• Title/Summary/Keyword: Tactical network

Search Result 218, Processing Time 0.024 seconds

System Thinking for Increasing the Operational Efficiency of Door-to-door Delivery Network (택배네트워크의 운영효율성 증진을 위한 시스템 사고)

  • Choi, Kang-Hwa
    • Korean System Dynamics Review
    • /
    • v.12 no.1
    • /
    • pp.89-114
    • /
    • 2011
  • With steady increase in the demand for door-to-door delivery services, courier service providers are facing a constant pressure to reduce delivery price in order to secure quantity order and to improve the efficiency and reliability for customer service. The objective of this research is to explain the structure of the door-to-door delivery including door-to-door delivery service demand, sorting capacity in the hub-terminal, and the system performance measures such as service reliability networks using causal loop diagram(CLD). Based on causal relation, this research describes a comprehensive approach to examine how capacity reliability contributes to the renewal of the firm's competences through its reciprocal relationship with travel time reliability and connectivity reliability. Also, this research suggests the policy alternatives to improve effectiveness and efficiency of door-to-door delivery network in response to increase customer satisfaction and profit maximization of the courier service providers: operational, tactical, and strategic levels.

  • PDF

Role of Radio Frequency Identification (RFID) in Warehouse and Logistic Management System using Machine Learning Algorithm

  • Laviza Falak Naz
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.109-118
    • /
    • 2024
  • The world today is advancing towards a digital solution for every indusial domain varying from advanced engineering and medicine to training and management. The supply cycles can only be boosted via an effective management of the warehouse and a stronger hold over the logistics and inventory insights. RFID technology has been an open source tool for various MNCs and corporal organization who have progressed along a considerable drift on the charts. RFID is a methodology of analysing the warehouse and logistic data and create useful information in line to the past trends and future forecasts. The method has a high tactical accuracy and has been seen providing up to 99.57% accurate insights for the future cycle, based on the organizational capabilities and available resources. This paper discusses the implementation of RFID on field and provides results of datasets retrieved from controlled data of a practical warehouse and logistics system.

An Effective Transmission for Vice Traffic in UWB Mobile Ad Hoc Network (UWB 전술망에서의 효과적인 음성 데이터 전송)

  • Kim, Jong-Hwan;Koo, Myung-Hyun;Lee, Hyunseok;Shin, Jeong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.4
    • /
    • pp.279-290
    • /
    • 2013
  • In this paper, we propose a transmission scheme of MAC protocol that enables secure voice communications by exploiting the wide spectrum and low signal strength characteristics of the ultra wide band technology. In addition, it also supports high level of terminal mobility by deploying mobile ad hoc network schemes. While most of existing UWB MAC protocols are operated as a synchronous mode, the proposed scheme operates in an asynchronous mode for supporting high mobility and sends voice packets without RTS/CTS control packets for efficient voice traffic transmission without retransmission. With simulation program, we prove that the proposed scheme satisfies the required voice quality and packet delivery time.

Joint Analysis of Combat Power and Communication System via Interoperation of War Game Simulator with Communication Network Simulator (워게임 모델과 통신 모델의 연동을 통한 전투력 및 통신시스템 요구 성능의 상호 분석)

  • Kim, Tag Gon;Kim, Deok Su;Sung, Changho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.993-1003
    • /
    • 2012
  • This paper presents a method for joint analysis of combat power and communication system performance via interoperation of a war game simulator and a communication network simulator using HLA/RTI. Effectiveness analysis of combat power has been performed by war game simulation with consideration of communication effects simulated by the network simulator. Performance analysis of a communication system has been performed by network simulation with computer forces generated by the war game simulator. Survivability of the red force and transmission power of a tactical FM radio for the blue force have been measured for the joint analysis.

An Intrusion Detection Technique Suitable for TICN (전술정보통신체계(TICN)에 적합한 침입탐지 기법)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.6
    • /
    • pp.1097-1106
    • /
    • 2011
  • Tactical Information Communication Network(TICN), a concept-type integrated Military Communication system that enables precise command control and decision making, is designed to advance into high speed, large capacity, long distance wireless relay transmission. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. Ad-hoc network works properly only if the participating nodes cooperate in routing and packet forwarding. However, if selfish nodes not forwarding packets of other nodes and malicious nodes making the false accusation are in the network, it is faced to many threats. Therefore, detection and management of these misbehaving nodes is necessary to make confident in Ad-hoc networks. To solve this problem, we propose an efficient intrusion detection technique to detect and manage those two types of attacks. The simulation-based performance analysis shows that our approach is highly effective and can reliably detect a multitude of misbehaving node.

