http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
군용 무인기 체계 연동 상호 운용성 최신화를 위한 STANAG-4586 기반 무인기 표준화 적용 방안
김학준(Hack-Joon Kim),윤창배(Chang-Bae Yoon),홍수운(Su-Woon Hong),이우신(Woo-Sin Lee),유인덕(In-Deok Yoo),조세현(Se-Hyeon Jo) 한국컴퓨터정보학회 2019 韓國컴퓨터情報學會論文誌 Vol.24 No.6
With the development of various types of military Unmanned Aircraft(UA)s, the need for interworking and integration between different platforms gradually increased. In order to ensure interoperability at each military UA System(UAS) level, North Atlantic Treaty Organization(NATO) has established STANAG-4586 "Standard Interfaces of Unmanned Aircraft(UA) Control Systems(UCS) for NATO UA Interoperability-Interface Control Document". This paper looks at the basic design structure of STANAG-4586 and the changes on Edition 4 to enhance joint operational capability through reflecting and updating the interoperability design of the military UAS. In particular, we analyze the enhanced Datalink Transition/Handover Procedure and Autonomous functions, one of the biggest features added to the edition. Through this, we propose a modification of UA data link exclusive control using UA Bypass structure, which was impossible in the one-to-one communication structure between existing UA and Core UCS(CUCS). We also suggest ways to improve UA operational reliability by applying Autonomous Functions that directly decides how to deal with emergency situations, rather than by a remote operator over CUCS.
김진우(Jin-Woo Kim),이우신(Woo-Sin Lee),김학준(Hack-Joon Kim),진소연(So-Yeon Jin),김민철(Min-Chul Kim) 한국컴퓨터정보학회 2019 韓國컴퓨터情報學會論文誌 Vol.24 No.12
본 논문에서, 우리는 TDMA 방식의 전술 데이터링크에서 원활한 전술 데이터의 분배를 위한 Dynamic TDMA 방식을 설계하였다. 기존의 전술 데이터링크는 고정된 시간 무선 자원을 이용했기 때문에 운용 도중 네트워크 상태에 따라 자원 현황을 변경하는 것이 불가능했다. 이러한 한계를 극복하기 위해 초기 타임슬롯 할당, 운용 중간 타임슬롯 할당, 타임슬롯 반납, 타임슬롯 회수와 같은 DTDMA 처리방식과 관련 메시지를 설계, 구현하고 그러한 상황을 모의하여 실험하였다. 이것으로 상황에 따라 타임슬롯 자원을 효율적으로 분배하여 사용하는 방식이 적용 가능함을 보였다. 따라서 차후 전술 데이터링크에 DTDMA 통신 관리를 할 수 있도록 연구를 계속할 것이다. In this paper, we designed a dynamic TDMA scheme for smooth tactical data distribution in TDMA tactical datalinks. Since the existing tactical datalinks use fixed time radio resources, it is impossible to change the resource status according to network conditions during operation. To overcome these limitations, we designed, implemented, and simulated the DTDMA processing and related messages such as initial timeslot allocation, intermediate time slot allocation, time slot return, and timeslot retrieval. As a result, it was shown that the method of effectively allocating and using timeslot resources according to the situation is applicable. Therefore, we will continue research to manage DTDMA communication on tactical data link in the future.
데이터링크 소프트웨어에 대한 소프트웨어 제품라인 공학 적용 연구
김진우(Jin-Woo Kim),이우신(Woo-Sin Lee),김학준(Hack-Joon Kim),진소연(So-Yeon Jin),조세현(Se-Hyeon Jo) 한국컴퓨터정보학회 2018 韓國컴퓨터情報學會論文誌 Vol.23 No.12
In this paper, we have studied how to reuse common data link software by applying software product line engineering. Existing common data link software performed different stages of design, implementation, and testing without sharing the accumulated knowledge of different developers. In this situation, developers agreed that sharing the assets of each project and reusing the previously developed software would save human and time costs. Even with the initial difficulties, the common Data Link is a continually proposed project in the defense industry, so we decided to build a product line. The common data link software can be divided into two domains. Among them, the initial feature model for the GUI software was constructed, and the following procedure was studied. Through this, we propose a plan to build a product line for core assets and reuse them in newly developed projects.
유인덕(In-Deok Yoo),이우신(Woo-Sin Lee),김학준(Hack-Joon Kim),진소연(So-Yeon Jin),조세현(Se-Hyeon Jo) 한국컴퓨터정보학회 2018 韓國컴퓨터情報學會論文誌 Vol.23 No.12
In this paper, we propose schemes of blockchain utilization in tactical communication environment. The military tactical communication environment has similar characteristics with blockchain network such as distributed architecture, decentralization, and the need for data integrity. A communication node constituting a tactical communication network is constituted by a system capable of configuring and connecting a network for each node. When a communication node, having such capabilities, is configured as a node of blockchain network, various functions could be performed. In this paper, we propose utilization schemes of authentication, integrity, record management, and privilege control based blockchain technology. Functions for authentication, integrity verification, and record management need to ensure the stored data and could track history. The requirement of function’s characteristics are matched to blockchain which is storing data sequentially and difficult to hack data, so that it could perform functionally and sufficiently well. Functions for authority control should be able to assign different privileges according to the state of the requestor. Smart contract will function when certain conditions are satisfied and it will be able to perform its functions by using it. In this paper, we will look over functions and utilization schemes of blockchain technology which could reliably share and synchronize data in a tactical communication environment composed of distributed network environment.