• Title/Summary/Keyword: military applications

Search Result 464, Processing Time 0.03 seconds

RBAC-based health care service platform for individual recommended health information service (RBAC에 기반한 개인 맞춤형 건강 정보 제공 헬스케어 서비스 플랫폼)

  • Song, Je-Min;Kim, Myung-Sic;Jeong, Kyeong-Ja;Shin, Moon-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.3
    • /
    • pp.1740-1748
    • /
    • 2014
  • In this paper, we propose an RBAC based personalized health care service platform in order to provide smart management of personal health record using smart devices. It helps to guide healthful service and provide useful information according to one's individual health record. Personalized health care services platform supports a healthy lifestyle by measuring personal health information in a hospital clinical, imaging, and drug data, as well as that can be obtained from smart devices. Everyone can enter his health related data in everyday life such as food, sleeping time, mood, movement and exercise so that one can manage his personal health information of modern smart features. In addition, if necessary, personal health information can be provided to the hospital information system and staff with the consent of the individual. It can be contributed to simplify the complex process for remote medical. The proposed platform, which applies role based access control model to protect security and privacy, supports a smart health care services for users by providing personalized health care services through the smart applications.

Time Synchronization Scheme of Cyber-Physical Systems for Military Training Systems (국방 훈련체계용 가상물리시스템 시간 동기화 기법)

  • Hong, Seok-Joon;Lee, Woo-Yeob;Joe, In-Whee;Kim, Won-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.12
    • /
    • pp.1814-1823
    • /
    • 2016
  • LVC(live-virtual-constructive) integrated training system is a representative cyber-physical system. Each systems in a LVC system has different time domain, resolution and operation methods. So, it is very important to integrate different middlewares as a common middleware for heterogeneous systems using inter-working GWs. Especially, since the LVC system uses different time, it is necessary to study the method for guaranteeing causality and time synchronization among the events from different systems. In this study, we propose an time synchronization scheme to integrate the virtual and constructive system which use the simulation time of HLA (High Level Architecture)/ RTI (Run Time Infrastructure) into the live system based on the OMG DDS (Data Distribution Service). We propose a precise time synchronization scheme based on HLA time management and clock federate between participants and federates which are the communication objects of DDS and HLA/RTI respectively. In addition, we verified that time is well-synchronized among heterogeneous systems using the suggested scheme by implementing and demonstrating simulation applications on each middleware.

Design of Wind Turbines for Reducing Interference to Radar Signals (레이더 신호 간섭의 최소화를 위한 풍력 발전기 설계)

  • Park, Kang-Kook;Chin, Hui-Cheol;Kim, Kyung-Tae;Kim, Hyo-Tae;Kim, Jin-Bong
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.4
    • /
    • pp.533-540
    • /
    • 2012
  • The use of wind energy is gaining importance because of its many advantages. Nations worldwide are promoting the installation of wind farms to produce electricity in an attempt to tackle climate change and increasing oil costs. But, wind turbines can generate undesired signals which disturb the performance of military radar systems. Because the current generation of on and off-shore three bladed wind turbines have radar signatures consistent with their very large physical size. So this study considers the options available for the reduction of wind turbine radar signature and presents solutions for each of the main external turbine components. The radar signature reduction approaches are based on existing technologies developed for aerospaces stealth applications. However, the realization of these for the purposes of reduction wind turbine radar signatures is a novel development, particularly in the solutions proposed. This paper is presented techniques which reduce radar signatures of wind turbine. We know that radar signatures of wind turbine reduce by using these techniques.

Fabrication and Characterization of the Carbon Fiber Composite Sheets (탄소섬유를 이용한 열가소성 복합재료 시트 제조 및 특성)

  • Lee, Yun-Seon;Song, Seung-A;Kim, Wan Jin;Kim, Seong-Su;Jung, Yong-Sik
    • Composites Research
    • /
    • v.28 no.4
    • /
    • pp.168-175
    • /
    • 2015
  • Recently, the applications of carbon fiber reinforced plastics (CFRPs) have become broader than ever when it comes to such industries as automotive, ships, aerospace and military because of their lightweight-ness and high mechanical properties. Thermosetting plastics like epoxy are frequently used as the binding matrix in CFRPs due to their high hardness, wetting characteristics and low viscosity. However, they cannot melted and remolded. For this reason, thermosetting plastic wastes have caused serious environmental problems with the production of fiber reinforced plastics. Thus, many studies have focused on the carbon fiber reinforced thermoplastics (CFRTPs) and recycling carbon fiber. In this study, recycled carbon fiber (RCF) was prepared from CFRPs using a pyrolysis method, which was employed to separate resin and carbon fiber. The degree of decomposition for epoxy resin was confirmed from thermal gravimetric analysis (TGA) and scanning electron microscope (SEM). The RCF was cut and ground to prepare a carbon fiber composite sheet (CFCS). CFCS was manufactured by applying recycled carbon fibers and various thermoplastic fibers. Various characterizations were performed, including morphological analyses of surface and cross-section, mechanical properties, and crystallization enthalpy of CFCS at different cooling conditions.

