• Title/Summary/Keyword: Command&Control

Search Result 1,396, Processing Time 0.029 seconds

Handling Deflection Limit in Open-Loop-Onset-Point PIO Analysis (Open-Loop-Onset-Point PIO 해석의 변위한계)

  • Park, Sang-Hyuk
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.38 no.2
    • /
    • pp.135-140
    • /
    • 2010
  • A new treatment is proposed to handle a deflection limit in the open-loop-onset-point (OLOP), which is commonly used in the prediction of pilot in-the-loop oscillation (PIO) due to a rate saturation. The new approach is motivated by the frequency response of a stand-alone actuator in that, unlike the suggestion by the original OLOP procedure, the rate limit onset is not delayed to a higher frequency by a deflection limit. Indeed, if a feedback control loop is closed, the rate limit onset can be shifted to a lower frequency since the controller tends to react with larger commands when deflection limited. The amplitude of the command at this onset frequency is combined with the deflection limit to estimate the associated gain reduction in the open-loop-onset-point in the final step of the OLOP process. The comparison of the new approach with the previous method reveals that an inaccurate optimism which can occur in the previous method is corrected by the proposed treatment.

Simulator Design and Performance Analysis of Link-K Based Relative Navigation System (한국형전술데이터링크(Link-K) 기반 상대항법 시스템의 시뮬레이터 설계 및 성능분석)

  • Lee, Ju Hyun;Lee, Jin Hyuk;Choi, Heon Ho;Choi, Hyogi;Park, Chansik;Lee, Sang Jeong;Lee, Seung Chan
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.6
    • /
    • pp.528-538
    • /
    • 2016
  • In this paper, an extend kalman filter based relative navigation algorithm is proposed for Link-K based relative navigation. Link-K is a tactical data link system for joint operation capability upgrade of ROK forces. Link-K is inter-operable with Link-16 and transmit and received information of operations and target. In Link-K communication channel, PPLI message including transmitter position and TOA measurement can be used for relative navigation. Therefore Link-K based relative navigation system can be operated. In this paper, software based simulations were carried out for operational feasibility test and performance verification as error factors of proposed Link-K based relative navigation system.

ROK Navy's Response to China's Naval Modernization: Based on Command, Control, Capability, and Capacity Analysis Framework (중국 해군 현대화에 대한 한국 해군의 대응 방안 : 지휘, 통제, 능력, 수량 분석을 중심으로)

  • Oh, Dongkeon
    • Strategy21
    • /
    • s.45
    • /
    • pp.188-211
    • /
    • 2019
  • 중국 해군의 성장은 동아시아의 안보환경 변화에 지대한 영향을 미치고 있으며, 한국 해군 또한 그 영향에서 벗어날 수 없는 실정이다. 대한민국은 중국과 지리적으로 맞닿아 있으며, 현재 불법 중국어선 및 이어도 문제 등 중국과의 수많은 해양갈등을 겪고 있는 상황으로, 이에 대한 적절한 대응을 위해서 한국 해군은 중국 해군의 현대화에 대한 대응을 준비해야만 한다. 본고는 중국과 한국의 해군력을 로버트 토마스 전 미 해군 중장이 제시한 지휘, 통제, 능력, 수량의 네 가지 측면에서 분석 및 비교하였다. 중국 해군은 적의 접근을 원해에서부터 차단하는 것을 목표로 하고(지휘), 그에 걸맞게 C4I 능력을 확충해나가고 있으며(통제), 전력투사. 수중/수상전, 해상재보급 역량을 늘려가고(능력), 최근 4년간 세계 대다수 해군의 총 톤수를 능가하는 수준의 함정건조 추세를 보이고 있다(수량). 한국 해군은 90년대 이후 "대양해군"을 목표로 해왔으며(지휘) 아덴만까지 실시간으로 통제 가능한 뛰어난 C4I 능력을 갖추었으나(통제), 아직 대양해군에 걸맞는 능력 및 전력을 구비하였다고 보기는 어렵다. 한국 해군이 상기 네 가지 측면에서 중국 해군을 따라잡는 것은 거의 불가능에 가깝다. 중국은 GDP의 2% 이내에서 국방비를 책정함에도 매년 GDP의 2.7%를 국방비에 투자하는 한국 국방비의 6배를 상회하며, 이 격차는 계속 커져가는 추세이다. 따라서, 대한민국 해군은 첫째, 잠수함 등 비대칭 전력 확보에 주력하고 방공/대잠능력 등 방어력을 향상시켜야 하며, 둘째, 관련국과의 긴밀한 협력을 통해 동아시아 및 서태평양 지역에서의 해양안보 안정화를 위해 노력해야한다. ADMM+3 등 다자 안보의 틀 안에서 역내 해양의 안정을 꾀할 수 있도록 한국 해군은 정책적 노력을 경주해야할 것이다.

