• Title/Summary/Keyword: anti-air defense

Search Result 48, Processing Time 0.03 seconds

Development of C2 Virtual Linked Simulator For Engineering and Engagement Level Battle Experimentation (공학-교전급 전투실험을 위한 C2 가상모의 연동 시뮬레이터 개발)

  • Lee, Sangtae;Lee, Seungyoung;Hwang, Kun-Chul;Kim, Saehwan;Lee, Kyuhyun
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.4
    • /
    • pp.11-19
    • /
    • 2013
  • The Korean naval weapon systems, combat experiments establish the concept of Battle operations, and create the future of the new weapons system. Doctrine development and training as well as ranging from experiments for evaluate the performance of mission operations for combat experiments are used. The battle lab is effectively support tool for the Korean Naval battle experiments. The battle lab is through a dedicated testing facility and to build efficient and effective simulation-based acquisition supporting environment. In this paper, the ship / submarines C2 operations virtual simulator was developed to support the concept of Battle operations of naval combat experiments in training and tactical development. The ship C2 operations virtual simulator makes the anti-ship and anti-aircraft the engagement scenario for performed experiments using the SADM. The submarines C2 operations virtual simulator makes the anti-submarine engagement scenario for performed experiments using EAS. EAS System was created before reuse. EAS system by modifying the additional interfaces HLA-RTI has been reused. Reflected in the tactics and training after analysis of the results through the battle experiment. Also increase training fidelity through operator involvement. The anti-ship and anti-aircraft system architecture (SADM) and anti-submarine system architecture (EAS) requires unique design of system framework since two separate architectures should be integrated into a system. An C2 virtual linked architecture was used to integrate different system architecture. A C2 virtual linked software framework, designed that have integrated protocol for battle experimental linkage and battlefield visualization environment.

A Study on the Techniques of Path Planning and Measure of Effectiveness for the SEAD Mission of an UAV (무인기의 SEAD 임무 수행을 위한 임무 경로 생성 및 효과도 산출 기법 연구)

  • Woo, Ji Won;Park, Sang Yun;Nam, Gyeong Rae;Go, Jeong Hwan;Kim, Jae Kyung
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.5
    • /
    • pp.304-311
    • /
    • 2022
  • Although the SEAD(suppression to enemy air defenses) mission is a strategically important task in modern warfare, the high risk of direct exposure to enemy air defense assets forces to use of unmanned aerial vehicles. this paper proposes a path planning algorithm for SEAD mission for an unmanned aerial vehicle and a method for calculating the mission effectiveness on the planned path. Based on the RRT-based path planning algorithm, a low-altitude ingress/egress flight path that can consider the enemy's short-range air defense threat was generated. The Dubins path-based Intercept path planning technique was used to generate a path that is the shortest path while avoiding the enemy's short-range anti-aircraft threat as much as possible. The ingress/intercept/egress paths were connected in order. In addition, mission effectiveness consisting of fuel consumption, the survival probability, the time required to perform the mission, and the target destruction probability was calculated based on the generated path. The proposed techniques were verified through a scenario.

The Role of Upper Airway Microbiome in the Development of Adult Asthma

  • Purevsuren Losol;Jun-Pyo Choi;Sae-Hoon Kim;Yoon-Seok Chang
    • IMMUNE NETWORK
    • /
    • v.21 no.3
    • /
    • pp.19.1-19.18
    • /
    • 2021
  • Clinical and molecular phenotypes of asthma are complex. The main phenotypes of adult asthma are characterized by eosinophil and/or neutrophil cell dominant airway inflammation that represent distinct clinical features. Upper and lower airways constitute a unique system and their interaction shows functional complementarity. Although human upper airway contains various indigenous commensals and opportunistic pathogenic microbiome, imbalance of this interactions lead to pathogen overgrowth and increased inflammation and airway remodeling. Competition for epithelial cell attachment, different susceptibilities to host defense molecules and antimicrobial peptides, and the production of proinflammatory cytokine and pattern recognition receptors possibly determine the pattern of this inflammation. Exposure to environmental factors, including infection, air pollution, smoking is commonly associated with asthma comorbidity, severity, exacerbation and resistance to anti-microbial and steroid treatment, and these effects may also be modulated by host and microbial genetics. Administration of probiotic, antibiotic and corticosteroid treatment for asthma may modify the composition of resident microbiota and clinical features. This review summarizes the effect of some environmental factors on the upper respiratory microbiome, the interaction between host-microbiome, and potential impact of asthma treatment on the composition of the upper airway microbiome.

