• Title/Summary/Keyword: National Defense Data

Search Result 665, Processing Time 0.025 seconds

Measurement and Validation of Infrared Signature from Exhaust Plume of a Micro-Turbo Engine (마이크로 터보 엔진 배기 플룸에서의 적외선 신호 측정 및 검증)

  • Gu, Bonchan;Baek, Seung Wook;Jegal, Hyunwook;Choi, Seongman;Kim, Won Cheol
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.44 no.12
    • /
    • pp.1054-1061
    • /
    • 2016
  • Development of an accurate infrared signature (IR) measurement system is expected to contribute in the development of low observable technology and the spectroscopic analysis of electromagnetic radiation. Application of a spectroradiometer (SR) allows for the measurement of detailed infrared signature from the exhaust plume due to its own heat source. Establishment of a measurement system using a micro-turbo engine is intended to simulate the modelling of the aircraft plume. The engine was installed on a test stand to measure the engine performance. The IR signature was measured by placing the SR perpendicular to the axis line of the exhaust plume. Reference data from the blackbody were also measured to calibrate the raw data, and the infrared signature of the background was also measured for comparison with that of the plume. The calibrated spectral radiance was obtained through the data reduction process and the results were analyzed in specific bands. The experiments revealed that the measurement system established here showed sufficient performance for further comprehensive analysis.

A Study on the Improvement of Military Information Communication Network Efficiency Using CCN (CCN을 활용한 군 정보통신망 효율성 향상 방안)

  • Kim, Hui-Jung;Kwon, Tae-Wook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.5
    • /
    • pp.799-806
    • /
    • 2020
  • The rapid growth of smartphone-to-Internet of Things (IoT) connections and the explosive demand for data usage centered on mobile video are increasing day by day, and this increase in data usage creates many problems in the IP system. In a full-based environment, in which information requesters focus on information providers to receive information from specific servers, problems arise with bottlenecks and large data processing. To address this problem, CCN networking technology, a future network technology, has emerged as an alternative to CCN networking technology, which reduces bottlenecks that occur when requesting popular content through caching of intermediate nodes and increases network efficiency, and can be applied to military information and communication networks to address the problem of traffic concentration and the use of various surveillance equipment in full-based networks, such as scientific monitoring systems, and to provide more efficient content.

Implementation of High Speed Image Data Transfer using XDMA

  • Gwon, Hyeok-Jin;Choi, Doo-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.7
    • /
    • pp.1-8
    • /
    • 2020
  • In this paper, we present an implementation of high speed image data transfer using XDMA for a video signal generation / acquisition device developed as a military test equipment. The technology proposed in this study obtains efficiency by replacing the method of copying data using the system buffer in the kernel area with the transmission and reception through the DMA engine in the FPGA. For this study, the device was developed as a PXIe platform in consideration of life cycle, and performance was maximized by using a low-cost FPGA considering mass productivity. The video I/O board implemented in this paper was tested by changing the AXI interface clock frequency and link speed through the existing memory copy method. In addition, the board was constructed using the DMA engine of the FPGA, and as a result, it was confirmed that the transfer speed was increased from 5~8Hz to 140Hz. The proposed method will contribute to strengthening defense capability by reducing the cost of device development using the PXIe platform and increasing the technology level.

Velocity Estimation of Moving Targets on the Sea Surface by Azimuth Differentials of Simulated-SAR Image

  • Yang, Chang-Su;Kim, Youn-Seop;Ouchi, Kazuo
    • Korean Journal of Remote Sensing
    • /
    • v.26 no.3
    • /
    • pp.297-304
    • /
    • 2010
  • Since the change in Doppler centroid according to moving targets brings alteration to the phase in azimuth differential signals of synthetic aperture radar (SAR) data, one can measure the velocity of the moving targets using this effect. In this study, we will investigate theoretically measuring the velocity of an object from azimuth differential signals by using range compressed data which is the interim outcome of treatment from the simulated SAR raw data of moving targets on the background of sea clutter. Also, it will provide evaluation for the elements that affect the estimation error of velocity from a single SAR sensor. By making RADARSAT-1 simulated image as a specific case, the research includes comparisons for the means of velocity measurement classified by the directions of movement in the four following cases. 1. A case of a single target without currents, 2. A case of a single target with tidal currents of 0.5 m/s, 1 m/s, and 3 m/s, 3. A case of two targets on a same azimuth line moving in a same direction and velocity, 4. A case of a single target contiguous to land where radar backscatter is strong. As a result, when two moving targets exist in SAR image outside the range of approximately 256 pixels, the velocity of the object can be measured with high accuracy. However, when other moving targets exist in the range of approximately 128 pixels or when the target was contiguous to the land of strong backscatter coefficient (NRCS: normalized radar cross section), the estimated velocity was in error by 10% at the maximum. This is because in the process of assuming the target's location, an error occurs due to the differential signals affected by other scatterers.