The University Gusdance System using the Alexa (Alexa를 이용한 대학안내 시스템)

  • Kim, Tae Jin;Kim, Dong Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2061-2066
    • /
    • 2017
  • The voice recognition technology is to recognize the voice of an user and execute the command. Recently, the voice recognition is evolving to the artificial intelligence voice recognition by adding the scheme of the natural language processing. The AI voice recognition is exploited to control the IoT devices or provide the information, such as the news or the wether. The University Information which is one of fields serviced by the information provider is mainly presented on the web. However, since too much information are presented on the web, it is difficult for an user to find efficiently the specific information which the user want to know. In this paper, we design and implement the university guidance system to recognize the user voice searching the information and provide the result using the voice. To do this, we classify the university data and design the lambda function to provide the data.

A study of algorithm for non-streaming synchronized data processing (비스트리밍 동기화 데이터 처리를 위한 알고리즘 연구)

  • Moon, Gwon-Jae;Yoo, Ji-Sang;Bang, Gun;Choi, Jin-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.9A
    • /
    • pp.746-753
    • /
    • 2003
  • In this paper, we propose an efficient algorithm for non-streaming synchronized data processing based on ATSC-DASE in terrestrial digital data broadcasting services. Non-streaming synchronized data is encapsulated in DSM-CC sections with PTS(presentation time stamp) values associated with A/V and it is transmitted in a form of MPEG-2 TS(transport stream). At the receiver, the transmitted A/V data are processed by PC based set-top box(STB) in real-time, and the transmitted non-streaming synchronized data is also stored at the STB and is displayed at right time by the proposed algorithm. To verity the proper operation of the proposed algorithm, we make a scenario for non-streaming synchronized data by XML, and finally we are able to display it properly by using declarative application(DA) browser.

Study of the experimentation methodology for the counter fire operations by using discrete event simulation (이산사건 시뮬레이션을 활용한 대화력전 전투실험 방법론 연구)

  • Kim, Hyungkwon;Kim, Hyokyung;Kim, Youngho
    • Journal of the Korea Society for Simulation
    • /
    • v.25 no.2
    • /
    • pp.41-49
    • /
    • 2016
  • Counter Fire Operations can be characterized as having a system of systems that key features include situational awareness, command and control systems and highly responsive strike achieved by precision weapons. Current modeling methodology cannot provide an appropriate methodology for a system of systems and utilizes modeling and simulation tools to implement analytic options which can be time consuming and expensive. We explain developing methodology and tools for the effectiveness analysis of the counter fire operations under Network Centric Warfare Environment and suggest how to support a efficient decision making with the methodology and tools. Theater Counter Fire Operations tools consist of Enemy block, ISR block, C2 block and Shooter block. For the convenience of using by domain expert or non simulation expert, it is composed of the environments that each parameter and algorithm easily can be altered by user.

