• Title/Summary/Keyword: Threat map

Search Result 37, Processing Time 0.023 seconds

Threat Map Generation Scheme based on Neural Network for Robot Path Planning (로봇 전역경로계획을 위한 신경망 기반 위협맵 생성 기법)

  • Kwak, Hwy-Kuen;Kim, Hyung-Jun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.7
    • /
    • pp.4482-4488
    • /
    • 2014
  • This paper proposes the creation scheme of a threat map for robot global path planning. The threat map was generated using neural network theory by analyzing the robot's armament state and the menace information of an enemy or obstacle. In addition, the performance of the suggested method was verified using the compared result of the damage amount and existing robot path data.

An Approach to Global Path Replanning Method Considering 4D Environmental Information (4D 환경정보를 반영한 광역 경로수정계획 기법에 관한 연구)

  • Kwak, Dong Jun;Shin, Jongho;Kim, Chong Hui
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.6
    • /
    • pp.779-788
    • /
    • 2016
  • In this paper, a global path replanning method is proposed in order to plan a global path minimizing the risk of the unmanned vehicle on the battlefield. We first introduce 4D environmental information consisting of mobility, visibility, kill, and hit attributes, and a unified threat map and a mobility map are defined by the four attributes. Using the mobility map, the unmanned vehicle can find the shortest path on the traversable area. And then taking into account the deterrent according to the type of the unmanned vehicle on the integrated threat map, the vehicle can generate a route to suppress or avoid the threat of enemy as well. Moreover, we present a waypoints bypassing method to exclude unnecessary waypoints rather than the mission point when planning paths for the multiple waypoints.

A Study on the Analysis and Classification of Cyber Threats Accor ding to the Characteristics of Computer Network of National·Public Organizations (국가·공공기관 전산망 특성에 따른 사이버 위협 분석 및 분류에 관한 연구)

  • Kim, Minsu;Park, Ki Tae;Kim, Jongmin
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.197-208
    • /
    • 2020
  • Based on the network infrastructure advanced in the information knowledge society, the structure of computer net work is operated by establishing the composition of network in various forms that have secured the security. In case of computer network of national/public organizations, it is necessary to establish the technical and managerial securit y environment even considering the characteristics of each organization and connected organizations. For this, the im portance of basic researches for cyber training by analyzing the technical/managerial vulnerability and cyber threats based on the classification and map of cyber threats according to the characteristics of each organization is rising. T hus, this study aims to analyze each type of external/internal cyber threats to computer network of national/public o rganizations established based on the dualistic infrastructure network of internet and national information network, a nd also to present the cyber threat framework for drawing the elements of cyber security training, by drawing and analyzing the actual elements of cyber threats through the case-based scenario.

Implementation of the DMM System for Flight Information Visualization (비행 정보 시각화를 위한 DMM 시스템의 구현)

  • Hur, Hwa Ra;Park, Myeong Chul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.3
    • /
    • pp.115-121
    • /
    • 2011
  • The flight information visualization of the aircraft is the system which is widely used to the threat against low altitude tasks and terrain altitude. But, it is difficult to implement the system because of restrictions that GPS data and huge geographic information should be stored. In this paper, it proposes economic DMM (Digital Moving Map) system for flight information visualization from open-source-base. First, the flight information is transferred from X-Plane through UDP and then demonstrated on the DMM system. In the proposed DMM system, flight information is visualized on the map information downloaded from an ArcGIS Map server using the mapping data between the present altitude of the aircraft and the terrain altitude. The result of this paper could be used an economic tool in the field of flight information visualization and the game algorithm research.

A Study on Fall Prevention System in Patient Bed

  • Cho, Youngseok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.1
    • /
    • pp.101-106
    • /
    • 2019
  • In this paper, we investigate the patient fall prevention system to prevent the patient from falling out of the bed unintentionally on the bed of the bed. Patients stay in bed for many hours of hospitalization. During the hospitalization period, patients have low controllability of the body, as compared with normal persons, and fall due to intentional movements, resulting in a fall of the patient, can be a fatal threat to the patient. Therefore, an efficient fall prevention system is required. In this paper, the distance map to the patient is generated by the distance measuring sensor on the bed of the patient, and the risk is determined by estimating the position of the patient based on the distance map. As a result, when the distance map of the dangerous area is 150 mm or more, it is determined to be dangerous, and good results are obtained.

A Development of the Autonomous Driving System based on a Precise Digital Map (정밀 지도에 기반한 자율 주행 시스템 개발)

  • Kim, Byoung-Kwang;Lee, Cheol Ha;Kwon, Surim;Jung, Changyoung;Chun, Chang Hwan;Park, Min Woo;Na, Yongcheon
    • Journal of Auto-vehicle Safety Association
    • /
    • v.9 no.2
    • /
    • pp.6-12
    • /
    • 2017
  • An autonomous driving system based on a precise digital map is developed. The system is implemented to the Hyundai's Tucsan fuel cell car, which has a camera, smart cruise control (SCC) and Blind spot detection (BSD) radars, 4-Layer LiDARs, and a standard GPS module. The precise digital map has various information such as lanes, speed bumps, crosswalks and land marks, etc. They can be distinguished as lane-level. The system fuses sensed data around the vehicle for localization and estimates the vehicle's location in the precise map. Objects around the vehicle are detected by the sensor fusion system. Collision threat assessment is performed by detecting dangerous vehicles on the precise map. When an obstacle is on the driving path, the system estimates time to collision and slow down the speed. The vehicle has driven autonomously in the Hyundai-Kia Namyang Research Center.

