• Title/Summary/Keyword: Military Equipment

Search Result 425, Processing Time 0.023 seconds

Analysis of the Impact of Transmission Towers on the Performance of RF Scanners for Drone Detection (드론탐지용 RF스캐너의 성능에 송전탑이 미치는 영향 분석)

  • Moon-Hee Lee;Jeong-Ju Bang
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.23 no.1
    • /
    • pp.112-122
    • /
    • 2024
  • Recently, as unmanned aerial vehicle technology such as drones has developed, there are many environmental, social and economic benefits, but if there is malicious intent against important national facilities such as airports, public institutions, power plants, and the military, it can seriously affect national safety and people's lives. It can cause damage. To respond to these drone threats, attempts are being made to introduce detection equipment such as RF scanners. In particular, power transmission towers installed in substations, power plants, and Korea's power system can affect detection performance if the transmission tower is located in the RF scanner detection path. In the experiment, a commercial drone was used to measure the signal intensity emitted from the drone and confirm the attenuation rate. The average and maximum attenuation rates showed similar trends in the 2.4 GHz and 5.8 GHz bands, and were also affected by the density of the structure.

Optimization Design and Performance Evaluation of Flight Control Computer Architecture for UAV (무인항공기용 비행제어컴퓨터 아키텍처 최적화 설계 및 성능 평가)

  • Woo-ri-ul Kim;Dong-hyun Song;Sang-woong Park;Tae-sik Ahn
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.6
    • /
    • pp.763-769
    • /
    • 2023
  • Flight control computers for unmanned aerial vehicles are avionics that require high reliability and are generally designed to be multiplexed for margins on failures. The multiplexed flight control computer should include an interface through discrete signals and CCDL for synchronization and fault separation between channels. With the development of unmanned aerial vehicle technology, various types of platforms such as AAM and LPI are being developed in the private and military, which require advanced control performance for high-performance flight control and SWaP optimization of onboard equipment. In this paper, we designed a optimized flight control computer architecture for unmanned aerial vehicles for multiplexing processing and performed a software design for input and output control. In addition, input/output processing performance was evaluated through the implemented flight control computer and input/output software.

The Study about Role and Importance of Site Activity Stage in Safety Activity for the International Conference among Several Countries (다자간 국제회의 안전활동에 있어서 현장활동단계의 역할 및 중요성에 관한 연구 : 부산 APEC 행사를 중심으로)

  • Lee, Sun-Ki
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.105-138
    • /
    • 2009
  • This study's purpose is to present the improvement of effectiveness of security activity for international conference among Several Countries which can be held hereafter. On the basis of security activity problems originating in APEC that had been held in Busan in 2005. I made up questions three times to on the members of the police, military, fire figher and national intelligence service who had experienced in Busan APEC and recognition of possible problem and possibility of improvement on each item of questions was analyzed by Delphi Method. Also interviews with 4 security experts selected from each security agency were conducted to present improvement in each part of problem. The results obtained from the face to face interview with four experts of security-enforcement agency about the role and importance of site activity stage for international conference among several countries are as followings ; First, the system that experienced security-enforcement agents can be selected for the next national security event is needed, by data-basing the security-enforcement agents who were experienced in security event as man power management. Second, the middle-term plan for the introduction of high-tech equipment and joint inspection with relevant security agents are needed for the efficient explosive technical detection. Third, high-tech security equipment could be introduced through the international high-tech security equipment exhibition. Fourth, an anti-terrorism plan should be measured by sharing information through the cooperation with domestic and international intelligence agency. Fifth, public relations should be measured systematically by organization rather than agents' individual public relations. Sixth, political consideration to secure integrative coordination with other agency is needed for security activity, through normal cooperation with fire fighting related agency such as an electric, gas, elevator company. Seventh, a definite press guideline is needed for a convenient news coverage and safety during security event.

  • PDF

Dynamic Characteristic Analysis Procedure of Helicopter-mounted Electronic Equipment (헬기 탑재용 전자장비의 동특성 분석 절차)

  • Lee, Jong-Hak;Kwon, Byunghyun;Park, No-Cheol;Park, Young-Pil
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.23 no.8
    • /
    • pp.759-769
    • /
    • 2013
  • Electronic equipment has been applied to virtually every area associated with commercial, industrial, and military applications. Specifically, electronics have been incorporated into avionics components installed in aircraft. This equipment is exposed to dynamic loads such as vibration, shock, and acceleration. Especially, avionics components installed in a helicopter are subjected to simultaneous sine and random base excitations. These are denoted as sine on random vibrations according to MIL-STD-810F, Method 514.5. In the past, isolators have been applied to avionics components to reduce vibration and shock. However, an isolator applied to an avionics component installed in a helicopter can amplify the vibration magnitude, and damage the chassis, circuit card assembly, and the isolator itself via resonance at low-frequency sinusoidal vibrations. The objective of this study is to investigate the dynamic characteristics of an avionics component installed in a helicopter and the structural dynamic modification of its tray plate without an isolator using both a finite element analysis and experiments. The structure is optimized by dynamic loads that are selected by comparing the vibration, shock, and acceleration loads using vibration and shock response spectra. A finite element model(FEM) was constructed using a simplified geometry and valid element types that reflect the dynamic characteristics. The FEM was verified by an experimental modal analysis. Design parameters were extracted and selected to modify the structural dynamics using topology optimization, and design of experiments(DOE). A prototype of a modified model was constructed and its feasibility was evaluated using an FEM and a performance test.

