• Title/Summary/Keyword: Defense Model

Search Result 1,792, Processing Time 0.032 seconds

Optimum Placement and Shape of UHF Monopole Antenna Mounted on UAV (무인항공기에 장착된 UHF 모노폴 안테나의 최적 위치 및 형상)

  • Choi, Jaewon;Kim, Jihoon;Chung, Eulho
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.9
    • /
    • pp.46-51
    • /
    • 2013
  • In this paper, the optimum placement and shape of UHF antenna on the unmanned aerial vehicle (UAV) are analyzed by using the electromagnetic (EM) simulation on the various locations. The FEKO was used for the EM-simulation. In order to reduce the complexity of simulation and minimize the runtime and memory usage, the composite aircraft structure is simplified as the PEC model excluding the radome structure. The simulation was performed on the wing and ventral fin of UAV, and the antenna shape used the monopole, dipole, and bent monopole antennas. When the monopole antenna is mounted under the wing, two antennas need to be mounted under the right and left wings, and those antennas have to be switched as the direction of UAV wing to the line of sight (LOS) data-link (DL) ground antenna. In the case of mounting under the ventral fin, one antenna can be used regardless of the direction of UAV wing to the LOS DL ground antenna. Also, the antenna gain is improved by the blockage reduction. The antenna gain is further improved by using the bent monopole antenna. The optimum solution of UHF antenna placement and shape on UAV is to mount the bent monopole antenna under the ventral fin.

A Method and Application of Vulnerability Analysis for Combat Systems Considering Threats and Defense Ability : Focused on PKM Model (위협의 특성과 장갑의 방호 성능을 고려한 전투 시스템의 취약성 분석 방법 및 활용 : 고속정 모델을 대상으로)

  • Hwang, Hun-Gyu;Kim, Bae-Sung;Kang, Ji-Won;Lee, Jang-Se
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1623-1631
    • /
    • 2016
  • There are many researches which analyze vulnerability for combat systems, have been progressing, and apply the analyzed result to reflect on design phase. Recently, there have been requirements for integrating the previous module based researches which conducted independently. In this paper, we propose an integrated vulnerability analysis method for the combat system considering characteristics of threats and protection performance of armors through an analysis of the advanced research. In addition, by applying the proposed method improves the existing hit probability analysis program and we are verified based on scenarios for improving survivability of PKM (Petrol Killer Medium) for vulnerability analysis confirmed the results. The proposed method improves reliability of vulnerability analysis by considering threats and defense ability. Also it able to satisfied with the integration requirements. Furthermore, we became buildup for the development of applied system and the method and integrated vulnerability analysis method for combat systems.

Study on Operating Limits of 5.56mm Rifle Overheat - Focusing on Human Engineering (5.56mm 소총 과열에 의한 운용한계 분석 - 인간공학 중심으로)

  • Lee, Ho-Jun;Choi, Si-Young;Shin, Tae-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.9
    • /
    • pp.49-56
    • /
    • 2020
  • High temperature heat generated during rifle firing not only degrades the performance of the weapon, but also limits the user's operation. In this study, temperature change of handguard according to firing was measured with reference to Human Engineering criteria and the operability according to material was examined. Accordingly, for the firing test, three types of Korean rifle and one overseas model were selected for each material of handguard, and firing test was conducted using a contact type temperature meter. The test result shows that using a plastic handguard with low thermal conductivity and aluminum handguard with high thermal conductivity enabled the rifles to be operated with bare hands even when firing at more than 100 rounds at low atmospheric temperature. However, when firing more than 60 rounds at over 20℃ atmospheric temperature, aluminum handguard use is limited. When firing quickly over 100 rounds, handguard use is restricted regardless of its fabrication material. To eliminate operational limitations by overheating, it is necessary to eliminate direct contact with skin using gloves, vertical grips, etc. This study examined the operability of rifles in terms of thermal risk, and the resulting study results are expected to be used as basic data for Human Engineering of other rifles and munitions.

