• Title/Summary/Keyword: National Defense Data

Search Result 665, Processing Time 0.029 seconds

Application and Process Standardization of Terminology Dictionary for Defense Science and Technology (국방과학기술 전문용어 사전 구축을 위한 프로세스 표준화 및 활용 방안)

  • Choi, Jung-Hwoan;Choi, Suk-Doo;Kim, Lee-Kyum;Park, Young-Wook;Jeong, Jong-Hee;An, Hee-Jung;Jung, Han-Min;Kim, Pyung
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.8
    • /
    • pp.247-259
    • /
    • 2011
  • It is necessary to collect, manage and standardize defense and technology terminologies which are used by defense-related agencies in the field of national defense science and technology. The standardization of terminology dictionary can eliminate confusion about terminology and increase accessibility for the terminology by offline and online services. This study focuses on building national defense science and technology terminologies, publishing dictionary including them, and improving information analysis in defense area. as well as take advantage of offline and online services for easy accessibility for the terminology. Based on the results of this study, the terminology data will be used as follows; 1) Defence science and technology terminology databases and its publication. 2) Information analysis in military fields. 3) Multilingual information analysis translated terms in the thesauri. 4) Verification on the consistency of information processing. 5) Language resources for terminology extraction.

Health Monitoring and Efficient Data Management Method for the Robot Software Components (로봇 소프트웨어 컴포넌트의 실행 모니터링/효율적인 데이터 관리방안)

  • Kim, Jong-Young;Yoon, Hee-Byung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.17 no.11
    • /
    • pp.1074-1081
    • /
    • 2011
  • As robotics systems are becoming more complex there is the need to promote component based robot development, where systems can be constructed as the composition and integration of reusable building block. One of the most important challenges facing component based robot development is safeguarding against software component failures and malfunctions. The health monitoring of the robot software is most fundamental factors not only to manage system at runtime but also to analysis information of software component in design phase of the robot application. And also as a lot of monitoring events are occurred during the execution of the robot software components, a simple data treatment and efficient memory management method is required. In this paper, we propose an efficient events monitoring and data management method by modeling robot software component and monitoring factors based on robot software framework. The monitoring factors, such as component execution runtime exception, Input/Output data, execution time, checkpoint-rollback are deduced and the detail monitoring events are defined. Furthermore, we define event record and monitor record pool suitable for robot software components and propose a efficient data management method. To verify the effectiveness and usefulness of the proposed approach, a monitoring module and user interface has been implemented using OPRoS robot software framework. The proposed monitoring module can be used as monitoring tool to analysis the software components in robot design phase and plugged into self-healing system to monitor the system health status at runtime in robot systems.

Comparison of Three Modeling Methods for Identifying Unknown Magnetization of Ferromagnetic Thin Plate

  • Choi, Nak-Sun;Kim, Dong-Wook;Yang, Chang-Seob;Chung, Hyun-Ju;Kim, Hong-Joon;Kim, Dong-Hun
    • Journal of Electrical Engineering and Technology
    • /
    • v.6 no.6
    • /
    • pp.799-805
    • /
    • 2011
  • This study presents three different magnetization models for identifying unknown magnetization of the ferromagnetic thin plate of a ship. First, the forward problem should be solved to accurately predict outboard magnetic fields due to the magnetization distribution estimated at a certain time. To achieve this, three different modeling methods for representing remanent magnetization (i.e., magnetic charge method, magnetic dipole array method, and magnetic moment method) were utilized. Material sensitivity formulas containing the first-order gradient information of an objective function were then adopted for an efficient search of an optimum magnetization distribution on the hull. The validity of the proposed methods was tested with a scale model ship, and field signals predicted from the three different models were thoroughly investigated with reference to the experimental data.

Response of the Poleward Boundary of the Nightside Auroral Oval to Impacts of Solar Wind Dynamic Pressure Enhancement

  • Cho, Joon-Sik;Lee, Dae-Young;Kim, Kyung-Chan;Lee, Ji-Hee
    • Journal of Astronomy and Space Sciences
    • /
    • v.27 no.3
    • /
    • pp.189-194
    • /
    • 2010
  • In this paper we have investigated latitudinal variations of the poleward boundary of the nightside auroral oval when the magnetosphere is hit by an enhanced solar wind dynamic pressure front. We used precipitating particle data obtained from Defense Meteorological Satellite Program satellites to identify the locations of the boundary before and after enhanced pressure impacts. The boundary locations are represented by a parameter called "b5e". After performing the analysis for a number of events, we found that the basic effect of the solar wind pressure increase impact is often (but not always) to move the poleward boundary of the nightside auroral oval poleward. However, this effect can be often modified by other factors, such as simultaneous variations of the interplanetary magnetic field with a pressure increase, and thus the boundary response is not necessarily a poleward shift in many cases. We demonstrate this with specific examples, and discuss other possible complicating factors.

Variogram Estimation of Tropospheric Delay by Using Meteorological Data

  • Kim, Bu-Gyeom;Kim, Jong-Heon;Kee, Changdon;Kim, Donguk
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.10 no.4
    • /
    • pp.271-278
    • /
    • 2021
  • In this paper, a tropospheric delay error was calculated by using meteorological data collect from weather station and Saastamoinen model, and an empirical variogram of the tropospheric delay in the Korean peninsula was estimated. In order to estimate the empirical variogram of the tropospheric delay according to weather condition, sunny day, rainy day, and typhoon day were selected as analysis days. Analysis results show that a maximum correlation range of the empirical variogram on sunny day was about 560 km because there is overall trend of the tropospheric delay. On the other hand, the maximum correlation range of the empirical variogram on rainy was about 150 km because the regional variation was large. Although there is regional variation when the typhoon exists, there is a trend of the tropospheric delay due to a movement of the typhoon. Therefore, the maximum correlation range of the empirical variogram on typhoon day was about 280 km which is between sunny and rainy day.

