTrust in terms of bandwidth consumption and the likelihood of bad downloads. Our algorithm shows lower bandwidth consumption, similar chances of bad downloads and fairer distribution of computation loads than these general efforts. In return, our algorithm takes more rounds of search than them. However the time required for search is usually much less than the time required for downloads, so the delay in search is justifiable compared to the cost of bad downloads and subsequent re-search and downloads.