• Title/Summary/Keyword: National Defense Data

Search Result 665, Processing Time 0.029 seconds

Development of Ultrasonic Wave Propagation Imaging System

  • Chia, Chen-Ciang;Lee, Jung-Ryul;Kim, Jong-Heon
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.29 no.4
    • /
    • pp.283-292
    • /
    • 2009
  • Laser-based ultrasonic sensing requires the probe with fixed fecal length, but this requirement is not essential in laser-based ultrasonic generation. Based on this fact, we designed a pulsed laser-based ultrasonic wave propagation imaging (UWPI) system with a tilting mirror system for rapid scanning of target, and an in-line band-pass filtering capable of ultrasoaic mode selection. 1D-temporal averaging, 2D-spatial averaging, and 3D-data structure building algorithms were developed far clearer results allowing fur higher damage detectability. The imaging results on a flat stainless steel plate were presented in movie and snapshot formats which showed the propagation of ultrasound visible as a concentric wavefield emerging from the location of an ultrasonic sensor. A hole in the plate with a diameter of 1 mm was indicated by the scattering wavefields. The results showed that this robust UWPI system is independent of focal length and reference data requirements.

Mitigating Cache Pollution Attack in Information Centric Mobile Internet

  • Chen, Jia;Yue, Liang;Chen, Jing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5673-5691
    • /
    • 2019
  • Information centric mobile network can significantly improve the data retrieving efficiency by caching contents at mobile edge. However, the cache pollution attack can affect the data obtaining process severely by requiring unpopular contents deliberately. To tackle the problem, we design an algorithm of mitigating cache pollution attacks in information centric mobile network. Particularly, the content popularity distribution statistic is proposed to detect abnormal behavior. Then a probabilistic caching strategy based on abnormal behavior is applied to dynamically maintain the steady-state distribution for content visiting probability and achieve the purpose of defense. The experimental results show that the proposed scheme can achieve higher request hit ratio and smaller latency for false locality content pollution attack than the CacheShield approach and the baseline approach where no mitigation approach is applied.

Towed underwater PIV measurement for free-surface effects on turbulent wake of a surface-piercing body

  • Seol, Dong Myung;Seo, Jeong Hwa;Rhee, Shin Hyung
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.5 no.3
    • /
    • pp.404-413
    • /
    • 2013
  • In the present study, a towed underwater particle image velocimetry (PIV) system was validated in uniform flow and used to investigate the free-surface effects on the turbulent wake of a simple surface-piercing body. The selected test model was a cylindrical geometry formed by extruding the Wigley hull's waterplane shape in the vertical direction. Due to the constraints of the two-dimensional (2D) PIV system used for the present study, the velocity field measurements were done separately for the vertical and horizontal planes. Using the measured data at several different locations, it was possible to identify the free-surface effects on the turbulent wake in terms of the mean velocity components and turbulence quantities. In order to provide an accuracy level of the data, uncertainty assessment was done following the International Towing Tank Conference standard procedure.

A Method of Interoperating Heterogeneous Simulation Middleware for L-V-C Combined Environment (L-V-C 통합 환경 실현을 위한 이기종 시뮬레이션 미들웨어 연동 방안)

  • Cho, Kunryun;No, Giseop;Jung, Sihyun;Keerativoranan, Nopphon;Kim, Chongkwon
    • Journal of KIISE
    • /
    • v.42 no.2
    • /
    • pp.213-219
    • /
    • 2015
  • Simulation is used these days to verify the hypothesis or the new technology. In particular, National Defense Modeling & Simulation (M&S) is used to predict wartime situation and conduct the military training. National Defense M&S can be divided into three parts, live simulation, virtual simulation, and constructive simulation. Live simulation is based on the real environment, which allows more realistic sumulation; however, it has decreased budget efficiency, but reduced depictions of reality. In contrast, virtual and constructive simulations which are based on the virtual environment, have increased budget efficiency, but reduced depictions of reality. Thus, if the three parts of the M&S are combined to make the L-V-C combined environment, the disadvantages of each simulation can be complemented to increases the quality of the simulation. In this paper, a method of interworking heterogeneous simulation middeware for L-V-C combined environment is proposed, and the test results of interworking between Data Distribution Service (DDS) and High Level Architecture (HLA) are shown.

