• Title/Summary/Keyword: Defense Systems

Search Result 2,130, Processing Time 0.027 seconds

Artillery Error Budget Method Using Optimization Algorithm (최적화 알고리즘을 활용한 곡사포의 사격 오차 예측 기법)

  • An, Seil;Ahn, Sangtae;Choi, Sung-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.3
    • /
    • pp.55-63
    • /
    • 2017
  • In R&D of artillery system, error budget method is used to predict artillery firing error without field firing test. The error budget method for artillery has been consistently developed but apply for practical R&D of the weapon system has been avoided because of lacks of error budget source information. The error budget source is composed of every detailed error components which affect total distance and deflection error of artillery, and most of them are difficult to be calculated or measured. Also with the inaccuracy of source information, simulated error result dose not reflect real firing error. To resolve that problem, an optimization algorithm is adopted to figure out error budget sources from existing filed firing test. The method of finding input parameter estimation which is commonly used in aerodynamics was applied. As an optimization algorithm, CMA-ES is used and presented in the paper. The error budget sources which are figured out by the presented method can be applied to compute ROC of new weapon systems and may contribute to an improvement of accuracy in artillery.

A Study on the Problems of Procedural Law Against Cyber Crimes in Korea - On the Trend of Procedural Law Against Cyber Crimes of U.S - (우리 사이버범죄 대응 절차의 문제점에 관한 연구 - 미국의 사이버범죄대응절차법을 중심으로 -)

  • Lim Byoung-Rak;Oh Tae-Kon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.231-241
    • /
    • 2006
  • When current cyber attacks to information and communication facilities are examined, technologies such as chase evasion technology and defense deviation technology have been rapidly advanced and many weak systems worldwide are often used as passages. And when newly-developed cyber attack instruments are examined, technologies for prefect crimes such as weakness attack, chase evasion and evidence destruction have been developed and distributed in packages. Therefore, there is a limit to simple prevention technology and according to cases, special procedures such as real-time chase are required to overcome cyber crimes. Further, cyber crimes beyond national boundaries require to be treated in international cooperation and relevant procedural arrangements through which the world can fight against them together. However, in current laws, there are only regulations such as substantial laws including simple regulations on Punishment against violation. In procedure, they are treated based on the same procedure as that of general criminal cases which are offline crimes. In respect to international cooperation system, international criminal private law cooperation is applied based on general criminals, which brings many problems. Therefore, this study speculates the procedural law on cyber crimes and presents actual problems of our country and its countermeasures.

  • PDF

Effect of Time-to-go Estimate to Impact Time Control Guidance Laws (충돌시간 제어 유도법칙에 대한 잔여비행시간 추정의 영향)

  • Kim, Mingu
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.47 no.8
    • /
    • pp.558-565
    • /
    • 2019
  • A lot of studies on the survivability of missiles have been widely studied, since the technology of modern warships equipped with state-of-the-art defense systems has been improved. The survivability of missiles can be improved by attacking a target simultaneously using multiple missiles. For this reason, impact time control guidance (ITCG) laws have been widely studied. This paper deals with the effect of time-to-go estimate to ITCG laws. In this paper, two kinds of time-to-go estimate are first introduced in two-dimensional and three-dimensional environment and then ITCG laws are derived using the time-to-go estimate. Numerical simulations are performed to analyze the performance of the designed ITCG laws and the effect of time-to-go estimate is discussed.

Effects of the Satisfaction Level of Living Environment in Rural Area on the Migration Intension (농촌지역의 생활환경 만족수준이 이주의사에 미치는 효과)

  • Kim, Jungtae;Shin, Dongho
    • Journal of Korean Society of Rural Planning
    • /
    • v.24 no.4
    • /
    • pp.1-13
    • /
    • 2018
  • This study analyzes the effect of the level of satisfaction with the living environment of rural people on migration. The analysis data were used by the Rural Development Administration for the survey of welfare systems for farmers and fishermen in 2017, and samples of 3,776 were used for the analysis. The analysis variables were divided into a group of migrants, a group of permanent residents, and a group of decision-keeping, and the level of satisfaction with the living environment of each of the 10 rural areas was used as an independent variable. According to the analysis results, the basic living base and safety of rural residents were having a positive effect. The results show that the projects for developing rural areas, which increase the basic living base, are making substantial contributions to preventing the breakaway of the rural population. Safety has been neglected in the area of rural planning, but if the level of discontent is not enough, it has had the greatest impact on the livelihoods of rural residents. Welfare and cultural leisure set the main demand level for welfare and cultural leisure to the elderly and vulnerable classes, and interpret it as a result of weakened defense against stress from relocation of residence, difficulty of migration due to low income levels, and migration. Therefore, the paradoxical analysis results could be interpreted as showing that measures to increase the satisfaction of the people on welfare and cultural leisure should be taken.

