• Title/Summary/Keyword: Multi-Level Systems

Search Result 863, Processing Time 0.025 seconds

Design of the Agent-based Network-Centric Warfare Modeling System (에이전트 기반의 NCW 전투모델링 시스템 설계)

  • Park, Se-Youn;Shin, Ha-Yong;Lee, Tae-Sik;Choi, Bong-Wan
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.271-280
    • /
    • 2010
  • While the future warfare is expected to be appeared as network-centric, effect-based, and coordinated cooperative, most current M&S systems reflect only the unit behaviors and interactions of each weapon system. There are limitations to analyze the behaviors of managing weapons cooperatively and sharing the situational awareness over the networks of distributed sensors, C2, and shooters using them. Therefore, we introduce the new design of the networkcentric warfare modeling system using the agent-based modeling and simulation approach. We have developed a system for engagement-level warfare models and tested with multi-platform battleship warfare. In this paper, we propose the method to design battle agents, environments, and networks for network centric warfare modeling.

Scenario-based Future Infantry Brigade Information Distribution Capability Analysis (시나리오 기반의 미래 보병여단 정보유통능력 분석 연구)

  • Junseob Kim;Sangjun Park;Yiju You;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.139-145
    • /
    • 2023
  • The ROK Army is promoting cutting-edge, future-oriented military development such as a mobile, intelligent, and hyper-connected Army TIGER system. The future infantry brigade plans to increase mobility with squad-level tactical vehicles to enable combat in multi-domain operations and to deploy various weapon systems such as surveillance and reconnaissance drones. In addition, it will be developed into an intelligent unit that transmits and receives data collected through the weapon system through a hyper-connected network. Accordingly, the future infantry brigade will transmit and receive more data. However, the Army's tactical information communication system has limitations in operating as a tactical communication system for future units, such as low transmission speed and bandwidth and restrictions on communication support. Therefore, in this paper, the information distribution capability of the future infantry brigade is presented through the offensive operation scenario and M&S.

Active control of amplitude and phase of high-power RF systems in EAST ICRF heating experiments

  • Guanghui Zhu;Lunan Liu;Yuzhou Mao;Xinjun Zhang;Yaoyao Guo;Lin Ai;Runhao Jiang;Chengming Qin;Wei Zhang;Hua Yang;Shuai Yuan;Lei Wang;Songqing Ju;Yongsheng Wang;Xuan Sun;Zhida Yang;Jinxin Wang;Yan Cheng;Hang Li;Jingting Luo
    • Nuclear Engineering and Technology
    • /
    • v.55 no.2
    • /
    • pp.595-602
    • /
    • 2023
  • The EAST ICRF system operating space has been extended in power and phase control with a low-level RF system for the new double-strap antenna. Then the multi-step power and periodic phase scanning experiment were conducted in L-mode plasma, respectively. In the power scanning experiment, the stored energy, radiation power, plasma impedance and the antenna's temperature all have positive responses during the short ramp-ups of PL;ICRF. The core ion temperature increased from 1 keV to 1.5 keV and the core heating area expanded from |Z| ≤ 5 cm to |Z| ≤ 10 cm during the injection of ICRF waves. In the phasing scanning experiment, in addition to the same conclusions as the previous relatively phasing scanning experiment, the superposition effect of the fluctuation of stored energy, radiation power and neutron yield caused by phasing change with dual antenna, resulting in the amplitude and phase shift, was also observed. The active control of RF output facilitates the precise control of plasma profiles and greatly benefits future experimental exploration.

