• Title/Summary/Keyword: command and control

Search Result 1,357, Processing Time 0.028 seconds

Fundamental Research on the Development of a Risk Based Decision Support System for Maritime Accident Response: Focused on Oil Tanker Grounding (위험도기반 해양사고 초기대응 지원 시스템 개발 기초연구: 유조선 좌초사고를 중심으로)

  • Na, Seong;Lee, Seung-Hyun;Choi, Hyuek-Jin
    • Journal of Navigation and Port Research
    • /
    • v.40 no.6
    • /
    • pp.391-400
    • /
    • 2016
  • A number of maritime accidents, and accident response activities, including the command and control procedures that were implemented at accident scenes, are analyzed to derive useful information about responding to maritime accidents, and to understand how the chain of events developed after the initial accident. In this research, a new concept of a 'risk based accident response support system' is proposed. In order to identify the event chains and associated hazards related to the accident response activities, this study proposes a 'Brainstorming technique for scenario identification', based on the concept of the HAZID technique. A modified version of Event Tree Analysis was used for quantitative risk analysis of maritime accident response activities. PERT/CPM was used to analyze accident response activities and for calculating overall (expected) response activity completion time. Also, the risk based accident response support system proposed in this paper is explained using a simple case study of risk analysis for oil tanker grounding accident response.

A Priority Based Multipath Routing Mechanism in the Tactical Backbone Network (전술 백본망에서 우선순위를 고려한 다중 경로 라우팅 방안)

  • Kim, Yongsin;Shin, Sang-heon;Kim, Younghan
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.1057-1064
    • /
    • 2015
  • The tactical network is system based on wireless networking technologies that ties together surveillance reconnaissance systems, precision strike systems and command and control systems. Several alternative paths exist in the network because it is connected as a grid to improve its survivability. In addition, the network topology changes frequently as forces and combatants change their network access points while conducting operations. However, most Internet routing standards have been designed for use in stable backbone networks. Therefore, tactical networks may exhibit a deterioration in performance when these standards are implemented. In this paper, we propose Priority based Multi-Path routing with Local Optimization(PMPLO) for a tactical backbone network. The PMPLO separately manages the global and local metrics. The global metric propagates to other routers through the use of a routing protocol, and it is used for a multi-path configuration that is guaranteed to be loop free. The local metric reflects the link utilization that is used to find an alternate path when congestion occurs, and it is managed internally only within each router. It also produces traffic that has a high priority privilege when choosing the optimal path. Finally, we conducted a simulation to verify that the PMPLO can effectively distribute the user traffic among available routers.

A Methodology of AI Learning Model Construction for Intelligent Coastal Surveillance (해안 경계 지능화를 위한 AI학습 모델 구축 방안)

  • Han, Changhee;Kim, Jong-Hwan;Cha, Jinho;Lee, Jongkwan;Jung, Yunyoung;Park, Jinseon;Kim, Youngtaek;Kim, Youngchan;Ha, Jeeseung;Lee, Kanguk;Kim, Yoonsung;Bang, Sungwan
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.77-86
    • /
    • 2022
  • The Republic of Korea is a country in which coastal surveillance is an imperative national task as it is surrounded by seas on three sides under the confrontation between South and North Korea. However, due to Defense Reform 2.0, the number of R/D (Radar) operating personnel has decreased, and the period of service has also been shortened. Moreover, there is always a possibility that a human error will occur. This paper presents specific guidelines for developing an AI learning model for the intelligent coastal surveillance system. We present a three-step strategy to realize the guidelines. The first stage is a typical stage of building an AI learning model, including data collection, storage, filtering, purification, and data transformation. In the second stage, R/D signal analysis is first performed. Subsequently, AI learning model development for classifying real and false images, coastal area analysis, and vulnerable area/time analysis are performed. In the final stage, validation, visualization, and demonstration of the AI learning model are performed. Through this research, the first achievement of making the existing weapon system intelligent by applying the application of AI technology was achieved.