Development of TLCSM Based Integrated Architecture for Applying FRACAS to Defense Systems (국방 무기체계 FRACAS 적용을 위한 TLCSM 기반 통합 아키텍처 구축)

  • Jo, Jeong-Ho;Song, Hyeon-Su;Kim, Bo-Hyeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.1
    • /
    • pp.190-196
    • /
    • 2020
  • FRACAS(Failure Reporting, Analysis and Corrective Action System) has been applied in various industries to improve the reliability of the systems. FRACAS is effective in improving reliability by repeating failure analysis, proper corrective action, and result verification for identified failures. However, FRACAS has many limitations in terms of process, data collection and management to be integrated into the existing development environment. In the domestic defense industry, studies on the development of FRACAS system and process improvement have been conducted to solve the difficulties of applying FRACAS, but most of them are concentrated in the operation/maintenance phase. Since FRACAS should be conducted in consideration of TLCSM(Total Life Cycle System Management), it is necessary to study the reference architecture so that FRACAS can be applied from the early design phase. In this paper, we studied the TLCSM-based integrated architecture considering the system life cycle phases, FRACAS closed-loop process, and FRACAS essentials in order to effectively apply FRACAS throughout the life cycle of defense systems. The proposed architecture was used as a reference model for FRACAS in a shipboard combat system.

Development of a DEVS Simulator for Electronic Warfare Effectiveness Analysis of SEAD Mission under Jamming Attacks (대공제압(SEAD) 임무에서의 전자전 효과도 분석을 위한 DEVS기반 시뮬레이터 개발)

  • Song, Hae Sang;Koo, Jung;Kim, Tag Gon;Choi, Young Hoon;Park, Kyung Tae;Shin, Dong Cho
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.4
    • /
    • pp.33-46
    • /
    • 2020
  • The purpose of Electronic warfare is to disturbe, neutralize, attack, and destroy the opponent's electronic warfare weapon system or equipment. Suppression of Enemy Air Defense (SEAD) mission is aimed at incapacitating, destroying, or temporarily deteriorating air defense networks such as enemy surface-to-air missiles (SAMs), which is a representative mission supported by electronic warfare. This paper develops a simulator for analyzing the effectiveness of SEAD missions under electronic warfare support using C++ language based on the DEVS (Discrete Event Systems Specification) model, the usefulness of which has been proved through case analysis with examples. The SEAD mission of the friendly forces is carried out in parallel with SSJ (Self Screening Jamming) electronic warfare under the support of SOJ (Stand Off Jamming) electronic warfare. The mission is assumed to be done after penetrating into the enemy area and firing HARM (High Speed Anti Radiation Missile). SAM response is assumed to comply mission under the degraded performance due to the electronic interference of the friendly SSJ and SOJ. The developed simulator allows various combinations of electronic warfare equipment specifications (parameters) and operational tactics (parameters or algorithms) to be input for the purpose of analysis of the effect of these combinations on the mission effectiveness.

Analyze Virtual Private Network Vulnerabilities and Derive Security Guidelines Based on STRIDE Threat Modeling (STRIDE 위협 모델링 기반 가상 사설망 취약점 분석 및 보안 요구사항 도출)

  • Kim, Da-hyeon;Min, Ji-young;Ahn, Jun-ho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.27-37
    • /
    • 2022
  • Virtual private network (VPN) services are used in various environments related to national security, such as defense companies and defense-related institutions where digital communication environment technologies are diversified and access to network use is increasing. However, the number of cyber attacks that target vulnerable points of the VPN has annually increased through technological advancement. Thus, this study identified security requirements by performing STRIDE threat modeling to prevent potential and new vulnerable points that can occur in the VPN. STRIDE threat modeling classifies threats into six categories to systematically identify threats. To apply the proposed security requirements, this study analyzed functions of the VPN and formed a data flow diagram in the VPN service process. Then, it collected threats that can take place in the VPN and analyzed the STRIDE threat model based on data of the collected threats. The data flow diagram in the VPN service process, which was established by this study, included 96 STRIDE threats. This study formed a threat scenario to analyze attack routes of the classified threats and derived 30 security requirements for each element of the VPN based on the formed scenario. This study has significance in that it presented a security guideline for enhancing security stability of the VPN used in facilities that require high-level security, such as the Ministry of National Defense (MND).

Musculoskeletal Models to Predict Patient-specific Gait Patterns Using Function-based Morphing Technique (기능기반 형상변형기술을 응용한 환자맞춤형 근골격 모델의 보행패턴 예측에 관한 연구)

