• Title/Summary/Keyword: 탄도 미사일

Search Result 96, Processing Time 0.023 seconds

A Guidance Law to Maintain Ballistic Trajectory for Smart Munitions (지능형 포탄을 위한 탄도궤적 유지 유도법칙)

  • Park, Woo-Sung;Ryoo, Chang-Kyung;Kim, Yong-Ho;Kim, Jong-Ju
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.39 no.9
    • /
    • pp.839-847
    • /
    • 2011
  • This paper proposes a new guidance law for increasing the lethality of munitions. The well known PNG (Proportional Navigation Guidance) is inadequate for the munitions because of some weaknesses. Even if the munition does not have the impact point error, the acceleration command is non zero because the line-of-sight changes at all times in flight. Therefore, we use a difference between a target and an impact point. This proposed guidance law is similar to PNG in the form, but this guidance law concentrates a correction rate of flight path angle instead of the LOS (Line of Sight) rate. The correction of flight path angle is defined as the amount of impact point error. This impact point error can be calculated by neural networks rapidly. Finally, we show that the simulation results prove the suitability of this law.

Threat Assessment of Anti-Ship Ballistic Missile (ASBM) of North Korea (북한 대함탄도미사일 위협 분석)

  • Park, Younghan;Oh, Kyungwon;Kim, Jiwon
    • Journal of Aerospace System Engineering
    • /
    • v.10 no.3
    • /
    • pp.1-8
    • /
    • 2016
  • This paper provides an empirical assessment of the development of North Korea's Anti-Ship Ballistic Missile (ASBM), and its influence on South Korea's maritime strategy. While research studies on North Korea's ballistic-missile capabilities and South Korea's ballistic-missile defense systems are proliferating, less analytical attention has been given to the way that the strengthening of North Korea's ballistic-missile capacities presents a critical threat to the ROK's navy and lines of communication. The authors of this paper identify the continuing development of unique ASBM capabilities by China and Iran, and determine that such processes are mutually interactive and in accordance with threat perceptions; furthermore, North Korea can enact the same process by learning lessons from these nations. The findings of this paper provide an implication for the formulation of South Korea's maritime strategy and the related assets in consideration of the ASBM as a future threat.

A Study on the Asia-Pacific Security Strategy of the U.S. Navy (미 해군의 아시아 태평양 해양안보 전략에 대한 연구)

  • Jeon, Eun-seon;Go, Kyung-min;Park, Tae-yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.445-447
    • /
    • 2015
  • The situation in Northeast Asia is rapidly changed because of the territorial dispute between neighboring countries near the East China Sea, North Korean nuclear bomb tests, long-range ballistic missile launching tests frequently and deployment of Chinese Liaoning class aircraft carrier. Especially, unstable political situation of North Korea and Chinese A2/AD strategy by strengthening naval forces are the cause of replanning Asia-Pacific security strategy of Unites States. In this paper, it is surveyed and analyzed that changed Asia-Pacific security strategy of U.S. and rearrangement plan of U.S. Naval forces. And changed environmental situation influence on our security is analyzed.

  • PDF

Optimization of Destroyer Deployment for Effectively Detecting an SLBM based on a Two-Person Zero-Sum Game (2인 제로섬 게임 기반의 효과적인 SLBM 탐지를 위한 구축함 배치 최적화)

  • Lee, Jinho
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.1
    • /
    • pp.39-49
    • /
    • 2018
  • An SLBM (submarine-launched ballistic missile) seriously threatens the national security due to its stealthiness that makes it difficult to detect in advance. We consider a destroyer deployment optimization problem for effectively detecting an SLBM. An optimization model is based on the two-person zero-sum game in which an adversary determines the firing and arriving places with an appropriate trajectory that provides a low detection probability, and we establish a destroyer deployment plan that guarantees the possibly highest detection probability. The proposed two-person zero-sum game model can be solved with the corresponding linear programming model, and we perform computational studies with a randomly generated area and scenario and show the optimal mixed strategies for both the players in the game.

