• Title/Summary/Keyword: Mission Computer

Search Result 254, Processing Time 0.022 seconds

The Multi-Net Performance Evaluation of Link-16 in the L-Band Sharing with Radars (L-대역 내 레이더 주파수 공동사용 환경에서 멀티넷을 통한 Link-16 운용 가능성 성능 평가)

  • Choi, Seonjoo;Yu, Jepung;Lim, Jaesung;Baek, Hoki;Kim, Jaewon;Choi, Hyogi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.7
    • /
    • pp.738-746
    • /
    • 2016
  • As the trend of future war has been changed to network centric warfare, tactical data link should be needed for fast and accurate situation awareness. Nowadays, Korean air force conducts military operations by using aircrafts equipped with Link-16. The Link-16 can conduct multiple mission at the same time because it supports multi-net capability. Due to lack of frequency resource, the way to share the frequency with other systems has been studied and using L band with radar is considered as one of the candidates bands. However, the data link can be affected by the interference from radars when it shares the L-band because the L-band in Korea is already assigned to long-range detection radars. In this paper, we evaluate operational possibilities of tactical data link in the L-band based on Link-16.

Intrusion-Tolerant Jini Service Architecture for Enhancing Survivability of Ubiquitous Services (유비쿼터스 서비스 생존성 제고를 위한 침입감내 Jini 서비스 구조)

  • Kim, Sung-Ki;Park, Kyung-No;Min, Byoung-Joon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.4
    • /
    • pp.41-52
    • /
    • 2008
  • Ubiquitous service environment is poor in reliability of connection and has a high probability that the intrusion and the system failure may occur. Therefore, in the environment, the capability of a system to collectively accomplish its mission in spite of active intrusions and various failure scenarios, that is, the survivability of services are needed. In this paper, we analyze the Jgroup/ARM framework that was developed in order to help the development of fault- tolerant Jini services. More importantly, we propose an intrusion-tolerant Jini service architecture to satisfy the security availability and quality of services on the basis of the analysis. The proposed architecture is able to protect a Jini system not only from faults such as network partitioning or server crash, but also from attacks exploiting flaws. It is designed to provides performance enough to show a low response latency so as to support seamless service usage. Through the experiment on a test-bed, we have confirmed that the architecture is able to provide high security and availability at the level that degraded services quality is ignorable.

An Operating Software Development of A Prototype Coronagraph for The Total Solar Eclipse in 2017

  • Park, Jongyeob;Choi, Seonghwan;Kim, Jihun;Jang, Be-ho;Bong, Su-Chan;Baek, Ji-Hye;Yang, Heesu;Park, Young-Deuk;Cho, Kyung-Suk
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.42 no.2
    • /
    • pp.85.1-85.1
    • /
    • 2017
  • We develop a coronagraph to measure the coronal electron density, temperature, and speed by observing the linearly polarized brightness of solar corona with 4 different wavelengths. Through the total solar eclipse on 21 August 2017, we test an operating software of a prototype coronagraph working with two sub-systems of two motorized filter wheels and a CCD camera that are controlled by a portable embedded computer. A Core Flight System (CFS) is a reusable software framework and set of reusable software applications which take advantage of a rich heritage of successful space mission of NASA. We use the CFS software framework to develop the operating software that can control the two sub-systems asynchronously in an observation scenario and communicate with a remote computer about commands, housekeeping data through Ethernet. The software works successfully and obtains about 160 images of 12 filter sets (4 bandpass filters and 3 polarization angles) during the total phase of the total solar eclipse. For the future, we can improve the software reliability by testing the software with a sufficient number of test cases using a testing framework COSMOS. The software will be integrated into the coronagraph for balloon-borne experiments in 2019.