A Study on Integrated Logistic Support (통합병참지원에 관한 연구)

  • 나명환;김종걸;이낙영;권영일;홍연웅;전영록
    • Proceedings of the Korean Reliability Society Conference
    • /
    • 2001.06a
    • /
    • pp.277-278
    • /
    • 2001
  • The successful operation of a product In service depends upon the effective provision of logistic support in order to achieve and maintain the required levels of performance and customer satisfaction. Logistic support encompasses the activities and facilities required to maintain a product (hardware and software) in service. Logistic support covers maintenance, manpower and personnel, training, spares, technical documentation and packaging handling, storage and transportation and support facilities.The cost of logistic support is often a major contributor to the Life Cycle Cost (LCC) of a product and increasingly customers are making purchase decisions based on lifecycle cost rather than initial purchase price alone. Logistic support considerations can therefore have a major impact on product sales by ensuring that the product can be easily maintained at a reasonable cost and that all the necessary facilities have been provided to fully support the product in the field so that it meets the required availability. Quantification of support costs allows the manufacturer to estimate the support cost elements and evaluate possible warranty costs. This reduces risk and allows support costs to be set at competitive rates.Integrated Logistic Support (ILS) is a management method by which all the logistic support services required by a customer can be brought together in a structured way and In harmony with a product. In essence the application of ILS:- causes logistic support considerations to be integrated into product design;- develops logistic support arrangements that are consistently related to the design and to each other;- provides the necessary logistic support at the beginning and during customer use at optimum cost.The method by which ILS achieves much of the above is through the application of Logistic Support Analysis (LSA). This is a series of support analysis tasks that are performed throughout the design process in order to ensure that the product can be supported efficiently In accordance with the requirements of the customer.The successful application of ILS will result in a number of customer and supplier benefits. These should include some or all of the following:- greater product uptime;- fewer product modifications due to supportability deficiencies and hence less supplier rework;- better adherence to production schedules in process plants through reduced maintenance, better support;- lower supplier product costs;- Bower customer support costs;- better visibility of support costs;- reduced product LCC;- a better and more saleable product;- Improved safety;- increased overall customer satisfaction;- increased product purchases;- potential for purchase or upgrade of the product sooner through customer savings on support of current product.ILS should be an integral part of the total management process with an on-going improvement activity using monitoring of achieved performance to tailor existing support and influence future design activities. For many years, ILS was predominantly applied to military procurement, primarily using standards generated by the US Government Department of Defense (DoD). The military standards refer to specialized government infrastructures and are too complex for commercial application. The methods and benefits of ILS, however, have potential for much wider application in commercial and civilian use. The concept of ILS is simple and depends on a structured procedure that assures that logistic aspects are fully considered throughout the design and development phases of a product, in close cooperation with the designers. The ability to effectively support the product is given equal weight to performance and is fully considered in relation to its cost.The application of ILS provides improvements in availability, maintenance support and longterm 3ogistic cost savings. Logistic costs are significant through the life of a system and can often amount to many times the initial purchase cost of the system.This study provides guidance on the minimum activities necessary to Implement effective ILS for a wide range of commercial suppliers. The guide supplements IEC60106-4, Guide on maintainability of equipment Part 4: Section Eight maintenance and maintenance support planning, which emphasizes the maintenance aspects of the support requirements and refers to other existing standards where appropriate. The use of Reliability and Maintainability studies is also mentioned in this study, as R&M is an important interface area to ILS.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Korea's Terrorist Environment and Crisis Management Plan (한국의 테러환경과 위기관리 방안)

