• Title/Summary/Keyword: Defense Model

Search Result 1,792, Processing Time 0.028 seconds

Modeling of Received Radar Signals for Scan Pattern Analysis (스캔패턴 분석을 위한 레이더 수신신호 모델링)

  • Kim, Yong-Hee;Kim, Wan-Jin;Song, Kyu-Ha;Lee, Dong-Won;Kim, Hyoung-Nam
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.4
    • /
    • pp.73-85
    • /
    • 2010
  • In dense electronic warfare signal environments, the conventional radar identification methods based on the basic parameters such as frequency, pulse width, and pulse repetition interval are confronted by the problem of identification ambiguity. To overcome this critical problem, a new approach introducing scan pattern of radars has been presented. Researches on new identification methods, however, suffer from a practical problem that it is not easy to secure the many radar signals including various scan pattern information and operation parameters. This paper presents a modeling method of radar signals with which we can generate radar signals including various scan pattern types according to the parameters determining the variation pattern of received signal strength. In addition, with the radar signals generated by the proposed model we analyze their characteristics according to the location of an electronic warfare support (ES) system.

A Study of Action Research Analysis Methods Model of Backdoor Behavior based on Operating Mechanism Diagnosis (동작 메커니즘 진단을 기반으로 한 백도어(backdoor) 행동분석 방법 모델 연구)

  • Na, SangYeob;Noh, SiChoon
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.17-24
    • /
    • 2014
  • Form of backdoor penetration attacks "trapdoor" penetration points to bypass the security features and allow direct access to the data. Backdoor without modifying the source code is available, and even code generation can also be modified after compilation. This approach by rewriting the compiler when you compile the source code to insert a specific area in the back door can be due to the use of the method. Defense operations and the basic structure of the backdoor or off depending on the nature of the damage area can be a little different way. This study is based on the diagnosis of a back door operating mechanism acting backdoor analysis methods derived. Research purposes in advance of the attack patterns of malicious code can respond in a way that is intended to be developed. If we identify the structures of backdoor and the infections patterns through the analysis, in the future we can secure the useful information about malicious behaviors corresponding to hacking attacks.

Needs and considerrations of corporate security assessment (Focusing on financial companies) (기업 보안평가 공시제도의 필요성 및 구현방안 (금융회사 중심으로))

  • Kim, Bo;Lim, Jong-In
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.273-279
    • /
    • 2014
  • Recently, it was occurred in the nation's largest Information spill about 140 million cases of credit card customers' personal and credit information. As such, it was rapidly to increase in consumer complaints about the privacy of personal information in accordance with outflow of financial companies increased accident. But it is still not clear precaution. Therefore, in financial customer position, it is possible to confirm and determine in advance whether or not superior to the security company. In addition, It is time to be required institutional device that can be a real effort to equip a good security company. This report is considered a model of "Disclosure of corporate security assessment " of these devices institutional study. And We study in realistic and objective stance about why do we need this policy.

An Analysis on BER Performance of Satellite Communication System Classified by SFH-Modulation Method under Jamming (Jamming 환경에서 SFH 변조 방식에 따른 위성 통신 시스템의 BER 성능 분석)

  • Park, Woo-Chul;Go, Kwang-Chun;Kim, Jae-Hyun;Kim, Ki-Keun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.21 no.10
    • /
    • pp.1161-1168
    • /
    • 2010
  • The FHSS(Frequency Hopping Spread Spectrum), in which a transmitter changes its carrier frequency according to a certain hopping pattern, is widely used in the military communication system, since it is highly resistant to deliberate Jamming. However, the difference of BER performance of satellite communication system which using the different modulation scheme and Jamming model was not studied. Thus, in this paper, we consider PBNJ(Partial-Band Noise Jamming) and WPBJ(Worst case Partial-Band noise Jamming) as Jamming models, and evaluate BER(Bit Error Rate) performances of NC-MFSK(Non-Coherent M-ary Frequency-Shift Keying), SDPSK(Symmetric Differential Phase-Shift Keying), and GMSK(Gaussian filtered Minimum-Shift Keying) modulation schemes. Based on the results, we suggest the best transmission method for each condition.

Experimental Investigation for the Shroud Separation in the Supersonic Flow (초음속 비행환경 조건에서의 슈라우드 분리시험 연구)

  • Kim, Jung-Young;Lee, Dong-Min
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.45 no.7
    • /
    • pp.539-549
    • /
    • 2017
  • In this paper, experimental studies on the shroud separation were performed to investigate characteristics of the shroud separation at mach 3. Shroud separation tests were carried out in the vertical free-jet wind tunnel that is capable of testing separable structures. A shroud model was miniaturized to meet test objectives and test section dimensions of the wind tunnel. Pneumatic Locking and separation mechanisms were designed considering external force due to free stream. High speed cameras were used to record the shroud motion and unsteady shock patterns over the deploying shrouds during the shroud separation process. Also, unsteady pressures on the nose surface were measured by using the pressure sensors. Through the tests, the measurement data necessary for researches on the shroud separation technology were obtained. Shroud separation behaviors and characteristics of unsteady pressure on the nose surface for each external flow conditions were analyzed.