  • PDF

An Algorithm for evaluating Combat Power Effectiveness by considering the Influence of Human Factors (인적요소의 영향력을 고려한 전투효과 평가 알고리즘)

  • Kwon, Oh-Sang;Park, Gun-Woo;Lee, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.1
    • /
    • pp.201-210
    • /
    • 2011
  • Each area of society has changed because of the development of information technology. Especially, the advent of NCW based on the technology of network has become a new paradigm for executing warfare. Effectiveness of NCW can be maximized by building the C4I system which is a core system of NCW. However, if we don't consider the influence in term of human dimension, we can't expect the effect of C4I system, since the key factor in C4I is human. In this paper, we propose an algorithm for evaluating Combat Power Effectiveness by considering the Influence of Human Factors that wasn't reflected in the past. Based on experimental validation our algorithm is more substantial than baseline algorithms. In addition, we proved that the Influence of Human Factors(e.g. collaboration) is the most important in battlefield. Therefore, proposed algorithm can be used for enhancing not only mission effectiveness in terms of military field but also work performance by effective Human Resource Management in terms of an enterprise.

The Design of a Multimedia Data Management and Monitoring System for Digital Rights Protection using License Agent (라이선스 에이전트를 이용한 디지털 저작권 보호를 위한 멀티미디어 데이터 관리 및 감시 시스템의 설계)

  • Park, Jae-Pyo;Lee, Kwang-Hyung;Kim, Won;Jeon, Moon-Seok
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.2
    • /
    • pp.281-292
    • /
    • 2004
  • As the logistic environment of digital contents is rapidly changing, the protection of the digital rights for digital content has been recognized as one of critical Issues. Digital Right Management(DRM) has taken much interest Internet Service Provider(ISP), authors and publishers of digital content as an interested approach to create a trusted environment for access and use of digital resources. This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PKI security method, real time action monitoring for user, data security for itself.

  • PDF

The Study for ENHPP Software Reliability Growth Model based on Burr Coverage Function (Burr 커버리지 함수에 기초한 ENHPP소프트웨어 신뢰성장모형에 관한 연구)

  • Kim, Hee-Cheul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.33-42
    • /
    • 2007
  • Accurate predictions of software release times, and estimation of the reliability and availability of a software product require quantification of a critical element of the software testing process : test coverage. This model called Enhanced non-homogeneous poission process(ENHPP). In this paper, exponential coverage and S-shaped model was reviewed, proposes the Kappa coverage model, which maked out efficiency application for software reliability. Algorithm to estimate the parameters used to maximum likelihood estimator and bisection method, model selection based on SSE statistics and Kolmogorov distance, for the sake of efficient model, was employed. From the analysis of mission time, the result of this comparative study shows the excellent performance of Burr coverage model rather than exponential coverage and S-shaped model using NTDS data. This analysis of failure data compared with the Kappa coverage model and the existing model(using arithmetic and Laplace trend tests, bias tests) is presented.

  • PDF

A Development of 3D Penetration Analysis Program for Survivability Analysis of Combat System : Focused on Tank Model (전투 시스템 생존성 분석을 위한 3차원 관통 해석 프로그램 개발 : 전차 모델을 대상으로)

  • Hwang, Hun-Gyu;Lee, Jae-Woong;Lee, Jang-Se;Park, Jong-Sou
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.1
    • /
    • pp.244-250
    • /
    • 2015
  • Survivability is avoidance and tolerance ability of combat systems for accomplishing mission in battle field. Therefore, the combat system has to protect or minimize any damage from threats. For this reason, many modeling and simulation based studies which analyze vulnerability of the combat system by threats, are in progress to improve survivability of the combat system. In this paper, we developed a 3D penetration analysis program for survivability analysis of combat system. To do this, we applied the penetration analysis equation to threat and protection performance of tank. Also we implemented simple tank models based on 3D CAD, and tested the developed program using the implemented tank models. As a result, we verified the developed program that is possible to analyze penetration by threat and protection performance of tank and to visualize its result, based on scenarios.

