• 제목/요약/키워드: Security robot

검색결과 120건 처리시간 0.023초

B-COV:Bio-inspired Virtual Interaction for 3D Articulated Robotic Arm for Post-stroke Rehabilitation during Pandemic of COVID-19

  • Allehaibi, Khalid Hamid Salman;Basori, Ahmad Hoirul;Albaqami, Nasser Nammas
    • International Journal of Computer Science & Network Security
    • /
    • 제21권2호
    • /
    • pp.110-119
    • /
    • 2021
  • The Coronavirus or COVID-19 is contagiousness virus that infected almost every single part of the world. This pandemic forced a major country did lockdown and stay at a home policy to reduce virus spread and the number of victims. Interactions between humans and robots form a popular subject of research worldwide. In medical robotics, the primary challenge is to implement natural interactions between robots and human users. Human communication consists of dynamic processes that involve joint attention and attracting each other. Coordinated care involves sharing among agents of behaviours, events, interests, and contexts in the world from time to time. The robotics arm is an expensive and complicated system because robot simulators are widely used instead of for rehabilitation purposes in medicine. Interaction in natural ways is necessary for disabled persons to work with the robot simulator. This article proposes a low-cost rehabilitation system by building an arm gesture tracking system based on a depth camera that can capture and interpret human gestures and use them as interactive commands for a robot simulator to perform specific tasks on the 3D block. The results show that the proposed system can help patients control the rotation and movement of the 3D arm using their hands. The pilot testing with healthy subjects yielded encouraging results. They could synchronize their actions with a 3D robotic arm to perform several repetitive tasks and exerting 19920 J of energy (kg.m2.S-2). The average of consumed energy mentioned before is in medium scale. Therefore, we relate this energy with rehabilitation performance as an initial stage and can be improved further with extra repetitive exercise to speed up the recovery process.

Blockchain and Physically Unclonable Functions Based Mutual Authentication Protocol in Remote Surgery within Tactile Internet Environment

  • Hidar, Tarik;Abou el kalam, Anas;Benhadou, Siham;Kherchttou, Yassine
    • International Journal of Computer Science & Network Security
    • /
    • 제22권9호
    • /
    • pp.15-22
    • /
    • 2022
  • The Tactile Internet technology is considered as the evolution of the internet of things. It will enable real time applications in all fields like remote surgery. It requires extra low latency which must not exceed 1ms, high availability, reliability and strong security system. Since it appearance in 2014, tremendous efforts have been made to ensure authentication between sensors, actuators and servers to secure many applications such as remote surgery. This human to machine relationship is very critical due to its dependence of the human live, the communication between the surgeon who performs the remote surgery and the robot arms, as a tactile internet actor, should be fully and end to end protected during the surgery. Thus, a secure mutual user authentication framework has to be implemented in order to ensure security without influencing latency. The existing methods of authentication require server to stock and exchange data between the tactile internet entities, which does not only make the proposed systems vulnerables to the SPOF (Single Point of Failure), but also impact negatively on the latency time. To address these issues, we propose a lightweight authentication protocol for remote surgery in a Tactile Internet environment, which is composed of a decentralized blockchain and physically unclonable functions. Finally, performances evaluation illustrate that our proposed solution ensures security, latency and reliability.

제4차 산업혁명과 제3차 상쇄전략 추진 시 극복해야 될 군사적 이슈 (Military Issues to Overcome in the 4th Industrial Revolution and the 3rd Offset Strategy)

  • 한승조;신진
    • 융합보안논문지
    • /
    • 제19권1호
    • /
    • pp.145-152
    • /
    • 2019
  • 제4차 산업혁명과 군에서의 제3차 상쇄전략이 대두되는 시대에 군에서의 인공지능과 자율화 능력을 갖춘 로봇의 활용이 본격화 되고 있다. 제3차 상쇄전략은 제4차 산업혁명의 기술을 기반으로 제시된 것이며, 우리나라도 미국의 군사과학기술에 많이 의존하고, 동맹 관계의 군사전략적 특성 상 위 혁명과 전략에 직간접적으로 많은 영향을 받고 있다. 제4차 산업혁명과 제3차 상쇄전략이 군에서 성공적으로 적용되기 위해서는 기술적 완성을 넘어서 해결해야 될 많은 이슈들이 존재한다. 하지만 관련 기술의 장점과 비교해서 이면에 숨겨진 단점이나 제한사항은 언론이나 학술연구에서 찾아보기 어렵다. 본 논문에서는 성공적인 혁명과 전략을 위해서 생각해보아야 될 이슈 중에서 로봇 윤리 및 기술 불균형, 자율화 기능의 제한사항, VR/AR/MR 적용 시 유발되는 영상피로, 사이버/네트워크 보안 분야를 중점적으로 설명하고, 이에 대한 해결방안을 제시하고 있다.

