• Title/Summary/Keyword: Smart Defence

Search Result 17, Processing Time 0.022 seconds

The Reliability Evaluation Method of Embedded Controled Systems Considering the International Standard (국제 표준을 고려한 임베디드 제어 시스템(ECS)의 신뢰성 평가방법)

  • Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.15 no.2
    • /
    • pp.199-206
    • /
    • 2017
  • Embedded control system is widely spreaded and used in various fields including military defence, aviation, medical, etc. due to extended use of smart phones, connected car, IoT. Increasing examples are introduced where embedded control system that perform their unique role such as smart phone and network system organically configure to create new system. According to this trend, organic interface and reliability of each embedded control system are becoming important evaluation factors. The purpose of this paper is to develop quality evaluation criteria method for automobile embedded system, among the fields that use embedded control systems. In order to satisfy high quality level requirements of automobile embedded control system, we surveyed latest trend of automobile embedded control system, analyzed structure and application technology of embedded control system, to establish quality evaluation criteria and method for automobile embedded control system by referring international standard for software (ISO/IEC 9126), and international standard for electric & electronic products (ISO 26262).

Development of virtual reality simulation game synchronized with real robot (로봇과 동기화된 가상현실 시뮬레이션 게임의 개발)

  • Shim, Jae-Youn;Yoo, Hwan-Soo;Sung, Hyun-Seong
    • Journal of Korea Game Society
    • /
    • v.18 no.4
    • /
    • pp.33-42
    • /
    • 2018
  • Virtual reality can user experience the virtual world of computer and stimulate user eyesight and emotions. HMD can acquire and stimulate user behavior and sensory information. In this paper, we propose a virtual reality game using robot control. Controlling the robots using various interfaces and synchronizing them with the virtual reality game. In this paper, we use OID mat for robot movement detection based optical code recognition and Kalman filter.

A Study of Smart Robot Architecture and Movement for Observation of Dangerous Region (위험지역 감시스마트로봇의 설계와 동작에 관한 연구)

  • Koo, Kyung-Wan;Baek, Dong-Hyun
    • Fire Science and Engineering
    • /
    • v.27 no.6
    • /
    • pp.83-88
    • /
    • 2013
  • Catastrophic disasters are sprouting out recently, i.e., the radiation leaks and the hydrofluoric acid gas leaks, etc. The restoration work for these kinds of disasters is very harmful and dangerous for human beings to handle themselves, thus allowing manless robots to fly the reconnaissance planes over to the disaster stricken areas and do the necessary work instead. For this endeavor and purpose, we created and tested an intelligent robot that can inspect those areas, using Mbed (ARM processor) technology temperature sensors and gas sensors aided by CAM (Computer-Aided Manufacturing) cameras. Also, HTTP Server, PC, androids and their combined efforts allow their remote controlled operation from far away with timing control. These intelligent robots can be on duty for 24 hours, minimizing the accidents and crimes and what not, and can respond more quickly when these misfortunes actually happen. We can anticipate the economic effects as well, derived from the reduced needs for hiring human resources.

Study on Fun factor in Smartphone Convergence Game - Focusing on the Defense and Plunder (스마트폰 융복합 게임의 재미요인 분석 - 수성과 약탈을 중심으로)

  • Kim, In-Su;Jung, Hyung-Won;Kim, Tae-Gyu
    • Journal of Digital Convergence
    • /
    • v.13 no.7
    • /
    • pp.367-372
    • /
    • 2015
  • Smartphone game market, smart phone appeared on the market and soon developed rapidly, generation change is happening. Generally, Smartphone games are only short-lived super cell's Clash of Clans is gaining popularity for over two years. So Clash of Clans this game with hold most characteristic elements of the defense and plunder on the subject analyzed the fun factor. In order to analyze the defense and plunder elements were prepared Clash of Clans and Kings of Thieves in cases. Two of the cases, depending on the fun theory Preparation, A sense of space, A solid core machanic, A range of challenge, A range of abilities required to solve the encounter and Skill required in using the abilities were evaluated in the fun factor analysis of defense and plunder elements.

