• Title/Summary/Keyword: Communication capability

Search Result 1,011, Processing Time 0.032 seconds

Comparison of the Priority of Required Capabilities of the Warrior Platform by the Types of Military Unit through AHP Analysis (AHP 분석을 통한 부대 임무유형별 워리어플랫폼 요구능력 우선순위 비교)

  • Kim, Wukki;Shin, Kyuyong;Jo, Seongsik;Baek, Seungho;Kim, Yongchul
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.6
    • /
    • pp.262-269
    • /
    • 2021
  • The Ministry of National Defense is re-establishing the role of the Army in accordance with the defense reform and is promoting the Warrior Platform, a next-generation individual combat system. The Warrior Platform project is divided into three stages and is being promoted. In the first stage, the quality and performance of individual items are improved, in the second stage, items between system development are integrated, and in the third stage, the combat capability is maximized by developing an integrated unit weapon system. In this paper, detailed sub-items for the five essential required competencies (survival, lethality, mobility, sustainability, Communication) that are considered for building an effective warrior platform are presented. We also present a plan that can be used to prepare a specific master plan for the Army's Warrior Platform project by using Analytic Hierarchy Process(AHP) and selecting the priority of the five required capabilities and detailed sub-items for different unit types. As a result of analyzing the priorities of the four types of units with different mission types, we find that there are differences for each unit. These results are expected to be used as useful reference materials for setting the future direction for the development of warrior platform.

Analysis of Distributed Computational Loads in Large-scale AC/DC Power System using Real-Time EMT Simulation (대규모 AC/DC 전력 시스템 실시간 EMP 시뮬레이션의 부하 분산 연구)

  • In Kwon, Park;Yi, Zhong Hu;Yi, Zhang;Hyun Keun, Ku;Yong Han, Kwon
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.8 no.2
    • /
    • pp.159-179
    • /
    • 2022
  • Often a network becomes complex, and multiple entities would get in charge of managing part of the whole network. An example is a utility grid. While the entire grid would go under a single utility company's responsibility, the network is often split into multiple subsections. Subsequently, each subsection would be given as the responsibility area to the corresponding sub-organization in the utility company. The issue of how to make subsystems of adequate size and minimum number of interconnections between subsystems becomes more critical, especially in real-time simulations. Because the computation capability limit of a single computation unit, regardless of whether it is a high-speed conventional CPU core or an FPGA computational engine, it comes with a maximum limit that can be completed within a given amount of execution time. The issue becomes worsened in real time simulation, in which the computation needs to be in precise synchronization with the real-world clock. When the subject of the computation allows for a longer execution time, i.e., a larger time step size, a larger portion of the network can be put on a computation unit. This translates into a larger margin of the difference between the worst and the best. In other words, even though the worst (or the largest) computational burden is orders of magnitude larger than the best (or the smallest) computational burden, all the necessary computation can still be completed within the given amount of time. However, the requirement of real-time makes the margin much smaller. In other words, the difference between the worst and the best should be as small as possible in order to ensure the even distribution of the computational load. Besides, data exchange/communication is essential in parallel computation, affecting the overall performance. However, the exchange of data takes time. Therefore, the corresponding consideration needs to be with the computational load distribution among multiple calculation units. If it turns out in a satisfactory way, such distribution will raise the possibility of completing the necessary computation in a given amount of time, which might come down in the level of microsecond order. This paper presents an effective way to split a given electrical network, according to multiple criteria, for the purpose of distributing the entire computational load into a set of even (or close to even) sized computational loads. Based on the proposed system splitting method, heavy computation burdens of large-scale electrical networks can be distributed to multiple calculation units, such as an RTDS real time simulator, achieving either more efficient usage of the calculation units, a reduction of the necessary size of the simulation time step, or both.

