• Title/Summary/Keyword: Defence Data

Search Result 214, Processing Time 0.026 seconds

The Study on Design of Circuit Card Assembly on Servo Control Unit for Automated Resupply Vehicle K56 (K56 탄약운반장갑차용 서보제어기의 회로카드조립체 설계에 관한 연구)

  • Lee, Ju-Seung;Kim, Seong-Jin;Bae, Gong-Myeong;Kwon, Soon-Mo;Park, Hyean-Jo;Choi, Jun-Sok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.102-109
    • /
    • 2019
  • This paper describes the design of the circuit card assembly to eliminate the communication error on a servo control unit installed in the automated resupply vehicle K56. K56 is a weapon system that automates the supply and loading of ammunition on the K-55A1 self-propelled artillery. As the core item responsible for ammunition movement control, the servo control unit is required to have good communication stability and reliability, but the conventional unit has recognized a problem that communication error intermittently occurs, resulting in an emergency stop phenomenon. We analyzed the communication signal of the servo control unit and identified the failure cause of the circuit card assembly to solve this problem. In addition, the signal interference in data/address line of the circuit card assembly was confirmed through analysis of the failure cause, and redesigned to avoid the interference, such as adjustment of the distance between communication lines and position change. Finally, the proposed cause analysis and redesign were verified through the component of servo control unit and attachment test on K56. We expected these study results to be used as reference for the design of other similar items.

Deep-Learning-Based Mine Detection Using Simulated Data (시뮬레이션 데이터 기반으로 학습된 딥러닝 모델을 활용한 지뢰식별연구)

  • Buhwan Jeon;Chunju Lee
    • Journal of The Korean Institute of Defense Technology
    • /
    • v.5 no.4
    • /
    • pp.16-21
    • /
    • 2023
  • Although the global number of landmines is on a declining trend, the damages caused by previously buried landmines persist. In light of this, the present study contemplates solutions to issues and constraints that may arise due to the improvement of mine detection equipment and the reduction in the number of future soldiers. Current mine detectors lack data storage capabilities, posing limitations on data collection for research purposes. Additionally, practical data collection in real-world environments demands substantial time and manpower. Therefore, in this study, gprMax simulation was utilized to generate data. The lightweight CNN-based model, MobileNet, was trained and validated with real data, achieving a high identification rate of 97.35%. Consequently, the potential integration of technologies such as deep learning and simulation into geographical detection equipment is highlighted, offering a pathway to address potential future challenges. The study aims to somewhat alleviate these issues and anticipates contributing to the development of our military capabilities in becoming a future scientific and technological force.

  • PDF

A Study on Optimization of Noise Reduction of Auxiliary Power Unit for Military Tracked Vehicle (군용 궤도장비 보조동력장치의 소음저감 최적화 연구)

  • Lee, Ju-Seung;Kim, Byeong-Ho;Kim, Byung-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.8
    • /
    • pp.336-342
    • /
    • 2018
  • Noise reduction is an important issue in auxiliary power unit(APU) of tracking equipments for using military. In this study, we designed and tested reduction methods of structure borne noise and airborne source noise at the auxiliary power unit. From the bench test results, it is found that the effect of noise reduction is about 22 dB(A) if the silencer is redesigned, which is the rescue structure. However, the influence of noise reduction by air is insufficient. In addition, it is confirmed that the effect of noise reduction is excellent when structure borne noise reduction is applied to the vehicle. We expected that the test results of this study are used as basic data to reduce the noise of other tracking equipment developed later.

Software structure design for processing various tactical data

  • Kim, Jin Woo;Lee, Woo Sin;Lee, Seung Chan;Kim, Young Don;Jin, So Yeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.11
    • /
    • pp.39-47
    • /
    • 2017
  • In this paper, we propose a message transmission processing structure for efficient use of radio resources. Existing tactical data links have more data and accumulate more data than the amount of tactical data planned according to the situation. This may result in delays in operations and additional problems. To prevent this, priority is assigned to the message and transmission is performed according to the priority on a single basis. And we design a processing structure that can update duplicate messages and delete old messages in order to prevent waste of radio resources. Experiments are conducted to verify that these structures can be implemented and applied to data links.

A study on analysis model for real radio spectrum data correlation in High-Mountain Area (고지대에서의 전파도달범위 분석을 위한 실측 데이터 기반 전파도달 상관관계 분석모델 연구)

  • Han, In-Sung;Sohn, Ju-Hang;Park, Moo-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.5
    • /
    • pp.697-708
    • /
    • 2016
  • As the needs for fast wireless communication technology in various fields, including companies, individuals, etc., grows, many research projects related to the coverage of propagation are being carried out for plaining optimized communication services. On the other hand, there are some limitations in surveying and analyzing propagation in highland areas. To provide a better communication service of a new service, a range of radio environment conditions based on a wide radio bandwidth (selection of propagation model, correction of value in accordance with radio bandwidth, etc.) should be considered. In particular, radio environment conditions are becoming increasingly sophisticated. By the early detection of real-time changes in the radio spectrum, which is based on an examination and research of regional occupied band width condition, proper measures should be established. To make a proper solution of above, the basic real-time analysis of spectrum distribution status by regional groups is necessary. In addition, the establishment of prompt measures should be enable by stored or analyzed radio data. In an attempt to predict reliable propagation coverage, this thesis examines the limited propagation data with HTZ Warfare, which were collected from domestic high land sites faced with limited access. Furthermore, a comparative result value evaluation for an optimized propagation model was performed through testing simulations, and frequency-dependent and propagation model-dependent analysis.