Development of a Crew Resource Management Training Program for Reduction of Human Errors in APR-1400 Nuclear Power Plant (국내 원자력발전소 인적오류 저감을 위한 Crew Resource Management 교육훈련체계 개발)

  • Kim, Sa-Kil;Byun, Seong-Nam;Lee, Dhong-Hoon;Jeong, Choong-Heui
    • Journal of the Ergonomics Society of Korea
    • /
    • v.28 no.1
    • /
    • pp.37-51
    • /
    • 2009
  • The nuclear power industry in the world has recognized the importance of integrating non-technical and team skills training with the technical training given to its control room operators to reduce human errors since the Three Mile Island and Chernobyl accidents. The Nuclear power plant (NPP) industry in Korea has been also making efforts to reduce the human errors which largely have contributed to 120 nuclear reactor trips from the year 2001 to 2006. The Crew Resource Management (CRM) training was one of the efforts to reduce the human errors in the nuclear power industry. The CRM was developed as a response to new insights into the causes of aircraft accidents which followed from the introduction of flight recorders and cockpit voice recorders into modern jet aircraft. The CRM first became widely used in the commercial airline industry, but military aviation, shipboard crews, medical and surgical teams, offshore oil crews, and other high-consequence, high-risk, time-critical industry teams soon followed. This study aims to develop a CRM training program that helps to improve plant performance by reducing the number of reactor trips caused by the operators' errors in Korean NPP. The program is; firstly, based on the work we conducted to develop a human factors training from the applications to the Nuclear Power Plant; secondly, based on a number of guidelines from the current practicable literature; thirdly, focused on team skills, such as leadership, situational awareness, teamwork, and communication, which have been widely known to be critical for improving the operational performance and reducing human errors in Korean NPPs; lastly, similar to the event-based training approach that many researchers have applied in other domains: aircraft, medical operations, railroads, and offshore oilrigs. We conducted an experiment to test effectiveness of the CRM training program in a condition of simulated control room also. We found that the program made the operators' attitudes and behaviors be improved positively from the experimental results. The more implications of the finding were discussed further in detail.

Experimental Performance Analysis of BCJR-Based Turbo Equalizer in Underwater Acoustic Communication (수중음향통신에서 BCJR 기반의 터보 등화기 실험 성능 분석)

  • Ahn, Tae-Seok;Jung, Ji-Won
    • Journal of Navigation and Port Research
    • /
    • v.39 no.4
    • /
    • pp.293-297
    • /
    • 2015
  • Underwater acoustic communications has been limited use for military purposes in the past. However, the fields of underwater applications expend to detection, submarine and communication in recent. The excessive multipath encountered in underwater acoustic communication channel is creating inter symbol interference, which is limiting factor to achieve a high data rate and bit error rate performance. To improve the performance of a received signal in underwater communication, many researchers have been studied for channel coding scheme with excellent performance at low SNR. In this paper, we applied BCJR decoder based ( 2,1,7 ) convolution codes and to compensate for the distorted data induced by the multipath, we applying the turbo equalization method. Through the underwater experiment on the Gyeungcheun lake located in Mungyeng city, we confirmed that turbo equalization structure of BCJR has better performance than hard decision and soft decision of Viterbi decoding. We also confirmed that the error rate of decoder input is less than error rate of $10^{-1}$, all the data is decoded. We achieved sucess rate of 83% through the experiment.

