• Title/Summary/Keyword: 비지상 네트워크

Search Result 44, Processing Time 0.021 seconds

Stabilization System for Mobile Antenna Gimbal based on Dynamic Characteristics Analysis (동특성 해석에 기반한 이동용 안테나 김발 안정화 시스템)

  • Lee, Ki-Nam;Lee, Byoung-Ho;Lee, Jeung;Kim, Jie-Eok;Song, Jae-Bok
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.37 no.7
    • /
    • pp.851-856
    • /
    • 2013
  • Recently, as the tactical environment has changedto one of network-centric warfare, where all components are connected through a network, much emphasis has been placed on the use of an artificial satellite for achieving high communication speeds. To provide a high-quality artificial satellite link, stabilization is very important in a platform. Previous stabilization control techniques used PI control, which is commonly used for vessels. However, for ground terminals that require a higher communication speed, the antenna should move faster to track an artificial satellite within a short period of time. Moreover, the terminals must be equipped with proper sensors and algorithms so that they can detect and compensate for external disturbances while tracking the artificial satellite. In this study, through the analysis of the dynamic model of an antenna system, a stabilization algorithm for ground terminals was proposed;this algorithm shows high isolation performance in the low-frequency range and includes $PI^2$ control.

DTN Routing Protocol Utilizing Underwater Channel Properties in Underwater Wireless Sensor Networks (수중 무선센서네트워크에서 수중채널의 특성을 활용한 DTN 라우팅 프로토콜)

  • Park, Seongjin;Kim, Sungryul;Yoo, Younghwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.10
    • /
    • pp.645-653
    • /
    • 2014
  • Recently, the ocean field researches such as offshore plant, ocean survey and underwater monitoring systems are garnering the attention from both academy and industry. However, the communication in underwater environment is very difficult because of the unique irregular features in water. This is the reason that the application of terrestrial protocols to the water environment is not proper. This paper proposes a routing algorithm that can enhance communication reliability by utilizing channel properties in underwater environment. We address two problems that lead to the poor communication performance, signal attenuation and multi-path problem in water. Overcoming these problems, the proposed algorithm ensures high packet delivery ratio and low transmission delay. Also, this paper evaluates the performance through simulation.

Medium Access Control Using Channel Reservation Scheme in Underwater Acoustic Sensor Networks (해양센서네트워크에서 채널예약방식을 이용한 매체접근제어)

  • Jang, Kil-Woong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.10B
    • /
    • pp.955-963
    • /
    • 2009
  • In this paper, we propose a medium access control(MAC) protocol for reducing the energy efficiency and for improving the transmission efficiency in underwater acoustic sensor networks. In underwater environment, the transmission delay is longer and bandwidth is smaller than terrestrial environment. Considering these points, we propose a new MAC protocol to enhance throughput and to manage efficiently the energy of nodes. The proposed protocol operates as a channel reservation scheme to decrease data collisions, and uses a mechanism to control the hidden node problem and the exposed node problem occurred in ad hoc networks. The proposed protocol consists of the slotted based transmission frame and reduces data collisions between nodes by putting separately the reservation period in the transmission frame. In addition, it is able to solve the hidden node problem and the exposed node problem by reservation information between nodes. We carry out the simulation to evaluate the proposed protocol in terms of the average energy consumption, the ratio of collision, throughput, and the average transmission delay, and compare the proposed protocol to a traditional MAC protocol in the underwater environment. The simulation results show that the proposed protocol outperforms the traditional protocol under a various of network parameters.

Sequence Based Anomaly Detection System for Unmanned Aerial Vehicle (시퀀스 유사도 기반 무인 비행체 이상 탐지 시스템)

  • Seo, Kang Uk;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.39-48
    • /
    • 2022
  • In this paper, we propose an anomaly detection system (ADS) to detect anomalies of the in-vehicle network for unmanned aerial vehicle (UAV). The proposed ADS detects the anomalies by measuring the similarity of status messages sequences periodically sent by the UAV to the ground control system. We defined three types of malicious message injection attacks that can be performed on the in-vehicle network of UAV and simulated those attack techniques in the Pixhawk4 quadcopter. The proposed ADS can detect abnormal sequences with accuracy of higher than 96%.

