• Title/Summary/Keyword: Defense Model

Search Result 1,790, Processing Time 0.028 seconds

A Method of ISAR Geometric Calibration for Point Target Using Impulse-Radio UWB (임펄스 초광대역 레이다를 이용한 점표적의 ISAR 기하 보정 방법)

  • Yu, Jiwoong;Nikitin, Konstantin;Paek, Inchan;Jang, Jong Hun;Ka, Min-Ho
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.26 no.4
    • /
    • pp.397-403
    • /
    • 2015
  • In this paper, a method of ISAR geometric calibration is represented by using impulse-radio UWB radar. The ir-UWB is good for using a signal processing in time domain, so, it does not occur a multi-path or coupling problem. If a signal that between antennas and target is assumed a plane wave, a center of rotation in ISAR geometry model can be estimated by using point target. Before image is reconstructed with sinogram, the center of rotation can be calculated by using least square fitting. This method can be obtained a more contrast image, and a maximum value of entropy of image. The method, that estimates a center of rotation in received data, will be used a initial setup of instruments or a periodic compensation to reconstruct image. It would be useful in medical, security and surveillance imaging equipments that have a fixed geometry.

Cost-Effective, Real-Time Web Application Software Security Vulnerability Test Based on Risk Management (위험관리 기반의 비용 효율적인 실시간 웹 애플리케이션 소프트웨어 보안취약점 테스팅)

  • Kumi, Sandra;Lim, ChaeHo;Lee, SangGon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.59-74
    • /
    • 2020
  • The web space where web applications run is the cyber information warfare of attackers and defenders due to the open HTML. In the cyber attack space, about 84% of worldwide attacks exploit vulnerabilities in web applications and software. It is very difficult to detect web vulnerability attacks with security products such as web firewalls, and high labor costs are required for security verification and assurance of web applications. Therefore, rapid vulnerability detection and response in web space by automated software is a key and effective cyber attack defense strategy. In this paper, we establish a security risk management model by intensively analyzing security threats against web applications and software, and propose a method to effectively diagnose web and application vulnerabilities. The testing results on the commercial service are analyzed to prove that our approach is more effective than the other existing methods.

Improved AODV Routing Protocol Considering the Link Quality of Wireless Transmission Environments (무선 전송환경의 링크품질을 고려한 개선된 AODV 라우팅프로토콜)

  • Lee, Tae-Hoon;Jeun, Sung-Woo;Kim, Young-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.10
    • /
    • pp.1903-1911
    • /
    • 2016
  • As interest in MANET is increasing nowadays, research upon an efficient MANET routing protocol is actively under way. A LQA(Link Qualty Aware)-AODV routing protocol to deal with frequent changes of topology and wireless link variations under tactical operating conditions is proposed in this paper. The suggested LQA-AODV takes into account the channel capacity of each hop during the route request process of the traditional AODV protocol. In detail, LQA-AODV adds a channel capacity cost value to the RREQ message format that occurs during the routing process of the existing AODV Routing Protocol causing the accumulated channel capacity cost values of each sections to be compared before establishing a route. To verify the performance of LQA-AODV, NS2.35 was utilized and the Link-Quality Model was applied in order to reflect the tactical wireless environment. The simulation compares and analyzes LQA-AODV and the existing AODV, showing a large improvement over the traditional AODV in regards to the Packet Delivery Ratio, and End-to-End Delay.

An Ontology-based Cloud Storage for Reusing Weapon Models (무기체계 모델 재사용을 위한 온톨로지 기반 클라우드 저장소 연구)

  • Kim, Tae-Sup;Park, Chan-Jong;Kim, Hyun-Hwi;Lee, Kang-Sun
    • Journal of the Korea Society for Simulation
    • /
    • v.21 no.3
    • /
    • pp.35-42
    • /
    • 2012
  • Defense Modeling and Simulation aims to provide a computerized war environment where we can analyze weapon systems realistically. As we invest significant efforts to represent weapon systems and their operational environments on the computer, there has been an increasing need to reuse predefined weapon models. In this paper, we introduce OB-Cloud (Ontology-Based Cloud storage) to utilize predefined weapon models. OB-Cloud has been implemented as a repository for OpenSIM (Open Simulation engine for Interoperable Models), which is an integrated simulation environment for aiding weapons effectiveness analysis, under the development of our research team. OB-Cloud uses weapon ontology and thesaurus dictionaries to provide semantic search for reusable models. In this paper, we present repository services of OB-Cloud, including registration of weapon models and semantic retrieval of similar models, and illustrate how we can improve reusability of weapon models, through an example.

The Fast Correlative Vector Direction Finder Conversion (직접 변환을 이용한 고속 상관형 벡터 방향탐지기)

  • Park, Cheol-Sun;Kim, Dae-Young
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.12 s.354
    • /
    • pp.16-23
    • /
    • 2006
  • This paper presents the development of the fast Direction Finder using direct conversion method, which can intercept for short pulse signal of less' than 1 msec. in RF Down Converter, and CVDF(Correlative Vector Direction Finding) algorithm, which estimates DoA (Direction of Arrival). The configuration and characteristics of direction finder using 5-channel equi-spaced circular array antenna are presented and the direct conversion techniques for removing tuning time using I/Q demodulator are described. The CRLB of our model is derived, the principles of 2 kind of CVDF algorithm are explained and their characteristics are compared with CRLB w.r.t the number of samples and spacing ratio. The RF Down Converter prototype using direct conversion method is manufactured, the 2 kind of CVDF algorithm are applied and their performance are analyzed. Finally it is confirmed the LSE based CVDF algorithm is better than correlation-coefficient based except for ambiguity protection capabilities.

