• Title/Summary/Keyword: National Defense Data

Search Result 665, Processing Time 0.022 seconds

Evaluation of the Use of Inertial Navigation Systems to Improve the Accuracy of Object Navigation

  • Iasechko, Maksym;Shelukhin, Oleksandr;Maranov, Alexandr;Lukianenko, Serhii;Basarab, Oleksandr;Hutchenko, Oleh
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.71-75
    • /
    • 2021
  • The article discusses the dead reckoning of the traveled path based on the analysis of the video data stream coming from the optoelectronic surveillance devices; the use of relief data makes it possible to partially compensate for the shortcomings of the first method. Using the overlap of the photo-video data stream, the terrain is restored. Comparison with a digital terrain model allows the location of the aircraft to be determined; the use of digital images of the terrain also allows you to determine the coordinates of the location and orientation by comparing the current view information. This method provides high accuracy in determining the absolute coordinates even in the absence of relief. It also allows you to find the absolute position of the camera, even when its approximate coordinates are not known at all.

The study of Defense Artificial Intelligence and Block-chain Convergence (국방분야 인공지능과 블록체인 융합방안 연구)

  • Kim, Seyong;Kwon, Hyukjin;Choi, Minwoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.81-90
    • /
    • 2020
  • The purpose of this study is to study how to apply block-chain technology to prevent data forgery and alteration in the defense sector of AI(Artificial intelligence). AI is a technology for predicting big data by clustering or classifying it by applying various machine learning methodologies, and military powers including the U.S. have reached the completion stage of technology. If data-based AI's data forgery and modulation occurs, the processing process of the data, even if it is perfect, could be the biggest enemy risk factor, and the falsification and modification of the data can be too easy in the form of hacking. Unexpected attacks could occur if data used by weaponized AI is hacked and manipulated by North Korea. Therefore, a technology that prevents data from being falsified and altered is essential for the use of AI. It is expected that data forgery prevention will solve the problem by applying block-chain, a technology that does not damage data, unless more than half of the connected computers agree, even if a single computer is hacked by a distributed storage of encrypted data as a function of seawater.

Precise Distribution Simulation of Scattered Submunitions Based on Flight Test Data

  • Yun, Sangyong;Hwang, Junsik;Suk, Jinyoung
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.18 no.1
    • /
    • pp.108-117
    • /
    • 2017
  • This paper presents a distribution simulation model for dual purpose improved conventional munitions based on flight test data. A systematic procedure for designing a dispersion simulation model is proposed. A new accumulated broken line graph was suggested for designing the distribution shape. In the process of verification and simulation for the distribution simulation model, verification was performed by first comparing data with firing test results, and an application simulation was then conducted. The Monte Carlo method was used in the simulations, which reflected the relationship between ejection conditions and real distribution data. Before establishing the simulation algorithm, the dominant ejection parameter of the submunitions was examined. The relationships between ejection conditions and distribution results were investigated. Five key distribution parameters were analyzed with respect to the ejection conditions. They reflect the characteristics of clustered particle dynamics and aerodynamics.

A Study on the Aircraft Mission Reliability Prediction (항공기 임무신뢰도 예측 방안 연구)

  • Lee Joon-Woo;Ju Hyun-Joon;Lee Min-Koo
    • Journal of Applied Reliability
    • /
    • v.6 no.2
    • /
    • pp.115-134
    • /
    • 2006
  • This paper deals with OO aircraft mission reliability prediction. To demonstrate user-required mission reliability, it is calculated with use general formulae which are used in reliability engineering. The mission reliability of OO aircraft is calculated in considering conversion factor (CF) on the each subsystems' MTBF. The prediction results are explained only the state at present time. Because these data are not real data in operational environments. Therefore, in the case of OO aircraft, it has to be needed collecting the real and renewal data which are operational and empirical. After that, continuing the data upgrading, it is easily closed to the more exact reliability value.

  • PDF

A Study on the Metadata Schema for the Collection of Sensor Data in Weapon Systems (무기체계 CBM+ 적용 및 확대를 위한 무기체계 센서데이터 수집용 메타데이터 스키마 연구)

  • Jinyoung Kim;Hyoung-seop Shim;Jiseong Son;Yun-Young Hwang
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.161-169
    • /
    • 2023
  • Due to the Fourth Industrial Revolution, innovation in various technologies such as artificial intelligence (AI), big data (Big Data), and cloud (Cloud) is accelerating, and data is considered an important asset. With the innovation of these technologies, various efforts are being made to lead technological innovation in the field of defense science and technology. In Korea, the government also announced the "Defense Innovation 4.0 Plan," which consists of five key points and 16 tasks to foster advanced science and technology forces in March 2023. The plan also includes the establishment of a Condition-Based Maintenance system (CBM+) to improve the operability and availability of weapons systems and reduce defense costs. Condition Based Maintenance (CBM) aims to secure the reliability and availability of the weapon system and analyze changes in equipment's state information to identify them as signs of failure and defects, and CBM+ is a concept that adds Remaining Useful Life prediction technology to the existing CBM concept [1]. In order to establish a CBM+ system for the weapon system, sensors are installed and sensor data are required to obtain condition information of the weapon system. In this paper, we propose a sensor data metadata schema to efficiently and effectively manage sensor data collected from sensors installed in various weapons systems.

