• Title/Summary/Keyword: warfare information system

Search Result 204, Processing Time 0.031 seconds

Fast Distributed Network File System using State Transition Model in the Media Streaming System (미디어 스트리밍 시스템에서의 상태 천이 모델을 활용한 고속 분산 네트워크 파일 시스템)

  • Woo, Soon;Lee, Jun-Pyo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.6
    • /
    • pp.145-152
    • /
    • 2012
  • Due to the large sizes of streaming media, previous delivery techniques are not providing optimal performance. For this purpose, video proxy server is employed for reducing the bandwidth consumption, network congestion, and network traffic. This paper proposes a fast distributed network file system using state transition model in the media streaming system for efficient utilization of video proxy server. The proposed method is composed of three steps: step 1. Training process using state transition model, step 2. base and decision probability generation, and step 3. storing and deletion based on probability. In addition, storage space of video proxy server is divided into each segment area in order to store the segments efficiently and to avoid the fragmentation. The simulation results show that the proposed method performs better than other methods in terms of hit rate and number of deletion. Therefore, the proposed method provides the lowest user start-up latency and the highest bandwidth saving significantly.

Design and Realization of Phase Sensitive Detector Circuitry of Two-Channel Ring-Core Flux-Gate Compass (2-체널 링-코어 플럭스-게이트 콤파스의 위상검출 회로 설계와 구현에 관한 연구)

  • Yim, Jeong-Bin
    • Journal of Navigation and Port Research
    • /
    • v.26 no.1
    • /
    • pp.127-136
    • /
    • 2002
  • This paper Presents a discussion on the design and realization for the Phase Sensitive Defector (PSD) circuitry of Flu$\chi$-gate Compass that gives direction information to the Directional Frequency Analysis and Recording (DIFAR) Sonobuoy in Air Anti-Submarine Warfare. PSD circuitry is realized with Twin-T RC networked active band-pass filter. Results of a performance test the PSD circuitry shows that the effectiveness of band-pass filtering of desired $2F_0$ second harmonic signal, which is Pro- portional to the direction of earth's magnetic field. This resulted in the extraction of direction information.

비상통신 해외사례 및 구축동향

  • 김상완;이준경;이경호
    • Information and Communications Magazine
    • /
    • v.23 no.2
    • /
    • pp.23-40
    • /
    • 2006
  • 재난은 다양한 원인에 의하여 예측 불가능하게 발생되고 있다. 정보화의 진전에 따라 네트워크는 모든 경제활동의 근간이 되어 있으며, 재난이 발생하면 재난복구 및 구난 활동 등에 통신기능의 활용도가 더욱 높아진다. 특히 통신 장애를 일으키는 통신재난이 발생하면 그 파급효과는 빠르고, 넓게 확산되는 경향을 보인다. 국내.외적으로 국가 주요 활동의 정보통신의 의존도가 증가하고, 정보통신 기반의 복잡도와 개방성이 증가하여 위협 및 취약성이 증대하며, 정보전(cyber warfare)의 공격 위협이 증대하는데 비교하여, 통신 부문의 민영화에 따라 공공 부문 보호 영역이던 통신 부문이 민간 부문으로 확대되어 다양한 위협에 노출되어 있는 실정이다. 따라서 최근에는 통신 네트워크와 서비스를 정보통신 시스템과 서비스에 대한 독립적인 보호와 보안이라는 차원에서 한걸음 더 나아가 " 국가주요 기반 구조에 대한 보호와 위협에 대한 종합적인 대응 " 이라는 차원에서 접근하고 있다. 미국은 지난 및 비상대비 통신 전담기구인 NCS(National Communication System)와 대통령자문위원회인 NSTAC(National Security Telecommunication Advisory)등 종전부터 있던 통신 재난 및 비상 통신 관련 기구에서 진행해오던 통신 재난 및 비상 통신 관련 기구에서 진행해오던 통신 재난 및 비상 통신 관련 업무를 9-11 사태를 경험하면서 신설된 Department of Homeland Security에서 총괄하도록 하고 있다. 캐나다의 경우는 MSAT(Mobile Satellite Services) Emergency Telecommunication Network을 통한 긴급통신 시스템을 구축하였다. 일본의 경우 우정성(현재는 총무성에 통합) 산하 비상통신협의회를 구성하여 비상통신에 관련한 협의와 점검을 추진하며 방재용 무선 시스템을 구축 운용하고 있다. 본 고에서는 이와 같은 비상통신과 관련하여 수행하고 있는 국외 비상통신 관련표준화 현황 및 해외 주요국가 별 구축 동향에 대해서 기술한다.

