• 제목/요약/키워드: Mission Computer

검색결과 254건 처리시간 0.027초

항공기 임무컴퓨터의 VIOM 설계 (Design on VIOM of Mission Computer for Aircraft)

  • 장한진;염철문;양승열
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2007년도 제38회 하계학술대회
    • /
    • pp.1868-1869
    • /
    • 2007
  • 항공기의 임무컴퓨터는 외부영상과 비행관련 정보들을 시현하기 위한 그래픽 처리를 담당한다. VIOM은 외부영상신호를 임무컴퓨터의 각 모듈에 전달하고, 내부모듈에서 생성한 비행관련정보들을 원하는 시현장치로 전송하는 역할을 한다. 현재 개발하고자 하는 KHP용 임무컴퓨터의 VIOM은 영상수신처리회로, 영상분배 및 선택회로, 모듈영상수신 및 분배회로, 모듈영상선택회로, 그리고 영상선택 정보를 획득하기 위한 데이터 인터페이스 등으로 구성된다. 본 논문은 KHP 임무컴퓨터 VIOM 의 전체 인터페이스 구성과 이를 위한 각 회로 설계에 대한 정보를 제시함을 목적으로 한다.

  • PDF

Embedded Software Development for MSC on KOMPSAT-2

  • Heo, H.P.;Kong, J.P.;Yong, S.S.;Kim, Y.S.;Park, J.E.;Youn, H.S.;Paik, H.Y.
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2003년도 Proceedings of ACRS 2003 ISRS
    • /
    • pp.1093-1095
    • /
    • 2003
  • MSC(Multi-Spectral Camera) system is a remote sensing instrument to obtain high resolution ground image. MSC system includes main control unit, called SBC(Single Board Computer). SBC controls all the sub-units of MSC system and communicates with spacecraft bus. The software developed for SBC should be reliable and autonomous to support various kinds of imaging missions. It is being developed using VxWorks real-time operating system to manage all tasks for all units efficiently. In this paper, the characteristics of the embedded software on the MSC system will be presented. It covers the hardware related characteristics like the BSP(Board Support Package), device driver and code patch mechanism.

  • PDF

Cognitive Radio Anti-Jamming Scheme for Security Provisioning IoT Communications

  • Kim, Sungwook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권10호
    • /
    • pp.4177-4190
    • /
    • 2015
  • Current research on Internet of Things (IoT) has primarily addressed the means to enhancing smart resource allocation, automatic network operation, and secure service provisioning. In particular, providing satisfactory security service in IoT systems is indispensable to its mission critical applications. However, limited resources prevent full security coverage at all times. Therefore, these limited resources must be deployed intelligently by considering differences in priorities of targets that require security coverage. In this study, we have developed a new application of Cognitive Radio (CR) technology for IoT systems and provide an appropriate security solution that will enable IoT to be more affordable and applicable than it is currently. To resolve the security-related resource allocation problem, game theory is a suitable and effective tool. Based on the Blotto game model, we propose a new strategic power allocation scheme to ensure secure CR communications. A simulation shows that our proposed scheme can effectively respond to current system conditions and perform more effectively than other existing schemes in dynamically changeable IoT environments.

Development of an Autonomous Situational Awareness Software for Autonomous Unmanned Aerial Vehicles

  • Kim, Yun-Geun;Chang, Woohyuk;Kim, Kwangmin;Oh, Taegeun
    • 항공우주시스템공학회지
    • /
    • 제15권2호
    • /
    • pp.36-44
    • /
    • 2021
  • Unmanned aerial vehicles (UAVs) are increasingly needed as they can replace manned aircrafts in dangerous military missions. However, because of their low autonomy, current UAVs can execute missions only under continuous operator control. To overcome this limitation, higher autonomy levels of UAVs based on autonomous situational awareness is required. In this paper, we propose an autonomous situational awareness software consisting of situation awareness management, threat recognition, threat identification, and threat space analysis to detect dynamic situational change by external threats. We implemented the proposed software in real mission computer hardware and evaluated the performance of situational awareness toward dynamic radar threats in flight simulations.