A Study on the Reflection of Condition-Based Maintenance Requirement in the Defense Specification (상태기반정비 요구도 국방규격 반영에 관한 연구)

  • Son, Minjeong;Kim, Young-Gil
    • Journal of Korean Society for Quality Management
    • /
    • v.49 no.3
    • /
    • pp.269-279
    • /
    • 2021
  • Purpose: The purpose of this study was to suggest weapon system specifications for requirements of Condition-Based Maintenance(CBM/CBM+). Methods: The military documents and case studies with regard to condition-based maintenance were reviewed. Representative Korea defense specifications of weapon system such as an aircraft, a C4ISR etc. were analyzed and investigated the level of requirement for maintainability was. Results: Condition-based maintenance was defined in both U.S. instruction and Korean directive. While deparment of defense(U.S.) provide a guidebook for CBM+, detailed instruction was not sufficient for Korean. Ministry of national defense(ROK) define the CBM+ by means of IPS element which should be developed along with the system development. The maintainability was barely included in Korean defense specifications, except for BIT(Built-in test) function. As a first step for defining the condition-based maintenance requirement in defense specification, this study suggests a standard form for data needed to acquire according to types of system, fault, failure, and so on. Conclusion: The empirical researches on CMB/CBM+ with domestic weapon systems are not enough, and a logic which leads the maintenance strategy to CMB/CBM+ is not solved. Through technical researches and institutional improvements including this study, we hope that condition-based maintenance would be fully established in the Korean defense field.

Navigation Signals Based on Orthogonal Tiered Polyphase Code

  • Lee, Jewon;Kim, Jeong-been;Kim, Kap-jin;Song, Ki-won;Ahn, Jae Min
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.4 no.3
    • /
    • pp.97-105
    • /
    • 2015
  • A navigation signal based on orthogonal tiered polyphase code was proposed. For the proposed signal, tiered polyphase code was used as the code of a pilot channel. Tiered polyphase code is a complex number type code, and thus the pilot channel and data channel were separated using the Walsh code which makes the correlation between different codes become 0. The results of the simulation indicated that the correlation characteristics and signal acquisition performance of the proposed signal were identical to those of tiered polyphase code, and that the disadvantage of tiered polyphase code could be supplemented through a data channel in terms of signal tracking.

Improved Impossible Differential Attack on 7-round Reduced ARIA-256

  • Shen, Xuan;He, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5773-5784
    • /
    • 2019
  • ARIA is an involutory SPN block cipher. Its block size is 128-bit and the master key sizes are 128/192/256-bit, respectively. Accordingly, they are called ARIA-128/192/256. As we all know, ARIA is a Korean Standard block cipher nowadays. This paper focuses on the security of ARIA against impossible differential attack. We firstly construct a new 4-round impossible differential of ARIA. Furthermore, based on this impossible differential, a new 7-round impossible differential attack on ARIA-256 is proposed in our paper. This attack needs 2118 chosen plaintexts and 2210 7-round encryptions. Comparing with the previous best result, we improve both the data complexity and time complexity. To our knowledge, it is the best impossible differential attack on ARIA-256 so far.

Study on the Model of Fighter Aircraft Mission Severity for Development of KF-X (한국형 전투기 개발을 위한 전투기 임무격렬도 모델 연구)

  • Kim, Sug-Ho;Hwang, Young-Ha;Shin, Ki-Su
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.2
    • /
    • pp.248-257
    • /
    • 2009
  • The aim of this paper is to propose fighter aircraft's mission severity model which can be used as one of key factors for designing a structure and determining design life of KF-X. The mission severity is a quantitative data of flight loads and expressed by Nz(Vertical Load Factor) exceedances or occurrences. The severities of the flight loads depended on the circumstances of the countries which operate fighter aircraft. In this paper we have studied on Nz occurrences/exceedances of ROKAF fighter aircraft to generate mission severity model for the KF-X. The analyses of flight data were accomplished by using the Matlab.

A Study of Storage Life Estimation for Delay System in the Fuse of 81mm Illuminating Projectile (81미리 조명탄용 신관 KM84A1E1 지연제의 저장수명 예측 연구)

  • Chang, Il-Ho;Kim, Ji-Hoon;Lee, Woo-Chul;Back, Seung-Jun;Son, Young-Kap
    • Journal of Korean Society for Quality Management
    • /
    • v.40 no.3
    • /
    • pp.270-277
    • /
    • 2012
  • Purpose: In this paper, storage lifetime of delay system in the fuse of 81MM illuminating projectile is estimated. Methods: Accelerated degradation testings of tungsten delay system using both temperature and humidity stresses were performed, and then delay time increase of the systems were analyzed as degradation data based on distribution-based degradation processes. Results: The estimated storage lifetime of detonator is between 11.8 years and 17.6 years with each stress-life relationship. Conclusion: Comparing with field data, storage lifetime of 90% reliability is about 12 years.