• Title/Summary/Keyword: 탐지 확률

Search Result 263, Processing Time 0.03 seconds

A Study of the Submarine Periscope Detection Algorithm using Characteristic of Target HRRP Information

  • Jin-Hyang Ahn;Chi-Sun Baek
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.1
    • /
    • pp.131-138
    • /
    • 2024
  • The ability of Combat Management System(CMS) to respond quickly and accurately to threat to a naval vessel is directly related to the survivability and combat power of the vessel. However, current method for detecting enemy submarine periscope in CMS rely on manual and subjective method that require operators to manually verify and analyze information received from sensor. This delays the response time to the threat, making the vessel less viable. This paper introduces a periscope detection algorithm that classifies the plot information generated by High Resolution Range Profile(HRRP) into probability-based suspicion classes and dramatically reduces threat response time through classified notifications. Algorithm validation showed 133.3791 × 106 times faster and 12.78%p higher detection rate than operator, confirming the potential for reduces threat response time to increase vessel survivability.

Performance Analysis of an Adaptive Hybrid Search Code Acquisition Algorithm for DS-CDMA Systems (DS-CDMA 시스템을 위한 적응 혼합 검색형 동기획득 알고리즘의 성능 분석)

  • Park Hyung rae;Yang Yeon sil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.3C
    • /
    • pp.83-91
    • /
    • 2005
  • We analyze the performance of an adaptive hybrid search code acquisition algorithm for direct-sequence code division multiple access (DS-CDMA) systems under slowly-moving mobile environments. The code acquisition algorithm is designed to provide the desired feature of constant false alarm rate (CFAR) to cope with nonstationarity of the interference in CDMA forward links. An analytical expression for the mean acquisition time is first derived and the probabilities of detection, miss, and false alarm are then obtained for frequency-selective Rayleigh fading environments. The fading envelope of a received signal is assumed to be constant over the duration of post-detection integration (PDI), considering slow fading environments. Finally, the performance of the designed code acquisition algorithm shall be evaluated numerically to examine the effect of some design parameters such as the sub-window size, size of the PDI, decision threshold, and so on, considering cdma2000 environments.

A Cluster-based Efficient Key Management Protocol for Wireless Sensor Networks (무선 센서 네트워크를 위한 클러스터 기반의 효율적 키 관리 프로토콜)

  • Jeong, Yoon-Su;Hwang, Yoon-Cheol;Lee, Keon-Myung;Lee, Sang-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.2
    • /
    • pp.131-138
    • /
    • 2006
  • To achieve security in wireless sensor networks(WSN), it is important to be able to encrypt and authenticate messages sent among sensor nodes. Due to resource constraints, many key agreement schemes used in general networks such as Diffie-Hellman and public-key based schemes are not suitable for wireless sensor networks. The current pre-distribution of secret keys uses q-composite random key and it randomly allocates keys. But there exists high probability not to be public-key among sensor nodes and it is not efficient to find public-key because of the problem for time and energy consumption. To remove problems in pre-distribution of secret keys, we propose a new cryptographic key management protocol, which is based on the clustering scheme but does not depend on probabilistic key. The protocol can increase efficiency to manage keys because, before distributing keys in bootstrap, using public-key shared among nodes can remove processes to send or to receive key among sensors. Also, to find outcompromised nodes safely on network, it selves safety problem by applying a function of lightweight attack-detection mechanism.

Construction of Optimal Anti-submarine Search Patterns for the Anti-submarine Ships Cooperating with Helicopters based on Simulation Method (대잠 헬기와의 협동 작전을 고려한 수상함의 최적 대잠탐색 패턴 산출을 위한 시뮬레이션)

  • Yu, Chan-Woo;Park, Sung-Woon
    • Journal of the Korea Society for Simulation
    • /
    • v.23 no.1
    • /
    • pp.33-42
    • /
    • 2014
  • In this paper we analyzed the search patterns for the anti-submarine warfare (ASW) surface ships cooperating with ASW helicopters. For this purpose, we modeled evasive motion of a submarine with a probabilistic method. And maneuvers and search actions of ships and helicopters participating in the anti-submarine search mission are designed. And for each simulation scenario, the case where a ship and a helicopter searches a submarine independently according to its optimized search pattern is compared with the case where the search platforms participate in the ASW mission cooperatively. Based on the simulation results, we proposed the reconfigured search patterns that help cooperative ASW surface ships increase the total cumulative detection probability (CDP).

Detection of Toluene Hazardous and Noxious Substances (HNS) Based on Hyperspectral Remote Sensing (초분광 원격탐사 기반 위험·유해물질 톨루엔 탐지)

  • Park, Jae-Jin;Park, Kyung-Ae;Foucher, Pierre-Yves;Kim, Tae-Sung;Lee, Moonjin
    • Journal of the Korean earth science society
    • /
    • v.42 no.6
    • /
    • pp.623-631
    • /
    • 2021
  • The increased transport of marine hazardous and noxious substances (HNS) has resulted in frequent HNS spill accidents domestically and internationally. There are about 6,000 species of HNS internationally, and most of them have toxic properties. When an accidental HNS spill occurs, it can destroys the marine ecosystem and can damage life and property due to explosion and fire. Constructing a spectral library of HNS according to wavelength and developing a detection algorithm would help prepare for accidents. In this study, a ground HNS spill experiment was conducted in France. The toluene spectrum was determined through hyperspectral sensor measurements. HNS present in the hyperspectral images were detected by applying the spectral mixture algorithm. Preprocessing principal component analysis (PCA) removed noise and performed dimensional compression. The endmember spectra of toluene and seawater were extracted through the N-FINDR technique. By calculating the abundance fraction of toluene and seawater based on the spectrum, the detection accuracy of HNS in all pixels was presented as a probability. The probability was compared with radiance images at a wavelength of 418.15 nm to select abundance fractions with maximum detection accuracy. The accuracy exceeded 99% at a ratio of approximately 42%. Response to marine spills of HNS are presently impeded by the restricted access to the site because of high risk of exposure to toxic compounds. The present experimental and detection results could help estimate the area of contamination with HNS based on hyperspectral remote sensing.

