• Title/Summary/Keyword: Defense Model

Search Result 1,792, Processing Time 0.029 seconds

Multi-functional Fighter Radar Scheduling Method for Interleaved Mode Operation of Airborne and Ground Target (전투기탑재 다기능 레이다의 공대공 및 공대지 동시 운용 모드를 위한 스케줄링 기법)

  • Kim, Do-Un;Lee, Woo-Cheol;Choi, Han-Lim;Park, Joontae;Park, Junehyune;Seo, JeongJik
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.7
    • /
    • pp.581-588
    • /
    • 2021
  • This paper deals with a beam scheduling method in fighter interleaving mode. Not only the priority of tasks but also operational requirements that air-to-ground and air-to-air search tasks should be executed alternatively are established to maximize high-quality of situational awareness. We propose a real-time heuristic beam scheduling method that is advanced from WMDD to satisfies the requirements. The proposed scheduling method is implemented in a simulation environment resembling the task processing mechanism and measurement model of a radar. Performance improvement in terms of task delay time is observed.

Development of a generalized scaling law for underwater explosions using a numerical and experimental parametric study

  • Kim, Yongtae;Lee, Seunggyu;Kim, Jongchul;Ryu, Seunghwa
    • Structural Engineering and Mechanics
    • /
    • v.77 no.3
    • /
    • pp.305-314
    • /
    • 2021
  • In order to reduce enormous cost of real-scale underwater explosion experiments on ships, the mechanical response of the ships have been analyzed by combining scaled-down experiments and Hopkinson's scaling law. However, the Hopkinson's scaling law is applicable only if all variables vary in an identical ratio; for example, thickness of ship, size of explosive, and distance between the explosive and the ship should vary with same ratio. Unfortunately, it is infeasible to meet such uniform scaling requirement because of environmental conditions and limitations in manufacturing scaled model systems. For the facile application of the scaling analysis, we propose a generalized scaling law that is applicable for non-uniform scaling cases in which different parts of the experiments are scaled in different ratios compared to the real-scale experiments. In order to establish such a generalized scaling law, we conducted a parametric study based on numerical simulations, and validated it with experiments and simulations. This study confirms that the initial peak value of response variables in a real-scale experiment can be predicted even when we perform a scaled experiment composed of different scaling ratios for each experimental variable.

Development of Key Performance Indicators in Ammunition Demilitarization Facility Using the Balanced Score Card (균형성과표(BSC)를 활용한 탄약 비군사화 시설의 핵심성과지표 개발)

  • Bae, Young-Min;Han, Seung-Jo
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.1
    • /
    • pp.17-25
    • /
    • 2021
  • Ammunition Demilitarization facility (ADF) should be set up the feasible goals and continue to operate, taking into account non-profit characteristics. However, due to the lack of performance measurement methods in ADF, which are essential to national policy at a significant cost each year, the reliability of the evaluation results can be insufficient. In this paper, the Balanced Score Card (BSC) method was applied that could be evaluated to reflect the financial and non-financial features. The relevant literature research and army regulations reflected the results of various interviews of the expert group. The extraction of success performance area in ADF was confirmed using the BSC method and the Decision Variable (DV) candidate was created to use regression for selecting the DV. Additionally, the key performance indicator was presented by verification the feasibility of content by conducting the survey of experts. The implications of this paper are as follows. First, the proposed BSC model was found to be suitable for practical use in ADF reflecting the non-profit characteristics. Second, accurate evaluation of ADF can contribute to long-term development of ADF. Finally, it can be applied to the management process of the other military sector, so it can be expected to play a role in providing basic data and spreading it to other areas.

