• Title/Summary/Keyword: 전술 생성

Search Result 49, Processing Time 0.021 seconds

TACAN modulation generator for antenna purpose that precisely adjusts factor of modulation (변조도를 정밀하게 조정 하는 TACAN 안테나용 변조신호발생기)

  • Kim, Jong-Won;Son, Kyong-Sik;Lim, Jae-Hyun
    • Journal of Digital Convergence
    • /
    • v.15 no.4
    • /
    • pp.275-284
    • /
    • 2017
  • TACAN(TACtical Air Navigation) was created to support military aircraft's short range navigation (200~300 mile). TACAN must fulfill a condition of MIL-STD-291C, the U.S. Military Standards, which addresses the sum of 15Hz and 135Hz should be within 55%, following the factor of modulations for both to be $21{\pm}9%$ each. Within the existing TACAN antenna, modulation factor for 15Hz and 135Hz are created differently depending on its diameter, wavelength, angle of gradient, internal modulation method or using frequency code. It brings up a problem where applications needed to be stopped and repaired when modulating signal exceeds the standard of MIL-STD-291C since the existing TACAN antenna does not have coordination function. Hence, plan and produce a modulating signal generator using FPGA, and check the changes in the modulation factor for 15HZ and 135Hz, depending on the values that have been set in each criteria. Moreover, allow the modulating signal generator to be automatically adjusted based on the monitoring signal emitted by antenna, and place alarm sound just in case if it exceeds the standard.

A Study on the Prediction Method of Information Exchange Requirement in the Tactical Network (전술네트워크의 정보교환요구량 예측 방법에 관한 연구)

  • Pokki Park;Sangjun Park;Sunghwan Cho;Junseob Kim;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.95-105
    • /
    • 2022
  • The Army, Navy, and Air Force are making various efforts to develop a weapon system that incorporates the 4th industrial revolution technology so that it can be used in multi-domain operations. In order to effectively demonstrate the integrated combat power through the weapon system to which the new technology is applied, it is necessary to establish a network environment in which each weapon system can transmit and receive information smoothly. For this, it is essential to analyze the Information Exchange Requirement(IER) of each weapon system, but many IER analysis studies did not sufficiently reflect the various considerations of the actual tactical network. Therefore, this study closely analyzes the research methods and results of the existing information exchange requirements analysis studies. In IER analysis, the size of the message itself, the size of the network protocol header, the transmission/reception structure of the tactical network, the information distribution process, and the message occurrence frequency. In order to be able to use it for future IER prediction, we present a technique for calculating the information exchange requirement as a probability distribution using the Poisson distribution and the probability generating function. In order to prove the validity of this technique, the results of the probability distribution calculation using the message list and network topology samples are compared with the simulation results using Network Simulator 2.

Implementation of reliable dynamic honeypot file creation system for ransomware attack detection (랜섬웨어 공격탐지를 위한 신뢰성 있는 동적 허니팟 파일 생성 시스템 구현)

  • Kyoung Wan Kug;Yeon Seung Ryu;Sam Beom Shin
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.27-36
    • /
    • 2023
  • In recent years, ransomware attacks have become more organized and specialized, with the sophistication of attacks targeting specific individuals or organizations using tactics such as social engineering, spear phishing, and even machine learning, some operating as business models. In order to effectively respond to this, various researches and solutions are being developed and operated to detect and prevent attacks before they cause serious damage. In particular, honeypots can be used to minimize the risk of attack on IT systems and networks, as well as act as an early warning and advanced security monitoring tool, but in cases where ransomware does not have priority access to the decoy file, or bypasses it completely. has a disadvantage that effective ransomware response is limited. In this paper, this honeypot is optimized for the user environment to create a reliable real-time dynamic honeypot file, minimizing the possibility of an attacker bypassing the honeypot, and increasing the detection rate by preventing the attacker from recognizing that it is a honeypot file. To this end, four models, including a basic data collection model for dynamic honeypot generation, were designed (basic data collection model / user-defined model / sample statistical model / experience accumulation model), and their validity was verified.