Elimination of Screen-Flickering Phenomenon in Multi-Function Display During Flight of Fixed-Wing Aircraft

  • Kwon, Jung-Hyuk;Kwon, Ik-Hyun;Beak, Jun-Ho;Jang, Geun-Hyung;Lee, Wang-Sang
    • 항공우주시스템공학회지
    • /
    • 제15권2호
    • /
    • pp.45-51
    • /
    • 2021
  • In this study, we aim to eliminate the flickering phenomenon in multi-function display (MFD) units during the flight of fixed-wing aircraft. To execute flight missions effectively, the video signals transmitted to MFDs must provide information accurately and seamlessly. Therefore, a method for addressing the flickering phenomenon-including cause analysis and failure diagnosis-is adopted; specifically, a wiring configuration with a direct connection between the video signal cables and with a short cable length is adopted. The proposed method is experimentally verified using a flight test.

가상현실기반 훈련 콘텐츠에서 발달장애인의 시각적 주의집중도 분석 (Analysis of Visual Attention of Students with Developmental Disabilities in Virtual Reality Based Training Contents)

  • 조정희
    • 한국멀티미디어학회논문지
    • /
    • 제24권2호
    • /
    • pp.328-335
    • /
    • 2021
  • In the era of 'Untact', virtual reality-based job training platforms are actively being used as part of non-face-to-face education for students with developmental disabilities. Because the people with developmental disabilities may lack sufficient cognitive abilities, it is difficult to conduct untact training seamlessly without the help of a third party. Therefore, it is necessary for training programs to identify the right timing to provide help so that the training can be continued. This research analyzed the visual attention of students with developmental disabilities in virtual reality-based job training program in order to determine the point of time when an intervention is required by the trainee. Results showed that students who completed the mission tended to have intense visual attention on a small number of objects for a certain period of time; the visual attention of the students who failed tended to shift erratically among multiple objects.

Implementation of JDAM virtual training function using machine learning

  • You, Eun-Kyung;Bae, Chan-Gyu;Kim, Hyeock-Jin
    • 한국컴퓨터정보학회논문지
    • /
    • 제25권11호
    • /
    • pp.9-16
    • /
    • 2020
  • TA-50 항공기는 공중전에 대비하여 공대공, 공대지 사격 훈련 등 다양한 상황에 대한 모의 훈련을 수행하고 있다. 또한 조종사의 실전 배치 전 훈련용으로도 사용되고 있다. 그러나 TA-50은 스마트 무장 운용 능력을 보유하고 있지 않아 훈련에 제한이 되고 있다. 이에 본 연구에서는 TA-50 항공기에 스마트 무장 중 하나인 합동정밀직격탄(JDAM)의 가상훈련이 가능하도록 구현하고자 하였다. 먼저, TA-50 항공기와 유사한 기종인 FA-50 항공기에 구현된 JDAM 기능을 분석하였다. 또한 FA-50 항공기에 구현된 기능은 소스코드의 직접 활용이 불가능하므로 머신러닝 기법(TensorFlow)을 활용하여 알고리즘을 추출하였다. 본 기능을 구현함으로써 실 무장을 장착하지 않아도 실제와 유사한 훈련이 가능할 것으로 기대된다. 마지막으로 본 연구 결과를 바탕으로 연구의 한계점을 보완하여 실제와 동일하게 구현할 수 있는 방안을 제안하고자 한다.

