• Title/Summary/Keyword: 네트워크 중심전

Search Result 347, Processing Time 0.023 seconds

Development of Information Technology for Smart Defense (Smart Defense 를 위한 IT 기술 개발)

  • Chung, Kyo-Il;Lee, So Yeon;Park, Sangjoon;Park, Jonghyun;Han, Sang-Cheol
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.38 no.3
    • /
    • pp.323-328
    • /
    • 2014
  • Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication & Computer, Intelligence), ISR(Intelligence, Surveillance & Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

Recovering Network Joining State for Normal/Abnormal Termination of Battlefield Management System (전장관리시스템의 정상/비정상 종료 시 망 가입상태 복원)

  • Choi, YoonChang;Kwon, DongHo
    • Journal of KIISE
    • /
    • v.44 no.8
    • /
    • pp.749-759
    • /
    • 2017
  • The weapon system based on voice call can cause delay, error or damage to the message during the exchange of information. Furthermore, since the weapon system has a unique message format, it has limited data distribution. Therefore, a Korea Variable Message Format(KVMF) has been developed in this study to utilize a standard sized data format to guarantee the transmission quality and minimize the transmission amount. The ground tactical data link system quickly and accurately shares tactical information by incorporating a field management system that utilizes the KVMF standard message in the mobile weapon system. In this study, we examine the possibility of performing the mission immediately by recovering the state of network joining when a normal/abnormal termination situation of the battlefield management system occurs.

Military Routing Scheme Using Content-Centric Mobile Ad Hoc Networks (콘텐츠 중심 MANET을 이용한 군 통신 라우팅 기법)

  • Park, Heungsoon;Kwon, Taewook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.4
    • /
    • pp.334-342
    • /
    • 2014
  • Military communications for future warfare have limited resources but highly requirements. MANET has a lot of advantages for future military network due to easily deploying without infrastructure and supporting dynamic topology in restricted environments. But, one of the biggest issues for MANET is difficulty of transmitting data due to link failure in dynamic topology. Content Centric Networking is a future Internet paradigm which solves various IP network problem. In this paper, we propose a future military communication routing scheme using CCN in military tactical MANET. Simulation results show our scheme gets lower control message overhead and faster data downloads as number of node increases and mobile speed increases than other two schemes.

The Extended-Military Multimedia Systems Based on Real-Time Scheduling Scheme (실시간 스케줄링을 적용한 Extended-Military Multimedia Systems)

  • Park, Sang-Hyuk;Kim, Jai-Hoon;Han, Chang-Hee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.1
    • /
    • pp.26-32
    • /
    • 2011
  • It is very important for more effective military operation to share information required in recognizing a situation by monitoring battlefield. The recognition of situations is offered visually though multi-media systems such as a COP(Common Operation Picture), UAV etc. The operating method has rapidly changed into Network-Centric Warfare (NCW). As a result, the data that these Multimedia systems should control is increasing. Improved performance of Multimedia systems is required to deal with them. In this paper, we propose Extended-Military Multimedia System(E-MMS) applying the most excellent scheduling method in terms of meet-ratio in real time when Multimedia systems carry out assigned information in real time for monitoring as the method of improved performance. As a result of utility about proposed system, it is verified that realtime EDF(Earliest Deadline First) scheduling method is more improved up to 20% compared to non-realtime FCFS(First Come First Service) in terms of the deadline meet ratio.

A Leverage Strategy of the Cyber warfare Security Policy Based on systems Thinking (시스템 사고를 이용한 사이버전 보안 정책 레버리지 전략 연구)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Park, Ho-Kyun;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.77-83
    • /
    • 2013
  • As the network composed of numerous sensor nodes, sensor network conducts the function of sensing the surrounding information by sensor and of the sensed information. The concept of the battlefield is also changing to one that includes not only physical spaces but all areas including the networks of the nation's key industries and military facilities, energy facilities, transportation, and communication networks. In light of the changing warfare in terms of how it is conducted and what form it takes, the Korea military has to seek ways to effectively respond to threats of cyber warfare. In the past, although partial strategies on cyber warfare were studied, no research was done through the overall system flow. In this paper, key variables related to cyber warfare security are classified into personnel, management, and technology. A simple model and an extended model are suggested for each area, and based on the technology area of the extended model, formal methods are used to verify the validity and a detailed response strategy is suggested according to the identified leverage.

A CSMA/CA with Binary Exponential Back-off based Priority MAC Protocol in Tactical Wireless Networks (전술 무선망에서 2진 지수 백오프를 사용하는 CSMA/CA 기반 우선순위 적용 MAC 프로토콜 설계)

  • Byun, Ae-Ran;Son, Woong;Jang, Youn-Seon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.11
    • /
    • pp.12-19
    • /
    • 2015
  • In network-centric warfare, the communication network has played a significant role in defeating an enemy. Especially, the urgent and important data should be preferentially delivered in time. Thus, we proposed a priority MAC protocol based on CSMA/CA with Binary Exponential Back-off for tactical wireless networks. This MAC protocol suggested a PCW(Prioritized Contention Window) with differentiated back-off time by priority and a RBR(Repetitive Back-off Reset) to reset the remaining back-off time. The results showed that this proposed MAC has higher performance than those of DCF(Distributed Coordination Function) in the transmission success rate and the number of control packet transmission by reducing the packet collision. Thus, it produced more effective power consumption. In comparison with DCF, this proposed protocol is more suitable in high-traffic network.

