• Title/Summary/Keyword: Model-centric

Search Result 281, Processing Time 0.028 seconds

A Modeling of Information Process Concept for Analyzing Information Effect in Combat Simulation (전투 시뮬레이션에서 정보효과 분석을 위한 정보처리 개념 모델링)

  • Noh, Hyunil;Lee, Youngwoo;Lee, Taesik
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.6
    • /
    • pp.730-743
    • /
    • 2016
  • Network-Centric Warfare is a forthcoming military revolution paradigm for maximizing combat effectiveness in terms of information superiority. However, quantitative assessment of information effect is a challenging issue. Among the many approaches, war-game is a well known method to evaluate combat effectiveness. However, previous researches and current models have a limited function or logic to simulate information process, which is core concept of NCW. So this research suggests a concept of simulation modeling method to describe the information process as defining of combat information process based on probability decision model. In addition, we suggest a simple scenario to represent proposed concept modelling method. This results can be used in designing war-game analysis model for enhanced information effectiveness.

A study on the improvement of MND-AMM for the expanded application to the architecture development of infra systems (기반체계 아키텍처 개발을 위한 MND-AMM 개선 연구)

  • Yoon, Tae Hun;Kim, Ui Hwan
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.11 no.1
    • /
    • pp.25-31
    • /
    • 2015
  • Under the relevant regulations, it is required to develop a system architecture for the research and development of the information and communication infra system ; however, the national defense architecture development guides and MND-AF, which provide the instructions on the development and utilization of a system architecture, are still limited to the ITA level and merely providing the guidelines for developing the information system centric architecture. Thus, it is evident that we need a suitable architecture development methodology that corresponds to the growing needs for the communication infra system architecture, as well as the general weapon system architecture. Improving a meta-model is the core of improving a architecture framework. It determines a contents of a architecture and it influences a efficiency and a effectiveness of a architecture. The meta-model of the architecture framework must reflect concerns of various stakeholders and provide a traceability among them. Also, it should be easy to develop and use the architecture by securing the feasibility of the logical relationships and eliminating the duplication of the data inside the architecture. It is implemented through the development of the data-centric architecture and achieved through the "Fit-for-purpose" concept.

New Generation Gap Models for Evolutionary Algorithm in Real Parameter Optimization (실수최적화 진화 알고리즘을 위한 새로운 세대차 모델)

  • Choi, Jun-Seok;Seo, Ki-Sung
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.1
    • /
    • pp.62-68
    • /
    • 2009
  • Two new generation gap models with modified parent-centric recombination(PCX) operator are proposed. First, the self-adaptation generation gap(SGG) model is a control method that keeps a replaced probability of parents by offspring to a certain level which obtains better performance. Second, virtual cluster generation gap(VCGG) is provided to extend distances among parents using clustering, which causes it to diversify individuals. In this model, distances among parents can be controlled by size of clusters. To demonstrate the effectiveness of our two proposed approaches, experiments for three standard test problems are executed and compared to most competing current approaches, CMA-ES and Generalized Generation Gap(G3) with PCX. It is shown two proposed methods are superior to consistently other approaches in the study.

A Framework for Trustworthy Open Shared Authentication Protocol (신뢰적인 개방형 공유 인증 프로토콜 프레임워크)

  • Park, Seung-Chul
    • The KIPS Transactions:PartC
    • /
    • v.18C no.6
    • /
    • pp.389-396
    • /
    • 2011
  • Recently, researches on the shared authentication based on single sign-on have been actively performed so as to solve the problems of current service provider-centric and isolated Internet authentications, including low usability, high cost structure, and difficulty in privacy protection. In order for the shared authentication model, where the authentications of an authentication provider are shared by several Internet service providers, to be accepted in real Internet environment, trustworthiness among users, service providers, and authentication providers on the level of authentication assurance and the level of authentication information protection is necessarily required. This paper proposes a framework for trustworthy and privacy-protected shared authentication protocol based on the user-centric operation and open trust provider network. The proposed framework is differentiated from previous works in the points that it is able to provide interoperable shared authentication services on the basis of open trust infrastructure.

