• Title/Summary/Keyword: Command&Control

Search Result 1,396, Processing Time 0.035 seconds

Development of a Reference-Pulse Type 3-Axis Simultaneously Controlled PC-NC Milling System (Reference-Pulse 방식 3축 동시제어 PC-NC 밀링 시스템 개발에 관한 연구)

  • Yang, Min-Yang;Hong, Won-Pyo
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.16 no.11
    • /
    • pp.197-203
    • /
    • 1999
  • Increasing demands on precision machining have necessitated the tool to move not only position error as small as possible, but also with smoothly varying feedrates. Because of the lack of accurate and efficient algorithms for generation of 3-dimensional lines and circles, a full accomlishment for available machine tool resolution is generally unavailable. In this paper, a reference-pulse type 3-axis PC_NC milling system is developed for the precision machining of complex shapes in 3-dimensional space. Three AC servomotors are used as the actuator instead of the hand wheel to operate a 3-axis milling machine under the same mechanical structure. A PC is used to handle the control signal calculation for various types of motion command. To achieve the synchronous 3-axis motion, a real-time reference-pulse 3-dimensional linear and circular interpolator based on the intersection criteria is developed in software. The performance test via computer simulation and actual machining have shown that the PC-NC milling system is useful for the machining of arbitrary lines and circles in 3-dimensional space.

  • PDF

Feature Selection with PCA based on DNS Query for Malicious Domain Classification (비정상도메인 분류를 위한 DNS 쿼리 기반의 주성분 분석을 이용한 성분추출)

  • Lim, Sun-Hee;Cho, Jaeik;Kim, Jong-Hyun;Lee, Byung Gil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.1
    • /
    • pp.55-60
    • /
    • 2012
  • Recent botnets are widely using the DNS services at the connection of C&C server in order to evade botnet's detection. It is necessary to study on DNS analysis in order to counteract anomaly-based technique using the DNS. This paper studies collection of DNS traffic for experimental data and supervised learning for DNS traffic-based malicious domain classification such as query of domain name corresponding to C&C server from zombies. Especially, this paper would aim to determine significant features of DNS-based classification system for malicious domain extraction by the Principal Component Analysis(PCA).

The real-time Traffic Monitoring System Design for the in-service of ATM Network (ATM망의 서비스 회선에 대한 실시간 트래픽 모니터링 시스템 설계)

  • 정승국;이영훈
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.3
    • /
    • pp.115-121
    • /
    • 2002
  • This paper discussed to design system to overcome time, place and service limitation in the case of extracting traffic on active service in the ATM network. There are several specification in this system : for a remote control function, a real-time traffic extraction from ATM link on service without affect in-service, and an O&M(Operating and Maintenance) cost down effect. This paper include the requirement, module structure, operating characteristics and command for the developing function. This product installed at the KT's telephone office. And we have tested the stability, reliability and functionality. As the result, it was verified that this system commercially is abel to use without especial problem. Hereafter, we are improving module structure for the cost down.

  • PDF

Research on Cyber IPB Visualization Method based on BGP Archive Data for Cyber Situation Awareness

  • Youn, Jaepil;Oh, Haengrok;Kang, Jiwon;Shin, Dongkyoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.749-766
    • /
    • 2021
  • Cyber powers around the world are conducting cyber information-gathering activities in cyberspace, a global domain within the Internet-based information environment. Accordingly, it is imperative to obtain the latest information through the cyber intelligence preparation of the battlefield (IPB) process to prepare for future cyber operations. Research utilizing the cyber battlefield visualization method for effective cyber IPB and situation awareness aims to minimize uncertainty in the cyber battlefield and enable command control and determination by commanders. This paper designed architecture by classifying cyberspace into a physical, logical network layer and cyber persona layer to visualize the cyber battlefield using BGP archive data, which is comprised of BGP connection information data of routers around the world. To implement the architecture, BGP archive data was analyzed and pre-processed, and cyberspace was implemented in the form of a Di-Graph. Information products that can be obtained through visualization were classified for each layer of the cyberspace, and a visualization method was proposed for performing cyber IPB. Through this, we analyzed actual North Korea's BGP and OSINT data to implement North Korea's cyber battlefield centered on the Internet network in the form of a prototype. In the future, we will implement a prototype architecture based on Elastic Stack.

Design and Implementation of Simulation Tool for Cyber Battle Damage Assessment Using MOCE(Measure of Cyber Effectiveness) (사이버 효과 지표를 활용한 사이버 전투 피해평가 시뮬레이션 도구의 설계 및 구현)

  • Park, JinHo;Kim, DuHoe;Shin, DongIl;Shin, DongKyoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.465-472
    • /
    • 2019
  • In recent years, the cyber attack has become a universal phenomenon, and the attacks in cyberspace are regarded as a kind of war, cyber-warfare. However, cyber-warfare is difficult to identify the damage caused by the attack. In order to effectively evaluate the damage to the attack that may occur in the cyber-warfare, this paper describes the damage evaluation simulation of the cyber-warfare based on DEVSim++, which can calculate the damage to the cyber attack using the MOCE (Measure of Cyber Effectiveness). Also, in order to help the commander in the cyber Command&Control phase, the number of victims by attack classification is expressed in the form of Venn diagram.