The Infectivity of Pulmonary Tuberculosis in Korean Army Units: Evidence from Outbreak Investigations

  • Yoon, Chang-gyo;Kang, Dong Yoon;Jung, Jaehun;Oh, Soo Yon;Lee, Jin Beom;Kim, Mi-Hyun;Seo, Younsuk;Kim, Hee-Jin
    • Tuberculosis and Respiratory Diseases
    • /
    • v.82 no.4
    • /
    • pp.298-305
    • /
    • 2019
  • Background: Tuberculosis (TB) causes substantial health burden to the Korean military. This study aims to assess the impact of infectious TB cases on close and casual contacts in the Korean Army settings based on contact investigation data. Methods: Six Army units with infectious TB cases from September 2012 to May 2013 were enrolled in the study. We analyzed the clinical data from close and casual contacts screened using the tuberculin skin test (TST) and QuantiFERON-TB Gold In-Tube to identify latent tuberculosis infection (LTBI) cases. For the control group, 286 military conscripts with no reported TB exposure were tested by TST only. Results: Of the 667 contacts of index cases, LTBI cases identified were as follows: 21.8% of close contacts of smearpositive cases (71/326), 8.5% of casual contacts of smear-positive cases (26/305), and 2.8% of close contacts of smearnegative cases (1/36). In the control group, 16.8% showed positivity in TST. In a multivariate analysis, having stayed in the same room or next room with TB patients was identified as a risk factor of LTBI. Conclusion: Using the data from TB contact investigations in the Korean Army units, we found an overall LTBI rate of 14.7% among the contacts screened. This study demonstrates that contacts living in the same building, especially the same room or next room, with TB patients are at a high risk of acquiring LTBI, serving as additional evidence for defining close and casual contacts of a TB patient with regard to Army barrack settings.

Efficient Load Balancing Technique through Server Load Threshold Alert in SDN (SDN 환경에서의 서버 부하 임계치 경고를 통한 효율적인 부하분산 기법)

  • Lee, Jun-Young;Kwon, Tea-Wook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.5
    • /
    • pp.817-824
    • /
    • 2021
  • The SDN(Software Defined Networking) technology, which appeared to overcome the limitations of the existing network system, resolves the rigidity of the existing system through the separation of HW and SW in network equipment. These characteristics of SDN provide wide scalability beyond hardware-oriented network equipment, and provide flexible load balancing policies in data centers of various sizes. In the meantime, many studies have been conducted to apply the advantages of SDN to data centers and have shown their effectiveness. The method mainly used in previous studies was to periodically check the server load and perform load balancing based on this. In this method, the more the number of servers and the shorter the server load check cycle, the more traffic increases. In this paper, we propose a new load balancing technique that can eliminate unnecessary traffic and manage server resources more efficiently by reporting to the controller when a specific level of load occurs in the server to solve this limitation.

Military Application of Two-factor Authentication to Data Leakage and Access Prevention (데이터 유출 및 접근방지를 위한 이중 인증방식의 군(軍) 적용방안)

  • Jung, Ui Seob;Kim, Jee Won;Kim, Jae Hyun;Jeong, Chan ki
    • Convergence Security Journal
    • /
    • v.18 no.5_2
    • /
    • pp.21-27
    • /
    • 2018
  • Most of the Internet users in Korea are issued certificates and use them for various tasks. For this reason, it is recommended that accredited certification authorities and security related companies and use public certificates on USB memory and portable storage devices rather than on the user's desktop. Despite these efforts, the hacking of the certificate has been continuously occurring and the financial damage has been continuing. Also, for security reasons, our military has disabled USB to general military users. Therefore, this study proposes a two-factor method using the unique information of the USB memory and the PC which is owned by the user, and suggests a method of managing the private key file secure to the general user. Furthermore, it will be applied to national defense to contribute to the prevention of important data and prevention of access by unauthorized persons.

