• Title/Summary/Keyword: Network Defense

Search Result 907, Processing Time 0.023 seconds

Requirement Analysis of Satellite On-the-Move Transportable Terminal System (이동통신형 차량위성단말 시스템 요구사항 분석)

  • Oh, Il-Hyuk;Song, Choong-Ho;Ko, Dong-Kuk
    • Journal of Satellite, Information and Communications
    • /
    • v.3 no.1
    • /
    • pp.41-47
    • /
    • 2008
  • Line-of-sight communications cannot easily support korean armed forces because of mountainous terrain. ADD(Agency for Defense Development) introduced ANASIS(Army Navy Air-force Satellite Information System) to meet the Korean warfighter's operational needs. Currently, army's military satcom terminal is designed for either fixed site or on-the-pause operation. The US army is under development of multi-band integrated on-the-move satellite terminals to let the army's communication capability to keep pace with globally deployable Joint Task Force for network-centric application. In this paper we analyzed X-band and Ka-band link and subsystem requirement. Our focus here is to describe key technical issues. Especially, On the basis of 3dB beam width of 0.9m antenna, Tracking accuracy and disturbances compensation signal processing on-the-move of Antenna Tracking system is analyzed. Also, protocol is analyzed that minimize blockage on the move due to an obstacle. when the received signal blocked, it stop to transmit burst signal and retransmit when blockage removed through received synchronization signal monitoring. Analyzed specification will be used to make prototype terminal to analyze risk for mass production

  • PDF

Analysis of Actors' Interaction Patterns in the Formation Process of Sexual Crime Prevention Policy: Focusing on classification and case analysis (성범죄예방정책의 형성과정에서 행위자의 상호작용 패턴분석: 유형분류 및 사례분석을 중심으로)

  • Yoo, Keun-Hwan;Kim, Duck-Hwan;Suh, Kyung-Do
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.9
    • /
    • pp.209-215
    • /
    • 2018
  • The purpose of this study is to grasp the overall policy decision system of sex crime prevention policy and analyze the interaction and pattern of actors in policy formation process. This is a useful way to identify the causes and ways to improve the policy if the sex crime prevention policy fails. As a research method, we used a model of advocacy through case analysis and language network analysis. In the external environment, low reporting of sex offenses, technical improvement and supplement for preventive management, consciousness of victims of sexual crimes, amendment of legislation, and support of the president. The conflicts between the advocacy coalition opposed the strong regulation, the prevention of recidivism, the expansion of the range of objects to be worn, the temporary effect of the system and the retrospective of the bill. As a problem-solving strategy, it was confirmed that the opposing positions of pros and cons of lack of manpower and negligence of management through the extension of the system were acutely opposed. In the context of media reports, this tendency is more likely to be understood as the concern of prevention and management at the central government level to prevent sex crimes. Therefore, although the methods of prevention of sex crimes have been insufficient in the past, it is hoped that this study will be helpful in breaking the link of negative policy vicious cycle.

Functional characterization of Arabidopsis thaliana BLH 8, BEL1-Like Homeodomain 8 involved in environmental stresses (환경 스트레스에 관여하는 애기장대 BLH 8, BEL1-Like Homeodomain 8의 기능 분석)

  • Park, Hyeong-Cheol;Park, Ji-Young;Baek, Dong-Won;Yun, Dae-Jin
    • Journal of Plant Biotechnology
    • /
    • v.38 no.2
    • /
    • pp.162-168
    • /
    • 2011
  • High salinity is a common stress condition that adversely affects plant growth and crop production. In response to various environmental stresses, plants activate a number of defense genes that function to increase the tolerance. To isolate Arabidopsis genes that are involved in abiotic stress responses, we carried out genetic screening using various mutant lines. Among them, the blh8 ($\b{B}$EL1-$\b{L}$ike $\b{H}$omeodomain $\underline{8}$) mutant specifically shows chlorotic phenotypes to ionic (specifically, $Na^+$ and $K^+$) stresses, but no differences in root growth. In addition, BLH8 is related to plant development and abiotic stress as predicted by a Graphical Gaussian Model (GGM) network program. It implies that BLH8 functions as a putative transcription factor related to abiotic stress responses. Collectively, our results show that gene network analysis is a useful tool for isolating genes involved in stress adaptation in plants.

