• Title/Summary/Keyword: Weapon Computer

Search Result 97, Processing Time 0.022 seconds

A Study on the Analysis Method of the Operations Effectiveness of the Joint Coastal Guard System Against Small Targets (소형표적에 대한 합동 해안경계시스템 작전효과 분석방법 연구)

  • Kim, Taeho;Han, Hyun Jin;Lee, Byeong-Ho;Shin, Young-Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.2
    • /
    • pp.59-66
    • /
    • 2022
  • The Joint Coastal Guard System is composed of a maritime surveillance system and a anti-coastal infiltration system, and is a system in which the Navy is mainly responsible for the maritime and the Army is responsible for the coast. We analyzed the operations effectiveness of the joint coastal guard system, in which various weapon systems of the army and navy are operated in a complex way, to the extent to which successful operation is possible against small targets. The operations effectiveness analysis was conducted by defining the operations effectiveness by operation type, configuring the simulation environment using METT-T elements, establishing the assumptions of the simulation scenario, conducting the simulation and analyzing the simulation results by weather condition. The simulation tools used were NORAM and EADSIM. As a result of the operations effectiveness analysis, the joint coastal guard system currently in operation showed a significant difference in operational success depending on the size of the target and weather conditions. This research can be used as useful data for establishing an effective joint coastal guard system and conducting systematic guard operations.

The Study on the improvement plan for Military combat power by the future computer (미래형컴퓨터를 이용한 군전투력 발전방안 연구)

  • Heo, Yeong Dae
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.57-66
    • /
    • 2013
  • Predicting pattern of future combat ensures a successful war. It is possible to anticipate the shape of the future combat from the fighting method of US Army in the Iraq War. The fighting method: a series of combat progress by real time information to pinpoint strike using a guided weapon by GPS, an intelligence satellite and unmanned surveillance vehicle (USV), shows that real time unification combat power is key element for decide outcome of a war. The NCW is an organically connected network centric warfare paradigm by networking a factor of operation. In this paper, studied on the improvement plan for combat power by the future computer like a portable computer, an audio-recognized computer and non-keyboard computer. In addition, this paper attempts to establish a comprehensive intelligence network of Korea Marine Corps and to apply to combat or training.

A study on Real-time Graphic User Interface for Hidden Target Segmentation (은닉표적의 분할을 위한 실시간 Graphic User Interface 구현에 관한 연구)

  • Yeom, Seokwon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.17 no.2
    • /
    • pp.67-70
    • /
    • 2016
  • This paper discusses a graphic user interface(GUI) for the concealed target segmentation. The human subject hiding a metal gun is captured by the passive millimeter wave(MMW) imaging system. The imaging system operates on the regime of 8 mm wavelength. The MMW image is analyzed by the multi-level segmentation to segment and identify a concealed weapon under clothing. The histogram of the passive MMW image is modeled with the Gaussian mixture distribution. LBG vector quantization(VQ) and expectation and maximization(EM) algorithms are sequentially applied to segment the body and the object area. In the experiment, the GUI is implemented by the MFC(Microsoft Foundation Class) and the OpenCV(Computer Vision) libraries and tested in real-time showing the efficiency of the system.

A Study on the Effectiveness of Mobile Advertising: Based on Technology Acceptance Model (모바일 광고(Mobile Advertising)의 효과성에 관한 연구: 기술수용모형을 중심으로)

  • Yoon, Jongsoo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.12
    • /
    • pp.139-147
    • /
    • 2013
  • As the use of wired and mobile Internet is on the increase, organizational activities for customers as well as individual life style are changing rapidly from the past. Specifically, mobile advertising in organizations thanks to remarkable growth in smartphone users, continuous development of mobile Internet technologies, and enhancement of information delivery capability regardless of time and place, has become a competitive weapon for presenting new products and services, promoting marketing programs, and communicating with customers. The study is to investigate what characteristics of mobile advertising are affecting the acceptance toward mobile advertising, and to analyse if the country type of mobile Internet users has a moderating effect on the relationship between these characteristics of mobile advertising and user acceptance.

Implementation for Real-Time of MIL-STD-1553B Communication in Inspection Equipment Based on Windows with RTiK and DPC Control (RTiK과 DPC 제어를 통한 윈도우즈 기반의 검사장비에서 MIL-STD-1553B 통신의 실시간 구현)

  • Kim, Jong-Jin;Lee, Sang-Gil;Lee, Cheol-Hoon
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.2
    • /
    • pp.199-207
    • /
    • 2021
  • It is very important to support real-time on the inspection equipment based on Windows. In particular, in the system using MIL-STD-1553B communication, which is widely used in military weapon systems, real-time is required for inspection equipment that uses mostly platforms based on Windows such as Industrial PCs. However, in order to use a complete real-time operating system such as VxWorks, the purchase cost is expensive and the implementation is complicated on the system, so it is not suitable for inspection equipment that requires simple functions to just check go or no-go. Therefore, in this paper, a Real-Time implanted Kernel(RTiK) in the Windows kernel is implanted in order to improve these defects, and real-time performance is implemented for periodically MIL-STD-1553B communication by Deferred Procedure Call(DPC) of Windows. Also, it was verified that the period of up to 2ms was guaranteed with a RDTSC into the EDX:EAX registers for measuring the periodicity.