A Study on Multicultural Mentor's Capacity (다문화 멘토의 역량에 관한 연구)

  • Park, Misuk
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.3
    • /
    • pp.879-888
    • /
    • 2017
  • The purpose of this study is to explore the competence needed to be possessed by multicultural mentors, and offer an education program for the competence development of mentors. From June to September of the year 2016 in-depth interviews were conducted with 10 mentors who have participated in multicultural mentoring for over a year concentrating on the result of their participation in the mentoring. The interview contents were transcribed, then analyzed into learning competence, psychological competence, social competence as well as cultural competence. The result of the analysis is as follows. First, the learning competence needed for mentors are intellectual capability and teaching skills needed when teaching mentors. Second, the psychological competence consists of the attitude of attentively listening to mentees and advising them. Third, the social competence is conversation skills, communication techniques and leadership. Fourth, the cultural competence consists of recognizing diversity and the ability to manage the mentee's situation. Based on the analysis of this result, educational plans for enhancing mentor's capacity are as follows: First, education for mentors is necessary before they will begin mentoring. Second, it is necessary to provide a place for mentors' self-reflection. Third, it is for mentors to receive regular counseling. This study will become a basic research to reinforce the effectiveness of mentoring and reconsider the importance of mentor's capacity.

Urban Runoff Network Flow Velocity Monitoring System Using Ubiquitous Technique and GIS (Ubiquitous 기술과 GIS를 이용한 도시배수관망 유속측정 시스템 개발)

  • Choi, Changwon;Yi, Jaeeung
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.30 no.5B
    • /
    • pp.479-486
    • /
    • 2010
  • Reliable hydrologic data acquisition is the basic and essential requirement for efficient water management. Especially the acquisition of various stream data in a certain location is very important to construct on alarm system to response an urban flood which occurs frequently due to the effect of climate change. Although the frequency of stream inundation flood occurrence becomes low owing to the consistent stream improvement, the urban flood due to the drainage system problems such as deterioration and bad management occurs continuously. The consistent management and current status understanding of the urban drainage system is essential to reduce the urban flood. The purpose of this study is to develop the urban runoff network flow velocity monitoring system which has the capability of collecting stream data whenever, wherever and to whomever without expert knowledge using Code Division Multiple Access technique and Bluetooth near-distance wireless communication technique. The urban runoff network flow velocity monitoring system consists of three stages. In the first stage, the stream information obtained by using ubiquitous floater is transferred to the server computer. In the second stage, the current state of the urban drainage system is assessed through the server computer. In the last stage, the information is provided to the user through a GUI. As a result of applying, the developed urban runoff network flow velocity monitoring system to Woncheon-Stream in Suwon, the information necessary for urban drainage management can be managed in real time.

Mobile Contents Transformation System Research for Personalization Service (개인화 서비스를 위한 모바일 콘텐츠 변환 시스템 연구)

  • Bae, Jong-Hwan;Cho, Young-Hee;Lee, Jung-Jae;Kim, Nam-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.119-128
    • /
    • 2011
  • The Sensor technology and portable device capability able to collect recent user information and the information about the surrounding environment haven been highly developed. A user can be made use of various contents and the option is also extending with this technology development. In particular, the initial portable device had simply a call function, but now that has evolved into 'the 4th screen' which including movie, television, PC ability. also, in the past, a portable device to provided only the services of a SMS, in recent years, it provided to interactive video service, and it include technology which providing various contents. Also, it is rising as media which leading the consumption of contents, because it can be used anytime, anywhere. However, the contents available for the nature of user's handheld devices are limited. because it is very difficult for making the contents separately according to various device specification. To find a solution to this problem, the study on one contents from several device has been progressing. The contents conversion technology making use of the profile of device out of this study comes to the force and profile study has been progressing for this. Furthermore, Demand for a user is also increased and the study on the technology collecting, analyzing demands has been making active progress. And what is more, Grasping user's demands by making use of this technology and the study on the technology analyzing, providing contents has been making active progress as well. First of all, there is a method making good use of ZigBee, Bluetooth technology about the sensor for gathering user's information. ZigBee uses low-power digital radio for wireless headphone, wireless communication network, and being utilized for smart energy, automatic home system, wireless communication application and wireless sensor application. Bluetooth, as industry standards of PAN(Personal Area Networks), is being made of use of low power wireless device for the technology supporting data transmission such as drawing file, video file among Bluetooth device. With analyzing the collected information making use of this technology, it utilizes personalized service based on network knowledge developed by ETRI to service contents tailor-made for a user. Now that personalized service builds up network knowledge about user's various environments, the technology provides context friendly service constructed dynamically on the basis of this. The contents to service dynamically like this offer the contents that it converses with utilizing device profile to working well. Therefore, this paper suggests the system as follow. It collects the information, for example of user's sensitivity, context and location by using sensor technology, and generates the profile as a means of collected information as sensor. It collects the user's propensity to the information by user's input and event and generates profile in the same way besides the gathered information by sensor. Device transmits a generated profile and the profile about a device specification to proxy server. And proxy server transmits a profile to each profile management server. It analyzes profile in proxy server so that it selects the contents user demand and requests in contents server. Contents server receives a profile of user portable device from device profile server and converses the contents by using this. Original source code of contents convert into XML code using the device profile and XML code convert into source code available in user portable device. Thus, contents conversion process is terminated and user friendly system is completed as the user transmits optimal contents for user portable device.

