• Title/Summary/Keyword: Defense Model

Search Result 1,792, Processing Time 0.03 seconds

Study of Development for Distributed Battlefield Simulation Environment : One-to-One Single Unit Engagement Model (분산전장 모의환경 구축 방법에 대한 연구 : 단일부대 1:1 교전모델 개발)

  • Choi, Jeongseok;Moon, Sunghwan;Kim, Taeyoung;Kim, Jaekwon;Lee, Jongsik
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.4
    • /
    • pp.69-76
    • /
    • 2015
  • Modern warfare, which adopt an intensive technique of applied sciences, is difficult to predict, and has a high complexity. Thus, it is necessary to build a battle-field environment and simulation-based analysis. Various organizations are participated to build battlefield model for defense M&S according to a scale and format. On the basis of this trend, approaching from various systems is needed to reconfigure battlefield modeling for distributed system. This paper proposes building design for battlefield simulation environment with a sample of one-to-one single unit engagement model. The proposed method can expect to utilize an example of distributed environment for various participants that are involved in battlefield modeling and simulation.

A Study on the Establishment of ISAR Image Database Using Convolution Neural Networks Model (CNN 모델을 활용한 항공기 ISAR 영상 데이터베이스 구축에 관한 연구)

  • Jung, Seungho;Ha, Yonghoon
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.4
    • /
    • pp.21-31
    • /
    • 2020
  • NCTR(Non-Cooperative Target Recognition) refers to the function of radar to identify target on its own without support from other systems such as ELINT(ELectronic INTelligence). ISAR(Inverse Synthetic Aperture Radar) image is one of the representative methods of NCTR, but it is difficult to automatically classify the target without an identification database due to the significant changes in the image depending on the target's maneuver and location. In this study, we discuss how to build an identification database using simulation and deep-learning technique even when actual images are insufficient. To simulate ISAR images changing with various radar operating environment, A model that generates and learns images through the process named 'Perfect scattering image,' 'Lost scattering image' and 'JEM noise added image' is proposed. And the learning outcomes of this model show that not only simulation images of similar shapes but also actual ISAR images that were first entered can be classified.

다중 방책 연구

  • Jo Deok-Un;Lee Sang-Yong
    • Journal of the military operations research society of Korea
    • /
    • v.11 no.2
    • /
    • pp.6-14
    • /
    • 1985
  • The layered multi-barrier defense situation against penetrating enemy threat is analytically modeled towards minimizing the penetration probability. Each layer is characterized by probability of detection and probability of kill given detection. The two capabilities are assumed independent. Detection in a layer, however, affects detection performance in subsequent layers. The following three models were formulated and investigated: (1) 'Model A' permits increase of detection performance in only the next barrier, (2) 'Model B' permits the increase in all subsequent barriers linearly, and (3) 'Model C' expresses the increase in an asymptotic exponential way. The best and the worst barrier combinations are determined through model exercise and model performances are compared through sensitivity analysis for the 'intensification factor.'

  • PDF

A Study on the Pollutant Dispersion over a Mountain Valley Region (II) : Numerical Simulation (산악 계곡지형에서의 오염확산에 관한 연구(II) :수치해석)

  • Shim Woo-Sup;Kim Seogcheol;Yoo Seong-Yeon
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.17 no.11
    • /
    • pp.1060-1071
    • /
    • 2005
  • Passive gas dispersions over a 1/1000 scale terrain model at Eiffel type wind tunnel were reproduced by numerical simulation. Large eddy simulation was used to treat the sub-grid scale turbulences. The terrain features were represented by millions of point forces densely distributed over the solid surface using the virtual boundary method. The model simulations agreed very well with the experiments in a consistent fashion for all wind directions. The measured profiles of the wind speeds as well as the tracer gas concentrations were nicely simulated by the CFD model at most locations scattered over the model terrain. With scale factor adjusted and the thermal stratification effects incorporated, the CFD model was expected to provide reliable information on pollutant dispersions over the real complex terrains.