  • Jang, Sung Jin;Kim, Young-Hyun;Shin, Seung-Cheol
    • Korean Security Journal
    • /
    • no.52
    • /
    • pp.73-91
    • /
    • 2017
  • This study is based on the political and economic standpoint of each country, Use advanced equipment to prevent new terrorism from causing widespread damage, In order to establish a countermeasures against terrorism in accordance with the reality of Korea, which is effective in responding to terrorist attacks, Korea conducted a SWOT analysis of the terrorist environment and terrorist environment through specialists. First, internal strengths of Korea 's terrorist environment include stable security situation, weakness of religious and ethnic conflicts, strong regulation and control of firearms, and counter terrorism capabilities and know - how accumulated during major international events. Second, the internal weaknesses of the terrorist environment in Korea include the insecurity of the people, the instability caused by the military confrontation with North Korea, the absence of anti-terrorism law system, the difficulty of terrorism control and management by the development of the Internet and IT technology. Third, the external opportunities for Korea 's terrorist environment are as follows: ease of supplementation and learning through cases of foreign terrorism failure, ease of increase of terrorist budget and support with higher terrorism issues, strengthening of counterterrorism through military cooperation with allied nationsRespectively. Fourth, the external threats to the terrorist environment in Korea are the increase of social dissatisfaction due to the continuous influx of defectors and foreign workers, the goal of terrorism from international terrorist organizations through alliance with the United States,Increased frequency of incidents, and increased IS coverage of terrorism around the world. In addition, the SWOT in - depth interviews on the terrorist environment of the expert group were conducted to diagnose and analyze the problems, terrorism awareness and legal system in the Korean terror environment. The results of the study are summarized as follows.First, the basic law on terrorism should be enacted.Second, the establishment of an integrated anti-terrorism organization.Third, securing and nurturing specialized personnel in response to terrorism.

  • PDF

A Study for Operation Technique Plan of Low-Cost UAV Data Bus (저가형 무인항공기 DATA BUS 운용기술 방안 연구)

  • Gil, Hyun-Cheol;Ahn, Dong-Mhan;Hong, Gyo-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.6
    • /
    • pp.1024-1031
    • /
    • 2012
  • In the past, the part of development of that is used for the military aviation target or reconnaissance is being extended to the range of application not only reconnaissance but also civilian industry as the introduction of the newest IT technology and the technical evolution. The Civilian low-cost UAV that is expected growth at the market of UAV in the world is accelerated to the extended applicability in the fields. However, The UAV study is recently focused on the Link and The Data bus because the main decision of the civilian UAV system configuration is not suitable to determinate the factory of price. In this paper is analysed the UAV data bus through the simulation in same condition both the CAN Bus which used the automobile industry and the MIL-STD-1553B which is used the aviation industry. As a comparison result, we identified that the CAN Bus of conventional configuration is possible to transmit the data without the need for a separate coupler equipment against the MIL-STD-1553B data. Thus, we identified that the CAN bus is capable to apply as a low-cost UAV internal data bus to optimize configuration and weight than 1553B.

A Study on the Influence of Maximum Velocity on Track Tension Change to Military Ammunition Vehicle (탄약운반장갑차 궤도장력 변화에 따른 최대속도 영향성 연구)

  • Noh, Sang Wan;Kim, Sung Hoon;Park, Young Min
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.6
    • /
    • pp.383-388
    • /
    • 2020
  • This study aimed to identify the influence of the power components of the ammunition vehicle on the maximum speed. The maximum speeds of the engine and transmission changes were 3% and 1.7%, respectively. In the case of strong tension based on the track tension, the decrease was 4.6%. A 1.5% increase was obtained when the tension was weak. An examination of the maximum speed by dividing the track tension into six sections revealed the maximum speed to be highest when it was maintained below the middle. Experiments were performed by varying the orbital tension on both sides of the equipment. The maximum speed of the machine was affected by a large part of the tension. The maximum speed test was conducted by adjusting the tension at the driving test site. The results showed that when the tension was strong, the speed was 16.7% higher than the standard requirement. The speed was 28.3% at low tension. The influence of the maximum speed on the track tension was confirmed; the effect was greater than replacing the large parts.

A study on simulation modeling of the underground space environment-focused on storage space for radioactive wastes (지하공간 환경예측 시뮬레이션 개발 연구-핵 폐기물 저장공간 중심으로)

  • 이창우
    • Tunnel and Underground Space
    • /
    • v.9 no.4
    • /
    • pp.306-314
    • /
    • 1999
  • In underground spaces including nuclear waste repository, prediction of air quantity, temperature/humidity and pollutant concentration is utmost important for space construction and management during the normal state as well as for determining the measures in emergency cases such as underground fires. This study aims at developing a model for underground space environment which has capabilities to take into account the effects of autocompression for the natural ventilation head calculation, to find the optimal location and size of fans and regulators, to predict the temperature and humidity by calculating the convective heat transfer coefficient and the sensible and latent heat transfer rates, and to estimate the pollutant levels throughout the network. The temperature/humidity prediction model was applied to a military storage underground space and the relative differences of dry and wet temperatures were 1.5 ~ 2.9% and 0.6 ~ 6.1%, respectively. The convection-based pollutant transport model was applied to two different vehicle tunnels. Coefficients of turbulent diffusion due to the atmospheric turbulence were found to be 9.78 and 17.35$m^2$/s, but measurements of smoke and CO concentrations in a tunnel with high traffic density and under operation of ventilation equipment showed relative differences of 5.88 and 6.62% compared with estimates from the convection-based model. These findings indicate convection is the governing mechanism for pollutant diffusion in most of the tunnel-type spaces.

  • PDF