Revitalization Strategy of Information Security Industry Using Cognitive Map Analysis (인지지도분석을 통한 정보보호 산업 활성화전략)

  • Lee, Jung Mann;Cho, Ilgu;Rim, Myung Hwan
    • Journal of Information Technology Applications and Management
    • /
    • v.23 no.2
    • /
    • pp.177-194
    • /
    • 2016
  • This study analyzed President Park's speeches and the government's industry policy in the field of information security using cognitive map. The relationship analysis between policy tool variables and policy goal variables was employed to derive revitalization strategy of information security. This paper found that entrepreneurship revitalization has very strong causality with expansion of domestic market and global market. But, on the other hand, HR development has very weak causality with job creation and future growth driver because the labor market in the information security industry is poor and its transfer rate to other industry is very high. This study showed that this cognitive map could be characterized by a scarcity of feedback loops and a strong emphasis on the positive loops in the structure of virtuous circle. In this paper, we also constructed a comprehensive cognitive map on the policy vision of information security, showing that there are a risk of cyber threat, an opportunity of new fusion security market, information security reinforcing circle, global economic circle, and domestic market circle.

Design and Load Map of the Next Generation Convergence Security Framework for Advanced Persistent Threat Attacks

  • Lee, Moongoo
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.2
    • /
    • pp.65-73
    • /
    • 2014
  • An overall responding security-centered framework is necessary required for infringement accidents, failures, and cyber threats. On the other hand, the correspondence structures of existing administrative, technical, physical security have weakness in a system responding to complex attacks because each step is performed independently. This study will recognize all internal and external users as a potentially threatening element. To perform connectivity analysis regarding an action, an intelligent convergence security framework and road map is suggested. A suggested convergence security framework was constructed to be independent of an automatic framework, such as the conventional single solution for the priority defense system of APT of the latest attack type, which makes continuous reputational attacks to achieve its goals. This study suggested the next generation convergence security framework to have preemptive responses, possibly against an APT attack, consisting of the following five hierarchical layers: domain security, domain connection, action visibility, action control, and convergence correspondence. In the domain, the connection layer suggests a security instruction and direction in the domains of administrative, physical and technical security. The domain security layer has consistency of status information among the security domain. A visibility layer of an intelligent attack action consists of data gathering, comparison and decision cycle. The action control layer is a layer that controls the visibility action. Finally, the convergence corresponding layer suggests a corresponding system of before and after an APT attack. The administrative security domain had a security design based on organization, rule, process, and paper information. The physical security domain is designed to separate into a control layer and facility according to the threats of the control impossible and control possible. Each domain action executes visible and control steps, and is designed to have flexibility regarding security environmental changes. In this study, the framework to address an APT attack and load map will be used as an infrastructure corresponding to the next generation security.

UAV Path Planning for ISR Mission and Survivability (무인항공기의 생존성을 고려한 감시정찰 임무 경로 계획)

  • Bae, Min-Ji
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.7
    • /
    • pp.211-217
    • /
    • 2019
  • In an complicated battlefield environment, information from enemy's camp is an important factor in carrying out military operations. For obtaining this information, the number of UAVs that can be deployed to the mission without our forces' loss and at low cost is increasing. Because the mission environment has anti-aircraft weapons, mission space is needed for UAV to guarantee survivability without being killed. The concept of Configuration Space is used to define the mission space considering with range of weapons and detect range of UAV. UAV must visit whole given area to obtain the information and perform Coverage Path Planning for this. Based on threats to UAV and importance of information that will be obtained, area that UAV should visit first is defined. Grid Map is generated and mapping threat information to each grid for UAV path planning. On this study, coverage conditions and path planning procedures are presented based on the threat information on Grid Map, and mission space is expanded to improve detection efficiency. Finally, simulations are performed, and results are presented using the suggested UAV path planning method in this study.

Habitat Quality Valuation Using InVEST Model in Jeju Island (InVEST 모델을 이용한 서식처 가치 평가 - 제주도를 중심으로 -)

  • Kim, Teayeon;Song, Cholho;Lee, Woo-Kyun;Kim, Moonil;Lim, Chul-Hee;Jeon, Seong Woo;Kim, Joonsoon
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.18 no.5
    • /
    • pp.1-11
    • /
    • 2015
  • Jeju Island is managed intensively in terms of environmental and ecological aspect because of its extraordinary ecosystem types comprising numerous rare, protected flora and fauna. To depict rapid change of habitat status in Jeju Island, the InVEST Habitat Quality model has been operated and compared analytically with the Eco-Natural map. The Habitat Quality map of Jeju Island is turned out to have similar inclination with Eco-Natural map. We compared the average habitat quality value in each Eco-natural map class in Jeju Island and the habitat quality value of first second third grade and non-included area decreased as 0.95 0.76, 0.53 and 0.37 in eco natural map respectively. Compared to biodiversity map based on biological investigation, the result of the InVEST habitat quality model can be simply obtained by land cover map with threat and sensitivity data. Further studies are needed to make explicit coefficients for Jeju Island and Korean peninsula, then the Habitat Quality model could be applied to past and future scenarios to analyze extent of habitat degradation in time series to help decision makers.