An Analytical Study on Research Trends of Collection Development and Management (장서개발관리 분야 최근 연구동향 분석에 대한 연구)

  • Shin, You Mi;Park, Ok Nam
    • Journal of the Korean Society for information Management
    • /
    • v.36 no.2
    • /
    • pp.105-131
    • /
    • 2019
  • The purpose of this study is to investigate the development direction of future scholarship by analyzing recent research trends in collection development and management field using keyword network analysis. Data was collected from four journals in library and information science field during period of 2003 to 2017. Related articles of Collection Development and Management field were retrieved, and author keywords were extracted from selected papers. Keyword network analysis using NetMiner4 program was performed based on frequency analysis, connection-centered analysis, and parametric analysis. The analysis covers all sections from 2003 to 2017 to look at the changes in research over time, and three sections on five-year basis. As a result, main keywords such as 'open access', 'institutional repository' and 'academic journals' were identified, and topics to be continuously researched were identified.

Establish Marketing Strategy Using Analysis of Local Currency App User Reviews -Focused on 'Dongbackjeon' and 'Incheoneum' (지역화폐 앱 사용자 리뷰 분석을 통한 마케팅 전략 수립 - '동백전'과 '인천e음'을 중심으로)

  • Lee, Sae-Mi;Lee, Taewon
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.4
    • /
    • pp.111-122
    • /
    • 2021
  • This study analyzed user reviews of Dongbaekjeon and Incheoneum app, which are representative local currencies in Korea, to identify the positive/negative factors of local currency users, and established a marketing strategy based on this. App user reviews were classified into positive and negative based on the star rating, and word cloud, topic modeling, and social network analysis were performed, respectively. As a result, in the negative reviews of Dongbaekjeon and Incheoneum, dissatisfaction with app use and card issuance appeared in common. In positive reviews, keywords such as 'local economy' and 'small business owners' along with satisfaction with 'cashback' appeared. It means that local currency users perceived that their consumption support local economy, and they felt satisfaction in using local currency. Based on the satisfaction/dissatisfaction factors identified as a result of the analysis of this study, we identified what needs to be improved and to be strengthened, and appropriate marketing strategies were established. The text mining method used in this study and research results can provide meaningful information about local currencies to public officials and marketers in charge of local currencies.

Analysis of Globalization After COVID-19 Based on Network (네트워크 기반 코로나바이러스감염증-19 이후 세계화 분석)

  • Ryu, Jea Woon;Kim, Hak Yong
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.6
    • /
    • pp.62-70
    • /
    • 2021
  • 2020 was a year in which the world spent in disorder due to the pandemic of Coronavirus infection-19(COVID-19). The pandemic was at the beginning of a turning point in history. For examples, the Black Death(Pest) that destroyed the feudal system of medieval Europe in the 14th century, smallpox that led to the destruction of the Inca Empire by Spain in the 17th century, and the Spanish flu that ended World War I early. The great transformation that will come after COVID-19 is presented from various fields and perspectives, but the understanding and direction of the transformation is ambiguous. This study attempts to derive and to analyze core terms based on a network of the future of globalization after COVID-19. Four Networks related to globalization, anti-globalization, and globalization and digitalization after COVID-19 were established respectively. A network integrating four networks was also constructed. The core terms were extracted from the hub nodes, the stress centrality, and the simplified network to which the K-core algorithm was applied. After COVID-19, the changes in globalization were analyzed from the extracted core terms. This study is thought to be meaningful to propose a method of deriving and analyzing core terms based on a network in understanding social changes after COVID-19.

A Study on the Design of an Underwater Distributed Sensor Network for the Shallow Water by An Effectiveness Analysis (효과도 분석을 통한 천해용 수중분산 센서망 설계 연구)

  • Kim, Wan-Jin;Bae, Ho Seuk;Kim, Woo Shik;Lee, Sang Kug;Choi, Sang Moon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.5
    • /
    • pp.591-603
    • /
    • 2014
  • In this paper, we have described the characteristics of the Underwater Distributed Sensor Network (UDSN) and proposed the conceptual design guideline by an effectiveness analysis. To perform the effectiveness analysis, we defined an battlefield environment, and then analyzed principal components which compose the UDSN to find out simulation parameters and system constraints. We have chosen a measure of effectiveness based on a target trajectory, which could enhance intuitive understanding about current status, and performed various simulations to reveal critical design parameters in terms of sensor node types, arrangement, cost and combination of detection information.