• Title/Summary/Keyword: 네트워크 운용

Search Result 996, Processing Time 0.035 seconds

A Study on the air traffic control system of Korea Light Aircraft Carrier (한국형 경항공모함 항공관제체계에 대한 연구)

  • Choi, Youn-chul;Jung, Yong-tae;Cho, Young-jin
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.5
    • /
    • pp.272-280
    • /
    • 2022
  • An aircraft carrier is a combat ship that acts as an aircraft base at sea and performs combat through aircraft mounted as a military ship operating the aircraft. The Navy proposed a 40,000-ton light aircraft carrier operation plan that could be equipped with vertical takeoff and landing fighter jets and helicopters around 2033, and based on this, this study examined the operation of aircraft control equipment among the aviation support systems required for operating light aircraft carriers in Korea. PriFly, TWR's ILARTS, ILM for airspace control, ASR, PAR, LAAS or RNAV, PALS (JPALS) for access control are required as essential equipment, and communication network and SCATT-16 are required along with URN-25 TACAN, ICLS (El/Az), ACLS OLS, MOVAS, IFLOLS, etc. This study consists of two parts, and part 2 will describe a specific control method on an aircraft carrier.

A Study on the Moral Responsibility of Lethal Autonomous Weapon Systems (LAWS): Focused on Robert Sparrow's "Responsibility Gap" Theory (치명적 자율무기체계의 도덕적 책임 문제 연구 : 로버트 스패로우의 '책임간극' 이론에 대한 고찰)

  • Hyunyoung Moon;Sangsu Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.375-381
    • /
    • 2023
  • In an increasingly hyperconnected battlefield, the reliance on battlefield networks and AI-based autonomous weapons systems creates uncertainty and raises ethical concerns. This article explores the responsibility gap in operating autonomous weapons systems, using Robert Sparrow's theory. By analyzing Sparrow's arguments, we propose overcoming the responsibility gap in lethal autonomous weapon systems (LAWS). Our objective is to establish a framework of responsibility that aligns with the evolving battlefield, promoting the development and use of responsible weapon systems.

Architecture Design for Disaster Prediction of Urban Railway and Warning System (UR-DPWS) based on IoT (IoT 기반 도시철도 재난 예지 및 경보 시스템 아키텍처 설계)

  • Eung-young Cho;Joong-Yoon Lee;Joo-Yeoun Lee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.1
    • /
    • pp.163-174
    • /
    • 2024
  • Currently, the urban railway operating agency is improving the emergency telephone in operation into an IP-based "trackside integrated interface communication facility" that can support a variety of additional services in order to quickly respond to emergency situations within the tunnel. This study is based on this Analyze the needs of various stakeholders regarding the design of a system architecture that establishes an IoT sensor network environment to detect abnormal situations in the tunnel and transmits the collected information to the control center to predict disaster situations in advance, and defines the system requirements. In addition, a scenario model for disaster response was provided through the presentation of a service model. Through this, the perspective of responding to urban railway disasters changes from reactive response to proactive prevention, thereby ensuring safe operation of urban railways and preventing major industrial accidents.

An Effective Employment and Execution Performance Improvement Method of Mobile Web Widget Resources Based on the OMTP BONDI (OMTP BONDI 기반 모바일 웹 위젯 리소스의 효율적 운용 및 구동 성능 개선 기법 연구)

  • Bang, Ji-Woong;Kim, Dae-Won
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.2
    • /
    • pp.153-170
    • /
    • 2011
  • OMTP (Open Mobile Terminal Platform) is a global forum made by telecommunications providers to promote user-oriented mobile services and data business. Devised by OMTP, BONDI is a browser-based application or a mobile web run-time platform to help widgets make good use of functions of mobile devices in a secure way. BONDI enables applications programmed with web standard technologies such as HTML, JavaScript, CSS, and AJAX to reach the internal functions of mobile devices. Since BONDI, which is not just a simple network application, can reach the internal resources of devices in standard ways, it enables the application and widgets to be developed regardless of tile OS or platform. Web browser-based widgets are vulnerable to the network environment, and their exeeution speed can be slowed as the operations of the widgets or applications become heavy. However, those web widgets will be continuously used thanks to the user-friendly simple interface and the faster speed in using web resources more than the native widgets inside the device. This study suggested a method to effectively operate and manage the resource of OMTP BONDI web widget and then provided an improved result based on a running performance evaluation experiment. The experiment was carried to improve the entire operating time by enhancing the module-loading speed. In this regard, only indispensable modules were allowed to be loaded while the BONDI widget was underway. For the purpose, the widget resource list, able to make the operating speed of the BONDI widget faster, was redefined while a widget cache was employed. In addition, the widget box, a management tool for removed widgets, was devised to store temporarily idle widgets.