Underwater Experiment on CSMA/CA Protocol Using Commercial Modems (상용 모뎀 제어를 통한 수중 CSMA/CA 프로토콜 시험)

  • Cho, Junho;Lee, Sang-Kug;Shin, Jungchae;Lee, Tae-Jin;Cho, Ho-Shin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.6
    • /
    • pp.457-465
    • /
    • 2014
  • This paper introduces a test bed for communication protocol schemes of underwater acoustic sensor network, and also shows experimental results obtained from the test bed. As a testing protocol, carrier sense multiple access/collision avoidance (CSMA/CA) is evaluated on underwater acoustic channel. A sensor node is equipped with a DSP control board of ATmega2560 and a commercial underwater modem produced by Benthos. The control board not only manipulates a GPS signal to acquire the information of location and time, but also controls the underwater modem to operate according to the procedure designed for a given testing protocol. Whenever any event takes place such as exchanging control/data packets between underwater modems and acquiring location and timing information, each sensor node reports them through radio frequency (RF) air interface to a central station located on the ground. The four kinds of packets for CSMA/CA, RTS(Request To Send), CTS(Clear to Send), DATA, ACK(Acknowledgement) are designed according to the underwater communication environment and are analyzed through the lake experiment from the point of feasibility of CSMA/CA in underwater acoustic communications.

A Study on the Design of KVMF 2.0 Protocol for Ensuring Backward/Forward Compatibility between Different KVMF Message Standard Versions

  • Jeong-Min, Lee;Won-Gi, Lim;Won-Jun, Cho;Yong-Cheol, Kim;Jeung-Sub, Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.3
    • /
    • pp.45-58
    • /
    • 2023
  • KVMF(Korean Variable Message Format) 1.0 protocol is the Army's standard tactical datalink protocol that defines standard messages and communication methods to enable data communication between various weapon systems through bitwise variable message processing. The protocol has been applied to a variety of Army weapon systems over the past decade and has contributed to upgrade the Army's operational capabilities by enabling the implementation of Network Centric Warfare (NCW), the core of modern warfare. Since the KVMF 1.0 protocol was applied, new weapon systems with new technologies have been introduced over time, and new weapon systems have new messages based on the characteristics of the weapon system. As a result, compatibility problems arose due to different message versions with existing weapon systems, and it was expected that these problems would continue to emerge in the future, considering the need for continuous message revisions. Therefore, it became necessary to solve this problem, so this paper proposed a KVMF 2.0 protocol design that guarantees compatibility between forward and backward versions. In this paper, we implemented the design as SW, and confirmed that the design worked successfully by test between forward and backward versions on test environment. Therefore, when the KVMF 2.0 protocol design is applied to a weapon system, we can expect that the weapon system can be compatible with the forward and backward versions working with the existing weapon systems as well as with the future weapon systems.

A Study on the Analysis and the Direction of Improvement of the Korean Military C4I System for the Application of the 4th Industrial Revolution Technology (4차 산업혁명 기술 적용을 위한 한국군 C4I 체계 분석 및 성능개선 방향에 관한 연구)

  • Sangjun Park;Jee-won Kim;Jungho Kang
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.131-141
    • /
    • 2022
  • Future battlefield domains are expanding to ground, sea, air, space, and cyber, so future military operations are expected to be carried out simultaneously and complexly in various battlefield domains. In addition, the application of convergence technologies that create innovations in all fields of economy, society, and defense, such as artificial intelligence, IoT, and big data, is being promoted. However, since the current Korean military C4I system manages warfighting function DBs in one DB server, the efficiency of combat performance is reduced utilization and distribution speed of data and operation response time. To solve this problem, research is needed on how to apply the 4th industrial revolution technologies such as AI, IoT, 5G, big data, and cloud to the Korean military C4I system, but research on this is insufficient. Therefore, this paper analyzes the problems of the current Korean military C4I system and proposes to apply the 4th industrial revolution technology in terms of operational mission, network and data link, computing environment, cyber operation, interoperability and interlocking capabilities.

Analysis and Calculation of Factors Influencing the Sortie Generation Rate (SGR) of Aircraft-carrying Naval Ships (함재기탑재 함정의 소티 생성률(Sortie Generation Rate) 영향인자 분석 및 산출 연구)

  • Sunah Jung;Heechang Yoon;Seungheon Oh;Jonghoon Woo;Sangwoo Bae;Dongi Park;Woongsub Lee;Jaehyuk Lee;Hyuk Lee;Junghoon Chung
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.61 no.4
    • /
    • pp.267-277
    • /
    • 2024
  • The Sortie Generation Rate (SGR) is a critical performance indicator for carrier-based aircraft and is a key factor for the carrier design process. This study aims to analyze the factors that affect SGR and establish a representative Sortie Generation Process (SGP) along with simulation results to calculate SGR for a naval ship equipped to carry aircraft. Detailed SGR factors are identified from the perspectives of the aircraft, aviation personnel, and aircraft carrier during the flight preparation stage, and the SGP is established accordingly. As a representative, Korean Navy's CVX basic design is chosen for detailed analysis. The physical dimension and spots for the deck design with time and probabilistic data of SGP are considered to develop a queueing network model for SGR calculation. To consider the specific probabilistic features, the model was solved with discrete event simulation tools(SimPy and AnyLogic) where the results show great agreement. Such findings on SGR factors and calculation are expected to be incorporated in the future development of SGR calculation algorithms and also present guidelines for proper design of aircraft carrier based on concrete operation concept.

