• Title/Summary/Keyword: Military Networks

Search Result 271, Processing Time 0.025 seconds

Design of CIC Interpolators with Improved Passband and Transition Region for Underwater Acousitc Communication (통과대역 및 전이영역 특성이 개선된 수중음파통신용 CIC 인터폴레이터 설계)

  • Kim, Sunhee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.1
    • /
    • pp.660-665
    • /
    • 2018
  • Research into underwater wireless networks that enable the monitoring and controlling of the ocean environments has been continuing for disaster prevention and military proposes, as well as for the exploitation of ocean resources throughout the world. A research group led by Hoseo university has been studying a distributed underwater monitoring and controlling network. In this study, we developed an interpolator for acoustic communication between an underwater base station controller and underwater base station, which is included in this network. The underwater acoustic communication provided by this network defines four links whose sampling rates are different. Low power consumption is one of the most important requirements. Therefore, we adopted CIC interpolators, which are known to act as filters with a low power consumption, and some CIC interpolators with an appropriate changing rate were selected depending on the link. However, these interpolators have a large passband drop and wide transition region. To solve these problems, we added a compensator and half-band filter. After verifying the algorithm by using Matlab, we designed and verified it with Verilog-HDL in a ModelSim environment.

An Efficient Data Centric Storage Scheme with Non-uniformed Density of Wireless Sensor Networks (센서의 불균일한 배포밀도를 고려한 효율적인 데이터 중심 저장기법)

  • Seong, dong-ook;Lee, seok-jae;Song, seok-il;Yoo, jae-soo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.135-139
    • /
    • 2007
  • Recently Data Centric Storage (DCS) schemes are variously studied for several applications (e.g. natural environment investigation, military application systems and environmental changes monitoring). In DCS scheme, data is stored at nodes within the network by name. There are several drawbacks in the existing schemes. The first is the inefficiency of the range query processing on not considered the locality of store point. the second is the non-homogeneity of store load of each sensors in case of the sensor distribution density is non-uniformed. In this paper, we propose a novel data centric storage scheme with the sensor distribution density which satisfied with the locality of data store location. This scheme divides whole sensor network area using grid and distributes the density bit map witch consist of the sensor density information of each cell. sensors use the density bit map for storing and searching the data. We evaluate our scheme with existing schemes. As a result, we show improved load balancing and more efficient range query processing than existing schemes in environment which sensors are distributed non-uniform.

  • PDF

Lightweight Authentication Scheme for Secure Data Transmission in Terrestrial CNPC Links (지상 CNPC 링크에서 안전한 데이터 전송을 위한 경량화된 인증기법)

  • Kim, Man Sik;Jun, Moon-Seog;Kang, Jung Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.9
    • /
    • pp.429-436
    • /
    • 2017
  • Unmanned Aerial Vehicles (UAV) that are piloted without human pilots can be commanded remotely via frequencies or perform pre-inputted missions. UAVs have been mainly used for military purposes, but due to the development of ICT technology, they are now widely used in the private sector. Teal Group's 2014 World UAV Forecast predicts that the UAV market will grow by 10% annually over the next decade, reaching $ 12.5 billion by 2023. However, because UAVs are primarily remotely controlled, if a malicious user accesses a remotely controlled UAV, it could seriously infringe privacy and cause financial loss or even loss of life. To solve this problem, a secure channel must be established through mutual authentication between the UAV and the control center. However, existing security techniques require a lot of computing resources and power, and because communication distances, infrastructure, and data flow are different from UAV networks, it is unsuitable for application in UAV environments. To resolve this problem, the study presents a lightweight UAV authentication method based on Physical Unclonable Functions (PUFs) that requires less computing resources in the ground Control and Non-Payload Communication (CNPC) environment, where recently, technology standardization is actively under progress.

Towards efficient policies for soil pollution prevention and remediation of contaminated sites in Korea

  • Hwang, Sang-Il;Park, Eung-Ryeol
    • Proceedings of the Korean Society of Soil and Groundwater Environment Conference
    • /
    • 2003.10a
    • /
    • pp.1-11
    • /
    • 2003
  • The objectives of this paper are to overview present status of soil pollution in Korea, to review the current policies and management strategies for soil pollution prevention and remediation of contaminated sites, and to suggest some recommendations to be considered toward more efficient policies. Soils in Korea are contaminated mainly by industrial facilities, landfills, underground storage tanks, abandoned/inactive mines, military camps, and other sources. Concentrations of most of soil pollutants were similar to the background levels, except for a few heavily contaminated sites such as industrial sites or abandoned/inactive mines. The Soil Environment Conservation Act (SECA), which was effective from 1995, provides a comprehensive legal framework for both preventing soil pollution and remedying contaminated sites in Korea. The Act includes various management policies such as the designation of standards and soil pollution policy area, soil monitoring networks, management of suspected contamination sources, and extended 'polluter-pays' principle. To make current policies more efficient and reasonable, some policies or strategies such as the establishment of national priority list, more detailed standards, risk-based cleanup goal, fund raise, soil erosion problem, and finally, integrity between soil and groundwater management frameworks may need to be pursued in the long term.

