• Title/Summary/Keyword: military applications

Search Result 464, Processing Time 0.024 seconds

군사통신에서의 SDR의 현황과 추세

  • 천현수;홍대식
    • The Proceeding of the Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.10 no.3
    • /
    • pp.29-38
    • /
    • 1999
  • Software defined radio(SDR) si an emerging communication system technology, which is expected to be a solution for future-proof, flexible and inter-operable wireless services in military communications. In this paper, we investigate two major SDR research projects for military applications, SPEAKeasy and GloMo. We also provide the perspective of the future military SDR research.

  • PDF

Impact of ITSM Military Service Quality and Value on Service Trust

  • Woo, Hanchul;Lee, Sangdo;Huh, Jun-Ho;Jeong, Sukjae
    • Journal of Multimedia Information System
    • /
    • v.7 no.1
    • /
    • pp.55-72
    • /
    • 2020
  • As the IT service environment grows, it is critical in terms of IT service quality to minimize the occurrence of failures due to changes in applications and to diagnose and recover in a short period of time how failure will affect the business. Thus, the Defense Acquisition Program Administration (DAPA) has been building and operating ITSMs to implement IT service management in a leading manner. Information Technology Service Management (ITSM) is divided into events, obstacles, changes, versions and setup management to ensure flexibility and stability in service delivery. It is also operated separately from service level, availability, capacity, financial and IT service continuity management to ensure service quality and cost efficiency. Based on ITSM military service history, this study looks at the impact of quality of service on value, satisfaction, and trust. The results of the analysis are highly valuable for future ITSM implementation and operation.

The Effect of Digital Elevation Resolution on LOS Analysis (지형고도자료 해상도가 가시선분석에 미치는 영향)

  • Eo, Yang-Dam;Park, Wan-Yong;Lee, Yong-Woong;Lee, Byoung-Kil;Pyeon, Mu-Wook
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.3
    • /
    • pp.99-105
    • /
    • 2008
  • The analysis of LOS(Line-Of-Sight) is defined as an "unobstructed view between two points". The LOS results may be influenced by terrain source, algorithm/interpolation method, etc. In the area denies any access and flight over, LOS results would be doubtful because of low precision of terrain data therefore have limitations of referring to many military applications. Using LIDAR data, LOS Analysis was performed by changing DTED resolution(1$\sim$30m) and LOS distance(50$\sim$2000m). The results of experiment shows that LOS analysis for small area, such as DMZ surveillance, were heavily influenced by DTED resolution.

A Fundamental Study on Integrated Dynamic Control of 6WD/6WS Vehicle (6WD/6WS 차량의 통합운동제어에 관한 기초적 연구)

  • Kim, Young-Ryul;Park, Young-Won
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.6
    • /
    • pp.958-966
    • /
    • 2010
  • In this paper, we have proposed a integrated dynamic control architecture in 6WD(wheel drive)/6WS(wheel steering) vehicle for military applications. Since 6WD/6WS vehicle has inherent redundancy, the input variables to make any desired vehicle motion can not be determined uniquely. Therefore, optimal distribution method of tire forces is introduced, which is based on workload of each tire. Simulation result shows that this is effective for the energy minimization and dynamic performance enhancement. We also suggest how the integrated control with any failure mode should be reconstructed.

Point Availability of Multi_Component System When Each Component Has a Finite Number of Spares

  • Jee, Man-Won
    • Journal of the military operations research society of Korea
    • /
    • v.7 no.2
    • /
    • pp.43-62
    • /
    • 1981
  • Computational expressions for point availability and average availability of a system of components each of which is subject to random failures and has random restoration times are determined. Each component is assumed to have a fixed number of spares such that where all spares are exhausted no restoration can take place. These expressions are useful in deciding PL and ASL in the military logistic applications. Given a fixed length of mission duration and finite number of spares, a system may not be available at the end of a mission due to lack of spares. The probability distribution of system down time due to lack of spares is determined as a function of number of spares and mission duration.

  • PDF

Efficient Public Key Broadcast Encryption System (효율적인 공개키 기반의 디지털 콘텐츠 전송 시스템)

  • Lee, Moon-Shik
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.4
    • /
    • pp.635-641
    • /
    • 2010
  • In this paper, we propose an efficient public key broadcast encryption system which can also extend traitor trace and revoke system. Although the proposed system has limited collusion size, the ciphertext size in the system can be sublinear in the number of total users, the private key size is constant, the computational cost can be sublinear and it can support black-box tracing algorithm, therefore, our system can be an option to applications where reducing the ciphertext size, private key size is a top priority. Furthermore, we can also apply our system to military document broadcast system, because it has such an efficient measurement.

