• Title/Summary/Keyword: Darpa

Search Result 73, Processing Time 0.025 seconds

Detonation Wave Studies for CVC Engines of TBCC (TBCC를 위한 CVC 엔진의 데토네이션 현상 기초 연구)

  • Choi, J.Y.;Parent, Bernard;Cho, D.R.;Kang, K.;Shin, J.R.;Lee, S.H.;Yi, T.H.
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2008.11a
    • /
    • pp.326-329
    • /
    • 2008
  • DARPA's hypersonic propulsion program VULCAN is aimed for development of Mach 4+ capable engine by combining current production turbofan engine such as F119 with CVC (Constant Volume Combustion) engine. Final goal is a TBCC(Turbo-based Combined Cycle) engine by combining with dual mode ramjet/scramjet engine. CVC is a common designation of new concept of high efficiency engines, such as Pulse Detonation Engine (PDE) or Continuous Detonation Engine (CDE), which use the detonation as a combustion mechanism. Present paper introduces the internationally collaborative research activities carried out in Aerospace Combustion and Propulsion Laboratory of the department of Aerospace Engineering of the Pusan national University.

  • PDF

Desirable Suggestions for Korean Geo-technology R&D through Analysis of the Global Grand Challenges and Moonshot Projects (글로벌 과학난제 도전연구프로젝트 분석을 통한 우리나라 지질자원기술에의 바람직한 제언)

  • Kim, Seong-Yong;Sung, Changmo
    • Economic and Environmental Geology
    • /
    • v.53 no.1
    • /
    • pp.111-120
    • /
    • 2020
  • Remarkable scientific and technological achievements are mainly shown in the 'super-convergence' or 'convergence of convergence' among cross- disciplinary fields, and advanced countries are promoting the 'high-risk, high-return research' ecosystem. Google LLC is carrying out numerous new challenges in terms of a non-failure perspective. Innovative research by the US Defense Advanced Research Projects Agency (DARPA) has produced such breakthroughs as the Internet, GPS, semiconductors, the computer mouse, autonomous vehicles, and drones. China is pioneering a 'Moon Village' and planning the world's largest nuclear fusion energy and ultra-large particle accelerator project. Japan has also launched 'the moonshot technology development research system' to promote disruptive innovation. In Korea, the government is preparing a new research program to tackle the global scientific challenges. Therefore, it is necessary to determine the reasonable geoscientific challenges to be addressed and to conduct a preliminary study on these topics. For this purpose, it is necessary to conduct long-term creative research projects centered on young researchers, select outstanding principal investigators, extract innovative topics without prior research or reference, simplify research proposal procedures, innovate the selection solely based on key ideas, and evaluate results by collective intelligence in the form of conferences.

21세기 미 핵심 군사기술계획

  • Kim, Hyeon-Bo
    • Defense and Technology
    • /
    • no.12 s.142
    • /
    • pp.60-69
    • /
    • 1990
  • 핵심기술계획(CTP)은 미국 의회가 국방부에 대해 매년 1회씩 제출하도록 의무를 부과한 보고로서, 1989년 3월에 제1호가 선보였다. 국방장고나 비서실(OSD)이 중심이 되어 3군, 전략방위기구(SDIO), DARPA, DNA, DIA 및 에너지성 본부와 산하 각 국립연구소 대표가 함께 종합한 것이며, 미 국방부가 1981년부터 발행하고 있는 "소련의 군사력(Soviet Military Power)"과 비교해볼 때 역사는 얕으나, 중요성에서는 결코 뒤지지 않고 있다. 1990년판에서는 반도체 재료 및 미소전자회로 등 20가지 기술을 핵심기술(Critical Tech)로 밝히고 있다

  • PDF

유비쿼터스 컴퓨팅

  • 박우출;이석필;조위덕
    • TTA Journal
    • /
    • s.85
    • /
    • pp.138-148
    • /
    • 2003
  • 본 고에서는 유비쿼터스, 퍼베이시브(pervasive), invisible computing 등 연구기관과 연구자 사이에서 서로 다르게 명명되는 용어를 퍼베이시브 컴퓨팅으로 통일하여 명명하였다. DARPA에서 지원하는 퍼베이시브 컴퓨팅 관련 미국 내 주요 대학의 프로젝트는 MIT의 Oxygen, UC Berkeley의 Endeavour, Washington 대학의 Portolano, Georgia Tech & OGI 의 Infosphere, CMU의 Aura 프로젝트 등이 있다. 산업체에서의 가장 대표적인 경우가 IBM의 Websphere 제품군과 HP의 Cooltown이라 할 수 있다. 본 고에서는 주요 대학들의 퍼베이시브 프로젝트들을 분석하였고, 퍼베이시브 컴퓨팅의 상업적인 모델인 IBM 제품들을 분석하였다.

  • PDF

Anomaly Intrusion Detection based on Clustering in Network Environment (클러스터링 기법을 활용한 네트워크 비정상행위 탐지)

  • 오상현;이원석
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.179-184
    • /
    • 2003
  • 컴퓨터를 통한 침입을 탐지하기 위해서 많은 연구들이 오용탐지 기법을 개발하였다. 최근에는 오용 탐지 기법을 개선하기 위해서 비정상행위 탐지 기법에 관련된 연구들이 진행중이다. 본 논문에서는 클러스터링 기법을 응용한 새로운 네트워크 비정상행위 탐지 기법을 제안한다. 이를 위해서 정상 행위를 다양한 각도에서 분석될 수 있도록 네트워크 로그로부터 여러 특징들을 추출하고 각 특징에 대해서 클러스터링 알고리즘을 이용하여 정상행위 패턴을 생성한다. 제안된 방법에서는 정상행위 패턴 즉 클러스터를 축약된 프로파일로 생성하는 방법을 제시하며 제안된 방법의 성능을 평가하기 위해서 DARPA에서 수집된 네트워크 로그를 이용하였다.