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

Development of Integrated Test Equipment for Airborne SAR System and Control Unit (항공탑재 SAR 시스템 및 통제장치 시험을 위한 통합시험장비 개발)

  • Lee, Hyon-Ik;Hwang, Tae-Jin
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.41 no.9
    • /
    • pp.747-754
    • /
    • 2013
  • This paper describes SCTE(System and Control unit Test Equipment) as an integrated test equipment for airborne SAR system and control unit. SCTE enhances reusability of test equipment by modular design for required functions and strengthens automatic testing and test convenience by providing functions such as script-based testing function and report generation function. Also, it includes a navigation data simulator which can simulate various flight conditions. In this paper, we details SCTE requirements, H/W and S/W design, implementation, and test results with control unit and SAR system.

Foreign Direct Investment and Economic Growth in SAARC Countries

  • Erum, Naila;Hussain, Shahzad;Yousaf, Abida
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.3 no.4
    • /
    • pp.57-66
    • /
    • 2016
  • Foreign Direct Investment (FDI) plays a vital role in economic growth of the countries. The present study analyses the impact of the FDI on economic growth of South Asian Association of Regional Cooperation countries by using the pooled data for the period 1990-2014. Neo-classical production function has been used for analysis and getting stock-to-flow estimation, Taylor series approximation has applied. Fixed Effects Model has been used to investigate the impact of FDI, domestic capital, labour and government expenditures on economic growth. It is the evident from the results that both domestic investment and FDI have been a positive effect on economic growth. The study finds that the contribution of domestic private investment is more trustworthy than the contribution of FDI. Consequently, FDI loses its attraction as an engine of growth if the adverse balance of payment consequence of the resulting profit repatriating is also taken into account. The labour has positive and significant association with GDP. The effect of government expenditure is negligible on economic growth. The findings suggest that growth strategy cannot yield the long term benefits if it neglects investments on human capital.

Topology Aggregation for Hierarchical Wireless Tactical Networks

  • Pak, Woo-Guil;Choi, Young-June
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.2
    • /
    • pp.344-358
    • /
    • 2011
  • Wireless tactical network (WTN) is the most important present-day technology enabling modern network centric warfare. It inherits many features from WMNs, since the WTN is based on existing wireless mesh networks (WMNs). However, it also has distinctive characteristics, such as hierarchical structures and tight QoS (Quality-of-Service) requirements. Little research has been conducted on hierarchical protocols to support various QoS in WMN. We require new protocols specifically optimized for WTNs. Control packets are generally required to find paths and reserve resources for QoS requirements, so data throughput is not degraded due to overhead. The fundamental solution is to adopt topology aggregation, in which a low tier node aggregates and simplifies the topology information and delivers it to a high tier node. The overhead from control packet exchange can be reduced greatly due to decreased information size. Although topology aggregation is effective for low overhead, it also causes the inaccuracy of topology information; thus, incurring low QoS support capability. Therefore, we need a new topology aggregation algorithm to achieve high accuracy. In this paper, we propose a new aggregation algorithm based on star topology. Noting the hierarchical characteristics in military and hierarchical networks, star topology aggregation can be used effectively. Our algorithm uses a limited number of bypasses to increase the exactness of the star topology aggregation. It adjusts topology parameters whenever it adds a bypass. Consequently, the result is highly accurate and has low computational complexity.

National Brand, Tourism and Human Development: Analysis of the Relationship and Distribution

  • STRYZHAK, Olena;AKHMEDOVA, Olena;POSTUPNA, Olena;SHCHEPANSKIY, Eduard;TIURINA, Dina
    • Journal of Distribution Science
    • /
    • v.19 no.12
    • /
    • pp.33-43
    • /
    • 2021
  • Purpose: This paper aims to determine features of the relationship between human development, tourism and national brand. Research design, data and methodology: ranking indicators, cluster analysis, K means method, correlation analysis. Results: The analysis covers data for 95 countries for 2019. The number of countries is justified by the availability of comparable data for calculations. A direct relationship between the indicators for the entire sample has been revealed in the result of the correlation analysis. However, this relationship has not been confirmed for the groups of countries that were formed through the cluster analysis. Spearman Rank Order and Kendall Tau Correlations have been calculated for the five obtained clusters. In two of the five clusters, the relationship between the indicators has not been found. A strong negative link between all the indicators has been detected in the cluster with average index values. A strong positive link between TTCI and BSI has been revealed in the group of countries with the best index values. A strong positive link between TTCI and HDI has been found in the group of countries with the worst index values. Conclusions: The analysis demonstrates that there is a relationship between BSI, TTCI and HDI, and while this link is observed for the sample as a whole, it is not homogeneous for groups of countries.