A Study on the Flight Trajectory Prediction Method of Ballistic Missiles - BM type by Adjusting the Angle of a Flight Path and a Range - (탄도미사일의 비행궤적 예측 방법 연구 - 탄종별 비행경로각과 사거리를 중심으로 -)

  • Yoo, Byeong Chun;Kim, Ju Hyun;Kwon, Yong Soo;Choi, Bong Wan
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.16 no.2
    • /
    • pp.131-140
    • /
    • 2020
  • The characteristics of ballistic missiles are changing rapidly but studies have mostly focused on fragmentary flight trajectory analysis estimating the changing characteristics of some types, while there is a lack of research on comprehensive and efficient ballistic search, detection and prediction for missiles including the new types that have been gaining attention lately. This paper analyzes the flight trajectory characteristics of ballistic missiles at various ranges considering flight path angle adjustment, specific impulse and drag force with altitude based on the optimized equations of motion reflecting the parameters of North Korea's general and new types of ballistic missiles. The flight trajectory characteristics of representative ranges for each ballistic missile were analyzed by adjusting the flight path angle in the minimum energy method, lofted method, and depressed method. In addition, High value target can attacked by ballistic missiles considering flight path angle adjustment at various points. It's expected to be used to Threat Evaluation and Weapon Allocation, and deployment of defense systems by interpreting the analysis of the latest Iskander-class ballistic missiles and the new multiple rocket launcher.

A Study on the Change of Cyber Attacks in North Korea (북한의 사이버 공격 변화 양상에 대한 연구)

  • Chanyoung Park;Hyeonsik Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.175-181
    • /
    • 2024
  • The U.N. Security Council's North Korea Sanctions Committee estimated that the amount of North Korea's cyberattacks on virtual asset-related companies from 2017 to 2023 was about 4 trillion won. North Korea's cyberattacks have secured funds through cryptocurrency hacking as it has been restricted from securing foreign currency due to economic sanctions by the international community, and it also shows the form of technology theft against defense companies, and illegal assets are being used to maintain the Kim Jong-un regime and develop nuclear and missile development. When North Korea conducted its sixth nuclear test on September 3, 2017, and declared the completion of its national nuclear armament following the launch of an intercontinental ballistic missile on November 29 of the same year, the U.N. imposed sanctions on North Korea, which are considered the strongest economic sanctions in history. In these difficult economic situations, North Korea tried to overcome the crisis through cyberattacks, but as a result of analyzing the changes through the North's cyber attack cases, the strategic goal from the first period from 2009 to 2016 was to verify and show off North Korea's cyber capabilities through the neutralization of the national network and the takeover of information, and was seen as an intention to create social chaos in South Korea. When foreign currency earnings were limited due to sanctions against North Korea in 2016, the second stage seized virtual currency and secured funds to maintain the Kim Jong-un regime and advance nuclear and missile development. The third stage is a technology hacking of domestic and foreign defense companies, focusing on taking over key technologies to achieve the five strategic weapons tasks proposed by Chairman Kim Jong-un at the 8th Party Congress in 2021. At the national level, security measures for private companies as well as state agencies should be established against North Korea's cyberattacks, and measures for legal systems, technical problems, and budgets related to science are urgently needed. It is also necessary to establish a system and manpower to respond to the ever-developing cyberattacks by focusing on cultivating and securing professional manpower such as white hackers.

Analysis of Hypervelocity Impact Fracture Behavior of Multiple Bumper Steel Plates (다층 강재 방호판의 초고속 충격 파괴거동해석)

  • Jo, Jong Hyun;Lee, Young Shin;Kim, Jae Hoon;Bae, Yong Woon
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.37 no.6
    • /
    • pp.761-768
    • /
    • 2013
  • New warheads are designed and developed to be highly lethal when used as part of ballistic missile payloads. There are many trades associated with the design of a central warhead core, mainly dealing with the projectiles or penetrators. Obviously, a payload-type configuration is very susceptible to kills from one projectile because of the high impacts required for bomblet or submunition payloads. Based on these requirements, the optimum kill vehicle configuration will have the smallest mass and relative velocity that will kill all the submunitions. The designs of the penetrator shape and size are directly related to the space and weight of the warhead. The shape, size, L/D, penetrator material, and manner in which they are inserted inside the surrounding explosive segments are critical in achieving successful penetrator design. The AUTODYN-3D code was used to study the effect of penetrator penetration. The objective of numerical analysis was to determine the penetration characteristics of the penetrator produced by hypervelocity impacts under different initial conditions such as initial velocity, shape, and L/D of the penetrator.

