• Title/Summary/Keyword: Safety-Related Controller

Search Result 46, Processing Time 0.023 seconds

The usage of convergency technology for ROGA algorithm application on step walking of biped robot (이족 로봇의 계단 보행에서 Real-Coded Genetic Algorithm 의 융합 기술의 사용)

  • Lee, Jeong-Ick
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.5
    • /
    • pp.175-182
    • /
    • 2020
  • The calculation of the optimal trajectory of the stepped top-down robot was made using a genetic algorithm and a computational torque controller. First, the total energy efficiency was minimized using the Red-Cold Generic Algorithm (RCGA) consisting of reproductive, cross, and mutation. The reproducibility condition related to the position assembly of the start and end of the stride and the joints, angles, and angular velocities are linear constraints. Next, the unequal constraint accompanies the condition for preventing the collision of the swing leg at the corner with the outer surface of the stairs, the condition of the knee joint for preventing kinematic peculiarity, and the condition of no moment in safety in the traveling direction. Finally, the angular trajectory of each joint is defined by fourth-order polynomial whose coefficient is to approximate chromosomes. This is to approximate walking. In this study, the energy efficiency of the optimal trajectory was analyzed by computer simulation through a biped robot with seven degrees of freedom composed of seven links.

Development of Unmanned Aircraft in the Fourth Industrial Revolution (4차 산업혁명시대 우리나라 드론의 발전 방향)

  • Lee, Young Uk
    • Convergence Security Journal
    • /
    • v.18 no.5_2
    • /
    • pp.3-10
    • /
    • 2018
  • The drone is an unmanned aircraft that can be steered and controlled using radio waves on the ground, and the pilot moves unmanned without boarding. The history of the unmanned airplane began with military use, and the first unmanned aerial flight was the first successful flight of the 'Sperry Aerial Torpedo' drones built in the United States in 1917 with a bomb. With the development of unmanned aerial technology, the use of military drones has expanded to a wider field. Recently, the use of drones has been utilized in various fields such as agriculture, industry, logistics, broadcasting, and safety, and the scale of the market is also expanding. Although the drones are becoming indispensable to penetrate our lives, they can be used for bad purposes depending on the intended use of the user, but the risk factors are overlooked. Therefore, technical defects related to drones and accidents caused by operator's mistakes can not be completely prevented. However, privacy infringement, security leakage, and terrorism, which may be caused by illegal use of drones, It will not be inhibited and will accelerate.

  • PDF

FRChain: A Blockchain-based Flow-Rules-oriented Data Forwarding Security Scheme in SDN

  • Lian, Weichen;Li, Zhaobin;Guo, Chao;Wei, Zhanzhen;Peng, Xingyuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.264-284
    • /
    • 2021
  • As the next-generation network architecture, software-defined networking (SDN) has great potential. But how to forward data packets safely is a big challenge today. In SDN, packets are transferred according to flow rules which are made and delivered by the controller. Once flow rules are modified, the packets might be redirected or dropped. According to related research, we believe that the key to forward data flows safely is keeping the consistency of flow rules. However, existing solutions place little emphasis on the safety of flow rules. After summarizing the shortcomings of the existing solutions, we propose FRChain to ensure the security of SDN data forwarding. FRChain is a novel scheme that uses blockchain to secure flow rules in SDN and to detect compromised nodes in the network when the proportion of malicious nodes is less than one-third. The scheme places the flow strategies into blockchain in form of transactions. Once an unmatched flow rule is detected, the system will issue the problem by initiating a vote and possible attacks will be deduced based on the results. To simulate the scheme, we utilize BigchainDB, which has good performance in data processing, to handle transactions. The experimental results show that the scheme is feasible, and the additional overhead for network performance and system performance is less than similar solutions. Overall, FRChain can detect suspicious behaviors and deduce malicious nodes to keep the consistency of flow rules in SDN.

Periodic-and-on-Event Message-Aware Automotive Intrusion Detection System (Periodic-and-on-Event 메시지 분석이 가능한 차량용 침입탐지 기술)

  • Lee, Seyoung;Choi, Wonsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.373-385
    • /
    • 2021
  • To provide convenience and safety of drivers, the recent vehicles are being equipped with a number of electronic control units (ECUs). Multiple ECUs construct a network inside a vehicle to share information related to the vehicle's status; in addition, the CAN protocol is normally applied. As the modern vehicles provide highly convenient and safe services, it provides many types of attack surfaces; as a result, it makes them vulnerable to cyber attacks. The automotive IDS (Intrusion Detection System) is one of the promising techniques for securing vehicles. However, the existing methods for automotive IDS are able to analyze only periodic messages. If someone attacks on non-periodic messages, the existing methods are not able to properly detect the intrusion. In this paper, we present a method to detect intrusions including an attack using non-periodic messages. Moreover, we evaluate our method on the real vehicles, where we show that our method has 0% of FPR and 0% of FNR under our attack model.

Sliding Mode Control with Super-Twisting Algorithm for Surge Oscillation of Mooring Vessel System (슈퍼트위스팅 슬라이딩모드를 이용한 선박계류시스템의 동적제어)

  • Lee, Sang-Do;Lee, Bo-Kyeong;You, Sam-Sang
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.24 no.7
    • /
    • pp.953-959
    • /
    • 2018
  • This paper deals with controlling surge oscillations of a mooring vessel system under large external disturbances such as wind, waves and currents. A control synthesis based on Sliding Mode Control (SMC) with a Super-Twisting Algorithm (STA) has been applied to suppress nonlinear surge oscillations of a two-point mooring system. Despite the advantages of robustness against parameter uncertainties and disturbances for SMC, chattering is the main drawback for implementing sliding mode controllers. First-order SMC shows convergence within the desired level of accuracy, in which chattering is the main obstacle related to the destructive phenomenon. Alternatively, STA completely eliminates chattering phenomenon with high accuracy even for large disturbances. SMC based on STA is an effective tool for the motion control of a nonlinear mooring system because it avoids the chattering problems of a first-order sliding mode controller. In addition, the error trajectories of controlled mooring systems implemented by means of STA form in the bounded region. Finally, the control gain effect of STA can be observed in sliding surface and position trajectory errors.

The Meaning and Tasks of Guidelines for Utilization of Healthcare Data (보건의료 데이터 활용 가이드라인의 의미와 과제)

  • Shin, Tae-Seop
    • The Korean Society of Law and Medicine
    • /
    • v.22 no.3
    • /
    • pp.31-55
    • /
    • 2021
  • The Personal Information Protection Act, one of the revised 3 Data Laws, established a special cases concerning pseudonymous data. As a result, a personal information controller may process pseudonymized information without the consent of data subjects for statistical purposes, scientific research purposes, and archiving purposes in the public interest, etc. In addition, as a follow-up to the revised Personal Information Protection Act, a 'Guidelines for Utilization of Healthcare Data' was prepared, which deals with the pseudonymization in the medical sector. The guidelines are meaningful in that they provide practical criteria for accomplices by defining specific interpretations and examples that take into account the characteristics of healthcare data. However, the guidelines need to clarify the purpose of using pseudonymous data and strengthen the fairness of the composition of the data deliberation committee. The guidelines also require establishing a healthcare data compensation framework and strengthening the protection of rights for vulnerable subjects. In addition, the guidelines need to be adjusted for inconsistency with the Bioethics and Safety Act and the Medical Service Act. It is expected that this study will contribute to the creation of a safe environment for the utilization of healthcare data as well as the improvement of related laws and systems.