Development of Update Methods for Configuration Data of NETCONF Protocol considering Multiple Network Administrators (다수 네트워크 관리자를 고려한 NETCONF 프로토콜의 설정 데이터 갱신 기법 개발)

  • Lee, Yang-Min;Cha, Mi-Yang;Lee, Jae-Kee
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.27-38
    • /
    • 2013
  • Currently a number of managers exist to manage heterogeneous networks, in this situation, the NETCONF protocol for efficient network management has been proposed as a new protocol. However, the standard NETCONF protocol stack continuous improvement since the establishment but in four layers still have some problems. Especially in situations where there are multiple administrators, problems are more highlighted in operation layer. In this paper, we focus on these issues and the Operation layer has improved the efficiency and flexibility of operations among NETCONF four layers. Additionally, for the inefficiency of updates improved the device settings based on improved operation techniques. In addition, standard protocol NETCONF did not proposed content layer data structure and we propose standard technique of content layer that can generate configuration structure of devices. Improved the three techniques are applied appropriately to the NETCONF, the proposed method and the existing NETCONF was performed experiment to compare with experimental four factors. Compare key factor are four kind as maintaining the probability of network function, the reaction performance about command, the number of control packets, performance of data creation in content layer. Such factors after performing the experiment, the proposed method in this paper is superior to the existing NETCONF and there was confirmed by analysis Experimental results.

A study on the cyber common operation picture for situational awareness in cyberspace (사이버공간 내 상황인식을 위한 사이버 공통 작전 상황도 연구)

  • Kim, Kook-jin;Youn, Jae-pil;Yoon, Suk-joon;Kang, Ji-won;Kim, Kyung-shin;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.87-101
    • /
    • 2022
  • Cyber-attacks occur in the blink of an eye in cyberspace, and the damage is increasing all over the world. Therefore, it is necessary to develop a cyber common operational picture that can grasp the various assets belonging to the 3rd layer of cyberspace from various perspectives. By applying the method for grasping battlefield information used by the military, it is possible to achieve optimal cyberspace situational awareness. Therefore, in this study, the visualization screens necessary for the cyber common operational picture are identified and the criteria (response speed, user interface, object symbol, object size) are investigated. After that, the framework is designed by applying the identified and investigated items, and the visualization screens are implemented accordingly. Finally, among the criteria investigated by the visualization screen, an experiment is conducted on the response speed that cannot be recognized by a photograph. As a result, all the implemented visualization screens met the standard for response speed. Such research helps commanders and security officers to build a cyber common operational picture to prepare for cyber-attacks.

Design of an Optimal Adaptive Filter for the Cancellation of M-wave in the EMG Controlled Functional Electrical Stimulation for Paralyzed Individuals (마비환자의 근전도제에기능적전기자극을 위한 M-wave 제거용 최적적응필터 설계)

  • Yeom Hojoon;Park Youngcheol;Lee Younghee;Yoon Youngro;Shin Taemin;Yoon Hyoungro
    • Journal of Biomedical Engineering Research
    • /
    • v.25 no.6
    • /
    • pp.479-487
    • /
    • 2004
  • Biopotential signals have been used as command in systems using electrical stimulation of motor nerves to restore movement after an injury to the central nervous system (CNS). In order to use the voluntary EMG (electromyography) among the biopotentials as a control signal for the electrical stimulation of the same muscle for CNS injury patients, it is necessary to remove M-wave of having high magnitude from raw data. We designed an optimal filter for removing the M-wave and preserving the voluntary EMG and showed that the optimal filter is eigen filter. We also proved that the previous method using the prediction error filter(PEF) is a suboptimal filtering in the sense of preserving the voluntary EMG. On basis of the data obtained from a model for M-wave and voluntary EMG and from actual CNS injury patients, with false-positive rate analysis, the proposed adaptive filter showed a very promising performance in comparison with previous method.

Pedestrian Dead Reckoning based Position Estimation Scheme considering Pedestrian's Various Movement Type under Combat Environments (전장환경 하에서 보행자의 다양한 이동유형을 고려한 관성항법 기반의 위치인식 기법)

  • Park, SangHoon;Chae, Jongmok;Lee, Jang-Myung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.10
    • /
    • pp.609-617
    • /
    • 2016
  • In general, Personal Navigation Systems (PNSs) can be defined systems to acquire pedestrian positional information. GPS is an example of PNS. However, GPS can only be used where the GPS signal can be received. Pedestrian Dead Reckoning (PDR) can estimate the positional information of pedestrians using Inertial Measurement Unit (IMU). Therefore, PDR can be used for GPS-disabled areas. This paper proposes a PDR scheme considering various movement types over GPS-disabled areas as combat environments. We propose a movement distance estimation scheme and movement direction estimation scheme as pedestrian's various movement types such as walking, running and crawling using IMU. Also, we propose a fusion algorithm between GPS and PDR to mitigate the lack of accuracy of positional information at the entrance to the building. The proposed algorithm has been tested in a real test bed. In the experimental results, the proposed algorithms exhibited an average position error distance of 5.64m and position error rate in goal point of 3.41% as a pedestrian traveled 0.6km.

