• Title/Summary/Keyword: air defense

Search Result 592, Processing Time 0.026 seconds

Geoacoustic Model of Coastal Bottom Strata at Jeongdongjin in the Korean Continental Margin of the East Sea (동해 한국대륙주변부 정동진 연안 지층의 지음향 모델)

  • Ryang, Woo-Hun;Kim, Seong-Pil;Kim, Dae-Choul;Hahn, Jooyoung
    • Journal of the Korean earth science society
    • /
    • v.37 no.4
    • /
    • pp.200-210
    • /
    • 2016
  • Geoacoustic modeling is used to predict sound transmission through submarine bottom layers of sedimentary strata and acoustic basement. This study reconstructed four geoacoustic models for sediments of 50 m thick at the Jeongdongjin area in the western continental margin of the East Sea. Bottom models were based on the data of the highresolution air-gun seismic and subbottom profiles (SBP) with sediment cores. P-wave speed was measured by the pulse transmission technique, and the resonance frequency of piezoelectric transducers was maintained at 1MHz. Measurements of 42 P-wave speeds and 41 attenuations were fulfilled in three core sediments. For actual modeling, the P-wave speeds of the models were compensated to in situ depth below the sea floor using the Hamilton method. These geoacoustic models of coastal bottom strata will be used for geoacoustic and underwater acoustic experiments reflecting vertical and lateral variability of geoacoustic properties in the Jeongdongjin area of the East Sea.

Performance Evaluation of a Bidirectional Piezoelectric Hybrid Actuator (양방향 압전-유압 하이브리드 구동장치의 성능 시험)

  • Jin, Xiaolong;Ha, Ngocsan;Goo, Namseo;Bae, Byungwoon;Kim, Taeheun;Ko, Hanseo;Lee, Changseop
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.3
    • /
    • pp.213-219
    • /
    • 2015
  • Piezoelectric-based hydraulic actuator is a hybrid device consisting of a hydraulic pump driven by piezoelectric stacks that is coupled to a conventional hydraulic cylinder via a set of fast-acting valves. Nowadays, such hybrid actuators are being researched and developed actively in many developed countries by requirement of high performance and compact flight system. In this research, a piezoelectric hybrid actuator has been designed and tested. To achieve bi-directional capabilities in the actuator, solenoid valves were used to control the direction of output fluid. The experimental testing of the actuator in uni-directional and bi-directional modes was performed to examine performance issues related to the solenoid valves. The results showed that the bi-directional performance was slightly lower than uni-directional performance due to air bubble developed in the valve system. A new design to solve the vacuum problem has been proposed to improve the performance of the hybrid actuator.

Low Conversion Loss and High Isolation 94 GHz MHEMT Mixer Using Micro-machined Ring Coupler (마이크로 머시닝 링 커플러를 사용한 낮은 변환 손실 및 높은 격리 특성의 94 GHz MHEMT 믹서)

  • An Dan;Kim Sung-Chan;Park Jung-Dong;Lee Mun-Kyo;Lee Bok-Hyung;Park Hyun-Chang;Shin Dong-Hoong;Rhee Jin-Koo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.6 s.348
    • /
    • pp.46-52
    • /
    • 2006
  • We report on a high performance 94 GHz MMIC resistive mixer using 70-nm metamorphic high electron mobility transistor (MHEMT) and micro-machined W-band ring coupler. A novel 3-dimensional structure of resistive mixer was proposed in this work, and the ring coupler with the surface micro-machined dielectric-supported air-gap microstrip line (DAMLs) structure was used for high LO-RF isolation. The fabricated mixer showed an excellent LO-RF isolation of -29.3 dB and a low conversion loss of 8.9 dB at 94 GHz. To our knowledge, compared to previously reported W-band mixers, the proposed MHEMT-based resistive mixer using micro-machined ring coupler has shown superior LO-RF isolation as well as similar conversion loss.

