• Title/Summary/Keyword: IT기반 로봇

Search Result 957, Processing Time 0.027 seconds

The Brainwave Analysis of Server System Based on Spring Framework (스프링 프레임워크 기반의 뇌파 분석 서버 시스템)

  • Choi, Sung-Ja;Kim, Gui-Jung;Kang, Byeong-Gwon
    • Journal of Digital Convergence
    • /
    • v.17 no.2
    • /
    • pp.155-161
    • /
    • 2019
  • Electroencephalography (EEG), a representative method of identifying temporal and spatial changes in brain activity, is a voluntary electrical activity measurable in the human scalp. Various interface technologies have been provided to control EEG activity, and it is possible to operate a machine such as a wheelchair or a robot through brainwaves. The characteristics of EEG data are collected in various types of channels in real time, and a server system for analyzing them is required to have an independent and lightweight system for the platform. In these days, the Spring platform is used as a large business server as an independent, lightweight server system. In this paper, we propose an EEG analysis system using the Spring server system. Using the proposed system, the reliability of EEG control can be enhanced, and analysis and control interface expansion can be provided in various aspects such as game and medical areas.

LiDAR Static Obstacle Map based Vehicle Dynamic State Estimation Algorithm for Urban Autonomous Driving (도심자율주행을 위한 라이다 정지 장애물 지도 기반 차량 동적 상태 추정 알고리즘)

  • Kim, Jongho;Lee, Hojoon;Yi, Kyongsu
    • Journal of Auto-vehicle Safety Association
    • /
    • v.13 no.4
    • /
    • pp.14-19
    • /
    • 2021
  • This paper presents LiDAR static obstacle map based vehicle dynamic state estimation algorithm for urban autonomous driving. In an autonomous driving, state estimation of host vehicle is important for accurate prediction of ego motion and perceived object. Therefore, in a situation in which noise exists in the control input of the vehicle, state estimation using sensor such as LiDAR and vision is required. However, it is difficult to obtain a measurement for the vehicle state because the recognition sensor of autonomous vehicle perceives including a dynamic object. The proposed algorithm consists of two parts. First, a Bayesian rule-based static obstacle map is constructed using continuous LiDAR point cloud input. Second, vehicle odometry during the time interval is calculated by matching the static obstacle map using Normal Distribution Transformation (NDT) method. And the velocity and yaw rate of vehicle are estimated based on the Extended Kalman Filter (EKF) using vehicle odometry as measurement. The proposed algorithm is implemented in the Linux Robot Operating System (ROS) environment, and is verified with data obtained from actual driving on urban roads. The test results show a more robust and accurate dynamic state estimation result when there is a bias in the chassis IMU sensor.

LiDAR Static Obstacle Map based Position Correction Algorithm for Urban Autonomous Driving (도심 자율주행을 위한 라이다 정지 장애물 지도 기반 위치 보정 알고리즘)

  • Noh, Hanseok;Lee, Hyunsung;Yi, Kyongsu
    • Journal of Auto-vehicle Safety Association
    • /
    • v.14 no.2
    • /
    • pp.39-44
    • /
    • 2022
  • This paper presents LiDAR static obstacle map based vehicle position correction algorithm for urban autonomous driving. Real Time Kinematic (RTK) GPS is commonly used in highway automated vehicle systems. For urban automated vehicle systems, RTK GPS have some trouble in shaded area. Therefore, this paper represents a method to estimate the position of the host vehicle using AVM camera, front camera, LiDAR and low-cost GPS based on Extended Kalman Filter (EKF). Static obstacle map (STOM) is constructed only with static object based on Bayesian rule. To run the algorithm, HD map and Static obstacle reference map (STORM) must be prepared in advance. STORM is constructed by accumulating and voxelizing the static obstacle map (STOM). The algorithm consists of three main process. The first process is to acquire sensor data from low-cost GPS, AVM camera, front camera, and LiDAR. Second, low-cost GPS data is used to define initial point. Third, AVM camera, front camera, LiDAR point cloud matching to HD map and STORM is conducted using Normal Distribution Transformation (NDT) method. Third, position of the host vehicle position is corrected based on the Extended Kalman Filter (EKF).The proposed algorithm is implemented in the Linux Robot Operating System (ROS) environment and showed better performance than only lane-detection algorithm. It is expected to be more robust and accurate than raw lidar point cloud matching algorithm in autonomous driving.

