• Title/Summary/Keyword: network-centric

Search Result 443, Processing Time 0.026 seconds

Stabilization System for Mobile Antenna Gimbal based on Dynamic Characteristics Analysis (동특성 해석에 기반한 이동용 안테나 김발 안정화 시스템)

  • Lee, Ki-Nam;Lee, Byoung-Ho;Lee, Jeung;Kim, Jie-Eok;Song, Jae-Bok
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.37 no.7
    • /
    • pp.851-856
    • /
    • 2013
  • Recently, as the tactical environment has changedto one of network-centric warfare, where all components are connected through a network, much emphasis has been placed on the use of an artificial satellite for achieving high communication speeds. To provide a high-quality artificial satellite link, stabilization is very important in a platform. Previous stabilization control techniques used PI control, which is commonly used for vessels. However, for ground terminals that require a higher communication speed, the antenna should move faster to track an artificial satellite within a short period of time. Moreover, the terminals must be equipped with proper sensors and algorithms so that they can detect and compensate for external disturbances while tracking the artificial satellite. In this study, through the analysis of the dynamic model of an antenna system, a stabilization algorithm for ground terminals was proposed;this algorithm shows high isolation performance in the low-frequency range and includes $PI^2$ control.

The Study on the improvement plan for Military combat power by the future computer (미래형컴퓨터를 이용한 군전투력 발전방안 연구)

  • Heo, Yeong Dae
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.57-66
    • /
    • 2013
  • Predicting pattern of future combat ensures a successful war. It is possible to anticipate the shape of the future combat from the fighting method of US Army in the Iraq War. The fighting method: a series of combat progress by real time information to pinpoint strike using a guided weapon by GPS, an intelligence satellite and unmanned surveillance vehicle (USV), shows that real time unification combat power is key element for decide outcome of a war. The NCW is an organically connected network centric warfare paradigm by networking a factor of operation. In this paper, studied on the improvement plan for combat power by the future computer like a portable computer, an audio-recognized computer and non-keyboard computer. In addition, this paper attempts to establish a comprehensive intelligence network of Korea Marine Corps and to apply to combat or training.

Design and Implementation of A Personalized Home Network Service System based on Emotion Analysis (감정 분석을 통한 개인화 홈 네트워크 서비스 시스템의 설계 및 구현)

  • Kim, Jun-Su;Kim, Dong-Yub;Bin, Sung-Hwan;Kim, Dae-Young;Ryu, Min-Woo;Cho, Kuk-Hyun
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.6
    • /
    • pp.131-138
    • /
    • 2010
  • As ubiquitous computing environments evolve, various services are being provided as customer-centric services. In the past, studies based on personal profiles have been conducted to provide personalized services. However, identifying the user's preferences and supporting personalized services requires considerable data and time. To solve these problems, this paper proposes a system which provides the service by analyzing the user's emotions, rather than personalized service with personal profiles. In the proposed system, both speech analysis method and image analysis method are used to analyze the user's emotion. By using this emotion analysis method, we implemented the proposed system within the home network environment and finally provide effective personalized service.

A Study on an Efficient Routing Algorithm for Wireless Sensor Network (무선 센서네트워크에서 효율적인 라우팅 알고리즘에 관한 연구)

  • Kim, Byoung-Chan;Yim, Jae-Hong;Choi, Hong-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.5
    • /
    • pp.887-898
    • /
    • 2009
  • Conventional routing protocols proposed for wireless sensor networks (WSNs) cannot fully accommodate the characteristics of WSNs. In particular, although it is possible to largely obtain benefits in the solution of energy consumption and global identification problems through applying position information, there are few protocols that actively apply such position information. In the case of geographical and energy aware routing (GEAR) that is a typical algorithm, which uses position information, it does not fully represent the characteristics of WSNs because it is limited to forward query messages and assumed as fixed network environments. The routing protocols proposed in this paper defines the direction of data, which is routed based on the position information of individual and target nodes, in which each node configures its next hop based on this direction and routes signals. Because it performs data-centric routing using position information, it does not require certain global identifications in order to verify individual nodes and is able to avoid unnecessary energy consumption due to the forwarding of packets by defining its direction.

An Algorithm for evaluating Combat Power Effectiveness by considering the Influence of Human Factors (인적요소의 영향력을 고려한 전투효과 평가 알고리즘)

  • Kwon, Oh-Sang;Park, Gun-Woo;Lee, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.1
    • /
    • pp.201-210
    • /
    • 2011
  • Each area of society has changed because of the development of information technology. Especially, the advent of NCW based on the technology of network has become a new paradigm for executing warfare. Effectiveness of NCW can be maximized by building the C4I system which is a core system of NCW. However, if we don't consider the influence in term of human dimension, we can't expect the effect of C4I system, since the key factor in C4I is human. In this paper, we propose an algorithm for evaluating Combat Power Effectiveness by considering the Influence of Human Factors that wasn't reflected in the past. Based on experimental validation our algorithm is more substantial than baseline algorithms. In addition, we proved that the Influence of Human Factors(e.g. collaboration) is the most important in battlefield. Therefore, proposed algorithm can be used for enhancing not only mission effectiveness in terms of military field but also work performance by effective Human Resource Management in terms of an enterprise.

