• Title/Summary/Keyword: 육군사관학교

Search Result 217, Processing Time 0.024 seconds

A Study on the Solar Water Heating System in the Military Facilities (병영시설의 태양열급탕시스템에 관한 연구)

  • Kim, Doo-Chun;Seo, Jin-Seok
    • The Magazine of the Society of Air-Conditioning and Refrigerating Engineers of Korea
    • /
    • v.11 no.4
    • /
    • pp.6-18
    • /
    • 1982
  • The performance of two typical types of solar hot water heating system was tested in Seoul. Types of systems studied are single-tank internal external heat exchanger system and single-tank internal heat exchanger system. Comparing to experimental results, a transient system simulation program was made to analyze the performance of the selected system. The climate data, Standard Weather Year for Seoul, required for the simulation was provided. Computer simulations were used to estimate the effect of significant parameters upon system performance. The followings are obtained. 1. In the domestic solar water Heating system, the value $20-40kg/m^2\;h$ for flow rate through the collector is much better than the recommended value $72kg/m^2\;h$ in the solar heating system. 2. The effectiveness of collector heat exchanger and storage tank size are found to have only a small effect upon system performance. 3. The hot water draw pattern has a significant effect on system performance. A higher system efficiency achieved when draw-off occurred around noon than when it occurred around early morning. Using the above results, the reference solar hot water system which provides $300\ell$ of hot water per day, was selected as a guide for designer. And simplified graphical method was developed based on the modified f-chart method to determine required collector area. When the system design parameters of the proposed system differs from the reference system, required collector area can be calculated from area adjustment factors.

  • PDF

Performance Tests on a Solar Water Heating System in Thermosyphonic Flow (열사이폰식 태양열 온수시스템의 성능실험)

  • Kim, Doo-Chun;Park, Seung-Duk
    • The Magazine of the Society of Air-Conditioning and Refrigerating Engineers of Korea
    • /
    • v.9 no.2
    • /
    • pp.93-103
    • /
    • 1980
  • A small domestic solar water heating system in thermosyphonic flow was tested in Seoul. The system consisted of four flat plate aluminium roll bond type collectors of total effective area $3.28m^2$ and a $280{\iota}$ storage tank. It was tilted $52^{\circ}$ relative to the horizon. And the collector plate, collector tube and storage tank were equiped with 14 thermocouples. As the results, the following facts were found; 1) To provide water at $55^{\circ}C$ for a family of four in Seoul, a collector area of $3-4m^2$ and a storage capacity of $180{\iota}- 200{\iota}$ are suggested. And this system can supply hot water at above $45^{\circ}C$ day about. 2) In the late afternoon hours, it might be advantageous to stop the flow in the system as heat losses to the environment increase unduly. 3) Without any hot water consumption throughout the day, water temperature distributions inside the storage tank was found almost linear. This indicates essentially no mixing inside the storage tank. 4) In case of a small domestic solar water heating system, it is better to employ a single transparent cover rather than double one.

  • PDF

Extraction of Military Ontology Using Six-Step Bottom-up Approach (6단계 상향식 방법에 의한 국방 온톨로지 추출)

  • Ra, Min-Young;Yang, Kyung-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.6
    • /
    • pp.17-26
    • /
    • 2009
  • In national defense, established information systems are mainly based on simple information processing, such as mass data query. They have thus lacked intelligent ability of information and knowledge representation ability. We therefore need the research about the construction of military ontology which is the main topic for knowledge construction. Military ontology can help us develop the intelligent national defense information system which can search and manage information efficiently. In this paper, we present the six-step bottom-up approach for military ontology extraction, then we apply this approach to one of military domain, called national defense educational training, and finally implement it using $Prot\acute{e}g\acute{e}$ which is one of the most useful ontology development tool.

Anomaly Detection via Pattern Dictionary Method and Atypicality in Application (패턴사전과 비정형성을 통한 이상치 탐지방법 적용)

  • Sehong Oh;Jongsung Park;Youngsam Yoon
    • Journal of Sensor Science and Technology
    • /
    • v.32 no.6
    • /
    • pp.481-486
    • /
    • 2023
  • Anomaly detection holds paramount significance across diverse fields, encompassing fraud detection, risk mitigation, and sensor evaluation tests. Its pertinence extends notably to the military, particularly within the Warrior Platform, a comprehensive combat equipment system with wearable sensors. Hence, we propose a data-compression-based anomaly detection approach tailored to unlabeled time series and sequence data. This method entailed the construction of two distinctive features, typicality and atypicality, to discern anomalies effectively. The typicality of a test sequence was determined by evaluating the compression efficacy achieved through the pattern dictionary. This dictionary was established based on the frequency of all patterns identified in a training sequence generated for each sensor within Warrior Platform. The resulting typicality served as an anomaly score, facilitating the identification of anomalous data using a predetermined threshold. To improve the performance of the pattern dictionary method, we leveraged atypicality to discern sequences that could undergo compression independently without relying on the pattern dictionary. Consequently, our refined approach integrated both typicality and atypicality, augmenting the effectiveness of the pattern dictionary method. Our proposed method exhibited heightened capability in detecting a spectrum of unpredictable anomalies, fortifying the stability of wearable sensors prevalent in military equipment, including the Army TIGER 4.0 system.

Analysis of Information Distribution Capability of the Army TIGER Corps Multilayer Integrated Communication Network (Army TIGER 군단 다계층 통합 전술통신망의 정보유통량 분석)

  • Junseob Kim;Sangjun Park;Yiju You;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.175-180
    • /
    • 2024
  • Future warfare is evolving with advanced science and technology, introducing a variety of unmanned and manned combat systems. These systems generate and exchange massive amounts of information, challenging current tactical communication systems as a foundation for future communication infrastructure. To analyze the information distribution capability of the Army TIGER corps, this paper examines four scenarios: standalone ground network operation, integrated network operation, load distribution, and error recovery. Utilizing M&S results, we highlight the potential of a multilayer integrated command and control network, incorporating ground, air, and space networks, to enhance the reliability and stability of the overall communication network.

