• Title/Summary/Keyword: Defense Science and Technology

Search Result 1,830, Processing Time 0.029 seconds

DMRUT-MCDS: Discovery Relationships in the Cyber-Physical Integrated Network

  • Lu, Hongliang;Cao, Jiannong;Zhu, Weiping;Jiao, Xianlong;Lv, Shaohe;Wang, Xiaodong
    • Journal of Communications and Networks
    • /
    • v.17 no.6
    • /
    • pp.558-567
    • /
    • 2015
  • In recent years, we have seen a proliferation of mobile-network-enabled smart objects, such as smart-phones and smart-watches, that form a cyber-physical integrated network to connect the cyber and physical worlds through the capabilities of sensing, communicating, and computing. Discovery of the relationship between smart objects is a critical and nontrivial task in cyber-physical integrated network applications. Aiming to find the most stable relationship in the heterogeneous and dynamic cyber-physical network, we propose a distributed and efficient relationship-discovery algorithm, called dynamically maximizing remaining unchanged time with minimum connected dominant set (DMRUT-MCDS) for constructing a backbone with the smallest scale infrastructure. In our proposed algorithm, the impact of the duration of the relationship is considered in order to balance the size and sustain time of the infrastructure. The performance of our algorithm is studied through extensive simulations and the results show that DMRUT-MCDS performs well in different distribution networks.

A Study on the Improvement of Defense Codification System (국방보급목록제도 개선방안에 관한 연구)

  • 최석철;서호일
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.3 no.2
    • /
    • pp.189-203
    • /
    • 2000
  • This paper deals with the improvement of defense codification system for the items of defense supplies. We review other country's codification systems, their concept and trend of the systems for development, and then apply the ideas to our defense codification system. The proposal for improvement of defense codification system consists of three parts. The first one is the aspect of policy, the second one is the aspect of organization, and the last one is the aspect of operation. This paper will be contributed to the development of national codification system, and defense logistics management.

  • PDF

The Architecture Model for Defense Systems Test Works based on Systems Engineering (SE기반 무기체계 시험업무 아키텍처 모델 연구)

  • Taeheum Na;Dongeun Heo;Youngmin Kim;Jooyeoun Lee
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.2
    • /
    • pp.203-212
    • /
    • 2024
  • This paper describes the establishment of defense systems test works architecture model for the efficient operation of an expanded test organization and the provision of standardized test services after the integration of proving grounds in ADD. The system engineering vee model is applied to the defense system test works to define the project management model and the unit-test management model. In order to establish the defense systems test works architecture model, the process flow of test works, artifacts by life cycle, and interrelations between regulations and test works are explained, and Integrated Test Information System for implementation of architecture model is discussed. Through the defense systems test works architecture model presented in this study, it will contribute to quickly responding to the test requirements of complex and diverse defense systems, efficiently managing projects, and providing standardized test services.

Topology-based Workflow Scheduling in Commercial Clouds

  • Ji, Haoran;Bao, Weidong;Zhu, Xiaomin;Xiao, Wenhua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4311-4330
    • /
    • 2015
  • Cloud computing has become a new paradigm by enabling on-demand provisioning of applications, platforms or computing resources for clients. Workflow scheduling has always been treated as one of the most challenging problems in clouds. Commercial clouds have been widely used in scientific research, such as biology, astronomy and weather forecasting. Certainly, it is very important for a cloud service provider to pursue the profits for the commercial essence of clouds. This is also significantly important for the case of providing services to workflow tasks. In this paper, we address the issues of workflow scheduling in commercial clouds. This work takes the communication into account, which has always been ignored. And then, a topology-based workflow-scheduling algorithm named Resource Auction Algorithm (REAL) is proposed in the objective of getting more profits. The algorithm gives a good performance on searching for the optimum schedule for a sample workflow. Also, we find that there exists a certain resource amount, which gets the most profits to help us get more enthusiasm for further developing the research. Experimental results demonstrate that the analysis of the strategies for most profits is reasonable, and REAL gives a good performance on efficiently getting an optimized scheme with low computing complexity.

A Study on the Investigation and Analysis of Defense Information Technical Standard Application (국방정보기술표준 적용실태 조사 분석에 관한 연구)

  • Kim, Hye-Lyeong;Choi, Sang-Yeong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.3
    • /
    • pp.325-332
    • /
    • 2009
  • This study is aimed to investigate the application of DITA(Defense Information Technical stAndard) on the weapon information systems and defense management information systems in order not only to update the current DITA version 4.0, but also to develop SoS(System of systems) interoperability policy in the armed forces of Korea. For this study, 18 information systems were considered, their development products(System/Sub-system Specification, Technical architecture View, System Interoperability Test and Evaluation products) were reviewed and analysed. As a result of the investigation and analysis, it was found that the 44% of the DITA standard profiles were used for the development of the defense information systems. We conclude that DITA should be updated to be a minimal set so that all the defense information systems should be DITA-compliant. And it should be reviewed periodically to reflect the new information technology.

