• Title/Summary/Keyword: Detection probability

Search Result 1,123, Processing Time 0.026 seconds

Analysis of stealth design for naval vessels with wide band metamaterials (함정의 스텔스 설계를 위한 광대역 메타물질 적용 연구)

  • Hwang, Joon-Tae;Hong, Suk-Yoon;Kwon, Hyun-Wung;Song, Jee-Hun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2206-2212
    • /
    • 2017
  • When it comes to naval surface warfare, the probability of detection is an important factor in survivability and the Radar Cross Section(RCS) is a major parameter. In this paper, the RCS reduction technology of the Radar Absorbing Material(RAM) method is carried out for the general frequency range for naval warfare. We set the analysis model with the simplified ship model and the wide band metamaterial which is high-tech radar absorbing materials is selected for the RAM method. The modeling of the wide band metamaterial composed of an MIK surface which has the wide band resonant properties and flexible substance and the electromagnetic absorptions and reflections of the wide band metamaterial has been simulated to explore the performance. Also, the wide band metamaterial is compared with the paint absorber to analyze RCS reduction in terms of RCS values.

Throughput Performance Evaluation According to The State Change of A Primary Ship in Maritime Cognitive Radio Networks (해상 인지 무선 네트워크에서 선순위 선박의 상태 변화를 고려한 수율 성능 평가)

  • Nam, Yujin;Lee, Seong Ro;So, Jaewoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.6
    • /
    • pp.1148-1156
    • /
    • 2015
  • The maritime cognitive radio networks (MCRNs) provide the high throughput with a low communication cost because the secondary ships opportunistically access to unused licensed bands of primary ships. In the ground cognitive radio networks, the busy and idle state of a primary user during a frame is not nearly changed because the state of the primary user are slowly changed. However, the state of the primary ship in the MCRNs may be frequently changed in the frame. Therefore, this paper evaluates the throughput of a primary ship and secondary ships in the MCRNs taking the state change of a primary ship into consideration when the fusion center uses the cooperative spectrum sensing. The simulation results show that trade-off between the throughput of a primary ship and that of secondary ships according to the system parameter such as the cooperative spectrum sensing scheme, the number of secondary ships, and the target detection probability.

A Study on the Test Strategy of Digital Circuit Board in the Production Line Based on Parallel Signature Analysis Technique (PSA 기법에 근거한 생산라인상의 디지털 회로 보오드 검사전략에 대한 연구)

  • Ko Yun-Seok
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.53 no.11
    • /
    • pp.768-775
    • /
    • 2004
  • The SSA technique in the digital circuit test is required to be repeated the input pattern stream to n bits output nodes n times in case of using a multiplexor. Because the method adopting a parallel/serial bit convertor to remove this inefficiency has disadvantage of requiring the test time n times for a pattern, the test strategy is required, which can enhance the test productivity by reducing the test time based on simplified fault detection mechanism. Accordingly, this paper proposes a test strategy which enhances the test productivity and efficiency by appling PAS (Parallel Signature Analysis) technique to those after analyzing the structure and characteristics of the digital devices including TTL and CMOS family ICs as well as ROM and RAM. The PSA technique identifies the faults by comparing the reminder from good device with reminder from the tested device. At this time, the reminder is obtained by enforcing the data stream obtained from output pins of the tested device on the LFSR(Linear Feedback Shift Resister) representing the characteristic equation. Also, the method to obtain the optimal signature analyzer is explained by furnishing the short bit input streams to the long bit input streams to the LFSR having 8, 12, 16, 20bit input/output pins and by analyzing the occurring probability of error which is impossible to detect. Finally, the effectiveness of the proposed test strategy is verified by simulating the stuck at 1 errors or stuck at 0 errors for several devices on typical 8051 digital board.

Binary Forecast of Asian Dust Days over South Korea in the Winter Season (남한지역 겨울철 황사출현일수에 대한 범주 예측모형 개발)

  • Sohn, Keon-Tae;Lee, Hyo-Jin;Kim, Seung-Bum
    • The Korean Journal of Applied Statistics
    • /
    • v.24 no.3
    • /
    • pp.535-546
    • /
    • 2011
  • This study develops statistical models for the binary forecast of Asian dust days over South Korea in the winter season. For this study, we used three kinds of data; the rst one is the observed Asian dust days for a period of 31 years (1980 to 2010) as target values, the second one is four meteorological factors(near surface temperature, precipitation, snowfall, ground wind speed) in the source regions of Asian dust based on the NCEP reanalysis data and the third one is the large-scale climate indices. Four kinds of statistical models(multiple regression models, logistic regression models, decision trees, and support vector machines) are applied and compared based on skill scores(hit rate, probability of detection and false alarm rate).