Evaluating the Impact of Attenuation Correction Difference According to the Lipiodol in PET/CT after TACE (간동맥 화학 색전술에 사용하는 Lipiodol에 의한 감쇠 오차가 PET/CT검사에서 영상에 미치는 영향 평가)

  • Cha, Eun Sun;Hong, Gun chul;Park, Hoon;Choi, Choon Ki;Seok, Jae Dong
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.17 no.1
    • /
    • pp.67-70
    • /
    • 2013
  • Purpose: Surge in patients with hepatocellular carcinoma, hepatic artery chemical embolization is one of the effective interventional procedures. The PET/CT examination plays an important role in determining the presence of residual cancer cells and metastasis, and prognosis after embolization. The other hand, the hepatic artery chemical embolization of embolic material used lipiodol produced artifacts in the PET/CT examination, and these artifacts results in quantitative evaluation influence. This study, the radioactivity density and the percentage error was evaluated by the extent of the impact of lipiodol in the image of PET/CT. Materials and Methods: 1994 NEMA Phantom was acquired for 2 minutes and 30 seconds per bed after the Teflon, water and lipiodol filled, and these three inserts into the enough to mix the rest behind radioactive injection with $20{\pm}10MBq$. Phantom reconfigure with the iterative reconstruction method the number of iterations for two times by law, a subset of 20 errors. We set up region of interest at each area of the Teflon, water, lipiodol, insert artifact occurs between regions, and background and it was calculated and compared by the radioactivity density(kBq/ml) and the% Difference. Results: Radioactivity density of the each region of interest area with the teflon, water, lipiodol, insert artifact occurs between regions, background activity was $0.09{\pm}0.04$, $0.40{\pm}0.17$, $1.55{\pm}0.75$, $2.5{\pm}1.09$, $2.65{\pm}1.16 kBq/ml$ (P <0.05) and it was statistically significant results. Percentage error of lipiodol in each area was 118%, compared to the water compared with the background activity 52%, compared with a teflon was 180% of the difference. Conclusion: We found that the error due to under the influence of the attenuation correction when PET/CT scans after lipiodol injection performed, and the radioactivity density is higher than compared to other implants, lower than background. Applying the nonattenuation correction images, and after hepatic artery chemical embolization who underwent PET/CT imaging so that the test should be take the consideration to the extent of the impact of lipiodol be.

  • PDF

Islamist Strategic Changes against U.S. International Security Initiative (미국(美國)의 대외안보전략(對外安保戰略)에 대응한 이슬람Terrorism의 전술적(戰術的) 진화(進化))

  • Choi, Kee-Nam
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.517-534
    • /
    • 2007
  • Since the beginning of human society, there have always been struggles and competitions for survival and prosperity, terrorism is not a recent phenomenon, however in modern times it has progressed to reflect the advances in civilization and power structures. At the time of the 9.11 terrorist attacks in the U.S. A., a new world order was in the process of being established after the breakdown of the Cold War era. The attacks drove both the Western and the Islamic worlds into heightened fear of terrorism and war, which threatened the quality of life of the whole mankind. Through two war campaigns against the Islamic world, it seems the U.S. has been pushing its own militaristic security road map of the Greater Middle East democratic initiative, justifying it as a means to retaliate and eradicate the terrorist threats towards themselves. However, with its five-year lopsided victories that cost the nation almost four thousand military casualties, and the war expenses that could match the Vietnam war, the U.S. does not yet seem to be totally emancipated from the fears of terrorism. Terrorism, in itself, is a means of resisting forced rules a form of alternative competition by the weak against the strong, and a way of expressing a dismissive response against dictatorial ideas or orders which allow for no normal changes. Intrinsically, the nature of terrorism is a reaction opposing power logics. Confronted with the absolute military power of the U.S., the Islamic strategies of terrorism have begun to rapidly evolve into a new stage. The new strategies take advantage of their civilization and circumstances, they train and inspire their front-line fighters on the Internet, and issue their orders through the clandestine network of the Al Qaeda operatives. These spontaneously generated strategies have been gained speed among the second, and third Islamic generations, many of whom are now spread throughout western societies. This represents a failure of the power-driven, one-sided overseas security initiatives by the U.S., and is creating a culture of fear and distrust in western societies. It is feared that the U.S. war campaigns have made the clash of religions far worse than before, and may ever lead to global ethnic separations and large-scale population movements. Eventually, it may result in the terrorist groups, enlarged and secretly supported by the huge sums of oil money, driving all mankind into a series of irreparable catastrophes.

