يعرض 1 - 10 نتائج من 388 نتيجة بحث عن '"Kim, Jongsung"', وقت الاستعلام: 0.95s تنقيح النتائج
  1. 1
    دورية أكاديمية
  2. 2
    دورية أكاديمية

    الوصف: With the increasing popularity of autonomous vehicles, the maritime industry has focused on the development of Maritime Autonomous Surface Ships (MASS). An essential aspect of autonomous ships is their ability to follow a predetermined path at sea, as deviations from this path can jeopardize navigational safety, leading to accidents like collisions and grounding incidents. Therefore, ensuring that autonomous ships can safely navigate by following predefined routes is of utmost importance. Simultaneously, the implementation of the Energy Efficiency Design Index (EEDI) by the International Maritime Organization (IMO) has raised interest in a ship's manoeuvring performance in adverse sea conditions, aiming to reduce greenhouse gas emissions. The Marine Environment Protection Committee (MEPC) has provided guidelines to determine the minimum propulsion power required to maintain ship manoeuvrability in adverse conditions. This study investigates the path-following performance of a ship operating at low forward speeds in adverse weather conditions using a free-running Computational Fluid Dynamics (CFD) model, enabling accurate prediction of manoeuvring behaviour. The numerical results emphasise the significance of low forward speeds in enabling a ship to follow a predetermined route, offering valuable insights into path-following performance with minimum propulsion power in adverse weather. The study reveals that increasing propulsive power reduces deviations from the predetermined route when the ship encounters bow and beam waves. However, the impact of propulsion power on deviation is negligible in quartering waves during path-following control. This research contributes to improving guidelines for minimum ship powering, ensuring safe autonomous navigation in adverse weather conditions.

    وصف الملف: text

    العلاقة: https://eprints.soton.ac.uk/482122/1/Manuscript_clean_version_.docxTest; Kim, Daejeong, Yim, Jeongbin, Song, Soonseok, Park, Jun-Bum, Kim, Jongsung, Yu, Yongung, Elsherbiny, Khaled and Tezdogan, Tahsin (2023) Path-following control problem for maritime autonomous surface ships (MASS) in adverse weather conditions at low speeds. Ocean Engineering, 287 (2), [115860]. (doi:10.1016/j.oceaneng.2023.115860 ).

  3. 3
    دورية أكاديمية
  4. 4
    كتاب

    المصدر: The Routledge International Handbook of Life and Values Education in Asia ; page 570-577 ; ISBN 9781003352471

  5. 5
    دورية أكاديمية

    المساهمون: Institute for Information and Communications Technology Promotion

    المصدر: IEEE Internet of Things Journal ; page 1-1 ; ISSN 2327-4662 2372-2541

  6. 6
    دورية أكاديمية
  7. 7
    دورية أكاديمية
  8. 8
    دورية أكاديمية
  9. 9
    دورية أكاديمية

    المساهمون: National Research Foundation of Korea, Ministry of Trade, Industry and Energy

    المصدر: ACS Applied Nano Materials ; volume 7, issue 6, page 6636-6649 ; ISSN 2574-0970 2574-0970

  10. 10
    دورية أكاديمية

    مصطلحات موضوعية: Computer Science - Cryptography and Security

    الوصف: Among the many types of malicious codes, ransomware poses a major threat. Ransomware encrypts data and demands a ransom in exchange for decryption. As data recovery is impossible if the encryption key is not obtained, some companies suffer from considerable damage, such as the payment of huge amounts of money or the loss of important data. In this paper, we analyzed Hive ransomware, which appeared in June 2021. Hive ransomware has caused immense harm, leading the FBI to issue an alert about it. To minimize the damage caused by Hive Ransomware and to help victims recover their files, we analyzed Hive Ransomware and studied recovery methods. By analyzing the encryption process of Hive ransomware, we confirmed that vulnerabilities exist by using their own encryption algorithm. We have recovered the master key for generating the file encryption key partially, to enable the decryption of data encrypted by Hive ransomware. We recovered 95% of the master key without the attacker's RSA private key and decrypted the actual infected data. To the best of our knowledge, this is the first successful attempt at decrypting Hive ransomware. It is expected that our method can be used to reduce the damage caused by Hive ransomware.