Edge to Edge Model and Delay Performance Evaluation for Autonomous Driving (자율 주행을 위한 Edge to Edge 모델 및 지연 성능 평가)

  • Cho, Moon Ki;Bae, Kyoung Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.1
    • /
    • pp.191-207
    • /
    • 2021
  • Up to this day, mobile communications have evolved rapidly over the decades, mainly focusing on speed-up to meet the growing data demands of 2G to 5G. And with the start of the 5G era, efforts are being made to provide such various services to customers, as IoT, V2X, robots, artificial intelligence, augmented virtual reality, and smart cities, which are expected to change the environment of our lives and industries as a whole. In a bid to provide those services, on top of high speed data, reduced latency and reliability are critical for real-time services. Thus, 5G has paved the way for service delivery through maximum speed of 20Gbps, a delay of 1ms, and a connecting device of 106/㎢ In particular, in intelligent traffic control systems and services using various vehicle-based Vehicle to X (V2X), such as traffic control, in addition to high-speed data speed, reduction of delay and reliability for real-time services are very important. 5G communication uses high frequencies of 3.5Ghz and 28Ghz. These high-frequency waves can go with high-speed thanks to their straightness while their short wavelength and small diffraction angle limit their reach to distance and prevent them from penetrating walls, causing restrictions on their use indoors. Therefore, under existing networks it's difficult to overcome these constraints. The underlying centralized SDN also has a limited capability in offering delay-sensitive services because communication with many nodes creates overload in its processing. Basically, SDN, which means a structure that separates signals from the control plane from packets in the data plane, requires control of the delay-related tree structure available in the event of an emergency during autonomous driving. In these scenarios, the network architecture that handles in-vehicle information is a major variable of delay. Since SDNs in general centralized structures are difficult to meet the desired delay level, studies on the optimal size of SDNs for information processing should be conducted. Thus, SDNs need to be separated on a certain scale and construct a new type of network, which can efficiently respond to dynamically changing traffic and provide high-quality, flexible services. Moreover, the structure of these networks is closely related to ultra-low latency, high confidence, and hyper-connectivity and should be based on a new form of split SDN rather than an existing centralized SDN structure, even in the case of the worst condition. And in these SDN structural networks, where automobiles pass through small 5G cells very quickly, the information change cycle, round trip delay (RTD), and the data processing time of SDN are highly correlated with the delay. Of these, RDT is not a significant factor because it has sufficient speed and less than 1 ms of delay, but the information change cycle and data processing time of SDN are factors that greatly affect the delay. Especially, in an emergency of self-driving environment linked to an ITS(Intelligent Traffic System) that requires low latency and high reliability, information should be transmitted and processed very quickly. That is a case in point where delay plays a very sensitive role. In this paper, we study the SDN architecture in emergencies during autonomous driving and conduct analysis through simulation of the correlation with the cell layer in which the vehicle should request relevant information according to the information flow. For simulation: As the Data Rate of 5G is high enough, we can assume the information for neighbor vehicle support to the car without errors. Furthermore, we assumed 5G small cells within 50 ~ 250 m in cell radius, and the maximum speed of the vehicle was considered as a 30km ~ 200 km/hour in order to examine the network architecture to minimize the delay.

