• Title/Summary/Keyword: Tactical computer

Search Result 106, Processing Time 0.042 seconds

A study on the Method of Evaluating Analysis for Computer Integrated Manufacturing System (ERP시스템과의 통합을 위한 CIM시스템의 평가 분석방법에 관한 연구)

  • 김제홍
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.1
    • /
    • pp.147-153
    • /
    • 2002
  • A major problem in the adoption of advanced manufacturing systems such as C.I.M. (Computer Integrated Manufacturing) is the prerequisite economic justification Process because of high investment needed for the acquisition and installation of C.I.M. While some of the benefits expected are readily qualifiable, others are very difficult or even impossible, using conventional method. Thus the investment in C.I.M. should be considered as a strategic decision rather than a tactical decision which concerns with only financial implications. In this Paper we review papers on major justification techniques developed during the last decade and identify the benefits of C.I.M. and describe the considerations in the justification of C.I.M. Also we deal with the current and future research directions in justifying C.I.M.

  • PDF

The Study on The Military Intelligence Architecture Framework by Business Process Reengineering(Centering on the C4I Operational Architecture for the ground tactical C4I system) (군 정보체계 종합구조 작성에 대한 BPR 적용 연구(지상전술 C4I 체계의 운용 구조 작성을 중심으로))

  • 박종운;이문우;박두영;장종환
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.6
    • /
    • pp.747-758
    • /
    • 2001
  • While developing the military intelligence systems, inter-operation problems which are even existed in the advanced countries must be secured. So we intend to contribute the development of concerned theories by suggesting the process and results of the operational architecture(OA) in C4ISR architecture framework that U.S. military researched and setup based on C4ISR architecture framework theory and BPR methodology.

  • PDF

Optimal Design and Performance Analysis of Permanent Magnet Assisted Synchronous Reluctance Portable Generators

  • Baek, Jeihoon;Kwak, Sangshin;Toliyat, Hamid A.
    • Journal of Magnetics
    • /
    • v.18 no.1
    • /
    • pp.65-73
    • /
    • 2013
  • In this paper, design and performance analysis of robust and inexpensive permanent magnet-assisted synchronous reluctance generators (PMa-SynRG) for tactical and commercial generator sets is studied. More specifically, the optimal design approach is investigated for minimizing volume and maximizing performance for the portable generator. In order to find optimized PMa-SynRG, stator winding configurations and rotor structures are analyzed using the lumped parameter model (LPM). After comparisons of stator windings and rotor structure by LPM, the selected stator winding and rotor structure are optimized using a differential evolution strategy (DES). Finally, output performances are verified by finite element analysis (FEA) and experimental tests. This design process is developed for the optimized design of PMa-SynRG to achieve minimum magnet and machine volume as well as maximum efficiency simultaneously.

A Study on Efficient Friendly Forces Location Data Sharing on Battalion and Below

  • Kim, Hyung-Seok;Shin, Sang-Heon;Kim, Yong-Cheol;Lee, Jeong-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.95-101
    • /
    • 2018
  • In this paper, we propose an efficient friendly forces location data sharing algorithm in a troops using a low bandwidth radio. The future battlefield is a 'Network Centric Warfare' with a concept of identifying the position and power of the enemy and friendly forces and leading the battlefield to victory through proper links at the time of our need. One of the basic elements in the 'Network Centric Warfare' is to share friendly forces location data. The bandwidth and transmission rates of radio used in battalion are low. Nevertheless, we should share our locations data almost in real time for effective fighting in a war situation. This paper describes the efficient method of friendly forces location data sharing based on low bandwidth radio. In particular, the concept of 'network-centered warfare' is reflected in the troop below the battalion to present an integrated and efficient way to shared location data of friendly forces.

A Study on Effective Emergency Message Transmission in Combat Radio Network (전투무선망에서의 효과적인 긴급 메시지 전송 방안에 대한 연구)

  • Kim, Hyung-Seok;Shin, Sang-Heon;Lee, Jeong-Min
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.07a
    • /
    • pp.285-286
    • /
    • 2019
  • 본 논문에서는 전투무선망에서 효과적인 긴급 메시지 전송 방안에 대한 방안을 제시한다. NCW 환경에서 대대급 이하 전투부대들은 전투무전기와 전술단말기를 활용하여 아군, 적군 위치와 속성정보, 활동 정보 등을 상호간 공유하여 통합적이고 효율적인 전투를 수행해야 하지만, 낮은 대역폭과 낮은 전송속도를 사용할 수밖에 없는 전투무선망을 활용하고 있으므로, 각 노드별 메시지 전송 전송성공률을 높이기 위해 전투무선망의 특성을 반영해야 한다. 이에 본 논문에서는 전투무선망에서의 긴급 메시지(적 발견 보고, 화생방 보고 등) 전송 시 부대 운용구조를 활용하여 모든 노드에 데이터가 효과적으로 전달될 수 있는 방안을 제시한다.