CDN Scalability Improvement using a Moderate Peer-assisted Method

  • Shi, Peichang;Wang, Huaimin;Yin, Hao;Ding, Bo;Wang, Tianzuo;Wang, Miao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.3
    • /
    • pp.954-972
    • /
    • 2012
  • Content Delivery Networks (CDN) server loads that fluctuant necessitate CDN to improve its service scalability especially when the peak load exceeds its service capacity. The peer assisted scheme is widely used in improving CDN scalability. However, CDN operators do not want to lose profit by overusing it, which may lead to the CDN resource utilization reduced. Therefore, improving CDN scalability moderately and guarantying CDN resource utilization maximized is necessary. However, when and how to use the peer-assisted scheme to achieve such improvement remains a great challenge. In this paper, we propose a new method called Dynamic Moderate Peer-assisted Method (DMPM), which uses time series analysis to predict and decide when and how many server loads needs to offload. A novel peer-assisted mechanism based on the prediction designed, which can maximize the profit of the CDN operators without influencing scalability. Extensive evaluations based on an actual CDN load traces have shown the effectiveness of DMPM.

A Methodology for SDLC of AI-based Defense Information System (AI 기반 국방정보시스템 개발 생명주기 단계별 보안 활동 수행 방안)

  • Gyu-do Park;Young-ran Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.577-589
    • /
    • 2023
  • Ministry of National Defense plans to harness AI as a key technology to bolster overall defense capability for cultivation of an advanced strong military based on science and technology based on Defense Innovation 4.0 Plan. However, security threats due to the characteristics of AI can be a real threat to AI-based defense information system. In order to solve them, systematic security activities must be carried out from the development stage. This paper proposes security activities and considerations that must be carried out at each stage of AI-based defense information system. Through this, It is expected to contribute to preventing security threats caused by the application of AI technology to the defense field and securing the safety and reliability of defense information system.

A Study on Transmission Signal Design Using DAC to Reduce IQ Imbalance of Satellite-Mounted Synthetic Aperture Radar Transmitter (위성 탑재 영상레이다 송신기의 IQ 불균형 저감을 위한 DAC를 이용한 송신 신호 설계 기법에 관한 연구)

  • Lee, Young-Bok;Kang, Tae-Woong;Lee, Hyon-Ik
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.2
    • /
    • pp.144-150
    • /
    • 2022
  • The on-board processor of satellite synthetic aperture radar(SAR) generates transmission signal by digital signal processing, converts it into an analog signal. At this time, the transmission signal generated from the baseband requires the frequency modulation to convert it to the high-frequency band in order to improve the stability. General frequency modulation method using local oscillator(LO) causes IQ imbalance due to phase error/magnitude error and these error reduce performance of SAR. To generate transmission signal without phase/magnitude error, this paper suggests design method of the frequency modulation method using digital to analog converter(DAC) at on-board SAR. For design, this paper analyzes the characteristic of DAC mode and uses pre-compensation filter. To analyze the proposed method performance, performance index are compared with IQ imbalance signals. This method is suitable for on-board SAR using fast sampling DAC and has the advantage of being able to solve IQ imbalances.

Unit Mission Based Mission Planning and Automatic Mission Management for Robots (단위임무 기반 로봇의 임무 계획 및 자동화 임무 관리 방법론)

  • Lee, Ho-Joo;Park, Won-Ik;Kim, Do-Jong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.1
    • /
    • pp.1-7
    • /
    • 2014
  • In this paper, it is suggested a method of mission planning and management for robots based on the unit mission. In order to make robots execute given missions continuously as time goes by, a new concept for planning the mission which is composed of one or more unit missions and an automatic mission management scheme are developed. For managing robot's missions in real time, six management methods are devised as well in order to cope with the mismatches, which occur frequently during the mission execution, as to the initial plan. Without the operator's involvement, any mismatch can be adjusted automatically by applying one of the mission management methods. The suggested concept of mission planning and mission management methods based on the unit mission are partially realized in the Dog-Horse robot system and it is checked that it can be a viable one for developing effective robot operation systems.

A Study on Establishment of Criteria to Identify the Defense Industrial Technology of Diesel Engine for Military Vehicle (군용차량을 위한 디젤기관의 방산기술 식별기준 정립에 관한 연구)

  • Yoon, Heung-Soo;Ryu, Yeon-Seung
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.3
    • /
    • pp.177-184
    • /
    • 2019
  • The Defense Technology Security Act was enacted in 2015 to protect the defense industrial technology from being duplicated or interfering technologies being developed, which prevents its value and utility from deterioration and prevents inappropriate export. Defense industrial technology refers to technology that should be protected for national security among the national defense science and technology related to the defense industry. However, technical identification criteria of identification and management system of protection technology are not regulated. Therefore, in this study, through the Delphi survey, diesel engine core technology identification criteria related to the high efficiency internal combustion engine propulsion technology among the 141 defense industrial technologies is established to improve the identification and management system of the technology to be protected among the defense industrial technology protection system. As a result of the study, operational operability, durability, safety, sequencing and modularization were established as diesel engine core technology identification criteria.