• Title/Summary/Keyword: Defense data

Search Result 1,790, Processing Time 0.027 seconds

Carrier Phase Based Cycle Slip Detection and Identification Algorithm for the Integrity Monitoring of Reference Stations

  • Su-Kyung Kim;Sung Chun Bu;Chulsoo Lee;Beomsoo Kim;Donguk Kim
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.4
    • /
    • pp.359-367
    • /
    • 2023
  • In order to ensure the high-integrity of reference stations of satellite navigation system, cycle slip should be precisely monitored and compensated. In this paper, we proposed a cycle slip algorithm for the integrity monitoring of the reference stations. Unlike the legacy method using the Melbourne-Wübbena (MW) combination and ionosphere combination, the proposed algorithm is based on ionosphere combination only, which uses high precision carrier phase observations without pseudorange observations. Two independent and complementary ionosphere combinations, Ionospheric Negative (IN) and Ionospheric Positive (IP), were adopted to avoid insensitive cycle slip pairs. In addition, a second-order time difference was applied to the IN and IP combinations to minimize the influence of ionospheric and tropospheric delay even under severe atmosphere conditions. Then, the cycle slip was detected by the thresholds determined based on error propagation rules, and the cycle slip was identified through weighted least square method. The performance of the proposed cycle slip algorithm was validated with the 1 Hz dual-frequency carrier phase data collected under the difference levels of ionospheric activities. For this experiment, 15 insensitive cycle slip pairs were intentionally inserted into the raw carrier phase observations, which is difficult to be detected with the traditional cycle slip approach. The results indicate that the proposed approach can successfully detect and compensate all of the inserted cycle slip pairs regardless of ionospheric activity. As a consequence, the proposed cycle slip algorithm is confirmed to be suitable for the reference station where real time high-integrity monitoring is crucial.

Path Loss Prediction Using an Ensemble Learning Approach

  • Beom Kwon;Eonsu Noh
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.2
    • /
    • pp.1-12
    • /
    • 2024
  • Predicting path loss is one of the important factors for wireless network design, such as selecting the installation location of base stations in cellular networks. In the past, path loss values were measured through numerous field tests to determine the optimal installation location of the base station, which has the disadvantage of taking a lot of time to measure. To solve this problem, in this study, we propose a path loss prediction method based on machine learning (ML). In particular, an ensemble learning approach is applied to improve the path loss prediction performance. Bootstrap dataset was utilized to obtain models with different hyperparameter configurations, and the final model was built by ensembling these models. We evaluated and compared the performance of the proposed ensemble-based path loss prediction method with various ML-based methods using publicly available path loss datasets. The experimental results show that the proposed method outperforms the existing methods and can predict the path loss values accurately.

Development of Simulation Logic for Wargame Model Based on Warhead Detonation Test Data (탄두 기폭실험 결과를 활용한 워게임모델 모의논리 개발)

  • Seil An;Yongseon Lee;Sungho Choi ;Sangwoo Han
    • Journal of the Korea Society for Simulation
    • /
    • v.33 no.2
    • /
    • pp.13-25
    • /
    • 2024
  • In the performance analysis of a weapon system, the combat effectiveness is difficult to go beyond the conceptual level in the early stages of development. This is especially true in the case of new concept of weapon system that has never existed before. In this study, with the aim of analyzing the effectiveness of small personal guided weapons, the design of the warhead and the detonation test were carried out and the results were analyzed. Afterwards, trajectory of fragments were calculated from the results, and it is applied to the anti-personnel effectiveness logic which is a part of combat simulation tool. At the same time, delivery accuracy logic was constructed from Monte-Carlo simulation with 6-DOF trajectory model. Subsequent simulated experiments were conducted with test scenarios to confirm the simulation logic reflecting the results of the warhead detonation tests for verifying the simulation approach of weapon systems, and it was confirmed that the simulation logic incorporating the results of the warhead detonation tests functioned properly.

NLRC4 Inflammasome-Mediated Regulation of Eosinophilic Functions

  • Ilgin Akkaya;Ece Oylumlu;Irem Ozel;Goksu Uzel;Lubeyne Durmus;Ceren Ciraci
    • IMMUNE NETWORK
    • /
    • v.21 no.6
    • /
    • pp.42.1-42.20
    • /
    • 2021
  • Eosinophils play critical roles in the maintenance of homeostasis in innate and adaptive immunity. Although primarily known for their roles in parasitic infections and the development of Th2 cell responses, eosinophils also play complex roles in other immune responses ranging from anti-inflammation to defense against viral and bacterial infections. However, the contributions of pattern recognition receptors in general, and NOD-like receptors (NLRs) in particular, to eosinophil involvement in these immune responses remain relatively underappreciated. Our in vivo studies demonstrated that NLRC4 deficient mice had a decreased number of eosinophils and impaired Th2 responses after induction of an allergic airway disease model. Our in vitro data, utilizing human eosinophilic EoL-1 cells, suggested that TLR2 induction markedly induced pro-inflammatory responses and inflammasome forming NLRC4 and NLRP3. Moreover, activation by their specific ligands resulted in caspase-1 cleavage and mature IL-1β secretion. Interestingly, Th2 responses such as secretion of IL-5 and IL-13 decreased after transfection of EoL-1 cells with short interfering RNAs targeting human NLRC4. Specific induction of NLRC4 with PAM3CSK4 and flagellin upregulated the expression of IL-5 receptor and expression of Fc epsilon receptors (FcεR1α, FcεR2). Strikingly, activation of the NLRC4 inflammasome also promoted expression of the costimulatory receptor CD80 as well as expression of immunoregulatory receptors PD-L1 and Siglec-8. Concomitant with NLRC4 upregulation, we found an increase in expression and activation of matrix metalloproteinase (MMP)-9, but not MMP-2. Collectively, our results present new potential roles of NLRC4 in mediating a variety of eosinopilic functions.

