• Title/Summary/Keyword: Command Center

Search Result 238, Processing Time 0.025 seconds

A Command of French and anti-style used in Lee Sang's poetic work (이상(Lee Sang)의 시작품에 구사되는 프랑스어와 반문체)

  • Lee, Byung Soo
    • Cross-Cultural Studies
    • /
    • v.49
    • /
    • pp.229-248
    • /
    • 2017
  • This paper is a study on French of Lee Sang's poems called metaphysical scandals in Korean poetry. Is poetic language he used a common poetic word or a non-poetic word in French? What kind of harmony do words and sentences composed of French have with Korean, Chinese character, and non-poetic word? Based on these questions, we analyzed a command of French, that is symbolic, geometrical, and pictorial French as well as repetitive and parallel constitution used in form of words and sentences. In Lee Sang's poems, as a result, the use of French is seen as a mixture of non-poetic word. It shows characteristics that reject traditional native language and the creation of poetry. In his poems, French is also an important factor of avant-garde poetic material and experimental creation technique. In his poems, French is used as a special tool to express internal conflicts of the poet. Lee Sang showed experimental style that could not be found in modern Korean literature by using signifier and signifed that french language has.

Scientific Preservation of the Relics left by the Fallen Heroes of the Korean War: Focusing on the Local Relics Kept by the Ground Operations Command (6·25전쟁 전사자 유품의 과학적 보존: 지상작전사령부 소장 지역유품 중심으로)

  • Park, Min-Seon;Oh, Seung-Jun;Lee, Ho-Yeon;Wi, Koang-Chul
    • Journal of Conservation Science
    • /
    • v.38 no.2
    • /
    • pp.144-153
    • /
    • 2022
  • This study conducted scientific analysis and preservation treatment for the local 7 relics (depurator bottle, eagle patten button, rank insignia, mess tin, M1 Grand-gun cleaning tool kit, Carbine bullet, cartridge) of the fallen of Korean War excavated through the MND Agency for KIA Recovery & Identification that are possessed in the exhibition hall of the Ground Operations Command. FT-IR analysis results show that remainder of depurator bottle is assumed to play a role of water and food purifier during the war for its spectrum similar to Trisodium phosphate, and inscription carved on the cartridge that is hard to observe with naked eyes was also confirmed through 3D digital shooting method. This study also established directivity of preservation treatment of relics for stable treatment by carrying out a survey of conditions based on the microscope and visual observation. The result is expected to be used as basic data for establishment of future directivity of preservation treatment for a variety of war relics.

A Methodology for Making Military Surveillance System to be Intelligent Applied by AI Model (AI모델을 적용한 군 경계체계 지능화 방안)

  • Changhee Han;Halim Ku;Pokki Park
    • Journal of Internet Computing and Services
    • /
    • v.24 no.4
    • /
    • pp.57-64
    • /
    • 2023
  • The ROK military faces a significant challenge in its vigilance mission due to demographic problems, particularly the current aging population and population cliff. This study demonstrates the crucial role of the 4th industrial revolution and its core artificial intelligence algorithm in maximizing work efficiency within the Command&Control room by mechanizing simple tasks. To achieve a fully developed military surveillance system, we have chosen multi-object tracking (MOT) technology as an essential artificial intelligence component, aligning with our goal of an intelligent and automated surveillance system. Additionally, we have prioritized data visualization and user interface to ensure system accessibility and efficiency. These complementary elements come together to form a cohesive software application. The CCTV video data for this study was collected from the CCTV cameras installed at the 1st and 2nd main gates of the 00 unit, with the cooperation by Command&Control room. Experimental results indicate that an intelligent and automated surveillance system enables the delivery of more information to the operators in the room. However, it is important to acknowledge the limitations of the developed software system in this study. By highlighting these limitations, we can present the future direction for the development of military surveillance systems.

Evaluation method for interoperability of weapon systems applying natural language processing techniques (자연어처리 기법을 적용한 무기체계의 상호운용성 평가방법)

  • Yong-Gyun Kim;Dong-Hyen Lee
    • Journal of The Korean Institute of Defense Technology
    • /
    • v.5 no.3
    • /
    • pp.8-17
    • /
    • 2023
  • The current weapon system is operated as a complex weapon system with various standards and protocols applied, so there is a risk of failure in smooth information exchange during combined and joint operations on the battlefield. The interoperability of weapon systems to carry out precise strikes on key targets through rapid situational judgment between weapon systems is a key element in the conduct of war. Since the Korean military went into service, there has been a need to change the configuration and improve performance of a large number of software and hardware, but there is no verification system for the impact on interoperability, and there are no related test tools and facilities. In addition, during combined and joint training, errors frequently occur during use after arbitrarily changing the detailed operation method and software of the weapon/power support system. Therefore, periodic verification of interoperability between weapon systems is necessary. To solve this problem, rather than having people schedule an evaluation period and conduct the evaluation once, AI should continuously evaluate the interoperability between weapons and power support systems 24 hours a day to advance warfighting capabilities. To solve these problems, To this end, preliminary research was conducted to improve defense interoperability capabilities by applying natural language processing techniques (①Word2Vec model, ②FastText model, ③Swivel model) (using published algorithms and source code). Based on the results of this experiment, we would like to present a methodology (automated evaluation of interoperability requirements evaluation / level measurement through natural language processing model) to implement an automated defense interoperability evaluation tool without relying on humans.

