• Title/Summary/Keyword: 예상탐지확률

Search Result 9, Processing Time 0.022 seconds

Estimation of underwater acoustic uncertainty based on the ocean experimental data measured in the East Sea and its application to predict sonar detection probability (동해 해역에서 측정된 해상실험 데이터 기반의 수중음향 불확정성 추정 및 소나 탐지확률 예측)

  • Dae Hyeok Lee;Wonjun Yang;Ji Seop Kim;Hoseok Sul;Jee Woong Choi;Su-Uk Son
    • The Journal of the Acoustical Society of Korea
    • /
    • v.43 no.3
    • /
    • pp.285-292
    • /
    • 2024
  • When calculating sonar detection probability, underwater acoustic uncertainty is assumed to be normal distributed with a standard deviation of 8 dB to 9 dB. However, due to the variability in experimental areas and ocean environmental conditions, predicting detection performance requires accounting for underwater acoustic uncertainty based on ocean experimental data. In this study, underwater acoustic uncertainty was determined using measured mid-frequency (2.3 kHz, 3 kHz) noise level and transmission loss data collected in the shallow water of the East Sea. After calculating the predictable probability of detection reflecting underwater acoustic uncertainty based on ocean experimental data, we compared it with the conventional detection probability results, as well as the predictable probability of detection results considering the uncertainty of the Rayleigh distribution and a negatively skewed distribution. As a result, we confirmed that differences in the detection area occur depending on each underwater acoustic uncertainty.

Variation of probability of sonar detection by internal waves in the South Western Sea of Jeju Island (제주 서남부해역에서 내부파에 의한 소나 탐지확률 변화)

  • An, Sangkyum;Park, Jungyong;Choo, Youngmin;Seong, Woojae
    • The Journal of the Acoustical Society of Korea
    • /
    • v.37 no.1
    • /
    • pp.31-38
    • /
    • 2018
  • Based on the measured data in the south western sea of Jeju Island during the SAVEX15(Shallow Water Acoustic Variability EXperiment 2015), the effect of internal waves on the PPD (Predictive Probability of Detection) of a sonar system was analyzed. The southern west sea of Jeju Island has complex flows due to internal waves and USC (Underwater Sound Channel). In this paper, sonar performance is predicted by probabilistic approach. The LFM (Linear Frequency Modulation) and MLS (Maximum Length Sequence) signals of 11 kHz - 31 kHz band of SAVEX15 data were processed to calculate the TL (Transmission Loss) and NL (Noise Level) at a distance of approximately 2.8 km from the source and the receiver. The PDF (Probability Density Function) of TL and NL is convoluted to obtain the PDF of the SE (Signal Excess) and the PPD according to the depth of the source and receiver is calculated. Analysis of the changes in the PPD over time when there are internal waves such as soliton packet and internal tide has confirmed that the PPD value is affected by different aspects.

Development of algorithm for analyzing priority area of forest fire surveillance using viewshed analysis (가시권 분석을 이용한 산불감시 우선지역 분석체계 개발)

  • Lee, Byung-Doo;Kim, Seon-Young;Lee, Myung-Bo
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2010.06a
    • /
    • pp.173-174
    • /
    • 2010
  • 산불감시활동에 의한 탐지확률을 높이고, 감시자원의 효율적인 이용을 위해서는 산불 감시 우선지역에 대한 분석이 요구된다. 따라서 산불감시 우선지역을 추출하기 위해 가시권 분석과 산불발생확률 분석을 실시하였으며, 중첩을 통해 가중치를 부여하였다. 가시권 분석은 탐지확률과 관련된 감시자원의 높이, 산불연기높이, 지형의 roughness에 따른 유효가시거리 인자를 다르게 하여 실시하였다. 산불발생확률은 로지스틱 회귀분석모형과 연료, 기상, 지형인자 및 토지피복, 접근성 인자 DB를 이용하여 분석하였다. 개발된 산불감시 우선지역 분석체계는 산불감시자원의 효율성 제고를 위한 기초자료로 활용될 수 있을 것으로 예상되었다.

  • PDF

Simulation Study on Search Strategies for the Reconnaissance Drone (정찰 드론의 탐색 경로에 대한 시뮬레이션 연구)

  • Choi, Min Woo;Cho, Namsuk
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.1
    • /
    • pp.23-39
    • /
    • 2019
  • The use of drone-bots is demanded in times regarding the reduction of military force, the spread of the life-oriented thought, and the use of innovative technology in the defense through the fourth industrial revolution. Especially, the drone's surveillance and reconnaissance are expected to play a big role in the future battlefield. However, there are not many cases in which the concept of operation is studied scientifically. In this study, We propose search algorithms for reconnaissance drone through simulation analysis. In the simulation, the drone and target move linearly in continuous space, and the target is moving adopting the Random-walk concept to reflect the uncertainty of the battlefield. The research investigates the effectiveness of existing search methods such as Parallel and Spiral Search. We analyze the probabilistic analysis for detector radius and the speed on the detection probability. In particular, the new detection algorithms those can be used when an enemy moves toward a specific goal, PS (Probability Search) and HS (Hamiltonian Search), are introduced. The results of this study will have applicability on planning the path for the reconnaissance operations using drone-bots.