Exploiting Mobility for Efficient Data Dissemination in Wireless Sensor Networks

  • Lee, Eui-Sin;Park, Soo-Chang;Yu, Fucai;Kim, Sang-Ha
    • Journal of Communications and Networks
    • /
    • 제11권4호
    • /
    • pp.337-349
    • /
    • 2009
  • In this paper, we introduce a novel mobility model for mobile sinks in which the sinks move towards randomly distributed destinations, where each destination is associated with a mission. The novel mobility model is termed the random mobility with destinations. There have been many studies on mobile sinks; however, they merely support two extreme cases of sink mobility. The first case features the most common and general mobility, with the sinks moving randomly, unpredictably, and inartificially. The other case takes into account mobility only along predefined or determined paths such that the sinks can gather data from sensor nodes with minimum overhead. Unfortunately, these studies for the common mobility and predefined path mobility might not suit for supporting the random mobility with destinations. In order to support random mobility with destination, we propose a new protocol, in which the source nodes send their data to the next movement path of a mobile sink. To implement the proposed protocol, we first present a mechanism for predicting the next movement path of a mobile sink based on its previous movement path. With the information about predicted movement path included in a query packet, we further present a mechanism that source nodes send energy-efficiently their data along the next movement path before arriving of the mobile sink. Last, we present mechanisms for compensating the difference between the predicted movement path and the real movement path and for relaying the delayed data after arriving of the mobile sink on the next movement path, respectively. Simulation results show that the proposed protocol achieves better performance than the existing protocols.

Implementation of Vertigo Warning function for FA-50 aircraft

  • You, Eun-Kyung;Kim, Hyeock-Jin
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권10호
    • /
    • pp.1-9
    • /
    • 2019
  • 전투기 조종사는 '비행환경 적응 교육 훈련(APT)'을 이수함으로써 악조건 속에서도 완벽하게 임무를 수행할 수 있도록 능력을 향상시키고 있다. 그러나 비행 시 가속도로 인해 인체 평형기관의 이상으로 'Vertigo(Spatial disorientation)' 현상에 빠지게 되어 추락하는 사고 사례가 발생하고 있다. 이러한 비행착각에 빠지는 전투기 추락 사고는 국내 외를 불문하고 빈번하게 발생하고 있다. 이에 본 연구에서는 전투기에 'Vertigo' 경고 기능을 구현하고자 하였다. 먼저, 항공기 주임무 컴퓨터와 현재 구현되어 있는 경고 기능을 분석하였다. 그리고 항공기 자세 정보를 이용하기 위해 좌표계 시스템을 연구하였다. 이를 바탕으로 전투기가 배면 비행 자세로 일정 시간 이상 하강 시 전방시현장비에 시각적인 경고 기능을 제공하고자 하였다. 본 기능을 구현함으로써 조종사의 비행 안전을 향상시킬 수 있을 것이라고 기대한다. 또한 본 연구 결과를 바탕으로 다른 서브시스템과의 연계를 통한 경고 기능 구현 방안을 제안하고자 한다.

S-FEAR: Secure-Fuzzy Energy Aware Routing Protocol for Wireless Sensor Networks

  • Almomani, Iman;Saadeh, Maha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권4호
    • /
    • pp.1436-1457
    • /
    • 2018
  • Secure routing services in Wireless Sensor Networks (WSNs) are essential, especially in mission critical fields such as the military and in medical applications. Additionally, they play a vital role in the current and future Internet of Things (IoT) services. Lightness and efficiency of a routing protocol are not the only requirements that guarantee success; security assurance also needs to be enforced. This paper proposes a Secure-Fuzzy Energy Aware Routing Protocol (S-FEAR) for WSNs. S-FEAR applies a security model to an existing energy efficient FEAR protocol. As part of this research, the S-FEAR protocol has been analyzed in terms of the communication and processing costs associated with building and applying this model, regardless of the security techniques used. Moreover, the Qualnet network simulator was used to implement both FEAR and S-FEAR after carefully selecting the following security techniques to achieve both authentication and data integrity: the Cipher Block Chaining-Message Authentication Code (CBC-MAC) and the Elliptic Curve Digital Signature Algorithm (ECDSA). The performance of both protocols was assessed in terms of complexity and energy consumption. The results reveal that achieving authentication and data integrity successfully excluded all attackers from the network topology regardless of the percentage of attackers. Consequently, the constructed topology is secure and thus, safe data transmission over the network is ensured. Simulation results show that using CBC-MAC for example, costs 0.00064% of network energy while ECDSA costs about 0.0091%. On the other hand, attacks cost the network about 4.7 times the cost of applying these techniques.