• Title/Summary/Keyword: Network Centric Operation

Search Result 54, Processing Time 0.021 seconds

Optimal Location Selection Algorithm of MSAP for Tactical Communication Networks (전술통신 환경 구축을 위한 MSAP의 최적위치 선정 알고리즘)

  • Cho, Sang-Mok;Kang, Jung-Ho;Kim, Jae-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1736-1743
    • /
    • 2011
  • In Network Centric Warfare (NCW) environment, having a tactical communication network which provides high data exchange rate is very important. In the process, Korean Army developed Mobile Subscriber Access Point (MSAP) which is based on the commercial Wireless BroadBand (Wibro). MSAP is a vehicle attached base station which provide high data exchange communication environment in a given area. Thus MSAP can provide high data exchange rate and mobility to accomplish missions in the battlefield more effectively. In this paper, we propose an operational strategy of using MSAP to provide tactical communication network in the battlefield. The idea is to find the optimal location point of the MSAP in the operational area where all the troops in the operational area can be supported by the MSAP with a minimum number of MSAP. Since the current Korean Army's basic idea of using MSAP is just distribute this MSAP to each troop, so by applying our strategy we can save MSAP devices for more flexible operation. We will show our strategy's benefits through the mathematical model and the algorithm of the presented problem.

Analysis on the requirement of UMPC to construct the tactical datalink system (전술데이터 링크 시스템 구축에 필요한 항공기용 UMPC 요구 성능 분석)

  • Lim, Jun-Ho;Lee, Seoung-Pil
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.5
    • /
    • pp.604-609
    • /
    • 2010
  • The tactical datalink system has been recognized as the key element in Network Centric Warfaret(NCW). The military has been putting great efforts into establishing datalink system using existing tactical radio and UMPC. but the aircraft operational environment and the requirement specification for equipments mounted in the avionics are differentiated with those in other platforms, so special efforts are needed to select suitable UMPC. In this paper, we consider the requirement analysis for UMPC in respect of processor performance, operation system (OS) and NVG compatibility. Additionally we have to make a effort to understand the operational environment of aircraft and examine th standard to select the appropriate UMPC, and then we expect to establish the tactical datalink system successfully.

CGRA Compilation Boost up for Acceleration of Graphics (영상처리 가속을 위한 CGRA compilation 속도 향상)

  • Kim, Wonsub;Choi, Yoonseo;Kim, Jaehyun
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2014.06a
    • /
    • pp.166-168
    • /
    • 2014
  • Coarse-grained reconfigurable architectures (CGRAs) present a potential of high compute throughput with energy efficiency. A CGRA consists of an array of functional units (FU), which communicate with each other through an interconnect network containing transmission nodes and register files. To achieve high performance from the software solutions mapped onto CGRAs, modulo scheduling of loops is generally employed. One of the key challenges in modulo scheduling for CGRAs is to explicitly handle routings of operands from a source to a destination operations through various routing resources. Existing modulo schedulers for CGRAs are slow because finding a valid routing is generally a searching problem over a large space, even with the guidance of well-defined cost metrics. Applications in traditional embedded multimedia domains are regarded relatively tolerant to a slow compile time in exchange of a high quality solution. However, many rapidly growing domains of applications, such as 3D graphics, require a fast compilation. Entrances of CGRAs to these domains have been blocked mainly due to its long compile time. We attack this problem by utilizing patternized routes, for which resources and time slots for a success can be estimated in advance when a source operation is placed. By conservatively reserving predefined resources at predefined time slots, future routings originated from the source operation are guaranteed. Experiments on a real-world 3D graphics benchmark suite show that our scheduler improves the compile time up to 6000 times while achieving average 70% throughputs of the state-of-art CGRA modulo scheduler, edge-centric modulo scheduler (EMS).

