• Title/Summary/Keyword: Hostile environment

Search Result 106, Processing Time 0.022 seconds

Remote handling teleoperators in hostile environment

  • Lee, J.S.;Yoon, J.S.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1988.10b
    • /
    • pp.958-963
    • /
    • 1988
  • Teleoperator as a special robotic system for remote handling in hostile environment is reviewed in this article. Inherent features and prospective applications pertinent to teleoperator are indentified with particular concern for nuclear applications as major area of teleoperator technology exercise. Korean status as well as major world programs of teleoperator R&D are also reviewed with perspectives.

  • PDF

A Study on the Diving Standards for Underwater Work in Hostile Environment (수중 작업에 있어서 극한 환경의 잠수 활동 기준 검토)

  • Kang, Sin-Young
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.34 no.5
    • /
    • pp.735-742
    • /
    • 2010
  • This paper reviewed the diving standards for underwater work in hostile environment and analyzed applied Navy diving technique, diving equipments and procedure for rescue operation of Navy ship Cheonan's missing crew occurred near Bak Ryung Do in March 2010. The operation was done beyond the international standards and safety practice, and by considering the nature of the mission, urgency and effectiveness as well as the detailed facts such as duration and depth of the dive, type of work to be performed, environmental conditions, time constraints of early rescue operation, it is analyzed that using air scuba diving system was adequate.

TriSec: A Secure Data Framework for Wireless Sensor Networks Using Authenticated Encryption

  • Kumar, Pardeep;Cho, Sang-Il;Lee, Dea-Seok;Lee, Young-Dong;Lee, Hoon-Jae
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.2
    • /
    • pp.129-135
    • /
    • 2010
  • Wireless sensor networks (WSNs) are an emerging technology and offers economically viable monitoring solution to many challenging applications. However, deploying new technology in hostile environment, without considering security in mind has often proved to be unreasonably unsecured. Apparently, security techniques face many critical challenges in WSNs like data security and secrecy due to its hostile deployment nature. In order to resolve security in WSNs, we propose a novel and efficient secure framework called TriSec: a secure data framework for wireless sensor networks to attain high level of security. TriSec provides data confidentiality, authentication and data integrity to sensor networks. TriSec supports node-to-node encryption using PingPong-128 stream cipher based-privacy. A new PingPong-MAC (PP-MAC) is incorporated with PingPong stream cipher to make TriSec framework more secure. PingPong-128 is fast keystream generation and it is very suitable for sensor network environment. We have implemented the proposed scheme on wireless sensor platform and our result shows their feasibility.

Simplified Vulnerability Assessment Procedure for the Warship Based on the Vulnerable Area Approach (취약면적 기반의 함정 취약성 간이 평가 방법에 관한 연구)

  • Kim, Kwang-Sik;Lee, Jang-Hyun;Hwang, Se-Yun
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.48 no.5
    • /
    • pp.404-413
    • /
    • 2011
  • It is important to assess and improve the warship survivability for the weapon threats which have a critical effect on warship. The survivability of the warship is defined as the capability of a warship to avoid or withstand a man-made hostile environment. The survivability of the warship consists of three categories (Susceptibility, Vulnerability and Recoverability). Firstly, the susceptibility is defined as the inability of a warship to avoid radars, guns, missiles and etc. Secondly, the vulnerability is defined as the inability of a warship to withstand the man-made hostile environment. Finally, the recoverability is defined as the ability of a warship to recover the damaged components and systems. Among them, this paper has described the vulnerability assessment for the hypothetical system which is composed of critical components. Also, the procedure which is suggested to calculate the vulnerable probability of the damaged warship is based on the Vulnerable Area Method.

Analysis of Fun Elements and User Preferences in Environment Adaptive Survival Games (환경 적응적 생존 게임의 재미 요소와 사용자 분석)

  • Song, Doo Heon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.3
    • /
    • pp.305-310
    • /
    • 2019
  • Survival horror games aim to seek cathartic psychological escapism from the framed fear or hostile environment. However, if the goal of the game playing is only "survival" against hostile environment, the motivation of such environment adaptive games may not be based on the framed fear. We may call such games as "environment adaptive survival games". In this paper, we analyze the contents of six such survival games that have large user groups in Steam platform based on the pilot survey. We extract 13 almost common fun elements that induce the fun of such games. An online user survey was conducted through multiple survival game cafe to investigate who play such games. There was no gender differences in playing time but females prefer constructing tools as a fun element and play puzzle and simulation games more than males. We found that survival games could be welcomed by female users under 30 years old if 'horror' element was minimized.