Fabry disease: current treatment and future perspective

  • Han-Wook Yoo
    • Journal of Genetic Medicine
    • /
    • v.20 no.1
    • /
    • pp.6-14
    • /
    • 2023
  • Fabry disease (FD), a rare X-linked lysosomal storage disorder, is caused by mutations in the α-galactosidase A gene gene encoding α-galactosidase A (α-Gal A). The functional deficiency of α-Gal A results in progressive accumulation of neutral glycosphingolipids, causing multi-organ damages including cardiac, renal, cerebrovascular systems. The current treatment is comprised of enzyme replacement therapy (ERT), oral pharmacological chaperone therapy and adjunctive supportive therapy. ERT has been introduced 20 years ago, changing the outcome of FD patients with proven effectiveness. However, FD patients have many unmet needs. ERT needs a life-long intravenous therapy, inefficient bio-distribution, and generation of anti-drug antibodies. Migalastat, a pharmacological chaperone, augmenting α-Gal A enzyme activity only in patients with mutations amenable to the therapy, is now available for clinical practice. Furthermore, these therapies should be initiated before the organ damage becomes irreversible. Development of novel drugs aim at improving the clinical effectiveness and convenience of therapy. Clinical trial of next generation ERT is underway. Polyethylene glycolylated enzyme has a longer half-life and potentially reduced antigenicity, compared with standard preparations with longer dosing interval. Moss-derived enzyme has a higher affinity for mannose receptors, and seems to have more efficient access to podocytes of kidney which is relatively resistant to reach by conventional ERT. Substrate reduction therapy is currently under clinical trial. Gene therapy has now been started in several clinical trials using in vivo and ex vivo technologies. Early results are emerging. Other strategic approaches at preclinical research level are stem cell-based therapy with genome editing and systemic mRNA therapy.

A Study on the Evaluation of LLM's Gameplay Capabilities in Interactive Text-Based Games (대화형 텍스트 기반 게임에서 LLM의 게임플레이 기능 평가에 관한 연구)

  • Dongcheul Lee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.3
    • /
    • pp.87-94
    • /
    • 2024
  • We investigated the feasibility of utilizing Large Language Models (LLMs) to perform text-based games without training on game data in advance. We adopted ChatGPT-3.5 and its state-of-the-art, ChatGPT-4, as the systems that implemented LLM. In addition, we added the persistent memory feature proposed in this paper to ChatGPT-4 to create three game player agents. We used Zork, one of the most famous text-based games, to see if the agents could navigate through complex locations, gather information, and solve puzzles. The results showed that the agent with persistent memory had the widest range of exploration and the best score among the three agents. However, all three agents were limited in solving puzzles, indicating that LLM is vulnerable to problems that require multi-level reasoning. Nevertheless, the proposed agent was still able to visit 37.3% of the total locations and collect all the items in the locations it visited, demonstrating the potential of LLM.

South Korea's strategy to cope with local provocations by nuclear armed North Korea (핵위협하 국지도발 대비 대응전략 발전방향)

  • Kim, Tae-Woo
    • Strategy21
    • /
    • s.31
    • /
    • pp.57-84
    • /
    • 2013
  • North Korea's continuous threats and provocative behaviors have aggravated tension on the Korean peninsula particularly with the recent nuclear weapons test. South Korea's best way to cope with this situation is to maintain the balance among three policy directions: dialogue, sanctions, and deterrence. Among the three, I argue that deterrence should be prioritized. There are different sources of deterrence such as military power, economic power, and diplomatic clouts. States can build deterrence capability independently. Alternatively, they may do so through relations with other states including alliances, bilateral relations, or multilateral relations in the international community. What South Korea needs most urgently is to maintain deterrence against North Korea's local provocations through the enhancement of independent military capability particularly by addressing the asymmetric vulnerability between militaries of the South and the North. Most of all, the South Korean government should recognize the seriousness of the negative consequences that North Korea's 'Nuclear shadow strategy' would bring about for the inter-Korea relations and security situations in Northeast Asia. Based on this understanding, it should develop an 'assertive deterrence strategy' that emphasizes 'multi-purpose, multi-stage, and tailored deterrence whose main idea lies in punitive retaliation.' This deterrence strategy requires a flexible targeting policy and a variety of retaliatory measures capable of taking out all targets in North Korea. At the same time, the force structures of the army, the air force, and the navy should be improved in a way that maximizes their deterrence capability. For example, the army should work on expanding the guided missile command and the special forces command and reforming the reserve forces. The navy and the air force should increase striking capabilities including air-to-ground, ship-to-ground, and submarine-to-ground strikes to a great extent. The marine corps can enhance its deterrence capability by changing the force structure from the stationary defense-oriented one that would have to suffer some degree of troop attrition at the early stage of hostilities to the one that focuses on 'counteroffensive landing operations.' The government should continue efforts for defense reform in order to obtain these capabilities while building the 'Korean-style triad system' that consists of advanced air, ground, and surface/ subsurface weapon systems. Besides these measures, South Korea should start to acquire a minimum level of nuclear potential within the legal boundary that the international law defines. For this, South Korea should withdraw from the Nuclear Non-proliferation Treaty. Moreover, it should obtain the right to process and enrich uranium through changing the U.S.-South Korea nuclear cooperation treaty. Whether or not we should be armed with nuclear weapons should not be understood in terms of "all or nothing." We should consider an 'in-between' option as the Japanese case proves. With regard to the wartime OPCON transition, we need to re-consider the timing of the transition as an effort to demonstrate the costliness of North Korea's provocative behaviors. If impossible, South Korea should take measures to make the Strategic Alliance 2015 serve as a persisting deterrence system against North Korea. As the last point, all the following governments of South Korea should keep in mind that continuing reconciliatory efforts should always be pursued along with other security policies toward North Korea.