Study on the classification system of identification of the enemy in the military border area (군 경계지역에서 피아식별 분류 시스템 연구)

  • Junhyeong Lee;Hyun Kwon
    • Convergence Security Journal
    • /
    • v.24 no.3
    • /
    • pp.203-208
    • /
    • 2024
  • The identification and classification of victims in the county border area is one of the important issues. The personnel that can appear in the military border area are comprised of North Korean soldiers, U.S. soldiers, South Korean soldiers, and the general public, and are currently being confirmed through CCTV. They were classified into true categories and learned through transfer learning. The PyTorch machine learning library was used, and the dataset was utilized by crawling images corresponding to each item shared on Google. The experimental results show that each item is classified with an accuracy of 98.7500%. Future research will explore ways to distinguish more systematically and specifically by going beyond images and adding video or voice recognition.

Scenario-based Future Infantry Brigade Information Distribution Capability Analysis (시나리오 기반의 미래 보병여단 정보유통능력 분석 연구)

  • Junseob Kim;Sangjun Park;Yiju You;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.139-145
    • /
    • 2023
  • The ROK Army is promoting cutting-edge, future-oriented military development such as a mobile, intelligent, and hyper-connected Army TIGER system. The future infantry brigade plans to increase mobility with squad-level tactical vehicles to enable combat in multi-domain operations and to deploy various weapon systems such as surveillance and reconnaissance drones. In addition, it will be developed into an intelligent unit that transmits and receives data collected through the weapon system through a hyper-connected network. Accordingly, the future infantry brigade will transmit and receive more data. However, the Army's tactical information communication system has limitations in operating as a tactical communication system for future units, such as low transmission speed and bandwidth and restrictions on communication support. Therefore, in this paper, the information distribution capability of the future infantry brigade is presented through the offensive operation scenario and M&S.

The Characteristics of Diisopropyl Methylphosphonate Adsorption on Zirconium-based Metal Organic Frameworks Manufactured by using Different Acids as Modulators (서로 다른 산을 조절인자로 활용하여 제조한 지르코늄 기반 금속유기골격체의 Diisopropyl Methylphosphonate 흡착 특성)

  • Jang, Wonhyeong;Kim, Honghyun;Jeong, Sangjo
    • Applied Chemistry for Engineering
    • /
    • v.32 no.5
    • /
    • pp.524-531
    • /
    • 2021
  • Depending on the type and amount of acid used as a modulator in the manufacturing process, the structural properties of UiO-66 can be modified and the adsorbability of chemical warfare agents can be enhanced. In this study, several acids as a modulator were used to synthesize UiO-66. Their properties were analyzed with FT-IR, XRD, titrator, and adsorption isotherms using chemical warfare agent simulant, DIMP. The UiO-66, structurally damaged by hydrochloric acid as a modulator, showed lower crystallinity and DIMP adsorption capacity and also smaller specific surface area and volume of voids compared to those of UiO-66, which was manufactured using acetic acid, and formic acid as a modulator. Additionally, UiO-66 which was synthesized by adding formic acid and hydrochloric acid as a modulator, showed the highest DIMP adsorption capacity and is likely to be used as an adsorbent for chemical warfare agent in the future.

Design of detection method for malicious URL based on Deep Neural Network (뉴럴네트워크 기반에 악성 URL 탐지방법 설계)

  • Kwon, Hyun;Park, Sangjun;Kim, Yongchul
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.5
    • /
    • pp.30-37
    • /
    • 2021
  • Various devices are connected to the Internet, and attacks using the Internet are occurring. Among such attacks, there are attacks that use malicious URLs to make users access to wrong phishing sites or distribute malicious viruses. Therefore, how to detect such malicious URL attacks is one of the important security issues. Among recent deep learning technologies, neural networks are showing good performance in image recognition, speech recognition, and pattern recognition. This neural network can be applied to research that analyzes and detects patterns of malicious URL characteristics. In this paper, performance analysis according to various parameters was performed on a method of detecting malicious URLs using neural networks. In this paper, malicious URL detection performance was analyzed while changing the activation function, learning rate, and neural network structure. The experimental data was crawled by Alexa top 1 million and Whois to build the data, and the machine learning library used TensorFlow. As a result of the experiment, when the number of layers is 4, the learning rate is 0.005, and the number of nodes in each layer is 100, the accuracy of 97.8% and the f1 score of 92.94% are obtained.

A Study on Vulnerability of Cyber Electronic Warfare and Analysis of Countermeasures for swarm flight of the NBC Reconnaissance Drones (화생방 정찰 드론의 군집비행 시 사이버전자전 취약점 및 대응방안 분석)

  • Kim, Jee-won;Park, Sang-jun;Lee, Kwang-ho;Jung, Chan-gi
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.133-139
    • /
    • 2018
  • The 5 Game changer means the concepts of the army's operation against the enemy's asymmetric threats so that minimize damage to the public and leads to victory in war in the shortest time. A study of network architecture of Dronebot operation is a key study to carry out integrated operation with integrated C4I system by organically linking several drones battle groups through ICT. The NBC reconnaissance drones can be used instead of vehicles and humans to detect NBC materials and share situations quickly. However, there is still a lack of research on the swarm flight of the NBC reconnaissance drones and the weaknesses of cyber electronic warfare. In this study, we present weaknesses and countermeasures of CBRNs in swarm flight operations and provide a basis for future research.

  • PDF