• Title/Summary/Keyword: 네트워크 중심전

Search Result 344, Processing Time 0.026 seconds

The Multi-Net Performance Evaluation of Link-16 in the L-Band Sharing with Radars (L-대역 내 레이더 주파수 공동사용 환경에서 멀티넷을 통한 Link-16 운용 가능성 성능 평가)

  • Choi, Seonjoo;Yu, Jepung;Lim, Jaesung;Baek, Hoki;Kim, Jaewon;Choi, Hyogi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.7
    • /
    • pp.738-746
    • /
    • 2016
  • As the trend of future war has been changed to network centric warfare, tactical data link should be needed for fast and accurate situation awareness. Nowadays, Korean air force conducts military operations by using aircrafts equipped with Link-16. The Link-16 can conduct multiple mission at the same time because it supports multi-net capability. Due to lack of frequency resource, the way to share the frequency with other systems has been studied and using L band with radar is considered as one of the candidates bands. However, the data link can be affected by the interference from radars when it shares the L-band because the L-band in Korea is already assigned to long-range detection radars. In this paper, we evaluate operational possibilities of tactical data link in the L-band based on Link-16.

Design of the homomorphic encryption system for secure data management in the future battlefield environment (미래 전장환경에서 안전한 데이터 관리를 위한 준동형 시스템 설계)

  • Cha, HyunJong;Kim, JinMook;Ryou, HwangBin
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.51-56
    • /
    • 2014
  • Be expressed in network-centric warfare, mainly battlefield environment of the future. The purpose of the system for the war of the future, is to recognize the enemy before the enemy, and rapid decision-making, to hit accurately. For this reason, it is during the construction of the integrated system of C4ISR+PGM. In such an integrated system, it is necessary to further enhance the security aspects of the information. In particular, strengthening of security leads to a decrease of efficiency. Therefore, security and efficiency should be considered together. In this study, we provide a homomorphic encryption system that can be safely managed information environment on the battlefield of the future. The proposed method uses encryption technology of homomorphic that can be the arithmetic operations on encrypted state. It has changed from the state of the encryption. Therefore, the attacker can not know a decent information.

The Case Study of Kobe City for Modeling of Healthy City (건강도시 모델 개발을 위한 고베시 사례 연구)

  • Lee, Ja-Won
    • Journal of the Korean association of regional geographers
    • /
    • v.18 no.2
    • /
    • pp.188-202
    • /
    • 2012
  • The purpose of this study is to review a good sample for a healthy city to adapt its strategy. People has interested in the urban environment and their health in the region with a step-up in income and the improvement of living conditions. They has realized that urban environment is closely related to their quality of life, concentrated on development of clean city and healthy city from the point of urban planning. The movement of healthy city has been spread out from Europe on 1986, and WHO(World Health Organization) has been supporting the practical work to improve upon the physical or social condition on each regional level. The policy of healthy city has promoted centering around each local government which is made up of networking with others globally to interchange informations. This study reviewed a successful case of Kobe city in detail and will provide further useful insights into planners in building appropriate policies.

  • PDF

Optimal Location Selection Algorithm of MSAP for Tactical Communication Networks (전술통신 환경 구축을 위한 MSAP의 최적위치 선정 알고리즘)

  • Cho, Sang-Mok;Kang, Jung-Ho;Kim, Jae-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1736-1743
    • /
    • 2011
  • In Network Centric Warfare (NCW) environment, having a tactical communication network which provides high data exchange rate is very important. In the process, Korean Army developed Mobile Subscriber Access Point (MSAP) which is based on the commercial Wireless BroadBand (Wibro). MSAP is a vehicle attached base station which provide high data exchange communication environment in a given area. Thus MSAP can provide high data exchange rate and mobility to accomplish missions in the battlefield more effectively. In this paper, we propose an operational strategy of using MSAP to provide tactical communication network in the battlefield. The idea is to find the optimal location point of the MSAP in the operational area where all the troops in the operational area can be supported by the MSAP with a minimum number of MSAP. Since the current Korean Army's basic idea of using MSAP is just distribute this MSAP to each troop, so by applying our strategy we can save MSAP devices for more flexible operation. We will show our strategy's benefits through the mathematical model and the algorithm of the presented problem.

QoS Support in the Air Defense Alternative System (방공작전 예비체계의 QoS 지원)

  • Sim, Dong-Sub;Lee, Young-Ran;Kim, Ki-Hyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.5
    • /
    • pp.903-909
    • /
    • 2010
  • ADAS is the air defense control system performing air surveillance and identification of ROK and near air. This system is self-developed by Air Force, currently operated successfully as the alternative system of MCRC. ADAS processes converting and combining transferred the real time radar data detected by radars. additionally, it displays significant radar data as producing in tracks. Then, it uses the message queue for IPC(Inter Process Communication). the various tactical data processed in the server is ultimately send to the network management process through the message queue for transmitting to the weapon director console. the weapon director receives this transmitted tactical data through the console to execute air defense operations. However, there is a problem that data packet is delayed or lost since the weapon Director does not receive as the amount of tactical data from the server overflowed with air tracks and missions increased. This paper improved the algorism to display and transmit the various tactical data processed from ADAS server to numbers of the weapon director console in the real time without any delay or lost. Improved the algorism, established at exercise, the development server in the real operation network and the weapon director console, is proved by comparing the number of sending tactical data packets in the server and receiving packets in the weapon director.