Cyber threats: taxonomy, impact, policies, and way forward

  • Malik, Annas W.;Abid, Adnan;Farooq, Shoaib;Abid, Irfan;Nawaz, Naeem A.;Ishaq, Kashif
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.7
    • /
    • pp.2425-2458
    • /
    • 2022
  • The continuous evolution and proliferation of computer technology and our increasing dependence on computer technology have created a new class of threats: "cyber threats." These threats can be defined as activities that can undermine a society's ability to maintain internal or external order while using information technology. Cyber threats can be mainly divided into two categories, namely cyber-terrorism and cyber-warfare. A variety of malware programs are often used as a primary weapon in these cyber threats. A significant amount of research work has been published covering different aspects of cyber threats, their countermeasures, and the policy-making for cyber laws. This article aims to review the research conducted in various important aspects of cyber threats and provides synthesized information regarding the fundamentals of cyber threats; discusses the countermeasures for such threats; provides relevant details of high-profile cyber-attacks; discusses the developments in global policy-making for cyber laws, and lastly presents promising future directions in this area.

Characteristic Analysis and Development Direction for Defense UAVs

  • Seong-Hoon, Lee;Dong-Woo, Lee
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.171-176
    • /
    • 2023
  • What we have in common worldwide today is economic difficulties due to high inflation and uncertainty in the financial industry. The root cause of this is the war between Russia and Ukraine. The war between Russia and Ukraine is not simply a war between two countries. The United States and the European Union are providing military aid such as missiles to Ukraine, and Russia is attacking Ukraine by introducing UAVs (unmanned aerial vehicles) from Iran. A prominent weapon in this Russia-Ukraine war is the UAVs used in Russia. It is predicted that the form of war using UAVs will gradually expand in the future based on stealth. In addition, UAVs will continue to be used due to the fact that they can cause serious damage to the other country without harming their own lives, and because they have good cost-effectiveness. In this study, UAVs based on autonomous driving were studied. The target countries of the study include the United States, the European Union, China, and Iran, and the UAVs used in these countries have characteristics that can represent the world. In this study, the main specifications of major UAVs in use in major countries were investigated. In addition, the future technology and development direction were described through specifications and characteristics of UAVs currently in operation in major countries.

Ensuring Information Security in the System of Public Management of Sustainable Development of the Region: EU Experience

  • Zahorskyi, Volodymyr;Bobrovskyi, Oleksii;Bondarenko, Dmytro;Karpa, Marta;Akimov, Oleksandr;Akimova, Liudmyla
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.163-168
    • /
    • 2022
  • The main purpose of the study is to analyze the features of ensuring information security in the system of public administration of the constant development of the region. The actualization of the research topic is because the information has become a powerful means of manipulating the public and individual consciousness, as well as a real weapon used in new types of conflicts, confrontations, and confrontations. Creating opportunities for everyone to access information sources, developing the ability to use it, and at the same time protecting people from dirty information flows create a kind of subject-research field, one of the most relevant aspects of which is the problem of forming and implementing information security policy at the state, public and civil levels. The research methodology involved the use of theoretical and scientific methods. As a result of the study, the key features of ensuring information security in the system of public management of the continuous development of the region of the EU countries were identified.

Clustering Technique for Multivariate Data Analysis

  • Lee, Jin-Ki
    • Journal of the military operations research society of Korea
    • /
    • v.6 no.2
    • /
    • pp.89-127
    • /
    • 1980
  • The multivariate analysis techniques of cluster analysis are examined in this article. The theory and applications of the techniques and computer software concerning these techniques are discussed and sample jobs are included. A hierarchical cluster analysis algorithm, available in the IMSL software package, is applied to a set of data extracted from a group of subjects for the purpose of partitioning a collection of 26 attributes of a weapon system into six clusters of superattributes. A nonhierarchical clustering procedure were applied to a collection of data of tanks considering of twenty-four observations of ten attributes of tanks. The cluster analysis shows that the tanks cluster somewhat naturally by nationality. The principal componant analysis and the discriminant analysis show that tank weight is the single most important discriminator among nationality although they are not shown in this article because of the space restriction. This is a part of thesis for master's degree in operations research.

  • PDF

A Study on the Critical Defense Information Resources Mobilization for Information Warfare (정보전 대비 국방부문 핵심정보자원 동원 방안에 관한 연구)

  • 이승구;김화수
    • Journal of the military operations research society of Korea
    • /
    • v.26 no.2
    • /
    • pp.131-142
    • /
    • 2000
  • The emergence of computer-based information society has fundamentally changed the paradigms of everyday human life and will continue its trend in the 21st century when resources of information technology become more and more important because they can be directly transformed into military use. Future warfare will include such high-tech weapon systems as precision-guided munitions and satellite. But, with the spread of internet and advances in information technology, cyber space appears to be resources can be deciding factor in winning future war. In this paper we proposed to identify core information technology in national defense, improve mobilizing method of information resources in time of crisis, come up with combat effective measures utilizing information technology by estimating future information technological developments.

  • PDF