• Title/Summary/Keyword: 정찰

Search Result 353, Processing Time 0.033 seconds

Video Image Transmissions over DDS Protocol for Unmanned Air System (DDS 표준 기반 무인기 영상 데이터 전송 연구)

  • Go, Kyung-Min;Kwon, Cheol-Hee;Lee, Jong-Soon;Kim, Young-Taek
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.11B
    • /
    • pp.1732-1737
    • /
    • 2010
  • Currently, one of the main purposes of the military using Unmanned Air System (VAS) is to perform surveillance and reconnaissance of hostile enemy. To carry out their mission, Unmanned aerial vechicle (UAV) transmits video images to ground control station using ISR devices installed on the UAV. After receiving the images, the ground control station distribute them to various type of users. At this case, it is important to keep QoS. This paper presents data delivery and QoS managements using DDS for DDS for UAV video images. The experiment result, based on H.264 and JPEG2000, shows that DDS standard is able to be applied to video image transmission for UAS.

Applications and Strategies on Defense Acquisition based CPS & IoT Technology (사이버물리시스템(CPS)과 사물인터넷(loT) 기술의 군사적 활용방안 및 추진전략)

  • Kye, J.E.;Park, P.J.;Kim, W.T.;Lim, C.D.
    • Electronics and Telecommunications Trends
    • /
    • v.30 no.4
    • /
    • pp.92-101
    • /
    • 2015
  • 미래 전장은 정보 지식 기반의 첨단 전력체계를 확충하기 위해 향후 전력구조를 통합, 지휘통제통신(C4I) 체계와 생존성과 통합성이 향상된 전장의 네트워크중심전(NCW) 수행능력을 향상시킬 것이다. 사이버물리시스템(Cyber-Physical Systems: CPS)은 함정전투체계에 적용되고 있는 DDS를 포함하여 국방 M&S의 근간인 Live, Virture, Constructive(L-V-C) 체계의 큰 축을 형성하고 있다. 사물인터넷(Internet of Things: IoT) 기술은 센서네트워크, 통신, Radio Frequency Identification(RFID), Ubiquitous Sensor Network(USN), Machine to Machine(M2M), D2D 기술 및 상황인지, 지능서비스를 위한 정보수집/가공/융합/분석/예측기술을 포괄적으로 포함한 기술로서 미래산업을 이끌어 갈 차세대 선도 기술이며, 특히 군사적으로도 감시정찰 센서네트워크(USN), 견마형로봇, 경전투로봇과 무인기 기술 및 전술정보통신망체계(TICN) 등 첨단 통신네트워크 기술의 전력화 추세는 IoT 기술의 적용영역을 넓혀주고 있다. 감시정찰체계(Sensor)에서는 감시정찰 분야 영상정보 처리, 표적탐지 등과 관련된 IoT 기술 소요와 지휘통제통신(C4I) 체계의 상호운용성, 데이터링크, 지능형 통신체계 등 C4I 관련 IoT 기술 소요 및 타격체계(Shooter)의 내장형 SW 등 유 무인 무기체계 관련 IoT 기술의 소요가 증대될 것으로 예상된다. 본고는 CPS 및 IoT 기술의 군사적 활용방안 및 획득전략에 대한 적용기술 및 발전방향을 살펴본다.

  • PDF

A Study of Key Node Search in Reconnaissance Surveillance Sensor Networks (감시정찰 센서네트워크에서 중요노드 탐색 연구)

  • Kook, Yoon-Ju;Kang, Ji-Won;Kim, Jeom-Goo;Kim, Kiu-Nam
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.7
    • /
    • pp.1453-1458
    • /
    • 2009
  • Sensor network for the human approach in a difficult area and a wide range of surveillance and the boundaries for the purpose and mission is the utilization significantly. In this paper we searched important nodes from the surveillance reconnaissance sensor network based on the virtual data. we generated data within the sensor's measurement range in the data transmitted from sensor nodes, and used PCA(Principle Component Analysis) for searching key node. If the important sensor node searched, and we can have easy management and establishing security measures when security problems is happened about nodes. This is for the sensor network in terms of effectiveness and cost-effectively and is directly connected with life span.