A Study on a Effect of Product Design and a Primary factor of Qualify Competitiveness (제품 디자인의 파급효과와 품질경쟁력의 결정요인에 관한 연구)

  • Lim, Chae-Suk;Yoon, Jong-Young
    • Archives of design research
    • /
    • v.18 no.4 s.62
    • /
    • pp.95-104
    • /
    • 2005
  • The purpose of this study is to estimate the determinants of product design and analyze the impacts of product design on quality competitiveness, product reliability, and consumer satisfaction in an attempt to provide a foundation for the theory of design management. For this empirical analysis, this study has derived the relevant measurement variables from a survey on 400 Korean manufacturing firms during the period of $August{\sim}October$ 2003. The empirical findings are summarized as follows: First, the determinants of product design are very significantly (at p<0.001) estimated to be the R&D capability, the level of R&D expenditure, the level of innovative activities(5S, TQM, 6Sigma, QC, etc.). This empirical result can support Pawar and Driva(1999)'s two principles by which the performance of product design and product development can be simultaneously evaluated in the context of CE(concurrent engineering) of NPD(newly product development) activities. Second, the hypothesis on the causality: product design${\rightarrow}$quality competitiveness${\rightarrow}$customer satisfaction${\rightarrow}$customer loyalty is very significantly (at p<0.001) accepted. This implies that product design positively affects consumer satisfaction, not directly but indirectly, by influencing quality competitiveness. This empirical result of this study can also support the studies of for example Flynn et al.(1994), Ahire et at.(1996), Afire and Dreyfus(2000) which conclude that design management is a significant determinant of product quality. The aforementioned empirical results are important in the following sense: the empirical result that quality competitiveness plays a bridging role between product design and consumer satisfaction can reconcile the traditional debate between QFD(quality function development) approach asserted by product developers and conjoint analysis maintained by marketers. The first empirical result is related to QFD approach whereas the second empirical result is related to conjoint analysis. At the same time, the empirical results of this study can support the rationale of design integration(DI) of Ettlie(1997), i.e., the coordination of the timing and substance of product development activities performed by the various disciplines and organizational functions of a product's life cycle. Finally, the policy implication (at the corporate level) from the empirical results is that successful design management(DM) requires not only the support of top management but also the removal of communication barriers, (i.e. the adoption of cross-functional teams) so that concurrent engineering(CE), the simultaneous development of product and process designs can assure product development speed, design quality, and market success.

  • PDF

Factors Affecting the Implementation Success of Data Warehousing Systems (데이터 웨어하우징의 구현성공과 시스템성공 결정요인)

  • Kim, Byeong-Gon;Park, Sun-Chang;Kim, Jong-Ok
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2007.05a
    • /
    • pp.234-245
    • /
    • 2007
  • The empirical studies on the implementation of data warehousing systems (DWS) are lacking while there exist a number of studies on the implementation of IS. This study intends to examine the factors affecting the implementation success of DWS. The study adopts the empirical analysis of the sample of 112 responses from DWS practitioners. The study results suggest several implications for researchers and practitioners. First, when the support from top management becomes great, the implementation success of DWS in organizational aspects is more likely. When the support from top management exists, users are more likely to be encouraged to use DWS, and organizational resistance to use DWS is well coped with increasing the possibility of implementation success of DWS. The support of resource increases the implementation success of DWS in project aspects while it is not significantly related to the implementation success of DWS in organizational aspects. The support of funds, human resources, and other efforts enhances the possibility of successful implementation of project; the project does not exceed the time and resource budgets and meet the functional requirements. The effect of resource support, however, is not significantly related to the organizational success. The user involvement in systems implementation affects the implementation success of DWS in organizational and project aspects. The success of DWS implementation is significantly related to the users' commitment to the project and the proactive involvement in the implementation tasks. users' task. The observation of the behaviors of competitors which possibly increases data quality does not affect the implementation success of DWS. This indicates that the quality of data such as data consistency and accuracy is not ensured through the understanding of the behaviors of competitors, and this does not affect the data integration and the successful implementation of DWS projects. The prototyping for the DWS implementation positively affects the implementation success of DWS. This indicates that the extent of understanding requirements and the communication among project members increases the implementation success of DWS. Developing the prototypes for DWS ensures the acquirement of accurate or integrated data, the flexible processing of data, and the adaptation into new organizational conditions. The extent of consulting activities in DWS projects increases the implementation success of DWS in project aspects. The continuous support for consulting activities and technology transfer enhances the adherence to the project schedule preventing the exceeding use of project budget and ensuring the implementation of intended system functions; this ultimately leads to the successful implementation of DWS projects. The research hypothesis that the capability of project teams affects the implementation success of DWS is rejected. The technical ability of team members and human relationship skills themselves do not affect the successful implementation of DWS projects. The quality of the system which provided data to DWS affects the implementation success of DWS in technical aspects. The standardization of data definition and the commitment to the technical standard increase the possibility of overcoming the technical problems of DWS. Further, the development technology of DWS affects the implementation success of DWS. The hardware, software, implementation methodology, and implementation tools contribute to effective integration and classification of data in various forms. In addition, the implementation success of DWS in organizational and project aspects increases the data quality and system quality of DWS while the implementation success of DWS in technical aspects does not affect the data quality and system quality of DWS. The data and systems quality increases the effective processing of individual tasks, and reduces the decision making times and efforts enhancing the perceived benefits of DWS.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Toward a Social Sciences Methodology for Electronic Survey Research on the Internet or Personal Computer check (사회과학 연구에 있어 인터넷 및 상업용 통신망을 이용한 전자설문 조사방법의 활용)

