• Title/Summary/Keyword: Smart Defense

검색결과 166건 처리시간 0.033초

Deflection Prediction of Piezo-composite Unimorph Actuator Considering Material Property Change of Piezoelectric Single Crystal for Compression Stress Variation (압축 응력 변화에 대한 압전 단결정의 물성 변화를 고려한 압전 복합재료 작동기의 작동 변위 예측)

  • Yoon, Bum-Soo;Park, Ji-Won;Yoon, Kwang-Joon;Choi, Hyun-Young
    • Composites Research
    • /
    • 제30권1호
    • /
    • pp.15-20
    • /
    • 2017
  • In this study, LIPCA-S2 actuator with a piezoelectric single crystal layer and a carbon/epoxy layer was designed and evaluated to increase actuation performance of piezo-composite unimorph actuator. A curvature change model generated by the induced strain of a piezoelectric layer was used to predict the tip displacement of the piezo-composite unimorph cantilever. However, we found that there was big difference between the predicted and the measured tip displacement of LIPCA-S2 cantilever actuator when we used the previous linear prediction model. A new prediction model considering the change of piezoelectric strain coefficient and elastic modulus for the compression stress variation of the PMN-29PT single crystal layer was used and it was found that the difference between the predicted and the measured tip displacement reduced considerably.

A Study of a Hierarchical Grade-based Contents Forwarding Scheme for CCN Real-time Streaming Service (CCN 실시간 스트리밍 서비스를 위한 계층별 차등기반의 데이터 전송 기법 연구)

  • Kim, Taehwan;Kwon, Taewook
    • Journal of KIISE
    • /
    • 제44권11호
    • /
    • pp.1219-1230
    • /
    • 2017
  • Real-time streaming services over the Internet have increased with the explosive growth of the various mobile platforms, with a focus on smart phones, and the demand for them is growing. In addition, the bandwidth occupied by the streaming services over the Internet had already surpassed 50% in 2010. Because of the shortage of network bandwidth for multimedia services traffic, restrictions on quality and capacity will become more and more serious. CCN is a future Internet architecture that improves how existing host-based Internet architecture handles content-oriented structure, but it is designed for the transmission of general contents and is not suitable for transmitting real-time streaming contents. In this paper, we focus on the inefficient aspects of CCN and propose a hierarchical grade-based scheme for real-time service for a more efficient environment in real-time streaming services. Experiments have shown better performance in terms of bandwidth, network load, and reliability.

An Efficient IoT Healthcare Service Management Model of Location Tracking Sensor (위치 추적 센서 기반의 IOT 헬스케어 서비스 관리 모델)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • 제14권3호
    • /
    • pp.261-267
    • /
    • 2016
  • As IoT technology has gained the attention all around the world, the development for various services of healthcare, smart city, agriculture, and defense based on IoT is in progress. However, it is likely that healthcare services based on IoT have a problem of being leaked of patients' biological information by a third party and that risks patients' lives. In this paper, an IoT health care service managing model based on location sensor is proposed, which secures the biological information of a patient and simplifies the procedure to process the treatment and administration steps by using the data resources sensed. Even when an emergency occurs, this proposed model can respond quickly using the location information of the patient, which enables the staff in the hospital to locate the patient in real time. In addition, there is an advantage to minimize the time and the process of care, because the location of the equipment for necessary treatment is possible to be instantaneously located with attached sensors.

Mutual Authentication and Secure Session Termination Scheme in iATA Protocol

  • Ong, Ivy;Lee, Shirly;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Journal of information and communication convergence engineering
    • /
    • 제8권4호
    • /
    • pp.437-442
    • /
    • 2010
  • Ubiquitous mobile computing is becoming easier and more attractive in this ambient technological Internet world. However, some portable devices such as Personal Digital Assistant (PDAs) and smart phones are still encountering inherent constraints of limited storages and computing resources. To alleviate this problem, we develop a cost-effective protocol, iATA to transfer ATA commands and data over TCP/IP network between mobile appliances and stationary servers. It provides mobile users a virtual storage platform which is physically resided at remote home or office. As communications are made through insecure Internet connections, security risks of adopting this service become a concern. There are many reported cases in the history where attackers masquerade as legitimate users, illegally access to network-based applications or systems by breaking through the poor authentication gates. In this paper, we propose a mutual authentication and secure session termination scheme as the first and last defense steps to combat identity thief and fraud threat in particular for iATA services. Random validation factors, large prime numbers, current timestamps, one-way hash functions and one-time session key are deployed accordingly in the scheme. Moreover, we employ the concept of hard factorization problem (HFP) in the termination phase to against fraud termination requests. Theoretical security analysis discussed in later section indicates the scheme supports mutual authentication and is robust against several attacks such as verifiers' impersonation, replay attack, denial-of-services (DoS) attack and so on.

