• Title/Summary/Keyword: Enemy Information

Search Result 174, Processing Time 0.028 seconds

Efficiency of Exponential Deperm Protocol

  • Kim, Yongmin;Kim, Young-Hak;Shin, Kwang-Ho
    • Journal of Magnetics
    • /
    • v.18 no.3
    • /
    • pp.326-330
    • /
    • 2013
  • Magnetic treatment of surface vessels and submarines (Deperm) is required to camouflage them against magnetic detection from enemy marine force. So far, deperm has been accomplished by applying an alternating magnetic field of which amplitude decreases linearly. However, the reduction of the residual flux density in the direction of magnetic field is not linear in the case of the linear protocol, since the ferromagnetic material used to construct a surface vessel, mainly Fe-C, shows a nonlinear behavior in an alternating magnetic field. This is one of main reasons to make an ordinary deperm protocol inefficient. In this paper, we propose the exponential deperming protocol and compare the exponential protocol to conventional linear protocol within the framework of deperm performance. We found out that step number could be reduced in the exponential protocol compare with in the linear protocol, because the larger numbers of deperm steps are dedicated in the irreversible domain process region on the magnetic hysteresis.

A Study on Efficient Friendly Forces Location Data Sharing on Battalion and Below

  • Kim, Hyung-Seok;Shin, Sang-Heon;Kim, Yong-Cheol;Lee, Jeong-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.95-101
    • /
    • 2018
  • In this paper, we propose an efficient friendly forces location data sharing algorithm in a troops using a low bandwidth radio. The future battlefield is a 'Network Centric Warfare' with a concept of identifying the position and power of the enemy and friendly forces and leading the battlefield to victory through proper links at the time of our need. One of the basic elements in the 'Network Centric Warfare' is to share friendly forces location data. The bandwidth and transmission rates of radio used in battalion are low. Nevertheless, we should share our locations data almost in real time for effective fighting in a war situation. This paper describes the efficient method of friendly forces location data sharing based on low bandwidth radio. In particular, the concept of 'network-centered warfare' is reflected in the troop below the battalion to present an integrated and efficient way to shared location data of friendly forces.

Embodiment of living body measure system modeling for Rehalibitation treatment of positive simulation for HRV algorithm analysis interface of Mobile base (모바일 기반의 HRV 알고리즘 분석 인터페이스에 대한 실증적 시뮬레이션의 재활치료용 생체계측 시스템 모델링의 구현)

  • Kim, Whi-Young
    • Journal of the Korea Computer Industry Society
    • /
    • v.7 no.4
    • /
    • pp.437-446
    • /
    • 2006
  • Mobilecomputer offers more fundamental role than role assistance enemy of modern technology equipment and new Information <중략> These main weakness puts in structural relation between elements that compose system. Therefore, dynamics research that time urea of systematic adjustment has selected method code Tuesday nerve dynamics enemy who groping of approach that become analysis point is proper and do with recycling bioelectricity signal. Nature model of do living body signal digital analysis chapter as research result could be developed and scientific foundation groping could apply HSS (Hardware-software system) by rehalibitation purpose. Special quality that is done radish form Tuesday of bioelectricity signal formation furthermore studied, and by the result, fundamental process of bodysignal in do structure circuit form of analog - digital water supply height modelling do can.

  • PDF

Embodiment of living body measure system modelling for rehalititation treatment of simulation for HRV analysis interface of PDA base (PDA기반의 HRV분석 인터페이스에 대한 시뮬레이션의 재활치료용 생체계측 시스템 모델링의 구현)

  • Kim, Whi-Young;Choe, Jin-Yeong;Park, Seong-Jun;Kim, Jin-Yeong;Park, Seong-Jun;Kim, Hui-Je
    • Proceedings of the KIEE Conference
    • /
    • 2006.07d
    • /
    • pp.2167-2168
    • /
    • 2006
  • Mobilecomputer of offers more fundamental role than role assistance enemy of modem technology equipment and new Information Technology can reconsider, and reconstruct creatively accuracy of physiological concept. That military register symptoms are developed of disease, before far before rehalibitation, of for possibility that can intervene in process that motive change of military register symptoms after rehalibitation. But, that many parameters become analysis target and mathematical settlement and equalization system of noted data of that is huge, same time collection of all datas can lift difficulty etc.. These main weakness puts in structural relation between elements that compose system. Therefore, dynamics research that time urea of systematic adjustment has selected method code Tuesday nerve dynamics enemy who groping of approach that become analysis point is proper and do with recycling bioelectricity signal. Nature model of do living body signal digital analysis chapter as research result could be developed and scientific foundation groping could apply HSS (Hardware-software system) by rehalibitation purpose. Special quality that isdone radish form Tuesday of bioelectricity signal formation furthermore studied, and by the result, fundamental process of bodysignal in do structure circuit form of analog - digital water supply height modelling do can.

