• Title/Summary/Keyword: National Defense Data

Search Result 665, Processing Time 0.035 seconds

Development of MATLAB GUI Based Software for Monitoring Ionospheric Disturbances

  • Kim, Bu-Gyeom;Kang, Seonho;Han, Deokhwa;Song, Junesol;So, Hyoungmin;Kim, Kap Jin;Kee, Changdon
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.8 no.2
    • /
    • pp.69-77
    • /
    • 2019
  • This study introduces MATLAB Graphical User Interface (GUI)-based software to monitor ionospheric disturbances. This software detects ionospheric disturbances using Global Positioning System (GPS) and Global Navigation Satellite System (GLONASS) measurements, and estimates a location of the disturbance source through the detected disturbance. In addition, this software includes a sky plot making function and frequency analysis function through wavelet transform. To evaluate the performance of the developed software, data of 2011 Tohoku earthquake in Japan were analyzed by using the software. The analysis results verified that the ionospheric disturbances were detected through GPS and GLONASS measurements, and the location of the disturbance source was estimated through the detected disturbance.

A Linear Approximation Model for an Asset-based Weapon Target Assignment Problem (자산기반 무기할당 문제의 선형 근사 모형)

  • Jang, Jun-Gun;Kim, Kyeongtaek;Choi, Bong-Wan;Suh, Jae Joon
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.3
    • /
    • pp.108-116
    • /
    • 2015
  • A missile defense system is composed of radars detecting incoming missiles aiming at defense assets, command control units making the decisions on weapon target assignment, and artillery batteries firing of defensive weapons to the incoming missiles. Although, the technology behind the development of radars and weapons is very important, effective assignment of the weapons against missile threats is much more crucial. When incoming missile targets toward valuable assets in the defense area are detected, the asset-based weapon target assignment model addresses the issue of weapon assignment to these missiles so as to maximize the total value of surviving assets threatened by them. In this paper, we present a model for an asset-based weapon assignment problem with shoot-look-shoot engagement policy and fixed set-up time between each anti-missile launch from each defense unit. Then, we show detailed linear approximation process for nonlinear portions of the model and propose final linear approximation model. After that, the proposed model is applied to several ballistic missile defense scenarios. In each defense scenario, the number of incoming missiles, the speed and the position of each missile, the number of defense artillery battery, the number of anti-missile in each artillery battery, single shot kill probability of each weapon to each target, value of assets, the air defense coverage are given. After running lpSolveAPI package of R language with the given data in each scenario in a personal computer, we summarize its weapon target assignment results specified with launch order time for each artillery battery. We also show computer processing time to get the result for each scenario.

Public Key Authentication using(t, n) Threshold Scheme for WSN ((t, n) 임계치 기법을 이용한 센서네트워크에서의 공개키 인증)

  • Kim, Jun-Yop;Kim, Wan-Ju;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.5
    • /
    • pp.58-70
    • /
    • 2008
  • Earlier researches on Sensor Networks preferred symmetric key-based authentication schemes in consideration of limitations in network resources. However, recent advancements in cryptographic algorithms and sensor-node manufacturing techniques have opened suggestion to public key-based solutions such as Merkle tree-based schemes. These previous schemes, however, must perform the authentication process one-by-one in hierarchical manner and thus are not fit to be used as primary authentication methods in sensor networks which require mass of multiple authentications at any given time. This paper proposes a new concept of public key-based authentication that can be effectively applied to sensor networks. This scheme is based on exponential distributed data concept, a derivative from Shamir's (t, n) threshold scheme, in which the authentication of neighbouring nodes are done simultaneously while minimising resources of sensor nodes and providing network scalability. The performance advantages of this scheme on memory usage, communication overload and scalability compared to Merkle tree-based authentication are clearly demonstrated using performance analysis.

Extraction of Military Ontology Using Six-Step Bottom-up Approach (6단계 상향식 방법에 의한 국방 온톨로지 추출)

  • Ra, Min-Young;Yang, Kyung-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.6
    • /
    • pp.17-26
    • /
    • 2009
  • In national defense, established information systems are mainly based on simple information processing, such as mass data query. They have thus lacked intelligent ability of information and knowledge representation ability. We therefore need the research about the construction of military ontology which is the main topic for knowledge construction. Military ontology can help us develop the intelligent national defense information system which can search and manage information efficiently. In this paper, we present the six-step bottom-up approach for military ontology extraction, then we apply this approach to one of military domain, called national defense educational training, and finally implement it using $Prot\acute{e}g\acute{e}$ which is one of the most useful ontology development tool.

Development Methods of Database Connectivity for Data Distribution Service based on Database (데이터베이스 기반의 데이터 분배 서비스를 위한 데이터베이스 커넥티비티 개발 방법)

  • Son, Yun-Hee;Yim, Hyung-Jun;Kim, Chum-Su;Chang, Hye-Min;Choi, Hoon;Lee, Kyu-Chul
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06b
    • /
    • pp.95-97
    • /
    • 2012
  • OMG(Object Management Group)의 데이터 분배 서비스(DDS: Data Distribution Service)는 발간(publish)/구독(subscribe) 모델에 기반하여 동일한 타입의 데이터를 실시간으로 주고 받는 데이터 중심의 분산 환경에서 많이 사용되는 통신 미들웨어 기술이다. 하지만 DDS는 실시간으로 발생하는 데이터에 대하여 일회성인 특징을 갖기 때문에 추후 데이터에 대한 분석, 검증 등을 위해 영속성을 제공할 필요성이 증대되고 있다. 이러한 추세를 반영하듯 RTI DDS, PrismTech Opensplice 등의 대표적인 DDS 시스템에서는 데이터베이스를 연동하기 위한 연구를 진행하고 있다. 실시간 통신 미들웨어인 DDS와 데이터베이스의 연동은 DBMS 애플리케이션이 일반적으로 데이터베이스를 사용하는 것뿐만 아니라 DDS의 시맨틱을 알지 못하더라도 데이터 중심의 발간/구독 모델을 유기적으로 활용할 수 있는 장점을 지닌다. 본 논문에서는 이를 위해 DDS 시스템인 DB-ReTiCom의 데이터베이스를 사용하기 위한 커넥티비티를 제안하고 사용자 친화적 인터페이스를 위한 변환 방법을 제시한다.

