• Title/Summary/Keyword: data communications

Search Result 5,481, Processing Time 0.032 seconds

Study on Tactical Target Tracking Performance Using Unscented Transform-based Filtering (무향 변환 기반 필터링을 이용한 전술표적 추적 성능 연구)

  • Byun, Jaeuk;Jung, Hyoyoung;Lee, Saewoom;Kim, Gi-Sung;Kim, Kiseon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.1
    • /
    • pp.96-107
    • /
    • 2014
  • Tracking the tactical object is a fundamental affair in network-equipped modern warfare. Geodetic coordinate system based on longitude, latitude, and height is suitable to represent the location of tactical objects considering multi platform data fusion. The motion of tactical object described as a dynamic model requires an appropriate filtering to overcome the system and measurement noise in acquiring information from multiple sensors. This paper introduces the filter suitable for multi-sensor data fusion and tactical object tracking, particularly the unscented transform(UT) and its detail. The UT in Unscented Kalman Filter(UKF) uses a few samples to estimate nonlinear-propagated statistic parameters, and UT has better performance and complexity than the conventional linearization method. We show the effects of UT-based filtering via simulation considering practical tactical object tracking scenario.

Nurses' Communications with Health Professionals (간호사의 의료인 간 의사소통에 대한 조사연구)

  • Cho, Yong Ae;Kim, Mi Kyung;Cho, Myoung Sook;Nam, Eun Young
    • Journal of Korean Clinical Nursing Research
    • /
    • v.19 no.1
    • /
    • pp.20-32
    • /
    • 2013
  • Purpose: To present necessary data for improvement in communications between health professionals in as characterized by nurses' communications. Methods: This study was a descriptive survey research design with a survey of 1,510 registered nurses working in general hospitals (of at least 1,900 beds) in Seoul. A questionnaire on communication in the ICU, nurse-physician and nurse-nurse, was used. Data were collected from January 9 to 20, 2012, and the response rate was 85.0%. Results: Cronbach ${\alpha}$ values ranged from .75 to .89, except for .59 for accuracy (nurse-physician), with .89 overall. The highest mean score was for perception for timeliness [$3.83{\pm}.57$], followed by shift communication (nurse-nurse) [$3.64{\pm}.66$], openness (nurse-nurse) [$3.64{\pm}.65$], accuracy (nurse-nurse) [$3.14{\pm}.61$], openness (nurse-physician) [$2.90{\pm}.75$], understanding (nurse-physician) [$2.82{\pm}.65$], and accuracy (nurse-physician) [$2.70{\pm}.59$]. Subscales of openness, understanding, and shift communication were strongly associated with communication satisfaction. The general characteristics of nurses with different perceptions of communications included age, clinical experience, work pattern, and department. Conclusion: Proactive activities to improve accuracy, openness and mutual understanding between physicians and nurses are required for patient safety. Further studies are also needed to reassess communications and evaluate the relationship between patient outcomes and nurses' job satisfaction after application of strategies to improve communications.

Information and Communications Technology in the Field of Public Security: Crime Prevention and Response System (치안분야의 정보통신기술 활용방안 연구 - 빅데이터기반 치안수요분석과 대응체계를 중심으로 -)

  • Kim, Yeon Soo
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.23-32
    • /
    • 2016
  • Rapid advances in information and communications technology are new challenges and also opportunities for the police. For the purpose of identifying its implications, this study reviews utilization cases of information and communications technology in the field of public security in South Korea and other countries. As theoretical basis for utilization of information and communications technology, this study introduces intelligence-led policing, predictive policing and evidence-based policing. Also, utilization of big-data based crime analysis and crime prediction technology, as well as advancement of information and communications system and command and control technology of the police, are discussed. Based on the identified implications in this study, the following proposals are made. They are (1) procuring basic data, (2) creating an integrated database, (3) increasing utilization of policy decision-makers, (4) exchange and cooperation between related institutions, (5) training professional analyzers, (6) establishing legal basis and practical guidelines for an integrated database.

A Design of the Radio Protocol for Digital Communications in HF band (HF대 디지털통신을 위한 무선프로토콜 설계)

  • Kim, Tae-Hyun;Choi, Jo-Cheon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.153-158
    • /
    • 2007
  • The INMARSAT is able to long range maritime communications that can not use for expensive charge in non-SOLAS ship. Therefore, international discussion for the question that replacements use of MF/HF band for maritime distress and safety communications in maritime. HF data communications system may be effectively utilized for SOLAS ships as well as for the existing non-SOLAS vessels including the fishing boats, which navigate A2 and A3 sea areas. The HF data communications may have various functions such as e-mail services, broadcasting services of up-to-date information related to marine safety, position reporting services, polling services etc. However, the present HF e-mail communications protocols have a problem of increasing calling redundancy as the number of channels in operation increases. This paper new protocol and communication sequence proposed in this submission establishes a proper radio link automatically and adaptively by taking channel traffic into account.

  • PDF

Development of a Packet-Switched Public Computer Network -PART 3:X.25 Software Design and Implementation of the KORNET NNP (Packet Switching에 의한 공중 Computer 통신망 개발 연구-제3부:KORNET NNP의 X.25 Software 설계 및 구현)

  • Choi Jun Kyun;Kim Nak Myeong;Kim Hyung Soon;Un Chong Kwan;Im Gi Hong;Cho Young Jong;Cho Dong Ho
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.23 no.1
    • /
    • pp.1-9
    • /
    • 1986
  • This is the third part of the four-part paper describing the development of a packet-switched computer communication network named the KORNET. In this paper we describe the design and implementation of the X.25 protocol connecting packet mode data terminal equipments(PDTE's) with data circuit terminating equipments(DCE's). In the KORNET, the X.25 protocol has been implemented on the line processing module-A(LPMA) of the network node processor(NNP). In the implementation of X.25, we have divided the software module according to the service function, and have determined the the rules that interact between the modules. Each layer protocol has been developed using the technique of the finite state machine. Before the actual coding of softwares, we hafve used formal software development tools based on the specification and description language (SDL) and program design languate (PDL) recommended by the CCITT. In addition, for the efficient operation of the X.25 protocol system we have analyzed the system performance and the service scheduling method of each module. The results will also be given.

