• Title/Summary/Keyword: Defence Data

Search Result 214, Processing Time 0.022 seconds

Prediction of Gear Bending Fatigue Life of Electro-mechanical Actuator for Aircraft Through Finite Element Analysis

  • Kim, Taehyung;Seok, Taehyeon;Kwon, Soon-hyeong;Lee, Byung-ho;Kwon, Byung-gi;Kwon, Jun-yong;Cheong, Seong-kyun
    • Journal of Aerospace System Engineering
    • /
    • v.14 no.6
    • /
    • pp.58-67
    • /
    • 2020
  • In this study, finite element fatigue analysis combined with a fatigue correlation factor is proposed to predict the bending fatigue life of a gear in an electro-mechanical aircraft actuator. First, stress-life curves are obtained for the gear material via a round bar fatigue test. Subsequently, stochastic stress-life (P-S-N) curves are derived for 50% and 1% failure probabilities, separately. The curves are applied to the fatigue analysis model of a single gear tooth, and the effect of the fatigue correction factor is analyzed. The analytical P-S-N curves reflecting the fatigue correction factor matched the experimental data. This shows that the analytical fatigue life is reliable and that the analysis technique is effective.

Nonlinear Transonic Flutter Analysis of a Composite Fin Considering Delamination Effect (층간분리 효과를 고려한 복합재 핀의 비선형 천음속 플러터 해석)

  • Gwang Young Lee;Ki-Ha Kim;Dong-Hyun Kim
    • Journal of Aerospace System Engineering
    • /
    • v.17 no.6
    • /
    • pp.82-93
    • /
    • 2023
  • In this paper, nonlinear transonic flutter analyses of a composite missile fin considering the effect of delamination are conducted. An effective modal analysis methodology is adopted and verified with the experimental modal test data for laminated composite plates with delamination. Extended version of the in-house computational aeroelastic analysis program with the transonic small-disturbance (TSD) code is used in order to predict the flutter dynamic pressure of the delaminated composite fin models. In the subsonic, transonic, and supersonic flow regions, nonlinear time-domain flutter analyses are performed for various delamination conditions, and aeroelastic characteristics due to the delamination phenomena are examined in detail.

Prediction on the Performance Variation by the Rover Position of the One-way Network RTK (사용자 위치별 단방향 Network RTK 측위 성능 예측)

  • Park, Byungwoon;Wang, Namkyong;Kee, Changdon;Park, Heungwon;Seo, Seungwoo
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2014.06a
    • /
    • pp.107-108
    • /
    • 2014
  • As the demand for precise navigation has increased, more focus is put on the precise positioning, RTK(Real Time Kinematics) which has been used in the surveying field. The Position of Single Reference Station RTK or two-way network RTK such as VRS (Virtual Reference Station) is accurate enough to be used as a main technology in land surveying, however its service area and number of users is limited and the users are assumed static. This characteristic is not suitable to the navigation, whose service target is infinite number of users moving over a wide area. One-way network RTK has recently been suggested as a solution for the precise navigation technique for the mobile user. This paper shows the performance prediction of the one-way network RTK such as MAC(Master-Auxiliary Concept), or FKP (Flachenkorrekturparameter). To show the performance variation by the rover position, we constructed a simulation data of users on the grid with 0.1 degree spacing between 36.5 and 37 degree latitude and between 127 and 127.5 degree longitude.

  • PDF

A Study on the case of Application of Women's Personnel in the New Zealand Defence Force (뉴질랜드 군 여성인력의 활용과 우리 군에 주는 시사점)

  • In-Chan Kim;Jong-Hoon Kim;Jun-Hak Sim;Kang-Hee Lee;Sang-Keun Cho;Sang-Hyuk Park;Myung-Sook Hong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.415-419
    • /
    • 2023
  • The New Zealand Defence Force (NZDF) began using female manpower from World War II. After making various efforts to secure excellent manpower, the proportion of female manpower has risen to 24%, higher than that of Britain, the United States, Canada and Australia, which have a longer history of female military personnel than New Zealand. This is the result of NZDF efforts to open combat roles to women and allow female personnel to advance to high-ranking military positions such as generals and consular officers. In addition, policy alternatives to address women's realistic concerns such as pregnancy and childbirth, childcare, and vertical organizational culture were presented. In particular, Operation "Respect" was implemented to overcome the problem of not leaving or joining the army due to inappropriate sexual behavior and bullying. The operation respect established the role of the leader, emphasized the support of the victim, and accumulated data of the accident to prevent similar accidents. In addition, through the "Wāhine Toa" program, excellent female manpower could be introduced into the military through customized support considering the military life cycle (attract-recruit-retain-advance) of female personnel. South Korea is also considering expanding the ratio and role of female manpower as one of the ways to overcome the shortage of troops and leap into an advanced science and technology group. Implications were derived from the use of female manpower in the NZDF and the direction in which the Korean military should proceed was considered.