Strategy for the Development of Innovative Clean Technology in Korea (국내 미래청정기술 개발을 위한 전략)

  • Kim, Young Dae;Sim, Sang Jun;Lee, Joong Ki;Choi, Guang Jin;Park, Tae-Jin;Cho, Young Sang
    • Clean Technology
    • /
    • v.3 no.1
    • /
    • pp.9-26
    • /
    • 1997
  • The recent movement toward the better environment urges the shift of pollution prevention strategy from traditional "command/control" and "end-of-pipe" technologies to clean technologies. Development of Clean Technology, which makes products without creating pollutions, is a way to solve Environmental problems fundamentally. The main objective of this study is to define the long-term strategy to develope "Innovative Clean Technology". "Innovative Clean Technology" is an active way of solving the environmental problems arising from industrial activities. It aims to find ways either to make products without creating pollution, to produce environmentally benign end-products, or else to recover and re-use the materials which have hitherto considered waste.

  • PDF

Information and Communications Technology in the Field of Public Security: Crime Prevention and Response System (치안분야의 정보통신기술 활용방안 연구 - 빅데이터기반 치안수요분석과 대응체계를 중심으로 -)

  • Kim, Yeon Soo
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.23-32
    • /
    • 2016
  • Rapid advances in information and communications technology are new challenges and also opportunities for the police. For the purpose of identifying its implications, this study reviews utilization cases of information and communications technology in the field of public security in South Korea and other countries. As theoretical basis for utilization of information and communications technology, this study introduces intelligence-led policing, predictive policing and evidence-based policing. Also, utilization of big-data based crime analysis and crime prediction technology, as well as advancement of information and communications system and command and control technology of the police, are discussed. Based on the identified implications in this study, the following proposals are made. They are (1) procuring basic data, (2) creating an integrated database, (3) increasing utilization of policy decision-makers, (4) exchange and cooperation between related institutions, (5) training professional analyzers, (6) establishing legal basis and practical guidelines for an integrated database.

A Scalable Video Coding(SVC) and Balanced Selection Algorithm based P2P Streaming Technique for Efficient Military Video Information Transmission (효율적인 국방 영상정보 전송을 위한 확장비디오코딩(SVC) 및 균형선택 알고리즘 기반의 피투피(P2P) 비디오 스트리밍 기법 연구)

  • Shin, Kyuyong;Kim, Kyoung Min;Lee, Jongkwan
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.87-96
    • /
    • 2019
  • Recently, with the rapid development of video equipment and technology, tremendous video information is produced and utilized in military domain to acquire battlefield information or for effective command control. Note that the video playback devices currently used in the military domain ranges from low-performance tactical multi-functional terminals (TMFT) to high-performance video servers and the networks where the video information is transmitted also range from the low speed tactical information and communication network (TICN) to ultra-high speed defense broadband converged networks such as M-BcN. Therefore, there is a need for an efficient streaming technique that can efficiently transmit defense video information in heterogeneous communication equipment and network environments. To solve the problem, this paper proposes a Scalable Video Coding (SVC) and balanced selection algorithm based Peer-to-Peer (P2P) streaming technique and the feasibility of the proposed technique is verified by simulations. The simulation results based on our BitTorrent simulator show that the proposed balanced selection scheme outperforms the sequential or rarest selection algorithm.

SaaS-based construction process transfer and Safety Management System (SaaS기반의 건설공정전송 및 안전관리 시스템)

  • Kim, Eui-ryong;Jung, Soo-Sung;Kim, Young-Gon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.735-737
    • /
    • 2015
  • In this paper, SaaS (Software as a Service) based transport and construction process safety management systems by utilizing the construction work process management and safety management and schedule, and results for various types of construction process, achieved through high-speed wireless Internet access by applying to ensure a systematic means for safety and can quickly and accurately manage all made within the process control system. The operator should be indicated by using a smart phone to work as a supervisor report the current status and results of the operation. Also be reported to the supervisor immediately in an emergency situation and there is no vibration occurs over a period of time the smartphone is to check the danger to the operator. If the commissioner is directed to specific business processes that establish and verify the results obtained and the result is satisfied by presenting the part down the measures insufficient command of the field workers risk situations. In the case of software (server) to store all the data relating to the operation member in charge of management and security.

  • PDF