Realtime Strategy Generation System using Case-based Reasoning (사례기반 추론을 이용한 실시간 전술 생성 시스템 설계)

  • Park, Jong-An;Hong, Chul-Eui;Kim, Won-Il
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.5
    • /
    • pp.49-54
    • /
    • 2011
  • Case-based reasoning is an efficient method to find solutions for new problems by using past cases after appropriate changes. It is widely used in everyday life because it resembles the way human acts. In this paper, we propose a military system that generates the most appropriate tactics for CGF (Computer Generated Forces) by utilizing past practices. It indeed applies case-based reasoning at the process of armed conflict. When the CGF squad on a mission, they will be given an action plan to reach the final goal. In the process of executing, tactics for specific action should be organized such as attacks, ambushes, and tactical moves. By using the proposed method, tactics were generated by case-based reasoning. The proposed system successfully receives input through each command and control agent, measures the degree of similarity with the case in case DB, selects the most similar case, modifies, uses, and then stores it for next time.

On Institutional Arrangements of Quota-Based Management for China's Marine Capture Fisheries (쿼터제에 기초한 중국연근해 어업관리에 대한 제도적 연구)

  • Mu, Yong-Tong;Choe, Jeong-Yoon
    • The Journal of Fisheries Business Administration
    • /
    • v.32 no.2
    • /
    • pp.91-125
    • /
    • 2001
  • 이 논문은 2002년도 부경대학교 수산경영학과 박사학위논문(A Study on Institutional Arrangements for Quota-Based Management : The Case of China's Marine Capture Fisheries)의 일부이다. 이 논문의 기본목적은 취터제에 기초한 중국의 어업관리를 위한 제도적인 틀을 세우고자 하는데 있으며, 이런 목적을 달성하기에 위해 이 논문은 다음과 같이 구성하여 연구를 진행시켰다. 제1장은 연구목적과 문제의 제기에 이어 제2장에서는 중국 해양어업의 개발과 이에 따른 문제점을 분석하였으며, 여기에서 궈터제에 기초한 어업관리정책의 제도적 제안을 함과 동시에, 제3장에서는 중국 해양어업의 현실과 중국 사회의 일반적인 현상을 분석하여 제4장을 통해 쿼터제에 기초한 중국의 어업관리를 위한 제도적 프레임러크를 제안하였다. 마지막으로 본 논문을 요약하고 향후 계속되어야 할 연구과제를 제시하였다. 본 논문의 중요한 연구 결과는 다음과 같다. 현재 중국 수산업의 관리체제는 질적 규제 중심 관리제도, 그리고 정부 주도하의 어업관리 과정으로 특징지을 수 있다. 이러한 명령과 통제 (command-and-control) 방식의 전통적인 중국어업 관리제도로서는 어업인들에게 있어서 자원 보존에 대한 동기와 제도에 대한 수용성을 약화시키며, 정부 규제를 오히려 무시하게 되는 결과를 초래한다. 결과적으로 현형 중국의 어업관리제도는 어업인에게 있어서 자원 보전에 대한 유인을 약화시키고 단기적인 수익을 극대화하도록 유도하는 맹점을 지니므로 인해 더 이상 지속적인 어업성립의 보장을 할 수 없다는 점을 지적할 수 있다. 중국정부는 이러한 어업관리제도의 불완전성을 인식하여 2000년 10월 31일에 1986년 에 제정된 수산업법을 개정하게 되었으며, 새로운 중국의 수산업법은 어업 허가제도와 함께 할당량제에 기초한 어업관리제도를 국가가 운영하는 것으로 특징지을 수 있다. 그러나 아직까지 중국은 할당제에 근거한 어업관리제도를 미실시중에 있으며, 그 내용도 애매모호한 점을 많이 가지고 있다. 또한 중국의 절대적 어획량은 현재 논란의 여지로 남아있고, 거대 어업 인구의 근본적인 요구와 중국 어선의 국제적인 경쟁력, 그리고 유어(遊漁)에 대한 사회적 요구 등도 중국의 수산정책이 채결해야 할 과제이다. 위에서 고찰한 내용을 기초로 하여 우리는 중국의 쿼터제에 기초한 어업관리에 대해 다음과 같은 몇 가지를 제안한다. 중국 연근해어업에 있어서 할당제 모형에 참가하는 어업 참여자들의 유형은 세 가지로 구분할 수 있다. 첫째는 어촌에 거주하면서 생존수단으로 소규모 어업에 종사하는 경우이고, 둘째는 유어어업의 경우이며, 셋째는 상업적 목적으로 어업에 종사하는 집단으로 나눌 수 있다. 이러한 세 집단을 하나의 제도의 틀로 통합하기 위해서는 국가의 총허용어획량(TAC)을 총 어촌 허용어획량(TAIVCs)과 총 허용 유어 어획량(TARCs) 및 총허용 상업적 어획량 (TACCs)의 세부문으로 나눌 것을 제안한다. 그리하여 다시 TAFVCs와 TARCs, 그리고 TACCs는 어촌별 어획량(ITCQs), 개별 유어 회사별 어획량(IRCQs), 그리고 양도 가능한 개별 상업적 어획량(ITCQs)으로 나누어 관리하도록 한다. 이와 같이 중국의 국가 총허용어획량(TAC)을 IFVQs와 IRCQs, 그리고 ITQCQs의 세부문으로 구분하여 할당하고, 여기에 기초하여 어업을 관리하는 것은 중국에 있어서 사회적 형평성과 경제적 효율성과의 상충관계를 고려하여 고안된 것으로, 중국에 있어서 수산업을 통한 경제적 및 사회적 효과를 동시에 기대할 수 있을 것이다.