Performance Analysis of a UAV Energy Harvesting Relay Network in the Terahertz Band (테라헤르츠 대역 무인비행체 에너지 수확 릴레이 네트워크 성능분석)

  • Yeongi Cho;Saifur Rahman Sabuj;Han-Shin Jo
    • Journal of IKEEE
    • /
    • v.27 no.4
    • /
    • pp.411-417
    • /
    • 2023
  • Unmanned aerial vehicle (UAV)-assisted relay has the advantages of ease of deployment, good communication channels, and mobility over traditional terrestrial relay, which greatly improves wireless connectivity. In this paper, we design a UAV-enabled relay network that can utilize radio frequency bands to harvest energy from sources and utilize terahertz (THz) bands to transmit information between secondary transmitters and receivers. Next, we solve the optimal position of the UAV that maximizes the relay channel capacity, and propose an algorithm to design two trajectories of UAV (a straight and an elliptical trajectory) using the derived solution. Numerical results show that the straight trajectory is better in terms of harvested energy and channel capacity.

과학위성 1호 컴퓨터 시스템

  • 유상문;박홍영;곽성우;이현우;임종태
    • Bulletin of the Korean Space Science Society
    • /
    • 2003.10a
    • /
    • pp.58-58
    • /
    • 2003
  • 과학위성 1호의 컴퓨터 시스템은 지상국 명령 및 데이터 처리, 위성 자세 제어, 위성체 운용, 상태 감시, 탑재체 운용, 배터리의 충방전 제어 등을 담당하며, 우리별 3호 위성을 통하여 검증된 컴퓨터 시스템을 기반으로 개발되었다 과학위성 1호의 컴퓨터 시스템은 탑재 컴퓨터(On-board Computer)와 비행 소프트웨어(Flight Software)로 구성된다. 과학위성 1호의 탑재 컴퓨터는 우리별 3호의 탑재 컴퓨터에 비하여 FPGA를 사용함으로써 크기 및 무게의 소형화를 추구하였고, 네트워크 제어기를 내장함으로써 통신 성능의 개선을 이루었다. 그리고 EEPROM을 장착하여 위성 운용 기간 도중에 발생할 수 있는 소프트웨어의 변경에도 대응하였다 과학위성 1호의 비행 소프트웨어는 우리별 3호의 비행 소프트웨어를 기반으로 하여 과학위성 1호의 명령 및 데이터 처리 시스템과 임무에 적합하도록 개발되었다.

  • PDF

연속간행물용 한국목록규칙(안)에 대한 지상공청

  • Korean Library Association
    • KLA journal
    • /
    • v.38 no.6 s.307
    • /
    • pp.45-78
    • /
    • 1997
  • 우리 협회에서 간행된 한국목록규칙 3판(KCR3)은 국내의 기술목록수준을 국제적인 수준으로 한 단계 진전시키는 중요한 계기가 되었다고 자부합니다. 그 근거로 국제서지기술법(ISBD)을 수용하여 서지기술단위저록방식을 규정함으로써, 기술만으로 완전한 저록을 구성할 수 있게 되었으며, 특히 우리의 언어나 사고과정에 기초한 한국적 특수성을 목록규칙에 반영할 수 있었다는 점을 들 수 있습니다. 그러나 종래 KCR3은 단행본 중심의 목록규칙이라는 한계가 있었고, 따라서 연속간행물과 기타 비도서자료에 대한 기술규칙의 제정이 요구되어 왔습니다. 각종 비도서잘(비책자자료)와 네트워크자원이 대량으로 간행되는 시점에서 이들 다양한 유형의 자료를 목록에서 수용할 수 있는 통합된 목록규칙이 요구되고 있는 실정임에도 불구하고, 규칙제정에 소요되는 시간과 인력을 고려하여 우선 일차로 연속간행물용 목록규칙(안)을 내어 놓게 된 것입니다. 이 목록규칙(안)은 그 동안 2년여에 걸쳐 우리 협회 목록위원회를 중심으로 회의와 토록과정을 거친 것으로 도서관계에 종사하시는 사서 여러분의 의견을 수용하고자 하오니, 애정과 관심으로 검토해 주시고 좋은 의견을 개진해 주시길 간곡히 부탁드립니다. 목록규칙은 바로 우리 도서관인 모두가 다듬고 만들어 가야 할 책무가 있기 때문입니다. 어떤 형태의 의견이나 권고안, 수정안이라도 좋으니 여러분의 많은 관심과 협조를 기대합니다.

