• Title/Summary/Keyword: ISR

Search Result 561, Processing Time 0.031 seconds

정보 융합체계 현황 분석

  • Jo, Dong-Rae;Choe, Jeung-Won;Ju, Jae-U
    • Defense and Technology
    • /
    • no.12 s.274
    • /
    • pp.46-53
    • /
    • 2001
  • 미래 전쟁에 대비하기 위하여, 미국은 합동참모본부의 Joint Vision 2020에서 정보에서의 우월성을 기초로 압도적인 기동, 정확한 공격, 집중된 군수지원, 전면적인 방어를 이룩하여 전체적인 우위전력 확보를 도모하여, 정보에서의 우월성 확보를 위해 $C^4ISR$(Command, Control, Communication and Computer, Intelligence, Surveillance, Reconnaissance)개념에 의한 통합체계의 구축을 목표로 제시하고 있다.

  • PDF

전군통합 정보체계 구축기법 필요(2)

  • O, Je-Sang
    • Defense and Technology
    • /
    • no.6 s.280
    • /
    • pp.50-63
    • /
    • 2002
  • 한국군도 지금시점에서는 선진국의 C4ISR AF 소요공학 기법 같은 것들을 도입하여 한국적 정보체계 구축 시 전군적 통합 정보체계가 건설될 수 있도록 상세한 수준의 정보화소요공학 연구 및 적용을 하여야할 시기가 되었다고 판단된다. 따라서 전군 통합 정보체계가 구축되어질 수 있도록 하기 위해서 사업 초기단계에서 정보체계의 사업관리자, 소요 제기자, 체계 분석자, 체계 개발자들에게 가장 중요하고 필수적인 소요제기기법인 전군 통합 정보기술 아키텍쳐 프레임워크(ITAF) 기법의 적용 필요성을 소개한다.

  • PDF

Design and Implementation of two phase Interrupt Service Routine for Real-Time Operating Systems (실시간 운영체제를 위한 2단계 인터럽트 서비스 루틴의 설계 및 구현)

  • 이재규;조문행;정명조;이철훈
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.160-162
    • /
    • 2004
  • 실시간 운영 체제(Real-Time Operating Systems)는 시스템 동작이 논리적 정확성뿐만 아니라 시간적 정확성에도 좌우되는 운영 체제이다. 시간 결정성(Time Determinism)을 지키기 위해서는 시스템에서 발생하는 모든 사건에 대해서 예측이 가능해야 한다. 시스템에서 발생하는 사건은 인터럽트에 의해 처리되는데, 이것은 비동기적인 사건의 발생을 CPU에게 알리는 하드웨어 메커니즘으로서 인터럽트 서비스 루틴(Interrupt Service Routine : ISR)을 통해서 인터럽트에서 처리해야 할 부분을 수행한다. 본 논문에서는 인터럽트의 처리를 인터럽트의 인지와 처리로 분리할 수 있도록 LISR과 HISR을 설계로 구현하였다.

  • PDF

정보 융합체계 현황 분석 (2)

  • Jo, Dong-Rae;Choe, Jeung-Won;Ju, Jae-U
    • Defense and Technology
    • /
    • no.1 s.275
    • /
    • pp.58-67
    • /
    • 2002
  • 미래 전쟁에 대비하기 위하여, 미국은 합동참모본부의 Joint Vision 2020에서 정보에서의 우월성을 기초로 압도적인 기동, 정확한 공격, 집중된 군수지원, 전면적인 방어를 이룩하여 전체적인 우위전력 확보를 도모하며, 정보에서의 우월성 확 보 를 위 해 $C^4ISR$(Command, Control, Communication and Computer, Intelligence, Surveillance, Reconnaissance) 개념에 의한 통합체계의 구축을 목표로 제시하고 있다.

  • PDF

Induction of systemic resistance in Panax ginseng against Phytophthora cactorum by native Bacillus amyloliquefaciens HK34

  • Lee, Byung Dae;Dutta, Swarnalee;Ryu, Hojin;Yoo, Sung-Je;Suh, Dong-Sang;Park, Kyungseok
    • Journal of Ginseng Research
    • /
    • v.39 no.3
    • /
    • pp.213-220
    • /
    • 2015
  • Background: Korean ginseng (Panax ginseng Meyer) is a perennial herb prone to various root diseases, with Phytophthora cactorum being considered one of the most dreaded pathogens. P. cactorum causes foliar blight and root rot. Although chemical pesticides are available for disease control, attention has been shifted to viable, eco-friendly, and cost-effective biological means such as plant growth-promoting rhizobacteria (PGPR) for control of diseases. Methods: Native Bacillus amyloliquefaciens strain HK34 was isolated from wild ginseng and assessed as a biological control agent for ginseng. Leaves from plants treated with HK34 were analyzed for induced systemic resistance (ISR) against P. cactorum in square plate assay. Treated plants were verified for differential expression of defense-related marker genes using quantitative reverse transcription polymerase chain reaction. Results: A total of 78 native rhizosphere bacilli from wild P. ginseng were isolated. One of the root-associated bacteria identified as B. amyloliquefaciens strain HK34 effectively induced resistance against P. cactorum when applied as soil drench once (99.1% disease control) and as a priming treatment two times in the early stages (83.9% disease control). A similar result was observed in the leaf samples of plants under field conditions, where the percentage of disease control was 85.6%. Significant upregulation of the genes PgPR10, PgPR5, and PgCAT in the leaves of plants treated with HK34 was observed against P. cactorum compared with untreated controls and only pathogen-treated plants. Conclusion: The results of this study indicate HK34 as a potential biocontrol agent eliciting ISR in ginseng against P. cactorum.

