• Title/Summary/Keyword: Military Networks

Search Result 271, Processing Time 0.026 seconds

Learning-Backoff based Wireless Channel Access for Tactical Airborne Networks (차세대 공중전술네트워크를 위한 Learning-Backoff 기반 무선 채널 접속 방법)

  • Byun, JungHun;Park, Sangjun;Yoon, Joonhyeok;Kim, Yongchul;Lee, Wonwoo;Jo, Ohyun;Joo, Taehwan
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.1
    • /
    • pp.12-19
    • /
    • 2021
  • For strengthening the national defense, the function of tactical network is essential. tactics and strategies in wartime situations are based on numerous information. Therefore, various reconnaissance devices and resources are used to collect a huge amount of information, and they transmit the information through tactical networks. In tactical networks that which use contention based channel access scheme, high-speed nodes such as recon aircraft may have performance degradation problems due to unnecessary channel occupation. In this paper, we propose a learning-backoff method, which empirically learns the size of the contention window to determine channel access time. The proposed method shows that the network throughput can be increased up to 25% as the number of high-speed mobility nodes are increases.

A Study on the Use of Cognitive Radio Networks in the Military Operation Environment (군 작전 환경에서의 인지 무선 네트워크 활용방안에 관한 연구)

  • Speybrouck, Valentine;Despoux, Eve;Kim, Yongchul
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.12
    • /
    • pp.106-114
    • /
    • 2021
  • The needs in terms of wireless communications are growing up both for civil and military applications. Therefore a constant improvement of this technology is required to meet customer wishes. One of its main shortcomings is the inefficient use of the spectrum in which a large part of the allocated bands of frequencies is unused. Since communication is crucial, spectrum shortage problems can lead a multi-national and coalition operation to failure. Cognitive Radio Networks (CRNs) are a promising technology which continuously analyses the spectrum searching for available frequencies. It can solve this spectrum issue by avoiding interferences, improving system-wide spectral efficiency, robustness to dynamic conditions and allowing more spectrum flexibility This paper specifically analyzed and presented the application of the CRNs in the military operational environment, and presented the appropriate method applicable to each actual operational situation.

Shifting Alliances in International Organizations: A social networks analysis of co-sponsorship of UN GA resolutions, 1976-2012

  • Lee, Eugene;Stek, Pieter E.
    • Journal of Contemporary Eastern Asia
    • /
    • v.15 no.2
    • /
    • pp.191-210
    • /
    • 2016
  • While general belief is that the military alliances are stable and rigid, the authors argue that the states are far more flexible in their behavior and often act against their alliances. This paper looks at states' behavior in the UN GA and looks how it is reflected in participation in military alliances during three periods of history since 1976 to this day. The authors illustrate the need to consider the network representation of co-sponsoring groups in General Assembly votes. They find significant support for their argument, indicating that social aspects can be extended beyond alliances. An application of social network analysis shows some unexpected affiliations in UN GA. If the UN GA is the "true" nature of these countries' alliance strategies, then it might suggest some significant defections and interesting association.

Self-Identification of Boundary's Nodes in Wireless Sensor Networks

  • Moustafa, Kouider Elouahed;Hafid, Haffaf
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.128-140
    • /
    • 2017
  • The wireless sensor networks (WSNs) became a very essential tool in borders and military zones surveillance, for this reason specific applications have been developed. Surveillance is usually accomplished through the deployment of nodes in a random way providing heterogeneous topologies. However, the process of the identification of all nodes located on the network's outer edge is very long and energy-consuming. Before any other activities on such sensitive networks, we have to identify the border nodes by means of specific algorithms. In this paper, a solution is proposed to solve the problem of energy and time consumption in detecting border nodes by means of node selection. This mechanism is designed with several starter nodes in order to reduce time, number of exchanged packets and then, energy consumption. This method consists of three phases: the first one is to detect triggers which serve to start the mechanism of boundary nodes (BNs) detection, the second is to detect the whole border, and the third is to exclude each BN from the routing tables of all its neighbors so that it cannot be used for the routing.

Analyses of Key Management Protocol for Wireless Sensor Networks in Wireless Sensor Networks (무선 센서 네트워크망에서의 효율적인 키 관리 프로토콜 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.799-802
    • /
    • 2005
  • In this paper, we analyses of Key Management Protocol for Wireless Sensor Networks in Wireless Sensor Networks. Wireless sensor networks have a wide spectrum of civil military application that call for security, target surveillance in hostile environments. Typical sensors possess limited computation, energy, and memory resources; therefore the use of vastly resource consuming security mechanism is not possible. In this paper, we propose a cryptography key management protocol, which is based on identity based symmetric keying.

