• Title/Summary/Keyword: Defense Model

Search Result 1,790, Processing Time 0.03 seconds

A Study on the Surveillance System and the Location of Fortress of the Sil-la Dynasty by a Cumulative Visibility Analysis (누적가시도 분석을 이용한 신라시대의 산성 입지와 감시체계에 관한 연구)

  • Kim, Choong-Sik;Lee, Jae-Yong;Kim, Young-Mo
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.29 no.3
    • /
    • pp.12-21
    • /
    • 2011
  • We investigated the location and surveillance system of fortress using inter-visibility analysis between fortress and the capital of the Silla Dynasty. The digital terrain model(DTM) was generated with $10{\times}10m$ grid in Arcview 3.2. Then three fortresses lines(Myeonghwal-sanseong, Namsan-shinseong, Seohyeong-sanseong) were superimposed on the DTM. 4 results of this study were drew out from the cumulative visibility analysis. First, the most of fortress lines which showed the high visible frequency from the Sila-Capital(538 viewpoints) have a good aspect toward the capital. It means that 3 fortresses secured the visibility to the capital. Second, the cumulative visibility analysis from 3 fortresses generated evenly distributed visible frequency across the inside of fortress. It shows that the inner area of fortress is more advantageous to command during the war. On the contrary, a number of invisible(vulnerable) regions which is scattered on the outside were supplemented by adjacent fortress. Third, the north area of the Sila-captial showed the highest visible frequency generated by sum up the visibility from 3 fortresses. The northern captial is placed within 4km distance easy to support at the Myeonghwal and Seohyeong-sanseong. We proved that the Sila-capital had organized a solid surveillance system by 3 fortresses. Fourth, we could infer the practical process of fortress layout from comparing a cumulative visibility map. For the secure of visibility and defense systems, the fortress line would form a rising shape to the peak. This practical location theory can replace the vague common location theory that the fortress would constructed on two thirds of mountain height. It will be an empirical method in the ancient remains research.

An Adversarial Attack Type Classification Method Using Linear Discriminant Analysis and k-means Algorithm (선형 판별 분석 및 k-means 알고리즘을 이용한 적대적 공격 유형 분류 방안)

  • Choi, Seok-Hwan;Kim, Hyeong-Geon;Choi, Yoon-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1215-1225
    • /
    • 2021
  • Although Artificial Intelligence (AI) techniques have shown impressive performance in various fields, they are vulnerable to adversarial examples which induce misclassification by adding human-imperceptible perturbations to the input. Previous studies to defend the adversarial examples can be classified into three categories: (1) model retraining methods; (2) input transformation methods; and (3) adversarial examples detection methods. However, even though the defense methods against adversarial examples have constantly been proposed, there is no research to classify the type of adversarial attack. In this paper, we proposed an adversarial attack family classification method based on dimensionality reduction and clustering. Specifically, after extracting adversarial perturbation from adversarial example, we performed Linear Discriminant Analysis (LDA) to reduce the dimensionality of adversarial perturbation and performed K-means algorithm to classify the type of adversarial attack family. From the experimental results using MNIST dataset and CIFAR-10 dataset, we show that the proposed method can efficiently classify five tyeps of adversarial attack(FGSM, BIM, PGD, DeepFool, C&W). We also show that the proposed method provides good classification performance even in a situation where the legitimate input to the adversarial example is unknown.

Improvement of Transfer Alignment Performance for Airborne EOTS (항공용 전자광학추적장비의 전달정렬 성능 개선)