CD11b Deficiency Exacerbates Methicillin-Resistant Staphylococcus aureus-Induced Sepsis by Upregulating Inflammatory Responses of Macrophages

  • Hyunsub Sim;Daecheol Jeong;Hye-In Kim;Seongwon Pak;Bikash Thapa;Hyung-Joo Kwon;Keunwook Lee
    • IMMUNE NETWORK
    • /
    • v.21 no.2
    • /
    • pp.13.1-13.19
    • /
    • 2021
  • Macrophages are important for the first line of defense against microbial pathogens. Integrin CD11b, which is encoded by Itgam, is expressed on the surface of macrophages and has been implicated in adhesion, migration, and cell-mediated cytotoxicity. However, the functional impact of CD11b on the inflammatory responses of macrophages upon microbial infection remains unclear. Here, we show that CD11b deficiency resulted in increased susceptibility to sepsis induced by methicillin-resistant Staphylococcus aureus (MRSA) infection by enhancing the pro-inflammatory activities of macrophages. Upon infection with MRSA, the mortality of Itgam knockout mice was significantly higher than that of control mice, which is associated with increased production of TNF-α and IL-6. In response to MRSA, both bone marrow-derived macrophages and peritoneal macrophages lacking CD11b produced elevated amounts of pro-inflammatory cytokines and nitric oxide. Moreover, CD11b deficiency upregulated IL-4-induced expression of anti-inflammatory mediators such as IL-10 and arginase-1, and an immunomodulatory function of macrophages to restrain T cell activation. Biochemical and confocal microscopy data revealed that CD11b deficiency augmented the activation of NF-κB signaling and phosphorylation of Akt, which promotes the functional activation of macrophages with pro-inflammatory and immunoregulatory phenotypes, respectively. Overall, our experimental evidence suggests that CD11b is a critical modulator of macrophages in response to microbial infection.

Comparative Analysis of Entrepreneurial Ecosystems by Country and Implications (국가별 창업생태계 비교분석 및 시사점)

  • Jin-Chul Kim;Sang-Hee Jung;Donghyub Shin;Hwanseok Choi;Seunghye Lee
    • Analyses & Alternatives
    • /
    • v.8 no.2
    • /
    • pp.117-140
    • /
    • 2024
  • Major countries are actively pursuing policies to promote entrepreneurship to foster economic growth and employment. Meanwhile, although South Korea's entrepreneurial ecosystem has shown robust quantitative growth since the COVID-19 pandemic, it is still criticized for its shortcomings compared to other major countries. Based on this, this study aims to derive a comprehensive innovation entrepreneurship index for each country to foster an innovative entrepreneurial ecosystem and sustainable growth in South Korea. Specifically, this study first analyzed the entrepreneurial ecosystem of various countries. Second, we utilizing data from sources such as the Global Entrepreneurship Monitor, Global Innovation Index, and World Bank, the study calculates a comprehensive innovation entrepreneurship index for each country. Finally, this study analyzes the type of South Korea's innovation entrepreneurship index and suggests the future direction of through cluster analysis.

A Study on the VADAMA improvements of latency performance through control message collision avoid in MF-TDMA satellite network

  • Su-Hoon Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.9
    • /
    • pp.115-123
    • /
    • 2024
  • This paper proposes a method to reduce the delay time caused by control message conflicts in VADAMA (Virtual Allocation Demand Assigned Multiple Access) technology, which is a virtual allocation based on-demand multiple access technology in MF-TDMA (Multi-Frequency Time Division Multiple Access) satellite network. Traditionally, satellite networks have had the problem that all network transmissions have long delay times due to control messages. In this study, in order to improve the delay time caused by terminal control message conflicts in VADAMA technology, the concept of virtual allocation is used to reduce the delay time. VADAMA-PTR (VADAMA Periodic Transmission) divides all terminals into subnets and transmits control. The method is proposed, and the performance analysis of the existing DAMA technology, delay time and data processing rate is performed using Matlab. The results show that the performance is improved.

