• Title/Summary/Keyword: 탐지/추적

Search Result 562, Processing Time 0.032 seconds

Resource Reservation Based Image Data Transmission Scheme for Surveillance Sensor Networks (감시정찰 센서 네트워크를 위한 자원예약 기반 이미지 데이터 전송 기법)

  • Song, Woon-Seop;Jung, Woo-Sung;Ko, Young-Bae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.11
    • /
    • pp.1104-1113
    • /
    • 2014
  • Future combat systems can be represented as the NCW (Network Centric Warefare), which is based on the concept of Sensor-to-Shooter. A wireless video sensor networking technology, one of the core components of NCW, has been actively applied for the purpose of tactical surveillance. In such a surveillance sensor network, multi-composite sensors, especially consisting of image sensors are utilized to improve reliability for intrusion detection and enemy tracing. However, these sensors may cause a problem of requiring very high network capacity and energy consumption. In order to alleviate this problem, this paper proposes an image data transmission scheme based on resource reservation. The proposed scheme can make it possible to have more reliable image data transmission by choosing proper multiple interfaces, while trying to control resolution and compression quality of image data based on network resource availability. By the performance analysis using NS-3 simulation, we have confirmed the transmission reliability as well as energy efficiency of the proposed scheme.

A Study on Edit Order of Text Cells on the MS Excel Files (MS 엑셀 파일의 텍스트 셀 입력 순서에 관한 연구)

  • Lee, Yoonmi;Chung, Hyunji;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.319-325
    • /
    • 2014
  • Since smart phones or tablet PCs have been widely used recently, the users can create and edit documents anywhere in real time. If the input and edit flows of documents can be traced, it can be used as evidence in digital forensic investigation. The typical document application is the MS(Microsoft) Office. As the MS Office applications consist of two file formats that Compound Document File Format which had been used from version 97 to 2003 and OOXML(Office Open XML) File Format which has been used from version 2007 to now. The studies on MS Office files were for making a decision whether the file has been tampered or not through detection of concealed items or analysis of documents properties so far. This paper analyzed the input order of text cells on MS Excel files and shows how to figure out what cell is the last edited in digital forensic perspective.

A Study of Real Time Security Cooperation System Regarding Hacker's Attack (해커의 공격에 대한 실시간 보안공조시스템 연구)

  • Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.285-288
    • /
    • 2010
  • Chinese hackers hack the e-commerce site by bypass South Korea IP to connect to the third country, finance damaging a violation incident that fake account. 7.7.DDoS attack was the case of a hacker attack that paralyzed the country's main site. In this paper, the analysis is about vulnerabilities that breaches by hackers and DDoS attacks. Hacker's attacks and attacks on the sign of correlation analysis is share the risk rating for in real time, Red, Orange, Yellow, Green. Create a blacklist of hackers and real-time attack will be studied security and air conditioning systems that attacks and defend. By studying generate forensic data and confirmed in court as evidence of accountability through IP traceback and detection about packet after Incident, contribute to the national incident response and development of forensic techniques.

  • PDF

Leak Detection and Evaluation for Power Plant Boiler Tubes Using Acoustic Emission (음향방출을 이용한 보일러튜브 누설평가)

  • Lee, Sang-Guk
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.24 no.1
    • /
    • pp.45-51
    • /
    • 2004
  • Boiler tubes in power plants are often leaked due to various material degradations including creep and thermal fatigue damage under severe operating conditions such as high temperature and high pressure over an extended period of time. To monitor and diagnose the tubes on site and in real time, the acoustic emission (AE) technology was applied. We developed an AE leak detection system, and used it to study the variation of AE signal from the on-site tubes in response to the changes in the boiler operation condition and to detect the locations of leakage based on it. Detection of leak was performed by acquiring and evaluating the signals in separate regimes of high and low frequency signal. As a result of these studies, we found that on-line monitoring and detection of leak location for boiler tubes is possible using the developed system. Thus, the system is expected to contribute to the safe operation of power plants, and prevent economic losses due to potential leak.

Numerical and Experimental Study on Infrared Signature of Solid Rocket Motor (고체로켓모터의 적외선 신호에 관한 수치적·실험적 연구)

  • Kim, Sangmin;Kim, Mintaek;Song, Soonho;Baek, Gookhyun;Yoon, Woongsup
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.18 no.5
    • /
    • pp.62-69
    • /
    • 2014
  • Infrared signature of rocket plume plays an important role for detection, recognition, tracking and minimzing for low observability. Infrared signatures of rocket plume with reduced smoke propellant and smokeless propellant are measured. In order to estimate the infrared signature of rocket plume, CFD analysis for flow structure of plume is performed, and layered integration method for estimating of infrared signature is used. Numerical and experimental results were in good agreement. Both propellants had similar infrared signature. Strong peak at $4.3{\mu}m$ region in the experimental results is appeared due to experimental error arising from the calibration procedure.