  • Kim, Minsoo;Lee, Dogeun;Jeong, Chiun;Jeong, Jihee
    • Journal of Aerospace System Engineering
    • /
    • v.16 no.4
    • /
    • pp.60-67
    • /
    • 2022
  • An Electro-Optical Tracking System (EOTS) is an electric optical system with EO/IR cameras, laser sensors, and an IMU. The EOTS calculates coordinates of targets, using attitude and acceleration measured by the IMU. In particular for an armed aircraft, the performance of the weapon system depends on how quickly and accurately it acquires the target coordinates. The IMU should be operated after alignment is complete, to meet the coordinate accuracy required by the weapon system so the initial stabilization time of the IMU should be reduced, by quickly measuring the attitude and acceleration. Alignment is the process of determining the initial attitude by resolving the attitude error of the IMU, and the IMU of mission equipment such as an airborne EOTS, uses velocity matching based on the velocity from GPS/INS for aircraft navigation. In this paper, a method is presented to improve the transfer alignment performance of the airborne EOTS, by maneuvering aircraft and the mission equipment. First, the performance factor of the alignment was identified, as a heading error through the velocity matching model and simulation results. Then acceleration maneuvers and attitude changes were necessary, to correct the error. As a result of flight tests applied to an EOTS on a OOO aircraft system, the transfer alignment performance was improved as the duration time was decreased, by more than five times when the aircraft accelerated by more than 0.2g and the EOTS was moving until 6.7deg/s.

Development of Simulator for Analyzing Intercept Performance of Surface-to-air Missile (지대공미사일 요격 성능 분석 시뮬레이터 개발)

  • Kim, Ki-Hwan;Seo, Yoon-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.1
    • /
    • pp.63-71
    • /
    • 2010
  • In modern war, Intercept Performance of SAM(Surface to Air Missile) is gaining importance as range and precision of Missile and Guided Weapon on information warfare have been improved. An aerial defence system using Surface-to-air Radar and Guided Missile is needed to be built for prediction and defense from threatening aerial attack. When developing SAM, M&S is used to free from a time limit and a space restriction. M&S is widely applied to education, training, and design of newest Weapon System. This study was conducted to develop simulator for evaluation of Intercept Performance of SAM. In this study, architecture of Intercept Performance of SAM analysis simulator for estimation of Intercept Performance of various SAM was suggested and developed. The developed Intercept Performance of SAM analysis simulator was developed by C++ and Direct3D, and through 3D visualization using the Direct3D, it shows procedures of the simulation on a user animation window. Information about design and operation of Fighting model is entered through input window of the simulator, and simulation engine consisted of Object Manager, Operation Manager, and Integrated Manager conducts modeling and simulation automatically using the information, so the simulator gives user feedback in a short time.

Disentangling Trade Effects of the Korea - China FTA: Trade Liberalization or Political Conflicts?

  • HuiHui Yin;Juyoung Cheong
    • Journal of Korea Trade
    • /
    • v.27 no.3
    • /
    • pp.21-42
    • /
    • 2023
  • Purpose - This paper investigates the trade effect of the Korea-China Free Trade Agreement (KCFTA) which coincides with political conflicts between the two countries due to the deployment of the Terminal High Altitude Area Defense (THAAD) in Korea. The two events occurred in the same year and both are likely to affect trade between two countries but in opposite directions. Therefore, it is crucial to distinguish between the trade effects from the KCFTA event and those from the THAAD event to evaluate the true FTA effects. However, this would be difficult when using only annual data. Accordingly, ex post studies to examine the trade effects of KCFTA are lacking in trustworthiness while many ex ante studies that conjecture the positive trade effects neglect the THAAD deployment impact. This paper aims to fill that gap. Design/methodology - Given that the KCFTA and THAAD events occurred in the same year but in different months, we use the monthly data from 2000 to 2019 of Korea's exports to bracket this period. We employ the difference-in-difference (DID) method within a gravity equation specification that uses hi-dimensional fixed effects to address various endogeneity issues and seasonal effects. We identify the net impact of KCFTA ratification from these two near-simultaneous events to quantify the effects of trade liberalization between these two countries. Findings - After isolating the THAAD effects on trade, the analysis creates a positive and statistically significant coefficient estimate of the KCFTA impact. In contrast, failing to isolate the THAAD effect produced a negative and statistically significant coefficient estimate of the KCFTA impact. Our results indicate that KCFTA independently increased Korea's exports to China by 10.2%, but that this increase was fully mitigated by the THAAD event. Further, our results verify that unobserved heterogeneity and multilateral resistance are technically difficult to account for in those estimations as that rely solely upon annual data, as this type of data are inadequate to control for the potential for endogeneity. Originality/value - This paper is one of the first studies to carefully evaluate the net trade effects of the KCFTA on Korea's largest trading partner while isolating the impact of simultaneously occurred political events that may influence trade in opposing directions. Our findings indicate that the lack of prior evidence of positive trade effects of the KCFTA when using annual data may be attributed to a failure to identify the impact of each event separately. This analysis supports using the correct modeling specification to avoid misleading conclusions when evaluating any important international trade policy.