Analyze Virtual Private Network Vulnerabilities and Derive Security Guidelines Based on STRIDE Threat Modeling (STRIDE 위협 모델링 기반 가상 사설망 취약점 분석 및 보안 요구사항 도출)

  • Kim, Da-hyeon;Min, Ji-young;Ahn, Jun-ho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.27-37
    • /
    • 2022
  • Virtual private network (VPN) services are used in various environments related to national security, such as defense companies and defense-related institutions where digital communication environment technologies are diversified and access to network use is increasing. However, the number of cyber attacks that target vulnerable points of the VPN has annually increased through technological advancement. Thus, this study identified security requirements by performing STRIDE threat modeling to prevent potential and new vulnerable points that can occur in the VPN. STRIDE threat modeling classifies threats into six categories to systematically identify threats. To apply the proposed security requirements, this study analyzed functions of the VPN and formed a data flow diagram in the VPN service process. Then, it collected threats that can take place in the VPN and analyzed the STRIDE threat model based on data of the collected threats. The data flow diagram in the VPN service process, which was established by this study, included 96 STRIDE threats. This study formed a threat scenario to analyze attack routes of the classified threats and derived 30 security requirements for each element of the VPN based on the formed scenario. This study has significance in that it presented a security guideline for enhancing security stability of the VPN used in facilities that require high-level security, such as the Ministry of National Defense (MND).

Study of the Static Shear Behaviors of Artificial Jointed Rock Specimens Utilizing a Compact CNS Shear Box (Compact CNS shear box를 활용한 모의 절리암석시료의 정적 전단 거동에 관한 연구)

  • Hanlim Kim;Gyeongjo Min;Gyeonggyu Kim;Youngjun Kim;Kyungjae Yun;Jusuk Yang;Sangho Bae;Sangho Cho
    • Tunnel and Underground Space
    • /
    • v.33 no.6
    • /
    • pp.574-593
    • /
    • 2023
  • In this study, the effectiveness and applicability of a newly designed Compact CNS shear box for conducting direct shear tests on jointed rock specimens were investigated. CNS joint shear tests were conducted on jointed rocks with Artificially generated roughness while varying the fracture surface roughness coefficient and initial normal stress conditions. In addition, displacement data were validated by Digital image correlation analysis, fracture patterns were observed, and comparative analysis was conducted with previously studied shear behavior prediction models. Furthermore, the accuracy of the displacement data was confirmed through DIC analysis, the fracture patterns were observed, and the shear properties obtained from the tests were compared with existing models that predict shear behavior. The findings exhibited a strong correlation with specific established empirical models for predicting shear behavior. Furthermore, the potential linkage between the characteristics of shear behavior and fracture patterns was deliberated. In conclusion, the CNS shear box was shown to be applicable and effective in providing data on the shear characteristics of the joint.

Study on a Measurement of Disclosure Risk of Microdata by Similarity

  • Cho, Hyeon-Kwan;Kwon, Dae-Hong;Lee, Suk-Hoon
    • The Korean Journal of Applied Statistics
    • /
    • v.25 no.5
    • /
    • pp.743-755
    • /
    • 2012
  • Researchers using various of statistical data want to obtain microdata for a detailed analysis. Institutes need to provide microdata after masking processes for sensitive data. Many researchers have used the proportion of unique identity for the measurement of disclosure risk. We proposed a new measurement of disclosure risk that considers the case that all identities are the same or similar. As an application example, we compare the newly proposed measurement and the existing measurement using 10667 data in 'Korea Household Income and Expenditure Survey data for 2010'.

CTD Data Processing for CREAMS Expeditions: Thermal-lag Correction of Sea-Bird CTD

  • Kim, Kuh;Cho, Yang-Ki;Ossi, Hyong;Kim, Young-Gyu
    • Journal of the korean society of oceanography
    • /
    • v.35 no.4
    • /
    • pp.192-199
    • /
    • 2000
  • Standard CTD data processing recommended by Sea-Bird Electronics produced thermal-lag corrections larger than 0.1 psu for the data taken during the CREAMS expeditions in the northern part of the East/Japan Sea where a vertical temperature gradient frequently exceeds 1.0$^{\circ}$C/m in the upper 100 m near the sea surface. As the standard processing is based upon a recursive filter which was introduced by Lueck and Pickle (1990), coefficients of the recursive filter have been newly derived for the CREAMS data by minimizing the difference between salinities of downcast and upcast in temperature-salinity domain. The new coefficients are validated by comparison with salinities measured by a salinometer, AUTOSAL 8400B. An accurate correction for the thermal-lag is critical in identifying water masses at intermediate depth in the East/japan Sea.

  • PDF

Aerodynamic Derivatives Identification Using a Non-Conservative Robust Kalman Filter

  • Lee, Han-Sung;Ra, Won-Sang;Lee, Jang-Gyu;Song, Yong-Kyu;Whang, Ick-Ho
    • Journal of Electrical Engineering and Technology
    • /
    • v.7 no.1
    • /
    • pp.132-140
    • /
    • 2012
  • A non-conservative robust Kalman filter (NCRKF) is applied to flight data to identify the aerodynamic derivatives of an unmanned autonomous vehicle (UAV). The NCRKF is formulated using UAV lateral motion data and then compared with results from the conventional Kalman filter (KF) and the recursive least square (RLS) method. A superior performance for the NCRKF is demonstrated by simulation and real flight data. The NCRKF is especially effective in large uncertainties in vehicle modeling and in measuring flight data. Thus, it is expected to be useful in missile and aircraft parameter identification.