• Title/Summary/Keyword: 육군사관학교

Search Result 208, Processing Time 0.045 seconds

Advancements in Drone Detection Radar for Cyber Electronic Warfare (사이버전자전에서의 드론 탐지 레이다 운용 발전 방안 연구)

  • Junseob Kim;Sunghwan Cho;Pokki Park;Sangjun Park;Wonwoo Lee
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.73-81
    • /
    • 2023
  • The progress in science and technology has widened the scope of the battlefield, leading to the emergence of cyber electronic warfare that exploits electromagnetic waves and networks. Drones have become more important due to advancements in battery technology and navigation systems. Nevertheless, tackling drone threats comes with its own set of difficulties. Radar plays a vital role in detecting drones, offering long-range capabilities and independence from weather conditions. However, the battlefield presents unique challenges like dealing with high levels of signal noise and ensuring the safety of the detection assets. This paper proposes various approaches to improve the operation of drone detection radar in cyber electronic warfare, with a focus on enhancing signal processing techniques, utilizing low probability of interception (LPI) radar, and implementing optimized deployment strategies.

회원작품

  • Korea Institute of Registered Architects
    • Korean Architects
    • /
    • no.1 s.119
    • /
    • pp.41-64
    • /
    • 1979
  • PDF

Suggestions through exploring the relationship between Cadets' Motivation to use SNS and Life Satisfaction (사관생도의 SNS이용 동기와 생도 생활만족도와의 관계 탐색을 통한 제언)

  • Hyeseon Seok;Sojeong Im; Donghyun Ahn
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.407-412
    • /
    • 2023
  • We attempted to confirm the current status of the use of mobile phones by soldiers, especially SNS, in today's situation where the use of mobile phones is completely allowed, and to reach an agreement for the use of functional SNS in military life. To this end, 189 students at the Korea Army Academy at Yeongcheon were measured for SNS use motivation and life satisfaction, and the relationship between each sub-variable of SNS use motivation and satisfaction was analyzed. As a result, 3 out of 4 motives for using SNS had nothing to do with satisfaction, and rather, among the sub-variables, the pursuit of status showed a negative correlation with satisfaction. Therefore, the use of SNS to search for information or ideas should be encouraged. In addition, these findings prove that the vague belief that allowing SNS will increase the satisfaction of soldiers is not reasonable, suggesting that a careful approach is required to utilize functional SNS in the military.

Recent Trend in Catalysis for Degradation of Toxic Organophosphorus Compounds (유기인 계열 독성화합물 분해를 위한 촉매반응의 최신 연구 동향)

  • Kye, Young-Sik;Jeong, Keunhong;Kim, Dongwook
    • Applied Chemistry for Engineering
    • /
    • v.30 no.5
    • /
    • pp.513-522
    • /
    • 2019
  • Catalysts based on organic compounds, transition metal and metal-organic frameworks (MOFs) have been applied to degrade or remove organophosphorus toxic compounds (OPs). During the last 20 years, various MOFs were designed and synthesized to suit application purposes. MOFs with $Zr_6$ based metal node and organic linker were widely used as catalysts due to their tunability for the pore size, porosity, surface area, Lewis acidic sites, and thermal stability. In this review, effect on catalytic efficiency between MOFs properties according to the structure, stability, particle size, number of connected-ligand, organic functional group, and so on will be discussed.

Centralized Group Key Management Scheme for Tactical Swarming Drone Networks (전술 군집 드론 네트워크를 위한 중앙집권식 그룹키 관리 기법)

  • Lee, Jong-Kwan;Shin, Kyuyong;Kim, Kyung-Min
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.6
    • /
    • pp.817-825
    • /
    • 2018
  • Recently, drones have been used in various field to overcome time and space limitations. However, single drone still has a lot of restriction on transportation wight and travel time. Therefore many studies have been conducted to increase the utilization by swarm of drones. Many things should be additionally considered in order to operate swarming drones securely. Especially the group key management is a challenging research topic in tactical domain due to existence of adversary that has anti-drone skill. In this paper, we proposed an efficient group key management scheme for tactical swarming drone networks where an adversary equipped with anti-drone skills exists. The group key can be updated with a small number of message exchange compared to other convenience schemes. The numerical and simulation results demonstrate that the proposed scheme manages the group key efficiently and securely.

