• Title/Summary/Keyword: Command&Control

Search Result 1,396, Processing Time 0.024 seconds

An Assessment of Combat Effectiveness for C4I System Considering Network Effect (네트워크 효과를 고려한 C4I 체계 전투력 상승효과 평가)

  • Jung, Whan-Sik;Lee, Jae-Yeong;Kim, Yong-Heup
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.33 no.2
    • /
    • pp.23-32
    • /
    • 2010
  • In this paper, we proposed the modified method of Metcalfe's law that is "Modfied law" in evaluating the network power for the measurement of combat effectiveness in C4I system. It is applied to JFOS-K (Joint Fire Operating System-Korea) C4I system that can connect KJCCS (Korea Joint Command and Control System) of Korea armed forces with JADOCS (Joint Automated Deep Operations Coordination System) of U.S. armed forces and achieve sensor to shooter system in real time in JCS (Joint Chiefs of Staff) level. The result of combat effectiveness using Modified law is compared to the one by C2 theory and found that both is similar. This study is meaningful because we improved the description level of reality in calculation of combat effectiveness in C4I system.

Comparative Analysis of Regulatory Compliance Issues in Korean and American Fisheries (한.미 어업관리제도의 규제순응에 관한 비교 연구)

  • Lee, Jung-Sam;Ryu, Jeong-Gon;Nam, Jong-Oh;Kim, Dae-Young
    • The Journal of Fisheries Business Administration
    • /
    • v.39 no.2
    • /
    • pp.1-23
    • /
    • 2008
  • This study presents a comparative analysis of enforcement and regulatory compliance issues in Korean and American fisheries. The comparison involves characterizing factors which affect regulatory compliance. The study also suggests policy directions and strategies by characteristics of factors suitable to Korean fisheries circumstances in order to induce voluntary compliance from fishers and to make compliance friendly environment for the fishers. In detail, this study has 3 steps as follows. First, this study characterizes factors influencing compliance and non - compliance caused by various reasons and categorizes these factors by considering theories for fisheries regulatory compliance. Major categories of compliance factors consist of fisheries resources, users(fishers), and the government. Each category is composed of several factors and sub - factors by characteristics. Second, this study seeks to diagnose problems and limitations from the regulatory compliance in Korean and US' fisheries by analyzing the current status of the compliance in both countries. The comparative analysis between two countries highlights the problems and limitations of each country's regulatory compliance and leads to implications for Korean fisheries. Third, this study suggests policy directions and strategies suitable to Korean regulatory compliance environment through detailed understanding of U.S.' fisheries regulatory compliance. The suggested strategies are based on the concept of voluntary compliance and compliance - friendly environment, not command and control regulations. Furthermore, this study provides policy suggestions for Korean fisheries regulatory enforcement and compliance issues.

  • PDF

Isolated Word Recognition with the E-MIND II Neurocomputer (E-MIND II를 이용한 고립 단어 인식 시스템의 설계)

  • Kim, Joon-Woo;Jeong, Hong;Kim, Myeong-Won
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.32B no.11
    • /
    • pp.1527-1535
    • /
    • 1995
  • This paper introduces an isolated word recognition system realized on a neurocomputer called E-MIND II, which is a 2-D torus wavefront array processor consisting of 256 DNP IIs. The DNP II is an all digital VLSI unit processor for the EMIND II featuring the emulation capability of more than thousands of neurons, the 40 MHz clock speed, and the on-chip learning. Built by these PEs in 2-D toroidal mesh architecture, the E- MIND II can be accelerated over 2 Gcps computation speed. In this light, the advantages of the E-MIND II in its capability of computing speed, scalability, computer interface, and learning are especially suitable for real time application such as speech recognition. We show how to map a TDNN structure on this array and how to code the learning and recognition algorithms for a user independent isolated word recognition. Through hardware simulation, we show that recognition rate of this system is about 97% for 30 command words for a robot control.

  • PDF

Study on Outbound Traffic Monitoring with Bloom Filter (블룸필터를 이용한 아웃바운드 트래픽 모니터링 방안 연구)

  • Kang, Seong-Jung;Kim, Hyoung-Joong
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.327-334
    • /
    • 2018
  • When a PC is infected with a malicious code, it communicates with the control and command (C&C) server and, by the attacker's instructions, spreads to the internal network and acquires information. The company focuses on preventing attacks from the outside in advance, but malicious codes aiming at APT attacks are infiltrated into the inside somehow. In order to prevent the spread of the damage, it is necessary to perform internal monitoring to detect a PC that is infected with malicious code and attempts to communicate with the C&C server. In this paper, a destination IP monitoring method is proposed in this paper using Bloom filter to quickly and effectively check whether the destination IP of many packets is in the blacklist.

Spectrum Policy and Strategic Plan in the United States of America (미국의 전파 정책 및 전략 계획)

  • Kim, Chang-Joo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.8
    • /
    • pp.853-860
    • /
    • 2012
  • In this paper, We shed light on radio spectrum policy and strategic planning of the United States of America and draw some conclusions. First of all, as the radio technology evolves with time, paradigm shift from command & control to market-based approach and spectrum commons is reviewed. Strategic spectrum planning of USA is also analyzed and some suggestions are drawn. In particular, USA plan for developing dynamic spectrum access(DSA) technologies and implementation of the test-bed for the DSA spectrum sharing is discussed, which improves the spectral utilization. Finally We deal with spectrum re-farming issue for mobile broadband and implicative points based on the National Broadband Plan.