  • PDF

Feasibility study on an acceleration signal-based translational and rotational mode shape estimation approach utilizing the linear transformation matrix

  • Seung-Hun Sung;Gil-Yong Lee;In-Ho Kim
    • Smart Structures and Systems
    • /
    • v.32 no.1
    • /
    • pp.1-7
    • /
    • 2023
  • In modal analysis, the mode shape reflects the vibration characteristics of the structure, and thus it is widely performed for finite element model updating and structural health monitoring. Generally, the acceleration-based mode shape is suitable to express the characteristics of structures for the translational vibration; however, it is difficult to represent the rotational mode at boundary conditions. A tilt sensor and gyroscope capable of measuring rotational mode are used to analyze the overall behavior of the structure, but extracting its mode shape is the major challenge under the small vibration always. Herein, we conducted a feasibility study on a multi-mode shape estimating approach utilizing a single physical quantity signal. The basic concept of the proposed method is to receive multi-metric dynamic responses from two sensors and obtain mode shapes through bridge loading test with relatively large deformation. In addition, the linear transformation matrix for estimating two mode shapes is derived, and the mode shape based on the gyro sensor data is obtained by acceleration response using ambient vibration. Because the structure's behavior with respect to translational and rotational mode can be confirmed, the proposed method can obtain the total response of the structure considering boundary conditions. To verify the feasibility of the proposed method, we pre-measured dynamic data acquired from five accelerometers and five gyro sensors in a lab-scale test considering bridge structures, and obtained a linear transformation matrix for estimating the multi-mode shapes. In addition, the mode shapes for two physical quantities could be extracted by using only the acceleration data. Finally, the mode shapes estimated by the proposed method were compared with the mode shapes obtained from the two sensors. This study confirmed the applicability of the multi-mode shape estimation approach for accurate damage assessment using multi-dimensional mode shapes of bridge structures, and can be used to evaluate the behavior of structures under ambient vibration.

Research on the application of Machine Learning to threat assessment of combat systems

  • Seung-Joon Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.7
    • /
    • pp.47-55
    • /
    • 2023
  • This paper presents a method for predicting the threat index of combat systems using Gradient Boosting Regressors and Support Vector Regressors among machine learning models. Currently, combat systems are software that emphasizes safety and reliability, so the application of AI technology that is not guaranteed to be reliable is restricted by policy, and as a result, the electrified domestic combat systems are not equipped with AI technology. However, in order to respond to the policy direction of the Ministry of National Defense, which aims to electrify AI, we conducted a study to secure the basic technology required for the application of machine learning in combat systems. After collecting the data required for threat index evaluation, the study determined the prediction accuracy of the trained model by processing and refining the data, selecting the machine learning model, and selecting the optimal hyper-parameters. As a result, the model score for the test data was over 99 points, confirming the applicability of machine learning models to combat systems.

Efficient Intermediate Node mobility Management Technique in CCN Real-time Streaming Environment (CCN 실시간 스트리밍 환경에서 효율적인 중간노드 이동성 관리 기법)

  • Yoon-Young Kim;Tae-Wook Kwon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1073-1080
    • /
    • 2023
  • The development and speed improvement of the Internet network, and the development of many platforms based on it, have brought about a rapid expansion of production and consumption of various contents. However, the existing IP-based Internet system cannot efficiently cope with such an urgent increase in data. Accordingly, an alternative called the CCN(Contents Centric Network) has emerged, enabling more efficient data transmission and reception centered on content rather than host. In this paper, we will deal with the mobility of intermediate nodes in CCN real-time streaming service, which is one of the major research fields of CCN, and minimize network overload through more efficient path switching through RSSI detection. In other words, by improving the method of selecting and switching a spare path when an intermediate node located between the requester(consumer) and the provider moves, a mechanism for managing data transmission is not interrupted and unnecessary load due to route switching does not occur in the network.