Performance Evaluation of Workstation System within ATM Integrated Service Switching System using Mean Value Analysis Algorithm (MVA 알고리즘을 이용한 ATM 기반 통합 서비스 교환기 내 워크스테이션의 성능 평가)

  • Jang, Seung-Ju;Kim, Gil-Yong;Lee, Jae-Hum;Park, Ho-Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.4
    • /
    • pp.421-429
    • /
    • 2000
  • In present, ATM integrated switching system has been developed to a mixed modules that complexed switching system including maintenance, operation based on B-ISDN/LAN service and plug-in module, , which runs on workstation computer system. Meanwhile, workstation has HMI operation system feature including file system management, time management, graphic processing, TMN agent function. The workstation has communicated with between ATM switching module and clients. This computer system architecture has much burden messages communication among processes or processor. These messages communication consume system resources which are socket, message queue, IO device files, regular files, and so on. Therefore, in this paper we proposed new performance modeling with this system architecture. We will analyze the system bottleneck and improve system performance. In addition, in the future, the system has many additional features should be migrated to workstation system, we need previously to evaluate system bottleneck and redesign it. In performance model, we use queueing network model and the simulation package is used PDQ and C-program.

  • PDF

Cascade Composition of Translation Rules for the Ontology Interoperability of Simple RDF Message (단순 RDF 메시지의 온톨로지 상호 운용성을 위한 변환 규칙들의 연쇄 조합)

  • Kim, Jae-Hoon;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.34 no.6
    • /
    • pp.528-545
    • /
    • 2007
  • Recently ontology has been an attractive technology along with the business strategy of providing a plenty of more intelligent services. The essential problem in application domains using ontology is that all members, agents, and application programs in the domains must share the same ontology concepts. However, a variety of mobile devices, sensing devices, and network components manufactured by various companies, a variety of common carriers, and a variety of contents providers make multiple heterogeneous ontologies more likely to coexist. We can see many past researches fallen into resolving this semantic interoperability. Such methods can be broadly classified into by-mapping, by-merging, and by-translation. In this research, we focus on by-translation among them which uses a translation rule directly made between two heterogeneous ontology data like OntoMorph. However, the manual composition of the direct translation rule is not convenient by itself and if there are N ontologies, the direct method has the rule composition complexity of $O(N^2)$ in the worst case. Therefore, in this paper we introduce the cascade composition of translation rules based on web openness in order to improve the complexity. The research result made us recognize some important factors in an ontology translation system, that is speediness of translation, and conveniency of translation rule composition, and some experiments and comparing analysis with existing methods showed that our cascade method has more conveniency with insuring the speediness and the correctness.

An Improvement of Interoperability for HD-Class VOD Content Management System Based on H.264 (H.264 기반 HD급 VOD 콘텐츠관리시스템 상호운용성 개선)

  • Min, Byung-Won
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.315-320
    • /
    • 2014
  • Recently, although the requirement of quality of VOD content has been transferred upto the class of HD, conventional management systems characterized by OS dependency are truly limited in quality of video image, stability, and compatibility of network environments. In addition most of the content management systems realize very limited capabilities for the real affairs of content management and distribution services in such an OS dependent environment. In this paper, we propose a new scheme of HD-Class VOD Content Management System to solve these problems. We design and implement the proposed system based on open sources by using H.264 video compression method. The proposed system offers high quality content management method based on opened systems and independent on-line distribution method so that it can be realized as an integrated management scheme for VOD contents. Moreover, our system solves the problems of occasional cutting-down video, small screen, and poor image quality that exist in the conventional wmv-type CMS. According to the result of performance evaluation, our system maintains sufficient performance and tolerence for the case of large scale HD content operations or fabrications. We expect that the proposed integrated DB scheme will especially be effective when the content management applications are changed from Internet Web environments to mobile terminal environments.