  • PDF

The Study on the improvement plan for Military combat power by the future computer (미래형컴퓨터를 이용한 군전투력 발전방안 연구)

  • Heo, Yeong Dae
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.57-66
    • /
    • 2013
  • Predicting pattern of future combat ensures a successful war. It is possible to anticipate the shape of the future combat from the fighting method of US Army in the Iraq War. The fighting method: a series of combat progress by real time information to pinpoint strike using a guided weapon by GPS, an intelligence satellite and unmanned surveillance vehicle (USV), shows that real time unification combat power is key element for decide outcome of a war. The NCW is an organically connected network centric warfare paradigm by networking a factor of operation. In this paper, studied on the improvement plan for combat power by the future computer like a portable computer, an audio-recognized computer and non-keyboard computer. In addition, this paper attempts to establish a comprehensive intelligence network of Korea Marine Corps and to apply to combat or training.

Improvement of the Data Authentication of CCN (CCN 데이터 인증 기술의 성능 개선 연구)

  • KIM, DAEYOUB
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.341-349
    • /
    • 2017
  • CCN proposes that intermediate network nodes on a network path for a transmitted data-packet cache the data-packet. If the nodes receive request packets for the cached data, the nodes can directly respond to the request-packets using the cached data. Since a request-packet can be responded by one of the intermediate nodes on a path of the request-packet, both faster response time and decreased data transmission amount are expected comparing to the existing host centric networking. However, CCN is vulnerable against forgery attacks because data-packet receivers cannot identify a data provider. Hence, a data authentication scheme is essentially needed to make CCN more secure. But such a data authentication process is one of the main causes of CCN-based service delays. This paper first analyzes the problems of a CCN data authentication scheme, then proposes an improved authentication operation scheme for efficiently authenticating data, and finally evaluates its performance.

A Study on the Method of Constructive Simulation Operation Analysis for Warfighting Experiment Supplied with the Validation Evaluation (타당성 평가가 보완된 모델 운용상의 전투실험 모의분석 절차 연구)

  • Park, Jin-Woo;Kim, Nung-Jin;Kang, Sung-Jin;Soo, Hyuk
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.77-87
    • /
    • 2010
  • Currently, our society has been changed from the industrial society to the information society. As the war progresses to Information Warfare, Network-Centric Warfare, Long-Range Precision Engagement and Robot Warfare, the military should advance to High-tech Scientific force. For this creation of the war potential, it is regarded as the warfighting experiment is a critical method. Surely it is rational that LVC(Live Virtual Constructive simulation) is desirable to make the warfighting experiment. But because it is limited by the cost, the time, the place and the resource, the constructive simulation(M&S : Modeling&Simulation) is a good tool to solve those problems. There are some studies about the evaluation process for developing the model, but it is unsatisfying in the process of the constructive simulations' operation. This study focuses on the way of constructive simulation operation, which is supplied with the evaluation process(VV&A : Verification Validation & Accreditation). We introduce the example of the rear area operation simulation for "appropriateness evaluation to the organization of logistic corps" by the AWAM(Army Weapon Analysis Model). This study presents the effective methods of the constructive simulations, which is based on the reliable evaluation process, so it will contribute to the warfighting experiments.

Development of Korean Joint Tactical Data Link System Based on CLIP (CLIP 기반의 한국형 합동전술데이터링크 체계 개발)

  • Kim, Seung-Chun;Lee, Hyung-Keun
    • Journal of IKEEE
    • /
    • v.15 no.1
    • /
    • pp.15-22
    • /
    • 2011
  • In order to performing the joint operation of Korean army efficiently, informations about surveillance, reconnaissance, and situation awareness need to be possessed jointly. In the first development phase (basis type) of the Korean joint tactical data link system (JTDLS-K), essential tactical information and recognized situation are owned among platforms in common by using existing wireless terminals. In the second development phase (completion type) of the JTDLS-K, a JTDLS which can perform network centric warfare (NCW) will be developed in due consideration of technology development of the basis type and common technology maturity degree. This is a joint battlefield system that can show fighting power simultaneous and polysynthetically through providing command and control messages effectively to each platform, which is participating in the joint and combined operations. In this paper, the development of JTDLS-K with a common data processor based on common link integration processing (CLIP) is described. From the test results of the system presented in this paper, it is demonstrated that quadrature phase shift keying (QPSK) signals can be applied to the system.