Scenario-based Future Infantry Brigade Information Distribution Capability Analysis (시나리오 기반의 미래 보병여단 정보유통능력 분석 연구)

  • Junseob Kim;Sangjun Park;Yiju You;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.139-145
    • /
    • 2023
  • The ROK Army is promoting cutting-edge, future-oriented military development such as a mobile, intelligent, and hyper-connected Army TIGER system. The future infantry brigade plans to increase mobility with squad-level tactical vehicles to enable combat in multi-domain operations and to deploy various weapon systems such as surveillance and reconnaissance drones. In addition, it will be developed into an intelligent unit that transmits and receives data collected through the weapon system through a hyper-connected network. Accordingly, the future infantry brigade will transmit and receive more data. However, the Army's tactical information communication system has limitations in operating as a tactical communication system for future units, such as low transmission speed and bandwidth and restrictions on communication support. Therefore, in this paper, the information distribution capability of the future infantry brigade is presented through the offensive operation scenario and M&S.

Education for 4th Industrial Revolution (4차산업혁명을 준비하는 교육)

  • Park, Jae-Hwan;Ahn, Jeeyoung
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.5
    • /
    • pp.885-892
    • /
    • 2018
  • A series of revolutionary industrial changes took place from the 18th century of the First Industrial Revolution. The fourth industrial revolution is a new industrial revolution in which intelligence and information unite. Social, cultural, economic and educational systems are expected to emerge within the category of access and experience. In the course of intelligent mechanization, manpower and machinery need to be commandeered. Tools should be left to the machine and humans should look at essential issues. In the 4th Industrial Revolution, the paradigm of education should fundamentally change. Instead of routine technologies based on memorization, one should learn how to access and utilize. It needs to focus on areas of debate, cooperation, communication, sensibility, and artistry that robots and artificial intelligence can not afford. The fourth industrial revolution is the fusion of human beings and technology, the humanities and the technology.

Technology Trend Analysis of the 4th Industrial Revolution Using AHP (AHP 기법을 이용한 4차 산업혁명 기술 트렌드 분석)

  • Nam, Soo-Tai;Shin, Seong-Yoon;Jin, Chan-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.330-331
    • /
    • 2021
  • Newly, the fourth industrial revolution is a way of describing the blurring of boundaries between the physical, digital, and biological worlds. It's a fusion of advances in AI (artificial intelligence), robotics, the IoT (internet of things), 3d printing, genetic engineering, quantum computing, and other technologies. At the world economic forum in Davos, switzerland, in january 2016, chairman professor (klaus schwab) proposed the fourth industrial revolution for the first time. In order to apply the AHP (analytic hierarchy process) analysis method, the first stage factors were designed as Digital Technology, Physics Technology and Biological Technology. In addition, the second stage factors were organized into 8 detailed services presented in the conceptual model. Thus, we present the theoretical and practical implications of these results.

  • PDF

Implementation of Smart Automatic Warehouse to Improve Space Utilization

  • Hwa-La Hur;Yeon-Ho Kuk;Myeong-Chul Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.10
    • /
    • pp.171-178
    • /
    • 2023
  • In this paper, we propose a smart automated warehouse to maximize space utilization. Previous elevator-type automatic warehouses were designed with a maximum payload of 100kg on trays, which has the problem of extremely limiting the number of pallets that can be loaded within the space. In this paper, we design a smart warehouse that can maximize space utilization with a maximum vertical stiffness of 300kg. As a result of the performance evaluation of the implemented warehouse, the maximum payload was 500.6kg, which satisfied the original design and requirements, the lifting speed was 0.5m/s, the operating noise of the device was 67.1dB, the receiving and forwarding time of the pallet was 36.92sec, the deflection amount was 4mm, and excellent performance was confirmed in all evaluation items. In addition, the PLC control method, which designs the control UI and control panel separately, was integrated into the PC system to improve interoperability and maintainability with various process management systems. In the future, we plan to develop it into a fully automatic smart warehouse by linking IoT sensor-based logistics robots.