Study of the Bomb Hit Indication of Moving Target Using Weapon Data Link Message (무장데이터링크 메시지를 이용한 기동표적 타격평가 연구)

  • Baek, Inhye;Woo, Sang Hyo;Kim, Ki Bum
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.2
    • /
    • pp.187-196
    • /
    • 2021
  • The Network-Centric warfare over weapon data link networks has been developed for the recent decade. Since the US navy had begun to develop tactical digital information chain, it has gradually transformed into weapon data link technology. As data link network system and its protocol have been advanced into high-technology, focusing and targeting on moving targets become possible in net-enabled environments. However, it is difficult to identify the primary information from numerous battlefields and understanding approaches to damage a target in a timely manner. In this paper, to better understand the targeting assessment, we suggest a specific solution: Bomb Hit Indication(BHI) using information in weapon data link messages. In order to prove our suggestion, we implement the BHI solution and apply it into the weapon data link integrating system.

Group Key Management Scheme for Survelliance and Reconnaissance Sensor Networks based on Probabilistic Key Sharing (확률론적 키 공유를 통한 감시정찰 센서네트워크에서의 그룹 키 관리 기법)

  • Bae, Si-Hyun;Lee, Soo-Jin
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.29-41
    • /
    • 2010
  • Survelliance and Reconnaissance Sensor Network(SRSN) which can collect various tactical information within battlefield in real time plays an important role in NCW environment, of sensor to shooter architecture. However, due to the resource-limited characteristics of sensor nodes and the intrinsic attributes of sensor network such as wireless communication, the SRSN may be vulnerable to various attacks compared to traditional networks. Therefore, in this paper, we propose a new group key management scheme to guarantee confidentiality, integrity, availability, and authentication during the operation of the SRSN. Proposed scheme generates and distributes the group key based on the topological characteristic of the SRSN and the probabilistic key sharing. The communication cost for distributing the group key is O(logn).

Throughput Analysis of R-NAD in MIL-STD-188-220 (MIL-STD-188-220의 R-NAD 처리율 분석)

  • Kim, Sangsoo;Gu, Sungmo;Lim, Jaesung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.5
    • /
    • pp.561-568
    • /
    • 2014
  • The Republic of Korea Army is using R-NAD of MIL-STD-188-220 as a Media Access Control protocol. Under urgent situations, almost all stations transmit data frames and then the network will reach a saturation state. Several articles have been devoted to the study of R-NAD performance. However, most of them focus on comparing the performance of some NADs using network simulation tools. We propose an analytical model to compute the throughput of R-NAD under the assumption of a network traffic saturation. Analytical results were verified by Monte Carlo methods. We have shown that the performance of a success probability and an average idle time remains almost unchanged as the total number of stations increases. We have also shown that Type 1/2/4 operation mode outperforms Type 3 operation mode in throughput. The results showed that the system with a squelch detection achieved a better performance than the one without it. The longer DATA time had a higher throughput.

Radio Link Modem System Architecture Design for Korean Tactical Data Link System Implementation (한국형 전술데이터링크 시스템 구현을 위한 무선모뎀 시스템 설계)

  • Choi, Hyo-Ki;Jang, Ho-Joon;Song, Young-Hwan;Jang, Dhong-Woon;Joo, Jae-Woo;Seo, Nan-Sol
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.6
    • /
    • pp.789-796
    • /
    • 2013
  • Next Generation Weapon system from the center of the platform to share information in real-time Network Centric Warfare(NCW: Network Centric Warfare) has been changed. Data link system is defined as a network. That is, all in real-time battlefield information is to enable sharing. Data link system is classified as a precision strike, Monitoring/control, control of a Patriot missile battery systems. These systems are most effective in a Joint warfare and precision strike. Data Link Systems(Data Communications) implementation is accomplished by using the KDLM(Korean Data Link Modem) and Radio Transceiver. KDLM is operated in conjunction with the legacy Radios(re-using fielded HF/VHF/UHF radio systems). In this paper, we describe in terms of KDLM system design. In this paper, the proposed design structure is how to effectively interact with legacy various radio. First, The results provide an analysis of that Dynamic TDMA system and apply modem structure. Radio characteristics data are necessary for an effective TDMA system design. This article analyzes the test results and describes the structure to improve the receive performance.

UAV based Wireless Ad hoc Network Performance Analysis (공중무인기 기반의 무선애드혹 네트워크 성능 분석)

  • Chun, Jeong-myong;Ha, Dong-hun;Park, Jae-seong;Yoon, Seok-hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.123-125
    • /
    • 2015
  • Wireless ad hoc network which is comprised of wireless nodes that have the limited communication range is utilized to monitoring disaster area, tracing object, and tactical system. But in the case of wireless node on the ground, a network performance decrease because wireless channel is affected from obstacle or the node deployment is restricted. In this paper, we consider wireless network based on UAV(Unmanned Aerial Vehicle) which has little spatial constraint and quickly deploy a position. We implement test-bed included ground nodes and UAV, and measure throughput and PDR(Packet Delivery Ratio) according to the usage of UAV. We show that network performance is improved by relaying data on UAV.

  • PDF