A Study on the Tele-medicine Robot System with Face to Face Interaction

  • Shin, Dae Seob
    • 전기전자학회논문지
    • /
    • 제24권1호
    • /
    • pp.293-301
    • /
    • 2020
  • Consultation with the patient and doctor is very important in the examination. However, if the consultation cannot be done directly, such as corona virus, it is difficult for the doctor to determine the patient's condition more accurately. Recently, an image counseling system has been developed based on the Internet, but in the case of heart disease, remote medical counseling cannot be performed because it is not possible to stethoscope the heart sounds remotely. In order to solve this problem, it is necessary to develop an interactive mobile robot capable of remote medical consultation, and a doctor and a patient should be able to set a planting sound during consultation and transmit it in real time. In this paper, we developed a robot that can remotely control a medical counseling robot to move to a hospital room where patients are hospitalized, and to consult a patient in the room remotely from a doctor's office. A remote medical imaging stethoscope system for real-time heart sound transmission is presented. The proposed system is a kind of P2P communication that transmits video information, audio information, and control signal independently through webRTC platform, so that there is no data loss. Consults and sees doctors in real time and finds it more effective than traditional methods for patient security. The system implemented in this paper will be able to perform remote medical care in the place where the spread of diseases between humans like the recent corona 19 as well as the remote medical care of heart disease patients in the future.

정보보호 교육과정 표준화모델 개발 연구 : 국내 대학 사례를 중심으로 (A Study on Development of Standard Modeling Education Program in Information Security : Focusing on Domestic University Cases)

  • 양정모
    • 융합보안논문지
    • /
    • 제18권5_1호
    • /
    • pp.99-104
    • /
    • 2018
  • 현대사회가 정보화 시대를 넘어서 4차 산업혁명시대로 접어들었다. 즉, 세계적으로 생명과학이 주도하는 시대가 도래 하였다. 바야흐로 무인자동차, 드론, 알파고와 같은 인공지능, IT기술로 탄생한 인간을 대신하는 로봇시대가 도래하였다. 이는 IT의 근간인 정보전달의 핵심가치를 기반에 두고 있는 것이다. 이러한 4차 산업 혁명시대에 즈음하여 정보보호분야가 필수불가결한 학문분야가 되었다. 웹기반 보안, 시스템기반 보안, 클라이언트 기반 보안, 모바일보안, 그리고 무선보안 등 컴퓨터 기반 IT기술 전반에 보안문제는 필수사항이 되었 다. 이에 발맞추어 보안인력양성을 위한 대학의 교육과정을 시대에 요구에 맞도록 표준화할 필요가 있다고 보여 진다. 본 논문은 정보보호분야의 교육과정을 표준화하기 위한 모델을 개발하여 제시하고자 한다. 이러한 모델을 통하여 각 교육기관에서는 필요한 트랙이나 분야를 선택하여 학생들을 지도하여 효과적인 정보보호인력양성에 기여하고자 한다.

  • PDF

Detecting Malicious Social Robots with Generative Adversarial Networks

  • Wu, Bin;Liu, Le;Dai, Zhengge;Wang, Xiujuan;Zheng, Kangfeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권11호
    • /
    • pp.5594-5615
    • /
    • 2019
  • Malicious social robots, which are disseminators of malicious information on social networks, seriously affect information security and network environments. The detection of malicious social robots is a hot topic and a significant concern for researchers. A method based on classification has been widely used for social robot detection. However, this method of classification is limited by an unbalanced data set in which legitimate, negative samples outnumber malicious robots (positive samples), which leads to unsatisfactory detection results. This paper proposes the use of generative adversarial networks (GANs) to extend the unbalanced data sets before training classifiers to improve the detection of social robots. Five popular oversampling algorithms were compared in the experiments, and the effects of imbalance degree and the expansion ratio of the original data on oversampling were studied. The experimental results showed that the proposed method achieved better detection performance compared with other algorithms in terms of the F1 measure. The GAN method also performed well when the imbalance degree was smaller than 15%.

