• Title/Summary/Keyword: Tactical computer

Search Result 106, Processing Time 0.022 seconds

Performance Analysis of Routing Protocols for Mobile Ad-hoc Network under Group Mobility Environment (그룹 이동 환경에서의 무선 애드혹 네트워크 라우팅 알고리즘 성능 분석)

  • Yang, Hyo-Sik;Yeo, In-Ho;Rhee, Jong-Myung
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.52-59
    • /
    • 2008
  • Most pier performance analysis results for ad-hoc routing protocols have been based upon the model which each node in the network moves independently without restriction. In most real environments, however, it is very common for a group or multiple groups to move under the direction of group leader or group leaders instead of each node's independent movement. This paper presents the performance analysis of routing protocols for mobile ad-hoc network under group mobility environment. The comparative simulations have been made between a table-driven protocol, DSDV, and two on-demand protocols, AODV and DSR, under a group mobility model, RPGM, which is suitable for the practical applications such as military tactical operation. Multiple group movements are also included. The results show that the protocol performances for single group movement are very similar to node independent movement case. However some differences have been observed by varying pause time and connectivity.

Design of TM/TC data protocol of Military Unmanned Aerial Vehicles (군용 무인기의 TM/TC 데이터 프로토콜 설계)

  • Hong, Su-woon;Kim, Young-kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.3
    • /
    • pp.506-512
    • /
    • 2018
  • Unmanned aerial vehicles(UAVs) operating in the military for various purposes are designed to transmit information collected according to the purpose to GCS(Ground Control System), and to transmit/receive the vehicle's operational control and status information using wireless communication(or datalink). Currently, the military UAV systems in operation in Korea use unique communication methods, protocols, and message structures for each system. Among these, the Division UAV is designed to transmit fixed size TM/TC data repeatedly and the Corps UAV is designed to transmit aperiodic TM/TC data to the variable length of the message-based. In this paper, we analyze the TM/TC data protocol of existing military UAV systems and present data protocol design method which is considered to be more efficient in wireless communication environment applied to equipment under development. And we will discuss issues to be considered for standardization of technology for ensuring interoperability with many UAVs or newly introduced UAV systems.

A Study on Building Knowledge Base for Intelligent Battlefield Awareness Service

  • Jo, Se-Hyeon;Kim, Hack-Jun;Jin, So-Yeon;Lee, Woo-Sin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.4
    • /
    • pp.11-17
    • /
    • 2020
  • In this paper, we propose a method to build a knowledge base based on natural language processing for intelligent battlefield awareness service. The current command and control system manages and utilizes the collected battlefield information and tactical data at a basic level such as registration, storage, and sharing, and information fusion and situation analysis by an analyst is performed. This is an analyst's temporal constraints and cognitive limitations, and generally only one interpretation is drawn, and biased thinking can be reflected. Therefore, it is essential to aware the battlefield situation of the command and control system and to establish the intellignet decision support system. To do this, it is necessary to build a knowledge base specialized in the command and control system and develop intelligent battlefield awareness services based on it. In this paper, among the entity names suggested in the exobrain corpus, which is the private data, the top 250 types of meaningful names were applied and the weapon system entity type was additionally identified to properly represent battlefield information. Based on this, we proposed a way to build a battlefield-aware knowledge base through mention extraction, cross-reference resolution, and relationship extraction.

Comparison and Analysis of Techniques for Achieving Azimuth Resolution of Imaging Radar (영상레이다의 방위 해상도 구현기법 비교 분석)

  • Hong, In-Pyo;kim, Nam
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.8 no.2
    • /
    • pp.185-196
    • /
    • 1997
  • By considering the definition and application of resolution as well as the concept and theory of SAR, the essential contents of the SAR design and analysis are described. This paper is to compare and analyze the resolution performance capability of three techniques for achieving azimuth resolution such as the real aperture, the unfocused and the focused techniques, through the simulation. Simulation is performed to make the restricted conditions for the unfocused technique that can be implemented by the less commputing load of signal processingand the lower cost. Through the mission analysis, the use of SAR image can be applied for estimation of whole situation at the regional area in the field of military demands for tactical purpose as well as civilian demands for the damage of disaster. RPV and sall or medium aircraft are selected to carry the SAR for these purposes and the proper resolution turns ou 5~15 m. The trade-off study of variables through the simulations results in the proper conditions such that range is less 3, 000 m, Wavelength is 1~10 m, and the raw signals and results processed by three techniques for two point targets are exhibited undr such conditions. Therefore, at some points, the result of this paper si proposed for useful applications of unforcused technique in the restricted conditions except the identification of the small target at a long range re- quired for high resolution.

  • PDF

Comparison and Analysis of Anomaly Detection Methods for Detecting Data Exfiltration (데이터 유출 탐지를 위한 이상 행위 탐지 방법의 비교 및 분석)

  • Lim, Wongi;Kwon, Koohyung;Kim, Jung-Jae;Lee, Jong-Eon;Cha, Si-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.440-446
    • /
    • 2016
  • Military secrets or confidential data of any organization are extremely important assets. They must be discluded from outside. To do this, methods for detecting anomalous attacks and intrusions inside the network have been proposed. However, most anomaly-detection methods only cover aspects of intrusion from outside and do not deal with internal leakage of data, inflicting greater damage than intrusions and attacks from outside. In addition, applying conventional anomaly-detection methods to data exfiltration creates many problems, because the methods do not consider a number of variables or the internal network environment. In this paper, we describe issues considered in data exfiltration detection for anomaly detection (DEDfAD) to improve the accuracy of the methods, classify the methods as profile-based detection or machine learning-based detection, and analyze their advantages and disadvantages. We also suggest future research challenges through comparative analysis of the issues with classification of the detection methods.

Development of Modeling and Simulation Tool for the Performance Analysis of Pods Mounted on Highly Maneuverable Aircraft (고기동 항공기 탑재 파드 성능 분석을 위한 모델링 및 시뮬레이션 도구 개발)

  • Lee, Sanghyun;Shin, Jinyoung;Lee, Jaein;Kim, Jongbum;Kim, Songhyon;Kim, Sitae;Cho, Donghyurn
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.50 no.7
    • /
    • pp.507-514
    • /
    • 2022
  • The EO/IR targeting pod mounted on a fighter to acquire information about tactical targets is typically mounted and operated at the bottom of the aircraft fuselage. Since the aircraft equipped with such an external attachment has complexed aerodynamic and inertial characteristics compared to the aircraft flying without an external attachment, a method of system performance analyses is required to identify development risk factors in the early stages of development and reflect them in the design. In this study, a development plan was presented to provide the necessary modeling and simulation tools to develop a pod that can acquire measurement data stably in a highly maneuverable environment. The limiting operating conditions of the pods mounted on the highly maneuverable aircraft were derived, the aerodynamics and inertial loads of the mounted pods were analyzed according to the limiting operating conditions, and a flight data generation and transmission system were developed by simulating the mission of the aircraft equipped with the mounted pods.