• Title/Summary/Keyword: Machine Security System

Search Result 402, Processing Time 0.029 seconds

Development of Coolant/Waste-oil Separating and Cooling System with Chip Treatment (칩 처리가 포함된 절삭유/폐유 분리 및 냉각 시스템 개발)

  • Kim, Joong-Seon;Lee, Dong-Seop;Wang, Duck-Hyun
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.16 no.3
    • /
    • pp.16-23
    • /
    • 2017
  • For most machine tools, it is necessary to remove chips and coolant oil because it they will continue to be created during the manufacture of workpieces. Existing products that are in use are installed and used as they reflect depending on the characteristics of each device separately. This study proposes a method to remove the security chip as well as developing an integrated system capable of reducing coolant damage. The Leverage AutoCAD and CATIA program was used for 2D and 3D design, shapes were identified by utilizing the KeyShot program, and the load and displacement analysis of the development apparatus was performed utilizing the ANSYS program. After the prototype underwent sufficient design review, the mixed oil separation device had a complete sensor control program using the LabVIEW program. The chip design process for transferring experiments and experiments on the mixed oil cooling device were developed for performance tests of the product. The final product resulted in an increase in space utilization during commercialization, reduced installation costs, and caused social effects such as pulmonary flow reduction, which, through the economic costs, reduces pollution, resulting in various benefits to the industry, such as deceased errors in the workplace decreases.

Smart Home Service System Considering Indoor and Outdoor Environment and User Behavior (실내외 환경과 사용자의 행동을 고려한 스마트 홈 서비스 시스템)

  • Kim, Jae-Jung;Kim, Chang-Bok
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.5
    • /
    • pp.473-480
    • /
    • 2019
  • The smart home is a technology that can monitor and control by connecting everything to a communication network in various fields such as home appliances, energy consumers, and security devices. The Smart home is developing not only automatic control but also learning situation and user's taste and providing the result accordingly. This paper proposes a model that can provide a comfortable indoor environment control service for the user's characteristics by detecting the user's behavior as well as the automatic remote control service. The whole system consists of ESP 8266 with sensor and Wi-Fi, Firebase as a real-time database, and a smartphone application. This model is divided into functions such as learning mode when the home appliance is operated, learning control through learning results, and automatic ventilation using indoor and outdoor sensor values. The study used moving averages for temperature and humidity in the control of home appliances such as air conditioners, humidifiers and air purifiers. This system can provide higher quality service by analyzing and predicting user's characteristics through various machine learning and deep learning.

A Study on the Disaster Prevention Technology of the Switchboard with Upper and Lower Bending Type Seismic Pads (상하굴절형 내진패드를 설치한 수배전반 방재기술에 관한 연구)

  • Lee, Taeshik;Seok, Gumcheul;Lee, Jaewon;Kim, Taejin;Kim, Jaekwon;Cho, Woncheol
    • Journal of Korean Society of Disaster and Security
    • /
    • v.10 no.1
    • /
    • pp.85-90
    • /
    • 2017
  • The purpose of this study is to investigate the effect of vertical and horizontal refraction on the lower part of the power supply and control system of various facilities and machinery that use electricity, so that the power distribution system, which is an important electric facility installed in buildings and public facilities, Type earthquake resistant pads to protect the substructure and prevent short-circuiting on the upper part of the system. The GR-63-CORE (Scale 8.3 class) It is earthquake disaster prevention and disaster prevention technology that satisfies seismic performance. As a research result, it is possible to protect the electricity and communication infrastructure, which can contribute to shortening the time for recovering the electric facilities to the normal state in case of an earthquake, and preventing the fire caused by the destruction of the electricity supply facility in case of an earthquake. As a result, it is possible to minimize the spread of fire that occurs when a large-scale earthquake occurs and to minimize the damage of people and damage to property, and it can contribute to the securing of electric infrastructure that enables citizens to quickly recover to daily life even after suffering a major earthquake. In addition, the technology can be applied to ensure the seismic resistance of the equipment in the communication and computer room, and it can be applied to various fields where the facility function can be stopped due to the shaking of the earthquake base.

