• Title/Summary/Keyword: Mass Exchange Network

Search Result 12, Processing Time 0.022 seconds

A Study on Data Recording and Play Method between Tactical Situations to Ensure Data Integrity with Data Link Processor Based on Multiple Data Links (다중데이터링크 기반에서 데이터링크 처리기와의 데이터 무결성 보장을 위한 전술상황전시기 간 데이터 기록 및 재생 방법 연구)

  • Lee, Hyunju;Jung, Eunmi;Lee, Sungwoo;Yeom, Jaegeol;Kim, Sangjun;Park, Jihyeon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.2
    • /
    • pp.13-25
    • /
    • 2017
  • Recently, the high performance of tactical situation display console and tactical data links are used to integrate the operational situations in accordance with information age and NCW (Network Centric Warfare). The tendency to maximize the efficiency of task execution has been developed by sharing information and the state of the battle quickly through complex and diverse information exchange. Tactical data link is a communication system that shares the platform with core components of weapons systems and battlefield situation between the command and control systems to perform a Network Centric Warfare and provides a wide range of tactical data required for decision-making and implementation.It provides the tactical information such as tactical information such as operational information, the identification of the peer, and the target location in real time or near real time in the battlefield situation, and it is operated for the exchange of mass tactical information between the intellectuals by providing common situation recognition and cooperation with joint operations. In this study, still image management, audio file management, tactical screen recording and playback using the storage and playback, NITF (National Imagery Transmission Format) message received from the displayer integrates the tactical situation in three dimensions according to multiple data link operation to suggest ways to ensure data integrity between the data link processor during the entire operation time.

A Basic Study on Connected Ship Navigation System

  • Choi, Wonjin;Jun, Seung-Hwan
    • Journal of Navigation and Port Research
    • /
    • v.44 no.2
    • /
    • pp.136-143
    • /
    • 2020
  • Maritime autonomous surface ships (MASS) has been developed over the years. But, there are many unresolved problems. To overcome these problems, this study proposes connected ship navigation system. The system comprises a slave ship and a master ship that leads the slave ship. To implement this system, communication network, route planning algorithms, and controllers are designed. The communication network is built using the transmission control protocol/Internet protocol (TCP/IP) socket communication method to exchange data between ships. The route planning algorithms calculate the course and distance of the slave ship using the middle latitude sailing method. Nomoto model is used as the mathematical model of the slave ship maneuvering motion. Then, the autoregressive with exogenous variables (ARX) model is used to estimate the parameters of Nomoto model. Based on the above model, the automatic steering controller is designed using a proportional-derivative (PD) control. Also, the speed controller is designed for the slave ship to maintain constant distance from the master ship. Sea experiments are conducted to verify the proposed system with two remodeled boats.

Variation of Porosity and Gas Permeability of Gas Diffusion Layers Under Compression (가스확산층의 압축에 따른 공극률 및 기체투과율의 변화)

  • Lee, Yongtaek
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.37 no.8
    • /
    • pp.767-773
    • /
    • 2013
  • This study suggested the variations of porosity and gas permeability of gas diffusion layers (GDLs), which are easily deformed among the components of a highly compressed PEMFC stack. The volume change owing to compression was measured experimentally, and the variations in the porosity and gas permeability were estimated using correlations published in previous literature. The effect of polytetrafluoroethylene (PTFE) which is added to the GDLs to enhance water discharge was investigated on the variations of porosity and gas permeability. The gas permeability which strongly affects the mass transport through GDL, decreases sharply with increasing compression when the GDL has high PTFE loading. As a result, the mass transport through the pore network of GDL can be changed considerably according to the PTFE loading even with the same clamping force. The accuracy of modeling of transport phenomena through GDL can be improved due to the enhanced correlations developed based on the results of this study.