Analysis of SEAD Mission Procedures for Manned-Unmanned Aerial Vehicles Teaming (유무인기 협업 기반의 SEAD 임무 수행절차 분석)

  • Kim, Jeong-Hun;Seo, Wonik;Choi, Keeyoung;Ryoo, Chang-Kyung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.47 no.9
    • /
    • pp.678-685
    • /
    • 2019
  • Due to the changes in future war environment and the technological development of the aviation weapon system, it is required to carry out on the analysis of the Manned-Unmanned aerial vehicles Teaming(MUM-T). Conventional manned-unmanned aerial vehicles operate according to the air strategy missions and vehicles' performance. In this paper, we analyze conventional aerial vehicle's mission to derive various kinds of missions of MUM-T after analyzing the unmanned aircraft systems roadmap issued by US DoD and the air strategy of US Air Force. Next, we identify the basic operations of the vehicles to carry out the missions, select the MUM-T based Suppression of Enemy Air Defense missions(SEAD), and analyze the procedure for performing the missions step by step. In this paper, we propose a procedure of the mission in the context of physical space and timeline for the realization of the concept of MUM-T.

Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures

  • Bahrami, Pooneh Nikkhah;Dehghantanha, Ali;Dargahi, Tooska;Parizi, Reza M.;Choo, Kim-Kwang Raymond;Javadi, Hamid H.S.
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.865-889
    • /
    • 2019
  • The need for cyber resilience is increasingly important in our technology-dependent society where computing devices and data have been, and will continue to be, the target of cyber-attackers, particularly advanced persistent threat (APT) and nation-state/sponsored actors. APT and nation-state/sponsored actors tend to be more sophisticated, having access to significantly more resources and time to facilitate their attacks, which in most cases are not financially driven (unlike typical cyber-criminals). For example, such threat actors often utilize a broad range of attack vectors, cyber and/or physical, and constantly evolve their attack tactics. Thus, having up-to-date and detailed information of APT's tactics, techniques, and procedures (TTPs) facilitates the design of effective defense strategies as the focus of this paper. Specifically, we posit the importance of taxonomies in categorizing cyber-attacks. Note, however, that existing information about APT attack campaigns is fragmented across practitioner, government (including intelligence/classified), and academic publications, and existing taxonomies generally have a narrow scope (e.g., to a limited number of APT campaigns). Therefore, in this paper, we leverage the Cyber Kill Chain (CKC) model to "decompose" any complex attack and identify the relevant characteristics of such attacks. We then comprehensively analyze more than 40 APT campaigns disclosed before 2018 to build our taxonomy. Such taxonomy can facilitate incident response and cyber threat hunting by aiding in understanding of the potential attacks to organizations as well as which attacks may surface. In addition, the taxonomy can allow national security and intelligence agencies and businesses to share their analysis of ongoing, sensitive APT campaigns without the need to disclose detailed information about the campaigns. It can also notify future security policies and mitigation strategy formulation.

A Study On the Renewal System of Domestic High Definition Maps (우리나라 정밀도로지도의 갱신체계에 관한 연구)

  • SEOL, Jae-Hyuk;LEE, Won-Jong;CHOI, Yun-Soo;JEONG, In-Hun
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.22 no.3
    • /
    • pp.133-145
    • /
    • 2019
  • Building and researching high definition maps that support autonomous vehicles, one of Korea's key challenges for the future, are being actively propelled in both private and government sectors with the goal of fast commercialization. Under this perspective, update methods that secure up-to-date information are emerging as key tasks. To provide a plan for establishing efficient renewal systems for high definition maps, we analyzed the present condition of road types, causes of road changes and its annual change rates, and examined where and how such road change information is managed. Furthermore, the method of collection and detection of road change information and the renewal system of high definition maps are defined based on the current study. At the end of the paper, a step-by-step renewal system is proposed through the examination of renewal cycles, contents, and region of high definition maps.