Design of Hybrid Communication Structure for Video Transmission in Drone Systems (드론 영상 전송용 하이브리드 통신 구조의 설계)

  • Kim, Won
    • Journal of the Korea Convergence Society
    • /
    • 제10권11호
    • /
    • pp.9-14
    • /
    • 2019
  • In modern society drones are actively utilized in the fields of security, defense, agriculture, communication and so on. Smart technology and artificial intelligence software have been developed with convergence, and the field of use is expected to expand further. On the point of the excellent performance of drones one of the essential technologies is the wireless communication that make the ground facility receive the video streaming obtained by the drones in the air. In the research the concept of communication region is proposed to cover the both the low altitude region for Wi-Fi communication and the high altitude region for LTE communication for the sake of video transmission. Also the hybrid communication structure is designed along the proposed concept and the proposed system is implemented as a communication system in the small size which can be mounted in a small size of drone. It is confirmed that the proposed system contains the effectiveness by showing the ability to successfully transmit HD video streaming in the range of 500 meters and the transfer time between two different communication systems is measured in 200msec by the experiments.

The Study on Data Governance Research Trends Based on Text Mining: Based on the publication of Korean academic journals from 2009 to 2021 (텍스트 마이닝을 활용한 데이터 거버넌스 연구 동향 분석: 2009년~2021년 국내 학술지 논문을 중심으로)

  • Jeong, Sun-Kyeong
    • Journal of Digital Convergence
    • /
    • 제20권4호
    • /
    • pp.133-145
    • /
    • 2022
  • As a result of the study, the poorest keywords were information, big data, management, policy, government, law, and smart. In addition, as a result of network analysis, related research was being conducted on topics such as data industry policy, data governance performance, defense, governance, and data public. The four topics derived through topic modeling were "DG policy," "DG platform," "DG in laws," and "DG implementation," of which research related to "DG platform" showed an increasing trend, and "DG implementation" tended to shrink. This study comprehensively summarized data governance-related studies. Data governance needs to expand research areas from various perspectives and related fields such as data management and data integration policies at the organizational level, and related technologies. In the future, we can expand the analysis targets for overseas data governance and expect follow-up studies on research directions and policy directions in industries that require data-based future industries such as Industry 4.0, artificial intelligence, and Metaverse.

Logistics Development Plan for Underground Ammunition Depots based on Network (네트워크 기반 지하형 탄약고의 물류 발전방안 연구)

  • Kim, Byungkyoo
    • Journal of Internet Computing and Services
    • /
    • 제23권3호
    • /
    • pp.137-145
    • /
    • 2022
  • The logistics of ammunition stored in the underground ammunition warehouse has more difficulties than the logistics of ammunition stored on the ground due to the nature of the storage space. This study was conducted to solve the logistics of underground ammunition warehouse by improving these problems. And six items such as guard, safety, environment, supply system, equipment, facilities, and life management were selected for the improvement of logistics. And AHP was analyzed by Expert Choice program by conducting a survey to experts. As a result of the analysis, it was confirmed that the importance was high in the order of safety, guard, life management, equipment facilities, supply system, and environment. Based on the selected items and the results of the survey, a plan to build a network-based integrated platform that can improve logistics in an underground ammunition warehouse was presented. This study will be used as a basis for the establishment of an integrated platform when constructing an underground ammunition warehouse in the future. This study can be applied to storage facilities that store other materials in the military, and it is expected to be applied to large commercial storage facilities.