  • PDF

ISIS Architecture for Developing Complex Enterprise Applications (복잡한 엔터프라이즈 응용 개발을 위한 ISIS 아키텍처)

  • Jo, Eun-Hwan;Lee, Kap-Hoon;Lee, Min-Soo;Lee, Bong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.4
    • /
    • pp.392-404
    • /
    • 2010
  • Recently, as both business processes and IT systems become ever more complex. Especially, enterprise applications tend to become unmanageably complex and increasingly costly to maintain. Therefore complexity is the insidious enemy of software development. It is critical to have a methodology that recognizes and manages this enemy effectively. In this paper, we propose ISIS (Integrated System of Independent Subsystems) - the architectural style needed to develop the complex enterprise applications. The ISIS was developed to meet the challenge of reducing the complexity of a larger enterprise application today. It gives us architecture models for reducing development complexity and composite application. The enterprise application is partitioned into a collection of independent subsystems using ISIS decomposition schemes and equivalence relations. We use middleware named ISIS engine that provides a service for subsystems interoperability by enabling the integration of distributed, cross-platform subsystems. We have implemented an ITSM system that achieves our objectives, reducing development complexity, using the ISIS architecture. Finally, ISIS architecture provides greater flexibility and productivity when an organization needs either to change its business processes, or to update the underlying systems.

Static Analysis In Computer Go By Using String Graph (컴퓨터 바둑에서 String Graph를 사용한 정적분석)

  • 박현수;김항준
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.4
    • /
    • pp.59-66
    • /
    • 2004
  • We define a SG(String Graph) and an ASG(Alive String Graph) to the purpose to do static analysis. For a life and death judgment, we apply the rule to the situation which the stone is included and not included. We define the rules that are SR(String Reduction), ER(Empty Reduction), ET(Edge Transform), and CG(Circular Graph), when the stone is not included. We define the rules that are DESR(Dead Enemy Strings Reduction) and SCSR(Same Color String Reduction), when the stone is included. We evaluate a SG that it is an ASG or not by using rules. And we use APC(Articulation Point Check) nile according to number of articulation points lot a life and death judgment. The performance of our method has been tested on the problem set IGS_31_counted form the Computer Go Test Collection. The test set contains 11,191 Points and 1,123 Strings. We obtain 92.5% accuracy of Points and 95.7% accuracy of Strings.

Research about Asynchronous LAS Advanced & WRC Weblog Analysis of Practical use ESM (LAS Advanced & WRC 웹로그 분석을 활용한 ESM에 관한 연구)

  • Woo, Seung-Ho;Kang, Soon-Duk
    • The Journal of Information Technology
    • /
    • v.7 no.4
    • /
    • pp.9-20
    • /
    • 2004
  • Result Dos that materialization KNU Virus Wall to solve serious problem Hurtfulness Virus is present network chiefly in this research to do not become and do correct disposal in situation such as internet and Multiple Protocol that is done intelligence anger for ESM, CIS and MIS side as secondary to solve this problem about out log analysis system embody. As a result, could use comprehensively, and can click by Site Design, Packet transmission, and used to interior internet (GroupWare) in information protection aspect because intelligence enemy to face each other ESM's various hacking and virus uses Enterprise Security Management system and CIS, whole web through Smart View and relation of security could do monitoring.

  • PDF

A Study on the Citation of Defense Cyber Protection Partnership for Safe Supply Chain Management (안전한 공급망 관리를 위한 국방사이버보호 파트너십 인증 방안 연구)

  • Kim, Jong-hwa;Kim, Yongchul;Kim, Kyoung Min;Kang, Jeongheung
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.101-107
    • /
    • 2019
  • Our military's cyberspace is under constant threat from the enemy. These cyber threats are targeted at the information service assets held by the military, and securing the security of the organization's information service assets is critical. However, since Information assets can not be 100% selt-sufficient in any organization as well as the military, acquisition of information assets by the supply chain is an inevitable. Therefor, after reviewing supply chain protection measures to secure the safety of the military supply chain, we proposed a method for securing supply chain companies through the citation of partnership based on the validated trust model.

GPS Jamming Resilient Location-based Routing for Unmanned Ground Vehicle Networks (무인 지상 차량 네트워크에서 GPS 재밍에 강인한 위치기반 라우팅)

  • Lee, Jinwoo;Jung, Woo-Sung;Kim, Yong-joo;Ko, Young-Bae;Ham, Jae-Hyun;Choi, Jeung-Won
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.4
    • /
    • pp.432-440
    • /
    • 2015
  • UGVs(Unmanned Ground Vehicles) are robots that can substitute humans in reconnaissance operations of potentially dangerous and contaminated sites. Currently, there have been active research on utilizing UGVs in military environments. Much resrach has been focused on exploiting the weakness of topology-based routing and instead utilize location-based routing for the networking of UGVs. It is generally assumed that location-based routing methods can fully utilize the location information gained from GPS. However, this may not be possible in tactical environments due to enemy GPS jamming and LOS(Line of Sight) limitations. To solve this problem, we propose a location-based routing scheme utilizing low control message that can calibrate the location information using GPS information as well as location of neighboring UGV, movement direct and speed information. Also utilizing topology-based routing scheme to solve incorrect location information in GPS jamming region.

Effective eCRM using prediction function of Data Mining (Data Mining의 예측기능을 이용한 효과적인 eCRM)

  • Kang Rae-Goo;Kim Seung-Eon;Jung Chai-Yeoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.1039-1042
    • /
    • 2006
  • Because many corporations computerize process figure enemy who is introducing eCRM fast and are used mainly at past by purpose to detect and analyze and forecast systematic analysis of customer information and various pattern of customer recently, ordinary peoples are trend that is alternated gradually by data mining that can drawand forecast result of good quality easily. Field that this data mining is used representatively is eCRM. In this treatise customer data of A discount store and sale data of 1 years experimenting that forecast customer contribution to base next year through data mining actuality data and data mining through comparison with predicted data are how effective to eCRM prove.

  • PDF