• 제목/요약/키워드: Threat map

검색결과 37건 처리시간 0.019초

로봇 전역경로계획을 위한 신경망 기반 위협맵 생성 기법 (Threat Map Generation Scheme based on Neural Network for Robot Path Planning)

  • 곽휘권;김형준
    • 한국산학기술학회논문지
    • /
    • 제15권7호
    • /
    • pp.4482-4488
    • /
    • 2014
  • 본 논문은 로봇 전역경로계획을 위하여 위협맵을 생성하는 기법을 제안한다. 로봇의 무장 정보와 적 또는 장애물의 위험정보를 비교하고 신경망 이론 기반의 학습을 수행하여 절대적인 수치로 정량화한 위협맵을 생성한다. 또한 로봇이 제안된 기법으로 생성된 위협맵을 기반으로 경로를 이동한 결과와 기존의 결과를 비교하여 로봇의 위협정도를 파악하여 성능을 검증한다.

4D 환경정보를 반영한 광역 경로수정계획 기법에 관한 연구 (An Approach to Global Path Replanning Method Considering 4D Environmental Information)

  • 곽동준;신종호;김종희
    • 한국군사과학기술학회지
    • /
    • 제19권6호
    • /
    • pp.779-788
    • /
    • 2016
  • In this paper, a global path replanning method is proposed in order to plan a global path minimizing the risk of the unmanned vehicle on the battlefield. We first introduce 4D environmental information consisting of mobility, visibility, kill, and hit attributes, and a unified threat map and a mobility map are defined by the four attributes. Using the mobility map, the unmanned vehicle can find the shortest path on the traversable area. And then taking into account the deterrent according to the type of the unmanned vehicle on the integrated threat map, the vehicle can generate a route to suppress or avoid the threat of enemy as well. Moreover, we present a waypoints bypassing method to exclude unnecessary waypoints rather than the mission point when planning paths for the multiple waypoints.

국가·공공기관 전산망 특성에 따른 사이버 위협 분석 및 분류에 관한 연구 (A Study on the Analysis and Classification of Cyber Threats Accor ding to the Characteristics of Computer Network of National·Public Organizations)

  • 김민수;박기태;김종민
    • 융합보안논문지
    • /
    • 제20권4호
    • /
    • pp.197-208
    • /
    • 2020
  • 지식정보사회에서 발전된 네트워크 인프라를 바탕으로 전산망의 구조는 보안성을 확보한 다양한 형태의 망 구성을 구축하여 운영하고 있다. 국가·공공기관 전산망의 경우 각 기관별 특성과 연계 기관까지 고려한 기술적, 관리적 보안환경 구축이 필요하며, 이를 위해 기관별 특성에 따른 사이버 위협을 분류 및 위협 지도를 바탕으로 기술적·관리적 취약점 및 사이버 위협을 분석 등을 통한 사이버 훈련을 위한 기본 연구의 중요성이 대두되고 있다. 따라서 본 연구에서는 인터넷망과 국가정보통신망의 이원적 인프라 망을 기반으로 구축되어진 국가·공공기관 전산망의 내·외부 사이버 위협에 따른 유형별 분석을 사례 기반의 시나리오를 통해, 실질적인 사이버 위협 요소를 도출 및 분석하여 사이버보안 훈련 요소 도출용 사이버 위협 MAP을 제시하고자 한다.

비행 정보 시각화를 위한 DMM 시스템의 구현 (Implementation of the DMM System for Flight Information Visualization)

  • 허화라;박명철
    • 디지털산업정보학회논문지
    • /
    • 제7권3호
    • /
    • pp.115-121
    • /
    • 2011
  • The flight information visualization of the aircraft is the system which is widely used to the threat against low altitude tasks and terrain altitude. But, it is difficult to implement the system because of restrictions that GPS data and huge geographic information should be stored. In this paper, it proposes economic DMM (Digital Moving Map) system for flight information visualization from open-source-base. First, the flight information is transferred from X-Plane through UDP and then demonstrated on the DMM system. In the proposed DMM system, flight information is visualized on the map information downloaded from an ArcGIS Map server using the mapping data between the present altitude of the aircraft and the terrain altitude. The result of this paper could be used an economic tool in the field of flight information visualization and the game algorithm research.