A Study on Quality Assurance of Embedded Software Source Codes for Weapon Systems by Improving the Reliability Test Process (신뢰성 시험 프로세스 개선을 통한 무기체계 내장형 소프트웨어 소스코드 품질확보에 관한 연구)

  • Kwon, Kyeong Yong;Joo, Joon Seok;Kim, Tae Sik;Oh, Jin Woo;Baek, Ji Hyun
    • Journal of KIISE
    • /
    • v.42 no.7
    • /
    • pp.860-867
    • /
    • 2015
  • In the defense field, weapon systems are increasing in importance, as well as the weight of the weapon system embedded software development as an advanced technology. As the development of a network-centric warfare has become important to secure the reliability and quality of embedded software in modern weapons systems in battlefield situations. Also, embedded software problems are transferred to the production stage in the development phase and the problem gives rise to an enormous loss at the national level. Furthermore, development companies have not systematically constructed a software reliability test. This study suggests that approaches about a qualityverification- system establishment of embedded software, based on a variety of source code reliability test verification case analysis.

A Study on Searching Stabled EMI Shielding Effectiveness Measurement Point for Military Communication Shelter Using Support Vector Machine and Process Capability Analysis (서포트 벡터 머신과 공정능력분석을 이용한 군 통신 쉘터의 EMI 차폐효과 안정 포인트 탐색 연구)

  • Ku, Ki-Beom;Kwon, Jae-Wook;Jin, Hong-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.2
    • /
    • pp.321-328
    • /
    • 2019
  • A military shelter for communication and information is necessary to optimize the integrated combat ability of weapon systems in the network centric warfare. Therefore, the military shelter is required for EMI shielding performance. This study examines the stable measurement points for EMI shielding effectiveness of a military shelter for communication and information. The measurement points were found by analyzing the EMI shielding effectiveness measurement data with data mining technique and process capability analysis. First, a support vector machine was used to separate the measurement point that has stable EMI shielding effectiveness according to set condition. Second, this process was conducted with process capability analysis. Finally, the results of data mining technique were compared with those of process capability analysis. As a result, 24 measurement points with stable EMI shielding effectiveness were found.

A Design of Risk-Based Security Threat Assessment Process for Fighter-Aircraft Airworthiness Security Certification (전투기 감항 보안 인증을 위한 위험기반 보안위협 평가 프로세스 설계)

  • Kim, Hyunju;Kang, Dongsu
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.6
    • /
    • pp.223-234
    • /
    • 2019
  • Cyber attacks are an important factor that determines the victory and defeat of Network-centric wars in which advanced weapon systems are highly interlinked. In addition the increasing dependability on software as its develop as the latest fighter is demanding enhanced security measures for fighter software to Cyber attacks. In this paper, we apply the DO-326A, which is an airworthiness security certification standard, to design a risk-based security threat assessment process by reflecting characteristics and operational environment of fighter aircraft. To do this, we add the following steps in security threat assessment stage of DO-326A's airworthiness security certification process. First, we derive security threats of fighter. And then, we scored the security threat in terms of possibility and impact on the fighter. Finally, we determine the security risk severity.

Neuroethics and Christian Education (신경윤리와 기독교교육)

  • Yu, Jae Deog
    • Journal of Christian Education in Korea
    • /
    • v.64
    • /
    • pp.145-171
    • /
    • 2020
  • Christian communities have long sought to find what type of moral judgment is appropriate and what the Christian behavior is, by taking the church's ethical norms and behavior patterns as objects of reflection. In the same context, Christian education also tried to base the psychological rationalism of J. Piaget and L. Kohlberg, but the reason-centered structural development theory was not the answer. In fact, the structural development theory, which emphasized autonomy while excluding emotions from the moral judgment process, over-emphasizing cognition or reason, eventually led to moral relativism, unlike what was intended. In addition, it was criticized for not being able to adequately elucidate the gap between human moral reasoning and behavior, and for attempting to interpret morality excessively within the context of social culture. Recently, these limitations of structural developmental theory have been reinterpreted by neuroethics, especially moral psychology theories, which claim that moral judgment ability is physically wired in the brain and relies heavily on networks between cortical and limbic system. The purpose of this paper is to review some of the newly emerged research themes of neuroethics, and then to discuss two main theories that explain morality in the perspective of neuroethics and the implications that Christian education should pay attention to.

A study on the perception of 3D virtual fashion before and after COVID-19 using textmining

  • Cho, Hyun-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.111-119
    • /
    • 2022
  • The purpose of this paper is to examine the change in perception of 3D virtual fashion before and after COVID-19 using big data analysis. The data collection period is from January 1, 2017, before the outbreak of COVID-19, to October 30, 2022, after the outbreak. Big data was collected for key words related to 3D virtual fashion extracted from social media such as Naver, Daum, Google, and YouTube using Textom. After the collected words were refined, word cloud, word frequency, connection centrality, network visualization, and CONCOR analysis were performed. As a result of extracting and analyzing 32,461 words with 3D virtual fashion as a keyword, the frequency and centrality of fashion, virtual, and technology appeared the highest, and the frequency of appearance of digital, design, clothing, utilization, and manufacturing was also high. Through this, it was found that 3D virtual fashion is being used throughout the industry along with the development of technology. In particular, the key words that stand out the most after COVID-19 are metaverse and 3D education, which are in high demand in the fashion industry.