A Study of Reinforcement Learning-based Cyber Attack Prediction using Network Attack Simulator (NASim) (네트워크 공격 시뮬레이터를 이용한 강화학습 기반 사이버 공격 예측 연구)

  • Bum-Sok Kim;Jung-Hyun Kim;Min-Suk Kim
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.3
    • /
    • pp.112-118
    • /
    • 2023
  • As technology advances, the need for enhanced preparedness against cyber-attacks becomes an increasingly critical problem. Therefore, it is imperative to consider various circumstances and to prepare for cyber-attack strategic technology. This paper proposes a method to solve network security problems by applying reinforcement learning to cyber-security. In general, traditional static cyber-security methods have difficulty effectively responding to modern dynamic attack patterns. To address this, we implement cyber-attack scenarios such as 'Tiny Alpha' and 'Small Alpha' and evaluate the performance of various reinforcement learning methods using Network Attack Simulator, which is a cyber-attack simulation environment based on the gymnasium (formerly Open AI gym) interface. In addition, we experimented with different RL algorithms such as value-based methods (Q-Learning, Deep-Q-Network, and Double Deep-Q-Network) and policy-based methods (Actor-Critic). As a result, we observed that value-based methods with discrete action spaces consistently outperformed policy-based methods with continuous action spaces, demonstrating a performance difference ranging from a minimum of 20.9% to a maximum of 53.2%. This result shows that the scheme not only suggests opportunities for enhancing cybersecurity strategies, but also indicates potential applications in cyber-security education and system validation across a large number of domains such as military, government, and corporate sectors.

  • PDF

Research on Object Detection Library Utilizing Spatial Mapping Function Between Stream Data In 3D Data-Based Area (3D 데이터 기반 영역의 stream data간 공간 mapping 기능 활용 객체 검출 라이브러리에 대한 연구)

  • Gyeong-Hyu Seok;So-Haeng Lee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.3
    • /
    • pp.551-562
    • /
    • 2024
  • This study relates to a method and device for extracting and tracking moving objects. In particular, objects are extracted using different images between adjacent images, and the location information of the extracted object is continuously transmitted to provide accurate location information of at least one moving object. It relates to a method and device for extracting and tracking moving objects based on tracking moving objects. People tracking, which started as an expression of the interaction between people and computers, is used in many application fields such as robot learning, object counting, and surveillance systems. In particular, in the field of security systems, cameras are used to recognize and track people to automatically detect illegal activities. The importance of developing a surveillance system, that can detect, is increasing day by day.

A study on the acoustic performance of an absorptive silencer applying the optimal arrangement of absorbing materials (흡음재 최적 배치를 적용한 흡음형 소음기의 음향성능 연구)

  • Dongheon Kang;Haesang Yang;Woojae Seong
    • The Journal of the Acoustical Society of Korea
    • /
    • v.43 no.3
    • /
    • pp.261-269
    • /
    • 2024
  • In this paper, the acoustic performance of an absorptive silencer was enhanced by optimizing an arrangement of multi-layered absorbing materials. The acoustic performance of the silencer was evaluated through transmission loss, and finite element method-based numerical analysis program was employed to calculate the transmission loss. Polyurethane, a porous elastic material frequently used in absorptive silencers, was employed as the absorbing material. The Biot-Allard model was applied, assuming that air is filled inside the polyurethane. By setting the frequency range of interest up to the 2 kHz and the acoustic performance affecting properties of the absorbing materials were investigated when it was composed as a single layer. And the acoustic performance of the silencers with the single and multi-layered absorbing materials was compared with each other based on polyurethane material properties. Subsequently, the arrangement of the absorbing materials was optimized by applying the Nelder-Mead method. The results demonstrated that the average transmission loss improved compared to the single-layered absorptive silencer.