A Study on Fall Prevention System in Patient Bed

  • Cho, Youngseok
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권1호
    • /
    • pp.101-106
    • /
    • 2019
  • In this paper, we investigate the patient fall prevention system to prevent the patient from falling out of the bed unintentionally on the bed of the bed. Patients stay in bed for many hours of hospitalization. During the hospitalization period, patients have low controllability of the body, as compared with normal persons, and fall due to intentional movements, resulting in a fall of the patient, can be a fatal threat to the patient. Therefore, an efficient fall prevention system is required. In this paper, the distance map to the patient is generated by the distance measuring sensor on the bed of the patient, and the risk is determined by estimating the position of the patient based on the distance map. As a result, when the distance map of the dangerous area is 150 mm or more, it is determined to be dangerous, and good results are obtained.

정밀 지도에 기반한 자율 주행 시스템 개발 (A Development of the Autonomous Driving System based on a Precise Digital Map)

  • 김병광;이철하;권수림;정창영;천창환;박민우;나용천
    • 자동차안전학회지
    • /
    • 제9권2호
    • /
    • pp.6-12
    • /
    • 2017
  • An autonomous driving system based on a precise digital map is developed. The system is implemented to the Hyundai's Tucsan fuel cell car, which has a camera, smart cruise control (SCC) and Blind spot detection (BSD) radars, 4-Layer LiDARs, and a standard GPS module. The precise digital map has various information such as lanes, speed bumps, crosswalks and land marks, etc. They can be distinguished as lane-level. The system fuses sensed data around the vehicle for localization and estimates the vehicle's location in the precise map. Objects around the vehicle are detected by the sensor fusion system. Collision threat assessment is performed by detecting dangerous vehicles on the precise map. When an obstacle is on the driving path, the system estimates time to collision and slow down the speed. The vehicle has driven autonomously in the Hyundai-Kia Namyang Research Center.

인지지도분석을 통한 정보보호 산업 활성화전략 (Revitalization Strategy of Information Security Industry Using Cognitive Map Analysis)

  • 이중만;조일구;임명환
    • Journal of Information Technology Applications and Management
    • /
    • 제23권2호
    • /
    • pp.177-194
    • /
    • 2016
  • This study analyzed President Park's speeches and the government's industry policy in the field of information security using cognitive map. The relationship analysis between policy tool variables and policy goal variables was employed to derive revitalization strategy of information security. This paper found that entrepreneurship revitalization has very strong causality with expansion of domestic market and global market. But, on the other hand, HR development has very weak causality with job creation and future growth driver because the labor market in the information security industry is poor and its transfer rate to other industry is very high. This study showed that this cognitive map could be characterized by a scarcity of feedback loops and a strong emphasis on the positive loops in the structure of virtuous circle. In this paper, we also constructed a comprehensive cognitive map on the policy vision of information security, showing that there are a risk of cyber threat, an opportunity of new fusion security market, information security reinforcing circle, global economic circle, and domestic market circle.

Design and Load Map of the Next Generation Convergence Security Framework for Advanced Persistent Threat Attacks