Application of Depth Resolution and Sensitivity Distribution of Electrical Resistivity Tomography to Modeling Weathered Zones and Land Creeping (전기비저항 깊이분해능 및 감도분포: 풍화층 및 땅밀림 모델에 대한 적용)

  • Kim, Jeong-In;Kim, Ji-Soo;Ahn, Young-Don;Kim, Won-Ki
    • The Journal of Engineering Geology
    • /
    • v.32 no.1
    • /
    • pp.157-171
    • /
    • 2022
  • Electrical resistivity tomography (ERT) is a traditional and representative geophysical method for determining the resistivity distributions of surrounding soil and rock volumes. Depth resolution profiles and sensitivity distribution sections of the resistivities with respect to various electrode configurations are calculated and investigated using numerical model data. Shallow vertical resolution decreases in the order of Wenner, Schlumberger, and dipole-dipole arrays. A high investigable depth in homogeneous medium is calculated to be 0.11-0.19 times the active electrode spacing, but is counterbalanced by a low vertical resolution. For the application of ERT depth resolution profiles and sensitivity distributions, we provide subsurface structure models for two types of land-creping failure (planar and curved), subvertical fracture, and weathered layer over felsic and mafic igneous rocks. The dipole-dipole configuration appears to be most effective for mapping land-creeping failure planes (especially for curved planes), whereas the Wenner array gives the best resolution of soil horizons and shallow structures in the weathered zone.

Homogenization of Plastic Behavior of Metallic Particle/Epoxy Composite Adhesive for Cold Spray Deposition (저온 분사 공정을 위한 금속입자/에폭시 복합재료 접착제의 소성 거동의 균질화 기법 연구)

  • Yong-Jun Cho;Jae-An Jeon;Kinal Kim;Po-Lun Feng;Steven Nutt;Sang-Eui Lee
    • Composites Research
    • /
    • v.36 no.3
    • /
    • pp.199-204
    • /
    • 2023
  • A combination of a metallic mesh and an adhesive layer of metallic particle/epoxy composite was introduced as an intermediate layer to enhance the adhesion between cold-sprayed particles and fiber-reinforced composites (FRCs). Aluminum was considered for both the metallic particles in the adhesive and the metallic mesh. To predict the mechanical characteristics of the intermediate bond layer under a high strain rate, the properties of the adhesive layer needed to be calculated or measured. Therefore, in this study, the Al particle/epoxy adhesive was homogenized by using a rule of mixture. To verify the homogenization, the penetration depth, and the thickness decrease after the cold spray deposition from the undeformed surface, was monitored with FE analysis and compared with experimental observation. The comparison displayed that the penetration depth was comparable to the diameters of one cold spray particle, and thus the homogenization approach can be reasonable for the prediction of the stress level of particulate polymer composite interlayer under a high strain rate for cold spray processing.

A Study on Intelligent Self-Recovery Technologies for Cyber Assets to Actively Respond to Cyberattacks (사이버 공격에 능동대응하기 위한 사이버 자산의 지능형 자가복구기술 연구)