Characteristics of Flow Field and IR of Double Serpentine Nozzle Plume for Varying Cross Sectional Areas and Flight Conditions in UCAV (Double Serpentine 노즐의 단면적과 비행조건 변화에 따른 UCAV의 플룸 유동장 및 IR 특성 연구)

  • Lee, Yu-Ryeol;Lee, Ji-Won;Shin, Chang-Min;Myong, Rho-Shin
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.8
    • /
    • pp.689-698
    • /
    • 2021
  • The development of modern warfare detection technology is increasingly threatening the survivability of aircraft. Among them, IR-seeking missiles greatly affect the survivability of aircraft and are a main factor that reduces the success rate of aircraft missions. In order to increase aircraft survivability, studies on shape-modifying nozzles with added curvature are being actively conducted. In this study, we selected a double serpentine nozzle among shape-modifying nozzles to increase aircraft survivability. We then investigated the effects of the location of the maximum area change rate of the nozzle. It was confirmed that the location of the change rate of area affects the thrust and exit temperature of the nozzle. In addition, it was shown that the thrust penalty was reduced as the position of the change rate of the maximum area was located at the rear of the nozzle.

A Study on the Near-Field Simulation Method for AESA RADAR using a Single Beam-Focusing LUT (단일 빔 집속 LUT를 이용한 AESA 레이다의 근전계 시뮬레이션 기법)

  • Ju, Hye Sun
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.2
    • /
    • pp.81-88
    • /
    • 2019
  • Since the AESA radar scans and tracks a distant targets or ground, it requires a test field which meets far-field condition before flight test. In order to test beam foaming, targeting, and availability from cluttering and jamming, it is general to build a outdoor roof-lab test site at tens of meters high. However, the site is affected by surrounding terrain, weather, and noise wave and is also requires time, space, and a lot of costs. In order to solve this problem, theoretical near-field beam foaming method has proposed. However, it requires modification of associated hardware in order to construct near-field test configuration. In this paper, we propose near-field beam foaming method which use single LUT in order to calibrate the variation of TRM(transmit-receive module) which consists AESA radar without modification of associated hardware and software. It requires less costs than far-field test and multiple LUT based near-field test, nevertheless it can derives similar experimental results.

High Resolution Radar Model to Simulate Detection/Tracking Performance of Multi-Function Radar in War Game Simulator (통합 교전 시뮬레이터 환경에서 다기능 레이다 탐지/추적 성능 모의를 위한 고해상도 레이다 모델)

  • Rim, Jae-Won;Oh, Suhyun;Koh, Il-Suek
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.30 no.1
    • /
    • pp.70-78
    • /
    • 2019
  • In this paper, modeling of a high-resolution multi-function radar is proposed to simulate radar performance in a war game simulator, called AddSIM. To incorporate the multi-function radar model into the AddSIM, the modeling must comprise a component-based structure consisting of physics, logics, and information blocks. Therefore, we assign the RF hardware of a RADAR as the physic block, a controller as the logics block, and the RF specifications of the RADAR as the information block. Detailed modeling of the physics and logics blocks are addressed, and data structure is also presented on an engineering level. On a multi-target engaged scenario, the performance of the multi-function radar is numerically analyzed and its validation is examined.

TB and Knapsack Based Improved Scheduling Techniques for Multi-Function Radar (TB와 냅색 기반의 향상된 다기능 레이다 스케줄링 기법)

  • Hwang, Min-Young;Yang, Woo-Young;Shin, Sang-Jin;Chun, Joohwan
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.29 no.12
    • /
    • pp.976-985
    • /
    • 2018
  • Modern radars such as the phase array radar can handle various tasks by generating a beam from a phased array antenna. Radar can be used for miscellaneous applications such as surveillance, tracking, missile guidance etc. Previous radar systems could handle only one task at a time. As such, multiple radars were required to perform simultaneous tasks. Multi-function radars can perform many tasks using only one radar system. However, the radar's resources are limited in this instance. To efficiently utilize time, it is necessary to properly schedule tasks in the radar's timeline. In this report, we investigate the efficiency of different scheduling tasks.

A Random ID-based RFID Mutual authentication protocol for detecting Impersonation Attack against a back-end server and a reader (서버와 리더의 위장공격 탐지가 가능한 랜덤 ID기반 RFID 상호 인증 프로토콜)

  • Yeo, Don-Gu;Lee, Sang-Rae;Jang, Jae-Hoon;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.89-108
    • /
    • 2010
  • Recently many mutual authentication protocol for light-weight hash-based for RFID have been proposed. Most of them have assumed that communications between a backend server and reader are secure, and not considered threats for backend server and RFID reader impersonation. In the real world, however, attacks against database or reader are more effective rather than attacks against RFID tag, at least from attacker's perspective. In this paper, we assume that all communications are not secure to attackers except the physical attack, and considering realistic threats for designing a mutual authentication protocol based on hash function. And It supports a mutual authentication and can protect against the replay attack, impersonation attack, location tracking attack, and denial of service attack in the related work. We besides provide a secure and efficient RFID mutual authentication protocol which resists impersonation attacks on all of the entities and alow a backend server to search tag-related information efficiently. We conclude with analyzing the safety and efficiency among latest works.