• Title/Summary/Keyword: Key Target System

Search Result 348, Processing Time 0.028 seconds

A Network-based Optimization Model for Effective Target Selection (핵심 노드 선정을 위한 네트워크 기반 최적화 모델)

  • Jinho Lee;Kihyun Lee
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.4
    • /
    • pp.53-62
    • /
    • 2023
  • Effects-Based Operations (EBO) refers to a process for achieving strategic goals by focusing on effects rather than attrition-based destruction. For a successful implementation of EBO, identifying key nodes in an adversary network is crucial in the process of EBO. In this study, we suggest a network-based approach that combines network centrality and optimization to select the most influential nodes. First, we analyze the adversary's network structure to identify the node influence using degree and betweenness centrality. Degree centrality refers to the extent of direct links of a node to other nodes, and betweenness centrality refers to the extent to which a node lies between the paths connecting other nodes of a network together. Based on the centrality results, we then suggest an optimization model in which we minimize the sum of the main effects of the adversary by identifying the most influential nodes under the dynamic nature of the adversary network structure. Our results show that key node identification based on our optimization model outperforms simple centrality-based node identification in terms of decreasing the entire network value. We expect that these results can provide insight not only to military field for selecting key targets, but also to other multidisciplinary areas in identifying key nodes when they are interacting to each other in a network.

Target identification for visual tracking

  • Lee, Joon-Woong;Yun, Joo-Seop;Kweon, In-So
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1996.10a
    • /
    • pp.145-148
    • /
    • 1996
  • In moving object tracking based on the visual sensory feedback, a prerequisite is to determine which feature or which object is to be tracked and then the feature or the object identification precedes the tracking. In this paper, we focus on the object identification not image feature identification. The target identification is realized by finding out corresponding line segments to the hypothesized model segments of the target. The key idea is the combination of the Mahalanobis distance with the geometrica relationship between model segments and extracted line segments. We demonstrate the robustness and feasibility of the proposed target identification algorithm by a moving vehicle identification and tracking in the video traffic surveillance system over images of a road scene.

  • PDF

Implementation of Real-time Wireless Remote Control System Based on Public Key Infrastructure (PKI를 기반으로 한 실시간 무선 원격제어 시스템의 구현)

  • 이문구
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.3
    • /
    • pp.71-79
    • /
    • 2003
  • Existing web-based system management software solutions show some limitations in time and space. Moreover, hey possess such as shortcomings unreliable error message announcements and difficulties with real-time assistance supports and emergency measures. In order to solve these deficiencies, Wireless Remote Control System(W-RCS) was designed and implemented. W-RCS is able to manage and monitor remote systems by using mobile communication devices for instantaneous control. The implementation of W-RCS leads to these security problems as well as solutions to aforementioned issues with existing web-based system management software solutions. Therefore, this paper has focused on the security matters related to W-RCS. The security functions based on public key infrastructure include mobile device user authentication and target system access control. The W-RCS allows real-time user authentication, increases the flexibility of resource administrators and mobile device non, and provides not only uninterrupted services, but also safe mobile office environments.

A Multi-level Perception Security Model Using Virtualization

  • Lou, Rui;Jiang, Liehui;Chang, Rui;Wang, Yisen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5588-5613
    • /
    • 2018
  • Virtualization technology has been widely applied in the area of computer security research that provides a new method for system protection. It has been a hotspot in system security research at present. Virtualization technology brings new risk as well as progress to computer operating system (OS). A multi-level perception security model using virtualization is proposed to deal with the problems of over-simplification of risk models, unreliable assumption of secure virtual machine monitor (VMM) and insufficient integration with virtualization technology in security design. Adopting the enhanced isolation mechanism of address space, the security perception units can be protected from risk environment. Based on parallel perceiving by the secure domain possessing with the same privilege level as VMM, a mechanism is established to ensure the security of VMM. In addition, a special pathway is set up to strengthen the ability of information interaction in the light of making reverse use of the method of covert channel. The evaluation results show that the proposed model is able to obtain the valuable risk information of system while ensuring the integrity of security perception units, and it can effectively identify the abnormal state of target system without significantly increasing the extra overhead.

Pretension process control based on cable force observation values for prestressed space grid structures

  • Zhou, Zhen;Meng, Shao-Ping;Wu, Jing
    • Structural Engineering and Mechanics
    • /
    • v.34 no.6
    • /
    • pp.739-753
    • /
    • 2010
  • Pointing to the design requirement of prestressed space grid structure being the target cable force, the pretension scheme decision analysis method is studied when there's great difference between structural actual state and the analytical model. Based on recursive formulation of cable forces, the simulative recursive system for pretension process is established from the systematic viewpoint, including four kinds of parameters, i.e., system initial value (structural initial state), system input value (tensioning control force scheme), system state parameters (influence matrix of cable forces), system output value (pretension accomplishment). The system controllability depends on the system state parameters. Based on cable force observation values, the influence matrix for system state parameters can be calculated, making the system controllable. Next, the pretension scheme decision method based on cable force observation values can be formed on the basis of iterative calculation for recursive system. In this way, the tensioning control force scheme that can meet the design requirement when next cyclic supplemental tension finished is obtained. Engineering example analysis results show that the proposed method in this paper can reduce a lot of cyclic tensioning work and meanwhile the design requirement can be met.