Active and Context-Resilient Cyber Defense Operation applying the Concept of Performing Mosaic Warfare (모자이크전 수행 개념을 적용한 능동형 상황 탄력적 사이버 방어작전)

  • Jung-Ho Eom
    • Convergence Security Journal
    • /
    • v.21 no.4
    • /
    • pp.41-48
    • /
    • 2021
  • Recently, the aspect of war is evolving due to the 4th industrial revolution technology. Among them, AI technology is changing the way of war as it is applied to advanced weapon systems and decision-making systems. Mosaic Warfare, presented by the U.S. DARPA, is shifting military warfare from attrition-centric warfare to decision-centric warfare by combining Internet of Things, cloud computing, big data, mobile, and artificial intelligence technologies. In addition, it is a method to perform operations quickly so that the most offensive effect can be achieved by appropriately combining the distributed and deployed forces according to the battlefield context. In other words, military operations are not carried out through a uniform combat process, but various forces are operated through a distributed system depending on the battlefield context. In cyber warfare, as artificial intelligence is applied to cyber attack technology, there is a limit to responding with the same procedural response method as the existing cyber kill chain. Therefore, in this paper, the execution method of mosaic warfare is applied to perform context-resilient cyber operations that can operate a response system according to the attack and cyberspace context.

Trusted Execution Environment (TEE)-Based Blockchain Offline Payment Protocol (신뢰실행환경(TEE) 기반의 블록체인 오프라인 결제 프로토콜)

  • Donghyun Jeong;Beomjoong Kim;Junghee Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.5
    • /
    • pp.1021-1035
    • /
    • 2024
  • This paper proposes the TEE-BOP (Trusted Execution Environment-Based Blockchain Offline Payment) protocol for blockchain-based offline payments. TEE-BOP securely manages offline balances within a Trusted Execution Environment (TEE) and efficiently verifies initial deposit proofs recorded on the blockchain using Merkle trees. Additionally, it ensures secure and tamper-proof transactions in offline environments by guaranteeing the reliability of keys and the system through TEE Attestation. Unlike previous studies, TEE-BOP enhances real-world applicability by eliminating dependence on central authorities and avoiding assumptions of ideal models. The protocol solves the double-spending problem through multi-layered defense mechanisms and addresses forgery prevention by allowing recipients to directly verify data consistency between the TEE and the blockchain. This enables reliable blockchain-based offline payments in areas with unstable network infrastructure. It demonstrates that this research can expand the application of blockchain technology and contribute to improving access to financial services in developing countries or disaster situations.

Priority Order of Decisional Factors and Conceptual Construct of Security Martial Arts' Spirit (경호무도 정신특성 요인의 상대적 중요도 평가)

  • Kim, Dong-Hyun
    • Korean Security Journal
    • /
    • no.32
    • /
    • pp.7-32
    • /
    • 2012
  • This study aimed to evaluate the relative status using Analytic Hierarchy Process(AHP) on the spiritual factors of the security martial arts for the guards to perform the best security service. There were 540 participants who were students majored in security martial arts, workers for security and specialists of practical and theoretical security martial arts for this study. The exploratory and confirmatory factor analysis were carried out using the selecting data through literature reviews in the level of the factor-extraction about the spiritual characteristics. The specialists' survey was conducted on the relative status among factors using the spiritual concept structure based on the studied above. Selected data was calculated with SPSS 18.0 for windows, AMOS 5.0, and Expert Choice 2000 software. The conclusion can be made through those process above. First, 4 general factors and 20 detailed factors were found as the result of the factor exploration related to the spiritual characteristics of the security martial arts. The result which was verified on Construction validity of searched factors had stable figures on every standard. In other words, the participants for survey on this study "Spiritual characteristic concepts of the security martial arts" can be evaluated it is valid. The general factors of security martial arts' spirit were conceptualized with Psychological spirit, ethical spirit, martial art spirit, practical spirit through the naming process on the general factors of the security martial arts' spiritual characteristic concepts. The detailed factors of security martial arts' spirit were concentration, self-confidence, self-management, immersion, self-esteem in psychological spirit and sacrifice, justice, royalty, peace, sense of duty in ethical spirit and courtesy, toughness, defense, balance of mind and body, bravery in martial arts and responsibility, cooperation, modesty, determination, professionalism in practical spirit of security martial arts. That is, the conceptualization of security martial arts' spirit was verified that it had validity. Second, the hierarchical model of the security martial arts was composed with 4 superordinate concepts and 20 subordinate concepts. As the result of evaluating relative status based on Spiritual characteristics-hierarchy model, the impotance was proven in order of ethical spirit(.482), martial art spirit(.248), practical spirit(.188), psychological spirit(.083). Also the importance related to spiritual characteristics of security martial arts on subordinate concepts was proven in order of sacrifice(.252), courtesy(.110), sense of duty(.108), responsibility(. 073), royalty(.053), toughness(.052), justice(.049), defense(.038), professionalism(.038), determination(.035), cooperation(.029), self-confidence (.026), bravery(.025), self-esteem(.024), balance of mind and body(.023), peace(.019), concentration(.014), modesty(.013), self-management(.011), flow (.007). To sum up, the spiritual factor related to ethics such as sacrifice, justice, royalty, peace, sense of duty was the most important for the security martial arts.

  • PDF