http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Two distributed guidance approaches for rendezvous of multiple agents
Jaemann Park,Je Hyun Yoo,H. JinKim 제어로봇시스템학회 2010 제어로봇시스템학회 국제학술대회 논문집 Vol.2010 No.10
Consensus refers to the agreement upon some specific variable between the agents of the system. In this paper, we adopt consensus techniques in order to derive distributed guidance laws which make multiple agents rendezvous at a desired target point. Such rendezvous maneuver can be applied to a salvo attack of multiple missiles, or cooperative surveillance of multi-UAVs. We propose two distributed rendezvous methods that use different consensus variables, namely the distance-to-go and time-to-go, in order to derive the guidance laws. We show the effectiveness of the proposed methods through numerical simulations.
Comparison of potential and viscous methods for the nonlinear ship wave problem
Jin Kim,Kwang-Soo Kim,Yoo-Chul Kim,Suak-Ho Van,Hyo-Chul Kim 대한조선학회 2011 International Journal of Naval Architecture and Oc Vol.3 No.3
The two different numerical approaches for solving the nonlinear ship wave problem are discussed in the present paper. One is based on a panel method, which neglects the viscous effects. The other is based on a finite volume method, which take into account the viscous effects by solving RANS equations. Focus is laid upon on the advantages and disadvantages of two methods. The developed methods are applied to calculating the flow around Series 60 hull to validate the performance of the present nonlinear methods. Although the two methods employ quite different numerical approaches, the calculated wave patterns from both methods show good agreements with the experiments. However the potential method simu-lates the global wave pattern accurately, while the viscous method shows better performance for the local wave prediction near a ship.
Security Threat Analysis for Remote Monitoring and Control Functions of Connected Car Services
Jin Kim,Jinho Yoo Korea Information Processing Society 2024 Journal of information processing systems Vol.20 No.2
The connected car services are one of the most widely used services in the Internet of Things environment, and they provide numerous services to existing vehicles by connecting them through networks inside and outside the vehicle. However, although vehicle manufacturers are developing services considering the means to secure the connected car services, concerns about the security of the connected car services are growing due to the increasing number of attack cases. In this study, we reviewed the research related to the connected car services that have been announced so far, and we identified the threats that may exist in the connected car services through security threat modeling to improve the fundamental security level of the connected car services. As a result of performing the test to the applications for connected car services developed by four manufacturers, we found that all four companies' applications excessively requested unnecessary permissions for application operation, and the apps did not obfuscate the source code. Additionally, we found that there were still vulnerabilities in application items such as exposing error messages and debugging information.