Sensor Deployment Simulator for Designing Sensor Fields (센서 필드 설계를 위한 배치 시뮬레이터)

  • Kwon, Oh-Heum;Song, Ha-Joo
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.3
    • /
    • pp.354-365
    • /
    • 2013
  • Node deployment is one of the important problems in achieving good quality of service in wireless sensor network. The purpose of this paper is to develop an interactive system that supports user's decision makings in designing sensor fields. The system provides grid-based initial deployment algorithm supporting three types of node deployment pattern, area-fill, path-cover, and barrier-cover deployment pattern. After initial deployment, an iterative refinement algorithm can be applied, which takes care of the irregularity of the deployment area and the heterogeneity of sensors. The proposed system helps users to effectively deploy nodes in the sensor field, analyse the detection performance of the deployment, and perform network simulations. The developed system can be utilized as a part of the development environment of the surveillance sensor network system.

GMTI Two Channel Raw Data Processing and Analysis (GMTI 2채널 원시데이터 처리 및 분석)

  • Kim, So-Yeon;Yoon, Sang-Ho;Shin, Hyun-Ik;Youn, Jae-Hyuk;Kim, Jin-Woo;You, Eung-Noh
    • Korean Journal of Remote Sensing
    • /
    • v.34 no.6_1
    • /
    • pp.847-855
    • /
    • 2018
  • GMTI (Ground Moving Target Indicator) is a kind of airborne radar function that is used widely in military applications to detect the moving targets on the ground. In this paper, GMTI signal processing technique was presented and its performance was verified using sum and difference channels raw data obtained by the captive flight test.

Development of Autonomous Reconnaissance Flight Simulation for Unmanned Aircraft to Derive Flight Operating Condition (자율정찰비행 무인항공기의 비행운영조건 고찰을 위한 비행시뮬레이션 개발)

  • Seok, Min Joon
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.47 no.4
    • /
    • pp.266-273
    • /
    • 2019
  • The efficiency and effectiveness of mission performance can be greatly changed according to the operating conditions such as the number of manned aircraft, flight altitude, and so on, in performing search and reconnaissance missions using a large number of small reconnaissance unmanned aerial vehicles. However, it is not easy to determine which operating conditions are most reasonable. Therefore, in this study, we developed an unmanned airplane flight simulation that can detect and identify the target while avoiding collision according to autonomous flight, suggesting a way to derive operating conditions when operating a large number of unmanned aerial vehicles.

A Study of Security Evaluation Criteria for Reconnaissance Drone (정찰 드론 보안성 평가 기준에 대한 연구)

  • Gu, Do-hyung;Kim, Seung-joo;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.591-605
    • /
    • 2022
  • As drones are widely used, attack attempts using drone vulnerabilities are increasing, and drone security is growing in importance. This paper derives security requirements for reconnaissance drone delivered to government office through threat modeling. Threats are analyzed by the data flow of the drone and collecting possible vulnerabilities. Attack tree is built by analyzed threats. The security requirements were derived from the attack tree and compared with the security requirements suggested by national organizations. Utilizing the security requirements derived from this paper will help in the development and evaluation of secure drones.

Target Localization Method using the Detection Signal Strength of Seismic Sensors for Surveillance Reconnaissance Sensor Network (감시정찰 센서 네트워크에서의 지진동센서 탐지 신호 세기를 이용한 표적 측위 방법)

  • Hyeon-Soo Im;In-Yong Hwang;Hyung-Seok Kim;Sang-Heon Shin
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1291-1298
    • /
    • 2023
  • Surveillance reconnaissance sensor network is used for surveillance in wartime and area of operation. In this paper, we propose a target localization method using the detection signal strength of seismic sensors. Relay equipment calculates the target location using coordinate information and detection signal strength of the seismic sensors. Target localization error deviation due to environmental factors was minimized by subtracting the dynamic offset when calculating the target location. Field test shows improvement of target localization through reduction of errors. The average error was decreased to 3.62m. Up to 62% improved result was obtained compared to weighted centroid localization method.