Design of Compliant Joint for Pyro-shock Isolation (연소충격 격리용 완화부품 설계)

  • Han, Houkseop;Lim, Daehyun;Kim, Jinyong;Lee, Young-won;Park, Sunghan
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.20 no.1
    • /
    • pp.8-13
    • /
    • 2016
  • The purpose of the pyro-shock compliant joint is to isolated vibration using the compliant material in order to prevent the shock generated by pyro propulsion at the electronics equipment. The performance of the pyro-shock compliant joint can be determined by measuring bending natural frequency and transmissibility. In this study, we established the design requirements based on bending natural frequency and transmissibility results of the reference model. We developed a compliant material with sufficient shock compliant properties and a pyro-shock compliant joint for the new rocket. This results can be used to develop a pyro-shock compliant joint for any rocket using the compliant material and performance measurement.

A Study on the Information Modeling of Defense R&D Process Using IDEF Methodology (IDEF 방법론을 이용한 국방 연구개발 프로세스의 정보모델링 연구)

  • Kim, Chul-Whan
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.1
    • /
    • pp.41-60
    • /
    • 2005
  • IDEF(Integrated Definition) method, a standard methodology of CALS process modelling, was applied to the weapon system R&D process to provide information modelling by analysing about goal, input, output and constraints in the R&D process. The information to be managed in R&D institutes was identified by using SmartER which is the automation program of IDEF1/1X and obtained information modelling for TO-BE model. The work process of weapon system R&D consists of the concept study phase, the exploration development phase, the system development phase, the prototype manufacturing phase, and the report writing of R&D results phase. The information modelling of weapon system R&D is the R&D work process with information sharing by means of IWSDB Since IDEF is suitable for large scale system development like weapon system R&D, further studies on IDEF would be required to achieve the goal of defense CALS.

  • PDF

Inflow Noise Characteristics of the Sensor in Low Wave Number Region Using Transfer Function (전달함수를 이용한 저파수 영역에서의 센서 유입 소음 특성 연구)

  • Park, Ji-hye;Lee, Jongkil;Shin, Ku-kyun;Cho, Chi-yong
    • 대한공업교육학회지
    • /
    • v.34 no.1
    • /
    • pp.238-251
    • /
    • 2009
  • The noise itself that affects the sensor array is defined as the noise which happens in the place where the system is installed and the circumference noise which comes from the ocean. The array structure for detecting acoustic signal in the underwater effected turbulent layer flow noise. In this paper to design the conformal array spectral density function was introduced and several cases of flow induced noise which affect transfer function were simulated. Modified Corcos wall pressure model was used as turbulent boundary layer flow noise. The effect of noise has been reduced as integrated sum of transfer function has been reduced by decreasing elastomer thickness and density when kx is in low wave number area. Also the characteristics of transfer function by Corcos wall pressure displayed the product of frequency density function. This simulation results can be applied to the conformal array design in unmmaned underwater vehicle in the near future.

A study on Mass production stage Tank Battle Management System Environmental Stress Screening test method and application improvement based on Production process data (생산 공정 자료 기반 양산단계 전차 전장관리체계 환경 부하 선별 시험 방법 및 적용 개선에 관한 연구)

  • Kim, Jang-Eun;Shim, Bo-Hyun
    • Journal of Korean Society for Quality Management
    • /
    • v.43 no.3
    • /
    • pp.273-288
    • /
    • 2015
  • Purpose: In this study, we apply environmental stress screening (ESS) to battle management system (BMS) of a tank and use the ESS profile based on production process data, guided by MIL-HDBK-781/344/2164. Methods: To optimize ESS Profile of the BMS of a tank, we estimate ESS model parameters (e.g., defect density, screening strength) using primary production failure reporting and corrective action system (FRACAS) data of military supply contract firm. Results: First, we collect the Primary production FRACAS data of military supply contract firm. Second, we compute curve fitting approach to find patent defect density and latent defect density using FRACAS data. Third, we solve the equation of Defect Density(patent defect density + latent defect density)($D_{IN}$) and Screening Strength(SS) Using second step data. As a result of analysis according to the order, we calculate $D_{IN}$(Temperature stress case : 74.02, Vibration stress : 10.252) and : SS(Temperature stress case : 0.4632, Vibration stress : 0.4142) and confirm the Condition II-D based on MIL-HDBK-344. According to Condition II-D, it is necessary to modify existing ESS profile through decreasing the $D_{IN}$ and increasing the SS. Conclusion: Identification of defect causes through ESS approach reduce defect densities for production. It provides feedback to a lessons-learned data base to avoid similar problems on next generation tank BMS.

LES on breakup and atomization of a liquid jet into cross turbulent flow in a rectangular duct (사각 덕트내 난류 횡단류 유동장에 분사되는 액체 제트의 분열과 미립화에 관한 LES 해석)

  • Yoo, Young-Lin;Han, Doo-Hee;Sung, Hong-Gye;Jeon, Hyuk-Soo;Park, Chul-Hyun
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.44 no.4
    • /
    • pp.290-297
    • /
    • 2016
  • A two-phase Large Eddy Simulation(LES) has been conducted to investigate breakup and atomization of a liquid jet in a cross turbulent flow in a rectangular duct. Gas-droplet two-phase flow was solved by a coupled Eulerian-Lagrangian method which tracks every individual particles. Effects of liquid breakup models, sub-grid scale models, and a order of spatial discretization was investigated. The penetration depth in cross flow was comparable with experimental data by varying breakup model and LES scheme. SMD(Sauter Mean Diameter) distribution downstream of jet was analyzed.