The Establishment of Security Strategies for Introducing Cloud Computing

  • Yoon, Young Bae;Oh, Junseok;Lee, Bong Gyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.860-877
    • /
    • 2013
  • Cloud computing has become one of the most important technologies for reducing cost and increasing productivity by efficiently using IT resources in various companies. The cloud computing system has mainly been built for private enterprise, but public institutions, such as governments and national institutes, also plans to introduce the system in Korea. Various researches have pointed to security problems as a critical factor to impede the vitalization of cloud computing services, but they only focus on the security threats and their correspondents for addressing the problems. There are no studies that analyze major security issues with regard to introducing the cloud computing system. Accordingly, it is necessary to research the security factors in the cloud computing given to public institutions when adopting cloud computing. This research focuses on the priority of security solutions for the stepwise adoption of cloud computing services in enterprise environments. The cloud computing security area is classified into managerial, physical and technical area in the research, and then derives the detailed factors in each security area. The research derives the influence of security priorities in each area on the importance of security issues according to the identification of workers in private enterprise and public institutions. Ordered probit models are used to analyze the influences and marginal effects of awareness for security importance in each area on the scale of security priority. The results show workers in public institutions regard the technical security as the highest importance, while physical and managerial security are considered as the critical security factors in private enterprise. In addition, the results show workers in public institutions and private enterprise have remarkable differences of awareness for cloud computing security. This research compared the difference in recognition for the security priority in three areas between workers in private enterprise, which use cloud computing services, and workers in public institutions that have never used the services. It contributes to the establishment of strategies, with respect to security, by providing guidelines to enterprise or institutions that want to introduce cloud computing systems.

A Study on the Measurement of Aerodynamic Load of Aircraft Wing (항공기 날개의 공력하중 측정 기법 연구)

  • Kang, Seung-Hee;Lee, Jong-Geon;Lee, Seung-Soo;Ahn, Seung-Ki
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.30 no.4
    • /
    • pp.38-43
    • /
    • 2002
  • A study on the test, design and fabrication of wind tunnel model for measurement of air load distribution on wing surfaces is presented. 447 pressure taps are installed normal to the wing surfaces, and measured by PSI-8400 system using total 8 ESPs modules installed in the model. The test was performed at 50 m/sec constant speed in the low speed wind tunnel of Agency for Defense Development. Tests were carried out to determine effects of angle of attack, angle of sideslip and flap and stores for the load distribution of wing. The test results in this paper can be applied to the design optimization of structure and validation of computational fluid dynamics.

Determination of Waypoints to Maximize the Survivability of UAV against Anti-air Threats (대공위협에 대한 무인기 생존성 최대화 경로점 결정기법)

  • Park, Sanghyuk;Hong, Ju-Hyeon;Ha, Hyun-Jong;Ryoo, Chang-Kyung;Shin, Wonyoung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.42 no.2
    • /
    • pp.127-133
    • /
    • 2014
  • This paper proposes a determination method of waypoints to maximize the survivability of a UAV. Voronoi diagram which is used for the initial selection of waypoint candidates is the most widely used path planning technique to avoid the threat as far as possible when the location and strength of the threat are given. But if threat strength is different each other and flight path is constrained along with straight lines, Voronoi diagram has limitations in real applications. In this study, the initial waypoints obtained from Voronoi diagram are optimized considering the shape of each threat. Here, a waypoint is optimized while adjacent waypoints are fixed. By repeating this localized optimization until whole waypoints are converged, computation time for finding the best waypoints is greatly reduced.