MDP(Markov Decision Process) Model for Prediction of Survivor Behavior based on Topographic Information (지형정보 기반 조난자 행동예측을 위한 마코프 의사결정과정 모형)

  • Jinho Son;Suhwan Kim
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.2
    • /
    • pp.101-114
    • /
    • 2023
  • In the wartime, aircraft carrying out a mission to strike the enemy deep in the depth are exposed to the risk of being shoot down. As a key combat force in mordern warfare, it takes a lot of time, effot and national budget to train military flight personnel who operate high-tech weapon systems. Therefore, this study studied the path problem of predicting the route of emergency escape from enemy territory to the target point to avoid obstacles, and through this, the possibility of safe recovery of emergency escape military flight personnel was increased. based problem, transforming the problem into a TSP, VRP, and Dijkstra algorithm, and approaching it with an optimization technique. However, if this problem is approached in a network problem, it is difficult to reflect the dynamic factors and uncertainties of the battlefield environment that military flight personnel in distress will face. So, MDP suitable for modeling dynamic environments was applied and studied. In addition, GIS was used to obtain topographic information data, and in the process of designing the reward structure of MDP, topographic information was reflected in more detail so that the model could be more realistic than previous studies. In this study, value iteration algorithms and deterministic methods were used to derive a path that allows the military flight personnel in distress to move to the shortest distance while making the most of the topographical advantages. In addition, it was intended to add the reality of the model by adding actual topographic information and obstacles that the military flight personnel in distress can meet in the process of escape and escape. Through this, it was possible to predict through which route the military flight personnel would escape and escape in the actual situation. The model presented in this study can be applied to various operational situations through redesign of the reward structure. In actual situations, decision support based on scientific techniques that reflect various factors in predicting the escape route of the military flight personnel in distress and conducting combat search and rescue operations will be possible.

A Study on the Change of Cyber Attacks in North Korea (북한의 사이버 공격 변화 양상에 대한 연구)

  • Chanyoung Park;Hyeonsik Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.175-181
    • /
    • 2024
  • The U.N. Security Council's North Korea Sanctions Committee estimated that the amount of North Korea's cyberattacks on virtual asset-related companies from 2017 to 2023 was about 4 trillion won. North Korea's cyberattacks have secured funds through cryptocurrency hacking as it has been restricted from securing foreign currency due to economic sanctions by the international community, and it also shows the form of technology theft against defense companies, and illegal assets are being used to maintain the Kim Jong-un regime and develop nuclear and missile development. When North Korea conducted its sixth nuclear test on September 3, 2017, and declared the completion of its national nuclear armament following the launch of an intercontinental ballistic missile on November 29 of the same year, the U.N. imposed sanctions on North Korea, which are considered the strongest economic sanctions in history. In these difficult economic situations, North Korea tried to overcome the crisis through cyberattacks, but as a result of analyzing the changes through the North's cyber attack cases, the strategic goal from the first period from 2009 to 2016 was to verify and show off North Korea's cyber capabilities through the neutralization of the national network and the takeover of information, and was seen as an intention to create social chaos in South Korea. When foreign currency earnings were limited due to sanctions against North Korea in 2016, the second stage seized virtual currency and secured funds to maintain the Kim Jong-un regime and advance nuclear and missile development. The third stage is a technology hacking of domestic and foreign defense companies, focusing on taking over key technologies to achieve the five strategic weapons tasks proposed by Chairman Kim Jong-un at the 8th Party Congress in 2021. At the national level, security measures for private companies as well as state agencies should be established against North Korea's cyberattacks, and measures for legal systems, technical problems, and budgets related to science are urgently needed. It is also necessary to establish a system and manpower to respond to the ever-developing cyberattacks by focusing on cultivating and securing professional manpower such as white hackers.

Design of Web based Simulation Provenance Data Sharing Service (웹 기반 시뮬레이션 이력출처 데이터 공유 서비스 설계)

  • Jung, Youngjin;Nam, Dukyun;Yu, Jinseung;Lee, JongSuk Ruth;Cho, Kumwon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.5
    • /
    • pp.1128-1134
    • /
    • 2014
  • Web based simulation service is actively utilized to computably analyze various kinds of phenomena in real world according to progress of computing technology and spread of Network. However it is hard to share data and information among users on the services, because most of web based simulation services do not share and open simulation processing information and results. In this paper, we design a simulation provenance data sharing service on EDISON_CFD (EDucation-research Integration Simulation On the Net for Computational Fluid Dynamics) to share the calculated simulation performance information. To store and share the simulation processing information, we define the simulation processing step as "Problem ${\rightarrow}$ Plan, Design ${\rightarrow}$ Mesh ${\rightarrow}$ Simulation performance ${\rightarrow}$ Result ${\rightarrow}$ Report." Users can understand a problem solving method through a computer simulation by searching the simulation performance information with Search/Share API of the store. Besides, this opened simulation information can reduce the waste of calculation resource to process same simulation jobs.