Performance Analysis of Docker Container Migration Using Secure Copy in Mobile Edge Computing (모바일 엣지 컴퓨팅 환경에서 안전 복사를 활용한 도커 컨테이너 마이그레이션 성능 분석)

  • Byeon, Wonjun;Lim, Han-wool;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.901-909
    • /
    • 2021
  • Since mobile devices have limited computational resources, it tends to use the cloud to compute or store data. As real-time becomes more important due to 5G, many studies have been conducted on edge clouds that computes at locations closer to users than central clouds. The farther the user's physical distance from the edge cloud connected to base station is, the slower the network transmits. So applications should be migrated and re-run to nearby edge cloud for smooth service use. We run applications in docker containers, which is independent of the host operating system and has a relatively light images size compared to the virtual machine. Existing migration studies have been experimented by using network simulators. It uses fixed values, so it is different from the results in the real-world environment. In addition, the method of migrating images through shared storage was used, which poses a risk of packet content exposure. In this paper, Containers are migrated with Secure CoPy(SCP) method, a data encryption transmission, by establishing an edge computing environment in a real-world environment. It compares migration time with Network File System, one of the shared storage methods, and analyzes network packets to verify safety.

Implementation of reliable dynamic honeypot file creation system for ransomware attack detection (랜섬웨어 공격탐지를 위한 신뢰성 있는 동적 허니팟 파일 생성 시스템 구현)

  • Kyoung Wan Kug;Yeon Seung Ryu;Sam Beom Shin
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.27-36
    • /
    • 2023
  • In recent years, ransomware attacks have become more organized and specialized, with the sophistication of attacks targeting specific individuals or organizations using tactics such as social engineering, spear phishing, and even machine learning, some operating as business models. In order to effectively respond to this, various researches and solutions are being developed and operated to detect and prevent attacks before they cause serious damage. In particular, honeypots can be used to minimize the risk of attack on IT systems and networks, as well as act as an early warning and advanced security monitoring tool, but in cases where ransomware does not have priority access to the decoy file, or bypasses it completely. has a disadvantage that effective ransomware response is limited. In this paper, this honeypot is optimized for the user environment to create a reliable real-time dynamic honeypot file, minimizing the possibility of an attacker bypassing the honeypot, and increasing the detection rate by preventing the attacker from recognizing that it is a honeypot file. To this end, four models, including a basic data collection model for dynamic honeypot generation, were designed (basic data collection model / user-defined model / sample statistical model / experience accumulation model), and their validity was verified.

A Study on Efficient AI Model Drift Detection Methods for MLOps (MLOps를 위한 효율적인 AI 모델 드리프트 탐지방안 연구)

  • Ye-eun Lee;Tae-jin Lee
    • Journal of Internet Computing and Services
    • /
    • v.24 no.5
    • /
    • pp.17-27
    • /
    • 2023
  • Today, as AI (Artificial Intelligence) technology develops and its practicality increases, it is widely used in various application fields in real life. At this time, the AI model is basically learned based on various statistical properties of the learning data and then distributed to the system, but unexpected changes in the data in a rapidly changing data situation cause a decrease in the model's performance. In particular, as it becomes important to find drift signals of deployed models in order to respond to new and unknown attacks that are constantly created in the security field, the need for lifecycle management of the entire model is gradually emerging. In general, it can be detected through performance changes in the model's accuracy and error rate (loss), but there are limitations in the usage environment in that an actual label for the model prediction result is required, and the detection of the point where the actual drift occurs is uncertain. there is. This is because the model's error rate is greatly influenced by various external environmental factors, model selection and parameter settings, and new input data, so it is necessary to precisely determine when actual drift in the data occurs based only on the corresponding value. There are limits to this. Therefore, this paper proposes a method to detect when actual drift occurs through an Anomaly analysis technique based on XAI (eXplainable Artificial Intelligence). As a result of testing a classification model that detects DGA (Domain Generation Algorithm), anomaly scores were extracted through the SHAP(Shapley Additive exPlanations) Value of the data after distribution, and as a result, it was confirmed that efficient drift point detection was possible.

Diagnosis of Induction Motor Faults Using Inverter Input Current Analysis (인버터 입력전류 분석을 이용한 유도전동기 고장진단)

  • Han, Jungho;Song, Joong-Ho;Choi, Kyu-Hyoung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.7
    • /
    • pp.492-498
    • /
    • 2016
  • It is well known that since abrupt faults in induction motors tend to lead to subsequent faults and deterioration of the drive apparatus, motor faults may lead to several operating restrictions, such as security problems and economic loss. A lot of research has been done in the area of diagnosis to detect machine faults and to prevent catastrophic hazards in the motor drive system. This paper presents a new method of motor current signature analysis in which the DC-link current of the inverter-driven induction motor system, where a single current sensor is employed instead of three AC current sensors, is measured, and fast Fourier transform analysis is performed. This proposed method makes it possible to easily discern and clearly separate the motor fault current signature from the normal operation current flowing through the stator and rotor windings.