A Study on Ontology Modeling for Weapon Parts Development Information (무기체계 부품국산화 정보의 온톨로지 구축방안 연구)

  • Jang, Woo Hyuk
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.7
    • /
    • pp.873-885
    • /
    • 2015
  • Today, It is difficult to search the various and numerous information efficiently. For this reason, Semantic Web emerged to provide searching services more easily through the structuring of a variety of unstructured format data and the definition of meaningful relationships between information. Especially, definition of relationship and meaning among resources is significant to share and infer related information. Ontology modeling plays just that role. Weapon parts development information is unstructured and dispersed all over. There are many difficulties in finding desired information, leading to getting improper outcomes. In this paper, we present an intuitive ontology model with weapon parts development information including the multi-dimensional information analysis and expansion of the relevant information. This study build up a ontology model through creating class and hierarchy about parts information and defining the properties of classes with Ontology Development 101[1] procedures using Protégé tools. The ontology model provides users with a platform on which search of needed information can be easy and efficient.

Design of 6-DOF Attitude Controller of the UAV Simulator's Hovering Model

  • Keh, Joong-Eup;Lee, Mal-Young;Kim, Byeong-Il;Chang, Yu-Shin;Lee, Man-Hyung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.969-974
    • /
    • 2004
  • For a maneuvering unmanned autonomous helicopter, it is necessary to design a proper controller of each flight mode. In this paper, overall helicopter dynamics is derived and hovering model is linearized and transformed into a state equation form. However, since it is difficult to obtain parameters of stability derivatives in the state equation directly, a linear control model is derived by time-domain parametric system identification method with real flight data of the model helicopter. Then, two different controllers - a linear feedback controller with proportional gains and a robust controller - are designed and their performance is compared. Both proposed controllers show outstanding results by computer simulation. These validated controllers can be used to autonomous flight controller of a real unmanned model helicopter.

  • PDF

Indirect Fault Detection Method for an Onboard Degaussing Coil System Exploiting Underwater Magnetic Signals

  • Jeung, Giwoo;Choi, Nak-Sun;Yang, Chang-Seob;Chung, Hyun-Ju;Kim, Dong-Hun
    • Journal of Magnetics
    • /
    • v.19 no.1
    • /
    • pp.72-77
    • /
    • 2014
  • This paper proposes an indirect fault detection method for an onboard degaussing coil system, installed to reduce the underwater magnetic field from the ferromagnetic hull. The method utilizes underwater field signals measured at specific magnetic treatment facilities instead of using time-consuming numerical field solutions in a three-dimensional space. An equivalent magnetic charge model combined with a material sensitivity formula is adopted to predict fault coil locations. The purpose of the proposed method is to yield reliable data on the location and type of a coil breakdown even without information on individual degaussing coils, such as dimension, location and number of turns. Under several fault conditions, the method is tested with a model ship equipped with 20 degaussing coils.

Simulation Modeling for RAM Analysis of a Searching System (탐지체계의 RAM 분석을 위한 시뮬레이션 모델링 연구)

  • Yun, Won-Young;Han, Young-Jin;Park, Go-Eun;Choi, Chung-Hyun;Jung, Duk-Jae
    • Journal of Korean Society for Quality Management
    • /
    • v.39 no.3
    • /
    • pp.353-364
    • /
    • 2011
  • RAM(Reliability, Availability and Maintainability) is one of the important indicators to show the performance of weapon systems. For analyzing RAM characteristics, RAM simulation is useful and powerful as mathematical techniques. However, it is necessary to build the simulation model to express about the operation environment of weapon systems, and obtain detail input data for reliability and maintainability about the system to get accurate results by RAM simulation. In this paper, we propose a procedure to analyze RAM of the searching system consisting in weapon systems by RAM simulation and we estimate searching system availability by a commercial simulation program, AvSim.

A Study on the Analysis and Improvement of Defense Technology Planning in Response to the Fourth Industrial Revolution (4차 산업혁명 대응을 위한 국방기술기획 분석 및 개선방안 연구)

  • Noh, Sang-Woo;Song, Yu Ha;Choi, Jong-Min
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.551-556
    • /
    • 2018
  • With the rise of the fourth industrial revolution, the importance of establishing R&D strategies to develop ICT technologies such as Big Data, Artificial Intelligence, Robots, the Internet of Objects, and 3D Printing is increasing. In this study, we analyzed the effects of the fourth industrial revolution on society and the present state of the national defense technology planning system, and proposed improvement measures for the utilization of the fourth industrial revolution in the defense industry from the perspective of defense R&D. The current defense R&D strategy focuses on securing the core technologies of each weapon system required by the military through research and development. Under the current system, the role of fourth industrial revolution technology will be confined to some of the weapons systems required by the military. In order to overcome this limitation, we propose a technology roadmap for the future weapons systems.