• Title/Summary/Keyword: IT Army

Search Result 608, Processing Time 0.029 seconds

Reliability-aware service chaining mapping in NFV-enabled networks

  • Liu, Yicen;Lu, Yu;Qiao, Wenxin;Chen, Xingkai
    • ETRI Journal
    • /
    • v.41 no.2
    • /
    • pp.207-223
    • /
    • 2019
  • Network function virtualization can significantly improve the flexibility and effectiveness of network appliances via a mapping process called service function chaining. However, the failure of any single virtualized network function causes the breakdown of the entire chain, which results in resource wastage, delays, and significant data loss. Redundancy can be used to protect network appliances; however, when failures occur, it may significantly degrade network efficiency. In addition, it is difficult to efficiently map the primary and backups to optimize the management cost and service reliability without violating the capacity, delay, and reliability constraints, which is referred to as the reliability-aware service chaining mapping problem. In this paper, a mixed integer linear programming formulation is provided to address this problem along with a novel online algorithm that adopts the joint protection redundancy model and novel backup selection scheme. The results show that the proposed algorithm can significantly improve the request acceptance ratio and reduce the consumption of physical resources compared to existing backup algorithms.

Establishing a Thinking Process for Revolution in Military Affairs to Create Future Crucial Capabilities for the Republic of Korea Army (육군의 미래 핵심역량 창출을 위한 군사혁신 사고과정 정립)

  • Cho, Sang Keun;Lee, Gwang Woon;Min, Chulki;Yeoi, Byung Ik;Choi, Hyun Gyu;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.453-458
    • /
    • 2022
  • The Republic of Korea Army(ROKA) has carried out a deep change to prepare for the future war since 2017. For this, Korea Army Research Center for Future & Innovation(KARCFI) established in 2018 tried to spread out boom of innovation toward the whole ROKA. A number of ROKA members mentioned the necessity of research methodology creating future crucial capabilities, weapons, combat concepts, structures, etc. KARCFI researchers established a thinking process for revolution in military affairs(RMA) to rapidly respond field requests and optimized it through validity assessment of professionals and experiment in Army Innovation School. As a result, a thinking process for RMA provided creative ideas with the Army's vision and strategy, was included in its education system. Simultaneously, it became one of methodologies for the Army's research tasks and KCI journals. From now on, a thinking process for RMA will be able to signpost for RMA of the Army through diverse following studies.

The Study of a rational management to the protective area of military installations (군사시설보호구역의 합리적 관리방안에 관한 연구)

  • Kim, Myeong-Sun
    • Journal of National Security and Military Science
    • /
    • s.2
    • /
    • pp.23-89
    • /
    • 2004
  • The protective area of military installations can be a essential investment goods for producting public goods like military installations and national security. For the purpose of this, The protective area of military installations are set up and applicated at important strategic areas. It causes colplications and frictions among the people, government and army inevitably to set up the protective area of military installations, as the relation between the army which produces security or public goods and the people that make and use valuable goods is opposed and contradictory to each other. Heretofore, the civil petition of the protective affair to military installations has been presented individually. As local self- government is fixed, a local selg-governing body presents many civil petitions now. Therefore the protective affair to military installations came to be examined carefully in the aspecs of improving the relationship between the civil and army, raising natinal competitiveness, and increasing efficiency of military operations. Though the relationship between the civil and army is opposed and contradictory, it is required to be in keeping with each other with a situation around society, that is, changes and trend of national security, politics, economy, society. Accordingly, if you drive plans of rational management to the protective area of military installations, you can not only achieve successful military installations, but also be a great help to growth of a local community. Then 「The Army with the people」worthy of the name can be real.