Identity-Exchange based Privacy Preserving Mechanism in Vehicular Networks (차량 네트워크에서 신원교환을 통해 프라이버시를 보호하는 방법)

  • Hussain, Rasheed;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1147-1157
    • /
    • 2014
  • Intelligent transportation system (ITS) is realized through a highly ephemeral network, i.e. vehicular ad hoc network (VANET) which is on its way towards the deployment stage, thanks to the advancements in the automobile and communication technologies. However, it has not been successful, at least to date, to install the technology in the mass of vehicles due to security and privacy challenges. Besides, the users of such technology do not want to put their privacy at stake as a result of communication with peer vehicles or with the infrastructure. Therefore serious privacy measures should be taken before bringing this technology to the roads. To date, privacy issues in ephemeral networks in general and in VANET in particular, have been dealt with through various approaches. So far, multiple pseudonymous approach is the most prominent approach. However, recently it has been found out that even multiple pseudonyms cannot protect the privacy of the user and profilation is still possible even if different pseudonym is used with every message. Therefore, another privacy-aware mechanism is essential in vehicular networks. In this paper, we propose a novel identity exchange mechanism to preserve conditional privacy of the users in VANET. Users exchange their pseudonyms with neighbors and then use neighbors' pseudonyms in their own messages. To this end, our proposed scheme conditionally preserves the privacy where the senders of the message can be revoked by the authorities in case of any dispute.

Analysis on Factors of Importance and Performance in terms of Securing Customers of Farm Restaurants - Based on the Case of Bibijeong in Wanju-Gun - (농가레스토랑 이용고객의 중요도-만족도 분석 - 완주군 비비정을 사례로 -)

  • Han, A-Reum;Han, Jin;Lee, In-Jae;Jang, Dong-Heon
    • Journal of Korean Society of Rural Planning
    • /
    • v.21 no.2
    • /
    • pp.163-175
    • /
    • 2015
  • This study aimed to analyze factors of importance and performance picked by customers of Bibijeong, a farm restaurant operated by the local community of Wanju-gun. Major points include: Recognition paths mostly were word of mouth and mass media, types of visit were in the company of friends, family members or work colleagues, and purposes of visit included consumption of meal and identifying features of the restaurant. Secondly, factor analysis showed that level of facility, atmosphere/cleanness, diversity of menu, employees, ingredients and network. The Cronbach Alpha coefficient was +0.6. Thirdly, average of importance of factors was 3.861 while average performance was 3.429. IPA analysis showed that employee(communication, customer contact) in the first quadrant proved the need for fast improvement through training. Atmosphere/cleanness (interior atmosphere, table clean, kitchen cleanliness, clean dishes, interion design) and employee(proficiency, menu recognition), foodstuff(freshness, origin, safety) in the second quadrant showed that the marketing strategy of improvement as well as maintaining current status is needed, including regular training and hygiene inspection. The third quadrant contains facilities(disability, baby, fire protection) and food menu(food packing, various menu, creative menu, menu description), network(village economic links), which showed the need for gradual improvement. The forth quadrant contains network(sights's near contains. The results so far can be summed into the statement that overcoming the basic functionality of providing meals and linking the restaurant with local attractions and local economy would be need, as well as building up the image of unique farm restaurant with local features, so that Bibijeong can serve as the centerpiece of community and foundation of exchange with other areas.

An Improved Calculation Model for Analysis of [111] InGaAs/GaAs Strained Piezoelectric Superlattices

  • Kim, Byoung-Whi;Yoo, Jae-Hoon;Kim, Soo-Hyung
    • ETRI Journal
    • /
    • v.21 no.4
    • /
    • pp.65-82
    • /
    • 1999
  • We present a calculation model for an improved quantitative theoretical analysis of electronic and optical properties of strained-piezoelectric[111] InGaAs/GaAs superlattices (SLs). The model includes a full band-coupling between the four important energy bands: conduction, heavy, light, and spin split-off valence bands. The interactions between these and higher lying bands are treated by the k ${\cdot}$ p perturbation method. The model takes into account the differences in the band and strain parameters of constituent materials of the heterostructures by transforming it into an SL potential in the larger band-gap material region. It self-consistently solves an $8{\times}8$ effective-mass $Schr{\ddot{o}}dinger$ equation and the Hartree and exchange-correlation potential equations through the variational procedure proposed recently by the present first author and applied to calculate optical matrix elements and spontaneous emission rates. The model can be used to further elucidate the recent theoretical results and experimental observations of interesting properties of this type of quantum well and SL structures, including screening of piezoelectric field and its resultant optical nonlinearities for use in optoelectronic devices.

