• Title/Summary/Keyword: National Defense Data

Search Result 665, Processing Time 0.033 seconds

A Study on PBS-AES Correlator Design adapted in Binary CDMA System (Binary CDMA 시스템에 적용 가능한 PBS-AES 코릴레이터 설계에 관한 연구)

  • Lee, Seon-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.6
    • /
    • pp.2713-2717
    • /
    • 2011
  • To transmit data from straggling sensors in water-processing basic industries etc., used Binary-CDMA system has safety voluntarily. But Binary-CDMA is necessity that react very sensitively in environment change as defense about hacking and cracking of various way that change suddenly. Therefore, this paper is that see added cryptographic algorithm for safety and easy update on correlator that a bottle-neck phenomenon is happened in Binary-CDMA to solve problem that is such. Added cryptographic algorithm does to communicate safe information in channel that is not safe as that achieve 1:1 confrontation for sensors by symmetric cryptographic algorithm.

A Study on Resolving Prisoner's Dilemma Using Incentives and Penalties (인센티브 및 패널티를 적용한 죄수의 딜레마 해소 방안에 관한 연구)

  • Lee, Jinho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.42 no.4
    • /
    • pp.39-48
    • /
    • 2019
  • This paper considers the Prisoner's Dilemma Game in which there exists a dilemma that the best response is that both players are to confess, but doing not confess can give a higher gain to the both players in a social perspective. To resolve such a dilemma in the game, an incentive model to encourage to confess and a penalty model for being imposed when not confessing are introduced, respectively. Then, the conditions are characterized under which incentive or penalty involved in the game's payoffs can make the game rational without a dilemma on both the personal and social perspectives, by taking the payoff values as variables with the incentive and penalty factors. Furthermore, it turns out that the resulting values of incentive and penalty are inversely proportional to each other, and thus, obtaining one of these amounts can provide the other. Simple examples are shown to interpret the theoretical verifications of our models, and randomly generated data based simulation results investigate the tendency of incentive and penalty and the resulting game values for a variety of instances. These results can provide a framework on resolving the dilemma by artificially putting incentive or penalty, although it is careful to apply more generalized real world games.

A Study on Navigation Performance Analysis Technique of Pseudolite Navigation Systems (의사위성 항법시스템의 항법성능 분석기법 연구)

  • Park, Jun-Pyo;Suk, Jinyoung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.42 no.11
    • /
    • pp.947-957
    • /
    • 2014
  • In this paper, the navigation performance analysis techniques of a pseudolite navigation system are proposed. To validate the techniques, operation and navigation test results using real test data are addressed. The conventional navigation performance analysis methods used for satellite navigation system, such as Galileo and GPS, are analyzed to identify the error factor and to check the criterion of UERE defined in the standard document. And then the method to calculate the UERE through the ranging measurements are studied. By identifying the error factor in pseudolite navigation system based on these methods, the available UERE observation and calculation method applicable to pseudolite navigation are proposed. Simulation results considering various circumstances and the actual flight test results are presented to verify the proposed method.

Security System for Location-Based Services (위치 기반 서비스의 보안 시스템)

  • Park, Chan Hyun;Lee, Jaeheung;Park, Yongsu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.161-164
    • /
    • 2012
  • Location-Based Services(LBS) are a general class of computer program-level services used to include specific controls for location data as control features in computer programs. In recent years, the number of smart device(Smart Phone, Tablet PC etc.) users growth was exponential. For that reason, using rate of LBS has drastically increased. The most important thing of LBS is security. Personal information, especially private information likes illness, should not be disclosed. In this paper shows how to attack LBS and how to defense it.

  • PDF

A Study on Reliability Program of the Armed Vehicles (기동/화력 장비 신뢰도 성장모형 적용 사례)

  • Lee, Chang Hee;Ku, Yung Seo;Hong, Hyun Eni;Jung, Il Ho;Park, Du Il;Kim, Sang Boo
    • Journal of Korean Society for Quality Management
    • /
    • v.44 no.3
    • /
    • pp.565-574
    • /
    • 2016
  • Purpose: In this study, A reliability assurance model (or reliability program) is proposed to evaluate the reliability of an armed vehicle. The reliability assurance is performed through the reliability-centered activities in the K-000(armed vehicle) of D-Company Methods: By reflecting the current situations of korea defense industry, a reliability assurance model is built up based on the benchmarking results of world leading companies' best practices in same fields. So The reliability growth model is applied the Crow-AMSAA model Results: This research analysis the K-000(armed vehicle) of D-Company using the DT and OT failure data. and application case study by growth model of armed vehicles Conclusion: This research is result of application case study by growth model of armed vehicles.

