• Title/Summary/Keyword: Unmanned station

Search Result 109, Processing Time 0.031 seconds

The Study on DSA of Intergrated Operating System (통합운영체계의 DSA 적용 연구)

  • Cho, Nam-Bin
    • Proceedings of the KIEE Conference
    • /
    • 2002.07d
    • /
    • pp.2322-2324
    • /
    • 2002
  • Korea Water Resources Corporation (KOWACO) operates nine hydroelectric power stations on the Han River, Nakdong River, Geum River & Seomjin River Areas. KOWACO will take the lead in improving the efficiency of water resources supply in this parer, KOWACO Generation Intergrated Operating System(GIOS) project will improve the generating plant, hydraulic structures, switchgear, and station controls, alarms and services for unmanned remote controlled operation by modern intergraed SCADA system. Mordern SCADA is used to cover all computer systems designed to perform the following main functions: - to collect data from industrial plant devices. - to process and perform calculations on the collected. - to present collected and derived data on displays on. - to accept commands entered by human operators and act on them such as sending control commands to plant devices.

  • PDF

Strategic Operation Method of Military Robot System for Future Warfare (미래 전투를 위한 군사 로봇 시스템의 전략적 운용 방법)

  • Lee, Jun-Pyo;Cho, Han-Jun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2012.01a
    • /
    • pp.169-170
    • /
    • 2012
  • 현대전에서는 인명 손실을 최소화하는 동시에 타 전투체계와의 연계를 통해 부여된 임무를 성공적으로 이끌어 내기 위해 무인로봇을 활발하게 이용하고 있다. 본 논문에서는 미래 전장에서 중심 역할을 수행할 것으로 기대되는 무인로봇과 통제장치의 기능을 제안한다. 통제장치는 디지털 지도를 기반으로 무인로봇의 위치를 전시하는 동시에 특정 위치로의 자율 이동 명령을 내리게 하는 인터페이스이다. 통제장치에서 무인로봇의 실시간 이동 간에 디지털 지도 기반 가시선(line of sight) 분석을 수행함으로써 통신 가능지역 식별 및 중계기를 통한 통신 가능 영역 식별을 용이하게 한다. 제안한 무인로봇과 통제장치를 통해 전장 환경에서 부여된 작전을 성공적으로 이끄는데 주된 역할을 수행할 것으로 기대한다.

  • PDF

3 Dimensional Augmented Reality Flight for Drones

  • Park, JunMan;Kang, KiBeom;Jwa, JeongWoo;Won, JoongHie
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.13-18
    • /
    • 2018
  • Drones are controlled by the remote pilot from the ground stations using the radio control or autonomously following the pre-programmed flight plans. In this paper, we develop a method and an optimal path search system for providing 3D augmented reality flight (ARF) images for safe and efficient flight control of drones. The developed system consisted of the drone, the ground station and user terminals, and the optimal path search server. We use the Dijkstra algorithm to find the optimal path considering the drone information, flight information, environmental information, and flight mission. We generate a 3D augmented reality flight (ARF) image overlaid with the path information as well as the drone information and the flight information on the flight image received from the drone. The ARF image for adjusting the drone is generated by overlaying route information, drone information, flight information, and the like on the image captured by the drone.

Automatic UAV Control Signal Assessment Method (UAV 제어 신호의 자동 검사 방법)

  • Kwak, Jeonghoon;Park, Jong Hyuk;Sung, Yunsick
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.679-681
    • /
    • 2016
  • 최근에 무인항공기(Unmanned Aerial Vehicle, UAV)를 재난 발생 지역과 같은 넓은 지역을 촬영하기 위해서 사용되고 있다. 촬영 비용을 낮추면서 넓은 지역을 촬영하기 위해서 자율 비행 방법이 필요하다. 예를 들어, 모터프리미티브를 기반으로 제어 신호를 UAV로 전송하여 자율 비행하는 방법이 있다. 하지만, 지상관제소(Ground Control Station, GCS)에서 UAV로 제어 신호를 전송하는 과정에서 제어 신호의 손실이 발생하면 예상한 모터프리미티브를 수행하지 못한다. 이 논문에서는 GCS에서 UAV로 송신된 제어 신호가 실행되고 있는지 검사하는 방법을 제안한다. UAV로 송신된 제어 신호의 실행 여부를 확인함으로써 예상한 모터프리미티브를 제어 신호 손실 없이 수행가능하다.

Motion Recognition Sensor-based UAV Control Signal Generation Method (모션 인식 센서 기반의 UAV 제어 신호 생성 방법)

  • Kim, Donguk;Kim, Hyeok;Sung, Yunsick
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.682-685
    • /
    • 2016
  • 최근 무인항공기(Unmanned Aerial Vehicle, UAV)가 많은 보급됨에 따라서 다양한 방법으로 이를 제어하기 위한 노력들이 이루어지고 있다. 그 중 NUI/NUX를 이용하여 UAV를 접목하려는 시도가 있다. 전통적인 NUI/NUX는 가상현실에서 시각적인 체감에 많이 의존하고 있지만 동작 인식 센서를 기반으로 가상 에이전트를 제어하는 기법들도 소개되고 있다. 이 논문에서는 모션 인식 센서인 Myo를 사용하여 UAV를 제어하는 시스템을 제안한다. 제안한 시스템은 지상 통제소(Ground Control Station, GCS)의 서브시스템이며 전통적인 드론 조종 방법과 같이 양팔로 제어하기 때문에 두 개의 Myo를 사용한다.

