• Title/Summary/Keyword: the army

Search Result 1,345, Processing Time 0.202 seconds

Social-Aware Collaborative Caching Based on User Preferences for D2D Content Sharing

  • Zhang, Can;Wu, Dan;Ao, Liang;Wang, Meng;Cai, Yueming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.1065-1085
    • /
    • 2020
  • With rapid growth of content demands, device-to-device (D2D) content sharing is exploited to effectively improve the service quality of users. Considering the limited storage space and various content demands of users, caching schemes are significant. However, most of them ignore the influence of the asynchronous content reuse and the selfishness of users. In this work, the user preferences are defined by exploiting the user-oriented content popularity and the current caching situation, and further, we propose the social-aware rate, which comprehensively reflects the achievable contents download rate affected by the social ties, the caching indicators, and the user preferences. Guided by this, we model the collaborative caching problem by making a trade-off between the redundancy of caching contents and the cache hit ratio, with the goal of maximizing the sum of social-aware rate over the constraint of limited storage space. Due to its intractability, it is computationally reduced to the maximization of a monotone submodular function, subject to a matroid constraint. Subsequently, two social-aware collaborative caching algorithms are designed by leveraging the standard and continuous greedy algorithms respectively, which are proved to achieve different approximation ratios in unequal polynomial-time. We present the simulation results to illustrate the performance of our schemes.

Network Simulation and Design Guideline for VoIPv6 Network of U-Army (U-Army의 VoIPv6 망 성능 시뮬레이션을 이용한 망 설계 방안)

  • Lee, Hyun-Duck;Min, Sang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.10B
    • /
    • pp.904-910
    • /
    • 2008
  • In this paper, we consider the military requirement, study the military network services and their related traffic parameters, evaluate the performance the experimental army network and then suggest the design guideline of applying VoIP to the whole military. We evaluate the performance of the delay and loss in the viewpoint of packet and call levels for the several scenarios. First, the performances of separate network service were considered and the satisfaction of the requirement was obtained. Secondly, the delays and losses of the integrated network services were calculated as the amount of the background traffic increases. Finally, based on the simulation results, we presented the design guideline which classified network configurations for applying VoIP equipment and helped estimate the number of VoIP terminals in the existing link.

Weighted Collaborative Representation and Sparse Difference-Based Hyperspectral Anomaly Detection

  • Wang, Qianghui;Hua, Wenshen;Huang, Fuyu;Zhang, Yan;Yan, Yang
    • Current Optics and Photonics
    • /
    • v.4 no.3
    • /
    • pp.210-220
    • /
    • 2020
  • Aiming at the problem that the Local Sparse Difference Index algorithm has low accuracy and low efficiency when detecting target anomalies in a hyperspectral image, this paper proposes a Weighted Collaborative Representation and Sparse Difference-Based Hyperspectral Anomaly Detection algorithm, to improve detection accuracy for a hyperspectral image. First, the band subspace is divided according to the band correlation coefficient, which avoids the situation in which there are multiple solutions of the sparse coefficient vector caused by too many bands. Then, the appropriate double-window model is selected, and the background dictionary constructed and weighted according to Euclidean distance, which reduces the influence of mixing anomalous components of the background on the solution of the sparse coefficient vector. Finally, the sparse coefficient vector is solved by the collaborative representation method, and the sparse difference index is calculated to complete the anomaly detection. To prove the effectiveness, the proposed algorithm is compared with the RX, LRX, and LSD algorithms in simulating and analyzing two AVIRIS hyperspectral images. The results show that the proposed algorithm has higher accuracy and a lower false-alarm rate, and yields better results.

The Study of a rational management to the protective area of military installations (군사시설보호구역의 합리적 관리방안에 관한 연구)

  • Kim, Myeong-Sun
    • Journal of National Security and Military Science
    • /
    • s.2
    • /
    • pp.23-89
    • /
    • 2004
  • The protective area of military installations can be a essential investment goods for producting public goods like military installations and national security. For the purpose of this, The protective area of military installations are set up and applicated at important strategic areas. It causes colplications and frictions among the people, government and army inevitably to set up the protective area of military installations, as the relation between the army which produces security or public goods and the people that make and use valuable goods is opposed and contradictory to each other. Heretofore, the civil petition of the protective affair to military installations has been presented individually. As local self- government is fixed, a local selg-governing body presents many civil petitions now. Therefore the protective affair to military installations came to be examined carefully in the aspecs of improving the relationship between the civil and army, raising natinal competitiveness, and increasing efficiency of military operations. Though the relationship between the civil and army is opposed and contradictory, it is required to be in keeping with each other with a situation around society, that is, changes and trend of national security, politics, economy, society. Accordingly, if you drive plans of rational management to the protective area of military installations, you can not only achieve successful military installations, but also be a great help to growth of a local community. Then 「The Army with the people」worthy of the name can be real.

  • PDF

The Research of Safety Effects by using a Hearing Protection(Ear Plug) in the Military (군대 청력 보호구(귀마개) 사용 및 착용 안전효과 실태조사)

  • Hwang, Sung Ho;Joo, Myo Kyoung;Park, Jae Bum
    • Journal of the Korean Society of Safety
    • /
    • v.28 no.4
    • /
    • pp.103-106
    • /
    • 2013
  • During a military service, noise has unusual characteristics, and constitutes a serious hazard to hearing of military servicemen. The purpose of this study is to understand the use of hearing protection and to assess the safety effects of hearing protection by using a ear plug in military. A total of 208(the army : 101, an air force : 107) serviceman were studied utilizing a questionnaire to know how many serviceman use the hearing protection and a total of 202(the army : 110, an air force : 92) serviceman were also studied using a ear fit validation device to assess the safety effects of hearing protection by using a ear plug. The results showed that the army have low used of hearing protection than an air force because of the low frequency of the noise exposure in the army. Personal attenuation rate was increased with 8 dB after fitting education. Therefore, it is recommended that use of proper hearing protection and fitting education was more suitable for military servicemen who were being exposed of the noise in domestic military.

