• Title/Summary/Keyword: network-centric

Search Result 443, Processing Time 0.029 seconds

A Study on Searching Stabled EMI Shielding Effectiveness Measurement Point for Military Communication Shelter Using Support Vector Machine and Process Capability Analysis (서포트 벡터 머신과 공정능력분석을 이용한 군 통신 쉘터의 EMI 차폐효과 안정 포인트 탐색 연구)

  • Ku, Ki-Beom;Kwon, Jae-Wook;Jin, Hong-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.2
    • /
    • pp.321-328
    • /
    • 2019
  • A military shelter for communication and information is necessary to optimize the integrated combat ability of weapon systems in the network centric warfare. Therefore, the military shelter is required for EMI shielding performance. This study examines the stable measurement points for EMI shielding effectiveness of a military shelter for communication and information. The measurement points were found by analyzing the EMI shielding effectiveness measurement data with data mining technique and process capability analysis. First, a support vector machine was used to separate the measurement point that has stable EMI shielding effectiveness according to set condition. Second, this process was conducted with process capability analysis. Finally, the results of data mining technique were compared with those of process capability analysis. As a result, 24 measurement points with stable EMI shielding effectiveness were found.

A Design of Risk-Based Security Threat Assessment Process for Fighter-Aircraft Airworthiness Security Certification (전투기 감항 보안 인증을 위한 위험기반 보안위협 평가 프로세스 설계)

  • Kim, Hyunju;Kang, Dongsu
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.6
    • /
    • pp.223-234
    • /
    • 2019
  • Cyber attacks are an important factor that determines the victory and defeat of Network-centric wars in which advanced weapon systems are highly interlinked. In addition the increasing dependability on software as its develop as the latest fighter is demanding enhanced security measures for fighter software to Cyber attacks. In this paper, we apply the DO-326A, which is an airworthiness security certification standard, to design a risk-based security threat assessment process by reflecting characteristics and operational environment of fighter aircraft. To do this, we add the following steps in security threat assessment stage of DO-326A's airworthiness security certification process. First, we derive security threats of fighter. And then, we scored the security threat in terms of possibility and impact on the fighter. Finally, we determine the security risk severity.

K-Trade : Data-driven Digital Trade Framework (K-Trade : 데이터 주도형 디지털 무역 프레임워크)

  • Kim, Chaemee;Loh, Woong-Kee
    • Journal of Information Technology Services
    • /
    • v.19 no.6
    • /
    • pp.177-189
    • /
    • 2020
  • The OECD has assessed Korea as the third highest in trade facilitation worldwide. The paperless trade of Korea is world class based on uTradeHub : national e-trade service's infrastructure for trade community. Over 800 trade-related document standards provide interoperability of message exchange and trade process automation among exporters, importers, banks, customs, airlines, shippers, forwarders and trade authorities. Most one-to-one unit processes are perfectly paperless & online; however, from the perspective of process flow, there is a lack of streamlining end-to-end trade processes spread over many different parties. This situation causes the trade community to endure repetitive-redundant load for handling trade documents. The trade community has a strong demand for seamless trade flow. For streamlining the trade process, processes with data should flow seamlessly to multilateral parties. Flowing data with an optimized process is the critical success factor to accomplish seamless trade. This study proposes four critical digital trade infrastructures as a platform service : (1) data-centric Intelligent Document Recognition(IDR), (2) data-driven Digital Document Flow (DDF), (3) platform based Digital Collaboration & Communication(DCC), and (4) new digital Trade Facilitation Index (dTFI) for precise assessment of K-Trade Digital Trade Framework. The results of new dTFI analyses showed that redundant reentry load was reduced significantly over the whole trade and logistics process. This study leads to the belief that if put into real-world application can provide huge economic gains by building a new global value chain of the K-trade eco network. A new digital trade framework will be invaluable in promoting national soft power for enhancing global competitiveness of the trade community. It could become the advanced reference model of next trade facilitation infrastructure for developing countries.

A Blockchain-based User-centric Role Based Access Control Mechanism (블록체인 기반의 사용자 중심 역할기반 접근제어 기법 연구)

  • Lee, YongJoo;Woo, SungHee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.7
    • /
    • pp.1060-1070
    • /
    • 2022
  • With the development of information technology, the size of the system has become larger and diversified, and the existing role-based access control has faced limitations. Blockchain technology is being used in various fields by presenting new solutions to existing security vulnerabilities. This paper suggests efficient role-based access control in a blockchain where the required gas and processing time vary depending on the access frequency and capacity of the storage. The proposed method redefines the role of reusable units, introduces a hierarchical structure that can efficiently reflect dynamic states to enhance efficiency and scalability, and includes user-centered authentication functions to enable cryptocurrency linkage. The proposed model was theoretically verified using Markov chain, implemented in Ethereum private network, and compared experiments on representative functions were conducted to verify the time and gas efficiency required for user addition and transaction registration. Based on this in the future, structural expansion and experiments are required in consideration of exception situations.

