• Title/Summary/Keyword: Analysis & defence of detection technology

Search Result 12, Processing Time 0.021 seconds

Efficient Detection of Small Unmanned Aerial Vehicles in Cluttered Environment (클러터 환경을 고려한 효과적 소형 무인기 탐지에 관한 연구)

  • Choi, Jae-Ho;Kang, Ki-Bong;Sun, Sun-Gu;Lee, Jung-Soo;Cho, Byung-Lae;Kim, Kyung-Tae
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.30 no.5
    • /
    • pp.389-398
    • /
    • 2019
  • In this paper, we propose a method to detect small unmanned aerial vehicles(UAVs) flying in a real-world environment. Small UAV signals are frequently obscured by clutter signals because UAVs usually fly at low altitudes over urban or mountainous terrain. Therefore, to obtain a desirable detection performance, clutter signals must be considered in addition to noise, and thus, a performance analysis of each clutter removal technique is required. The proposed detection process uses clutter removal and pulse integration methods to suppress clutter and noise signals, and then detects small UAVs by utilizing a constant false alarm rate detector. After applying three clutter removal techniques, we analyzed the performance of each technique in detecting small UAVs. Based on experimental data acquired in a real-world outdoor environment, we found it was possible to derive a clutter removal method suitable for the detection of small UAVs.

Analysis of the Robot for Detection of Improvised Explosive Devices and a Technology for the CNT based Detection Sensor (급조 폭발물(IED) 제거 로봇의 개발비용 분석 및 카본나노튜브 기반 탐지센서기술에 관한 연구)

  • Kwon, Hye Jin
    • Journal of the Semiconductor & Display Technology
    • /
    • v.17 no.1
    • /
    • pp.54-61
    • /
    • 2018
  • In this study, two aspects were analyzed about the robot for removal of explosive devices. First, the cost analyses were performed to provide a reasonable solution for the acquirement of the system. It is processed by an engineering estimate method and the process was consisted of two ways : a system development expense and a mass production unit price. In additions, the resultant cost analyses were compared between the cases excluding and including a mines detection system. As results, in the case of the acquirement of the robot system for removal of explosive devices, it is recommended that the performance by improving the mines detection ability should be considered preferentially rather than the cost because the material cost for the mines detection system is negligible compared to the whole system cost. Second, as a way for improving the system performance by the mine detection function, the carbon nanotube (CNT) based sensor technology was studied in terms of sensitivity and simple productivity with presenting its preliminary experimental results. The detection electrodes were formed by a photolithography method using a photosensitive CNT paste. As results, this method was shown as a scalable and expandable technology for the excellent mines detection sensors.

Research Trends in Chemical Analysis Based Explosive Detection Techniques (화학분석 기반 폭발물 탐지 기술 동향)

  • Moon, Sanghyeon;Lee, Wonjoo;Lee, Kiyoung
    • Applied Chemistry for Engineering
    • /
    • v.33 no.1
    • /
    • pp.1-10
    • /
    • 2022
  • This paper reviews the principles, advantages, and disadvantages of main explosives detection technologies, as well as research areas needed in the future. Explosives detection technology can be classified into spectroscopic methods, sensor techniques, and olfactory type sensors. There have been advances in explosives detection technology, however studies on discriminatory, portability, and sensitivity for explosives detection still remained competitive.

Analysis & defence of detection technology in network Attacker (네트워크 침입자탐지기법 분석과 대응)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.155-163
    • /
    • 2013
  • Connection hijacking attack using the vulnerability of the TCP protocol to redirect TCP stream goes through your machine actively (Active Attack). The SKEY such as one-time password protection mechanisms that are provided by a ticket-based authentication system such as Kerberos or redirection, the attacker can bypass.Someone TCP connection if you have access on TCP packet sniffer or packet generator is very vulnerable. Sniffer to defend against attacks such as one-time passwords and token-based authentication and user identification scheme has been used. Active protection, but these methods does not sign or encrypt the data stream from sniffing passwords over insecure networks, they are still vulnerable from attacks. For many people, an active attack is very difficult and so I think the threat is low, but here to help break the illusion successful intrusion on the UNIX host, a very aggressive attack is presented. The tools available on the Internet that attempt to exploit this vulnerability, known as the recent theoretical measures is required. In this paper, we propose analysis techniques on a wireless network intruder detection.

Realtime National Defense Issue Detection and Grouping based on Web Media (웹 미디어 기반 실시간 국방 이슈 탐지 및 그룹핑)

  • Oh, Hyo-Jung
    • Journal of Digital Convergence
    • /
    • v.13 no.8
    • /
    • pp.253-260
    • /
    • 2015
  • Because mass of activity records of individuals and organizations are accumulated in the digital space and amount of information is also increasing exponentially, the most urgent requirements of users is the tool for 'efficient' acquisition of 'useful' information. This paper try digital convergence to combine a domain specific technology with real time issue detection and grouping based on Web media. To derive core functionalities, we collect and analyze user requirements of national defense issue detection services. By utilizing linguistic resources specialized on national defence area and discovering features for measuring issue importance, we try to seek differentiation domain specific issue detection method. Finally we compare our detection results based on the development outputs of prototype.