  • Hong Yong-Gee;Lee Hong-Gee;Chae Su-Kyung
    • Management & Information Systems Review
    • /
    • v.3
    • /
    • pp.287-316
    • /
    • 1999
  • Cyberspace permits us to more beyond traditional face-to-face, mail and telephone surveys, yet still to examine basic issues regarding the quality of data collection: sampling, questionnaire design, survey distribution, means of response, and database creation. This article address each of these issues by contrasting and comparing traditional survey methods(Paper-and-Pencil) with Internet or Personal Computer networks-mediated (Screen-and-Keyboard) survey methods also introduces researchers to this revolutionary and innovative tool and outlines a variety of practical methods for using the Internet or Personal Computer Networks. The revolution in telecommunications technology has fostered the rapid growth of the Internet all over the world. The Internet is a massive global network and comprising many national and international networks of interconnected computers. The Internet or Personal Computer Networks could be the comprehensive interactive tool that will facilitate the development of the skills. The Internet or Personal Computer Networks provides a virtual frontier to expand our access to information and to increase our knowledge and understanding of public opinion, political behavior, social trends and lifestyles through survey research. Comparable to other technological advancements, the Internet or Personal Computer Networks presents opportunities that will impact significantly on the process and quality of survey research now and in the twenty-first century. There are trade-offs between traditional and the Internet or Personal Computer Networks survey. The Internet or Personal Computer Networks is an important channel for obtaining information for target participants. The cost savings in time, efforts, and material were substantial. The use of the Internet or Personal Computer Networks survey tool will increase the quality of research environment. There are several limitations to the Internet or Personal Computer Network survey approach. It requires the researcher to be familiar with Internet navigation and E-mail, it is essential for this process. The use of Listserv and Newsgroup result in a biased sample of the population of corporate trainers. However, it is this group that participates in technology and is in the fore front of shaping the new organizations of interest, and therefore it consists of appropriate participants. If this survey method becomes popular and is too frequently used, potential respondents may become as annoyed with E-mail as the sometimes are with mail survey and junk mail. Being a member of the Listserv of Newsgroup may moderate that reaction. There is a need to determine efficient, effective ways for the researcher to strip identifiers from E-mail, so that respondents remain anonymous, while simultaneously blocking a respondent from responding to a particular survey instrument more than once. The optimum process would be on that is initiated by the researcher : simple, fast and inexpensive to administer and has credibility with respondents. This would protect the legitimacy of the sample and anonymity. Creating attractive Internet or Personal Computer Networks survey formats that build on the strengths of standardized structures but also capitalize on the dynamic and interactive capability of the medium. Without such innovations in survey design, it is difficult to imagine why potential survey respondents would use their time to answer questions. More must be done to create diverse and exciting ways of building an credibility between respondents and researchers on the Internet or Personal Computer Networks. We believe that the future of much exciting research is based in the Electronic survey research. The ability to communicate across distance, time, and national boundaries offers great possibilities for studying the ways in which technology and technological discourse are shaped. used, and disseminated ; the many recent doctoral dissertations that treat some aspect of electronic survey research testify to the increase focus on the Internet or Personal Computer Networks. Thus, scholars should begin a serious conversation about the methodological issues of conducting research In cyberspace. Of all the disciplines, Internet or Personal Computer Networks, emphasis on the relationship between technology and human communication, should take the lead in considering research in the cyberspace.

  • PDF