  • PDF

A Review and Its Implications on School-based Crisis Response Team in the U.S. (미국의 학교기반 위기대응팀에 대한 고찰과 시사점)

  • Lee, Dong Hun;Jeong, Bo Young;Kang, Eun Jin;Myung, So Yeon
    • Korean Journal of Comparative Education
    • /
    • v.27 no.1
    • /
    • pp.1-28
    • /
    • 2017
  • In this study, the school crisis response system and intervention are examined in the U.S. by reviewing Crisis Response Team(CRT) to give a direction for establishing and improving the school crisis response system in Korea. To do this, a literature review has been conducted focusing on domestic and foreign literature on the school - based crisis response system about the U.S. and Korea. The characteristics of the school-based CRT in the U.S. are as follows. First, in the U.S., the organizational structure and financial support for school - based crisis response has been stated by law so that the roles and responsibilities of region, district, school have been clearly defined. Second, in the event of a school crisis, the school have been shared the role of professional crisis response according to the Incident Command System and coordinates communication smoothly between each area of society through cooperation with CRT. Third, CRT prevents burnout by showing flexibility in team composition so that CRT members are not tired or overwhelmed by a crisis event, and focuses on strengthening the crisis capability of the school itself through cooperation between the school and CRT. Fourth, the school-based CRT in the U.S. conducts a step by step crisis intervention from prevention to prolonged post management. Based on these results, implications for the establishment and improvement of school-based crisis response system in Korea are discussed.

Appendiceal Visualization on 2-mSv CT vs. Conventional-Dose CT in Adolescents and Young Adults with Suspected Appendicitis: An Analysis of Large Pragmatic Randomized Trial Data

  • Jungheum Cho;Youngjune Kim;Seungjae Lee;Hooney Daniel Min;Yousun Ko;Choong Guen Chee;Hae Young Kim;Ji Hoon Park;Kyoung Ho Lee;LOCAT Group
    • Korean Journal of Radiology
    • /
    • v.23 no.4
    • /
    • pp.413-425
    • /
    • 2022
  • Objective: We compared appendiceal visualization on 2-mSv CT vs. conventional-dose CT (median 7 mSv) in adolescents and young adults and analyzed the undesirable clinical and diagnostic outcomes that followed appendiceal nonvisualization. Materials and Methods: A total of 3074 patients aged 15-44 years (mean ± standard deviation, 28 ± 9 years; 1672 female) from 20 hospitals were randomized to the 2-mSv CT or conventional-dose CT group (1535 vs. 1539) from December 2013 through August 2016. A total of 161 radiologists from 20 institutions prospectively rated appendiceal visualization (grade 0, not identified; grade 1, unsure or partly visualized; and grade 2, clearly and entirely visualized) and the presence of appendicitis in these patients. The final diagnosis was based on CT imaging and surgical, pathologic, and clinical findings. We analyzed undesirable clinical or diagnostic outcomes, such as negative appendectomy, perforated appendicitis, more extensive than simple appendectomy, delay in patient management, or incorrect CT diagnosis, which followed appendiceal nonvisualization (defined as grade 0 or 1) and compared the outcomes between the two groups. Results: In the 2-mSv CT and conventional-dose CT groups, appendiceal visualization was rated as grade 0 in 41 (2.7%) and 18 (1.2%) patients, respectively; grade 1 in 181 (11.8%) and 81 (5.3%) patients, respectively; and grade 2 in 1304 (85.0%) and 1421 (92.3%) patients, respectively (p < 0.001). Overall, undesirable outcomes were rare in both groups. Compared to the conventional-dose CT group, the 2-mSv CT group had slightly higher rates of perforated appendicitis (1.1% [17] vs. 0.5% [7], p = 0.06) and false-negative diagnoses (0.4% [6] vs. 0.0% [0], p = 0.01) following appendiceal nonvisualization. Otherwise, these two groups were comparable. Conclusion: The use of 2-mSv CT instead of conventional-dose CT impairs appendiceal visualization in more patients. However, appendiceal nonvisualization on 2-mSv CT rarely leads to undesirable clinical or diagnostic outcomes.