Blockchain Technology and Utilization Schemes in Tactical Communication Network

  • Yoo, In-Deok;Lee, Woo-Sin;Kim, Hack-Joon;Jin, So-Yeon;Jo, Se-Hyeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.49-55
    • /
    • 2018
  • In this paper, we propose schemes of blockchain utilization in tactical communication environment. The military tactical communication environment has similar characteristics with blockchain network such as distributed architecture, decentralization, and the need for data integrity. A communication node constituting a tactical communication network is constituted by a system capable of configuring and connecting a network for each node. When a communication node, having such capabilities, is configured as a node of blockchain network, various functions could be performed. In this paper, we propose utilization schemes of authentication, integrity, record management, and privilege control based blockchain technology. Functions for authentication, integrity verification, and record management need to ensure the stored data and could track history. The requirement of function's characteristics are matched to blockchain which is storing data sequentially and difficult to hack data, so that it could perform functionally and sufficiently well. Functions for authority control should be able to assign different privileges according to the state of the requestor. Smart contract will function when certain conditions are satisfied and it will be able to perform its functions by using it. In this paper, we will look over functions and utilization schemes of blockchain technology which could reliably share and synchronize data in a tactical communication environment composed of distributed network environment.

Preemptive Failure Detection using Contamination-Based Stacking Ensemble in Missiles

  • Seong-Mok Kim;Ye-Eun Jeong;Yong Soo Kim;Youn-Ho Lee;Seung Young Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.5
    • /
    • pp.1301-1316
    • /
    • 2024
  • In modern warfare, missiles play a pivotal role but typically spend the majority of their lifecycle in long-term storage or standby mode, making it difficult to detect failures. Preemptive detection of missiles that will fail is crucial to preventing severe consequences, including safety hazards and mission failures. This study proposes a contamination-based stacking ensemble model, employing the local outlier factor (LOF), to detect such missiles. The proposed model creates multiple base LOF models with different contamination values and combines their anomaly scores to achieve a robust anomaly detection. A comparative performance analysis was conducted between the proposed model and the traditional single LOF model, using production-related inspection data from missiles deployed in the military. The experimental results showed that, with the contamination parameter set to 0.1, the proposed model exhibited an increase of approximately 22 percentage points in accuracy and 71 percentage points in F1-score compared to the single LOF model. This approach enables the preemptive identification of potential failures, undetectable through traditional statistical quality control methods. Consequently, it contributes to lower missile failure rates in real battlefield scenarios, leading to significant time and cost savings in the military industry.

A Study on the Design of an Underwater Distributed Sensor Network for the Shallow Water by An Effectiveness Analysis (효과도 분석을 통한 천해용 수중분산 센서망 설계 연구)

  • Kim, Wan-Jin;Bae, Ho Seuk;Kim, Woo Shik;Lee, Sang Kug;Choi, Sang Moon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.5
    • /
    • pp.591-603
    • /
    • 2014
  • In this paper, we have described the characteristics of the Underwater Distributed Sensor Network (UDSN) and proposed the conceptual design guideline by an effectiveness analysis. To perform the effectiveness analysis, we defined an battlefield environment, and then analyzed principal components which compose the UDSN to find out simulation parameters and system constraints. We have chosen a measure of effectiveness based on a target trajectory, which could enhance intuitive understanding about current status, and performed various simulations to reveal critical design parameters in terms of sensor node types, arrangement, cost and combination of detection information.