  • PDF

A New Approach Towards Aggregation in VANET

  • Hussain, Rasheed;Abbas, Fizza;Son, Junggab;Kim, Sangjin;Oh, Heekuck
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.214-217
    • /
    • 2013
  • Advancements in automobile industries and the communication technologies caused VANET (Vehicular Ad Hoc NETwork) to evolve to VANET-based clouds before its deployment. It is more likely that VANET clouds will replace the traditional VANET in the deployment phase. It is to be noted that an abrupt deployment is out of question because it would require mass of resources and money to do so; instead incremental deployment is more ideal. In this paper, we aim at the incremental deployment phase of VANET clouds and focus on the well-established public transport networks. Data aggregation is one of the essential aspects in traditional VANET and has been researched for quite long time. However the previously proposed schemes are still controversial. Keeping in mind the time and space prediction of public buses, we leverage these buses as potential aggregators and MG (Mobile Gateways) in VANET clouds. Buses gather cooperative whereabouts information from neighbors, aggregate that information, disseminate it to the neighbor MGs and also send it to the cloud for storage and for services exchange. In our proposed scheme, we believe that the dissemination will be effective and cover most of the urban area since at any instant of time; buses cover most part of the urban areas. Besides, the effective transmission range is higher due to tall buses.

Water and Wastewater Minimization Technology Through Process Water-Reusing Optimization (공정용수 재이용 최적화를 통한 용수 및 폐수 최소화 기술)

  • Yoo, Chang-Kyoo;Lee, Tae-Yeong;Lee, In-Beum
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.28 no.9
    • /
    • pp.961-976
    • /
    • 2006
  • Designing water-reuse network which can reduce the fresh water within the process and increase the water-use efficiency by scientific and systematic analysis is recently interested in the industries. Water systems often allow efficient water uses via water reuse and recirculation in the paper, petrochemical, and steel industries which necessitate a lot of freshwater within the process. Defining network layout connecting water-using process is frequently accomplished by using water pinch technology which optimizes freshwater entering the process and also reduces the wastewater. In this review, recent researches and case studies of water pinch technology which can find the bottleneck of the water stream at the water reuse designing stage are introduced. Necessity of water pinch technology is illustrated by examples of real industries. Recent studies on simultaneous energy and water minimization and water-reuse network among industries in eco-industrial park(EIP) are also introduced.

On Processing Raw Data from Micrometeorological Field Experiments (미기상학 야외실험에서 얻어지는 자료 처리에 관하여)

  • Hong, Jin-kyu;Kim, Joon
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.4 no.2
    • /
    • pp.119-126
    • /
    • 2002
  • Recently, the flux community in Korea established a new regional flux network, so-called KoFlux, which will provide an infrastructure for collecting, synthesizing, and analysing long-term measurements of energy and mass exchange between the atmosphere and the various vegetated surfaces. KoFlux requires the collection of long time series of raw data, and a large amount of data are expected to accumulate due to continuous flux observations at each KoFlux sites. Therefore, we need a systematic and efficient tool to manage these raw data. As a part of this effort, a computer program far processing raw data measured from micrometeorological field experiments was developed for the flux community in Korea. In this paper, we introduce this program for processing raw data to estimate fluxes and other turbulent statistics and explain the micrometeolological processes coded in this data-processing program. Also, we show some examples on how to run the program and handle the outputs for the unique purpose of research interest.

A Study on the Analysis of the Potential FT(Financing of Terrorism) Threat Using Virtual Currencies and Its Response (가상통화를 활용한 테러자금조달 위협 분석과 국내 대응방안에 관한 연구)

  • Kang, Taeho;Cha, Jang-Hyeon;Kim, Gunin
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.9-33
    • /
    • 2020
  • This study presents aspects of the financing of terrorism using virtual-currencies. Fisrt of all, this introduces the conventional threat of the financing of terrorism and the analysis of current legal system regarding virtual-currency in South Korea. Next, the financing of terrorism cases are analyzed. With given analysis, the paper deals with its response and future extensions by technical and institutional aspects. The threats of the financing of terrorism are going higher after the appearance of virtual-currencies such as Bitcoin. There are two typical ways to use virtual-currencies by terrorist groups. One is to conduct public fund-raising in the social network system and the dark web. The other is to hack into virtual-currency exchange network in order to steal virtual currencies for developing the weapon of mass destruction. Specifically South Korea is top three country of trading virtual currencies and has been subject to virtual-currency hacking more than 10 cases. However, many countries including South Korea deal with virtual currencies as only innovative technology and means of investment, not the threats of the financing of terrorism. Under these circumstances, there a the legal contradiction. This article points this limit and absurdity. Also, it shows reasonable alternatives. All in all, given these aspects, the article proposes detailed policy directions.