  • PDF

A Study on the Military took Expressed in Women's Fashion Design (여성 패션에 표현된 밀리터리룩에 관한 고찰)

  • 간문자
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.21 no.1
    • /
    • pp.119-128
    • /
    • 1997
  • The purpose of this study is to examine the military look, which is one of the most popular fashion trends in the 1996 women's fashion. Military look is that imitates or reinterprets the Army uniform which is functionally useful. After World War 1 , military look appeared in the women's fashion which is functionable tailor suits style, ankle-length skirt, pants or boiler suits for work wear, overcoat against the cold, and there was an attempt to introduce a National Standard Dress. In the middle of World War II, there was a similiar circumstance in women's military fashion. There were functionable tailor suits, knee-length skirt, pants or siren suits for work wear. And the Utility Dress was nationally recommended. In addition, the regulations were introduced to control the materials and styles used for some clothes. In the 70s, as the resistance movement as counterculture began to wear Army look which was army-uniform or army caps with 'US ARMY' logo and badges, and became very popular among the youth. In the 90s, military look has got one of the fashionable fashion themes with revival of Neo- Hippie look. Not only street fashion but also high fashion designer selected the trend for '96A/W The characteristics of the military look are khaki colors or camouflage prints, epaulets, big outpockets with flap, golden buttons and army belt. As I examined, during the World War I and ll, women wore the military look because of shortage of goods and work or service, and it was recommended by government. Though the military look in 70s, began by the resistance movement, at least it became a popular fashion. Military look in 90s, does not have inner symbolic meaning or ideology but it only represents fashion trend and revival fashion.

  • PDF

From the point of view of ground operations principle, Chosin Link-up operation discussion of the US 1st Marine Division (지상작전의 원칙 측면에서 미 제1해병사단의 장진호 연결작전 고찰)

  • Kim, Kyu-Bin;Choi, Yong-Yoel
    • Journal of National Security and Military Science
    • /
    • s.13
    • /
    • pp.1-41
    • /
    • 2016
  • US 8th Army in the attack on the Western Front was a situation that was frustrated by the 13th Corps Communist army. To this time support this, goals that have been granted to the US 1st Marine Division that initiated the attack in Mupyonri direction, lack the potential to achieve was not decisive. It was a operation specific erroneous judgment that occurred because there was no one accurately grasp the battlefield of the situation the wrong UN Forces Command. Tactical victory can be to maximize the operation outcomes. However, there is no possible failure of the operation is to expand the tactical success. This is because the failure of the operation, because directly linked to the success or failure of the war. Tactical victory can be to maximize the operation outcomes. However, operation specific failure is not it possible to expand the tactical victory. Therefore tactical success of the US 1st Marine Division, can not compensate for operation specific failure of the United Nations Forces Command. However, Chinese Communist Army 9th Corps is obsessed only victory of tactics to annihilate the US 1st Marine Division, by being fixation to the Chosin whole area, it was not possible to run a operational operation. Therefore tactical success df the US 1st Marine Division, Chinese Communist Army 9th Corps is to extinguish the ability to increase the number of the 13th Corps of the Western Front, 8th Army US have contributed to have escaped the crisis. In addition, the US 10th Corps while maintaining the combat force, by an important role to withdraw through the sea, was able to complement the misjudgment of the operation.

  • PDF

Joint FrFT-FFT basis compressed sensing and adaptive iterative optimization for countering suppressive jamming

  • Zhao, Yang;Shang, Chaoxuan;Han, Zhuangzhi;Yin, Yuanwei;Han, Ning;Xie, Hui
    • ETRI Journal
    • /
    • v.41 no.3
    • /
    • pp.316-325
    • /
    • 2019
  • Accurate suppressive jamming is a prominent problem faced by radar equipment. It is difficult to solve signal detection problems for extremely low signal to noise ratios using traditional signal processing methods. In this study, a joint sensing dictionary based compressed sensing and adaptive iterative optimization algorithm is proposed to counter suppressive jamming in information domain. Prior information of the linear frequency modulation (LFM) and suppressive jamming signals are fully used by constructing a joint sensing dictionary. The jamming sensing dictionary is further adaptively optimized to perfectly match actual jamming signals. Finally, through the precise reconstruction of the jamming signal, high detection precision of the original LFM signal is realized. The construction of sensing dictionary adopts the Pei type fast fractional Fourier decomposition method, which serves as an efficient basis for the LFM signal. The proposed adaptive iterative optimization algorithm can solve grid mismatch problems brought on by undetermined signals and quickly achieve higher detection precision. The simulation results clearly show the effectiveness of the method.