A Novel Network Anomaly Detection Method based on Data Balancing and Recursive Feature Addition

  • Liu, Xinqian;Ren, Jiadong;He, Haitao;Wang, Qian;Sun, Shengting
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.7
    • /
    • pp.3093-3115
    • /
    • 2020
  • Network anomaly detection system plays an essential role in detecting network anomaly and ensuring network security. Anomaly detection system based machine learning has become an increasingly popular solution. However, due to the unbalance and high-dimension characteristics of network traffic, the existing methods unable to achieve the excellent performance of high accuracy and low false alarm rate. To address this problem, a new network anomaly detection method based on data balancing and recursive feature addition is proposed. Firstly, data balancing algorithm based on improved KNN outlier detection is designed to select part respective data on each category. Combination optimization about parameters of improved KNN outlier detection is implemented by genetic algorithm. Next, recursive feature addition algorithm based on correlation analysis is proposed to select effective features, in which a cross contingency test is utilized to analyze correlation and obtain a features subset with a strong correlation. Then, random forests model is as the classification model to detection anomaly. Finally, the proposed algorithm is evaluated on benchmark datasets KDD Cup 1999 and UNSW_NB15. The result illustrates the proposed strategies enhance accuracy and recall, and decrease the false alarm rate. Compared with other algorithms, this algorithm still achieves significant effects, especially recall in the small category.

Algorithm Design and Implementation for Safe Left Turn at an Intersection Based on Vehicle-to-Vehicle Communications (교차로에서의 안전 좌회전을 위한 차량간 통신 기반 알고리즘 설계 및 구현)

  • Seo, Hyun-Soo;Kim, Hyo-Un;Noh, Dong-Gyu;Lee, Sang-Sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.2
    • /
    • pp.165-171
    • /
    • 2013
  • WAVE(Wireless Access in Vehicular Environments) is a representative V2V communication protocol and its standards of MAC and PHY parts except for security were published. In order to control traffic flow and ensure driver's safety using V2V communication, various projects are conducting. In particular, safety application has been researched. Therefore, in this paper, we designed the safety application algorithm, which informs a driver of the dangerous status when driver tries to turn left in an intersection and we also implemented the algorithm. Proposed algorithm configures a model for a host vehicle and a vehicle coming in opposite lane and in case that there is collision hazard it provides warning message to driver by using HMI. In order to evaluate the proposed algorithm's performance, we configured the test bed using test vehicles and we tested the algorithm on proving ground with the composed test scenarios. As test results, our system showed excellent performance. If the infrastructures for V2I communications are constructed, we will optimize our system more precisely and stably.

Manned-Unmanned Teaming Air-to-Air Combat Tactic Development Using Longshot Unmanned Aerial Vehicle (롱샷 무인기를 활용한 유무인 협업 공대공 전술 개발)

  • Yoo, Seunghoon;Park, Myunghwan;Hwang, Seongin;Seol, Hyeonju
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.3
    • /
    • pp.64-72
    • /
    • 2021
  • Manned-unmanned teaming can be a very promising air-to-air combat tactic since it can maximize the advantage of combining human insight with the robustness of the machine. The rapid advances in artificial intelligence and autonomous control technology will speed up the development of manned-unmanned teaming air-to-air combat system. In this paper, we introduce a manned-unmanned teaming air-to-air combat tactic which is composed of a manned aircraft and an UAV. In this tactic, a manned aircraft equipped with radar is functioning both as a sensor to detect the hostile aircraft and as a controller to direct the UAV to engage the hostile aircraft. The UAV equipped with missiles is functioning as an actor to engage the hostile aircraft. We also developed a combat scenario of executing this tactic where the manned-unmanned teaming is engaging a hostile aircraft. The hostile aircraft is equipped with both missiles and radar. To demonstrate the efficiency of the tactic, we run the simulation of the scenario of the tactic. Using the simulation, we found the optimal formation and maneuver for the manned-unmanned teaming where the manned-unmanned teaming can survive while the hostile aircraft is shot-downed. The result of this study can provide an insight to how manned aircraft can collaborate with UAV to carry out air-to-air combat missions.