  • PDF

Design and Implementation of a Distributed Data Mining Framework (분산된 데이터마이닝을 위한 프레임워크의 설계 및 구현)

  • Kadel, Prakash;Choi, Ho-Jin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.06c
    • /
    • pp.336-340
    • /
    • 2007
  • We envisage that grid computing environments allow us to implement distributed data mining services, that is, those applications which analyze large sets of geographically distributed databases and information using the computational power and resources of a grid environment. This paper describes an experimental framework towards such a distributed data mining approach, including design considerations and a prototype implementation. Based on the "Knowledge Grid" architecture suggested by Cannataro et al., we identify four major components - user node, broker node, data node, and computation node - and define their individual roles. For implementing the prototype, we have investigated methods for utilizing distributed resources within a grid computing environment, e.g., communication and coordination among the various resources available.

  • PDF

Interference Rejection using the Data-Recycling Algorithm in DS Spread-Spectrum Communications

  • Kim, Nam-Yong
    • Journal of Electrical Engineering and information Science
    • /
    • v.3 no.1
    • /
    • pp.126-130
    • /
    • 1998
  • In this paper, a new interference rejection filter using the data-recycling technique is presented. The reference signal of the interference rejection filter is formed by using chip decisions, which is correlated with the narrowband interference components of the received signal. The decision feedback techniques reduce the distortion of the desired signal, which is introduced by the interference rejection filter through he use of feedback chip decisions. In order to update the filter coefficients a simple and efficient data-recycling technique that has improved performance over the conventional LMS algorithm is used. The performance of the proposed interference rejection filter is compared to filter with conventional LMS linear filter. The results show that the convergence speed of the proposed interference rejection filter using decision feedback and data-recycling technique is significantly faster than that of the conventional filters. Also, BER performance of the interference rejection filter demonstrates the superiority of the proposed filter algorithm.

  • PDF

Intrusion Detection Scheme Using Traffic Prediction for Wireless Industrial Networks

  • Wei, Min;Kim, Kee-Cheon
    • Journal of Communications and Networks
    • /
    • v.14 no.3
    • /
    • pp.310-318
    • /
    • 2012
  • Detecting intrusion attacks accurately and rapidly in wireless networks is one of the most challenging security problems. Intrusion attacks of various types can be detected by the change in traffic flow that they induce. Wireless industrial networks based on the wireless networks for industrial automation-process automation (WIA-PA) standard use a superframe to schedule network communications. We propose an intrusion detection system for WIA-PA networks. After modeling and analyzing traffic flow data by time-sequence techniques, we propose a data traffic prediction model based on autoregressive moving average (ARMA) using the time series data. The model can quickly and precisely predict network traffic. We initialized the model with data traffic measurements taken by a 16-channel analyzer. Test results show that our scheme can effectively detect intrusion attacks, improve the overall network performance, and prolong the network lifetime.

High-performance TDM-MIMO-VLC Using RGB LEDs in Indoor Multiuser Environments

  • Sewaiwar, Atul;Chung, Yeon-Ho
    • Current Optics and Photonics
    • /
    • v.1 no.4
    • /
    • pp.289-294
    • /
    • 2017
  • A high-performance time-division multiplexing (TDM) -based multiuser (MU) multiple-input multipleoutput (MIMO) system for efficient indoor visible-light communication (VLC) is presented. In this work, a MIMO technique based on RGB light-emitting diodes (LEDs) with selection combining (SC) is utilized for data transmission. That is, the proposed scheme employs RGB LEDs for parallel transmission of user data and transmits MU data in predefined slots of a time frame with a simple and efficient design, to schedule the transmission times for multiple users. Simulation results demonstrate that the proposed scheme offers an approximately 6 dB gain in signal-to-noise ratio (SNR) at a bit error rate (BER) of $3{\times}10^{-5}$, as compared to conventional MU single-input single-output (SISO) systems. Moreover, a data rate of 66.7 Mbps/user at a BER of $10^{-3}$ is achieved for 10 users in indoor VLC environments.

A Study on Open of Information Data and Privacy Rights

  • Kim, Taek
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.11
    • /
    • pp.73-78
    • /
    • 2016
  • All citizens will not be infringed communications rub. That can be seen to have the privacy freedom.lot (Internet of things) have released a security system in the era of information privacy appear that public safety and threat. Currently, Information and communication devices can be use criminal investigation, including search and seizure confirmed the fact communication of the communication restriction information storage medium for the common purpose of providing material system, the system provides data and communications. This paper focused on Privacy and open of information data by the Prosecutor and Police in korea. Privacy rights include that transparency information, communication, and protections for the rights of the individuals. It is necessary to be lawfulness of processing, individuals consent while Prosecutors investigations. especially we need explicit condition and National agency need to obtain in order to legitimize their processing of personal information data. The author emphasize are as follows: first, to examine Privacy rights information' necessity and problem, second, to understand Privacy rights and limits, third, to suggest improvements for the purpose of Transparency, codes of conduct and Democracy of information.