  • PDF

Design of an Autonomous Air Combat Guidance Law using a Virtual Pursuit Point for UCAV (무인전투기를 위한 가상 추적점 기반 자율 공중 교전 유도 법칙 설계)

  • You, Dong-Il;Shim, Hyunchul
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.42 no.3
    • /
    • pp.199-212
    • /
    • 2014
  • This paper describes an autonomous air combat guidance law using a Virtual Pursuit Point (VPP) in one-on-one close engagement for Unmanned Combat Aerial Vehicle (UCAV). The VPPs that consist of virtual lag and lead points are introduced to carry out tactical combat maneuvers. The VPPs are generated based on fighter's aerodynamic performance and Basic Fighter Maneuver (BFM)'s turn circle, total energy and weapon characteristics. The UCAV determines a single VPP and executes pursuit maneuvers based on a smoothing function which evaluates probabilities of the pursuit types for switching maneuvers with given combat states. The proposed law is demonstrated by high-fidelity real-time combat simulation using commercial fighter model and X-Plane simulator.

Characteristics of EGW Welding Consumables for EH47-TM Steels (선급 EH47-TM용 EGW 용접재료의 특성)

  • An, Young-Ho;Han, Il-Wook
    • Proceedings of the KWS Conference
    • /
    • 2010.05a
    • /
    • pp.69-69
    • /
    • 2010
  • 최근 컨테이너 선박의 초대형화로 극후물 고장력 강재인 항복응력 460MPa급 고장력강인 EH47이 개발되었다. 두께 80mm의 극후물 용접에서 용접생산성 향상을 위하여 EGW/FCAW로 양면 용접이 검토되고, 입열량은 최대 300kJ/cm의 대입열 용접이 요구된다. 이를 위해서는 강재 및 용접재료 모두 300kJ/cm 용접부 성능이 선급 규격을 만족하여야 함은 물론 마지막 조립단계에서 적용되기 때문에 용접재료의 용접작업성도 매우 크게 요구되고 있다. 먼저 대입열 용접금속에서 요구되는 저온 충격인성($vE_{-20^{\circ}C}{\geq}57J$)을 만족하기 위하여는 용접금속의 미세조직 제어가 필요하며, 특히 조대한 입계페라이트 생성을 억제하고 미세한 입내 페라이트를 균일 분포하는 것이 중요하지만, 이를 위해 용접금속의 소입성이 지나치게 높이면 경화조직인 베이나이트 분율이 증가하여 오히려 용접금속 저온 충격인성을 저하시키므로, 적절한 용접금속의 성분 제어가 중요하다. 한편 용접부는 선급에서 요구하는 최소 강도인 570MPa를 만족하기 위하여 용접금속의 소성구속 현상을 활용하여 용접부 인장강도를 확보 할 수 있음을 확인했다. 이를 위해서는 용접금속의 적정한 경화도 확보가 필요하였다. 전술한 바와 같이 대입열 용접금속 저온 충격인성 확보와 용접부 강도 측면을 고려하여 용접금속 최적의 탄소당량 범위를 제시코자 하였다. 한편 용접재료의 용접작업성은 EGW용접의 용적이행 현상은 자유비행이행으로 이루어지고 있으며 특성상 용접중 용적과 용융지 사이에 많은 순간단락 현상을 동반하고 있으며, 슬래그 유동이 불안정하면 아크 꺼짐 현상도 관찰되고 있다. 따라서, 현장용접시 원할한 용접작업성을 확보할 수 있는 평가 기준으로써 아크 전류 및 전압의 변동 정도를 설정하고, 용접재료의 용접작업성 확보 기준을 제시코자 하였다.