A Study on Converting the Data of Probability of Hit(Ph) for OneSAF Model (OneSAF 모델을 위한 명중률 데이터 변환 방법)

  • Kim, Gun In;Kang, Tae Ho;Seo, Woo Duck;Pyun, Jae Jung
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.3
    • /
    • pp.83-91
    • /
    • 2020
  • To use the OneSAF model for the analysis of Defence M&S, the most critical factor is the acquisition of input data. The model user is hard to determine the input data such as the probability of hit(Ph) and the probability of kill(Pk). These data can be obtained directly by live fire during the development test and the operational test. Therefore, this needs more time and resources to get the Ph and Pk. In this paper, we reviewed possible ways to obtain the Ph and Pk. We introduced several data producing methodologies. In particular, the error budget method was presented to convert the Ph(%) data of AWAM model to the error(mil) data of OneSAF model. Also, the conversion method which can get the adjusted results from the JMEM is introduced. The probability of a hit was calculated based on the error budget method in order to prove the usefulness of the given method. More accurate data were obtained when the error budget method and the projected area from the published photo were used simultaneously. The importance of the Ph calculation was demonstrated by sensitivity analysis of the Ph on combat effectiveness. This paper emphasizes the importance of determining the Ph data and improving the reliability of the M&S system though steady collection and analysis of the Ph data.

A Study on Presidential Security Activities of Military Intelligence Investigation Agency - Since the Korean War, from 1950 to the present - (군(軍) 정보수사기관의 대통령 경호활동 고찰: 1950년 한국전쟁 이후부터 현재까지)

  • Choi, Jong-Young;Jung, Ju-Ho
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.63-79
    • /
    • 2017
  • Defence Security Command is the only military intelligence and investigation agency which is in charge of safeguarding military information and investigating specific crimes such as subversion and disloyalty in military. While the presidential security provided by Defence Security Command, along with Presidential Security Service(PSS) and the police, forms one of three pillars sustaining presidential security, its works and activities have been rarely known to the public due to the military confidentiality. This study looks into some data specialized into the presidential security among works of Defense Security Command by using various resources such as biographies of key people, media reports, and public materials. It reviews the presidential security works in a historical sense that the works have developed and changed in accordance with the historical changes of Defense Security Command, which was rooted in Counter-Intelligence Corps (Teukmubudae in Korean) in 1948 and leads to the present. The study findings are as follows. First, when the Korean War broke out in 1950 and since then the South Korea was under the threat of the North Korean armed forces and left wing forces, Counter-Intelligence Corps(Bangcheopdudae in Korean) took the lead in presidential security more than the police who was in charge of it. Secondly, even after the Presidential Security Office has founded in 1963, the role of the military on presidential security has been extended by changing its titles from Counter-Intelligence Corps to Army Security corps to Armed Forces Security Command. It has developed their provision of presidential security based on the experience at the president Rhee regime when they could successfully guard the president Rhee and the important government members. Third, since the re-establishment into Defence Security Command in 1990, it has added more security services and strengthened its legal basis. With the excellent expertise, it played a pivotal role in the G20 and other state-level events. After the establishment of the Moon Jaeinin government, its function has been reduced or abolished by the National Defense Reform Act. However, the presidential security field has been strengthening by improving security capabilities through reinforcing the organization. This strengthening of the security capacity is not only effective in coping with the current confrontation situation with the hostile North Korean regime, but also is important and necessary in conducting constant monitoring of the military movement and security-threat factors within military during the national security events.