A Case of Developing Performance Evaluation Model for Korean Defense Informatization (국방정보화 수준평가 모델 개발 사례)

  • Gyoo Gun Lim;Dae Chul Lee;Hyuk Jin Kwon;Sung Rim Cho
    • Information Systems Review
    • /
    • v.19 no.3
    • /
    • pp.23-45
    • /
    • 2017
  • The ROK military is making a great effort and investment in establishing network-centric warfare, a future battlefield concept, as a major step in the establishment of a basic plan for military innovation. In the military organization level, an advanced process is introduced to shorten the command control time of the military and the business process is improved to shorten the decision time. In the information system dimension, an efficient resource management is achieved by establishing an automated command control system and a resource management information system by using the battle management information system. However, despite these efforts, we must evaluate the present level of informatization in an objective manner and assess the current progress toward the future goal of the military by using objective indicators. In promoting informatization, we must systematically identify the correct areas of improvement and identify policy directions to supplement in the future. Therefore, by analyzing preliminary research, workshops, and expert discussions on the major informatization level evaluation models at home and abroad, this study develops an evaluation model and several indicators that systematically reflect the characteristics of military organizations. The developed informatization level evaluation model is verified by conducting a feasibility test for the troops of the operation class or higher. We expect that this model will be able to objectively diagnose the level of informatization of the ROK military by putting budget and resources into the right place at the right time and to rapidly improve the vulnerability of the information sector.

Analysis on the Contribution of FDOA Measurement Accuracy to the Performance of Combined TDOA/FDOA Localization Systems (TDOA/FDOA 복합 위치추정 시스템에서 FDOA 측정 정확도에 따른 추정 성능 기여도 분석)

  • Kim, Dong-Gyu;Kim, Yong-Hee;Han, Jin-Woo;Song, Kyu-Ha;Kim, Hyoung-Nam
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.5
    • /
    • pp.88-96
    • /
    • 2014
  • In modern electronic warfare systems, the necessity of a more accurate estimation method based on non-AOA (arrival of angle) measurement, such as TDOA and FDOA, have been increased. The previous researches using single TDOA have been carried out in terms of not only the development of emitter location algorithms but also the enhancement of measurement accuracy. Recently, however, the combined TDOA/FDOA method is of considerable interest because it is able to estimate the velocity vector of a moving emitter and acquire a pair of TDOA and FDOA measurements from a single sensor pair. In this circumstance, it is needed to derive the required FDOA measurement accuracy in order that the TDOA/FDOA combined localization system outperforms the previous single TDOA localization systems. Therefore, we analyze the contribution of FDOA measurement accuracy to emitter location, then propose the criterion based on CRLB (Cramer-Rao lower bound). Simulations are included to examine the validity of the proposed criterion by using the Gauss-Newton algorithm.

Detection Model of Malicious Nodes of Tactical Network for Korean-NCW Environment (한국형 NCW를 위한 전술네트워크에서의 악의적인 노드 검출 모델)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Ryou, Hwang-Bin;Jo, Yong-Gun
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.71-77
    • /
    • 2011
  • NCW(Network Centric- Warfare) encompasses the concept to use computer data processing and network linkage communications techniques, share information and furthermore, enhance the effectiveness of computer-operating systems. As IT(Information & Technology) have become developed in the recent years, the existing warfare system-centered conventional protocol is not use any longer. Instead, network-based NCW is being widely-available, today. Under this changing computer environment, it becomes important to establish algorithm and build the stable communication systems. Tools to identify malign node factors through Wireless Ad-hoc network cause a tremendous error to analyze and use paths of even benign node factors misreported to prove false without testing or indentifying such factors to an adequate level. These things can become an obstacle in the process of creating the optimum network distribution environment. In this regard, this thesis is designed to test and identify paths of benign node factors and then, present techniques to transmit data through the most significant open short path, with the tool of MP-SAR Protocol, security path search provider, in Ad-hoc NCW environment. Such techniques functions to identify and test unnecessary paths of node factors, and thus, such technique users can give an easy access to benign paths of node factors.

A Study on the Analysis of U.S.A Navy and R.O.K Military C4I System and Future Development (미해군과 한국군 C4I 체계 분석 및 발전 방향에 관한 연구)

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Jo, Yong-Gun;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.59-66
    • /
    • 2011
  • The representative concept of the future war is NCW. The main point of NCW is that it is connected by networ ks and gathers the battlefield status in real time, managing and controlling it. This is most needed in the navy. Operations of the navy are carried out in wide areas, individually or together. During this process, sharing information between each warship should be essential. Furthermore in the case of the American navy, they see the entire world as the operation area so it is a representative example of NCW. The C4I system of the Korean army is separated a ccording to the difference of each army's tactics and weapon system, being developed and managed differently. The refore there is a problem of interoperability lacking in each system. This paper analyzes the developed C4I system of the American navy to analyze the problems of C4I system of the Korean army, and propose the future direction of its development.