The development of buoy type fish finder using LTE communication (LTE 통신을 이용한 부표형 어군탐지기 개발)

  • KANG, Tae-Jong;MIN, Eun-Bi;HEO, Gyeom;SHIN, Hyeon-Ok;HWANG, Doo-Jin
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.58 no.2
    • /
    • pp.141-152
    • /
    • 2022
  • As a method to understand the ecological habits around the artificial reef, various reports such as fishing gear survey, diving, sound survey, underwater CCTV and camera, etc. are reported. Among them, the sound survey method is carried out by installing an acoustic system on the ship and can be investigated regardless of the marine environment such as time constraints and turbidity. Such method, however, takes a lot of manpower and time as the ship travels at a constant speed. Investigations around artificial reefs are being conducted in an artificial way, and a lot of time and labor are consumed as such. Maritime buoys have been operated for various purposes such as route signs, weather observation, marine environment monitoring and defense monitoring for navigation safety in the past, but studies on monitoring systems for ecological habits and distribution of fish using marine buoys are remarkably insufficient. Therefore, this study aims to develop a system that allows users to directly monitor fish group detector data by estimating the distribution of fish groups around artificial reefs and using wireless communication at sea. In order to confirm the suitability of the maritime buoy used in this study, it was operated to compare data using LTE-equipped buoys capable of wireless communication and a data logger-type system buoy. Data transmission of buoys capable of LTE communication was carried out in a 10-minute ON, 10-minute OFF method due to the limitation of the power supply capacity, and data of the data logger-type buoy received full data. We compared and analyzed the data received from the two fish detectors. It is expected that real-time monitoring of the wireless buoy detection device using LTE will be possible through future research.

Optimum Elevation Angle Control of the Receiving Antenna for the Long Distance Air-Ground Common Data Link (장거리 공중-지상 영상정보용 데이터링크의 수신 안테나 최적 고각 제어 방법)

  • Ryu, Young-jae;Ahn, Jae-Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.11
    • /
    • pp.1528-1538
    • /
    • 2016
  • Common data link systems are designed to transmit the imaginary and signal intelligence data at long distance air-ground line of sight(LOS) link. In this paper, we analyze the received power variation according to the communication distance of the common data link using curved earth 2-Ray model suitable for received signal power analysis of long distance air-ground wireless channel. We propose optimal elevation angle control method of the receiving antenna to reduce a power variation caused by ground-reflected wave. Proposed method can get additional link margin compared to the conventional method without any additional hardware performance enhancement.

An Analysis of Haeseong Guided Missile Launcher Reliability Using Naval Field Data (야전운용자료를 활용한 해성 유도무기 발사체계 신뢰도 분석)

  • Hur, Jangwan;Oh, Kyungwon
    • Journal of Aerospace System Engineering
    • /
    • v.11 no.3
    • /
    • pp.39-46
    • /
    • 2017
  • Required military demands for high reliability of weapons systems throughout stages of life cycles as high technologies combined with weapons systems, research and development continue to drive costs upwards. However, for studies on reliability of national defense weapons systems, empirical research is limited because of a lack of interest or limitations relative to data collection. This study proposes a collection process relative to field operating specifications, based on data relative to experience and management collected by visiting vessels onsite, that operate weapons systems. In addition, after drawing the operating MTBF of the launching system for the Haeseong guided missile launcher, this study compared and analyzed that with values predicted during development and identifies parts with low operating values as compared to predicted values. Results of this study relative to maintenance support troops and weapon systems development companies will contribute to maintaining operational deployment of the launching system of the Haeseong guided weapons system.

A Study on the Establishment of Comparison System between the Statement of Military Reports and Related Laws (군(軍) 보고서 등장 문장과 관련 법령 간 비교 시스템 구축 방안 연구)