Bistatic Scattering from a Hemi-Spherically Capped Cylinder

  • Park, Sang-Hyun;La, Hyoung-Sul;Cho, Sung-Ho;Oh, Taek-Hwan;Kim, Young-Shin;Lee, Chang-Won;Na, Jung-Yul
    • The Journal of the Acoustical Society of Korea
    • /
    • v.25 no.3E
    • /
    • pp.115-122
    • /
    • 2006
  • The bistatic scattering of an incident wave by a hemi-spherically capped cylinder is of particular interest because it has rarely been studied until the present day. The configuration of a hemi-spherically capped cylinder is similar to naval underwater weapons (submarines, mines, torpedos, etc.), but which is not exactly the same. This paper describes a novel laboratory experiment aimed at direct measurement of bistatic scattering by a hemi-spherically capped cylinder. Bistatic scattering by a hemi-spherically capped cylinder was measured in an acoustic water tank (5m long, 5m wide, 5m deep) using a high frequency projector (120kHz) and hydrophone. Measurements of monostatic scattering were also made under the same conditions. The bistatic scattering pattern by a hemi-spherically capped cylinder was measured against the incident angles $(0^{\circ},\;15^{\circ},\;20^{\circ},\;30^{\circ},\;45^{\circ},\;60^{\circ},\;90^{\circ})$ in order to verify various scattering pattern characteristics by the change of incident angle. The results indicate that the bistatic scattering TS at a wide scattering angle is much stronger than the mono static scattering TS. In bistatic scattering, the forward scattering TS is significantly stronger than the backward scattering TS, and the forward scattering pattern is also broader. In case of seven incident angles, the maximum value of forward scattering TS is about 14dB stronger than that of backward scattering TS. It is also found that forward scattering varies with the incident angle of sound to a much less extent than backscattering, and it is not seriously affected by the incident angle. These features could be the advantages of using forward scattering for detecting underwater targets at long range and increasing detection area and probability.

Design of the PHY Structure of a Voice and Data Transceiver with Security (보안성을 갖는 음성 및 데이터 트랜시버의 물리 계층 구조 설계)

  • Eun, Chang-Soo;Lom, Sun-Min;Lee, Kyoung-Min
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.10 s.352
    • /
    • pp.46-54
    • /
    • 2006
  • In this paper, we propose a digital transceiver that can overcome the problems which current analog transceivers have. For the proposed transceiver, we assumed a frequency resource that consists of discrete and narrow channels. We also assumed that person-to-group, group-to-group, as well as person-to-person, voice and data communications with moderate security should be devisedand the data rate is 1 Mbps with simultaneous voice and data. Frequency hewing spread spectrum (FH-SS) and differential 8-PSK (D8PSK) were adopted for security reasons and bandwidth constraints, and for the reduction of implementation complexity, respectively. For the carrier and the symbol timing recovery, the structure of the preamble was proposed based on the IEEE 802.11 FHSS frame format to improve detection probability. The computer simulation results and power budget analysis implies that the proposed system can be usedin simple wireless communications in place of such as analog walkie-talkies.

Performance Evaluation of a Cooperative Spectrum Sensing using the k-out-of-n Fusion Rule in CR Networks (CR 네트워크에서 k-out-of-n 융합 규칙을 사용한 협력 스펙트럼 감지 방식의 성능 분석)

  • Lee, Sang-Wook;Lim, Chang-Heon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.5A
    • /
    • pp.429-435
    • /
    • 2009
  • Cooperative spectrum sensing allows secondary users of a cognitive radio(CR) network to collaborate to determine whether a primary user occupies the spectrum of interest or not. It usually performs spectrum sensing by combining the individual decisions of each second user into a final one and the k-out-of-n fusion rule is a general approach for decision fusion. This rule declares that the spectrum is occupied only when the decisions from more than k-1 secondary users indicate the presence of a primary user. In this paper, we analyze a cooperative spectrum sensing scheme with the fusion rule under the constraint that its detection probability is maintained to be no less than a given level and its numerical results for the case of a CR network with 10 secondary users.