  • PDF

Performance Evaluation of a Driving Power Transmission System for 50 kW Narrow Tractors

  • Hong, Soon-Jung;Ha, Jong-Kyou;Kim, Yong-Joo;Kabir, Md. Shaha Nur;Seo, Young Woo;Chung, Sun-Ok
    • Journal of Biosystems Engineering
    • /
    • v.43 no.1
    • /
    • pp.1-13
    • /
    • 2018
  • Purpose: The development of compact tractors that can be used in dry fields, greenhouses, and orchards for pest control, weeding, transportation, and harvesting is necessary. The development and performance evaluation of power transmission units are very important when it comes to tractor development. This study evaluates the performance of a driving power transmission unit of a 50 kW multi-purpose narrow tractor. Methods: The performance of the transmission and forward-reverse clutch, which are the main components of the driving power transmission unit of multi-purpose narrow tractors, was evaluated herein. The transmission performance was evaluated in terms of power transmission efficiency, noise, and axle load, while the forward-reverse clutch performance was evaluated in terms of durability. The transmission's power transmission efficiency accounts for the measurement of transmission losses, which occur in the transmission's gear, bearing, and oil seal. The motor's power was input in the transmission's input shaft. The rotational speed and torque were measured in the final output shaft. The noise was measured at each speed level after installing a microphone on the left, right, and upper sides. The axle load test was performed through a continuous equilibrium load test, in which a constant load was continuously applied. The forward-reverse clutch performance was calculated using the engine torque to axle torque ratio with the assembled engine and transmission. Results: The loss of power in the transmission efficiency test of the driving power unit was 6.0-9.7 kW based on all gear steps. This loss of horsepower was equal to 11-18% of the input power (52 kW). The transmission efficiency of the driving power unit was 81.5-89.0%. The noise of the driving power unit was 50-57 dB at 800 rpm, 70-77 dB at 1600 rpm, and 76-83 dB at 2400 rpm. The axle load test verified that the input torque and axle revolutions were constant. The results of the forward-reverse clutch performance test revealed that hydraulic pressure and torque changes were stably maintained when moving forward or backward, and its operation met the hydraulic design standards. Conclusions: When comprehensively examined, these research results were similar to the main driving power transmission systems from USA and Japan in terms of performance. Based on these results, tractor prototypes are expected to be created and supplied to farmhouses after going through sufficient in-situ adaptability tests.

