• Title/Summary/Keyword: 상황충돌

Search Result 571, Processing Time 0.025 seconds

Performance Analysis of Random Resource Selection in LTE D2D Discovery (LTE D2D 디스커버리에서 무작위 자원 선택 방법에 대한 성능 분석)

  • Park, Kyungwon;Kim, Joonyoung;Jeong, Byeong Kook;Lee, Kwang Bok;Choi, Sunghyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.3
    • /
    • pp.577-584
    • /
    • 2017
  • Long Term Evolution device-to-device (LTE D2D) is a key technology to mitigate data traffic load in a cellular system. It facilitates direct data exchange between neighboring users, which is preceded by D2D discovery. Each device advertises its presence to neighboring devices by broadcasting its discovery message. In this paper, we develop a mathematical analysis to assess the probability that discovery messages are successfully transmitted at the D2D discovery stage. We make use of stochastic geometry for modeling spatial statistics of nodes in a two dimensional space. It reflects signal to noise plus interference ratio (SINR) degradation due to resource collision and in-band emission, which leads to the discovery message reception probability being modeled as a function of the distance between the transmitter and the receiver. Numerical results verify that the newly developed analysis accurately estimates discovery message reception probabilities of nodes at the D2D discovery stage.

Assessment technology for spatial interaction of Artificial Monitoring System through 3-dimensional Simulation (3차원 시뮬레이션을 이용한 인위감시체계의 공간대응성능 평가기술)

  • Kim, Suk-Tae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.2
    • /
    • pp.1426-1433
    • /
    • 2015
  • CCTV-applied monitoring is an effective measure to suppress potential crimes and record objective relationship; however, there is no methodology that can quantitatively compare and assess the afore-mentioned effects. Thus, this study intended to construct the methodology and analysis application that can measure the changes in the space-corresponding performance of CCTVs depending on installation measures by using 3-dimenstional virtual simulation technology. For analysis, the raster-based Isovist theory was 3-dimensionally expanded and the amount of incident sight line to each point was accumulated. At the same time, the amount of overlapped monitoring in the CCTV cameras that were connected to each measurement node was accumulated for cross-analysis. By applying the examples and analyzing the results, it was possible to construct an analysis application in use of collision detection model and quantify the changes of monitoring performance depending on positioning alternative of the cameras. Moreover, it enabled intuitive review and supplementation by reproducing visible shadow areas in a graph.

A CSMA/CA with Binary Exponential Back-off based Priority MAC Protocol in Tactical Wireless Networks (전술 무선망에서 2진 지수 백오프를 사용하는 CSMA/CA 기반 우선순위 적용 MAC 프로토콜 설계)

  • Byun, Ae-Ran;Son, Woong;Jang, Youn-Seon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.11
    • /
    • pp.12-19
    • /
    • 2015
  • In network-centric warfare, the communication network has played a significant role in defeating an enemy. Especially, the urgent and important data should be preferentially delivered in time. Thus, we proposed a priority MAC protocol based on CSMA/CA with Binary Exponential Back-off for tactical wireless networks. This MAC protocol suggested a PCW(Prioritized Contention Window) with differentiated back-off time by priority and a RBR(Repetitive Back-off Reset) to reset the remaining back-off time. The results showed that this proposed MAC has higher performance than those of DCF(Distributed Coordination Function) in the transmission success rate and the number of control packet transmission by reducing the packet collision. Thus, it produced more effective power consumption. In comparison with DCF, this proposed protocol is more suitable in high-traffic network.

Structural Analysis for Newly Installed Blade Antenna of Rotorcraft (신규 블레이드 안테나 장착을 위한 노후 회전익 항공기 구조 해석 연구)

  • Yu, Jeong-O;Kim, Jae-Yong;Choi, Hang-Suk
    • Journal of Aerospace System Engineering
    • /
    • v.15 no.5
    • /
    • pp.106-112
    • /
    • 2021
  • In this study, we performed a design and structural analysis of a blade-shaped antenna installation on the rear fuselage of a rotary wing aircraft operated by the military. When the structure is damaged while the aircraft is in operation, it is separated from the aircraft main structure and may collide with the rotor or blades to cause the aircraft to crash. Therefore, structural safety for the modified structure must be secured. The design requirement for the newly installed modified part were established, and the load condition was constructed by applying the load that may occur in the aircraft after the modification. Structure safety for the modified structure was secured by performing structure analysis. To analysis stress and deformation of aircraft structure, we developed finite element model and verified it by using hand calculation method. We confirmed the safety of the modified structure through the final structural integrity analysis.

A Study on Legal Issues between the Application of Blockchain Technology and Deletion and the Third Party Supply of Personal Information (블록체인 기술 적용과 개인정보 삭제 및 제3자 제공의 법적 문제에 관한 연구)

  • Choi, Yong-hyuk;Kwon, Hun-yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1607-1621
    • /
    • 2018
  • The financial industry, which guarantees a credible transaction and can not permit forgery of its transaction information, has hitherto adhered to a traditional centralized ledger management method. However, the blockchain technology has a decentralization which has been regarded as unsafe for the time being, and the more reliable transaction agreement and data integrity are guaranteed The world's financial industry and the IT world is causing the wave. Nevertheless, the inherent characteristics of the blockchain, such as the irreversibility of block information within a blockchain and the sharing of blocks between blockchain participants, can not avoid conflicts with the privacy laws. The purpose of this study is to investigate the problems related to deletion and the third party supply of personal information by focusing on these characteristics of the blockchain and to suggest the technical alternatives of the applicable blockchain and the improvement direction of the personal information protection law for using of blockchain technology.