Energy-Aware Data-Preprocessing Scheme for Efficient Audio Deep Learning in Solar-Powered IoT Edge Computing Environments (태양 에너지 수집형 IoT 엣지 컴퓨팅 환경에서 효율적인 오디오 딥러닝을 위한 에너지 적응형 데이터 전처리 기법)

  • Yeontae Yoo;Dong Kun Noh
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.18 no.4
    • /
    • pp.159-164
    • /
    • 2023
  • Solar energy harvesting IoT devices prioritize maximizing the utilization of collected energy due to the periodic recharging nature of solar energy, rather than minimizing energy consumption. Meanwhile, research on edge AI, which performs machine learning near the data source instead of the cloud, is actively conducted for reasons such as data confidentiality and privacy, response time, and cost. One such research area involves performing various audio AI applications using audio data collected from multiple IoT devices in an IoT edge computing environment. However, in most studies, IoT devices only perform sensing data transmission to the edge server, and all processes, including data preprocessing, are performed on the edge server. In this case, it not only leads to overload issues on the edge server but also causes network congestion by transmitting unnecessary data for learning. On the other way, if data preprocessing is delegated to each IoT device to address this issue, it leads to another problem of increased blackout time due to energy shortages in the devices. In this paper, we aim to alleviate the problem of increased blackout time in devices while mitigating issues in server-centric edge AI environments by determining where the data preprocessed based on the energy state of each IoT device. In the proposed method, IoT devices only perform the preprocessing process, which includes sound discrimination and noise removal, and transmit to the server if there is more energy available than the energy threshold required for the basic operation of the device.

Implementation and Performance Analysis of Partition-based Secure Real-Time Operating System (파티션 기반 보안 실시간 운영체제의 구현 및 성능 분석)

  • Kyungdeok Seo;Woojin Lee;Byeongmin Chae;Hoonkyu Kim;Sanghoon Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.99-111
    • /
    • 2022
  • With current battlefield environment relying heavily on Network Centric Warfare(NCW), existing weaponary systems are evolving into a new concept that converges IT technology. Majority of the weaponary systems are implemented with numerous embedded softwares which makes such softwares a key factor influencing the performance of such systems. Furthermore, due to the advancements in both IoT technoogies and embedded softwares cyber threats are targeting various embedded systems as their scope of application expands in the real world. Weaponary systems have been developed in various forms from single systems to interlocking networks. hence, system level cyber security is more favorable compared to application level cyber security. In this paper, a secure real-time operating system has been designed, implemented and measured to protect embedded softwares used in weaponary systems from unknown cyber threats at the operating system level.

Southeast Asian Studies: Insiders and Outsiders, or is Culture and Identity a Way Forward?

  • King, Victor T.
    • SUVANNABHUMI
    • /
    • v.8 no.1
    • /
    • pp.17-53
    • /
    • 2016
  • Debates continue to multiply on the definition and rationale of Southeast Asia as a region and on the utility of the multidisciplinary field of area studies. However, we have now entered a post-colonialist, post-Orientalist, post-structuralist stage of reflection and re-orientation in the era of globalization, and a strong tendency on the part of insiders to pose these issues in terms of an insider-outsider dichotomy. On the one hand, the study of Southeast Asia for researchers from outside the region has become fragmented. This is for very obvious reasons: the strengthening and re-energizing of academic disciplines, the increasing popularity of other non-regional multidisciplinary studies, and the entry of globalization studies into our field of vision. On the other hand, how has the local Southeast Asian academy addressed these major issues of change in conceptualizing the region from an insider perspective? In filling in and giving substance to an outsider, primarily Euro-American-Australian-centric definition and vision of Southeast Asia, some local academics have recently been inclined to construct Southeast Asia in terms of the Association of Southeast Asian Nations (ASEAN): a nation-state-based, institutional definition of what a region comprises. Others continue to operate at a localized level exploring small-scale communities and territories, while a modest number focus on sub-regional issues (the Malay-Indonesian world or the Mekong sub-region are examples). However, further reflections suggest that the Euro-American-Australian hegemony is a thing of the past and the ground has shifted to a much greater emphasis on academic activity within the region. Southeast Asia-based academics are also finding it much more important to network within the region and to capture, understand, and analyze what Chinese, Japanese, and Korean scholars are saying about Southeast Asia, its present circumstances and trajectories, and their increasingly close involvement with the region within a greater Asia-Pacific rim. The paper argues that the insider-outsider dichotomy requires considerable qualification. It is a neat way of dramatizing the aftermath of colonialism and Orientalism and of reasserting local priorities, agendas, and interests. But there might be a way forward in resolving at least some of these apparently opposed positions with recourse to the concepts of culture and identity in order to address Southeast Asian diversities, movements, encounters, hybridization, and hierarchies.