Development of Algorithm for Analyzing Priority Area of Forest Fire Surveillance Using Viewshed Analysis (가시권 분석을 이용한 산불감시 우선지역 선정 방안)

  • Lee, Byung-Doo;Ryu, Gye-Sun;Kim, Sun-Young;Kim, Kyong-Ha;Lee, Myung-Boa
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.14 no.3
    • /
    • pp.126-135
    • /
    • 2011
  • In this study, the algorithm for priority area of forest fire surveillance was developed to enhance the effectiveness of fire detection. The high priority surveillance area for forest fire detection was defined as the area with not only low value of viewshed analysis of the lookouts and detection cameras but also high fire occurrence probability. To build the priority map, fuzzy function and map algebra were used. The analysis results of Bonghwa-gun, Gyeongbuk Province, showed that the surveillance priority of central and southern area is higher than north area. This algorithm could be used in the allocation of fire prevention resources and selection of suitable point for new fire detection system.

Development of Forest Fire Occurrence Probability Model Using Logistic Regression (로지스틱 회귀모형을 이용한 산불발생확률모형 개발)

  • Lee, Byungdoo;Ryu, Gyesun;Kim, Seonyoung;Kim, Kyongha
    • Journal of Korean Society of Forest Science
    • /
    • v.101 no.1
    • /
    • pp.1-6
    • /
    • 2012
  • To achieve the forest fire management goals such as early detection and quick suppression, fire resources should be allocated at high probability area where forest fires occur. The objective of this study was to develop and validate models to estimate spatially distributed probabilities of occurrence of forest fire. The models were builded by exploring relationships between fire ignition location and forest, terrain and anthropogenic factors using logistic regression. Distance to forest, cemetery, fire history, forest type, elevation, slope were chosen as the significant factors to the model. The model constructed had a good fit and classification accuracy of the model was 63%. This model and map can support the allocation optimization of forest fire resources and increase effectiveness in fire prevention and planning.

Evaluation of Saltwater Intrusion to Coastal Aquifer by Using Probability Statistics (확률통계기법을 이용한 해안지역 대수층의 염수침입 평가)

  • Cheong, Jae-Yeol;Hamm, Se-Yeong;Kim, Kwang-Koo;Lee, Chung-Mo;Jeon, Hang-Tak;Ok, Soon-Il
    • The Journal of Engineering Geology
    • /
    • v.26 no.3
    • /
    • pp.371-382
    • /
    • 2016
  • Saltwater intrusion in coastal regions can be detected by using numerous geochemical constituents in groundwater. However, insufficient numbers of groundwater data can often make us difficult to interpret saltwater intrusion. Probability statistics technique enables statistical prediction using a limited numbers of water quality data for a wider range and can make to effectively evaluate saltwater intrusion through a characterized distribution of probability. This study evaluated saltwater intrusion by applying probability statistics to the chemical constituents in groundwater, coastal discharge, and stream water in the coastal areas of Busan City. By the result of the study, it is proven that Na+, Mg2+, K+, SO42−, and Cl, abundantly contained in seawater, are valuable indicators for evaluating saltwater intrusion. On the other hand, it is judged that Si4+, Fe2+, NO3, and PO43−, showing similar probability distribution in groundwater, coastal discharge, and stream water, are not appropriate indicators for the detection of saltwater intrusion.

Cavity-Backed Microstrip Antenna for a Monopulse Radar (모노펄스 레이다용 Cavity-Backed 마이크로스트립 안테나 개발)

  • 박종국;나형기;구연덕;이종민
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.14 no.2
    • /
    • pp.96-103
    • /
    • 2003
  • A cavity-backed microstrip patch antenna for a monopulse radar system is designed and fabricated. Also, this antenna is shown to be suitable for the system by analyzing the measured results. Since the azimuthal beamwidth required by this system is quite broad compared to that of a usual microstrip antenna, the width of a microstrip patch is reduced considerably. The decrease of an antenna bandwidth due to the reduced patch width is compensated by increasing the effective substrate thickness. A detection range and a detection probability is calculated from the measured gain at a given angle, and this result shows that the fabricated antenna can be applied well to this monopulse radar system.

A Lightweight Authentication Mechanism for Acknowledgment Frame in IEEE 802.15.4 (IEEE 802.15.4에서 확인 프레임을 위한 경량 인증 메커니즘)

  • Heo, Joon;Hong, Choong-Seon
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.3
    • /
    • pp.175-185
    • /
    • 2007
  • In IEEE 802.15.4 (Low-Rate Wireless Personal Area Network) specification, a successful reception and validation of a data or MAC command frame can be confirmed with an acknowledgment. However, the specification does not support security for acknowledgment frame; the lack of a MAC covering acknowledgments allows an adversary to forge an acknowledgment for any frame. This paper proposes an identity authentication mechanism at the link layer for acknowledgment frame in IEEE 802.15.4 network. With the proposed mechanism there is only three bits for authentication, which can greatly reduce overhead of device. The encrypted bit stream for identity authentication will be transmitted to device by coordinator within association process. Statistical method and simulation results prove that our mechanism is successful in handling MAC layer attack.