Elucidating the mechanical behavior of ultra-high-strength concrete under repeated impact loading

  • Tai, Yuh-Shiou;Wang, Iau-Teh
    • Structural Engineering and Mechanics
    • /
    • v.37 no.1
    • /
    • pp.1-15
    • /
    • 2011
  • The response of concrete to transient dynamic loading has received extensive attention for both civil and military applications. Accordingly, thoroughly understanding the response and failure modes of concrete subjected to impact or explosive loading is vital to the protection provided by fortifications. Reactive powder concrete (RPC), as developed by Richard and Cheyrezy (1995) in recent years, is a unique mixture that is cured such that it has an ultra-high compressive strength. In this work, the concrete cylinders with different steel fiber volume fractions were subjected to repeated impact loading by a split Hopkinson Pressure Bar (SHPB) device. Experimental results indicate that the ability of repeated impact resistance of ultra-high-strength concrete was markedly superior to that of other specimens. Additionally, the rate of damage was decelerated and the energy absorption of ultra-high-strength concrete improved as the steel fiber volume fraction increased.

Introduction of Military Nanosatellite Communication System Using Anti-Jamming and Low Probability of Detection (LPD) Waveforms (항재밍/저피탐 웨이브폼이 적용된 군 초소형 위성 통신체계 소개)

  • Ju Hyung Lee;Hae-Won Park;Kil Soo Jeong
    • Journal of Space Technology and Applications
    • /
    • v.3 no.2
    • /
    • pp.144-153
    • /
    • 2023
  • The existing military satellite communication system was based on geostationary satellites equipped with special communication payloads against enemy's jamming and signal reception. With the advent of new weapon systems such as unmanned systems, the need for low-orbit satellite-based communication system is increasing. This paper introduces various waveform technologies suitable for cube satellite-based communication system and the operational concept of a future military nanosatellite communication system.

The Effect of MDM Understanding on MDM Acceptances : A Cross-COI Study on Military and Non-military Users (마스터데이터관리 이해도가 국방 마스터데이터관리시스템 수용에 미치는 사용자 집단별 차이 분석)

  • Kim, Jung-Cheol;Lee, Choon Yeul;Seog, Lee In;Kang, Hee Joo
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.1
    • /
    • pp.1-17
    • /
    • 2013
  • It has been found that users' characteristics are important variables that explain information systems adoption. These user groups, which are called COIs (Community Of Interests), might show different behaviors to each other to the same information system. We study differences in MDM (master data management) system adoption between military users and SI developers using TAM (Technology Acceptance Model). In case of military users, the perceived usefulness of an MDM system does not have impacts on intention to use an MDM system. Only the ease of use of an MDM system has impacts on intention to use an MDM system. However, in case of SI developers, both the perceived usefulness and the ease of use of an MDM system have impacts on intention to use an MDM system, which are similar to findings in previous studies. These results might be interpreted that users do not pay much attention to the usefulness in adopting a new information system in a centralized organization. They are obligated to use an information system whether it is useful or not. Thus the ease of use has more impacts on users than the usefulness.

Two Attribute-based Broadcast Encryption Algorithms based on the Binary Tree (이진트리 기반의 속성기반 암호전송 알고리즘)

  • Lee, Moon Sik;Kim, HongTae;Hong, Jeoung Dae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.3
    • /
    • pp.358-363
    • /
    • 2014
  • In this paper, we present two constructions of the attribute-based broadcast encryption(ABBE) algorithm. Attribute-based encryption(ABE) algorithm enables an access control mechanism over encrypted data by specifying access policies among private keys and ciphertexts. ABBE algorithm can be used to construct ABE algorithm with revocation mechanism. Revocation has a useful property that revocation can be done without affecting any non-revoked uers. The main difference between our algorithm and the classical ones derived from the complete subtree paradigm which is apt for military hierarchy. Our algorithm improve the efficiency from the previously best ABBE algorithm, in particular, our algorithm allows one to select or revoke users by sending ciphertext of constant size with respect to the number of attributes and by storing logarithm secret key size of the number of users. Therefore, our algorithm can be an option to applications where computation cost is a top priority and can be applied to military technologies in the near future.