  • PDF

Historical Review on the Security Service for the Royal Household in the "Goryeo" Era (고려시대 왕실호위제도의 사적 고찰)

  • Lee, Sung-Jin;Kim, Eui-Young;Lee, Jong-Hwan
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.413-429
    • /
    • 2007
  • The Guard over the royal household in the "Goryeo" era was the same as if was over the President or Ruler of a nation today. In those days, a king represented a nation and any threat to the safety of a king could bring the destruction of a nation and the dispersion of the people. by reviewing the change of the 2-Gun 6-Wi system of the era, it can be, summed up as follow, Ther will be suggestions. The Guard might focus on a king's personal safety in the wake of the system of the Silla and Taebong dynasties until the establishment of the Goryeo Dynasty's unique political system. "Goryeo" rebuilt the royal palace in Gyeonyeong-gun to take the shape of unified country after its accomplishment of unification of the late three countries, Then it was afraid of the rebellion and uprising of local powerful clans, The country put them under control and organized the local army with them in the era of Kings, Seongjong, through the kings, Seongjong and Gwangjong. The army system of "Goryeo" consisted of 2-Gun and 6-Wi, and 2-Gun placed above the 6-Wi played the role of the Royal guards, and among the organizations a certain army under the specific name of "Gyeonyong-gun" guarded the kings in the nearest position. An aristocratic culture enjoyed its golden age in the period of stability of the aristocracy of "Goryeo", but afterward in the confusion of the aristocratic disruption and incompatible confrontation the country lost its control, and faced military rebellions by treating civil officials well and ill-treating military officials The safety of kings become unstable with the grasping political power by the military officials, and "Dobang" was established in the era of Choi's family to grasp political power. In the era of Choi Woo, he gathered his men and organized his familys army with them and managed the personnel administration with the civil officials of "Jeongbang and Seobang under his command. Such a fact shows the similarity to today's task of guarding. Considering the facts that "Sambyeolcho, the military ground of the military-men-rule, was at the center of the struggling against Mongolia and that even after the fall of the military regime, they rebelled and fought against Mongolia to the end, we came to know that the nationalism in the era of the military era was great. In the transition of external situations from "Myeong" to "Won"(Chinese dynasties), the conflict between the old "Won"-friendly power and the new "Myeong"-friendly power caused the weakness of the power to guard the royal household, and "Goryeo" at last gave way to the newly rising "Joseon" led by Lee, Seong Gye who won the people's confidence.

  • PDF