Bulletproof Performance of Hybrid Plates using a Composite Laminated with Abalone Shell Fragments (전복껍질 메소절편 기반 복합소재 합판 제작 및 이를 이용한 하이브리드 판재의 방탄특성)

  • Kim, Jeoung Woo;Kang, Dae Won;Paik, Jong Gyu;Youk, Youngki;Park, Jeong Ho;Shin, Sang-Mo
    • Korean Journal of Materials Research
    • /
    • v.29 no.1
    • /
    • pp.43-51
    • /
    • 2019
  • Nacre of abalone shell features a "brick-and-mortar" microstructure, in which micro-plates of calcium carbonate are bonded by nanometers-thick layers of chitin and proteins. Due to the microstructure and its unique toughening mechanisms, nacre possesses an excellent combination of specific strength, stiffness and toughness. This study deals with the possibility of using nacre fragments obtained from abalone shell for making a bulletproof armor system. A composite plate laminated with abalone shell fragments is made and compression and bend tests are carried out. In addition, a bulletproof test is performed with hybrid armor systems which are composed of an alumina plate, a composite plate, and aramid woven fabric to verify the ballistic performance of nacre. The compressive strength of the composite plate is around 258.3 MPa. The bend strength and modulus of the composite plate decrease according to the plate thickness and are about 149.2 MPa and 50.3 GPa, respectively, for a 4.85 mm thick plate. The hybrid armor system with a planar density of $45.2kg/m^2$, which is composed of an 8 mm thick alumina plate, a 2.4 mm thick composite plate, and 18 layers of aramid woven fabric, satisfy the NIJ Standard 0101.06 : 2008 Armor Type IV. These results show that a composite plate laminated with abalone shell fragments can be used for a bulletproof armor system as an interlayer between ceramic and fabric to decrease the armor system's weight.

Computational approaches for prediction of protein-protein interaction between Foot-and-mouth disease virus and Sus scrofa based on RNA-Seq

  • Park, Tamina;Kang, Myung-gyun;Nah, Jinju;Ryoo, Soyoon;Wee, Sunghwan;Baek, Seung-hwa;Ku, Bokkyung;Oh, Yeonsu;Cho, Ho-seong;Park, Daeui
    • Korean Journal of Veterinary Service
    • /
    • v.42 no.2
    • /
    • pp.73-83
    • /
    • 2019
  • Foot-and-Mouth Disease (FMD) is a highly contagious trans-boundary viral disease caused by FMD virus, which causes huge economic losses. FMDV infects cloven hoofed (two-toed) mammals such as cattle, sheep, goats, pigs and various wildlife species. To control the FMDV, it is necessary to understand the life cycle and the pathogenesis of FMDV in host. Especially, the protein-protein interaction between FMDV and host will help to understand the survival cycle of viruses in host cell and establish new therapeutic strategies. However, the computational approach for protein-protein interaction between FMDV and pig hosts have not been applied to studies of the onset mechanism of FMDV. In the present work, we have performed the prediction of the pig's proteins which interact with FMDV based on RNA-Seq data, protein sequence, and structure information. After identifying the virus-host interaction, we looked for meaningful pathways and anticipated changes in the host caused by infection with FMDV. A total of 78 proteins of pig were predicted as interacting with FMDV. The 156 interactions include 94 interactions predicted by sequence-based method and the 62 interactions predicted by structure-based method using domain information. The protein interaction network contained integrin as well as STYK1, VTCN1, IDO1, CDH3, SLA-DQB1, FER, and FGFR2 which were related to the up-regulation of inflammation and the down-regulation of cell adhesion and host defense systems such as macrophage and leukocytes. These results provide clues to the knowledge and mechanism of how FMDV affects the host cell.

A Study on the Standardization of On-Board Training System Software for Naval Ship Engineering Control System

  • Kwak, Seung-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.9
    • /
    • pp.97-104
    • /
    • 2021
  • Since 1993, Successfully localized naval combat System has made steady development on various domestic and foreign ships. On the other hand, Engineering Control System(ECS) is dependent on foreign companies. Therefore, there is a lot of interest and research in the localization of ECS in the navy defense industry. As one of various studies, a preliminary study of domestic ECS software that can be commonly applied to naval ships is in progress. This paper propose Ecs Obts Scalable Platform(EOSPA) as the standard architecture of ECS On-Board Training System(OBTS) software by applying object-oriented programming and standardization. And this introduces EOSPA's structure, function, and features of each component. Furthermore, high reusability and maintainability are expected in the development of ECS OBTS software applying EOSPA in various naval ships.