Interference Influence Analysis on the Interoperability in the Combined Military Communication Systems (통합 군 통신 시스템에서 상호운용으로 인한 간섭 영향 분석)

  • Kim, Tae-Woo;Kim, Jung;Kwag, Young-Kil
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.25 no.3
    • /
    • pp.365-371
    • /
    • 2014
  • It is essential for the combined military weapon system to be equipped with interoperability for the efficient combat operation in the modern warfare environment. Since most of modern military systems utilize the electromagnetic wave for the radio communication in the network-centric warfare system, they can be vulnerable to the mutual interference among the adjacent combined military systems. In this paper, the typical radio communication systems are modeled with the modulation types of both spread and non-spread spectrum system. The various interference signals were generated for the simulation of the mutual interference influence from the adjacent radar and communication systems. The simulation results show that the detection performance of the victim communication receiver is seriously affected by the various interferences such as the types of modulation and the ratio of the overlapping bandwidth of the adjacent interferers. This result will be useful for defining the criteria of the interference protection in the combined military system for the interoperability in the future.

A Study on the Analysis of U.S.A Navy and R.O.K Military C4I System and Future Development (미해군과 한국군 C4I 체계 분석 및 발전 방향에 관한 연구)

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Jo, Yong-Gun;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.59-66
    • /
    • 2011
  • The representative concept of the future war is NCW. The main point of NCW is that it is connected by networ ks and gathers the battlefield status in real time, managing and controlling it. This is most needed in the navy. Operations of the navy are carried out in wide areas, individually or together. During this process, sharing information between each warship should be essential. Furthermore in the case of the American navy, they see the entire world as the operation area so it is a representative example of NCW. The C4I system of the Korean army is separated a ccording to the difference of each army's tactics and weapon system, being developed and managed differently. The refore there is a problem of interoperability lacking in each system. This paper analyzes the developed C4I system of the American navy to analyze the problems of C4I system of the Korean army, and propose the future direction of its development.

Energy-Aware Data-Preprocessing Scheme for Efficient Audio Deep Learning in Solar-Powered IoT Edge Computing Environments (태양 에너지 수집형 IoT 엣지 컴퓨팅 환경에서 효율적인 오디오 딥러닝을 위한 에너지 적응형 데이터 전처리 기법)

  • Yeontae Yoo;Dong Kun Noh
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.18 no.4
    • /
    • pp.159-164
    • /
    • 2023
  • Solar energy harvesting IoT devices prioritize maximizing the utilization of collected energy due to the periodic recharging nature of solar energy, rather than minimizing energy consumption. Meanwhile, research on edge AI, which performs machine learning near the data source instead of the cloud, is actively conducted for reasons such as data confidentiality and privacy, response time, and cost. One such research area involves performing various audio AI applications using audio data collected from multiple IoT devices in an IoT edge computing environment. However, in most studies, IoT devices only perform sensing data transmission to the edge server, and all processes, including data preprocessing, are performed on the edge server. In this case, it not only leads to overload issues on the edge server but also causes network congestion by transmitting unnecessary data for learning. On the other way, if data preprocessing is delegated to each IoT device to address this issue, it leads to another problem of increased blackout time due to energy shortages in the devices. In this paper, we aim to alleviate the problem of increased blackout time in devices while mitigating issues in server-centric edge AI environments by determining where the data preprocessed based on the energy state of each IoT device. In the proposed method, IoT devices only perform the preprocessing process, which includes sound discrimination and noise removal, and transmit to the server if there is more energy available than the energy threshold required for the basic operation of the device.