A Study on UAV Flight Control System HILS Test Environment (무인항공기 비행제어 HILS 시험환경 연구)

  • Byun, Jinku;Hur, Gi-Bong;Lee, KwangHyun;Suk, Jinyoung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.44 no.4
    • /
    • pp.316-323
    • /
    • 2016
  • A UAV(Unmanned Aerial Vehicle) flies along pre-programed navigation points(in-flight, take-off, or landing) automatically without pilot input. Even though UAVs fly differently from general piloted aircraft as the pilot controls the aircraft from a ground station through means of a data-link system. Occasionally, the data-link connection can be lost for any number of reasons, in which case, the FLCC(Flight control Computer) must automatically switch to autopilot to continue flying. Hence, the FLCC is a flight-critical component that must be throughly tested and validated. This paper discusses the development of a HILS(Hardware in the Loop Simulation) test environment designed to simulate real flight conditions to verify the FLCC satisfies flying quality requirements and maintains robustness despite any potential malfunctions or emergency situations.

Security Threats and Scenarios using Drones on the Battlefield (전장에서 드론을 활용한 보안 위협과 시나리오)

  • Park, Keun-Seog;Cheon, Sang-pil;Kim, Seong-Pyo;Eom, Jung-ho
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.73-79
    • /
    • 2018
  • Since 1910s, the drones were mainly used for military purposes for reconnaissance and attack targets, but they are now being used in various fields such as disaster prevention, exploration, broadcasting, and surveillance of risk areas. As drones are widely used from military to civilian field, hacking into the drones such as radio disturbance, GPS spoofing, hijacking, etc. targeting drones has begun to occur. Recently, the use of drones in hacking into wireless network has been reported. If the artificial intelligence technology is applied to the drones in the military, hacking into unmanned combat system using drones will occur. In addition, a drone with a hacking program may be able to relay a hacking program to the hacking drone located far away, just as a drone serves as a wireless communication station. And the drones will be equipped with a portable GPS jamming device, which will enable signal disturbance to unmanned combat systems. In this paper, we propose security threats and the anticipated hacking scenarios using the drones on the battlespace to know the seriousness of the security threats by hacking drones and prepare for future cyberspace.

  • PDF

A Study On Performance Evaluation of Cryptographic Module and Security Functional Requirements of Secure UAV (보안 UAV를 위한 암호모듈의 성능평가와 보안성 평가 방법에 대한 연구)

  • Kim, Yongdae;Kim, Deokjin;Yi, Eunkyoung;Lee, Sangwook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.737-750
    • /
    • 2022
  • The demands of Unmanned Aerial Vehicles (UAVs) are growing very rapidly with the era of the 4th industrial revolution. As the technology of the UAV improved with the development of artificial intelligence and semiconductor technology, it began to be used in various civilian fields such as hobbies, bridge inspections, etc from being used for special purposes such as military use. MAVLink (Macro Air Vehicle Link), which started as an open source project, is the most widely used communication protocol between UAV and ground control station. However, MAVLink does not include any security features such as encryption/decryption mechanism, so it is vulnerable to various security threats. Therefore, in this study, the block cipher is implemented in UAV to ensure confidentiality, and the results of the encryption and decryption performance evaluation in the UAV according to various implementation methods are analyzed. In addition, we proposed the security requirements in accordance with Common Criteria, which is an international recognized ISO standard.

Implementation of ROS-Based Intelligent Unmanned Delivery Robot System (ROS 기반 지능형 무인 배송 로봇 시스템의 구현)

  • Seong-Jin Kong;Won-Chang Lee
    • Journal of IKEEE
    • /
    • v.27 no.4
    • /
    • pp.610-616
    • /
    • 2023
  • In this paper, we implement an unmanned delivery robot system with Robot Operating System(ROS)-based mobile manipulator, and introduce the technologies employed for the system implementation. The robot consists of a mobile robot capable of autonomous navigation inside the building using an elevator and a Selective Compliance Assembly Robot Arm(SCARA)-Type manipulator equipped with a vacuum pump. The robot can determines the position and orientation for picking up a package through image segmentation and corner detection using the camera on the manipulator. The proposed system has a user interface implemented to check the delivery status and determine the real-time location of the robot through a web server linked to the application and ROS, and recognizes the shipment and address at the delivery station through You Only Look Once(YOLO) and Optical Character Recognition(OCR). The effectiveness of the system is validated through delivery experiments conducted within a 4-story building.

A Study on the Authenticity Verification of UxNB Assisting Terrestrial Base Stations

  • Kim, Keewon;Park, Kyungmin;Kim, Jonghyun;Park, Tae-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.131-139
    • /
    • 2022
  • In this paper, to verify the authenticity of UxNB that assists terrestrial base stations, the solutions for SI (System Information) security presented in 3GPP TR 33.809 are analyzed from the perspective of UxNB. According to the definition of 3GPP (Third Generation Partnership Project), UxNB is a base station mounted on a UAV (Unmanned Aerial Vehicle), is carried in the air by the UAV, and is a radio access node that provides a connection to the UE (User Equipment). Such solutions for SI security can be classified into hash based, MAC (Message Authentication Codes) based, and digital signature based, and a representative solution for each category is introduced one by one. From the perspective of verifying the authenticity of UxNB for each solution, we compare and analyze the solutions in terms of provisioning information and update, security information leakage of UxNB, and additionally required amount of computation and transmission. As a result of the analysis, the solution for verifying the authenticity of the UxNB should minimize the secret information to be stored in the UxNB, be stored in a secure place, and apply encryption when it is updated over the air. In addition, due to the properties of the low computing power of UxNB and the lack of power, it is necessary to minimize the amount of computation and transmission.