A Model of Artificial Intelligence in Cyber Security of SCADA to Enhance Public Safety in UAE

  • Omar Abdulrahmanal Alattas Alhashmi;Mohd Faizal Abdullah;Raihana Syahirah Abdullah
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.173-182
    • /
    • 2023
  • The UAE government has set its sights on creating a smart, electronic-based government system that utilizes AI. The country's collaboration with India aims to bring substantial returns through AI innovation, with a target of over $20 billion in the coming years. To achieve this goal, the UAE launched its AI strategy in 2017, focused on improving performance in key sectors and becoming a leader in AI investment. To ensure public safety as the role of AI in government grows, the country is working on developing integrated cyber security solutions for SCADA systems. A questionnaire-based study was conducted, using the AI IQ Threat Scale to measure the variables in the research model. The sample consisted of 200 individuals from the UAE government, private sector, and academia, and data was collected through online surveys and analyzed using descriptive statistics and structural equation modeling. The results indicate that the AI IQ Threat Scale was effective in measuring the four main attacks and defense applications of AI. Additionally, the study reveals that AI governance and cyber defense have a positive impact on the resilience of AI systems. This study makes a valuable contribution to the UAE government's efforts to remain at the forefront of AI and technology exploitation. The results emphasize the need for appropriate evaluation models to ensure a resilient economy and improved public safety in the face of automation. The findings can inform future AI governance and cyber defense strategies for the UAE and other countries.

Study on the Projectile Velocity Measurement Using Eddy Current Probe (와전류 탐촉자를 이용한 총구 탄속 측정에 관한 연구)

  • Shin, Jungoo;Son, Derac
    • Journal of the Korean Magnetics Society
    • /
    • v.25 no.3
    • /
    • pp.83-86
    • /
    • 2015
  • Nowadays the weapon systems are employed air bursting munition (ABM) as smart programmable 40 mm shells which have been developed in order to hit the target with programmed munition that can be air burst after a set distance in the battlefield. In order to improve the accuracy of such a bursting time, by measuring the speed of the munition from the barrel, weapon systems calculate the exact time of flight to the target and then the time information must be inputted to the munition. In this study, we introduce a device capable of detecting a shot at K4 40 mm automatic grenade. The shot is composed of a rotating copper band to convert linear motion into rotary motion when it passes through the barrel, the steel section is exert the effect of fragment and aluminum section to give fuze information. The aluminum section was used to detect munition using eddy current method. To measure muzzle velocity by means of non-contact method, two eddy current probes separated 10 cm was employed. Time interval between two eddy current probe detection times was used as muzzle velocity. The eddy current probe was fabricated U-shape Mn-Zn ferrite core with enamelled copper wire, and 200 kHz alternating current was used to detect inductance change. Measured muzzle velocity using the developed sensor was compared to the Doppler radar system. The difference was smaller than 1%.

Design of Embedded Security Controller Based on Client Authentication Utilizing User Movement Information (사용자의 이동정보를 활용한 클라이언트 인증 기반의 임베디드 보안 컨트롤러 설계)

  • Hong, Suk-Won
    • Journal of Digital Convergence
    • /
    • v.18 no.3
    • /
    • pp.163-169
    • /
    • 2020
  • A smart key has been used in a variety of embedded environments and there also have been attacks from a remote place by amplifying signals at a location of a user. Existing studies on defence techniques suggest multiple sensors and hash functions to improve authentication speed; these, however, increase the electricity usage and the probability of type 1 error. For these reasons, I suggest an embedded security controller based on client authentication and user movement information improving the authentication method between a controller and a host device. I applied encryption algorithm to the suggested model for communication using an Arduino board, GPS, and Bluetooth and performed authentication through path analysis utilizing user movement information for the authentication. I found that the change in usability was nonsignificant when performing actions using the suggested model by evaluating the time to encode and decode. The embedded security controller in the model can be applied to the system of a remote controller for a two-wheeled vehicle or a mobile and stationary host device; in the process of studying, I found that encryption and decryption could take less then 100ms. The later study may deal with protocols to speed up the data communication including encryption and decryption and the path data management.