Improvement of the Data Authentication of CCN (CCN 데이터 인증 기술의 성능 개선 연구)

  • KIM, DAEYOUB
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.341-349
    • /
    • 2017
  • CCN proposes that intermediate network nodes on a network path for a transmitted data-packet cache the data-packet. If the nodes receive request packets for the cached data, the nodes can directly respond to the request-packets using the cached data. Since a request-packet can be responded by one of the intermediate nodes on a path of the request-packet, both faster response time and decreased data transmission amount are expected comparing to the existing host centric networking. However, CCN is vulnerable against forgery attacks because data-packet receivers cannot identify a data provider. Hence, a data authentication scheme is essentially needed to make CCN more secure. But such a data authentication process is one of the main causes of CCN-based service delays. This paper first analyzes the problems of a CCN data authentication scheme, then proposes an improved authentication operation scheme for efficiently authenticating data, and finally evaluates its performance.

A Study on the Analysis of Identification System and the Linkage Method of Academic-information (학술정보의 식별체계 현황 분석 및 연계 방안 연구)

  • Gang, Ju-Yeon;Seol, Jae-Wook;Hwang, Hyekyong
    • Journal of Korean Library and Information Science Society
    • /
    • v.51 no.1
    • /
    • pp.115-143
    • /
    • 2020
  • With the era of the 4th Industrial Revolution, the number of data-centric integrated researches increases. The integrated researches make information identification and linkage more important, so it is necessary to seek a method to efficiently manage and share academic-information for supporting the researches. Therefore, this study aims to analyze identification system and linkable information types of 12 major academic search engines and bibliographic databases(ASEBDs) in Korea and abroad and to propose a method to identify and link academic-information. The analysis was conducted 2 times, and academic-information types, searchable fields, linkable information types, used identification system were investigated. As a result, the ASEBDs link directly or/and indirectly 3~4 information types based on their own identifiers with persistent identifiers. In addition, they identify academic-information semi-automatically based on machine learning methodology and collect and manage the related data. Finally, the method for academic-information linkage was proposed in terms of practice and society: linkage based on persistent identifiers and linkage based on collaborative network of institutions.

Efficient Resource Allocation Technique for LTE-Advanced based Interference Avoidance of Heterogeneous Network (LTE-Advanced 기반 이기종 네트워크 시스템의 간섭회피를 위한 효율적인 자원할당 기법)

  • Jang, Sung-Won;Seong, Hyeon-Kyeong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.17 no.1
    • /
    • pp.46-52
    • /
    • 2016
  • LTE-Advanced system consisting of the number of cells in the cellular environment because it is built to allow efficient use of limited frequency resources of adjacent cell interference avoidance should be considered. Transition services in accordance with the development of the mobile communication technology, wireless multimedia content from voice-centric mobile communications services and causing a lot of mobile data traffic, such as smart phones and tablet terminals spread of a data-driven surge in mobile data traffic base stations in urban areas by increasing became a reality that can not be prevented. In this paper, we propose a new Hybrid resource allocation technique for improving the performance of the cell boundary and analyzed the performance of the proposed new techniques to perform the simulation using LTE-Advanced system level simulator based on 19cell of cellular system model.

Improved AODV Routing Protocol Considering the Link Quality of Wireless Transmission Environments (무선 전송환경의 링크품질을 고려한 개선된 AODV 라우팅프로토콜)

  • Lee, Tae-Hoon;Jeun, Sung-Woo;Kim, Young-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.10
    • /
    • pp.1903-1911
    • /
    • 2016
  • As interest in MANET is increasing nowadays, research upon an efficient MANET routing protocol is actively under way. A LQA(Link Qualty Aware)-AODV routing protocol to deal with frequent changes of topology and wireless link variations under tactical operating conditions is proposed in this paper. The suggested LQA-AODV takes into account the channel capacity of each hop during the route request process of the traditional AODV protocol. In detail, LQA-AODV adds a channel capacity cost value to the RREQ message format that occurs during the routing process of the existing AODV Routing Protocol causing the accumulated channel capacity cost values of each sections to be compared before establishing a route. To verify the performance of LQA-AODV, NS2.35 was utilized and the Link-Quality Model was applied in order to reflect the tactical wireless environment. The simulation compares and analyzes LQA-AODV and the existing AODV, showing a large improvement over the traditional AODV in regards to the Packet Delivery Ratio, and End-to-End Delay.

A Proposal on Cryptographic Synchronization for T4 Link Encryption (T4급 링크 암호에 적합한 암호 동기방식 제안)

  • Lee, HoonJae;Kim, KiHwan;Kang, YongJin;Lee, Sang-Gon;Ryu, Young-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.202-210
    • /
    • 2018
  • The modern battlefield is being developed as a network-centric warfare where priority is given to rapid status grasp and power deployment through scientification and modernization. Therefore, tactical data link has been continuously improving the network speed, and recently, security technology is required for wireless communication with the UAV and various devices for reconnaissance. In addition, the future information warfare will utilize advanced IT technology positively. Efforts are needed to integrate various systems and networks. However, these efforts are meaningful only when they can assume sufficient security in a newly changing information and communication environment. In this paper, we propose a new cryptographic synchronization for link encryption suitable for tactical data links. The proposed cryptographic synchronization is useful for T4 UAV link encryption, and it is also adaptable for lower BER, then we analyze the performances analysis of that.