Automatic Calibration of Storage-Function Rainfall-Runoff Model Using an Optimization Technique (최적화(最適化) 기법(技法)에 의한 저유함수(貯留函數) 유출(流出) 모형(模型)의 자동보정(自動補正))

  • Shim, Soon Bo;Kim, Sun Koo;Ko, Seok Ku
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.12 no.3
    • /
    • pp.127-137
    • /
    • 1992
  • For the real-time control of a multi-purpose reservoir in case of a storm, it is absolutely necessary to forecast accurate flood inflows through a good rainfall-runoff model by calibrating the parameters with the on-line rainfall and water level data transmitted by the telemetering systems. To calibrate the parameters of a runoff model. the trial and error method of manual calibration has been adopted from the subjective view point of a model user. The object of this study is to develop a automatic calibration method using an optimization technique. The pattern-search algorithm was applied as an optimization technique because of the stability of the solution under various conditions. The object function was selected as the sum of the squares of differences between observed and fitted ordinates of the hydrograph. Two historical flood events were applied to verify the developed technique for the automatic calibration of the parameters of the storage-function rainfall-runoff model which has been used for the flood control of the Soyanggang multi-purpose reservoir by the Korea Water Resources Corporation. The developed method was verified to be much more suitable than the manual method in flood forecasting and real-time reservoir controlling because it saves calibration time and efforts in addition to the better flood forecasting capability.

  • PDF

A-team Based Approach for Reactive Power/Voltage Control Considering Steady State Security Assessment (정태 안전성 평가를 고려한 무효전력 전압제어를 위한 A-team기반 접근법)

  • Kim, Doo-Hyun
    • Journal of the Korean Society of Safety
    • /
    • v.11 no.2
    • /
    • pp.150-159
    • /
    • 1996
  • In this paper, an A-team(Asynchronous Team ) based approach for Reactive power and volage control considering static security assessment in a power system with infrastructural deficiencies is proposed. Reactive power and voltage control problem is the one of optimally establishing voltage level given several constraints such as reactive generation, voltage magnitude, line flow, and other switchable reactive power sources. It can be formulated as a mixed-integer linear programming(MILP) problem without deteriorating of solution accuracy to a certain extent. The security assessment is to estimate the relative robustness of the system in Its present state through the evaluation of data provided by security monitoring. Deterministic approach based on AC load flow calculations is adopted to assess the system security, especially voltage security. A security metric, as a standard of measurement for power system security, producting a set of discrete values rather than binary values, is employed. In order to analyze the above two problems, reactive power/voltage control problem and static security assessment problem, in an integrated fashion for real-time operations, a new organizational structure, called an A-team, is adopted. An A-team is an organization for agents which ale all autonomeus, work in parallel and communicate asynchronously, which is well-suited to the development of computer-based, multi-agent systems for operations. This A-team based approach, although it is still in the beginning stage, also has potential for handling other difficult power system problems.

  • PDF

An Efficient Secure Routing Protocol Based on Token Escrow Tree for Wireless Ad Hoc Networks (무선 애드 혹 네트워크에서 보안성을 고려한 Token Escrow 트리 기반의 효율적인 라우팅 프로토콜)

  • Lee, Jae Sik;Kim, Sung Chun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.4
    • /
    • pp.155-162
    • /
    • 2013
  • Routing protocol in ad hoc mobile networking has been an active research area in recent years. However, the environments of ad hoc network tend to have vulnerable points from attacks, because ad hoc mobile network is a kind of wireless network without centralized authentication or fixed network infrastructure such as base stations. Also, existing routing protocols that are effective in a wired network become inapplicable in ad hoc mobile networks. To address these issues, several secure routing protocols have been proposed: SAODV and SRPTES. Even though our protocols are intensified security of networks than existing protocols, they can not deal fluidly with frequent changing of wireless environment. Moreover, demerits in energy efficiency are detected because they concentrated only safety routing. In this paper, we propose an energy efficient secure routing protocol for various ad hoc mobile environment. First of all, we provide that the nodes distribute security information to reliable nodes for secure routing. The nodes constitute tree-structured with around nodes for token escrow, this action will protect invasion of malicious node through hiding security information. Next, we propose multi-path routing based security level for protection from dropping attack of malicious node, then networks will prevent data from unexpected packet loss. As a result, this algorithm enhances packet delivery ratio in network environment which has some malicious nodes, and a life time of entire network is extended through consuming energy evenly.