• 제목/요약/키워드: Military Use

검색결과 960건 처리시간 0.021초

트랜잭션 중심의 발견적 파일 수직 분한 방법 (A transaction-based vertical partitioning algorithm)

  • 박기택;김재련
    • 한국국방경영분석학회지
    • /
    • 제22권1호
    • /
    • pp.81-96
    • /
    • 1996
  • In a relational database environment, partitioning of data is directly concerned with the amount of data that needs to be required in a query or transaction. In this paper, we consider non-overlapping, vertical partitioning. Vertical partitioning algorithm in this paper is composed of two phases. In phase 1, we cluster the attributes with zero-one integer program that maximize affinity among attributes. The result of phase 1 is called 'Initial Fragments'. In phase 2, we modify Initial Fragments that is not directly considered by cost factors, making use of a transaction-based partitioning method. A transaction-based partitioning method is partitioning attributes according to a set of transactions. In this phase we select logical accesses which needs to be required in a transaction as comparison criteria. In phase 2, proposed algorithm consider only small number of modification of Initial Fragments in phase 1. This algorithm is so insensible to number of transactions and of attributes that it can applied to relatively large problems easily.

  • PDF

Analysis of the Methodology for Linear Programming Optimality Analysis using Metamodelling Techniques

  • Lee, Young-Hae;Jeong, Chan-Seok
    • 한국국방경영분석학회지
    • /
    • 제25권2호
    • /
    • pp.1-14
    • /
    • 1999
  • Metamodels using response surface methodology (RSM) are used for the optimality analysis of linear programming (LP). They have the form of a simple polynomial, and predict the optimal objective function value of an LP for various levels of the constraints. The metamodelling techniques for optimality analysis of LP can be applied to large-scale LP models. What is needed is some large-scale application of the techniques to verify how accurate they are. In this paper, we plan to use the large scale LP model, strategic transport optimal routing model (STORM). The developed metamodels of the large scale LP can provide some useful information.

  • PDF

SUPERCONVERGENCE OF HYBRIDIZABLE DISCONTINUOUS GALERKIN METHOD FOR SECOND-ORDER ELLIPTIC EQUATIONS

  • MOON, MINAM;LIM, YANG HWAN
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • 제20권4호
    • /
    • pp.295-308
    • /
    • 2016
  • We propose a projection-based analysis of a new hybridizable discontinuous Gale-rkin method for second order elliptic equations. The method is more advantageous than the standard HDG method in a sense that the new method has higher-order accuracy and lower computational cost, and is more flexible. Notable distinctions of our new method, when compared to the standard HDG emthod, are that our method uses $L^2$-projection and suitable stabilization parameter depending on a mesh size for superconvergence. We show that the error for the solution of the equation converges with order p + 2 when we only use polynomials of degree p + 1 as a finite element space without postprocessing. After establishing the theory, we carry out numerical tests to demonstrate and ensure that the proposed method is effective and accurate in practice.

Program Slice 생성 모형에 관한 연구 (A Study on the Program Slicing Model)

  • 윤창변;차영헌;정창모
    • 한국국방경영분석학회지
    • /
    • 제14권1호
    • /
    • pp.42-52
    • /
    • 1988
  • Many programmers start debugging by reading the faulty program from start to bottom without investigating carefully the erroneous program. Expert programmers, however, trace backward from a particular variable in a specific statement to identify all possible sources of influence on the value of variable (program slice). Weiser proposed a slicing algorithm (method) that is complex, iterative and still in modification [3,4]. This paper presents a method to generate a program slice by use of matrix computation which represents all possible slices of the program. The matrix representation of a program is soundly based on the graph theory of data dependency.

  • PDF

전투체계 시스템을 위한 실시간 환경에서의 비동기 이중화 기법 연구 (A Study on Real Time Asynchronous Data Duplication Method for the Combat System)

  • 이재승;류존하
    • 한국군사과학기술학회지
    • /
    • 제10권2호
    • /
    • pp.61-68
    • /
    • 2007
  • In a naval combat system, the information processing node is a key functional equipment and performs major combat management functions including control sensor and weapon systems. Therefore, a failure of one of the node causes fatal impacts on overall combat system capability. There were many methodologies to enhance system availability by reducing the impact of system failure like a fault tolerant method. This paper proposes a fault tolerant mechanism for information processing node using a replication algorithm with hardware duplication. The mechanism is designed as a generic algorithm and does not require any special hardware. Therefore all applications in combat system can use this functionality. The asynchronous characteristic of this mechanism provides the capability to adapt this algorithm to the module which has low performance hardware.