Smart Anti-jamming Mobile Communication for Cloud and Edge-Aided UAV Network

  • Li, Zhiwei;Lu, Yu;Wang, Zengguang;Qiao, Wenxin;Zhao, Donghao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.12
    • /
    • pp.4682-4705
    • /
    • 2020
  • The Unmanned Aerial Vehicles (UAV) networks consisting of low-cost UAVs are very vulnerable to smart jammers that can choose their jamming policies based on the ongoing communication policies accordingly. In this article, we propose a novel cloud and edge-aided mobile communication scheme for low-cost UAV network against smart jamming. The challenge of this problem is to design a communication scheme that not only meets the requirements of defending against smart jamming attack, but also can be deployed on low-cost UAV platforms. In addition, related studies neglect the problem of decision-making algorithm failure caused by intermittent ground-to-air communication. In this scheme, we use the policy network deployed on the cloud and edge servers to generate an emergency policy tables, and regularly update the generated policy table to the UAVs to solve the decision-making problem when communications are interrupted. In the operation of this communication scheme, UAVs need to offload massive computing tasks to the cloud or the edge servers. In order to prevent these computing tasks from being offloaded to a single computing resource, we deployed a lightweight game algorithm to ensure that the three types of computing resources, namely local, edge and cloud, can maximize their effectiveness. The simulation results show that our communication scheme has only a small decrease in the SINR of UAVs network in the case of momentary communication interruption, and the SINR performance of our algorithm is higher than that of the original Q-learning algorithm.

A Study on the Response Plan through the Analysis of North Korea's Drones Terrorism at Critical National Facilities - Focusing on Improvement of Laws and Systems - (국가중요시설에 대한 북한의 드론테러 위협 분석을 통한 대응방안 연구 - 법적·제도적 개선을 중심으로 -)

  • Choong soo Ha
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.2
    • /
    • pp.395-410
    • /
    • 2023
  • Purpose: The purpose of this study was to analyze the current state of drone terrorism response at such critical national facilities and derive improvements, especially to identify problems in laws and systems to effectively utilize the anti-drone system and present directions for improvement. Method: A qualitative research method was used for this study by analyzing a variety of issues not discussed in existing research papers and policy documents through in-depth interviews with subject matter experts. In-depth interviews were conducted based on 12 semi-structured interviews by selecting 16 experts in the field of anti-drone and terrorism in Korea. The interview contents were recorded with the prior consent of the study participants, transcribed back to the Korean file, and problems and improvement measures were derived through coding. For this, the threats and types were analyzed based on the cases of drone terrorism occurring abroad and measures to establish anti-drone system were researched from the perspective of laws and systems by evaluating the possibility of drone terrorism in the Republic of Korea. Result: As a result of the study, improvements to some of the problems that need to be preceded in order to effectively respond to drone terrorism at critical national facilities in the Republic of Korea, have been identified. First, terminologies related to critical national facilities and drone terrorism should be clearly defined and reflected in the Integrated Defense Act and the Terrorism Prevention Act. Second, the current concept of protection of critical national facilities should evolve from the current ground-oriented protection to a three-dimensional protection concept that considers air threats and the Integrated Defense Act should reflect a plan to effectively install the anti-drone system that can materialize the concept. Third, a special law against flying over critical national facilities should be enacted. To this end, legislation should be enacted to expand designated facilities subject to flight restrictions while minimizing the range of no fly zone, but the law should be revised so that the two wings of "drone industry development" and "protection of critical national facilities" can develop in a balanced manner. Fourth, illegal flight response system and related systems should be improved and reestablished. For example, it is necessary to prepare a unified manual for general matters, but thorough preparation should be made by customizing it according to the characteristics of each facility, expanding professional manpower, and enhancing response training. Conclusion: The focus of this study is to present directions for policy and technology development to establish an anti-drone system that can effectively respond to drone terrorism and illegal drones at critical national facilities going forward.

Determination of Waypoints to Maximize the Survivability of UAV against Anti-air Threats (대공위협에 대한 무인기 생존성 최대화 경로점 결정기법)

  • Park, Sanghyuk;Hong, Ju-Hyeon;Ha, Hyun-Jong;Ryoo, Chang-Kyung;Shin, Wonyoung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.42 no.2
    • /
    • pp.127-133
    • /
    • 2014
  • This paper proposes a determination method of waypoints to maximize the survivability of a UAV. Voronoi diagram which is used for the initial selection of waypoint candidates is the most widely used path planning technique to avoid the threat as far as possible when the location and strength of the threat are given. But if threat strength is different each other and flight path is constrained along with straight lines, Voronoi diagram has limitations in real applications. In this study, the initial waypoints obtained from Voronoi diagram are optimized considering the shape of each threat. Here, a waypoint is optimized while adjacent waypoints are fixed. By repeating this localized optimization until whole waypoints are converged, computation time for finding the best waypoints is greatly reduced.