Statistical analysis for HTS coil considering inhomogeneous Ic distribution of HTS tape

  • Jin, Hongwoo;Lee, Jiho;Lee, Woo Seung;Ko, Tae Kuk
    • Progress in Superconductivity and Cryogenics
    • /
    • v.17 no.2
    • /
    • pp.41-44
    • /
    • 2015
  • Critical current of high-temperature superconducting (HTS) coil is influenced by its own self magnetic field. Direction and density distribution of the magnetic field around the coil are fixed after the shape of the coil is decided. If the entire part of the HTS tape has homogeneous $I_c$ distribution characteristic, quench would be initiated in fixed location on the coil. However, the actual HTS tape has inhomogeneous $I_c$ distribution along the length. If the $I_c$ distribution of the HTS tape is known, we can expect the spot within the HTS coil that has the highest probability to initiate the quench. In this paper, $I_c$ distribution within the HTS coil under self-field effect is simulated by MATLAB. In the simulation procedure, $I_c$ distribution of the entire part of the HTS tape is assume d to follow Gaussian-distribution by central limit theorem. The HTS coil model is divided into several segments, and the critical current of each segment is calculated based on the-generalized Kim model. Single pancake model is simulated and self-field of HTS coil is calculated by Biot-Savart's law. As a result of simulation, quench-initiating spot in the actual HTS coil can be predicted statistically. And that statistical analysis can help detect or protect the quench of the HTS coil.

Development of Anti-Spoofing Equipment Architecture and Performance Evaluation Test System

  • Jung, Junwoo;Park, Sungyeol;Hyun, Jongchul;Kang, Haengik;Song, Kiwon;Kim, Kapjin;Park, Youngbum
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.7 no.3
    • /
    • pp.127-138
    • /
    • 2018
  • Spoofing attacks including meaconing can provide a bogus position to a victim GPS receiver, and those attacks are notably difficult to detect at the point of view on the receiver. Several countermeasure techniques have been studied to detect, classify, and cancel the spoofing signals. Based on the countermeasure techniques, we have developed an anti-spoofing equipment that detects and mitigates or eliminates the spoofing signal based on raw measurements. Although many anti-spoofing techniques have been studied in the literatures, the evaluation test system is not deeply studied to evaluate the anti-spoofing equipment, which includes detection, mitigation, and elimination of spoofing signals. Each study only has a specific test method to verify its anti-spoofing technique. In this paper, we propose the performance evaluation test system that includes both spoofing signal injection system and its injection scenario with the constraints of stand-alone anti-spoofing techniques. The spoofing signal injection scenario is designed to drive a victim GPS receiver that moves to a designed position, where the mitigation and elimination based anti-spoofing algorithms can be successively evaluated. We evaluate the developed anti-spoofing equipment and a commercial GPS receiver using our proposed performance evaluation test system. Although the commercial one is affected by the test system and moves to the designed position, the anti-spoofing equipment mitigates and eliminates the injected spoofing signals as planned. We evaluate the performance of anti-spoofing equipment on the position error of the circular error probability, while injecting spoofing signals.

항공기 탑재형 다목적 레이다 신호처리기 설계

  • Kim, Hyoun-Kyoung;Moon, Sang-Man;Kim, Tae-Sik;Lee, Hae-Chang;Kang, Kyoung-Woon
    • Aerospace Engineering and Technology
    • /
    • v.3 no.2
    • /
    • pp.229-237
    • /
    • 2004
  • In this paper, the design method and algorithms of the signal processor for a multipurpose radar system are analyzed. The signal processor, operating at the two modes-collision avoidance mode and weather mode, has 4 steps of ADC, NCI, STC, CFAR. Several algorithms of NCI and CFAR are analyzed and the optimal design is proposed to the system. CVI and CMLD algorithm have good performance in decreasing the false alarm rate and increasing detection probability, Regarding processor computational capacity, K=12 for CVI, M=16~20, Ko=M-4 for CMLD is suggested. CVI processing needs much time, two or more processors need to be allocated to CVI. So, for the system with four processors, two processors should be allocated to VID of NCI with ADC input and CFAR with STC, and two processors are should be allocated to CVI.

  • PDF