The Cause Analysis of Pitting Corrosion on the Waterjet Impeller (물분사 추진기 임펠러 부식에 대한 원인분석)

  • Lee, Hyeong-Sin;Jung, Un-Hwa
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.6
    • /
    • pp.545-551
    • /
    • 2020
  • Cause analysis of surface pitting crack on a waterjet impeller was conducted. The waterjet impeller was made from stainless steel duplex 2205, which is more resistant to corrosion and local corrosion than typical stainless steel 316L and 317L, and has high mechanical strength, making it a useful material in various marine structures and seawater desalination facilities. The measurements were taken by scanning electron microscopy (SEM) and molecular ecological detection. The chemical composition of S was examined by SEM in the area of pitting corrosion. The dsrAB gene was detected on the sample of the pitting corrosion of the impeller through molecular ecological detection. Therefore, pitting corrosion on the surface of a waterjet impeller was caused by sulphite-reducing bacteria (SRB). To prevent the spread of SRB, management is required through high temperature treatments (over 65℃), pH management, or the insulation of a hull and waterjet.

Analysis of Contact Loss Arc Spectrum between Contact Wire and Pantograph Material using a Spectrometer (광계측기를 이용한 전차선-팬터그래프 재질별 이선아크 스펙트럼 분석)

  • Chang, Chin-Young;Jung, No-Geon;Park, Jong-Gook;Koo, Kyung-Wan;Kim, Jae-Moon
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.62 no.12
    • /
    • pp.1803-1808
    • /
    • 2013
  • To maintain contact between catenary and pantograph copper is important in order to transmit power smoothly on Current collection system. But, Arc discharge with strong light is generated because of contact loss. Therefore, Arc discharge detection is important measurement factor judging performance of current collection system. In this paper, It is described to results of arc discharge applying UV detection technology using arc generator. And Arc discharge was detected using the most commonly used processing catenary and rigid catenary and pantograph copper of electric rolling stock for securing arc detection instrument reliability. Results of contact loss detection instrument in this paper will be used for maintenance of current collection quality and system.

A study on analysis model for real radio spectrum data correlation in High-Mountain Area (고지대에서의 전파도달범위 분석을 위한 실측 데이터 기반 전파도달 상관관계 분석모델 연구)

  • Han, In-Sung;Sohn, Ju-Hang;Park, Moo-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.5
    • /
    • pp.697-708
    • /
    • 2016
  • As the needs for fast wireless communication technology in various fields, including companies, individuals, etc., grows, many research projects related to the coverage of propagation are being carried out for plaining optimized communication services. On the other hand, there are some limitations in surveying and analyzing propagation in highland areas. To provide a better communication service of a new service, a range of radio environment conditions based on a wide radio bandwidth (selection of propagation model, correction of value in accordance with radio bandwidth, etc.) should be considered. In particular, radio environment conditions are becoming increasingly sophisticated. By the early detection of real-time changes in the radio spectrum, which is based on an examination and research of regional occupied band width condition, proper measures should be established. To make a proper solution of above, the basic real-time analysis of spectrum distribution status by regional groups is necessary. In addition, the establishment of prompt measures should be enable by stored or analyzed radio data. In an attempt to predict reliable propagation coverage, this thesis examines the limited propagation data with HTZ Warfare, which were collected from domestic high land sites faced with limited access. Furthermore, a comparative result value evaluation for an optimized propagation model was performed through testing simulations, and frequency-dependent and propagation model-dependent analysis.

An Attack Behavior Expressions for Web Attack Analysis and Composing Attack Database (웹 공격 분석 및 공격 데이터베이스 생성을 위한 효과적인 표현 방법에 관한 연구)

  • Lee, Chang-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.5
    • /
    • pp.725-736
    • /
    • 2010
  • Nowadays, followed the internet service contents increasing makes also increase attack case on the web system. Usually web attack use mixed many kinds of attack mechanism for successfully attack to the server system. These increasing of the kinds attack mechanism, however web attack defence mechanism is not follow the spread of the attack. Therefore, for the defends web application, web attack should be categorizing and analysing for the effective defense. In this paper, we analyze web attack specification evidence and behavior system that use for effective expressions what we proposed. Also, we generate web attack scenario, it is for using verification of our proposed expressions.

System Design and Performance Analysis of 3D Imaging Laser Radar for the Mapping Purpose (맵핑용 3차원 영상 레이저 레이다의 시스템 설계 및 성능 분석)

  • La, Jongpil;Ko, Jinsin;Lee, Changjae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.1
    • /
    • pp.90-95
    • /
    • 2014
  • The system design and the system performance analysis of 3D imaging laser radar system for the mapping purpose is addressed in this article. For the mapping, a push-bloom scanning method is utilized. The pulsed fiber laser with high pulse energy and high pulse repetition rate is used for the light source of laser radar system. The high sensitive linear mode InGaAs avalanche photo-diode is used for the laser receiver module. The time-of-flight of laser pulse from the laser to the receiver is calculated by using high speed FPGA based signal processing board. To reduce the walk error of laser pulse regardless of the intensity differences between pulses, the time of flight is measured from peak to peak of laser pulses. To get 3D image with a single pixel detector, Risley scanner which stirs the laser beam in an ellipsoidal pattern is used. The system laser energy budget characteristics is modeled using LADAR equation, from which the system performances such as the pulse detection probability, false alarm and etc. are analyzed and predicted. The test results of the system performances are acquired and compared with the predicted system performance. According to test results, all the system requirements are satisfied. The 3D image which was acquired by using the laser radar system is also presented in this article.