Analysis of Radar Cross Section for Advanced Naval Vessels (첨단 함형의 레이더 반사면적 해석)

  • Kwon, Hyun-Wung;Hong, Suk-Yoon;Lee, Kwang-Kook;Kim, Jong-Chul;Na, In-Chan;Song, Jee-Hun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.20 no.5
    • /
    • pp.593-600
    • /
    • 2014
  • In this paper, Radar cross section (RCS) calculations of advanced naval vessels model with RCS reduction methods are simulated and RCS results are discussed. Especially, this paper are mainly focusing on the facts influencing on RCS, the ways minimizing RCS and material characteristics of RCS changing-rate. RCS analysis results are given for a DDG-1000 type advanced naval vessels, which show that as the elevation angle increased 10 degree, the mean RCS value increased 23.91 dBsm. Also, as the superstructure angle increased 6 degree, the mean RCS value reduced 1.27 dBsm. Finally, the radar absorbing material attachment at the front and back superstructure have been reduced 2.27 dBsm in terms of mean RCS value.

A Study on the Deduction of Internal Temperature of the Ground Magazine (지상형 탄약고의 내부온도 감소 방안 연구)

  • Park, Hyungju;Choi, Myoungjin;Yang, Jaekyung
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.36 no.3
    • /
    • pp.142-149
    • /
    • 2013
  • Among ammunitions which are stored in a war field, the lifespan of propelling gunpowder is affected by storage environment such as storage temperature, humidity, and exposure to sunlight. These are because Nitrocellulose (NC) which is the main component of propelling gunpowder can be naturally disassembled to unstable substances similar with other nitric acid ester. We can't prevent it fundamentally from being disassembled, but to restrain induction of automatic disassembly by decomposition product, a decomposition product ($NO_2$, $NO_3$, and $HNO_3$) and tranquillizer DPA (Diphenylamine), having high reactivity, are added into a propellant. For this, it will decrease the velocity of tranquillizer which can also affect the velocity of producing the decomposition product of NC, storage temperature or humidity of propelling gunpowder is higher, drop of tranquillizer content is much faster. Therefore, to extend storage lifespan of propelling gunpowder, it is really important to control storage temperature or humidity inside the magazine. Hereupon, according to the manufacture of small scale model magazine and the result of performing experiments and measuring variation of inside temperature (storage temperature), using roof types that have a steel slate structure of magazine among ground magazines, this research shows the differences in details.

The Authentication Model which Utilized Tokenless OTP (Tokenless OTP를 활용한 인증 모델)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.107-116
    • /
    • 2007
  • Is need Remote Access through internet for business of Ubiquitous Computing age, and apply OTP for confidentiality about inputed ID and Password, network security of integrity. Current OTP must be possessing hardware of Token, and there is limitation in security. Install a Snooping tool to OTP network in this treatise, and because using Cain, enforce ARP Cache poisoning attack and confirm limitation by Snooping about user password. Wish to propose new system that can apply Tokenless OTP by new security way, and secure confidentiality and integrity. Do test for access control inflecting Tokenless OTP at Remote Access from outside, and could worm and do interface control with certification system in hundred. Even if encounter hacking at certification process, thing that connection is impossible without pin number that only user knows confirmed. Because becoming defense about outward flow and misuse and hacking of password when apply this result Tokenless OTP, solidify security, and evaluated by security system that heighten safety.

  • PDF

3.5 mm Coaxial One Port Vector Network Analysis Using Time Domain Reflectometry (반사 펄스의 주파수 해석을 이용한 광대역 3.5 mm 동축형 단일 포트 벡터 회로망 분석법)

  • Lee, Dong-Joon;Kwon, Jae-Yong;So, Joon-Ho;Kang, No-Weon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.8
    • /
    • pp.967-975
    • /
    • 2012
  • This paper presents a method to measure reflection coefficients of microwave devices or antennas based on time domain analysis with sampling oscilloscopes. The reflection coefficients were extracted by the Fourier transformation of echo pulses from devices with respect to the 20 GHz incident pulse signals. The three-error terms, which are commonly used for the correction of a microwave network, were determined using a 3.5 mm calibration kit. In addition, a modified error-correction model associated with a directional coupler for reflection coefficient measurements is introduced. The results were compared with those of measured with a commercial vector network analyzer.

Biomarkers for Combat-Related Stress and Fatigue-Mitigating Drugs Discovery (전투 스트레스 및 피로 완화 약물 탐색을 위한 생체지표)

  • Koo, Hyojin;Kim, Chang Yul;Kim, Yeonkyung;Sin, So Jung;Cheon, Kicheol;Kim, Dongsoo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.2
    • /
    • pp.246-254
    • /
    • 2018
  • Psychological stress and physical fatigue, such as anxiety, fear, sleep disturbance, etc., caused by exposure to the war, can lead to post-traumatic stress syndrome(PTSD) or war syndrome. The military has also prepared for drug use to minimize war syndrome and preserve combat strength. However, efforts to prevent war syndrome are still lacking. This study was conducted to identify biomarkers that can track psychophysiological changes. Psychophysiological changes associated with PTSD can be divided into four main categories. The four categories are behavioral changes, changes in brain cognition, neuroimmunological changes, and changes in innate immunity. This study suggest that biomarker profile can be made by the distance moved and the anxiety-like behavior in the open field for behavior category, brain BDNF levels in the brain cognition category, serum corticosterone in the neuroimmunology category, and inflammatory cytokine levels in the innate immunity category.