Military Vulnerability Management Plan based on Military IT Asset Management System for Cyber Threat Response (사이버 위협 대응을 위한 군(軍) 정보화자산관리시스템과 연계한 군(軍) 취약점 관리 방안)

  • Kim, Jong Hwa;Lim, Jae Sung
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.111-116
    • /
    • 2018
  • The Cyber space of the ROK Army is constantly threatened by enemy. In order to reponse to such cyber treats, vulnerabilities of information assets of the ROK Army should be identified and eliminated early. However, the ROK Army currently lacks systematic management of vulnerabilities. Therefore, this paper investigates trends of each country's vulnerability management and the actual situation of the management of the vulnerabilities in the ROK Army, and suggests ways of linking vulnerability database and the ROK Army information asset management system for effective vulnerability management of the ROK Army information assets.

  • PDF

A Basic Study on the Selection of Required Operational Capability for Attack Drones of Army TIGER Units Using AHP Technique (AHP 기법을 이용한 Army TIGER 부대 공격용 드론의 작전요구성능 선정에 관한 기초 연구)

  • Jinho Lee;Seongjin Kwon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.26 no.2
    • /
    • pp.197-204
    • /
    • 2023
  • The importance of each warfighting function for Army TIGER unit attack drones is measured using the AHP technique. As a result, the importance of attack drones is high in the order of maneuver, firepower, intelligence, command/control, protection, and operation sustainment, but the importance of maneuver, firepower, and intelligence are almost similar. In addition, it is analyzed that attack drones capable of carrying out day and night missions by being equipped with an EO/IR sensor and being commanded/controlled in conjunction with the C4I system to eliminate threats with small bombs or aircraft collisions is needed. Finally, based on the results of this study, a virtual battle scenario for attack drones is proposed.

Research on the Applicability of Target-detection Methods for Land-based Hyperspectral Imaging

  • Qianghui Wang;Bing Zhou;Wenshen Hua;Jiaju Ying;Xun Liu;Lei Deng
    • Current Optics and Photonics
    • /
    • v.8 no.3
    • /
    • pp.282-299
    • /
    • 2024
  • Target detection (TD) is a research hotspot in the field of hyperspectral imaging (HSI). Traditional TD methods often mine targets from HSIs under a single imaging condition, without considering the influence of imaging conditions. In fact, the spectra of ground objects in HSIs are uncertain and affected by the imaging conditions (weather, atmospheric, light, time, and other angle conditions including zenith angle). Hyperspectral data changes under different imaging conditions. Therefore, the detection result for a single imaging condition cannot accurately reflect the effectiveness of the detection method used. It is necessary to analyze the performance of various detection methods under different imaging conditions, to find a more applicable detection method. In this paper, we study the performance of TD methods under various land-based imaging conditions. We first summarize classical TD methods and evaluation methods. Then, the detection effects under various imaging conditions are analyzed. Finally, the concepts of the stability coefficient (SC) and effective area under the curve (EAUC) are proposed to comprehensively evaluate the applicability of detection methods under land-based imaging conditions, in terms of both detection accuracy and stability. This is conducive to our selection of detection methods with better applicability in land-based contexts, to improve detection accuracy and stability.

A Study on Efficient IPv6 Address Allocation for Future Military (미래 군을 위한 효율적인 IPv6 주소 할당에 관한 연구)

  • Hanwoo Lee;Suhwan Kim;Gunwoo Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.613-618
    • /
    • 2023
  • The advancement of Information and Communication Technology (ICT) is accelerating innovation across society, and the defense sector is no exception as it adopts technologies aligned with the Fourth Industrial Revolution. In particular, the Army is making efforts to establish an advanced Army TIGER 4.0 system, aiming to create highly intelligent and interconnected mobile units. To achieve this, the Army is integrating cutting-edge scientific and technological advancements from the Fourth Industrial Revolution to enhance mobility, networking, and intelligence. However, the existing addressing system, IPv4, has limitations in meeting the exponentially increasing demands for network IP addresses. Consequently, the military considers IPv6 address allocation as an essential process to ensure efficient network management and address space provisioning. This study proposes an approach for IPv6 address allocation for the future military, considering the Army TIGER system. The proposal outlines how the application networks of the Army can be differentiated, and IP addresses can be allocated to future unit structures of the Army, Navy, and Air Force, from the Ministry of National Defense and the Joint Chiefs of Staff. Through this approach, the Army's advanced ground combat system, Army TIGER 4.0, is expected to operate more efficiently in network environments, enhancing overall information exchange and mobility for the future military.