The Phenotype of the Soybean Disease-Lesion Mimic (dlm) Mutant is Light-Dependent and Associated with Chloroplast Function

  • Kim, Byo-Kyong;Kim, Young-Jin;Paek, Kyoung-Bee;Chung, Jong-Il;Kim, Jeong-Kook
    • The Plant Pathology Journal
    • /
    • v.21 no.4
    • /
    • pp.395-401
    • /
    • 2005
  • The dlm (disease lesion mimic) mutant of soybean (Glycine max L. Merr) shows the similar lesion of a soybean disease caused by a fungus, Corynespora cassilcola. The lesion was examined at cellular and molecular level. Trypan blue staining result indicated that cell death was detectable in the entire region of leaves excluding veins when the lesions had already been developed. We found that the mesophyll cells of palisade layer in the dim mutant appeared to be wider apart from each other. The chloroplasts of the dim mutant cells contained bigger starch granules than those in normal plants. We also found that the lesion development of dlm plant was light-dependent and the starch degradation during the dark period of diurnal cycle was impaired in the mutant. Three soybean pathogenesis-related genes, PR-1a, PR-4, and PR-10, were examined for their expression patterns during the development of disease lesion mimic. The expression of all three genes was up-regulated to some extent upon the appearance of the disease lesion mimic. Although the exact function of DLM protein remains elusive, our data would provide some insight into mechanism underling the cell death associated with the dim mutation.

The Effect of Inclusive Leadership on the Work Engagement: An Empirical Study from Turkey

  • ASLAN, Huseyin;MERT, Ibrahim Sani;SEN, Cem
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.11
    • /
    • pp.169-178
    • /
    • 2021
  • Motivating employee work engagement, which has emerged as one of the most significant drivers of high performance and achievement in today's dynamic environment, has become essential in gaining a sustainable competitive advantage. As widely known, leadership is a primary factor affecting work engagement. This is also directly related to a specific style of leadership exercised. Leadership styles affect the work engagement levels of the employees. The distracting nature of leadership type can have adverse impacts on individuals' behaviors. To provide a comprehensive understanding of the phenomenon, this article draws on social interaction theory and social exchange theory to investigate the potential effects of inclusive leadership on work engagement within the workplace, and the mediating role of psychological safety on the relationship between inclusive leadership and the work engagement. Here, psychological safety is needed by employees to avoid and manage negative feelings. SPSS and AMOS software was applied to survey data obtained from (n = 373) employees. Results revealed that inclusive leadership is a strong predictor for work engagement, and psychological safety partially mediates the link between inclusive leadership and work engagement. Implications for theory and practice alongside limitations are discussed.

A Study on the Artillery shell's EFD based on Charge (장약에 기반한 포병탄 EFD 산출 모형에 관한 연구)

  • Kim, Hyunsik;Ma, Jungmok
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.1
    • /
    • pp.11-21
    • /
    • 2019
  • Modeling and simulation(M&S) method are used to quantify the weapon effectiveness. The weapon effectiveness of artillery shells was also partially studied, but there was a lack of research on the effects of the choice of charge. Therefore, this paper presents an artillery shell's EFD(Expected Fractional Damage) calculation model based on the charge and identifies differences in the weapon effectiveness of 3D building targets according to the selection of the charge. First, the input data of the calculation model was collected and a required number of shoots was calculated to achieve the desired effects using the proposed model. Finally, a paired sample t-test was conducted to verify the proposed model.

Development of Key Performance Indicators in Ammunition Demilitarization Facility Using the Balanced Score Card (균형성과표(BSC)를 활용한 탄약 비군사화 시설의 핵심성과지표 개발)

  • Bae, Young-Min;Han, Seung-Jo
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.1
    • /
    • pp.17-25
    • /
    • 2021
  • Ammunition Demilitarization facility (ADF) should be set up the feasible goals and continue to operate, taking into account non-profit characteristics. However, due to the lack of performance measurement methods in ADF, which are essential to national policy at a significant cost each year, the reliability of the evaluation results can be insufficient. In this paper, the Balanced Score Card (BSC) method was applied that could be evaluated to reflect the financial and non-financial features. The relevant literature research and army regulations reflected the results of various interviews of the expert group. The extraction of success performance area in ADF was confirmed using the BSC method and the Decision Variable (DV) candidate was created to use regression for selecting the DV. Additionally, the key performance indicator was presented by verification the feasibility of content by conducting the survey of experts. The implications of this paper are as follows. First, the proposed BSC model was found to be suitable for practical use in ADF reflecting the non-profit characteristics. Second, accurate evaluation of ADF can contribute to long-term development of ADF. Finally, it can be applied to the management process of the other military sector, so it can be expected to play a role in providing basic data and spreading it to other areas.

Intermediate Node Mobility Management Technique by Real-Time Monitoring in CCN Environment (CCN 환경에서 실시간 모니터링에 의한 중간노드 이동성 관리 기법)

  • Ko, Seung-Beom;Kwon, Tae-Wook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.5
    • /
    • pp.783-790
    • /
    • 2022
  • The development of SNS and video platforms provided an opportunity to explode the activation of content production and consumption. However, in the legacy system, due to the host-based location-oriented data transmission, there are inherent limitations in efficient operation and management. As an alternative to this, a Contents Centric Network (CCN) was studied. In this paper, when intermediate nodes located between the information provider and the information requester between the real-time streaming services in the CCN environment move or restrict their use, failure through monitoring of wireless reception strength to solve problems like disconnection of transmission quality at the information consumer. We propose a stable intermediate node management mechanism through active response before occurrence.