On Enhancing Safety of Train-Centric Train Control System using Model-Based Development (차상중심 열차제어시스템 개발에서 모델기반 접근을 통한 안전성 향상에 관한 연구)

  • Choi, Myung-Sung;Kim, Joo-Uk;Han, Seok-Youn;Oh, Se-Chan;Sim, Sang-Hyun;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.7
    • /
    • pp.573-584
    • /
    • 2016
  • The train control system is a facility to ensure model-based design and safe train operation, and its safety is the most important factor for system introduction, complexity of the design information and traceability etc. Therefore, the model-based design and safety activities regarding the way-side equipment of a train control system is also highlighted. To solve this problem, In this paper, model-based design was carried out first to develop an effective train control system, which is represented by SysML(System Modeling Language). The test scenarios that can take advantage of the design model were created to improve the train safety control system. Case studies of a model-based design of a train-centric train control system were applied to the test scenarios; the results demonstrated its usability. The improved activity over the test highlighted the safety improvement approach, and it is expected to reduce the cost and time in the conceptual design of a future development model-based train control system.

A novel architecture of CCN for better security and applicability (향상된 보안 및 적용 가능성을 위한 컨텐츠 중심 네트워킹(CCN)의 새로운 아키텍처 연구)

  • Sharma, Aashis;Kim, Yun Seon
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.1
    • /
    • pp.21-38
    • /
    • 2017
  • Information Centric Networking is changing the way how content is being transmitted. The shift from IP and host based networking towards content based networking scenario is growing day by day. Many researches have been done about different frameworks of ICN. Caching is an important part of ICN and many researchers have also proposed different ways for caching the data. With caching of data in intermediate devices like the network devices as well the user devices in some cases, the issue of content security as well as the role of the content producer becomes a major concern. A modified ICN architecture based on the current Content Centric Networking (CCN) model is presented in the paper. The architecture mainly focuses on involving the content producer in content delivery in the real time. The proposed architecture provides better security aspects for the CCN architecture. Apart from security the paper will also consider the issue of applicability of CCN architecture to replace the TCP/IP based architecture. The efficiency of the proposed architecture is compared with the previous CCN architecture based on the response time for a content delivery which shows very comparable level of efficiency. The paper than analyzes different beneficial aspects of the proposed architecture over the current architecture.

Radiation-Induced Chromosome Aberration in Human Peripheral Blood Lymphocytes In Vitro : RBE Study with Neutrons and $^{60}Co\;{\gamma}-rays$. (KCCH cyclotron neutron 및 $^{60}Co\;{\gamma}-ray$에 의한 인체 말초혈액 임파구의 염색체 이상측정)

  • Kim, Sung-Ho;Kim, Tae-Hwan;Chung, In-Yong;Cho, Chul-Koo;Koh, Kyoung-Hwan;Yoo, Seong-Yul
    • Journal of Radiation Protection and Research
    • /
    • v.17 no.1
    • /
    • pp.21-30
    • /
    • 1992
  • The frequencies of KCCH cyclotron neutron (30 cGy/min) or $^{60}Co\;{\gamma}-rays$ (210 cGy/min)-induced asymmetrical interchanges (dicentrics and centric rings) and acentric fragments (deletion) at several doses were measured in the normal human peripheral blood lymphocytes Chromosome aberrations were scored at the first nitosis after stimulation with phytohemagglutinin. The neutron and y-ray data were analysed on linear, power-law, quadratic and linear-quadratic model . When the dicentrics and centric rings of ${\gamma}-rays$ datas were pooled and fitted to these model, good fits were obtained to power-law $[Y=(5.81{\pm}1.96){\times}10^6D^{1.93+0.06},\; P=0.931]$, quadratic $[Y=(3.91{\pm}0.09){\times}10^{-6}D^2,\;P=0.972]$ an linear-Quadrati model $[Y=(6.55{\pm}6.83){\times}10^{-5}D+(3.72{\pm}0.22){\times}10^{-6}D^2\; P=0.922]$, except for linear model (P=0.067) As in the case of neutron data, the best fit was obtained to the linear model $(Y=(6.12{\pm}0.17){\times}10^{-3}\;D-0.22,\;P=0.987]$ and good fits were obtained to power-law$[Y=(5.36{\pm}3.02) {\times}10^{-4}D^{1.42+0.11},\; P=0.601]$ and linear-quadratic model$[Y=(2.43{\pm}0.70){\times}10^{-3}D+(1.21{\pm}0.39){\times}10^{-7}D^2$, \;P=0.415], except for quadratic model (P<0.005). The relative biological effectiveness (RBE) of neutron compared with y-ray was estimated by best fitting model. In the asymmetrical interchanges range between 0.1 and 1.5 per cell, the RBE was found to be $2.714{\pm}0.408$.