Study on Machine Learning Techniques for Malware Classification and Detection

  • Moon, Jaewoong;Kim, Subin;Song, Jaeseung;Kim, Kyungshin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4308-4325
    • /
    • 2021
  • The importance and necessity of artificial intelligence, particularly machine learning, has recently been emphasized. In fact, artificial intelligence, such as intelligent surveillance cameras and other security systems, is used to solve various problems or provide convenience, providing solutions to problems that humans traditionally had to manually deal with one at a time. Among them, information security is one of the domains where the use of artificial intelligence is especially needed because the frequency of occurrence and processing capacity of dangerous codes exceeds the capabilities of humans. Therefore, this study intends to examine the definition of artificial intelligence and machine learning, its execution method, process, learning algorithm, and cases of utilization in various domains, particularly the cases and contents of artificial intelligence technology used in the field of information security. Based on this, this study proposes a method to apply machine learning technology to the method of classifying and detecting malware that has rapidly increased in recent years. The proposed methodology converts software programs containing malicious codes into images and creates training data suitable for machine learning by preparing data and augmenting the dataset. The model trained using the images created in this manner is expected to be effective in classifying and detecting malware.

Study on Delivery of Military Drones and Transport UGVs with Time Constraints Using Hybrid Genetic Algorithms (하이브리드 유전 알고리즘을 이용한 시간제약이 있는 군수 드론 및 수송 UGV 혼합배송 문제 연구)

  • Lee, Jeonghun;Kim, Suhwan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.4
    • /
    • pp.425-433
    • /
    • 2022
  • This paper studies the method of delivering munitions using both drones and UGVs that are developing along with the 4th Industrial Revolution. While drones are more mobile than UGVs, their loading capacity is small, and UGVs have relatively less mobility than drones, but their loading capacity is better. Therefore, by simultaneously operating these two delivery means, each other's shortcomings may be compensated. In addition, on actual battlefields, time constraints are an important factor in delivering munitions. Therefore, assuming an actual battlefield environment with a time limit, we establish delivery routes that minimize delivery time by operating both drones and UGVs with different capacities and speeds. If the delivery is not completed within the time limit, penalties are imposed. We devised the hybrid genetic algorithm to find solutions to the proposed model, and as results of the experiment, we showed the algorithm we presented solved the actual size problems in a short time.

Throughput and Interference for Cooperative Spectrum Sensing: A Malicious Perspective

  • Gan, Jipeng;Wu, Jun;Zhang, Jia;Chen, Zehao;Chen, Ze
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.4224-4243
    • /
    • 2021
  • Cognitive radio (CR) is a feasible intelligent technology and can be used as an effective solution to spectrum scarcity and underutilization. As the key function of CR, cooperative spectrum sensing (CSS) is able to effectively prevent the harmful interference with primary users (PUs) and identify the available spectrum resources by exploiting the spatial diversity of multiple secondary users (SUs). However, the open nature of the cognitive radio networks (CRNs) framework makes CSS face many security threats, such as, the malicious user (MU) launches Byzantine attack to undermine CRNs. For this aim, we make an in-depth analysis of the motive and purpose from the MU's perspective in the interweave CR system, aiming to provide the future guideline for defense strategies. First, we formulate a dynamic Byzantine attack model by analyzing Byzantine behaviors in the process of CSS. On the basis of this, we further make an investigation on the condition of making the fusion center (FC) blind when the fusion rule is unknown for the MU. Moreover, the throughput and interference to the primary network are taken into consideration to evaluate the impact of Byzantine attack on the interweave CR system, and then analyze the optimal strategy of Byzantine attack when the fusion rule is known. Finally, theoretical proofs and simulation results verify the correctness and effectiveness of analyses about the impact of Byzantine attack strategy on the throughput and interference.