  • PDF

Network based Anomaly Intrusion Detection using Bayesian Network Techniques (네트워크 서비스별 이상 탐지를 위한 베이지안 네트워크 기법의 정상 행위 프로파일링)

  • Cha ByungRae;Park KyoungWoo;Seo JaeHyun
    • Journal of Internet Computing and Services
    • /
    • v.6 no.1
    • /
    • pp.27-38
    • /
    • 2005
  • Recently, the rapidly development of computing environments and the spread of Internet make possible to obtain and use of information easily. Immediately, by opposition function the Hacker's unlawful intrusion and threats rise for network environments as time goes on. Specially, the internet consists of Unix and TCP/IP had many vulnerability. the security techniques of authentication and access controls cannot adequate to solve security problem, thus IDS developed with 2nd defence line. In this paper, intrusion detection method using Bayesian Networks estimated probability values of behavior contexts based on Bayes theory. The contexts of behaviors or events represents Bayesian Networks of graphic types. We profiled concisely normal behaviors using behavior context. And this method be able to detect new intrusions or modificated intrusions. We had simulation using DARPA 2000 Intrusion Data.

  • PDF

Design of T-N2SCD Detection Model based on Time Window (타임 윈도우 기반의 T-N2SCD 탐지 모델 구현)

  • Shin, Mi-Yea;Won, Il-Young;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.11
    • /
    • pp.2341-2348
    • /
    • 2009
  • An intrusion detection technique based on host consider system call sequence or system call arguments. These two ways are suitable when system call sequence or order and length of system call arguments are out of order. However, there are two disadvantages which a false positive rate and a false negative rate are high. In this paper we propose the T-N2SCD detection model based on Time Window in order to reduce false positive rate and false negative rate. Data for using this experiment is provided from DARPA. As experimental results, the proposed model showed that the false positive rate and the false negative rate are lowest at an interval of 1000ms than at different intervals.

Study of Mobile Code Security Service in Active Network Environment (액티브 네트워크 환경에서의 이동코드 보안서비스 제공에 관한 연구)

  • 한인성;김진묵;유황빈
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.29-34
    • /
    • 2004
  • As the number of internet users grows rapidly, the services which users required becomes various. However, for fulfilling these various user requirements, the existing passive network should be standardized for a long time. To resolve the delay on providing services, active network as a new technology was suggested. Its router or switch with DARPA as center has the program running ability, so user oriented network can be composed. However, active network's architecture can resolve the user required service using mobile code on the network node, but it is more complex, easy-to-attack, various than the passive network. Many researchers have tried to resolve this problem. So, this paper studied the mobile code security service in active network environment to provide user's convenience and accommodation, and introduced ANASP system as an alternative.

  • PDF

Anomaly Intrusion Detection using Fuzzy Membership Function and Neural Networks (퍼지 멤버쉽 함수와 신경망을 이용한 이상 침입 탐지)

  • Cha, Byung-Rae
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.595-604
    • /
    • 2004
  • By the help of expansion of computer network and rapid growth of Internet, the information infrastructure is now able to provide a wide range of services. Especially open architecture - the inherent nature of Internet - has not only got in the way of offering QoS service, managing networks, but also made the users vulnerable to both the threat of backing and the issue of information leak. Thus, people recognized the importance of both taking active, prompt and real-time action against intrusion threat, and at the same time, analyzing the similar patterns of in-trusion already known. There are now many researches underway on Intrusion Detection System(IDS). The paper carries research on the in-trusion detection system which hired supervised learning algorithm and Fuzzy membership function especially with Neuro-Fuzzy model in order to improve its performance. It modifies tansigmoid transfer function of Neural Networks into fuzzy membership function, so that it can reduce the uncertainty of anomaly intrusion detection. Finally, the fuzzy logic suggested here has been applied to a network-based anomaly intrusion detection system, tested against intrusion data offered by DARPA 2000 Intrusion Data Sets, and proven that it overcomes the shortcomings that Anomaly Intrusion Detection usually has.

A Policy-based Secure Framework for Constructing Secure Networking (안전한 네트워크 구성을 위한 정책기반 보안 프레임워크)

  • 박상길;장종수;손승원;노봉남
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.8C
    • /
    • pp.748-757
    • /
    • 2002
  • Cyber-terror trials are increased in nowadays and these attacks are commonly using security vulnerability and information gathering method by variable services grew by the continuous development of Internet Technology. IDS's application environment is affected by this increasing Cyber Terror. General Network based IDS detects intrusion by signature based Intrusion Detection module about inflowing packet through network devices. Up to now security in network is commonly secure host, an regional issue adopted in special security system but these system is vulnerable intrusion about the attack in globally connected Internet systems. Security mechanism should be produced to expand the security in whole networks. In this paper, we analyzer the DARPA's program and study Infusion Detection related Technology. We design policy security framework for policy enforcing in whole network and look at the modules's function. Enforcement of security policy is acted by Intrusion Detection system on gateway system which is located in network packet's inflow point. Additional security policy is operated on-line. We can design and execute central security policy in managed domain in this method.