  • PDF

Technical Trends of AI Military Staff to Support Decision-Making of Commanders (지휘관들의 의사결정지원을 위한 AI 군참모 기술동향)

  • Lee, C.E.;Son, J.H.;Park, H.S.;Lee, S.Y.;Park, S.J.;Lee, Y.T.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.1
    • /
    • pp.89-98
    • /
    • 2021
  • The Ministry of National Defense aims to create an environment in which transparent and reasonable defense policies can be implemented in real time by establishing the vision of smart defense innovation based on the Fourth Industrial Revolution and promoting innovation in technology-based defense operation systems. Artificial intelligence (AI) based defense technology is at the level of basic research worldwide, includes no domestic tasks, and involves classified military operation data and command control/decision information. Further, it is needed to secure independent technologies specialized for our military. In the army, military power continues to decline due to aging and declining population. In addition, it is expected that there will be more than 500,000 units should be managed simultaneously, to recognize the battle situation in real time on the future battlefields. Such a complex battlefield, command decisions will be limited by the experience and expertise of individual commanders. Accordingly, the study of AI core technologies supporting real-time combat command is actively pursued at home and abroad. It is necessary to strengthen future defense capabilities by identifying potential threats that commanders are likely to miss, improving the viability of the combat system, ensuring smart commanders always win conflicts and providing reasonable AI digital staff based on data science. This paper describes the recent research trends in AI military staff technology supporting commander decision-making, broken down into five key areas.

Development of Modeling and Simulation Tool for the Performance Analysis of Pods Mounted on Highly Maneuverable Aircraft (고기동 항공기 탑재 파드 성능 분석을 위한 모델링 및 시뮬레이션 도구 개발)

  • Lee, Sanghyun;Shin, Jinyoung;Lee, Jaein;Kim, Jongbum;Kim, Songhyon;Kim, Sitae;Cho, Donghyurn
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.50 no.7
    • /
    • pp.507-514
    • /
    • 2022
  • The EO/IR targeting pod mounted on a fighter to acquire information about tactical targets is typically mounted and operated at the bottom of the aircraft fuselage. Since the aircraft equipped with such an external attachment has complexed aerodynamic and inertial characteristics compared to the aircraft flying without an external attachment, a method of system performance analyses is required to identify development risk factors in the early stages of development and reflect them in the design. In this study, a development plan was presented to provide the necessary modeling and simulation tools to develop a pod that can acquire measurement data stably in a highly maneuverable environment. The limiting operating conditions of the pods mounted on the highly maneuverable aircraft were derived, the aerodynamics and inertial loads of the mounted pods were analyzed according to the limiting operating conditions, and a flight data generation and transmission system were developed by simulating the mission of the aircraft equipped with the mounted pods.

Grand Circulation Process of Beach Cusp and its Seasonal Variation at the Mang-Bang Beach from the Perspective of Trapped Mode Edge Waves as the Driving Mechanism of Beach Cusp Formation (맹방해안에서 관측되는 Beach Cusp의 일 년에 걸친 대순환 과정과 계절별 특성 - 여러 생성기작 중 포획모드 Edge Waves를 중심으로)

  • Cho, Yong Jun
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.31 no.5
    • /
    • pp.265-277
    • /
    • 2019
  • Using the measured data of waves and shore-line, we reviewed the grand circulation process and seasonal variation of beach cusp at the Mang-Bang beach from the perspective of trapped mode Edge waves known as the driving mechanism of beach cusp. In order to track the temporal and spatial variation trends of beach cusp, we quantify the beach cusp in terms of its wave length and amplitude detected by threshold crossing method. In doing so, we also utilize the spectral analysis method and its associated spectral mean sand wave number. From repeated period of convergence and ensuing splitting of sand waves detected from the yearly time series of spectral mean sand wave number of beach cusp, it is shown that the grand circulation process of beach cusp at Mang-Bang beach are occurring twice from 2017. 4. 26 to 2018. 4. 20. For the case of beach area, it increased by $14,142m^2$ during this period, and the shore-line advanced by 18 m at the northen and southern parts of the Mang-Bang beach whereas the shore-line advanced by 2.4 m at the central parts of Mang-Bang beach. It is also worthy of note that the beach area rapidly increased by $30,345m^2$ from 2017.11.26. to 2017.12.22. which can be attributed to the nature of coming waves. During this period, mild swells of long period were prevailing, and their angle of attack were next to zero. These characteristics of waves imply that the main transport mode of sediment would be the cross-shore. Considering the facts that self-healing capacity of natural beaches is realized via the cross-shore sediment once temporarily eroded. it can be easily deduced that the sediment carried by the boundary layer streaming toward the shore under mild swells which normally incident toward the Mang-Bang beach makes the beach area rapidly increase from 2017.11.26. to 2017.12.22.