Environment Modeling for Autonomous Welding Robotus

  • Kim, Min-Y.;Cho, Hyung-Suk;Kim, Jae-Hoon
    • Transactions on Control, Automation and Systems Engineering
    • /
    • v.3 no.2
    • /
    • pp.124-132
    • /
    • 2001
  • Autonomous of welding process in shipyard is ultimately necessary., since welding site is spatially enclosed by floors and girders, and therefore welding operators are exposed to hostile working conditions. To solve this problem, a welding robot that can navigate autonomously within the enclosure needs to be developed. To achieve the welding ra나, the robotic welding systems needs a sensor system for the recognition of the working environments and the weld seam tracking, and a specially designed environment recognition strategy. In this paper, a three-dimensional laser vision system is developed based on the optical triangulation technology in order to provide robots with work environmental map. At the same time a strategy for environment recognition for welding mobile robot is proposed in order to recognize the work environment efficiently. The design of the sensor system, the algorithm for sensing the structured environment, and the recognition strategy and tactics for sensing the work environment are described and dis-cussed in detail.

  • PDF

The development of mobile robot for hostile environment controlled by three motors (3개의 모터로 구동되는 극한작업용 이동로보트의 개발)

  • 권대갑;차영엽;염도성
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1990.10a
    • /
    • pp.704-709
    • /
    • 1990
  • This study presents the structure and the gate control algorithm of KAMOBOT (KAIST Mobile Robot). The mobile robot has a six-legged, cylindrical configuration, each leg of which is equiped with a wheel at the bottom. The robot can go up and down stairs, go over obstacles, move along curvilinear paths and rotate around it's geometric center. Such maneuverability can be achieved by using only three electric motors.

  • PDF

Development of multi-functioned remote impact wrench (다기능 원격 임팩트 렌치 개발)

  • 윤지섭;이재설;박현수
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1990.10a
    • /
    • pp.298-301
    • /
    • 1990
  • This paper presents technologies to improve the control of an impact wrench. Impact wrench is a tool which is held by the electro-mechanical manipulator and used to fasten and loosen the bolts for remote maintenance of equipment in hostile environment. Vision system was developed to measure the distance and improve the positioning of the impact wrench. The vision system used two laser beams with a CCTV camera. Also, a torque adjusting method was developed to limit the fastening torque.

  • PDF

Analyses of Security Model and Design of Protocol for Wireless Ad-Hoc Network (무선 Ad-Hoc 망의 프로토콜 설계 및 보안 모델 해석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.860-863
    • /
    • 2005
  • Ad-Hoc networks are a new generation of networks offering unrestricted mobility without any underlying infrastructure. Primary applications of Ad-Hoc networks are in military, tractical and other security sensitive operations, where the environment is hostile. Hence, security is a critical issue. In this paper, we ahve identified certain misbehaviors caused by mallicious node for reactive routing protocol. We also discuss the intrusion detection and intrusion prevention model to prevent several identified attacks in the networks

  • PDF

ELiSyR: Efficient, Lightweight and Sybil-Resilient File Search in P2P Networks

  • Kim, Hyeong-S.;Jung, Eun-Jin;Yeom, Heon-Y.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.6
    • /
    • pp.1311-1326
    • /
    • 2010
  • Peer-to-peer (P2P) networks consume the most bandwidth in the current Internet and file sharing accounts for the majority of the P2P traffic. Thus it is important for a P2P file sharing application to be efficient in bandwidth consumption. Bandwidth consumption as much as downloaded file sizes is inevitable, but those in file search and bad downloads, e.g. wrong, corrupted, or malicious file downloads, are overheads. In this paper, we target to reduce these overheads even in the presence of high volume of malicious users and their bad files. Sybil attacks are the example of such hostile environment. Sybil attacker creates a large number of identities (Sybil nodes) and unfairly influences the system. When a large portion of the system is subverted, either in terms of the number of users or the number of files shared in the system, the overheads due to the bad downloads rapidly increase. We propose ELiSyR, a file search protocol that can tolerate such a hostile environment. ELiSyR uses social networks for P2P file search and finds benign files in 71% of searches even when more than half of the users are malicious. Furthermore, ELiSyR provides similar success with less bandwidth than other general efforts against Sybil attacks. We compare our algorithm to SybilGuard, SybilLimit and EigenTrust in terms of bandwidth consumption and the likelihood of bad downloads. Our algorithm shows lower bandwidth consumption, similar chances of bad downloads and fairer distribution of computation loads than these general efforts. In return, our algorithm takes more rounds of search than them. However the time required for search is usually much less than the time required for downloads, so the delay in search is justifiable compared to the cost of bad downloads and subsequent re-search and downloads.