A Crew Location Recognition System for a Naval Ship by Applying Ubiquitous Technologies

  • Lee, Jin-Tae;Cho, Seong-Rak;Kim, Seong-Jeon
    • Journal of Ship and Ocean Technology
    • /
    • v.12 no.3
    • /
    • pp.26-35
    • /
    • 2008
  • Recognition of real time locations of crews for a naval ship is important, not only for the operation efficiency but also for the safety of onboard crews in the ship. More than 100 crews are dwelling in a modem naval ship and they are involved in various duties. Moreover many visitors come in and out frequently while the ship is moored in a harbor. It sometimes requires considerable time and efforts to find a person for urgent mission. It would enhance the operational efficiency if locations of onboard crews are recognized and monitored in real time. An active type RFID tag, which has a specific ID number, is distributed to each crew member, which should be carried during his stay in the ship. A number of fixed type RFID readers are to be located at the major passages of the ship, which are connected to the main computer via Local Area Network. The location of a crew would be identified by the ID number of his RFID tag and the location of the RFID reader which detected the RFID tag. A middleware is needed to process the collected data in the main computer. The data is fed to application softwares, which actually display locations of the concerned crews. The software is coded using GUI (Graphic User Interface) for better user friendliness, which has the function of storing the location history of a crew, and sending warning messages to appropriate persons, if unallowable behavior is detected. An auxiliary naval ship is selected for an experimental application study of the proposed system. It turns out that the required budget and time for the realization of the system is within the allowable limits. But complementary measures to protect the privacy of onboard crews should be considered and adopted, before the application of the system is realized.

Kiosk training strategies based on IT educational App for older adults

  • Jee, Sung-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.4
    • /
    • pp.239-245
    • /
    • 2021
  • Due to the fourth industrial revolution and the Corona19, the availability of digital devices such as kiosks is a matter directly related to survival for older adults with digital divide. This paper analyzes the problems of existing information service education for older adults and proposes an IT education strategy tailored to aging and life cycle of older adults. The proposed in this study is an educational application-based IT training method that supports repetitive learning regardless of time and place, developing kiosk function as a functional game-type educational application and experimenting with post-training effectiveness. The research method proposed UI usability evaluation frame for older adults, and developed educational applications based on proposed evaluation frame, and conducted kiosk education. As a result of the experiment, the mission success rate after using the IT application was 80.6%, which is a 55.1%P improvement compared to the pre-use(25.5%). This study confirmed that the proposed education for older adults is a way to overcome the limitations of existing IT education in the current situation.

A Functional Matrix Approach to Pedagogical Enrichment of the Dispositional Core of Future Specialists' Experience of Social Interaction

  • Kovalenko, E.V.;Gubarenko, I.V.;Kovalenko, V.I.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.255-259
    • /
    • 2022
  • The new social reality emerging amid the global rise of communication links and integration processes acutely emphasizes the problems of communication in large and small social systems. The method of their communication becomes one of the keys to ensuring global security. It has become the mission of humanitarian education to prepare the younger generations for life in a changing world with no image of the future and increasing uncertainty. In psychological and pedagogical research, there is a growing scientific interest in the problems of interaction of the individual with the social environment. The mental trace of a person's practice in society shapes the experience of social interaction, which constitutes simultaneously the source, tool, and condition for the emergence and development of personality. The study outlines the methodological foundations for the study of individual experiences of social interaction. A hypothesis about the productivity of the functional matrix method is tested. Materials for the training of specialists in the humanities include interdisciplinary approaches to the study and transformation of the experience of social interaction and systematic methodology for the study of complex objects. Fundamental to the study is the systematic-dialectical method, and the matrix method is employed as the instrumental-technological method. The paper presents the results of a multidisciplinary overview of scientific literature concerning the essential characteristics and functions of social interaction and the respective experience. The overview points to the fragmented nature of scientific understanding of the elements of experience outside its integrity and systemic properties. Based on the formula "personality interacts with the social environment", the study presents an algorithm for the application of a systematic methodology for the study of complex objects, which made it possible to identify the system parameters of experience at three levels of cognition and develop the reference structural and functional matrices for the didactic system of its pedagogical enrichment.