  • PDF

A study on the improvement of robust automatic initiated tracking on narrowband target (협대역표적 추적자동개시의 견실성 향상에 대한 연구)

  • Kim, Seong-Weon;Cho, Hyeon-Deok;Kwon, Taek-Ik
    • The Journal of the Acoustical Society of Korea
    • /
    • v.39 no.6
    • /
    • pp.549-558
    • /
    • 2020
  • In this paper, the method is discussed such that the robustness of automatic initiated narrowband target tracking is improved in passive sonar. In the case of automatic tracking initiation as target in passive sonar, due to a number of clutter, the clutter is initiated as target and tracked which prohibits the operation capability. The associated probability and information entropy of measurements, extracted from detection data, is calculated to keep going on automatic target initiation and tracking of true target, but reduce the automatic initiation and tracking of clutter. If the association probability and information entropy of the extracted measurements is satisfied for the predefined conditions, the procedure of automatic initiation begins. Using sea-trial data, simulations are executed and the results from the proposed method indicate that it keeps the automatic target initiation and tracking of true target and suppresses the automatic target initiation and tracking of clutters in contrary to the conventional method.

LOFAR/DEMON grams compression method for passive sonars (수동소나를 위한 LOFAR/DEMON 그램 압축 기법)

  • Ahn, Jae-Kyun;Cho, Hyeon-Deok;Shin, Donghoon;Kwon, Taekik;Kim, Gwang-Tae
    • The Journal of the Acoustical Society of Korea
    • /
    • v.39 no.1
    • /
    • pp.38-46
    • /
    • 2020
  • LOw Frequency Analysis Recording (LOFAR) and Demodulation of Envelop Modulation On Noise (DEMON) grams are bearing-time-frequency plots of underwater acoustic signals, to visualize features for passive sonar. Those grams are characterized by tonal components, for which conventional data coding methods are not suitable. In this work, a novel LOFAR/DEMON gram compression algorithm based on binary map and prediction methods is proposed. We first generate a binary map, from which prediction for each frequency bin is determined, and then divide a frame into several macro blocks. For each macro block, we apply intra and inter prediction modes and compute residuals. Then, we perform the prediction of available bins in the binary map and quantize residuals for entropy coding. By transmitting the binary map and prediction modes, the decoder can reconstructs grams using the same process. Simulation results show that the proposed algorithm provides significantly better compression performance on LOFAR and DEMON grams than conventional data coding methods.

Advanced protocol against MITM attacks in Industrial Control System (산업제어시스템에서의 MITM 공격을 방어하기 위해 개선된 프로토콜)

  • Ko, Moo-seong;Oh, Sang-kyo;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1455-1463
    • /
    • 2015
  • If the industrial control system is infected by malicious worm such as Stuxnet, national disaster could be caused inevitably. Therefore, most of the industrial control system defence is focused on intrusion detection in network to protect against these threats. Conventional method is effective to monitor network traffic and detect anomalous patterns, but normal traffic pattern attacks using MITM technique are difficult to be detected. This study analyzes the PROFINET/DCP protocol and weaknesses with the data collected in real industrial control system. And add the authentication data field to secure the protocol, find out the applicability. Improved protocol may prevent the national disaster and defend against MITM attacks.

A Study on a 4-Stage Phased Defense Method to Defend Cloud Computing Service Intrusion (Cloud Computing 서비스 침해방어를 위한 단계별 4-Stage 방어기법에 관한 연구)

  • Seo, Woo-Seok;Park, Dea-Woo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1041-1051
    • /
    • 2012
  • Attack on Cloud Computing, an intensive service solution using network infrastructure recently released, generates service breakdown or intrusive incidents incapacitating developmental platforms, web-based software, or resource services. Therefore, it is needed to conduct research on security for the operational information of three kinds of services (3S': laaS, PaaS, SaaS) supported by the Cloud Computing system and also generated data from the illegal attack on service blocking. This paper aims to build a system providing optimal services as a 4-stage defensive method through the test on the attack and defense of Cloud Computing services. It is a defense policy that conducts 4-stage, orderly and phased access control as follows: controlling the initial access to the network, controlling virtualization services, classifying services for support, and selecting multiple routes. By dispersing the attacks and also monitoring and analyzing to control the access by stage, this study performs defense policy realization and analysis and tests defenses by the types of attack. The research findings will be provided as practical foundational data to realize Cloud Computing service-based defense policy.