• Title/Summary/Keyword: National Defense Data

Search Result 665, Processing Time 0.033 seconds

A Study on Synthetic Flight Vehicle Trajectory Data Generation Using Time-series Generative Adversarial Network and Its Application to Trajectory Prediction of Flight Vehicles (시계열 생성적 적대 신경망을 이용한 비행체 궤적 합성 데이터 생성 및 비행체 궤적 예측에서의 활용에 관한 연구)

  • Park, In Hee;Lee, Chang Jin;Jung, Chanho
    • Journal of IKEEE
    • /
    • v.25 no.4
    • /
    • pp.766-769
    • /
    • 2021
  • In order to perform tasks such as design, control, optimization, and prediction of flight vehicle trajectories based on machine learning techniques including deep learning, a certain amount of flight vehicle trajectory data is required. However, there are cases in which it is difficult to secure more than a certain amount of flight vehicle trajectory data for various reasons. In such cases, synthetic data generation could be one way to make machine learning possible. In this paper, to explore this possibility, we generated and evaluated synthetic flight vehicle trajectory data using time-series generative adversarial neural network. In addition, various ablation studies (comparative experiments) were performed to explore the possibility of using synthetic data in the aircraft trajectory prediction task. The experimental results presented in this paper are expected to be of practical help to researchers who want to conduct research on the possibility of using synthetic data in the generation of synthetic flight vehicle trajectory data and the work related to flight vehicle trajectories.

Presumption Method of Proper Labor Cost While Calculating Primary Cost of Defense Industrial Manufacturing Items (방산물자 원가계산시 적정 노무비 추정방안)

  • 한현진;추성호;서성철
    • Journal of the military operations research society of Korea
    • /
    • v.28 no.2
    • /
    • pp.85-94
    • /
    • 2002
  • Calculation of proper expenses on acquisition and purchasing defense product is matter of survival and weighing the morality for both defense industry and the national facilities. With this reason, both parties have been a big job to estimate the resonable cost. The cost are composed of many subordinated parts such as material cost, labor cost, and so on. In the compositions of that cost, the most important part in between companies and the government throughout the whole calculating process is to define the proper labor cost. When both parties calculate imported articles or overhead expenses, they can easily calculate and confirm by documented evidences or related materials. In other hand, the labor cost, which can be seen as two absolutely different numbers and opinions can be created, depends on analyzer's point of view. These interpretation and judgment of data cannot avoid analyzer's intention. In accordance with the above matters, defining the reasonable labor cost will be the top priority in order to analyze the proper expenses. This study will provide a method of proper labor cost estimation before starting the actual manufacturing to calculate the rational labor cost.

Subjectivity Study on Broadcasting of Civil Defense Exercise in Nation : Focused on Fire-fighting Officers (국가 민방위 훈련 방송에 대한 주관성 연구 : 소방공무원을 중심으로)

  • Lee, Jei-Young;Kim, Jee-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.12
    • /
    • pp.216-226
    • /
    • 2019
  • The purpose of this study was to provide basic data for developing strategic programs based on broadcasting of civil defense exercise in nation focused on fire-fighting officers. 33 Q-population (concourse) was selected based on the media related literature review described above, and interviews targeting the general public. As the next step representative statements were chosen randomly and reduced in number to a final 25 statement samples for the purposes of this study. The methodology of a Q-study does not infer the characteristics of the population sample from the sample, selecting of the P-sample is likewise not governed probabilistic sampling methods. Finally, in this research, 41 people were selected as the P-sample.

Development of a Vehicle Driving Cycle in a Military Operational Area Based on the Driving Pattern (군 운용 지역에서 차량의 주행 패턴에 따른 주행모드 개발)

  • Choi, Nak-Won;Han, Dong-Sik;Cho, Seung-Wan;Cho, Sung-Lai;Yang, Jin-Saeng;Kim, Kwang-Suk;Chang, Young-June;Jeon, Chung-Hwan
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.20 no.4
    • /
    • pp.60-67
    • /
    • 2012
  • Most of a driving cycle is used to measure fuel consumption (FC) and emissions for a specified vehicle. A driving cycle was reflected geography and traffic characteristics for each country, also, driving pattern is affected these parameters such as vehicle dynamics, FC and emissions. Therefore, this study is an attempt to develop a driving cycle for military operational area. The proposed methodology the driving cycle using micro-trips extracted from real-world data. The methodology is that the driving cycle is constructed considering important parameters to be affected FC. Therefore, this approach is expected to be a better representation of heterogeneous traffic behavior. The driving cycle for the military operational area is constructed using the proposed methodology and is compared with real-world driving data. The running time and total distance of the final cycle is 1461 s, 13.10 km. The average velocity is 32.25 km/h and average grade is 0.43%. The Fuel economy in the final cycle is 5.93 km/l, as opposed to 6.10 km/l for real-world driving. There were about 3% differences in driving pattern between the final driving cycle and real-world driving.

FSS Design System Using Genetic Algorithm and Characteristic Data Base (유전알고리즘과 특성 DB를 이용한 FSS 설계 시스템)

  • Lee Ji-Hong;Lee Fill-Youb;Seo Il-Song;Kim Geun-Hong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.4 s.346
    • /
    • pp.58-66
    • /
    • 2006
  • This paper proposes an FSS(Frequency Selective Surface) design system that automatically derives design parameters minimally specified by engineers. The proposed system derives optimal design parameters through theory of electromagnetic scattering on FSS, database implemented from real data obtained from practically manufactured FSS, and GA(Genetic Algorithm) for optimizing design parameters. The system, at the first step, searches the best matching FSS within preconstructed DB with given characteristics specified by operators, and then sets initial genes from the searched FSS parameters. GA iterates the optimization process until the system finds the FSS design parameters that matches the characteristics specified by operators. The theory for the electromagnetic scattering on FSS is verified by comparing the simulation results with real data obtained by measuring system composed of horn antenna and receiver. The process for manufacturing the FSS is also included in the paper.