  • Lee, Moongoo
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제3권2호
    • /
    • pp.65-73
    • /
    • 2014
  • An overall responding security-centered framework is necessary required for infringement accidents, failures, and cyber threats. On the other hand, the correspondence structures of existing administrative, technical, physical security have weakness in a system responding to complex attacks because each step is performed independently. This study will recognize all internal and external users as a potentially threatening element. To perform connectivity analysis regarding an action, an intelligent convergence security framework and road map is suggested. A suggested convergence security framework was constructed to be independent of an automatic framework, such as the conventional single solution for the priority defense system of APT of the latest attack type, which makes continuous reputational attacks to achieve its goals. This study suggested the next generation convergence security framework to have preemptive responses, possibly against an APT attack, consisting of the following five hierarchical layers: domain security, domain connection, action visibility, action control, and convergence correspondence. In the domain, the connection layer suggests a security instruction and direction in the domains of administrative, physical and technical security. The domain security layer has consistency of status information among the security domain. A visibility layer of an intelligent attack action consists of data gathering, comparison and decision cycle. The action control layer is a layer that controls the visibility action. Finally, the convergence corresponding layer suggests a corresponding system of before and after an APT attack. The administrative security domain had a security design based on organization, rule, process, and paper information. The physical security domain is designed to separate into a control layer and facility according to the threats of the control impossible and control possible. Each domain action executes visible and control steps, and is designed to have flexibility regarding security environmental changes. In this study, the framework to address an APT attack and load map will be used as an infrastructure corresponding to the next generation security.

무인항공기의 생존성을 고려한 감시정찰 임무 경로 계획 (UAV Path Planning for ISR Mission and Survivability)

  • 배민지
    • 한국산학기술학회논문지
    • /
    • 제20권7호
    • /
    • pp.211-217
    • /
    • 2019
  • 고도화되는 전장 환경에서 적진의 정보는 군사 작전을 수행하는 데 있어 중요한 요소이다. 적진의 정보를 획득하기 위한 감시정찰을 목적으로 아군의 인력 손실이 없고 저 비용으로 임무에 투입이 가능한 무인항공기(UAV; Unmanned Aerial Vehicle, 이하 무인기) 운용이 늘어나고 있다. 무인기 임무 수행 환경은 대공위협이 존재하므로 무인기가 격추되지 않고 생존성을 보장할 수 있는 임무공간이 필요하다. 임무공간을 정의하기 위해서는 형상공간(Configuration Space) 개념을 활용하며, 적진의 대공방호영역 및 무인기가 탐지할 수 있는 범위를 고려한다. 무인기는 적진의 정보를 획득하기 위해 임무에 주어진 모든 영역을 방문해야 하며, 이를 위해 커버리지 경로 계획(Coverage Path Planning)을 수행한다. 무인기에 대한 위협 및 획득할 정보의 중요도를 바탕으로 무인기가 우선적으로 방문해야 할 영역을 정의하며, 격자지도를 생성하고 각 격자에 위협 정보를 매핑하여 경로 계획에 활용한다. 본 연구에서는 격자지도에 표시된 위협정보를 바탕으로 커버리지 조건 및 경로 계획 절차를 제시하며, 탐지 효율 향상을 위해 임무공간을 확장한다. 끝으로 본 연구에서 제시한 무인기 경로계획 방법에 대한 시뮬레이션을 수행하고, 관련된 결과를 제시한다.

InVEST 모델을 이용한 서식처 가치 평가 - 제주도를 중심으로 - (Habitat Quality Valuation Using InVEST Model in Jeju Island)

  • 김태연;송철호;이우균;김문일;임철희;전성우;김준순
    • 한국환경복원기술학회지
    • /
    • 제18권5호
    • /
    • pp.1-11
    • /
    • 2015
  • Jeju Island is managed intensively in terms of environmental and ecological aspect because of its extraordinary ecosystem types comprising numerous rare, protected flora and fauna. To depict rapid change of habitat status in Jeju Island, the InVEST Habitat Quality model has been operated and compared analytically with the Eco-Natural map. The Habitat Quality map of Jeju Island is turned out to have similar inclination with Eco-Natural map. We compared the average habitat quality value in each Eco-natural map class in Jeju Island and the habitat quality value of first second third grade and non-included area decreased as 0.95 0.76, 0.53 and 0.37 in eco natural map respectively. Compared to biodiversity map based on biological investigation, the result of the InVEST habitat quality model can be simply obtained by land cover map with threat and sensitivity data. Further studies are needed to make explicit coefficients for Jeju Island and Korean peninsula, then the Habitat Quality model could be applied to past and future scenarios to analyze extent of habitat degradation in time series to help decision makers.