  • PDF

A Study on Frequency Spectrum Scanning for Maritime Autonomous Surface Ship's M-S2X (Maritime-Ship to Everything) Communication (자율운항선박용 선박중심직접통신(M-S2X) 주파수 탐색에 관한 연구)

  • Bu-young Kim;Wonsik Kang;Woo-Seong Shim
    • Journal of Navigation and Port Research
    • /
    • v.47 no.6
    • /
    • pp.419-429
    • /
    • 2023
  • The pinnacle of rapidly changing and advancing maritime transportation technology is expected to be the Maritime Autonomous Surface Ship (MASS). The implementation of various services within the MASS is likely to be feasible through the ship-centric network known as the S2X communication system. However, existing communication systems face issues such as service traffic saturation and failure to meet demanded functionalities, necessitating the proactive introduction of additional communication technologies. In this study, the concept of S2X communication for the MASS was redefined, deriving required functionalities and ultimately selecting frequencies suitable for utilization. Candidate frequency groups suitable for the derived communication requirements were identified, and communication frequencies prioritized for the initial application were chosen through expert consensus. It is anticipated that through further research, including experimentation to validate these frequencies, they could be utilized in implementing services for autonomous ship navigation in the future.

Requirement Analysis of Satellite On-the-Move Transportable Terminal System (이동통신형 차량위성단말 시스템 요구사항 분석)

  • Oh, Il-Hyuk;Song, Choong-Ho;Ko, Dong-Kuk
    • Journal of Satellite, Information and Communications
    • /
    • v.3 no.1
    • /
    • pp.41-47
    • /
    • 2008
  • Line-of-sight communications cannot easily support korean armed forces because of mountainous terrain. ADD(Agency for Defense Development) introduced ANASIS(Army Navy Air-force Satellite Information System) to meet the Korean warfighter's operational needs. Currently, army's military satcom terminal is designed for either fixed site or on-the-pause operation. The US army is under development of multi-band integrated on-the-move satellite terminals to let the army's communication capability to keep pace with globally deployable Joint Task Force for network-centric application. In this paper we analyzed X-band and Ka-band link and subsystem requirement. Our focus here is to describe key technical issues. Especially, On the basis of 3dB beam width of 0.9m antenna, Tracking accuracy and disturbances compensation signal processing on-the-move of Antenna Tracking system is analyzed. Also, protocol is analyzed that minimize blockage on the move due to an obstacle. when the received signal blocked, it stop to transmit burst signal and retransmit when blockage removed through received synchronization signal monitoring. Analyzed specification will be used to make prototype terminal to analyze risk for mass production

  • PDF

Query Routing in Road-Based Mobile Ad-Hoc Networks (도로 기반 이동 애드 혹 망에서 질의 처리 방법)

  • Hwang So-Young;Kim Kyoung-Sook;Li Ki-Joune
    • The KIPS Transactions:PartD
    • /
    • v.12D no.2 s.98
    • /
    • pp.259-266
    • /
    • 2005
  • Recently data centric routing or application dependent routing protocols are emerged in mobile ad hoc networks. In this paper, we propose a routing method for query processing in MANET(Mobile Ad hoc NETwork) environment, called road-based query routing, with consideration on real time traffic information of large number of vehicles. In particular, we focus on the method that process arrival time dependent shortest path query in MANET without a central server on the road networks. The main idea of our approach lies in a routing message that includes query predicates based on the road connectivity and on data gathering method in real time from vehicles on the road by ad-hoc network. We unify route discovery phase and data delivery(query processing) phase in our mechanism and reduce unnecessary flooding messages by pruning mobile nodes which are not on the same or neighboring road segments. In order to evaluate the performances of the proposed method, we established a model of road networks and mobile nodes which travel along the roads. The measurement factor is the number of nodes to whom route request is propagated according to each pruning strategy. Simulation result shows that road information is a dominant factor to reduce the number of messages.