A Study on the modeling of horizontal launch at submarine in the preliminary design phase (초기설계 단계에서의 잠수함 수평발사 모델링 연구)

  • Kim Dong-Hun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.7 no.3 s.18
    • /
    • pp.38-46
    • /
    • 2004
  • This paper deals with the development of simulation model for the horizontal launch at submarines in the preliminary design phase. The simulation model is composed of submarine motion model, cross flow force model in the bow of submarine, and weapon motion model In launch through torpedo tubes. Using submarine and weapon characteristics and simulation condition, it can simulate the exit velocity of weapon through torpedo tubes and reaction forces. It should be helpful for the analysis of the safe launch and design requirements in the preliminary design phase of a submarine or a weapon launched through torpedo tubes.

K-1 Tank Life Cycle Cost Estimate Using PRICE Model (PRICE 모델을 이용한 K1전차 수명주기 비용추정)

  • 강창호;강성진
    • Journal of the military operations research society of Korea
    • /
    • v.25 no.2
    • /
    • pp.44-61
    • /
    • 1999
  • Cost estimation has posed a significant challenge to estimators, planners, and managers in both government and military. Considerable historical evidence shows that accurate cost estimation has been difficult to achieve across a wide range of projects, including weapon systems. This paper introduces new cost estimating concept, CAIV(Cost As an Independent Variable) and a cost estimating case study using PRICE model, computer aided parametric estimating models(CAPE) for K1 tank cost estimate. CAIV concept is to set realistic but aggressive cost objectives easily in each acquisition program and to achieve cost, schedule, and performance objectives considering various managing risks with a project manager and industry teams. The Price model is one of computer aided cost estimating models and widely used in U.S. defense system analysis as a tool for CAIV. We analyze theories, inputs, outputs of the PRICE model and present a case study for K1 tank to estimate costs in requirement and concept phase, program and budgeting phase, and life cycle phase. Finally we obtain results that the Price model can be used in various phases of PPBEES depending upon available data and time.

  • PDF

A Model to Evaluate Jammer Influences on Ranging Measurements

  • Yoo, Won Jae;Kim, Heyone;Hwang, Dong-Hwan;So, Hyoungmin;Lee, Hyung Keun
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.8 no.2
    • /
    • pp.41-47
    • /
    • 2019
  • Recently, number of intentional jamming has increased significantly. If GNSS jammers are activated, user receivers can be largely influenced due to the vulnerable characteristic of the GNSS (Global Navigation Satellite System) signal. When the reception power of the jamming signal and that of the navigation signal are similar, the C/A (Coarse Acquisition) chip delay error can occur in the delay locked loop. To evaluate the jamming effect, a new measurement model is formulated based on previous research works. The new model explains how the jamming to signal ratio affects the ranging measurement accuracy and other parameters. To evaluate the validity of the newly formulated model, the experiment results of the previous research works under actual jamming environment are utilized. By evaluating the consistency of the carrier-to-noise ratio (C/N0) and the position error with the actual jamming environment, the validity of the newly formulated model is verified.

Privacy-preserving Federated Learning via Selective Encryption (선택적 암호화를 통한 프라이버시 보호 연합 학습)

  • Younghan Lee
    • Annual Conference of KIPS
    • /
    • 2024.10a
    • /
    • pp.185-187
    • /
    • 2024
  • We introduce a novel method to defend against model inversion attacks in Federated Learning (FL). FL enables the training of a global model by sharing local gradients without sharing clients' private data. However, model inversion attacks can reconstruct the data from the shared gradients. Traditional defense mechanisms, such as Differential Privacy (DP) and Homomorphic Encryption (HE), have limitations in balancing privacy and model accuracy. Our approach selectively encrypts more important gradients, which contain more information about the training data, to balance between privacy and computational efficiency. Additionally, optional DP noise is applied to unencrypted gradients for enhanced security. Comprehensive evaluations demonstrate that our method significantly improves both privacy and model accuracy compared to existing defenses.

