• Title/Summary/Keyword: Security robot

Search Result 120, Processing Time 0.023 seconds

Scaling Attack Method for Misalignment Error of Camera-LiDAR Calibration Model (카메라-라이다 융합 모델의 오류 유발을 위한 스케일링 공격 방법)

  • Yi-ji Im;Dae-seon Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.1099-1110
    • /
    • 2023
  • The recognition system of autonomous driving and robot navigation performs vision work such as object recognition, tracking, and lane detection after multi-sensor fusion to improve performance. Currently, research on a deep learning model based on the fusion of a camera and a lidar sensor is being actively conducted. However, deep learning models are vulnerable to adversarial attacks through modulation of input data. Attacks on the existing multi-sensor-based autonomous driving recognition system are focused on inducing obstacle detection by lowering the confidence score of the object recognition model.However, there is a limitation that an attack is possible only in the target model. In the case of attacks on the sensor fusion stage, errors in vision work after fusion can be cascaded, and this risk needs to be considered. In addition, an attack on LIDAR's point cloud data, which is difficult to judge visually, makes it difficult to determine whether it is an attack. In this study, image scaling-based camera-lidar We propose an attack method that reduces the accuracy of LCCNet, a fusion model (camera-LiDAR calibration model). The proposed method is to perform a scaling attack on the point of the input lidar. As a result of conducting an attack performance experiment by size with a scaling algorithm, an average of more than 77% of fusion errors were caused.

Analysis of Keyword Trend for ICT Convergence Services (ICT 융합 서비스의 키워드 트렌드 분석)

  • Jang, HeeSeon
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.35-41
    • /
    • 2014
  • With ubiquitous computing and network, the concern of government, business and academy for IT or ICT convergence has been increased. In this paper, through the analysis of keyword trend for ICT convergence services from 2000's mid, the efficient policy is proposed by estimating the understanding and concern of common people. In addition to, the concept and development step of convergence are analyzed, and the keyword analysis for the ICT convergence services defined in TTA is performed. The services are classified into smart home work transportation, Health ICT, RFID USN, M2M IoT, e-Navigation, intelligent robot, and the keywords for each service are analyzed. The analytic results indicate that the keyword trend varies in the time, and highly indexing keywords and new trend are defined. To provide the efficient ICT services, the new ICT convergence services needed for customer will be proposed with new IT technology development, IT standard, law management, and policy provisioining.

Design and Implementation of Human-Detecting Radar System for Indoor Security Applications (실내 보안 응용을 위한 사람 감지 레이다 시스템의 설계 및 구현)

  • Jang, Daeho;Kim, Hyeon;Jung, Yunho
    • Journal of IKEEE
    • /
    • v.24 no.3
    • /
    • pp.783-790
    • /
    • 2020
  • In this paper, the human detecting radar system for indoor security applications is proposed, and its FPGA-based implementation results are presented. In order to minimize the complexity and memory requirements of the computation, the top half of the spectrogram was used to extract features, excluding the feature extraction techniques that require complex computation, feature extraction techniques were proposed considering classification performance and complexity. In addition, memory requirements were minimized by designing a pipeline structure without storing the entire spectrogram. Experiments on human, dog and robot cleaners were conducted for classification, and 96.2% accuracy performance was confirmed. The proposed system was implemented using Verilog-HDL, and we confirmed that a low-area design using 1140 logics and 6.5 Kb of memory was possible.

A Disital Siver Care for the Health and Rehabilitation of the Elderly (노인 건강과 재활을 위한 디지털 실버케어)

  • Kang, Seungae
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.81-86
    • /
    • 2019
  • This study introduces trends on silver care implemented with the fourth industrial revolution technology, and discusses the use of digital technology for elderly health and rehabilitation by reviewing relevant literature to examine and present directions for future digital-based silver care commercialization. First, health smart home, which is a smart residential service available through digital technology or IT technology that supports independent living in your home, is available. Second, there are technical services using artificial intelligence(AI) and robots. Robots based on advanced intelligence can serve as an assistant for the health and rehabilitation of senior citizens by supporting services that enable the daily lives of senior, checking their health conditions, and high-quality medical care. For the commercialization of these silver care systems, information and services appropriate to the current situation, such as the physical ability and health status of the elderly, should be provided, and it would be desirable to gradually expand the use of essential technology to reflect the needs of the elderly in use so that the digital alienated.

A study on community care using AI technology (AI 기술을 활용한 커뮤니티케어에 관한 연구)

  • Seungae Kang
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.151-156
    • /
    • 2023
  • Currently, ICT is widely used in caring for the elderly living alone and preventing the disappearance of the elderly with dementia. Therefore, in this study, based on the government policy direction for the 4th industrial revolution, the use of AI technology-based care services, which are gradually increasing in community care, was sought to explore the current status and prospects for utilization and activation.AI speakers and caring robots, services that can be used for community care, help solve various problems experienced by the elderly, and are also used to relieve lack of conversation or loneliness by adding emotional functions. In order to activate community care using AI technology in the future: First, there is a need for continuous education to familiarize the elderly with AI devices and 'user experience (UX) design' for the elderly. Second, it is necessary to use human-centered technology that has a complementary relationship and enables emotional mutual relationships rather than using function-oriented technology. Third, it is necessary to solve ethical problems such as guaranteeing the user's right to self-determination and protecting privacy.