An Efficient Public Trace and Revoke Scheme Using Augmented Broadcast Encryption Scheme (ABE 스킴을 활용한 효율적인 공모자 추적 및 제외 스킴)

  • Lee, MoonShik;Lee, Juhee;Hong, JeoungDae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.17-30
    • /
    • 2016
  • In this paper, we propose an efficient public key trace and revoke scheme. An trace and revoke scheme is a broadcast encryption scheme which has a tracing and revocation algorithm. It would maintain security of the scheme to revoke pirate keys which are colluded by malicious users. In addition, property of revocation can be applied to various circumstances because it can help cipher text delivered to certain users who are supposed to. In this paper, we would change the scheme[Augmented broadcast encryption scheme] based on the bilinear groups of the composite order into that of prime order and we can improve the size of public key, secret key, ciphertext considerably. Furthermore, we define property of revocation precisely, so we can obtain the result that the scheme with limited revocation can be expanded to have a full revocation. This paper can be easily applied to the organization such as government, military, which has a hierarchical structure.

Contextual Understanding of North Korea Nuclear Problem (북한 핵의 맥락적 이해)

  • Park, Bong-gyu
    • Korea and Global Affairs
    • /
    • v.1 no.1
    • /
    • pp.97-114
    • /
    • 2017
  • This article aims for searching the clue of North Korea nuke-problem by understanding it contextually. We must see this from the beginning as many trials in settling the problem have failed. North Korea nuke-problem is related to the change of international implication as well as the domestic process of its development. At first, it started from the regime survival, which evolved with the effect of learning. During the Cold War, its development had combined the principle of 'self-defense' because of Sino-Russia conflict. Particularly, its meaning varied dramatically due to the collapse of Cold War system plus the advent of post-Cold War system. North Korea nuclear program has became a global problem based on the deterioration of North Korea's security milieu and Bush administration's policy. Therefore, the area of common solution for NK nuke-problem must be found in the context of regime survival and the change of its meaning by continual convergence effort.

Mutual Recognition of National Military Airworthiness Authorities: A Streamlined Assessment Process

  • Purton, Leon;Kourousis, Kyriakos I.;Clothier, Reece;Massey, Kevin
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.15 no.1
    • /
    • pp.54-62
    • /
    • 2014
  • The Air and Space Interoperability Council (ASIC) has adopted the European Defence Agency (EDA) process for inter-regulatory military airworthiness authority recognition. However, there are gaps in the application of this process to nations outside of the European Union. This paper proposes a model that can effectively map diverse technical airworthiness regulatory frameworks. This model, referred to as the Product-Behaviour-Process (PBP) Bow-Tie model, provides the systematic structure needed to represent and compare regulatory frameworks. The PBP Bow-Tie model identifies key points of difference that need to be addressed, during inter-agency recognition between the two regulatory authorities. With the intention to adopt global use of the EDA process, the proposed PBP Bow-Tie model can be used as a basis for the successful recognition of regulatory frameworks outside of the European Union. Iris plots produced from the implementation of this model are presented, and proposed as a suitable means of illustrating the outcome of an assessment, and of supporting the comparisons of results. A comparative analysis of the Australian Defence Force and New Zealand Defence Force airworthiness regulatory frameworks is used as a case study. The case study clearly illustrates the effectiveness of the model in discerning regulatory framework differences; moreover, it has offered an opportunity to explore the limitations of the Iris plot.

Technology Trends of Aeronautical Radio Navigation System and Raising Plan for Relevant Domestic Businesses (국내외 항공용 전파항법시스템 기술동향 및 국내 관련 산업 육성 방안)

  • Shin, Jae Chun;Lee, Eunsung;Leem, Choon Seong
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.6
    • /
    • pp.561-571
    • /
    • 2017
  • Radio navigation systems are already used as important national infrastructures in various fields such as air traffic, land transportation, geodetic survey, broadcasting communication and national defense, and are used in various industries. Since these systems are fusion of various technologies, it takes much time and cost in the development stage. In the early stages of development of the system, developed countries are establishing a national mid-term plan that meets international compatibility and standards. Korea did not develop the system due to the lack of national mid- and long-term plan, and it is not contributing effectively to industries. This paper analyzes the technical principles and technology trend of radio navigation system in the aviation sector to establish mid - and long - term plan. Based on the analyzed technology trends, the future prospect of technological development of the domestic navigation system and the development of related industries will be presented.