시뮬레이션을 이용한 전투효과기반 공격헬기 소요 분석방안 (Combat Effectiveness Based Analysis Methodology for Optimal Requirement of Attack Helicopter Using Simulation)

  • 정치영;이재영
    • 한국군사과학기술학회지
    • /
    • 제13권6호
    • /
    • pp.1099-1105
    • /
    • 2010
  • The purpose of this paper is to propose a methodology that can estimate optimal requirement of attack helicopter Korea army will be operating in future. For estimating optimal requirement, attack helicopter's operation concept, performance, battlefield environment and enemy threat are considered. We use a wargame model, AAsim(Army Aviation simulation), as a analytic simulation model which is used to analyze DOTMLPF and operation in army aviation field. In this paper, we conduct battle experiment for anti armored corps operation which reflects attack helicopter's combat effectiveness very well. As a result of simulation, the destructive rate for enemy armored corps per each attack helicopter can be calculated. In this paper, we propose optimal requirement of attack helicopter using that destructive rate for enemy armored corps.

항재밍용 가변대역 다중모드 위성항법수신기 설계 및 성능분석 (Performance Analysis and Design of Variable Bandwidth Multi-Mode GNSS Receiver for Anti-Jamming)

  • 안승관;이상정
    • 한국군사과학기술학회지
    • /
    • 제13권1호
    • /
    • pp.133-139
    • /
    • 2010
  • GNSS receiver which uses the weak satellite signal is very vulnerable to the intentional jamming or non-intentional electromagnetic interference. It is a very simple method among the use method of GNSS receiver to vary tracking loop bandwidth of satellite signal appropriately as the jamming signal level. In this paper, this anti-jamming performance is experimented and analyzed in the laboratory and the anechoic chamber by the GNSS simulator to generate the satellite signal and the jamming signal generator to generate the jamming signal.

탐색레이더용 피아식별안테나 후방 방사 수준 개선에 관한 연구 (Study on Back-Radiation level Improvement of IFF Antenna for Surveillance Radar)

  • 김영완;채희덕;박종국;이동국;정명득;한인희;이두연
    • 한국군사과학기술학회지
    • /
    • 제16권1호
    • /
    • pp.34-39
    • /
    • 2013
  • In this paper, we described the study on back-radiation level improvement of IFF antenna after briefly describing a design of IFF antenna to distinguish the target as the sub-antenna of surveillance radar. The proposed IFF antenna was minimized a size with use all-in-one power divider as a two-channel IFF antenna forming sum and difference pattern. The method for back-radiation level reduction was studied, and the identified method through the simulation confirmed the decrement throught the measurement.

확률적 전투모형과 분산 네트워크 적용 (Development of Distributed Interactive Stochastic Combat Simulation (DISCSIM) Model)

  • Hong, Yoon-Gee;Kwon, Soon-Jong
    • 한국시뮬레이션학회:학술대회논문집
    • /
    • 한국시뮬레이션학회 1999년도 추계학술대회 논문집
    • /
    • pp.210-216
    • /
    • 1999
  • Todays computer communication technology let people to do many unrealistic things possible and the use of those technologies is becoming increasingly prevalent throughout the military operation. Both DIS and ADS are welled defined computer aided military simulations. This study discusses a simulation of stochastic combat network modeling through Internet. We have developed two separate simulation models, one for clients and another for server, and validated for conducting studies with these two models. The object-oriented design was necessary to define the system entities and their relationship, to partition functionality into system entities, and to transform functional metrics into realizations derived from system component behaviors. Heterogeneous forces for each side are assumed at any battle node. The time trajectories for mean number of survivors at each node, some important combat measures, and relative difference computations between models were made. We observe and may conclude that the differences exist and some fo these are significant based on a limited number of experiments.

  • PDF

대규모 조직에서의 패스워드 관리에 관한 권고 고찰 (A Study On Enterprise Password Management Recommendations)

  • 박진섭
    • 안보군사학연구
    • /
    • 통권8호
    • /
    • pp.421-465
    • /
    • 2010
  • Passwords are used in many ways to protect data, systems, and networks. Passwords are also used to protect files and other stored information. In addition, passwords are often used in less visible ways for authentication. In this article, We provides recommendations for password management, which is the process of defining, implementing, and maintaining password policies throughout an enterprise. Effective password management reduces the risk of compromise of password-based authentication systems. Organizations need to protect the confidentiality, integrity, and availability of passwords so that all authorized users - and no unauthorized users - can use passwords successfully as needed. Integrity and availability should be ensured by typical data security controls, such as using access control lists to prevent attackers from overwriting passwords and having secured backups of password files. Ensuring the confidentiality of passwords is considerably more challenging and involves a number of security controls along with decisions involving the characteristics of the passwords themselves.

  • PDF