Methods to Improve Fire Suppression Capability by Forest Fire Simulation Analysis (산불화재 시뮬레이션분석에 의한 화재진압능력 개선방안)

  • Jeong-Il, Lee;Sung-bae, Cho
    • Journal of the Korea Safety Management & Science
    • /
    • v.24 no.4
    • /
    • pp.125-134
    • /
    • 2022
  • Forest fires in Korea usually start in the fall and occur every year until spring. Most wildfires are human resources that combine topographical characteristics and carelessness, and failure to respond in the initial stage and lack of cleanup are spreading to large-scale wildfires. In order to prevent these wildfires, active cooperation from the public is essential. As can be seen from recent wildfires, the attention of the public is needed above all else because large-scale wildfires in Korea are occurring due to the people's negligence. If a wildfire spreads and becomes large, it causes damage to life and property, and the damage is irreversible. In this study, various methods were used to prevent forest fires and improve initial suppression ability. In order to minimize damage, the model analyzed by the 119 Special Rescue Team in Gangwon, Chungcheong and nearby forest fires was analyzed on the combustion progress and wind direction by time period. The propagation speed by the wind direction was simulated. Until now, most of the wildfires have been extinguished by firefighting, but I hope that the Forest Service will take the lead and maintain coordination with related organizations.

Time domain broadband noise predictions for non-cavitating marine propellers with wall pressure spectrum models

  • Choi, Woen-Sug;Hong, Suk-Yoon;Song, Jee-Hun;Kwon, Hyun-Wung;Park, Il-Ryong;Seol, Han-Shin;Kim, Min-Jae
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.13 no.1
    • /
    • pp.75-85
    • /
    • 2021
  • The broadband noise can be dominant or important for total characteristics for marine propeller noise representing the minimum base of self-noise. Accurate prediction of such noise is crucial for survivability of underwater military vessels. While the FW-H Formulation 1B can be used to predict broadband trailing edge noise, the method required experiment measurements of surface pressure correlations, showing its limitations in generality. Therefore, in this study, the methods are developed to utilize wall pressure spectrum models to overcome those limitations. Chase model is adopted to represent surface pressure along with the developed formulations to reproduce pressure statistics. Newly developed method is validated with the experiments of airfoils at different velocities. Thereafter, with its feasibility and generality, the procedure incorporating computational fluid dynamics is established and performed for a propeller behind submarine hull. The results are compared with the experiments conducted at Large Cavitation Tunnel, thus showing its usability and robustness.

Numerical Study of Shock Wave-Boundary Layer Interaction in a Curved Flow Path (굽어진 유로 내부의 충격파-경계층 상호작용 수치연구)

  • Kim, Jae-Eun;Jeong, Seung-Min;Choi, Jeong-Yeol;Hwang, Yoojun
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.25 no.6
    • /
    • pp.36-44
    • /
    • 2021
  • Numerical analysis was performed on the shock wave-boundary layer interaction generated in the internal flow path of the curved interstage of the scramjet engine flight test vehicle. For numerical analysis, the turbulence model k-ω SST was used in the compressibility Raynolds Averaged Navier Stokes(RANS) equation. Representatively, the separation bubbles on the upper wall of the nozzle, the interaction between the concave shock wave and the boundary layer, and the shock wave-shock wave interaction at the edge were captured. The analysis result visualizes the shock wave-boundary layer interaction of the curved internal flow path to enhance understanding and suggest design considerations.

Numerical Study and Thrust Prediction of Pintle-Controlled Nozzle with Split-line TVC System (스플릿라인 TVC 시스템을 적용한 핀틀 추력조절 노즐의 유동해석 및 추력 성능 예측)

  • Jo, Hana
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.26 no.3
    • /
    • pp.43-53
    • /
    • 2022
  • In this study, analysis of the flow characteristics of pintle-controlled nozzle with split-line TVC system and the thrust performance prediction was performed. The numerical computation was verified by comparing the thrust coefficient derived from the analysis results with the experimental data. By applying the same numerical analysis technique, the flow characteristics of nozzle were confirmed according to operating altitude, pintle stroke position and TVC angle with the 1/10 scale. As the TVC angle increased, thrust loss occurred and the tendency of AF was different depending on the position of the pintle stroke. Based on the analysis results, the relation of thrust coefficient was derived by applying the response surface methods. The thrust performance model with a slight difference of 1.2% on average from the analysis result was generated.