Experimental Study on Application of an Optical Sensor to Measure Mooring-Line Tension in Waves

  • Nguyen, Thi Thanh Diep;Park, Ji Won;Nguyen, Van Minh;Yoon, Hyeon Kyu;Jung, Joseph Chul;Lee, Michael Myung Sub
    • Journal of Ocean Engineering and Technology
    • /
    • 제36권3호
    • /
    • pp.153-160
    • /
    • 2022
  • Moored floating platforms have great potential in ocean engineering applications because a mooring system is necessary to keep the platform in station, which is directly related to the operational efficiency and safety of the platform. This paper briefly introduces the technical and operational details of an optical sensor for measuring the tension of mooring lines of a moored platform in waves. In order to check the performance of optical sensors, an experiment with a moored floating platform in waves is carried out in the wave tank at Changwon National University. The experiment is performed in regular waves and irregular waves with a semi-submersible and triangle platform. The performance of the optical sensor is confirmed by comparing the results of the tension of the mooring lines by the optical sensor and tension gauges. The maximum tension of the mooring lines is estimated to investigate the mooring dynamics due to the effect of the wave direction and wavelength in the regular waves. The significant value of the tension of mooring lines in various wave directions is estimated in the case of irregular waves. The results show that the optical sensor is effective in measuring the tension of the mooring lines.

Feasibility study on an acceleration signal-based translational and rotational mode shape estimation approach utilizing the linear transformation matrix

  • Seung-Hun Sung;Gil-Yong Lee;In-Ho Kim
    • Smart Structures and Systems
    • /
    • 제32권1호
    • /
    • pp.1-7
    • /
    • 2023
  • In modal analysis, the mode shape reflects the vibration characteristics of the structure, and thus it is widely performed for finite element model updating and structural health monitoring. Generally, the acceleration-based mode shape is suitable to express the characteristics of structures for the translational vibration; however, it is difficult to represent the rotational mode at boundary conditions. A tilt sensor and gyroscope capable of measuring rotational mode are used to analyze the overall behavior of the structure, but extracting its mode shape is the major challenge under the small vibration always. Herein, we conducted a feasibility study on a multi-mode shape estimating approach utilizing a single physical quantity signal. The basic concept of the proposed method is to receive multi-metric dynamic responses from two sensors and obtain mode shapes through bridge loading test with relatively large deformation. In addition, the linear transformation matrix for estimating two mode shapes is derived, and the mode shape based on the gyro sensor data is obtained by acceleration response using ambient vibration. Because the structure's behavior with respect to translational and rotational mode can be confirmed, the proposed method can obtain the total response of the structure considering boundary conditions. To verify the feasibility of the proposed method, we pre-measured dynamic data acquired from five accelerometers and five gyro sensors in a lab-scale test considering bridge structures, and obtained a linear transformation matrix for estimating the multi-mode shapes. In addition, the mode shapes for two physical quantities could be extracted by using only the acceleration data. Finally, the mode shapes estimated by the proposed method were compared with the mode shapes obtained from the two sensors. This study confirmed the applicability of the multi-mode shape estimation approach for accurate damage assessment using multi-dimensional mode shapes of bridge structures, and can be used to evaluate the behavior of structures under ambient vibration.

Model Verification of a Safe Security Authentication Protocol Applicable to RFID System (RFID 시스템에 적용시 안전한 보안인증 프로토콜의 모델검증)

  • Bae, WooSik;Jung, SukYong;Han, KunHee
    • Journal of Digital Convergence
    • /
    • 제11권4호
    • /
    • pp.221-227
    • /
    • 2013
  • RFID is an automatic identification technology that can control a range of information via IC chips and radio communication. Also known as electronic tags, smart tags or electronic labels, RFID technology enables embedding the overall process from production to sales in an ultra-small IC chip and tracking down such information using radio frequencies. Currently, RFID-based application and development is in progress in such fields as health care, national defense, logistics and security. RFID structure consists of a reader that reads tag information, a tag that provides information and the database that manages data. Yet, the wireless section between the reader and the tag is vulnerable to security issues. To sort out the vulnerability, studies on security protocols have been conducted actively. However, due to difficulties in implementation, most suggestions are concerned with theorem proving, which is prone to vulnerability found by other investigators later on, ending up in many troubles with applicability in practice. To experimentally test the security of the protocol proposed here, the formal verification tool, CasperFDR was used. To sum up, the proposed protocol was found to be secure against diverse attacks. That is, the proposed protocol meets the safety standard against new types of attacks and ensures security when applied to real tags in the future.