US-China Hegemony Competition and Gray-Zone Conflict in the Post-Coronavirus Era: Response strategies of the Korean Navy and Coast Guard (포스트 코로나시대 미중 패권경쟁과 회색지대갈등: 한국 해군·해경의 대응전략)

  • Lee, Shin-wha;Pyo, Kwang-min
    • Maritime Security
    • /
    • v.1 no.1
    • /
    • pp.149-173
    • /
    • 2020
  • While the United States and other Western states are in trouble with COVID-19 crisis, China is continuing its aggressive ocean expansion with its Gray-zone strategy. The Gray-zone strategy, which China uses around the South China Sea, refers to a strategy that promotes a change in international politics by creating an unclear state, neither war or peace. China, which is trying to expand its influence across East Asia, will also try to project a Gray zone strategy on the Korean Peninsula. The possible scenarios are as follows: 1) South Korea is accidentally involved in a dispute in the South China Sea, 2) Military conflicts between South Korea and China is caused by illegal fishing of Chinese boats in Yellow Sea, 3) China tries to interfere with Socotra Rock, 4) Unlikely, but possible in the future that China induce the military conflicts between Korea and Japan on the Dokdo issue. In order to cope with these scenarios, Korea should prepare the following measures from a long-term perspective: the creation of an Asian maritime safety fleet, the integ rated operation of the navy and the coast guard in the framework of the national fleet, and strengthening the conflict control system for China's provocations.

  • PDF

Forecasting non-traditional security threats in Korea :by Republic of Korea Army collective intelligence platform operating result (미래 한반도의 비전통적 안보위협 예측 :육군의 집단지성 플랫폼 운영 결과를 중심으로)

  • Cho, Sang Keun;Jung, Min-Sub;Moon, Sang Jun;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.216-222
    • /
    • 2021
  • COVID-19 pandemic brings attentions to the nonmilitary and transnational non-traditonal security threats, as the scales of such damage by these threats are beyond expectation. The Republic of Korea Army tries to forecast non-traditional security threat which may be occurred in Korean peninsula by using collective intelligence platform. In coming years, climate change, social changes and technology development caused by the 4th industrial revolution will diversify non-traditional security threat. Considering urbanization, internet distribution rate, and geopolitical location where atmosphere from continent and ocean meet, Korea would may face the most lethal ones compared to those of other countries may face. Therefore, to predict such threats in pangovernment scale using collective intelligence platforms which embrace civil, public, military, industry, academy and research center is the most important than anything.

Development of Autonomous Logistics Transportation System using Raspberry Pi (라즈베리파이를 이용한 자율물류 운반 시스템 개발)

  • Kang, Young-Hoon;Park, Chang-Hyeon;Lee, Min-Woo;Kim, Da-Eun;Lee, Seung-Dae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.1
    • /
    • pp.125-132
    • /
    • 2022
  • In this paper, we presented a cart which can automatically transport loads to the distribution center of the appointed indoor place, based on Raspberry pi 4. It can recognize the obstacles by using the ultrasonic sensors so that it prevents the collision and takes a detour. Further, we entered the direction control code in the RFID. It has installed at important points such as the intersections of the destinations, so that if the RFID reader of the cart senses the RFID, the cart would stop or change the direction. After the transportation, if the load cell(weight sensor) recognizes that the baggage is unloaded, the cart returns to the initial point and would be retrieved. Therefore, we embodied the transportation cart which reduces the use of manpower and solves the problems conveniently across the transportation strategies.

Prediction of Oil Outflows from Damaged Ships using CFD Simulations (손상 선박의 기름 유출량 예측을 위한 CFD 시뮬레이션)

  • Moon, Yo-Seop;Park, Il-Ryong;Kim, Je-In;Suh, Seong-Bu;Lee, Seung-Guk;Choi, Hyuek-Jin;Hong, Sa-Young
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.2
    • /
    • pp.394-405
    • /
    • 2022
  • This paper presents the numerical estimation results of oil outflows from damaged single-hull and double-hull ships by using computational fluid dynamics (CFD) simulations. A CFD method for multi-phase flow analysis was used, and the effects of numerical parameters on oil flows was investigated. Numerical simulations were conducted to predict the changes in oil outflows under various damage conditions owing to grounding or collision accidents and verified through available experimental results. The present numerical results showed a good agreement with the experimental results according to the geometrical characteristics of single and double hulls. In particular, the oil outflows from double hulls accompanying complex interactions between water and oil were reasonably predicted a shown in the experiment. This study established a reliable CFD technique necessary for estimating the oil outflows of damaged ships.

A Study on Korea's Countermeasures Through the Analysis of Cyberattack Cases in the Russia-Ukraine War (러시아-우크라이나 전쟁에서의 사이버공격 사례 분석을 통한 한국의 대응 방안에 관한 연구)

  • Lee, Hyungdong;Yoon, Joonhee;Lee, Doeggyu;Shin, Yongtae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.10
    • /
    • pp.353-362
    • /
    • 2022
  • The Russian-Ukraine war is accompanied by a military armed conflict and cyberattacks are in progress. As Russia designated Korea as an unfriendly country, there is an urgent need to prepare countermeasures as the risk of cyberattacks on Korea has also increased. Accordingly, impact of 19 cyberattack cases were analyzed by their type, and characteristics and implications were derived by examining them from five perspectives, including resource mobilization and technological progress. Through this, a total of seven measures were suggested as countermeasures for the Korean government, including strengthening multilateral cooperation with value-sharing countries, securing cyberattack capabilities and strengthening defense systems, and preparing plans to connect with foreign security companies. The results of this study can be used to establish the Korean government's cybersecurity policy.