  • PDF

Recovering Network Joining State for Normal/Abnormal Termination of Battlefield Management System (전장관리시스템의 정상/비정상 종료 시 망 가입상태 복원)

  • Choi, YoonChang;Kwon, DongHo
    • Journal of KIISE
    • /
    • v.44 no.8
    • /
    • pp.749-759
    • /
    • 2017
  • The weapon system based on voice call can cause delay, error or damage to the message during the exchange of information. Furthermore, since the weapon system has a unique message format, it has limited data distribution. Therefore, a Korea Variable Message Format(KVMF) has been developed in this study to utilize a standard sized data format to guarantee the transmission quality and minimize the transmission amount. The ground tactical data link system quickly and accurately shares tactical information by incorporating a field management system that utilizes the KVMF standard message in the mobile weapon system. In this study, we examine the possibility of performing the mission immediately by recovering the state of network joining when a normal/abnormal termination situation of the battlefield management system occurs.

Effect of Interference in CSMA/CA Based MAC Protocol for Underwater Network (CSMA/CA 기반 수중 통신망에서 간섭의 영향 연구)

  • Song, Min-je;Cho, Ho-shin;Jang, Youn-seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1631-1636
    • /
    • 2015
  • With the advance of wireless communication technology in terrestrial area, underwater communication is also evolving very fast from a simple point-to-point transmission to an elaborate networked communications. Underwater acoustic channel has quite different features comparing with the terrestrial radio channel in terms of propagation delay, Doppler shift, multipath, and path loss. Thus, existing technologies developed for terrestrial communication might not work properly in underwater channel. Especially medium access control (MAC) protocols which highly depend on propagation phenomenon should be newly designed for underwater network. CSMA/CA has drawn lots of attention as a candidate of underwater MAC protocol, since it is able to resolve a packet collision and the hidden node problem. However, a received signal could be degraded by the interferences from the nodes locating outside the receiver's propagation radius. In this paper, we study the effects of interference on the CSMA/CA based underwater network. We derived the SNR with the interference using the sonar equation and analyzed the degradation of the RTS/CTS effects. These results are compared with the terrestrial results to understand the differences. Finally we summarized the design considerations in CSMA/CA based underwater network.

How to Identify Critical Nodes of National Infrastructure Systems in Megacities (메가시티 국가기반체계의 핵심노드 식별 방법)

  • Sim, Jun Hak;Jang, chan Kyu;Park, Sung Jun;Kim, Ki Won;Cho, Sang Keun;Park, Sang Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.531-536
    • /
    • 2022
  • Megacities are emerging all over the world and gradually becoming the center of an country. Therefore, Megacities are inevitably exposed to various threats such as existing, potential, supra-national, and non-military. In particular, as seen in the recent Ukraine-Russia war, national infrastructure systems has become a major target of enemies. However, considering the size of Megacities, various types of threats, and limited resources, it is impossible to completely protect all national infrastructure systems. Therefore, wisdom is necessary to identify and protect critical nodes. The critical node is the vital point to which the national infrastructure is connected. To this end, in this study, as a method for logically and systematically identifying critical nodes, Node centrality analysis method, which is a network theory, and the Center of Gravity analysis method, which is a military theory, were presented.