Design and Implementation of Low-Cost Articulate Manipulator for Academic Applications

  • Muhammad Asim Ali;Farhan Ali Shah
    • International Journal of Computer Science & Network Security
    • /
    • 제24권1호
    • /
    • pp.17-22
    • /
    • 2024
  • The objective of this work is to design a low cost yet fully functional 4-DOF articulate manipulator for educational applications. The design is based on general purpose, programmable smart servo motors namely the Dynamixel Ax-12. The mechanism for motion was developed by formulating the equations of kinematics and subsequent solutions for joint space variables. The trajectory of end-effector in joint variable space was determined by interpolation of a 3rd order polynomial. The solutions were verified through computer simulations and ultimately implemented on the hardware. Owing to the feedback from the built-in sensors, it is possible to correct the positioning error due to loading effects. The proposed solution offers an efficient and cost-effective platform to study the trajectory planning as well as dynamics of the manipulator.

Q&A Chatbot in Arabic Language about Prophet's Biography

  • Somaya Yassin Taher;Mohammad Zubair Khan
    • International Journal of Computer Science & Network Security
    • /
    • 제24권3호
    • /
    • pp.211-223
    • /
    • 2024
  • Chatbots have become very popular in our times and are used in several fields. The emergence of chatbots has created a new way of communicating between human and computer interaction. A Chatbot also called a "Chatter Robot," or conversational agent CA is a software application that mimics human conversations in its natural format, which contains textual material and oral communication with artificial intelligence AI techniques. Generally, there are two types of chatbots rule-based and smart machine-based. Over the years, several chatbots designed in many languages for serving various fields such as medicine, entertainment, and education. Unfortunately, in the Arabic chatbots area, little work has been done. In this paper, we developed a beneficial tool (chatBot) in the Arabic language which contributes to educating people about the Prophet's biography providing them with useful information by using Natural Language Processing.

스마트홈과 연동하는 안전 방범창의 개발 (Development of security windows by smart homes)

  • 전다희;전다윗;황우현
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2024년도 제69차 동계학술대회논문집 32권1호
    • /
    • pp.193-194
    • /
    • 2024
  • 스마트홈과 연동하는 안전한 방범창은 외부의 침입자를 차단하고 주거 내의 물품 도난 및 개인의 신변을 보호하기 위한 안전설비로 다양한 형태의 방범창이 존재한다. 스마트홈은 건물 내의 센서가 화재를 감지하면 방범창 내부의 원격시스템이 자동으로 방범창을 매우 짧은 시간 안에 개방할 수 있도록 설계한다. 화재 등 재난시 상하부 방법창이 자동으로 개폐되도록 랙피니언을 이용하여 방범창의 위쪽 창틀을 상승시켜 창살이 움직일 수 있도록 개방하고 동시에 아래쪽 창틀이 회전하도록 구성하여 화재 및 폭우 등에 인명피해를 줄일 수 있도록 설계한다. 스마트홈 시스템과의 연계로 재난을 미리 감지하고 탈출구를 개방한다면 신속하고 안전한 대피가 가능하고, 기존의 프레임 부분 변경에 간단한 시스템만 변경하여 적용할 수 있어, 간단한 구조로 설치할 수 있고 낮은 비용으로 스마트홈을 구성할 수 있다. 특히 스마트홈과 연동하여 재난을 미리 감지하고 탈출구를 개방함으로써 신속하고 안전한 대피가 가능하여 다양한 재난을 대비할 수 있다.

  • PDF

광대역 전력선 통신을 이용한 스마트 홈 네트워크 구성에 관한 연구 (Smart Home Network System Using the Broadband Power Line Communication(BPLC))

  • 양현창;심귀보
    • 한국지능시스템학회:학술대회논문집
    • /
    • 한국퍼지및지능시스템학회 2005년도 추계학술대회 학술발표 논문집 제15권 제2호
    • /
    • pp.87-90
    • /
    • 2005
  • The Intelligent Home provides convenient and comfortable living environment by performing automatic control, heating and air-conditioning, ventilation, home appliances control, home robot control, energy management, visitor management security management, internet, heath state monitoring, etc. through wired/ wireless network and device in the household. Along with the presentation of the features of economical broadband power line communication in the network configuration for new and old houses, its improvement method is proposed.

  • PDF