  • Se-ho Choi;Hang-sup Lim;Jung-young Choi;Oh-jin Kwon;Dong-kyoo Shin
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.137-144
    • /
    • 2023
  • Cyberattack technology is evolving to an unpredictable degree, and it is a situation that can happen 'at any time' rather than 'someday'. Infrastructure that is becoming hyper-connected and global due to cloud computing and the Internet of Things is an environment where cyberattacks can be more damaging than ever, and cyberattacks are still ongoing. Even if damage occurs due to external influences such as cyberattacks or natural disasters, intelligent self-recovery must evolve from a cyber resilience perspective to minimize downtime of cyber assets (OS, WEB, WAS, DB). In this paper, we propose an intelligent self-recovery technology to ensure sustainable cyber resilience when cyber assets fail to function properly due to a cyberattack. The original and updated history of cyber assets is managed in real-time using timeslot design and snapshot backup technology. It is necessary to secure technology that can automatically detect damage situations in conjunction with a commercialized file integrity monitoring program and minimize downtime of cyber assets by analyzing the correlation of backup data to damaged files on an intelligent basis to self-recover to an optimal state. In the future, we plan to research a pilot system that applies the unique functions of self-recovery technology and an operating model that can learn and analyze self-recovery strategies appropriate for cyber assets in damaged states.

Numerical simulation of flood water level in a small mountain stream considering cross-section blocking and riverbed changes - A case study of Shingwangcheon stream in Pohang before and after Typhoon Hinnamnor flood (단면 폐색과 하상 변화를 고려한 산지 중소하천의 홍수위 수치모의 - 태풍 힌남노 전후의 포항 신광천을 사례로 -)

  • Lee, Chanjoo;Jang, Eun-kyung;Ahn, Sunggi;Kang, Woochul
    • Journal of Korea Water Resources Association
    • /
    • v.56 no.12
    • /
    • pp.837-844
    • /
    • 2023
  • Small and medium-sized mountain rivers that flow through steep, confined valleys carry large amounts of coarse-grained sediment and woody debris during floods. It causes an increase in flood water level by aggrading the riverbed and the cross-section blockage due to driftwood accumulation during flooding. However, the existing flood level calculation in the river basic plan does not consider these changes. In this study, using the Typhoon Hinnamnor flood in September 2022 as an example, we performed numerical simulations using the HEC-RAS model, taking into account the blockage of a cross-section at the bridge and changes in riverbed elevation that occurred during floods, and analyzed the flood level to predict flood risk. This study's results show that flooding occurs if more than 30% of the cross-section is blocked. The rise of flood water levels corresponds to that of the riverbed due to sediment deposition. These results can be used as basic data to prevent and effectively manage flood damage and contribute to establishing flood defense measures that consider actual phenomena.

Proximal Policy Optimization Reinforcement Learning based Optimal Path Planning Study of Surion Agent against Enemy Air Defense Threats (근접 정책 최적화 기반의 적 대공 방어 위협하 수리온 에이전트의 최적 기동경로 도출 연구)

  • Jae-Hwan Kim;Jong-Hwan Kim
    • Journal of the Korea Society for Simulation
    • /
    • v.33 no.2
    • /
    • pp.37-44
    • /
    • 2024
  • The Korean Helicopter Development Program has successfully introduced the Surion helicopter, a versatile multi-domain operational aircraft that replaces the aging UH-1 and 500MD helicopters. Specifically designed for maneuverability, the Surion plays a crucial role in low-altitude tactical maneuvers for personnel transportation and specific missions, emphasizing the helicopter's survivability. Despite the significance of its low-altitude tactical maneuver capability, there is a notable gap in research focusing on multi-mission tactical maneuvers that consider the risk factors associated with deploying the Surion in the presence of enemy air defenses. This study addresses this gap by exploring a method to enhance the Surion's low-altitude maneuvering paths, incorporating information about enemy air defenses. Leveraging the Proximal Policy Optimization (PPO) algorithm, a reinforcement learning-based approach, the research aims to optimize the helicopter's path planning. Visualized experiments were conducted using a Surion model implemented in the Unity environment and ML-Agents library. The proposed method resulted in a rapid and stable policy convergence for generating optimal maneuvering paths for the Surion. The experiments, based on two key criteria, "operation time" and "minimum damage," revealed distinct optimal paths. This divergence suggests the potential for effective tactical maneuvers in low-altitude situations, considering the risk factors associated with enemy air defenses. Importantly, the Surion's capability for remote control in all directions enhances its adaptability in complex operational environments.