Risk Analysis for the Rotorcraft Landing System Using Comparative Models Based on Fuzzy (퍼지 기반 다양한 모델을 이용한 회전익 항공기 착륙장치의 위험 우선순위 평가)

  • Na, Seong Hyeon;Lee, Gwang Eun;Koo, Jeong Mo
    • Journal of the Korean Society of Safety
    • /
    • v.36 no.2
    • /
    • pp.49-57
    • /
    • 2021
  • In the case of military supplies, any potential failure and causes of failures must be considered. This study is aimed at examining the failure modes of a rotorcraft landing system to identify the priority items. Failure mode and effects analysis (FMEA) is applied to the rotorcraft landing system. In general, the FMEA is used to evaluate the reliability in engineering fields. Three elements, specifically, the severity, occurrence, and detectability are used to evaluate the failure modes. The risk priority number (RPN) can be obtained by multiplying the scores or the risk levels pertaining to severity, occurrence, and detectability. In this study, different weights of the three elements are considered for the RPN assessment to implement the FMEA. Furthermore, the FMEA is implemented using a fuzzy rule base, similarity aggregation model (SAM), and grey theory model (GTM) to perform a comparative analysis. The same input data are used for all models to enable a fair comparison. The FMEA is applied to military supplies by considering methodological issues. In general, the fuzzy theory is based on a hypothesis regarding the likelihood of the conversion of the crisp value to the fuzzy input. Fuzzy FMEA is the basic method to obtain the fuzzy RPN. The three elements of the FMEA are used as five linguistic terms. The membership functions as triangular fuzzy sets are the simplest models defined by the three elements. In addition, a fuzzy set is described using a membership function mapping the elements to the intervals 0 and 1. The fuzzy rule base is designed to identify the failure modes according to the expert knowledge. The IF-THEN criterion of the fuzzy rule base is formulated to convert a fuzzy input into a fuzzy output. The total number of rules is 125 in the fuzzy rule base. The SAM expresses the judgment corresponding to the individual experiences of the experts performing FMEA as weights. Implementing the SAM is of significance when operating fuzzy sets regarding the expert opinion and can confirm the concurrence of expert opinion. The GTM can perform defuzzification to obtain a crisp value from a fuzzy membership function and determine the priorities by considering the degree of relation and the form of a matrix and weights for the severity, occurrence, and detectability. The proposed models prioritize the failure modes of the rotorcraft landing system. The conventional FMEA and fuzzy rule base can set the same priorities. SAM and GTM can set different priorities with objectivity through weight setting.

Comparison of Adversarial Example Restoration Performance of VQ-VAE Model with or without Image Segmentation (이미지 분할 여부에 따른 VQ-VAE 모델의 적대적 예제 복원 성능 비교)

  • Tae-Wook Kim;Seung-Min Hyun;Ellen J. Hong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.23 no.4
    • /
    • pp.194-199
    • /
    • 2022
  • Preprocessing for high-quality data is required for high accuracy and usability in various and complex image data-based industries. However, when a contaminated hostile example that combines noise with existing image or video data is introduced, which can pose a great risk to the company, it is necessary to restore the previous damage to ensure the company's reliability, security, and complete results. As a countermeasure for this, restoration was previously performed using Defense-GAN, but there were disadvantages such as long learning time and low quality of the restoration. In order to improve this, this paper proposes a method using adversarial examples created through FGSM according to image segmentation in addition to using the VQ-VAE model. First, the generated examples are classified as a general classifier. Next, the unsegmented data is put into the pre-trained VQ-VAE model, restored, and then classified with a classifier. Finally, the data divided into quadrants is put into the 4-split-VQ-VAE model, the reconstructed fragments are combined, and then put into the classifier. Finally, after comparing the restored results and accuracy, the performance is analyzed according to the order of combining the two models according to whether or not they are split.