Research on an Engagement Level Underwater Weapon System Model with Neyman-Pearson Detector (Neyman-Pearson 표적 탐지기를 적용한 수중 무기체계 교전수준 모델 개발 연구)

  • Cho, Hyunjin;Kim, Wan-Jin;Kim, Sanghun;Yang, Hocheol;Lee, Hee Kwang
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.2
    • /
    • pp.89-95
    • /
    • 2019
  • This paper introduces the simulation concepts and technical approach of underwater weapon system performance analysis simulator, especially focused on probabilistic target detection concepts. We calculated the signal excess (SE) value using SONAR equation, then derived the probability density function(PDF) for target presence($H_1$) or absence($H_0$) cases, respectively. With the Neyman-Pearson detector criterion, we got the probability of detection($P_D$) while satisfying the given probability of false alarm($P_{FA}$). At every instance of simulation, target detection is decided in the probabilistic perspective. With the proposed detection implementation, we improved the model fidelity so that it could support the tactical decision during the operation.

Analysis of the Effectiveness of Autonomous Unmanned Underwater Vehicle Mine Search Operation by Side Scan Sonar Characteristics (측면주사소나 특성에 따른 자율무인잠수정 기뢰탐색 효과도 분석)

  • Yoo, Tae-Suk;Park, Seok-Joon;Yoon, Seon-Il;Park, Ho-Gyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.8
    • /
    • pp.1077-1085
    • /
    • 2020
  • In order to Mine Countermeasure (MCM), the search is carried out for the expected mine zone. At this time, mine hunting uses Autonomous Unmanned Vehicle(AUV), taking into account the danger of mine and the stability of our forces. Sonar system for identifying buried mines are equipped with Side Scan Sonar(SSS) or Synthetic Aperture Sonar(SAS). This paper describes the analysis of mine hunting effects according to the commercial SSS characteristics. Based on the characteristics of each SSS, the insonified area and recognition probability were modeled, and the analysis was performed according to the search pattern of the AUV. AUV's search pattern defines three patterns depending on the presence or absence of SSS or shaded areas. The analysis results derived search time and detection probability for each search pattern, and finally, the improvement of search depending on the presence or absence of side injection or shaded area.

Construction of Optimal Anti-submarine Search Patterns for the Anti-submarine Ships Cooperating with Helicopters based on Simulation Method (대잠 헬기와의 협동 작전을 고려한 수상함의 최적 대잠탐색 패턴 산출을 위한 시뮬레이션)

  • Yu, Chan-Woo;Park, Sung-Woon
    • Journal of the Korea Society for Simulation
    • /
    • v.23 no.1
    • /
    • pp.33-42
    • /
    • 2014
  • In this paper we analyzed the search patterns for the anti-submarine warfare (ASW) surface ships cooperating with ASW helicopters. For this purpose, we modeled evasive motion of a submarine with a probabilistic method. And maneuvers and search actions of ships and helicopters participating in the anti-submarine search mission are designed. And for each simulation scenario, the case where a ship and a helicopter searches a submarine independently according to its optimized search pattern is compared with the case where the search platforms participate in the ASW mission cooperatively. Based on the simulation results, we proposed the reconfigured search patterns that help cooperative ASW surface ships increase the total cumulative detection probability (CDP).

Development of Algorithm for Analyzing Priority Area of Forest Fire Surveillance Using Viewshed Analysis (가시권 분석을 이용한 산불감시 우선지역 선정 방안)

  • Lee, Byung-Doo;Ryu, Gye-Sun;Kim, Sun-Young;Kim, Kyong-Ha;Lee, Myung-Boa
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.14 no.3
    • /
    • pp.126-135
    • /
    • 2011
  • In this study, the algorithm for priority area of forest fire surveillance was developed to enhance the effectiveness of fire detection. The high priority surveillance area for forest fire detection was defined as the area with not only low value of viewshed analysis of the lookouts and detection cameras but also high fire occurrence probability. To build the priority map, fuzzy function and map algebra were used. The analysis results of Bonghwa-gun, Gyeongbuk Province, showed that the surveillance priority of central and southern area is higher than north area. This algorithm could be used in the allocation of fire prevention resources and selection of suitable point for new fire detection system.

Key Pre-distribution using the Quorum System in Wireless Sensor Networks (센서 네트워크에서의 쿼럼 시스템을 이용한 키 사전 분배)

  • Kang Ji-Myung;Lee Sung-Ryeoll;Cho Seong-Ho;Kim Chong-Kwon;Ahn Joung-Chul
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.3
    • /
    • pp.193-200
    • /
    • 2006
  • The security feature is essential in wireless sensor network such as intrusion detection or obstacle observation. Sensor nodes must have shared secret between nodes to support security such as privacy. Many methods which provide key pre-distribution need too many keys or support poor security. To solve this problem, probabilistic key pre-distribution is proposed. This method needs a few keys and use probabilistic method to share keys. However, this method does not guarantee key sharing between nodes, and neighbor nodes nay not communicate each other. It leads to waste of network resource such as inefficient routing, extra routing protocol. In this paper, we propose new key distribution method using quorum system which needs a few keys and guarantee key sharing between nodes. We also propose extension of the method which needs fewer keys and guarantee key sharing when node deployment knowledge is well known.