A Tactical Internet Geocasting Protocol for Efficient Message Delivery (효율적인 메시지 전달을 위한 전술인터넷 지오캐스팅 프로토콜)

  • Yoon, Sun-Joong;Ko, Young-Bae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.10B
    • /
    • pp.1050-1061
    • /
    • 2009
  • The Tactical Internet(TI) managed by Infantry Brigades is used for the purpose of sharing information of Command Control and Situation Awareness. When there are more than two destinations to transmit data in the TI system, a multicasting is utilized based on pre-defined multicast groups. However even in the case when a source node needs to send some messages like weathercast and attack alarm etc to only a part of Battalion or Brigades in a specific geographical region (destination region), the current TI multicasting protocol is designed to transmit the messages to the pre-defined group or all of the Battalion/Brigade nodes, resulting in inefficiency in terms of end-to-end delay and overhead. In this paper, we propose more efficient protocol for such cases, named as "Tactical Internet Geocasting (TIG)". The proposed scheme firstly checks whether the destination region belongs to one Battalion region or more than two Battalion regions using location information, and then performs a greedy forwarding from the source node to the destination region, followed by a local flooding inside of the destination region. With performance analysis and simulations using NS-2, TIG is compared to the current TI multicasting protocol (i.e., Simplified MDP) and the LBM (Location-based Multicast). The simulation results show that the proposed TIG is more efficient than both in terms of delay and network overhead.

A Visualization Technique of Inter-Device Packet Exchanges to Test DLNA Device Interoperability (DLNA 기기의 상호운용성 시험을 위한 패킷교환정보 시각화 방법)

  • Kim, Mijung;Jin, Feng;Yoon, Ilchul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.531-534
    • /
    • 2014
  • DLNA is an established industry standard which supports contents sharing among smart devices in home wired- and wireless-network environment and is well known in Korea as Allshare or Smartshare. The DLNA standard is implemented as built-in services in most of Android smart phones and tablets. In addition to the handheld devices, DLNA service can also be employed in speakers, printers, and so on. However, users have reported many interoperability issues between DLNA devices. Developers typically identify causes by analyzing the packet exchange information between devices. However, this approach costs them to put additional effort to filter relevant packets, to reconstruct packet exchange history and the protocol flow. Consequently, it ends up with increased development time. In this paper, we demonstrate a technique to automatically analyze and visualize the packet exchange history. We modified a router firmware to capture and store packets exchanged between DLNA devices, and then analyze and visualize the stored packet exchange history for developers. We believe that visualized packet exchange history can help developers to test the interoperability between DLNA devices with less effort, and ultimately to improve the productivity of developers.

  • PDF

A Study on the Method of Constructive Simulation Operation Analysis for Warfighting Experiment Supplied with the Validation Evaluation (타당성 평가가 보완된 모델 운용상의 전투실험 모의분석 절차 연구)

  • Park, Jin-Woo;Kim, Nung-Jin;Kang, Sung-Jin;Soo, Hyuk
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.77-87
    • /
    • 2010
  • Currently, our society has been changed from the industrial society to the information society. As the war progresses to Information Warfare, Network-Centric Warfare, Long-Range Precision Engagement and Robot Warfare, the military should advance to High-tech Scientific force. For this creation of the war potential, it is regarded as the warfighting experiment is a critical method. Surely it is rational that LVC(Live Virtual Constructive simulation) is desirable to make the warfighting experiment. But because it is limited by the cost, the time, the place and the resource, the constructive simulation(M&S : Modeling&Simulation) is a good tool to solve those problems. There are some studies about the evaluation process for developing the model, but it is unsatisfying in the process of the constructive simulations' operation. This study focuses on the way of constructive simulation operation, which is supplied with the evaluation process(VV&A : Verification Validation & Accreditation). We introduce the example of the rear area operation simulation for "appropriateness evaluation to the organization of logistic corps" by the AWAM(Army Weapon Analysis Model). This study presents the effective methods of the constructive simulations, which is based on the reliable evaluation process, so it will contribute to the warfighting experiments.