Performance Measurement and Analysis of RTI in the HLA-based Real-time Distributed M-SAM Simulation (HLA 기반 실시간 분산 M-SAM 시뮬레이션에서 RTI성능 측정 및 분석)

  • Choi Sang-Yeong;Cho Byung-Kyu;Lee Kil-Sup
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.2
    • /
    • pp.149-156
    • /
    • 2005
  • The HLA is the simulation architecture standard that the civilian and military simulation communities are deeply interested in. We can find various successful practices applying HLA to constructive simulations such as war games in domestics and overseas. However, any case of real-time distributed simulations has not been reported. The reason is that a message transmission period via RTI in a network layer varies according to computing power, simulation nodes, transmission types, and packet size; further a message processing time in an application layer depends on its processing methods, thus too difficult to set up real-time constraints for the enhancement of a real-time resolution. Hence, in this paper we have studied the real-time constraints of RTI for the development of the M-SAM simulator. Thus we have developed a HLA based pilot simulator using 6 PC's in LAN and then measured and analysed the performance of the RTI. As the results of our work, we could obtain the quantitative values for message delay, RTI overhead and RTI packet transmission ratio by a real operation scenario and loads, which are not shown in the previous works. We also expect that the results can be used as a guideline to set up the number of targets, transmission frequency and message processing method in the development of the M-SAM simulator and similar applications.

SAR Image Impulse Response Analysis in Real Clutter Background (실제 클러터 배경에서 SAR 영상 임펄스 응답 특성 분석)

  • Jung, Chul-Ho;Jung, Jae-Hoon;Oh, Tae-Bong;Kwang, Young-Kil
    • Korean Journal of Remote Sensing
    • /
    • v.24 no.2
    • /
    • pp.99-106
    • /
    • 2008
  • A synthetic aperture radar (SAR) system is of great interest in many fields of civil and military applications because of all-weather and luminance free imaging capability. SAR image quality parameters such as spatial resolution, peak to sidelobe ratio (PSLR), and integrated sidelobe ratio (ISLR) can be normally estimated by modeling of impulse response function (IRF) which is obtained from various system design parameters such as altitude, operational frequency, PRF, etc. In modeling of IRF, however, background clutter environment surrounding the IRF is generally neglected. In this paper, analysis method for SAR mage quality is proposed in the real background clutter environment. First of all, SAR raw data of a point scatterer is generated based on various system parameters. Secondly, the generated raw data can be focused to ideal IRF by range Doppler algorithm (RDA). Finally, background clutter obtained from image of currently operating SAR system is applied to IRF. In addition, image quality is precisely analyzed by zooming and interpolation method for effective extraction of IRF, and then the effect of proposed methodology is presented with several simulation results under the assumption of estimation error of Doppler rate.

Study on Legal Regulations for Utilization of Drone in Private Security (민간경비에서 드론 활용과 법적 규제에 관한 연구)

  • Kim, Kye Won;Seo, Jin Seok
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.163-178
    • /
    • 2017
  • Recently, drone applications have been expanded not only in the military and security fields but also in daily life such as commercial and sports, and there is also a growing interest in using drone for private security work. This study focuses on the discussion on the use of drones in private security, drones regulation in the related laws such as the Private Security Act and the Aviation Safety Law, and major issues in accepting the Private Security Act. First, it focuses on the scope of private security work as defined by the Private Security Act, focusing on the use of drones as surveillance, information gathering, guidance and warning services, evacuation services, search and related material transport services, respectively. Second, the related laws for the use of drones in private security work include the Private Security Act and the Aviation Safety Act. However, the Private Security Act does not prescribe the current drones and the use of drones is regulated by Aviation Safety Act. Third, it is necessary to adjust the qualifications and authority range of security guards in the Private Security Act, to accept the drones as a type of security equipment, and to consider how countermeasures against threat types using drones should be accepted in the Private Security Act.

Reversible data hiding technique applying triple encryption method (삼중 암호화 기법을 적용한 가역 데이터 은닉기법)

  • Jung, Soo-Mok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.1
    • /
    • pp.36-44
    • /
    • 2022
  • Reversible data hiding techniques have been developed to hide confidential data in the image by shifting the histogram of the image. These techniques have a weakness in which the security of hidden confidential data is weak. In this paper, to solve this drawback, we propose a technique of triple encrypting confidential data using pixel value information and hiding it in the cover image. When confidential data is triple encrypted using the proposed technique and hidden in the cover image to generate a stego-image, since encryption based on pixel information is performed three times, the security of confidential data hidden by triple encryption is greatly improved. In the experiment to measure the performance of the proposed technique, even if the triple-encrypted confidential data was extracted from the stego-image, the original confidential data could not be extracted without the encryption keys. And since the image quality of the stego-image is 48.39dB or higher, it was not possible to recognize whether confidential data was hidden in the stego-image, and more than 30,487 bits of confidential data were hidden in the stego-image. The proposed technique can extract the original confidential data from the triple-encrypted confidential data hidden in the stego-image without loss, and can restore the original cover image from the stego-image without distortion. Therefore, the proposed technique can be effectively used in applications such as military, medical, digital library, where security is important and it is necessary to completely restore the original cover image.