Military Competition and Arms Control in Space (우주상 군비경쟁과 군비통제)

  • Shin, Dong-Chun;Cho, Hong-Je
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.26 no.2
    • /
    • pp.203-237
    • /
    • 2011
  • Since USSR successfully launched its satellite "Sputnik"in 1957, many countries including US and USSR began military use of space, and engaged in arms race in space, which is against spirit and ideals of peaceful use of space as common heritage of mankind stipulated in many treaties such as Outer Space Treaty. With worsening Cold War between East and Western Bloc, this military use of space and arms race in space has been intensifying. Regarding the ideals of peaceful use of space, it is interpreted that military use of space is possible unless it does not have the purpose of aggression. The military use of space may have diverse forms such as attacking satellites in space, or attacking from satellites, making use of present and future technologies available which should include the use of nuclear and kinetic/hyper-speed weapons, laser, particle beams, near explosion, disturbance weapons in different directions (i.e., surface to space, space to space, and space to surface). Arms control is being implemented by the efforts of many countries in different formalities including legislature of international treaties under the auspices of UNCOPUOS and prohibition of weapons of mass destruction. Taking outstanding examples aiming at arms control by international community, there are confidence building measures (CBM), strengthening implementation of existing treaties, partial ban of nuclear tests, countryand regional approach, comprehensive approach and measures having legally binding force. While U.S. has surpassed other countries concerned in the area of military useof space, it withdrew from OST in early 2000s, thereby raising concern of international community. It requires concerted efforts of cooperationand implementation by international society to make sure peace of mankind and environmental conservation through arms control in space. Observing de facto possession of nuclear weapons by North Korea following series of nuclear tests and launching satellites, and efforts of launching rockets by South Korea, it is strongly needed for both countries to take part in arms control efforts by international community.

  • PDF

A Study Consequence Management System of the Terrorism (테러리즘의 대응관리체제에 관한 고찰 - "9. 11 테러"를 중심으로 -)

  • Kim, Yi-Soo;Ahn, Byung-Soo;Han, Nam-Soo
    • Korean Security Journal
    • /
    • no.7
    • /
    • pp.95-124
    • /
    • 2004
  • It can be said that 'the September 11th Terrorist Attacks' in 2001 were not only the indiscriminate attacks on innocent people but also the whole - political, economical and military - attacks on human life. Also, 'the September 11th Terrorist Attacks' can be regarded as the significant events in the history of world, which were on the peak of the super-terrorism or new-terrorism that had emerged from the 1980s. However, if one would have analysed the developments of terrorism from the 1970s, they could have been foreknown without difficulty. The finding from this study can be summarized as the followings, First, in spite that the USA responsive system against terrorism had been assessed as perfect before 'the September 11th Terrorist Attacks', the fragilities were found in the aspects of the response on the new-terrorism or super-terrorism. The previous responsive system before 'the September 11th Terrorist Attacks' had the following defects as the followings: (1) it was impossible to establish the integrated strategy, because the organizations related to the response against terrorism had not integrated; (2) there were some weakness to collect and diffuse the informations related to terrorism; (3) the security system for the domestic airline service in USA and the responsive system of air defense against terrors on aircraft were very fragile. For these reasons, USA government established the 'Department of Homeland Security' of which the President is the head so that the many organizations related to terrorism were integrated into a single management system. And, it legislated a new act to protect security from terrors, which legalized of the wiretapping in spite of the risk of encroachment upon personal rights, increased the jail terms upon terrorists, froze the bank related to terrorist organization, and could censor e-mails. Second, it seem that Korean responsive system against terrors more fragile than that of USA. One of the reasons is that people have some perception that Korea is a safe zone from terrors, because there were little attacks from international terrorists in Korea. This can be found from the fact that the legal arrangement against terrorism is only the President's instruction No. 47. Under this responsive system against terrorism dependent on only the President's instruction, it is expected that there would be a poor response against terrors due to the lack of unified and integrated responsive agency as like the case of USA before 'the September 11th Terrorist Attacks'. And, where there is no legal countermeasure, it is impossible to expect the binding force on the outside of administrative agencies and the performances to prevent and hinder the terrorist actions can not but be limited. That is to say, the current responsive system can not counteract effectively against the new-terrorism and super-terrorism. Third, although there were some changes in Korean government's policies against terrorism. there still are problems. One of the most important problems is that the new responsive system against terrorism in Korea, different from that of USA, is not a permanent agency but a meeting body that is organized by a commission. This commission is controled by the Prime Minister and the substantial tasks are under the National Intelligence Service. Under this configuration, there can be the lack of strong leadership and control. Additionally, because there is no statute to response against terrorism, it is impossible to prevent and counteract effectively against terrorism. The above summarized suggests that, because the contemporary super-terrorism or new-terrorism makes numerous casualties of unspecified persons and enormous nationwide damages, the thorough prevention against terrorism is the most important challenge, and that the full range of legal and institutional arrangements for the ex post counteraction should be established. In order to do so, it is necessary for the government to make legal and institutional arrangements such as the permanent agency for protection from terrorism in which the related departments cooperates with together and the development of efficient anti-terror programs, and to show its willingness and ability that it can counteract upon any type of domestic and foreign terrorism so that obtain the active supports and confidence from citizens.

  • PDF