  • PDF

Major Outcomes and Tasks for ICH Network Activities in Central Asia : Focusing on Case Studies and Experiences from the Recent Collaborative Work in the Region (중앙아시아 무형문화유산 네트워크 활동의 성과와 미래 - 최근 사례와 경험을 중심으로 -)

  • Park, Seong-Yong
    • Korean Journal of Heritage: History & Science
    • /
    • v.48 no.3
    • /
    • pp.204-219
    • /
    • 2015
  • International society, including the United Nations, has recently been making efforts to further promote a rapprochement of cultures in relation to alleviating military and political conflicts and other social clashes. In line with these efforts at the international level, there has been a growing interest on Central Asia and, in particular, on the Silk Road, which functioned as a trade route among ancient civilizations in the region and is also seen as a route that promoted cultural dialogue and exchanges. Given the amount of cross cultural dialogue and exchange, it is no surprise that intangible cultural heritage has historically been abundant and easily found in the region. However, this heritage was placed in considerable risk because heritage transmission critically weakened for seventy years under Soviet rule. Fortunately, since independence, there has been increasing interest in restoring community identity and reviving intangible heritage. Nevertheless, in spite of this interest, a lack of policies and cultural support in each country has made heritage safeguarding difficult. In this paper, I analyze the various phenomena that took place after the concept and international trends on ICH were introduced and speak about the experiences and outcomes obtained from collaborative network projects by ICHCAP and the Central Asian countries over the last six year. In addition, I would like take this opportunity to discuss how we can understand and develop collaboration in the intangible heritage field in Central Asia in a long-term perspective.

Restoration of The Transportation Network between North and South Korea for Mt. Geumgang Tourism (금강산(내금강) 관광을 위한 남북연결 교통망에 관한 연구)

  • HONG, Gil-Jong;BAE, Sun-Hak
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.22 no.3
    • /
    • pp.51-64
    • /
    • 2019
  • Mt. Geumgang has been a scenic spot representing the Korean peninsula since the Joseon Dynasty, and became a symbol of inter-Korean exchanges with the Gaesong Industrial Complex after the division of the South and North. Mt. Geumgang Tour Course is divided into the Inner-Geumgang (Naegeumgang) and the Outer-Geumgang (Oegeumgang). It was common for the Mt. Geumgang tour route during the Joseon Dynasty and the Japanese Imperialization period to enter the Inner-Geumgang, near Seoul, and come to the East Sea through the Outer-Geumgang. However, the tour route starting from Goseong was utilized for the Mt. Geumgang tour course operated by Hyundai. Because North Korea opened only the Outer-Geumgang area. North Korea has only opened some of its tour courses to Hyundai, but if Geumgang tourism is resumed in the future, there is a high possibility that it will be opened further, such as opening some sections of the Inner-Geumgang in 2007. In this case, it is necessary to connect additional transportation networks to access Inner-Geumgang from South Korea. The best alternative was the restoration of the Mt. Geumgang Railway. However, considering the fact that the reconstruction of the Mt. Geumgang Railway can not be completed due to the construction of the Imnam Dam, it is the most realistic alternative to restore Route 31 connecting Yanggu and Geumgang-eup. As a result of the analysis of road connecting Inner-Geumgang, three routes were confirmed. All of which were adjacent to the existing National Route 31. These routes passing through Dutayeon and Mundeung-ri and joining the Route 31 from Inje. Considering road length, topography characteristics, and military facility layout, it seems that the connection of 'Dutaeyun - Mundeung - Geumgang' is a realistic alternative connecting from South Korea to Inner-Geumgang.

Evaluation of Electromagnetic Pulse Shielding Effectiveness and Bonding Performance of Inorganic Paint based on Carbon Material (탄소재료 기반 무기계 도료의 전자파 차폐성능 및 부착성능 평가)

  • Jang, Kyong-Pil;Kim, Sang-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.1
    • /
    • pp.801-807
    • /
    • 2021
  • In various industrial fields and infrastructure based on electronic components, such as communication equipment, transportation, computer networks, and military equipment, the need for electromagnetic pulse shielding has increased. Two methods for applying electromagnetic pulse shielding are effective. The first is construction using shielding materials, such as shielding concrete, shielding doors, and shielding windows. The other is coating shielding paints on non-shielding structures. Electromagnetic pulse shielding paints are made using conductive materials, such as carbon nanotubes, graphite, carbon black, and carbon fiber. In this paint, electromagnetic pulse shielding performance is added to the commonly used water-based paint. In this study, the shielding effectiveness and bonding performance of paints using conductive graphite and carbon black as shielding materials were evaluated to develop electromagnetic pulse shielding inorganic paints. The shielding effectiveness and bonding performance were evaluated by applying six mixtures composed of different kinds and amounts of shielding material. The mixture of conductive graphite and carbon black at a weight ratio of 1:0.2 was the most effective in shielding as 33.6 dB. Furthermore, the mixture produced using conductive graphite only showed the highest bonding performance of 1.06 MPa.