Development of Eye-Tracking System Using Dual Machine Learning Structure (이중 기계학습 구조를 이용한 안구이동추적 기술개발)

  • Gang, Gyeong Woo;Min, Chul Hong;Kim, Tae Seon
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.7
    • /
    • pp.1111-1116
    • /
    • 2017
  • In this paper, we developed bio-signal based eye tracking system using electrooculogram (EOG) and electromyogram (EMG) which measured simultaneously from same electrodes. In this system, eye gazing position can be estimated using EOG signal and we can use EMG signal at the same time for additional command control interface. For EOG signal processing, PLA algorithms are applied to reduce processing complexity but still it can guarantee less than 0.2 seconds of reaction delay time. Also, we developed dual machine learning structure and it showed robust and enhanced tracking performances. Compare to conventional EOG based eye tracking system, developed system requires relatively light hardware system specification with only two skin contact electrodes on both sides of temples and it has advantages on application to mobile equipments or wearable devices. Developed system can provide a different UX for consumers and especially it would be helpful to disabled persons with application to orthotics for those of quadriplegia or communication tools for those of intellectual disabilities.

Enhancement Plan for Overall Disaster Prevention System (종합방재시스템의 고도화 방안)

  • Hwang, Ji-Wan;Moon, Sang-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.1081-1084
    • /
    • 2005
  • In Korea, overall disaster prevention system or 119 emergency rescue system has been established to protect life and fortune of citizens. This system supports command at control operation, emergency 119 caller location indicator, automatic formation of fire troops and dispatch, and emergency management. To do this, various new information technologies such as CIS, telematics, CTI and TTS are applied to implement the system. In the future, however, it is not impossible to prevent a large scale disasters caused by world climate environment change and complication of city culture using the current system. In this paper, we propose enhancement plan for overall disaster prevention system to solve this problem.

  • PDF

Sliding Mode Controller Design Considering Weight (가중치를 고려한 슬라이딩 모드 제어기 설계)

  • 임동균;서병설
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.4 no.3
    • /
    • pp.223-230
    • /
    • 1999
  • A conventional sliding mode control approach is often impractical or difficult when it is applied to high order process b because the number of tuning parameters in the sliding mode controller increases with the order of the plant. C Camacho(l996) proposed a design method of a fixed structure sliding mode controller based on a first order plus dead t time approximation to the higher-order process. But, his method has such problems as chattering, over‘shoot, and c command following due to the Taylor the approximation en‘ors for the time delay term of the first order model. In this p paper, a new design technique for a sliding mode controller based on the modified Taylor approximation considered a w weight is developed to improve the Camacho's problems.

  • PDF

Hybrid Fuzzy Controller for DTC of Induction Motor Drive (유도전동기 드라이브의 DTC를 위한 하이브리드 퍼지제어기)

  • Ko, Jae-Sub;Choi, Jung-Sik;Chung, Dong-Hwa
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.25 no.5
    • /
    • pp.22-33
    • /
    • 2011
  • An induction motor operated with a conventional direct self controller(DSC) shows a sluggish response during startup and under changes of torque command. Fuzzy logic controller(FLC) is used in conjection with DSC to minimize these problems. A FLC chooses the switching states based on a set of fuzzy variables. Flux position, error in flux magnitude and error in torque are used as fuzzy state variables. Fuzzy rules are determinated by observing the vector diagram of flux and currents. This paper proposes hybrid fuzzy controller for direct torque control(DTC) of induction motor drives. The speed controller is based on adaptive fuzzy learning controller(AFLC), which provide high dynamics performances both in transient and steady state response. Flux position, error in flux magnitude and error in torque are used as FLC state variables. The speed is estimated with model reference adaptive system(MRAS) based on artificial neural network(ANN) trained on-line by a back-propagation algorithm. This paper is controlled speed using hybrid fuzzy controller(HFC) and estimation of speed using ANN. The performance of the proposed induction motor drive with HFC controller and ANN is verified by analysis results at various operation conditions.

An Intrusion Detection Technique Suitable for TICN (전술정보통신체계(TICN)에 적합한 침입탐지 기법)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.6
    • /
    • pp.1097-1106
    • /
    • 2011
  • Tactical Information Communication Network(TICN), a concept-type integrated Military Communication system that enables precise command control and decision making, is designed to advance into high speed, large capacity, long distance wireless relay transmission. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. Ad-hoc network works properly only if the participating nodes cooperate in routing and packet forwarding. However, if selfish nodes not forwarding packets of other nodes and malicious nodes making the false accusation are in the network, it is faced to many threats. Therefore, detection and management of these misbehaving nodes is necessary to make confident in Ad-hoc networks. To solve this problem, we propose an efficient intrusion detection technique to detect and manage those two types of attacks. The simulation-based performance analysis shows that our approach is highly effective and can reliably detect a multitude of misbehaving node.