An Empirical Study on Future New Technology in Defense Unmanned Robot (국방 무인로봇 분야 미래 신기술에 관한 실증연구)

  • Kim, DoeHun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.611-616
    • /
    • 2018
  • With the recent increase in awareness of the diversification of patterns of warfare and security, technological evolution is occurring in the field of autonomous defense robots. As defense science and technology develops with the development of the concept of military utilization focusing on human lives and economic operation, the importance of autonomous robots in the effect-oriented future battlefield is increasing. The major developed countries have developed core technologies, investment strategies, priorities, data securing strategies and infrastructure development related to the field of autonomous defense robots, and research activities such as technology planning and policy strategy for autonomous defense robots in Korea have already begun. In addition, the field of autonomous defense robots encompasses technologies that represent the fourth industrial revolution, such as artificial intelligence, big data, and virtual reality, and so the expectations for this future area of technology are very high. It is difficult to predict the path of technological development due to the increase in the demand for new rather than existing technology. Moreover, the selection and concentration of strategic R&D is required due to resource constraints. It is thought that a preemptive response is needed. This study attempts to derive 6 new technologies that will shape the future of autonomous defense robots and to obtain meaningful results through an empirical study.

Metabolic Rate Estimation for ECG-based Human Adaptive Appliance in Smart Homes (인간 적응형 가전기기를 위한 거주자 심박동 기반 신체활동량 추정)

  • Kim, Hyun-Hee;Lee, Kyoung-Chang;Lee, Suk
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.20 no.5
    • /
    • pp.486-494
    • /
    • 2014
  • Intelligent homes consist of ubiquitous sensors, home networks, and a context-aware computing system. These homes are expected to offer many services such as intelligent air-conditioning, lighting control, health monitoring, and home security. In order to realize these services, many researchers have worked on various research topics including smart sensors with low power consumption, home network protocols, resident and location detection, context-awareness, and scenario and service control. This paper presents the real-time metabolic rate estimation method that is based on measured heart rate for human adaptive appliance (air-conditioner, lighting etc.). This estimation results can provide valuable information to control smart appliances so that they can adjust themselves according to the status of residents. The heart rate based method has been experimentally compared with the location-based method on a test bed.

Multi-Scale, Multi-Object and Real-Time Face Detection and Head Pose Estimation Using Deep Neural Networks (다중크기와 다중객체의 실시간 얼굴 검출과 머리 자세 추정을 위한 심층 신경망)

  • Ahn, Byungtae;Choi, Dong-Geol;Kweon, In So
    • The Journal of Korea Robotics Society
    • /
    • v.12 no.3
    • /
    • pp.313-321
    • /
    • 2017
  • One of the most frequently performed tasks in human-robot interaction (HRI), intelligent vehicles, and security systems is face related applications such as face recognition, facial expression recognition, driver state monitoring, and gaze estimation. In these applications, accurate head pose estimation is an important issue. However, conventional methods have been lacking in accuracy, robustness or processing speed in practical use. In this paper, we propose a novel method for estimating head pose with a monocular camera. The proposed algorithm is based on a deep neural network for multi-task learning using a small grayscale image. This network jointly detects multi-view faces and estimates head pose in hard environmental conditions such as illumination change and large pose change. The proposed framework quantitatively and qualitatively outperforms the state-of-the-art method with an average head pose mean error of less than $4.5^{\circ}$ in real-time.

Classification of HTTP Automated Software Communication Behavior Using a NoSQL Database

  • Tran, Manh Cong;Nakamura, Yasuhiro
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.2
    • /
    • pp.94-99
    • /
    • 2016
  • Application layer attacks have for years posed an ever-serious threat to network security, since they always come after a technically legitimate connection has been established. In recent years, cyber criminals have turned to fully exploiting the web as a medium of communication to launch a variety of forbidden or illicit activities by spreading malicious automated software (auto-ware) such as adware, spyware, or bots. When this malicious auto-ware infects a network, it will act like a robot, mimic normal behavior of web access, and bypass the network firewall or intrusion detection system. Besides that, in a private and large network, with huge Hypertext Transfer Protocol (HTTP) traffic generated each day, communication behavior identification and classification of auto-ware is a challenge. In this paper, based on a previous study, analysis of auto-ware communication behavior, and with the addition of new features, a method for classification of HTTP auto-ware communication is proposed. For that, a Not Only Structured Query Language (NoSQL) database is applied to handle large volumes of unstructured HTTP requests captured every day. The method is tested with real HTTP traffic data collected through a proxy server of a private network, providing good results in the classification and detection of suspicious auto-ware web access.

Implementation of an improved real-time object tracking algorithm using brightness feature information and color information of object

  • Kim, Hyung-Hoon;Cho, Jeong-Ran
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.5
    • /
    • pp.21-28
    • /
    • 2017
  • As technology related to digital imaging equipment is developed and generalized, digital imaging system is used for various purposes in fields of society. The object tracking technology from digital image data in real time is one of the core technologies required in various fields such as security system and robot system. Among the existing object tracking technologies, cam shift technology is a technique of tracking an object using color information of an object. Recently, digital image data using infrared camera functions are widely used due to various demands of digital image equipment. However, the existing cam shift method can not track objects in image data without color information. Our proposed tracking algorithm tracks the object by analyzing the color if valid color information exists in the digital image data, otherwise it generates the lightness feature information and tracks the object through it. The brightness feature information is generated from the ratio information of the width and the height of the area divided by the brightness. Experimental results shows that our tracking algorithm can track objects in real time not only in general image data including color information but also in image data captured by an infrared camera.