Evaluation of induced systemic resistance agent, Bacillus subtilis strain BAC02-4 against Magnaporthe grisea in rice in field

  • Hong, Yeon-Kyu;Lee, Bong-Choon;Han, Seong-Sook;Jung, Won-Kwon;Park, Jo-Im;Park, Sung-Tae;Kim, Soon-Chul
    • Proceedings of the Korean Society of Plant Pathology Conference
    • /
    • 2003.10a
    • /
    • pp.105.3-106
    • /
    • 2003
  • Bacillus subtilis strain BAC02-4 was tested for its ability induced systemic resistance(ISR) in rice against Magnaporthe grisea We extend these studies to investigate the biological induction of systemic resistance in rice following treatment with the inducer isolate BAC02-4 and naturally infested with Pyricularia oryzae. We also determine levels of ISR activity during the period between disease development and the onset of systemic resistance. Comparition of lesion number according to applied concentration of BAC02-4 to 'Nagdongbyeo' when naturally infested with the conidia of P. grisea. Results from the blast nusery trial using the 'Nagdongbyeo' showed very low rice blast severity with the inducer concentration of 10$\^$8/ cfu level. Considering the low level of treatment and untreated control were observed to have developed typical susceptible lesion type. Highest protection against the rice blast pathogen when applied three times with 5 days interval as root drench at 5 to 6 leaf stage before pathogen challenge. But higher dose of bacterial inducer produced a little stunted plants with less number lesions and delayed disease development. Diseased leaf area of treated with suspension of the isolate which gave about 80% of control efficacy at 20 days later comparable to that in noninfested, inducer-free soil.

  • PDF

Future Cyber Information Warfare (사이버 정보전 준비 해야)

  • 오제상
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.31-35
    • /
    • 2001
  • Currently if we are to make a thought to depend on our fast developing information technology, a future war is necessarily to be made a situation of a cyber information warfare. A attacker in the cyber information warfare is able to make attack a military or a civil information and communication system, especially if a attack of a hacker, a virus or a electromagnetic pulse bomb at a military C4ISR system is able to make a confusion or a interruption in military operations, they are available to attack as a real time with non restrictions of physical distance, time, weather and space. While a expenditure of carrying out the cyber information warfares is the lowest expenditure, a effect of carrying out the cyber information warfares is the greatest effect in side of a interruption of information, a confusion, a terror, a pillage and crime of the people. This paper is to introduce "weapons of cyber information warfares", "offence capability of cyber information warfares about several nations" and to propose "a cyber information warfare organization" or the future knowledge warfare. the future knowledge warfare.

  • PDF

Transfer Alignment Using Velocity Matching/Parameter Tuning and Its Performance and Observability Analysis (속도정합 및 매개변수 조정을 사용한 전달정렬의 성능 및 가관측성 분석)

  • Yang, Cheol-Kwan;Park, Ki-Young;Kim, Hyoung-Min;Shim, Duk-Sun
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.5
    • /
    • pp.389-394
    • /
    • 2015
  • This paper considers the transfer alignment in the inertial navigation system which has lever-arm and the time delay in the velocity measurement. We suggest a method to improve the performance of the velocity matching. First, we analyze the estimation performance of the velocity matching through the tuning of the two covariance matrices of process noise and measurement noise. Next we provide some maneuvering conditions of the vehicles to improve the estimation performance using the observability analysis. The analysis results are verified using the computer simulations, which show that cruise movements do not provide the azimuth estimation of the vehicles, while east or north accelerating movement can provide.

Study of the experimentation methodology for the counter fire operations by using discrete event simulation (이산사건 시뮬레이션을 활용한 대화력전 전투실험 방법론 연구)

  • Kim, Hyungkwon;Kim, Hyokyung;Kim, Youngho
    • Journal of the Korea Society for Simulation
    • /
    • v.25 no.2
    • /
    • pp.41-49
    • /
    • 2016
  • Counter Fire Operations can be characterized as having a system of systems that key features include situational awareness, command and control systems and highly responsive strike achieved by precision weapons. Current modeling methodology cannot provide an appropriate methodology for a system of systems and utilizes modeling and simulation tools to implement analytic options which can be time consuming and expensive. We explain developing methodology and tools for the effectiveness analysis of the counter fire operations under Network Centric Warfare Environment and suggest how to support a efficient decision making with the methodology and tools. Theater Counter Fire Operations tools consist of Enemy block, ISR block, C2 block and Shooter block. For the convenience of using by domain expert or non simulation expert, it is composed of the environments that each parameter and algorithm easily can be altered by user.

Design of the homomorphic encryption system for secure data management in the future battlefield environment (미래 전장환경에서 안전한 데이터 관리를 위한 준동형 시스템 설계)

  • Cha, HyunJong;Kim, JinMook;Ryou, HwangBin
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.51-56
    • /
    • 2014
  • Be expressed in network-centric warfare, mainly battlefield environment of the future. The purpose of the system for the war of the future, is to recognize the enemy before the enemy, and rapid decision-making, to hit accurately. For this reason, it is during the construction of the integrated system of C4ISR+PGM. In such an integrated system, it is necessary to further enhance the security aspects of the information. In particular, strengthening of security leads to a decrease of efficiency. Therefore, security and efficiency should be considered together. In this study, we provide a homomorphic encryption system that can be safely managed information environment on the battlefield of the future. The proposed method uses encryption technology of homomorphic that can be the arithmetic operations on encrypted state. It has changed from the state of the encryption. Therefore, the attacker can not know a decent information.