Experimental Study of Error Canceling on the Piercing Depth of Concrete by Single Shot and Barrage of Small Caliber Bullets (소구경 탄자 연발사격 시 콘크리트 관입깊이 오차 상쇄 실험 연구)

  • Lim, Chaeyeon;Kim, Kuk-Joog;Park, Young-Jun
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2019.11a
    • /
    • pp.35-36
    • /
    • 2019
  • Major influence factors for piercing depth of concrete against small caliber bullet are target's property such as compression strength of concrete and bullet's property such as the velocity and weight of it. In particular about the bullet's property, velocity and incidence angle could be controlled by specific position or distance between targets and shooter, but the angle of yaw of bullet dose not. Because the the angle of yaw of bullet causes lower piercing force of bullet, some errors on piercing depth of concrete could be appeared by live fire test for the evaluation of protective performance. Therefore, we have checked the error canceling effect on the piercing depth of concrete by single shot and barrage of small caiber bullets. As a result, we identified that the error of piercing depth by the angle of yaw of bullet could be cancelled by barrage.

  • PDF

Design of Efficient Intrusion Detection System using Man-Machine (Man-Mchine에 의한 효율적인 침입 탐지 시스템 설계)

  • Shin, Jang-Koon;Ra, Min-Young;Park, Byung-Ho;Choi, Byung-Kab
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.4
    • /
    • pp.39-52
    • /
    • 1996
  • Networking revolution provides users with data and resources sharing, distributed processing, and computer communication in cyberspace. However, users may use computers as a way of unauthorized access, system destruction, and leakage of the stored data. In recent trend, incresing of hacking instances which are from domestic as well as abroad reaches to the level of seriousness. It, therefore, is required to develop a secure system for the National Depense computing resources and deploy in practice in the working field as soon as possible. In this paper, we focuss on finding the security requirements of a network and designing Intrusion Detection System using statical intrusion detection and rule-based intrusion detection analysis through accumulating audit data.

Ransomware Threat Countermeasures for the Defense Information System: In terms of Information Security Risk Management (국방정보시스템에서의 랜섬웨어 위협 대응방안: 정보보안 위험관리 관점에서)

  • Yoo, Jincheol;Moon, Sangwoo;Kim, Jong-hwa
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.75-80
    • /
    • 2020
  • Damage caused by ransomware has continued to increase since last year, but cyber operations are managed without any separate classification of ransomware types in the military's guidelines for carrying out cyber operations. However, unlike other malware, ransomware is a threat that could paralyze all defense operations in one moment, and the military should reevaluate ransomware and take countermeasures. Accordingly, this paper aims to analyze the assets, vulnerabilities, and threats related to defense information service based on information security risk management, and propose alternatives to ensure continuity of defense work from ransomware threats.

Study on Modeling and Simulation for Fire Localization Using Bayesian Estimation (화원 위치 추정을 위한 베이시안 추정 기반의 모델링 및 시뮬레이션 연구)

  • Kim, Taewan;Kim, Soo Chan;Kim, Jong-Hwan
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.58 no.6
    • /
    • pp.424-430
    • /
    • 2021
  • Fire localization is a key mission that must be preceded for an autonomous fire suppression system. Although studies using a variety of sensors for the localization are actively being conducted, the fire localization is still unfinished due to the high cost and low performance. This paper presents the modeling and simulation of the fire localization estimation using Bayesian estimation to determine the probabilistic location of the fire. To minimize the risk of fire accidents as well as the time and cost of preparing and executing live fire tests, a 40m × 40m-virtual space is created, where two ultraviolet sensors are simulated to rotate horizontally to collect ultraviolet signals. In addition, Bayesian estimation is executed to compute the probability of the fire location by considering both sensor errors and uncertainty under fire environments. For the validation of the proposed method, sixteen fires were simulated in different locations and evaluated by calculating the difference in distance between simulated and estimated fire locations. As a result, the proposed method demonstrates reliable outputs, showing that the error distribution tendency widens as the radial distance between the sensor and the fire increases.