• Title/Summary/Keyword: 공중가로 네트워크

Search Result 5, Processing Time 0.018 seconds

The Study on Next Generation Network Security Architecture in the BcN Environment (BcN 환경을 고려한 차세대 네트워크 보안 구조에 관한 연구)

  • 오승희;서동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.709-712
    • /
    • 2004
  • The BcN is applying from public networks to local networks and each terminal step by step under supporting MIC(Ministry of Information and Communication Repoblic of Korea) until 2007. The architecture of network sorority should considers BcN environment and evolves to manage Ipv6 traffics. The next generation network security architecture can manage not only Ipv6 environment but also wire and wireless integrated network. We suggest the next generation network security architecture for Ipv6 environment and wire-wireless integrated network environment and verify the performance of the suggested architecture using network security scenario.

  • PDF

A Resource Scheduling Based on Iterative Sorting for Long-Distance Airborne Tactical Communication in Hub Network (허브 네트워크에서의 장거리 공중 전술 통신을 위한 반복 정렬 기반의 자원 스케줄링 기법)

  • Lee, Kyunghoon;Lee, Dong Hun;Lee, Dae-Hong;Jung, Sung-Jin;Choi, Hyung-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.12
    • /
    • pp.1250-1260
    • /
    • 2014
  • In this paper, a novel resource scheduling, which is used for hub network based long distance airborne tactical communication, is proposed. Recently, some countries of the world has concentrated on developing data rate and networking performance of CDL, striving to keep pace with modern warfare, which is changed into NCW. And our government has also developed the next generation high capacity CDL. In hub network, a typical communication structure of CDL, hybrid FDMA/TDMA can be considered to exchange high rate data among multiple UAVs simultaneously, within limited bandwidth. However, due to different RTT and traffic size of UAV, idle time resource and unnecessary packet transmission delay can occur. And these losses can reduce entire efficiency of hub network in long distance communication. Therefore, in this paper, we propose RTT and data traffic size based UAV scheduling, which selects time/frequency resource of UAVs by using iterative sorting algorithm. The simulation results verified that the proposed scheme improves data rate and packet delay performance in low complexity.

The Changes in the Future War Patterns and ROK's Response (미래 전쟁양상의 변화와 한국의 대응)

  • Kim, Kang-nyeong
    • Korea and Global Affairs
    • /
    • v.1 no.1
    • /
    • pp.115-152
    • /
    • 2017
  • This paper is to analyse the changes in the future war patterns and ROK's response. To this end the paper is composed of 5 chapters titled instruction; concept, characteristics, types, and evolution of war; changes in the war patterns of the future; Korea's response strategies for the future war. Truth can be immutable, but everything else changes. War has begun with human history, and today there are still wars in places all over the world. As ages change from agricultural society to industrial society to knowledge and information society, aspects(patterns) of war have also changed. Future warfare includes the 5th dimensional war(in the ground, the sea, the air, the universe, the cyber), the network-centric, the precision strike, the rapid maneuver, the non-gunpowder, the non-lethal, the unmanned robot, the informational & cyber, the asymmetric, the non-linear, and the parallel etc. In response to these changes in the pattern of wars, the ROK military should seek (1)to build a future-oriented military force, (2)to continuously develop military innovation and preparedness, and (3)to develop and establish a paradigm for acquiring the power of technology. A Roman strategist, Vegetius said, "If you wish peace, prepare for war." This is a universally accepted maxim in international society today. We must never forget that peace we desire is given when we have the will and ability to keep.

The Activities of APEC to Reinforce the Cooperation and the Competence of Food Safety Management in Asia Pacific Region (아태지역 식품안전관리 협력과 역량강화를 위한 APEC의 활동)

  • Lee, Ggot-Im;Hwang, Myung-Sil;Yoon, Hye-Jung;Lee, Cherl-Ho
    • Journal of Food Hygiene and Safety
    • /
    • v.27 no.2
    • /
    • pp.176-181
    • /
    • 2012
  • Persistent accidents related to food safety and expanded international trades have urged the world to be aware of the gravity of the accidents. Accordingly many countries have tried to come up with various laws, regulations, measures, support networks and educational programs for the agenda, particularly focusing on harmonizing food safety technologies among nations and fostering professionals. Also, APEC newly organized Food Safety Cooperation Forum (FSCF) in 2007 to exert multi-dimensional efforts to improve food safety for Asia Pacific nations. Up to now, 35 activities have been promoted since 2007 and additional 20 activities are waiting for their turns for action on the list of APEC project agenda. FSCF has the objective that it helps the stakeholders in food supply chain develop their own competence in that area, thus increase international trade among nations and maintain the globe healthy by applying the highest standards and best practices for the management of food safety ranging from production to consumption. To achieve this strategic objective, APEC subsequently formed Partnership Training Institute Network (PTIN) to build up the multilateral networks of specialists from governmental agencies engaging in food safety management, industries, academia and international organizations in Asia-Pacific region. This attempt made it possible for the world to exchange their scientific and technological information concerning food safety and strengthen related education and training. Today, international cooperation is essential for food safety management. Therefore, we need to participate actively in the activities of APEC FSCF to contribute to improving food safety technologies for the member countries of APEC. We also need to connect the domestic support programs with theirs.

The Aspectual Theory of the Cybercharacter (사이버캐릭터의 위상론)

  • 이선교
    • Archives of design research
    • /
    • v.12 no.4
    • /
    • pp.182-190
    • /
    • 1999
  • There has been the rapid change of paradigm with the overflow of terms related to computers such as information, digital, cyber, virtual world and the change of time concept on the ground that it is common to change the world into virtual time. This study is about cybercharacters working in air-broadcasting with rapidly-developing internet, The cybercharacters including 3D animation developed from 2D animation are know to be manufactured with use of electronic mediun and computers and to exist in electronics. Though the emergence of the cybercharacters has a lot of gflnetic roots according to their objectives, they have in common that they are made by 3D graphics and they work in the virtual space, The great traits of the cybercharaters lie in the extension of interfacial function and ecological growth. In the cyberspace the interface, the meeting point between a computer and its users is the most important, The cybercharacters as medium providing new ruman interface become effective with growing interest in virtual reality, The cybercharacters also keep the ecological traits, They can also bring about added value with infusion of image and development of the network, These cybercharacters can also play the important parts in the continually developing cyberspace, The successful birth of the cybercharacter are based on, the technological power. assistance of fund and the ctrltural background, The information-entertainment of the cybercharacters functions well with the accompinimene of these three things, The cybercharacters can make a subject which keeps single issue as a central point of the virtual realty, The cybercharacters can also be connected with equity of "Korean knowledge information society" in the cultural rule of the internet and sociocul tural identity, identity.

  • PDF