  • Park, Byoung-Keon;Koo, Bon-Yeol;Park, Eun-Joo;Chae, Jae-Wook;Lee, Soon-Hyuk;Kim, Jae-Jung
    • Korean Journal of Computational Design and Engineering
    • /
    • v.17 no.6
    • /
    • pp.443-455
    • /
    • 2012
  • The configuration of a musculoskeletal (MS) system is closely related to the individual motions of the human body. Many researches have been focused on evaluating the associations between the MS configuration and the individual motion using patient-specific MS models, but it still remains a challenging issue to accurately predict the motion by differed configurations of the MS system. The main objective of this paper is to predict the changes of a patient-specific gait by altering the geometric parameters of the hip joint using function-based morphing method (FBM). FBM is suitable for motion analysis since this method provide a robust way to morph a MS model while preserving the biomechanical functions of the bones. Computed-muscle control technique is used to calculate the muscle excitations to reproduce the targeted motion within a digital MS model without the motion-captured data. We applied this approach to a patient who has an abnormal gait pattern. Results showed that the femoral neck length and the angle significantly affect to the motion especially for the hip abduction angle during gait, and that this approach is suitable for gait prediction.

A Study on Real-Time Operation Method of Urban Drainage System using Data-Driven Estimation (실시간 자료지향형 예측을 활용한 내배수 시설 운영기법 연구)

  • Son, Ahlong;Kim, Byunghyun;Han, Kunyeun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.37 no.6
    • /
    • pp.949-963
    • /
    • 2017
  • This study present an efficient way of operating drainage pump station as part of nonstructural measures for reducing urban flood damage. The water level in the drainage pump station was forecast using Neuro-Fuzzy and then operation rule of the drainage pump station was determined applying the genetic algorithm method based on the predicted inner water level. In order to reflect the topographical characteristics of the drainage area when constructing the Neuro-Fuzzy model, the model considering spatial parameters was developed. Also, the model was applied a penalty type of genetic algorithm so as to prevent repeated stops and operations while lowering my highest water level. The applicability of the development model for the five drainage pump stations in the Mapo drainage area was verified. It is considered to be able to effectively manage urban drainage facilities in the development of these operating rules.

A Study on Detection of Malicious Android Apps based on LSTM and Information Gain (LSTM 및 정보이득 기반의 악성 안드로이드 앱 탐지연구)

  • Ahn, Yulim;Hong, Seungah;Kim, Jiyeon;Choi, Eunjung
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.5
    • /
    • pp.641-649
    • /
    • 2020
  • As the usage of mobile devices extremely increases, malicious mobile apps(applications) that target mobile users are also increasing. It is challenging to detect these malicious apps using traditional malware detection techniques due to intelligence of today's attack mechanisms. Deep learning (DL) is an alternative technique of traditional signature and rule-based anomaly detection techniques and thus have actively been used in numerous recent studies on malware detection. In order to develop DL-based defense mechanisms against intelligent malicious apps, feeding recent datasets into DL models is important. In this paper, we develop a DL-based model for detecting intelligent malicious apps using KU-CISC 2018-Android, the most up-to-date dataset consisting of benign and malicious Android apps. This dataset has hardly been addressed in other studies so far. We extract OPcode sequences from the Android apps and preprocess the OPcode sequences using an N-gram model. We then feed the preprocessed data into LSTM and apply the concept of Information Gain to improve performance of detecting malicious apps. Furthermore, we evaluate our model with numerous scenarios in order to verify the model's design and performance.

Breast Cytology Diagnosis using a Hybrid Case-based Reasoning and Genetic Algorithms Approach

  • Ahn, Hyun-Chul;Kim, Kyoung-Jae
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2007.05a
    • /
    • pp.389-398
    • /
    • 2007
  • Case-based reasoning (CBR) is one of the most popular prediction techniques for medical diagnosis because it is easy to apply, has no possibility of overfitting, and provides a good explanation for the output. However, it has a critical limitation - its prediction performance is generally lower than other artificial intelligence techniques like artificial neural networks (ANNs). In order to obtain accurate results from CBR, effective retrieval and matching of useful prior cases for the problem is essential, but it is still a controversial issue to design a good matching and retrieval mechanism for CBR systems. In this study, we propose a novel approach to enhance the prediction performance of CBR. Our suggestion is the simultaneous optimization of feature weights, instance selection, and the number of neighbors that combine using genetic algorithms (GAs). Our model improves the prediction performance in three ways - (1) measuring similarity between cases more accurately by considering relative importance of each feature, (2) eliminating redundant or erroneous reference cases, and (3) combining several similar cases represent significant patterns. To validate the usefulness of our model, this study applied it to a real-world case for evaluating cytological features derived directly from a digital scan of breast fine needle aspirate (FNA) slides. Experimental results showed that the prediction accuracy of conventional CBR may be improved significantly by using our model. We also found that our proposed model outperformed all the other optimized models for CBR using GA.

  • PDF