A Semi-fragile Image Watermarking Scheme Exploiting BTC Quantization Data

  • Zhao, Dongning;Xie, Weixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.4
    • /
    • pp.1499-1513
    • /
    • 2014
  • This paper proposes a novel blind image watermarking scheme exploiting Block Truncation Coding (BTC). Most of existing BTC-based watermarking or data hiding methods embed information in BTC compressed images by modifying the BTC encoding stage or BTC-compressed data, resulting in watermarked images with bad quality. Other than existing BTC-based watermarking schemes, our scheme does not really perform the BTC compression on images during the embedding process but uses the parity of BTC quantization data to guide the watermark embedding and extraction processes. In our scheme, we use a binary image as the original watermark. During the embedding process, the original cover image is first partitioned into non-overlapping $4{\times}4$ blocks. Then, BTC is performed on each block to obtain its BTC quantized high mean and low mean. According to the parity of high mean and the parity of low mean, two watermark bits are embedded in each block by modifying the pixel values in the block to make sure that the parity of high mean and the parity of low mean in the modified block are equal to the two watermark bits. During the extraction process, BTC is first performed on each block to obtain its high mean and low mean. By checking the parity of high mean and the parity of low mean, we can extract the two watermark bits in each block. The experimental results show that the proposed watermarking method is fragile to most image processing operations and various kinds of attacks while preserving the invisibility very well, thus the proposed scheme can be used for image authentication.

Exploratory study on the based on big data for fire prevention of multiple shops (다중이용업소의 화재예방을 위한 빅데이터 기반의 탐색적 연구)

  • Jeon, Byungkwan;Lee, Sung-Won
    • Journal of Industrial Convergence
    • /
    • v.16 no.4
    • /
    • pp.27-32
    • /
    • 2018
  • In this research, in order to prevent the fire of multiple users who are concerned about many human life damage, based on the statistical data of the National Fire Protection Agency's National Fire Information Center and the Fire Defense Administration Fire Defense Administration, Attempts were made on the exploratory approach to measures that can reduce the topic of. In this research, using the preventive firefighting administrative statistics of the Fire and Disaster Management Agency, we analyzed by focusing on the effectiveness of multiple users' firefighting safety education. Through analysis results we could infer that fire safety education does not have effectiveness in actual fire prevention. Through previous research, we found out that the cause is insufficient for the management of fire safety education, thereby deriving an improvement plan to develop a systematic fire safety education system.

Development of Customized Trip Navigation System Using Open Government Data (공공데이터를 활용한 맞춤형 여행 네비게이션 시스템 구현)

  • Shim, Beomsoo;Lee, Hanjun;Yoo, Donghee
    • Journal of Internet Computing and Services
    • /
    • v.17 no.1
    • /
    • pp.15-21
    • /
    • 2016
  • Under the flag of creative economy, Korea government is now releasing public data in order to develop or provide a range of services. In this paper, we develop a customized trip navigation system to recommend a trip itinerary based on integration of open government data and personal tourist data. The system uses case-based reasoning (CBR) to provide a personalized trip navigation service. The main difference between existing trip information systems and ours is that our system can offers a user-oriented information service. In addition, our system supports Turn-key style contents provision to maximize convenience. Our system can be a good example of the way in which open government data can be used to design a new service.

Target Measurement Error Reduction Technique of Suboptimal Binary Integration Radar (부 최적 이진누적 적용 레이더의 표적 측정오차 감소 기법)

  • Nam, Chang-Ho;Choi, Seong-Hee;Ra, Sung-Woong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.9
    • /
    • pp.65-72
    • /
    • 2011
  • A binary integration is one of sub-optimal pulse integration which decides detection based on discriminating m successful detections out of n trials in radar systems using multiple pulse repetition frequencies. This paper introduces target measurement error reduction technique to reduce azimuth errors in suboptimal binary integration radar which applies the near value by m rather than the optimal m and verifies the performance by analyzing the experimental data measured from real radar.

Assessing the Vulnerability of Network Topologies under Large-Scale Regional Failures

  • Peng, Wei;Li, Zimu;Liu, Yujing;Su, Jinshu
    • Journal of Communications and Networks
    • /
    • v.14 no.4
    • /
    • pp.451-460
    • /
    • 2012
  • Natural disasters often lead to regional failures that can cause network nodes and links co-located in a large geographical area to fail. Novel approaches are required to assess the network vulnerability under such regional failures. In this paper, we investigate the vulnerability of networks by considering the geometric properties of regional failures and network nodes. To evaluate the criticality of node locations and determine the critical areas in a network, we propose the concept of ${\alpha}$-critical-distance with a given failure impact ratio ${\alpha}$, and we formulate two optimization problems based on the concept. By analyzing the geometric properties of the problems, we show that although finding critical nodes or links in a pure graph is a NP-complete problem, the problem of finding critical areas has polynomial time complexity. We propose two algorithms to deal with these problems and analyze their time complexities. Using real city-level Internet topology data, we conducted experiments to compute the ${\alpha}$-critical-distances for different networks. The computational results demonstrate the differences in vulnerability of different networks. The results also indicate that the critical area of a network can be estimated by limiting failure centers on the locations of network nodes. Additionally, we find that with the same impact ratio ${\alpha}$, the topologies examined have larger ${\alpha}$-critical-distances when the network performance is measured using the giant component size instead of the other two metrics. Similar results are obtained when the network performance is measured using the average two terminal reliability and the network efficiency, although computation of the former entails less time complexity than that of the latter.