Improvement of Biotope-Area-Ratio-Indicator and Appraisal System Applicable to Environmental Impact Assessment Projects (환경영향평가 대상사업에 적용가능한 생태면적률 지표 평가체계 개선)

  • Lee, Gwan-Gyu;Lee, Sang-Hyuk;Kim, Gyung-Ho;Lee, Jung-Hwan
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.14 no.5
    • /
    • pp.113-125
    • /
    • 2011
  • Since the government of Korea (Ministry of Environment, MOE) introduced the policy applying 'Biotope-Area-Ratio-Indicator (BARI)' to huge residential land developments which Environmental Impact Assessment (EIA) should be performed, MOE has come to have the necessity to apply the indicator concretely at the stage of Prior Environment Review System (PERS) and EIA in various types of large scale land development projects. This study was conducted with the aim of supporting the application of BARI and related decision making in various other types of EIA projects as well as residential development projects through remodeling the system to apply the indicator of the past. Through the analysis of the problems in applying the past BARI and experimental appraisals to 11 types of EIA projects, the results and implications as follows were drawn. First, it's possible to extend the range of applications of BARI, which has been applied to only residential land development project, to all kinds of projects with area-typed land use pattern out of environmental impact assessment target projects. Second, it's also possible to set a target value into which regional characteristics and differences among locational properties are reflected. In addition, it's come to be able to differentially apply the target value of BARI according to the condition of the existing site. Third, it's improved to be able to suggest a macroscopic target value at the stage of PERS and to set detailed target values in each detailed land use at the stage of EIA. The key point underlies inducing methodology to determine target values to secure more permeable land coverage ratio for detailed land use patterns at the stage of EIA by making it possible to calculate BARI of the present land cover condition of the EIA target projects.

A Study on the Flat Surface Zone of the Flexible Disk Grinding System (유연성 디스크 연삭가공 평면가공구간에 대한 연구)

  • Yoo, Song-Min
    • Transactions of the Korean Society of Machine Tool Engineers
    • /
    • v.16 no.6
    • /
    • pp.125-132
    • /
    • 2007
  • Inherent dynamic interaction between flexible disk and workpiece creates partially non-flat surface profile. A flat zone was defined using minimum depth of engagement. Several key parameters were defined to explain the characteristics of the zone. Process conditions including disk rotation speed, initial depth of cut and feed speed were varied to produce product profile database. Correlation between key factors was examined to find the characteristic dependencies. Trends of key parameters were displayed and explained. Higher flat zone ratio was observed for lower depth of cut and higher disk rotation speed. Ratio of minimum depth of cut against target depth of cut increased for higher feed speed and disk rotation speed but was insensitive to the depth of cut variation. The process transition was visualized by continuously displaying instantaneous orientation of the deflected disk and the location of key parameters were clearly marked for comparison.

Heat source control intelligent system for heat treatment process

  • Lee, JeongHoon;Cho, InHee
    • International journal of advanced smart convergence
    • /
    • v.11 no.4
    • /
    • pp.28-40
    • /
    • 2022
  • Although precise temperature control in the heat treatment process is a key factor in process reliability, there are many cases where there is no separate heat source control optimization system in the field. To solve this problem, the program monitors the temperature data according to the heat source change through sensor communication in a recursive method based on multiple variables that affect the process, and the target heat source value and the actual heat treatment heat source to match the internal air temperature and material temperature. A control optimization system was constructed. Through this study, the error rate between the target temperature and the atmosphere (material surface) temperature of around 10.7% with the existing heat source control method was improved to an improved result of around 0.1% using a process optimization algorithm and system.

A Study on Design and Fabrication of SRD Impulse Generator and Antenna for Ground Penetrating Radar System (지반투과 레이더 시스템을 위한 SRD 임펄스 발생기 및 안테나의 설계 및 제작에 관한 연구)

  • Kim, Hyoung-Jong;Shin, Suk-Woo;Choi, Gil-Wong;Choi, Jin-Joo;Shin, Shang-Youal
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.3
    • /
    • pp.509-516
    • /
    • 2011
  • In this paper, a ground penetrating radar(GPR) system is implemented for landmine detection. The performance of the GPR system is associated with the characteristics of local soil and buried target. The choice of the center frequency and the bandwidth of the GPR system are the key factors in the GPR system design. To detect a small and shallow target, the higher frequencies are needed for high depth resolution. We have been designed, fabricated and tested a new impulse generator using step recovery diodes. The measured impulse response has an amplitude of 6.2V and a pulse width of 250ps. The implemented GPR system has been tested real environmental conditions and has proved its ability to detect a small buried target.

A Study on the Tracking Algorithm for BSD Detection of Smart Vehicles (스마트 자동차의 BSD 검지를 위한 추적알고리즘에 관한 연구)

  • Kim Wantae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.2
    • /
    • pp.47-55
    • /
    • 2023
  • Recently, Sensor technologies are emerging to prevent traffic accidents and support safe driving in complex environments where human perception may be limited. The UWS is a technology that uses an ultrasonic sensor to detect objects at short distances. While it has the advantage of being simple to use, it also has the disadvantage of having a limited detection distance. The LDWS, on the other hand, is a technology that uses front image processing to detect lane departure and ensure the safety of the driving path. However, it may not be sufficient for determining the driving environment around the vehicle. To overcome these limitations, a system that utilizes FMCW radar is being used. The BSD radar system using FMCW continuously emits signals while driving, and the emitted signals bounce off nearby objects and return to the radar. The key technologies involved in designing the BSD radar system are tracking algorithms for detecting the surrounding situation of the vehicle. This paper presents a tracking algorithm for designing a BSD radar system, while explaining the principles of FMCW radar technology and signal types. Additionally, this paper presents the target tracking procedure and target filter to design an accurate tracking system and performance is verified through simulation.