  • PDF

A Study on the Development of Efficient Naval Combat System Tactical Record and Replay Software (효율적인 해양 전투체계 전술정보 기록 및 재생 소프트웨어 개발에 대한 연구)

  • Jung, Seung-Mo;Yang, Moon-Seok
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.07a
    • /
    • pp.35-36
    • /
    • 2019
  • 최근 해양 전투체계에서는 사후분석에 대한 기능이 중요시 되고 있다. 그 이유는 사후분석을 통해 작전을 분석하고 더 나은 작전을 수행할 수 있기 때문이다. 이를 가능하게하기 위해 해양 전투체계에는 전술정보 기록 및 재생 기능이 탑재되어 있다. 전술정보 기록 및 재생은 작전상황에서 전투체계 콘솔에 전시된 전술정보들을 기록해서 사후분석 및 평가를 위해 재생하는 기능이다. 본 논문에서는 전술정보 기록 및 재생 개발에 대한 효율화 방법을 제시한다. 모델 중심의 개발방식 적용과 재생시간의 효율화를 통해 기존방식 보다 효율적인 전술정보 기록 및 재생 소프트웨어를 개발하는데 그 목적을 가진다.

  • PDF

Joint synchronization and parameter estimation in OFDM signaling

  • Sara Karami;Hossein Bahramgiri
    • ETRI Journal
    • /
    • v.45 no.2
    • /
    • pp.226-239
    • /
    • 2023
  • Challenges in cognitive radio and tactical communications include recognizing anonymously received signals and estimating parameters in a blind or semi-blind manner. In this paper, we examine this issue for orthogonal frequency division multiplexing (OFDM) signaling. There are several parameters in OFDM signaling, and the blind receiver must extract and consider the synchronization issue. We assume that the blind receiver is aware of modulation type, OFDM, and not aware of chip duration and the length of cyclic prefix. First, we present new criteria based on kurtosis to estimate these parameters and compare their performance at different levels of additive white Gaussian noise with methods based on correlation, kurtosis, maximum likelihood, and matched filter. Then, we perform synchronization and estimate the start time based on these criteria and several new criteria in two steps: fine and coarse synchronization. Finally, in a more practical setup, we present the idea of jointly estimating the mentioned parameters and the signal start time as coarse synchronization. We compare different criteria and show that one of the proposed criteria has the highest efficiency.

Secret Sharing based Node Authentication in Tactical Ad-Hoc Network (전술 애드혹 네트워크에서의 비밀분산 기반 노드 인증)

  • Yang, Ji-hun;Lee, Soo-jin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.247-248
    • /
    • 2022
  • 본 논문에서는 군사용 전술통신 분야에서 활용성이 증대되고 있는 애드혹 네트워크에 적용 가능한 비밀분산 기반의 노드 인증 기법을 제안한다. 필드에 전개되기 이전에 네트워크를 형성할 각 노드는 지수형 분산비밀키과 원본비밀키를 저정하고, 필드에 배치된 이후 네트워크 형성 초기단계에서 비밀분산의 원본비밀키 정보 복원 연산을 통해 다수 노드에 대한 동시 인증을 실시한다. 그리고 인증과정에서 원본비밀키 복원 연산을 방해하는 노드를 원본비밀키 복원 연산을 수행하기 이전에 PUF값을 활용하여 탐지한다.

  • PDF

A Study on the Factors Affecting the User Satisfaction and Continuous Use Intention of the Improved Army Tactical Command Information System (ATCIS 성능개량체계 만족 및 지속사용 의도에 미치는 영향요인)

  • Lee, Tae Bok;Baek, Seung Nyoung
    • The Journal of Information Systems
    • /
    • v.31 no.1
    • /
    • pp.1-24
    • /
    • 2022
  • Purpose The purpose of this study is to investigate the factors that affect the user satisfaction and continuous use intention of the improved ATCIS in the Korean Army. Design/methodology/approach Based on the various theories in relation to IT continuance, user satisfaction was identified as the main factor with regard to the continuous use intention of the improved ATCIS. In addition, computer self-efficacy, education-training, and system quality were hypothesized as antecedent variables to user satisfaction, and information security stress was set as a moderating variable for these relationships. Findings Survey results show that computer self-efficacy, education and training, and system quality had a positive effect on user satisfaction, and information security stress was found to moderate these relationships. The effects of computer self-efficacy and education-training on user satisfaction were higher in the group with low information security stress. However, the relationship between system quality and user satisfaction was higher in the group with high information security stress. User satisfaction is found to have a positive effect on the continuous use intention even with habit considered as a control variable.

A Method for Reducing Path Recovery Overhead of Clustering-based, Cognitive Radio Ad Hoc Routing Protocol (클러스터링 기반 인지 무선 애드혹 라우팅 프로토콜의 경로 복구 오버헤드 감소 기법)

  • Jang, Jin-kyung;Lim, Ji-hun;Kim, Do-Hyung;Ko, Young-Bae;Kim, Joung-Sik;Seo, Myung-hwan
    • Journal of IKEEE
    • /
    • v.23 no.1
    • /
    • pp.280-288
    • /
    • 2019
  • In the CR-enabled MANET, routing paths can be easily destroyed due to node mobility and channel unavailability (due to the emergence of the PU of a channel), resulting in significant overhead to maintain/recover the routing path. In this paper, network caching is actively used for route maintenance, taking into account the properties of the CR. In the proposed scheme, even if a node detects that a path becomes unavailable, it does not generate control messages to establish an alternative path. Instead, the node stores the packets in its local cache and 1) waits for a certain amount of time for the PU to disappear; 2) waits for a little longer while overhearing messages from other flow; 3) after that, the node applies local route recovery process or delay tolerant forwarding strategy. According to the simulation study using the OPNET simulator, it is shown that the proposed scheme successfully reduces the amount of control messages for path recovery and the service latency for the time-sensitive traffic by 13.8% and 45.4%, respectively, compared to the existing scheme. Nevertheless, the delivery ratio of the time-insensitive traffic is improved 14.5% in the proposed scheme.