Home Appliance Position Recognition through Hand Pointing Command for Arbitrary Camera Location (손 지시 명령을 통한 임의의 카메라 배치에서의 가전기기 위치 인식)

  • Yang, Seung-Eun;Do, Jun-Hyeong;Jang, Hyo-Young;Jung, Jin-Woo;Park, Kwang-Hyun;Bien, Zeung-Nam
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.362-367
    • /
    • 2006
  • 지능형 주거공간에서 손 지시 명령을 통하여 가전기기를 선택하거나 로봇에게 이동하여야 하는 장소를 알려 주기 위해, 기존의 시스템은 선택되는 대상 기기의 3 차원 절대 위치를 미리 알고 있어야 한다. 또한 카메라 위치가 변동되었을 경우, 카메라의 위치를 절대좌표계 기준으로 새롭게 측정해야 하는 불편함이 있다. 이를 해결하기 위해 본 논문에서는 팬/틸트 모듈을 가진 두 대의 USB 카메라를 임의의 위치에 배치하더라도, 두 번의 손 지시만으로 선택 대상이 되는 기기의 3 차원 위치를 파악하고 이를 동작시키는 방법을 다룬다. 제안하는 방법에서는 두 대의 카메라 간의 상대 좌표계를 형성하기 위해 각 카메라에 표식을 부착한다. 각 카메라에서 다른 카메라의 표식을 관찰하면 카메라 간의 거리 및 각도를 구할 수 있기 때문에, 하나의 카메라를 기준으로 3 차원 절대 좌표계를 자동으로 설정할 수 있다. 또한, 두 대의 카메라로 사용자의 얼굴과 손을 검출하면 얻어진 기준 좌표계에 대해 얼굴과 손의 3 차원 위치를 계산하고, 두 지점을 연결하는 방향 벡터를 구함으로써 사용자가 손으로 지시하는 방향을 찾는다. 따라서, 카메라를 임의의 위치에 두더라도 사용자의 손 지시 동작만으로 대상체의 차원 위치를 파악할 수 있게 된다. 개발된 시스템의 유용성을 검증하기 위해 각 가전기기의 위치를 제안한 방법으로 구하고 실제 위치와의 오차를 분석하였다. 제안한 방법은 두 대의 USB 카메라와 일반 PC 또는 마이크로 프로세서만으로 구현할 수 있기 때문에 비용이 적게 들고 실시간 처리가 가능하며 사용자의 환경에서 편리성을 높이는 등 많은 장점을 가진다.

  • PDF

Virtual Force(VF)-based Disaster Monitoring Network Using Multiple UAVs (대규모 공중무인기를 이용한 가상력 기반 재난 감시 네트워크)

  • Chun, Jeongmyong;Yoon, Seokhoon;Kim, Daeyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.97-108
    • /
    • 2016
  • In this paper, we consider a cooperative monitoring network, which consists of a large number of UAVs, in order to promptly detect event in a disaster area. A command center may not be able to control each UAV individually due to resource constraints. Therefore, UAVs need to autonomously construct a mobile monitoring network in order to maximize monitoring coverage and to adapt the network formation according to environment changes in the disaster area. To that end, we propose multiple UAVs-based cooperative monitoring schemes that uses virtual forces. In this monitoring scheme, an effective monitoring is enabled by extending monitoring coverage using each UAV's circle movements. The UAVs-based monitoring network can also be splitted or merged in order to increase the monitoring effectiveness. Through simulations, we show that the proposed scheme can effectively monitor a large area and achieve a high event detection ratio.

Implementation of Hand-Gesture Interface to manipulate a 3D Object of Augmented Reality (증강현실의 3D 객체 조작을 위한 핸드-제스쳐 인터페이스 구현)

  • Jang, Myeong-Soo;Lee, Woo-Beom
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.117-123
    • /
    • 2016
  • A hand-gesture interface to manipulate a 3D object of augmented reality is implemented by recognizing the user hand-gesture in this paper. Proposed method extracts the hand region from real image, and creates augmented object by hand marker recognized user hand-gesture. Also, 3D object manipulation corresponding to user hand-gesture is performed by analyzing a hand region ratio, a numbet of finger and a variation ratio of hand region center. In order to evaluate the performance of the our proposed method, after making a 3D object by using the OpenGL library, all processing tasks are implemented by using the Intel OpenCV library and C++ language. As a result, the proposed method showed the average 90% recognition ratio by the user command-modes successfully.

Mobility Prediction Based Autonomous Data Link Connectivity Maintenance Using Unmanned Vehicles in a Tactical Mobile Ad-Hoc Network (전술 모바일 애드혹 네트워크에서 무인기를 이용하는 이동 예측 기반의 데이터 링크 연결 유지 알고리즘)

  • Le, Duc Van;Yoon, Seokhoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.1
    • /
    • pp.34-45
    • /
    • 2013
  • Due to its self-configuring nature, the tactical mobile ad hoc network is used for communications between tactical units and the command and control center (CCC) in battlefields, where communication infrastructure is not available. However, when a tactical unit moves far away from the CCC or there are geographical constraints, the data link between two communicating nodes can be broken, which results in an invalid data route from the tactical units to CCC. In order to address this problem, in this paper we propose a hierarchical connectivity maintenance scheme, namely ADLCoM (Autonomous Data Link Connectivity Maintenance). In ADLCoM, each tactical unit has one or more GW (gateway), which checks the status of data links between tactical units. If there is a possibility of link breakage, GWs request ground or aerial unmanned vehicles to become a relay for the data link. The simulation results, based on tactical scenarios, show that the proposed scheme can significantly improve the network performance with respect to data delivery ratio.