A Double-channel Four-band True Color Night Vision System

  • Jiang, Yunfeng;Wu, Dongsheng;Liu, Jie;Tian, Kuo;Wang, Dan
    • Current Optics and Photonics
    • /
    • v.6 no.6
    • /
    • pp.608-618
    • /
    • 2022
  • By analyzing the signal-to-noise ratio (SNR) theory of the conventional true color night vision system, we found that the output image SNR is limited by the wavelength range of the system response λ1 and λ2. Therefore, we built a double-channel four-band true color night vision system to expand the system response to improve the output image SNR. In the meantime, we proposed an image fusion method based on principal component analysis (PCA) and nonsubsampled shearlet transform (NSST) to obtain the true color night vision images. Through experiments, a method based on edge extraction of the targets and spatial dimension decorrelation was proposed to calculate the SNR of the obtained images and we calculated the correlation coefficient (CC) between the edge graphs of obtained and reference images. The results showed that the SNR of the images of four scenes obtained by our system were 125.0%, 145.8%, 86.0% and 51.8% higher, respectively, than that of the conventional tri-band system and CC was also higher, which demonstrated that our system can get true color images with better quality.

Comparing finite element and meshfree particle formulations for projectile penetration into fiber reinforced concrete

  • O'Daniel, James;Adley, Mark;Danielson, Kent;DiPaolo, Beverly;Boone, Nicholas
    • Computers and Concrete
    • /
    • v.7 no.2
    • /
    • pp.103-118
    • /
    • 2010
  • Penetration of a fragment-like projectile into Fiber Reinforced Concrete (FRC) was simulated using finite element (FE) and particle formulations. Extreme deformations and failure of the material during the penetration event were modeled with multiple approaches to evaluate how well each represented the actual physics of the penetration process and compared to experimental data. A Fragment Simulating Projectile(FSP) normally impacting a flat, square plate of FRC was modeled using two target thicknesses to examine the different levels of damage. The thinner plate was perforated by the FSP, while the thicker plate captured the FSP and only allowed penetration part way through the thickness. Full three dimensional simulations were performed, so the capability was present for non-symmetric FRC behavior and possible projectile rotation in all directions. These calculations assessed the ability of the finite element and particle formulations to calculate penetration response while assessing criteria necessary to perform the computations. The numerical code EPIC contains the element and particle formulations, as well as the explicit methodology and constitutive models, needed to perform these simulations.

Robust Secure Transmit Design with Artificial Noise in the Presence of Multiple Eavesdroppers

  • Liu, Xiaochen;Gao, Yuanyuan;Sha, Nan;Zang, Guozhen;Wang, Shijie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2204-2224
    • /
    • 2021
  • This paper studies secure wireless transmission from a multi-antenna transmitter to a single-antenna intended receiver overheard by multiple eavesdroppers with considering the imperfect channel state information (CSI) of wiretap channel. To enhance security of communication link, the artificial noise (AN) is generated at transmitter. We first design the robust joint optimal beamforming of secret signal and AN to minimize transmit power with constraints of security quality of service (QoS), i.e., minimum allowable signal-to-interference-and-noise ratio (SINR) at receiver and maximum tolerable SINR at eavesdroppers. The formulated design problem is shown to be nonconvex and we transfer it into linear matrix inequalities (LMIs). The semidefinite relaxation (SDR) technique is used and the approximated method is proved to solve the original problem exactly. To verify the robustness and tightness of proposed beamforming, we also provide a method to calculate the worst-case SINR at eavesdroppers for a designed transmit scheme using semidefinite programming (SDP). Additionally, the secrecy rate maximization is explored for fixed total transmit power. To tackle the nonconvexity of original formulation, we develop an iterative approach employing sequential parametric convex approximation (SPCA). The simulation results illustrate that the proposed robust transmit schemes can effectively improve the transmit performance.

Performance Evaluation of VoIPv6 in a Large-Scaled u-Army Network (확장된 군 통신망에 적용되는 VoIPv6 성능분석)

  • Kim, Ki-Bum;Min, Sang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.897-903
    • /
    • 2011
  • In this paper, we consider a future u-Army network with VoIPv6 and evaluate the performance based on the large-scale simulation. The target model chosen in our paper is extended to an division network from several unit networks in which the scope of the performance simulation was limited with the small experiment network[l]. The simulation model is based on several practical scenarios and the actual condition of the division network with some assumption. The evaluated performance results will help to predict whether a future u-Army network meet the real-time service or not, and to design the network suitable for military condition and requirements.

Study on the application of VR/AR technology to the future ROK Army Synthetic Battlespace Training System (미래 육군합성전장훈련체계에 VR/AR 기술 적용방안 연구)

  • Jong-Hoon Lee;Junwook Park
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.189-197
    • /
    • 2023
  • The Republic of Korea Army (ROK Army) is currently developing the Army Synthetic Battle Training System (ASBTS) by 2026 and will use it to advance division-level LVC integrated training. This study proposes a way to improve the effectiveness and efficiency of training by applying VR/AR technology to the ASBTS. To this end, we analyzed cases of VR/AR technology use in the defense field in advanced countries and the ROK military. As a result, we confirmed that the effectiveness and efficiency of training can be improved when the training system is converted to an immersive system. Accordingly, we selected and presented defense training subjects to be applied to VR/AR technology, considered the development direction for applying VR/AR technology to the ASBTS, and proposed a way to apply VR/AR technology to the ASBTS.