The gender difference in concept of calling in childrearing: Visual Comparison through Social Network Analysis (부모소명 개념에 대한 부와 모의 인식 차이: 사회연결망 분석을 통한 시각적 비교)

  • Su Jin Kim;Young Woo Shon;Suran Lee
    • The Korean Journal of Coaching Psychology
    • /
    • v.6 no.2
    • /
    • pp.93-114
    • /
    • 2022
  • The purpose of this study is to investigate whether there was a difference between men and women in conceptualizing a calling in childrearing through social network analysis. The results are as follows. IAs a result of the study, it was found that mothers showed significantly larger networks and higher density than fathers did, indicating that mothers, more than fathers do, experience parenting and child-rearing based more on a concept of calling in childrearing. Parents directly linked responsibility, children's growth, direction, commitment, and parental character to a calling in childrearing. In addition, mothers also linked a sense of identity and parental growth to it. In the case of fathers, only four concepts were directly connected with a calling in childrearing. This shows that mothers, in comparison to fathers, connect essential self-concepts, such as identity as a parent and themes of growth, to a calling in childrearing. In centrality, similar concepts also were evaluated as important. The common parental closeness centrality is composed of responsibility, child growth, direction, and belief starting from the center. In the case of fathers, child growth, responsibility, and belief were evaluated in order, and in the case of mothers, responsibility, parental growth, and identity were evaluated as relatively important concepts.

A study on Lemon Revolution in Kyrgyzstan and a Possibility of East-West Hegemony (키르기스스탄의 레몬혁명과 동서 패권주의 가능성 연구)

  • Hwang, Sung-Woo
    • Journal of International Area Studies (JIAS)
    • /
    • v.14 no.2
    • /
    • pp.477-498
    • /
    • 2010
  • The Reasons which Rose Revolution, Orange Revolution, and Lemon Revolution had been much argued in international society are as follows: Firstly, the important fact was that authoritarian governments in Georgia, Ukraine and Kyrgyzstan were collapsed not by physical violences and military forces, but by unblooded civil movements, so called Civil Revolution. And it is also called as Colorful Revolution. Secondly, during the advance of three Civil Revolution, hegemony conflicts between Russia and western powers including US appeared. In fact, tensions between the two countries, Russia and US had already occurred in Post-soviet region after dissolution of Soviet Union. Thirdly, as a result of three Civil Revolution, there were built up fullest attentions in international societies about the possibilities of other civil revolutions, that is to say, 'Colorful Revolution' among the countries which were the republics of former USSR. In this respect, in this investigation of Lemon Revolution in Kyrgyzstan as like Rose Revolution in Georgia and Orange Revolution in Ukraine, this article examined the roles and supports toward NGOs of Western powers including US. To my opinion, it is likely that NGOs, with powerful sponsors, become political bodies working through networks and media rather than being rooted in civil society and acting on behalf of citizens. And that powerful sponsors, directly or indirectly financed by outside governments, become involved in political activities. So NGOs have been important roles in promoting civil revolution as political agencies and more political instruments of foreign governments. In the long run, through the Colorful Revolution, it is better to understand that hegemony struggle is beginning between external concerned superpowers including US and Russia, rather than hegemony struggle having directly broke out.

Efficient QoS Policy Implementation Using DSCP Redefinition: Towards Network Load Balancing (DSCP 재정의를 통한 효율적인 QoS 정책 구현: 네트워크 부하 분산을 위해)

  • Hanwoo Lee;Suhwan Kim;Gunwoo Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.715-720
    • /
    • 2023
  • The military is driving innovative changes such as AI, cloud computing, and drone operation through the Fourth Industrial Revolution. It is expected that such changes will lead to a rapid increase in the demand for information exchange requirements, reaching all lower-ranking soldiers, as networking based on IoT occurs. The flow of such information must ensure efficient information distribution through various infrastructures such as ground networks, stationary satellites, and low-earth orbit small communication satellites, and the demand for information exchange that is distributed through them must be appropriately dispersed. In this study, we redefined the DSCP, which is closely related to QoS (Quality of Service) in information dissemination, into 11 categories and performed research to map each cluster group identified by cluster analysis to the defense "information exchange requirement list" on a one-to-one basis. The purpose of the research is to ensure efficient information dissemination within a multi-layer integrated network (ground network, stationary satellite network, low-earth orbit small communication satellite network) with limited bandwidth by re-establishing QoS policies that prioritize important information exchange requirements so that they are routed in priority. In this paper, we evaluated how well the information exchange requirement lists classified by cluster analysis were assigned to DSCP through M&S, and confirmed that reclassifying DSCP can lead to more efficient information distribution in a network environment with limited bandwidth.