A Precise Trajectory Prediction Method for Target Designation Based on Cueing Data in Lower Tier Missile Defense Systems (큐잉 데이터 기반 하층방어 요격체계의 초고속 표적 탐지 방향 지정을 위한 정밀 궤적예측 기법)

  • Lee, Dong-Gwan;Cho, Kil-Seok;Shin, Jin-Hwa;Kim, Ji-Eun;Kwon, Jae-Woo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.4
    • /
    • pp.523-536
    • /
    • 2013
  • A recent air defense missile system is required to have a capability to intercept short-range super-high speed targets such as tactical ballistic missile(TBMs) by performing engagement control efficiently. Since flight time and distance of TBM are very short, the missile defense system should be ready to engage a TBM as soon as it takes an indication of the TBM launch. As a result, it has to predict TBM trajectory accurately with cueing information received from an early warning system, and designate search direction and volume for own radar to detect/track TBM as fast as it can, and also generate necessary engagement information. In addition, it is needed to engage TBM accurately via transmitting tracked TBM position and velocity data to the corresponding intercept missiles. In this paper, we proposed a method to estimate TBM trajectory based on the Kepler's law for the missile system to detect and track TBM using the cueing information received before the TBM arrives the apogee of the ballistic trajectory, and analyzed the bias of prediction error in terms of the transmission period of cueing data between the missile system and the early warning system.

A Study of Multi-to-Majority Response on Threat Assessment and Weapon Assignment Algorithm: by Adjusting Ballistic Missiles and Long-Range Artillery Threat (다대다 대응 위협평가 및 무기할당 알고리즘 연구: 탄도미사일 및 장사정포 위협을 중심으로)

  • Im, Jun Sung;Yoo, Byeong Chun;Kim, Ju Hyun;Choi, Bong Wan
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.4
    • /
    • pp.43-52
    • /
    • 2021
  • In weapon assignment studies to defend against threats such as ballistic missiles and long range artillery, threat assessment was partially lacking in analysis of various threat attributes, and considering the threat characteristics of warheads, which are difficult to judge in the early flight stages, it is very important to apply more reliable optimal solutions than approximate solution using LP model, Meta heuristics Genetic Algorithm, Tabu search and Particle swarm optimization etc. Our studies suggest Generic Rule based threat evaluation and weapon assignment algorithm in the basis of various attributes of threats. First job of studies analyzes information on Various attributes such as the type of target, Flight trajectory and flight time, range and intercept altitude of the intercept system, etc. Second job of studies propose Rule based threat evaluation and weapon assignment algorithm were applied to obtain a more reliable solution by reflection the importance of the interception system. It analyzes ballistic missiles and long-range artillery was assigned to multiple intercept system by real time threat assessment reflecting various threat information. The results of this study are provided reliable solution for Weapon Assignment problem as well as considered to be applicable to establishing a missile and long range artillery defense system.

A Review of Use of Outer Space for Military Purposes From an International Law Perspective (우주의 군사적 이용에 관한 국제법적 검토 - 우주법의 점진적인 발전을 중심으로 -)

  • Jung, Yung-Jin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.30 no.1
    • /
    • pp.303-325
    • /
    • 2015
  • The latest slogan put forth by the international space community is the safety, security, and sustainability of outer space activities. The security of outer space activities, in particular, would be defined as the secure state from space-based threats. The latter comprises passive threats (such as collision with other satellites and space debris) and aggressive threats (such as electromagnetic interference, arms race on the earth or in outer space, and military attacks). Has outer space been used for military purposes in practice? If so, does international law regulate the military space activities it? The use of outer space for military purposes is referred to as space militarization and space weaponisation. Satellites has been used in Gulf War, Kosovo War, and Afghan War, recently, and research and development on space weapons are under way. Since only the placement of weapons of mass destruction on orbit around the earth is prohibited in accordance with 1967 Outer Space Treaty, it may be asked whether other weapons may be placed on orbit. It will be necessary to analyze the stance of on the above question, by studying UN space-related treaties including UN Charter. New international space norms represented by PPWT, ICoC, and UN GGE Report are at the center of progressive development of international law. In conclusion, the author will signpost the various points on international norms to be codified on the use of outer space for military purposes.