  • PDF

A Study on Design Direction of Industry-Centric Security Level Evaluation Model through Analysis of Security Management System (보안관리체계 분석을 통한 산업중심 보안수준평가 모형 설계 방향 연구)

  • Bae, Je-Min;Kim, Sanggeun;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.4
    • /
    • pp.177-191
    • /
    • 2015
  • Recently, the necessity of systematic security management system that consider company' character and environment has appeared because of increasing security accident continuously in domestic companies. However, most of companies has applied to only K-ISMS which is existing information security management system, although They are different from object, purpose and way of security level evaluation by companies. According to this situation, Many experts have questioned that there are many problems with effectiveness of introducing security management system. In this study, We established definition of information security management system, industrial security management system and research security management system through analysis of previous study and developed evaluation item which can implement security in whole industry comparing and analyzing the control items of them. Also, we analyzed existing security level evaluation and suggest design direction of industry-centric security level evaluation model considering character of industry.

A Receiver-Driven Loss Recovery Mechanism for Video Dissemination over Information-Centric VANET

  • Han, Longzhe;Bao, Xuecai;Wang, Wenfeng;Feng, Xiangsheng;Liu, Zuhan;Tan, Wenqun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.7
    • /
    • pp.3465-3479
    • /
    • 2017
  • Information-Centric Vehicular Ad Hoc Network (IC-VANET) is a promising network architecture for the future intelligent transport system. Video streaming applications over IC-VANET not only enrich infotainment services, but also provide the drivers and pedestrians real-time visual information to make proper decisions. However, due to the characteristics of wireless link and frequent change of the network topology, the packet loss seriously affects the quality of video streaming applications. In this paper, we propose a REceiver-Driven loss reCOvery Mechanism (REDCOM) to enhance video dissemination over IC-VANET. A Markov chain based estimation model is introduced to capture the real-time network condition. Based on the estimation result, the proposed REDCOM recovers the lost packets by requesting additional forward error correction packets. The REDCOM follows the receiver-driven model of IC-VANET and does not require the infrastructure support to efficiently overcome packet losses. Experimental results demonstrate that the proposed REDCOM improves video quality under various network conditions.

Design of Query Processing System to Retrieve Information from Social Network using NLP

  • Virmani, Charu;Juneja, Dimple;Pillai, Anuradha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1168-1188
    • /
    • 2018
  • Social Network Aggregators are used to maintain and manage manifold accounts over multiple online social networks. Displaying the Activity feed for each social network on a common dashboard has been the status quo of social aggregators for long, however retrieving the desired data from various social networks is a major concern. A user inputs the query desiring the specific outcome from the social networks. Since the intention of the query is solely known by user, therefore the output of the query may not be as per user's expectation unless the system considers 'user-centric' factors. Moreover, the quality of solution depends on these user-centric factors, the user inclination and the nature of the network as well. Thus, there is a need for a system that understands the user's intent serving structured objects. Further, choosing the best execution and optimal ranking functions is also a high priority concern. The current work finds motivation from the above requirements and thus proposes the design of a query processing system to retrieve information from social network that extracts user's intent from various social networks. For further improvements in the research the machine learning techniques are incorporated such as Latent Dirichlet Algorithm (LDA) and Ranking Algorithm to improve the query results and fetch the information using data mining techniques.The proposed framework uniquely contributes a user-centric query retrieval model based on natural language and it is worth mentioning that the proposed framework is efficient when compared on temporal metrics. The proposed Query Processing System to Retrieve Information from Social Network (QPSSN) will increase the discoverability of the user, helps the businesses to collaboratively execute promotions, determine new networks and people. It is an innovative approach to investigate the new aspects of social network. The proposed model offers a significant breakthrough scoring up to precision and recall respectively.