  • PDF

Efficient Clustering and Data Transmission for Service-Centric Data Gathering in Surveillance Sensor Networks (감시정찰 센서 네트워크에서 서비스 기반 정보수집을 위한 효율적인 클러스터링 및 데이터 전송 기법)

  • Song, Woon-Seop;Jung, Woo-Sung;Seo, Youn;Ko, Young-Bae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.3
    • /
    • pp.304-313
    • /
    • 2013
  • Wireless Sensor Networks, especially supporting for surveillance service, are one of the core properties of network-centric warfare(NCW) that is a key factor of victory in future battlefields. Such a tactical surveillance sensor network must be designed not just for energy efficiency but for real-time requirements of emergency data transmission towards a control center. This paper proposes efficient clustering-based methods for supporting mobile sinks so that the network lifetime can be extended while emergency data can be served as well. We analyze the performance of the proposed scheme and compare it with other existing schemes through simulation via Qualnet 5.0.

A Study on the Standard Sizes Selection Method for Combat Fatiques Using a Clustering Algorithm of Neural Networks (Neural Networks Clustering Algorithm을 이용한 전투복 표준호수 선정에 관한 연구)

  • 김충영;심정훈
    • Korean Management Science Review
    • /
    • v.16 no.1
    • /
    • pp.89-99
    • /
    • 1999
  • Combat fatigues are issued to military personnel with ready made clothes. Ready made combat fatigues should be fitted to various bodies of military personnel within given standard size. This paper develops a standard sizes selection method in order to increase the coverage rate and fitness for combat fatigues. The method utilizes a generalized learning vector quantization(GLVQ) algorithm that is one of cluster algorithm in neural networks techniques. The GLVQ moves the standard sizes from initial arbitrary sizes to next sizes in order to increase more coverage rate and fitness. Finally, when it cannot increase those, algorithm is terminated. The results of this method show more coverage rate and fitness than those of the other methods.

  • PDF

Sensor Failure Detection and Accommodation Based on Neural Networks (신경회로망을 이용한 센서 고장진단 및 극복)

  • 이균정;이봉기
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.1 no.1
    • /
    • pp.82-91
    • /
    • 1998
  • This paper presents a neural networks based approach for the problem of sensor failure detection and accommodation for ship without physical redundancy in the sensors. The designed model consists of two neural networks. The first neural network is responsible for the failure detection and the second neural network is responsible for the failure identification and accommodation. On the yaw rate sensor of ship, simulation results indicates that the proposed method can be useful as failure detector and sensor estimator.

  • PDF

HSR Traffic Reduction Algorithms for Real-time Mission-critical Military Applications

  • Nguyen, Xuan Tien;Rhee, Jong Myung
    • Information and Communications Magazine
    • /
    • v.32 no.10
    • /
    • pp.31-40
    • /
    • 2015
  • This paper investigates several existing techniques to reduce high-availability seamless redundancy (HSR) traffic. HSR is a redundancy protocol for Ethernet networks that provides duplicated frames for separate physical paths with zero recovery time. This feature makes it very useful for real-time and mission-critical applications, such as military applications and substation automation systems. However, the major drawback of HSR is that it generates too much unnecessary redundant traffic in HSR networks. This drawback degrades network performance and may cause congestion and delay. Several HSR traffic reduction techniques have been proposed to reduce the redundant traffic in HSR networks, resulting in the improvement of network performance. In this paper, we provide an overview of these HSR traffic reduction techniques in the literature. The operational principles, advantages, and disadvantages of these techniques are investigated and summarized. We also provide a traffic performance comparison of these HSR traffic reduction techniques.

Synthetic Image Generation for Military Vehicle Detection (군용물체탐지 연구를 위한 가상 이미지 데이터 생성)

  • Se-Yoon Oh;Hunmin Yang
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.26 no.5
    • /
    • pp.392-399
    • /
    • 2023
  • This research paper investigates the effectiveness of using computer graphics(CG) based synthetic data for deep learning in military vehicle detection. In particular, we explore the use of synthetic image generation techniques to train deep neural networks for object detection tasks. Our approach involves the generation of a large dataset of synthetic images of military vehicles, which is then used to train a deep learning model. The resulting model is then evaluated on real-world images to measure its effectiveness. Our experimental results show that synthetic training data alone can achieve effective results in object detection. Our findings demonstrate the potential of CG-based synthetic data for deep learning and suggest its value as a tool for training models in a variety of applications, including military vehicle detection.