Construct of Electronics Load System using the Multi-level Interiver Converter (다중전류레벨 인터리버 컨버터를 이용한 전자부하 시스템 구성)

  • Moon, Hyeon-Cheol;Song, Kwang-Cheol;Lee, Chang-Ho;Park, Seong-Mi;Park, Sung-Jun
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.23 no.6_2
    • /
    • pp.989-998
    • /
    • 2020
  • Recently, demands for large-capacity electronic loads are increasing in various industries such as a reliability test for the performance of a DC power supply device or a dummy-load for improving the stability of an independent microgrid to be actively built in the future. The electronic load required in these various fields requires an operation such as a continuously variable resistance load while minimizing the switching harmonic component generated in the electric load current in order to reduce the influence of interference from the load peripheral device. Electronic loads require a system that minimizes switching current ripple for load control. Therefore, in this paper, we propose a three-level module converter structure to reduce the current ripple of an electronic load, and a multilevel interleaved power converter topology to reduce the current ripple. The validity of the proposed electronic load, 3-level 6 interleaver converter, was verified by simulation and experiment. In addition, the user's convenience was provided by applying the emotional command curve interface method.

The Comparative Study on the Satisfaction of the Physical Therapy facilities in the front Military hospitals and Divisions

  • Park, Giwan;Jung, Jihye;Lee, Seungwon
    • Physical Therapy Rehabilitation Science
    • /
    • v.10 no.2
    • /
    • pp.217-224
    • /
    • 2021
  • Objective: This study is about the physical therapy facilities and environmental and service satisfaction of patients visiting in the front military hospitals and divisions. Design: Survey study Methods: Prior to this survey, 28 users of the front division and military hospital were surveyed in advance to verify the survey through reliability analysis. For this survey, 1,300 questionnaires were distributed to seven frontline divisions and three military hospitals, of which 578 military hospitals and 479 divisions were collected. Among them, 1,042 pieces of data were used for the analysis, excluding 15 questionnaires that exceeded the research period of the division. Analysis methods used Cronbach-α and multiple regression for mean comparison analysis, factor analysis for validation, and reliability verification to verify differences between groups. Results: As a result of the satisfaction analysis, the division's stage satisfaction was higher than that of military hospitals, and as a result of analyzing the satisfaction items by sector, accessibility, re-visit doctors, and professionalism accounted for a large portion in the field of physical therapy services. As a result of a regression analysis, the factors that affect the satisfaction of physical therapy had the greatest impact on facility and environmental satisfaction, and expertise in physical therapy services. Conclusions: In the future, it will be necessary to improve the comfort of the physical therapy room and the expertise of physical therapy in order to improve the satisfaction level of physical therapy at military medical facilities.

A Study on the Factors Affecting the User Satisfaction and Continuous Use Intention of the Improved Army Tactical Command Information System (ATCIS 성능개량체계 만족 및 지속사용 의도에 미치는 영향요인)

  • Lee, Tae Bok;Baek, Seung Nyoung
    • The Journal of Information Systems
    • /
    • v.31 no.1
    • /
    • pp.1-24
    • /
    • 2022
  • Purpose The purpose of this study is to investigate the factors that affect the user satisfaction and continuous use intention of the improved ATCIS in the Korean Army. Design/methodology/approach Based on the various theories in relation to IT continuance, user satisfaction was identified as the main factor with regard to the continuous use intention of the improved ATCIS. In addition, computer self-efficacy, education-training, and system quality were hypothesized as antecedent variables to user satisfaction, and information security stress was set as a moderating variable for these relationships. Findings Survey results show that computer self-efficacy, education and training, and system quality had a positive effect on user satisfaction, and information security stress was found to moderate these relationships. The effects of computer self-efficacy and education-training on user satisfaction were higher in the group with low information security stress. However, the relationship between system quality and user satisfaction was higher in the group with high information security stress. User satisfaction is found to have a positive effect on the continuous use intention even with habit considered as a control variable.

A Study on the Weapon System Software Reliability Testing for the Joint Tactical Data Link System Project Case (한국형 합동 전술데이터링크체계의 소프트웨어 신뢰성 시험수행 방안에 관한 연구)

  • Song, Young-Joong;Lee, Youn-Jeong;Goo, Young-Hoon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.4
    • /
    • pp.663-670
    • /
    • 2022
  • This study presents the method for integrating the software assets acquired before the weapon system software reliability test was not formed in the weapon system software development and management manual through JTDLS Batch II case. This paper describes the problems for applying manual's direction to JTDLS Batch II project, and decisions and expected effects.

A Basic Study on the Selection of Required Operational Capability for Attack Drones of Army TIGER Units Using AHP Technique (AHP 기법을 이용한 Army TIGER 부대 공격용 드론의 작전요구성능 선정에 관한 기초 연구)

  • Jinho Lee;Seongjin Kwon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.26 no.2
    • /
    • pp.197-204
    • /
    • 2023
  • The importance of each warfighting function for Army TIGER unit attack drones is measured using the AHP technique. As a result, the importance of attack drones is high in the order of maneuver, firepower, intelligence, command/control, protection, and operation sustainment, but the importance of maneuver, firepower, and intelligence are almost similar. In addition, it is analyzed that attack drones capable of carrying out day and night missions by being equipped with an EO/IR sensor and being commanded/controlled in conjunction with the C4I system to eliminate threats with small bombs or aircraft collisions is needed. Finally, based on the results of this study, a virtual battle scenario for attack drones is proposed.