  • Jung, Jiin;Kim, Mintae;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.109-125
    • /
    • 2020
  • The Ministry of National Defense is pushing for the Defense Acquisition Program to build strong defense capabilities, and it spends more than 10 trillion won annually on defense improvement. As the Defense Acquisition Program is directly related to the security of the nation as well as the lives and property of the people, it must be carried out very transparently and efficiently by experts. However, the excessive diversification of laws and regulations related to the Defense Acquisition Program has made it challenging for many working-level officials to carry out the Defense Acquisition Program smoothly. It is even known that many people realize that there are related regulations that they were unaware of until they push ahead with their work. In addition, the statutory statements related to the Defense Acquisition Program have the tendency to cause serious issues even if only a single expression is wrong within the sentence. Despite this, efforts to establish a sentence comparison system to correct this issue in real time have been minimal. Therefore, this paper tries to propose a "Comparison System between the Statement of Military Reports and Related Laws" implementation plan that uses the Siamese Network-based artificial neural network, a model in the field of natural language processing (NLP), to observe the similarity between sentences that are likely to appear in the Defense Acquisition Program related documents and those from related statutory provisions to determine and classify the risk of illegality and to make users aware of the consequences. Various artificial neural network models (Bi-LSTM, Self-Attention, D_Bi-LSTM) were studied using 3,442 pairs of "Original Sentence"(described in actual statutes) and "Edited Sentence"(edited sentences derived from "Original Sentence"). Among many Defense Acquisition Program related statutes, DEFENSE ACQUISITION PROGRAM ACT, ENFORCEMENT RULE OF THE DEFENSE ACQUISITION PROGRAM ACT, and ENFORCEMENT DECREE OF THE DEFENSE ACQUISITION PROGRAM ACT were selected. Furthermore, "Original Sentence" has the 83 provisions that actually appear in the Act. "Original Sentence" has the main 83 clauses most accessible to working-level officials in their work. "Edited Sentence" is comprised of 30 to 50 similar sentences that are likely to appear modified in the county report for each clause("Original Sentence"). During the creation of the edited sentences, the original sentences were modified using 12 certain rules, and these sentences were produced in proportion to the number of such rules, as it was the case for the original sentences. After conducting 1 : 1 sentence similarity performance evaluation experiments, it was possible to classify each "Edited Sentence" as legal or illegal with considerable accuracy. In addition, the "Edited Sentence" dataset used to train the neural network models contains a variety of actual statutory statements("Original Sentence"), which are characterized by the 12 rules. On the other hand, the models are not able to effectively classify other sentences, which appear in actual military reports, when only the "Original Sentence" and "Edited Sentence" dataset have been fed to them. The dataset is not ample enough for the model to recognize other incoming new sentences. Hence, the performance of the model was reassessed by writing an additional 120 new sentences that have better resemblance to those in the actual military report and still have association with the original sentences. Thereafter, we were able to check that the models' performances surpassed a certain level even when they were trained merely with "Original Sentence" and "Edited Sentence" data. If sufficient model learning is achieved through the improvement and expansion of the full set of learning data with the addition of the actual report appearance sentences, the models will be able to better classify other sentences coming from military reports as legal or illegal. Based on the experimental results, this study confirms the possibility and value of building "Real-Time Automated Comparison System Between Military Documents and Related Laws". The research conducted in this experiment can verify which specific clause, of several that appear in related law clause is most similar to the sentence that appears in the Defense Acquisition Program-related military reports. This helps determine whether the contents in the military report sentences are at the risk of illegality when they are compared with those in the law clauses.

Molecular cloning of cDNAs encoding antioxidant enzymes in Korean rock bream (Oplegnathus fasciatus)

  • Park, Byul-Nim;Park, Ji-Eun;Kim, Ki-Hong;Kim, Sung-Koo;Nam, Yoon-Kwon
    • Proceedings of the Korean Aquaculture Society Conference
    • /
    • 2003.10a
    • /
    • pp.39-39
    • /
    • 2003
  • Antioxidant enzyme genes play a key role in cell defense against the lethal effects of oxidative stresses in animals and have an essential function which has allowed the evolution of aerobic respiration starting from an ancient form of oxygen-insensitive life. Piscine antioxidant enzymes are also involved in the rapid response to various toxic chemicals as well as many biological stresses, indicating that they could be used as biomarkers for health and aquatic environment. With the purpose for developing fine molecular probing tool to assess the stresses in marine fish, we identified three major antioxidant enzyme genes (superoxide dismutase, catalase and glutathione-S-transferase) from Korean rock bream using expressed sequence tag analysis and/or high density filter screening. Here we report the molecular information on these gene transcripts including complete sequence data and expression profiles.

  • PDF

Modeling of Effective Path-Length in Satellite Link Based on Rain Cell Statistics (위성 링크에 대한 강우셀 기반 실효 경로 길이 모델링 연구)

  • Kang, Woo-Geun;Kim, Myunghoi;Kim, In-Kyum;Choi, Kyung-Soo;Lee, Byoung-Sun;Pack, Jeong-Ki
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.25 no.3
    • /
    • pp.348-356
    • /
    • 2014
  • The existing effective path-length model of ITU-R has some drawbacks: The prediction error is quite large compared to domestic measurement data and it is an empirical model in which the physical characteristics of rain cells are not considered. In this paper, a theoretical model for effective path-length using the rain-cell concept was proposed and its validity was verified using the measurement data. To analyze the statistical characteristics of rain cell parameters, the weather-radar data(CAPPI) measured by Korea Meterological Administration were analyzed and the correction factor was properly introduced to fit the Chollian beacon measurement data of ETRI(Electronics and Telecommunications Research Institute). To verify the proposed effective path-length model, it was compared with the Mugunghwa No. 5 beacon data measured in Chungnam National University with the support of ADD(Agency for Defense Development). It was confirmed that the prediction results of the proposed model are in good agreement with the measurement data.