• Title/Summary/Keyword: base defense

Search Result 207, Processing Time 0.027 seconds

A Study on the Evaluation of Mechanical Characteristics for Tailor Welded Blank Panel (TWB 판넬의 기계적특성 평가에 관한 연구)

  • Chun, Chang-Hwan;Han, Chang-Suk
    • Journal of the Korean Society for Heat Treatment
    • /
    • v.23 no.4
    • /
    • pp.183-190
    • /
    • 2010
  • There are many methods to reduce the weight and the cost of the automobile body, among them, Tailor Welded Blank (TWB) is new welding method applied to body structure. It is necessary to evaluate mechanical properties of TWB structures or sheets for the application to automobile body parts. In this study, the stiffness of T-type and L-type joint structures, composite of TWB panel, which simplified two portions of side structure in automobile body were investigated. Additionally, the fatigue properties of TWB panels were obtained. Two types of welding technologies, laser and mash seam welding, were used to join mild panels with different thickness. This results are compared with conventional structures. The results are as follows: 1) The stiffness of joint structures, composite of TWB panel, is approximately 17% higher than that of conventional ones. 2) The location of welding line in TWB had a effect on the in plane bending stiffness, but not on the out of plane bending stiffness. 3) In terms of welding technology type, the mash seam welding show higher stiffness than the laser welding for in plane bending stiffness. But minimal differences in both types are revealed for out of plane bending stiffness. 4) The fatigue strength, composite of TWB panel, is lower than that of base steel. It is thought that defects in the welding zone had the action of notch in the fatigue test.

Automatic Recognition Algorithm of Unknown Ships on Radar (레이더 상 불특정 선박의 자동식별 알고리즘)

  • Jung, Hyun Chul;Yoon, Soung Woong;Lee, Sang Hoon
    • Journal of KIISE
    • /
    • v.43 no.8
    • /
    • pp.848-856
    • /
    • 2016
  • Seeking and recognizing maritime targets are very important tasks for maritime safety. While searching for maritime targets using radar is possible, recognition is conducted without automatic identification system, radio communicator or visibility. If this recognition is not feasible, radar operator must tediously recognize maritime targets using movement features on radar base on know-how and experience. In this paper, to support the radar operator's mission of continuous observation, we propose an algorithm for automatic recognition of an unknown ship using movement features on radar and a method of detecting potential ship related accidents. We extract features from contact range, course and speed of four types of vessels and evaluate the recognition accuracy using SVM and suggest a method of detecting potential ship related accidents through the algorithm. Experimentally, the resulting recognition accuracy is found to be more than 90% and presents the possibility of detecting potential ship related accidents through the algorithm using information of MV Sewol. This method is an effective way to support operator's know-how and experience in various circumstances and assist in detecting potential ship related accidents.

Analysis of the Operation of China Air Defense Identification Zone (CADIZ) corresponding to the PRC's maritime strategy and the ROK's response measures (중국의 해양전략과 연계한 중국방공식별구역(CADIZ) 운영 분석과 우리의 대응방안)

  • Kim, Dongsoo;Chong, Mangseok;Hong, Sungpyo
    • Journal of Aerospace System Engineering
    • /
    • v.11 no.2
    • /
    • pp.35-42
    • /
    • 2017
  • This paper analyzes the intention of the PRC (People's Republic of China) to establish and operate CADIZ to implement the government's maritime policy and strategy and to project its air power in preparation for maritime provocation and contingency, especially over the area where East Asia countries have claimed to have maritime jurisdiction over one another. This paper is also intended to guide the Republic of Korea's response measures for coping with the maritime intention and threat of China by such measures as reinforcing military power, constructing the strategic air base in Jeju, and expanding the present KADIZ.

Automatic Design of FSS with Arbitrary Pattern (임의의 패턴을 갖는 FSS의 자동 설계)

  • Shim, Hyung-Won;Lee, Ji-Hong;Seo, Il-Song;Kim, Geun-Hong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.2
    • /
    • pp.127-136
    • /
    • 2008
  • This paper proposes the efficient system for automatic design of FSS(Frequency Selective Surface) with periodic pattern and frequency characteristics specified by operator. The proposed system derives optimal design parameters through tool for analysis of FSS with arbitrary pattern, DB(Data Base) implemented from limited simulation and measurement data of FSS, and GA(Genetic Algorithm) for optimizing design parameters. FSS analysis tool consists of two analysis tools. One is the simulator for analysis of monolayer FSS that using moment method, another is the tool with approximated analysis method of FSS with dielectric layer. Given pattern configuration and characteristics specified by operators, the DB system searches the best matching FSS, and provides initial genes to GA from the searched parameters, which drastically reduces running time of GA for finding the FSS design parameters. In this paper, the proposed design system is verified through simulation and measurement about FSS with various patterns.

Performance Evaluation and Analysis of a VHF-UHF Blade Antenna (VHF-UHF 대역 블레이드 안테나의 성능 평가 및 분석)

  • Go, Jooseoc;Byun, Gangil;Kim, Kichul;Ju, Jeungmin;Choo, Hosung
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.10
    • /
    • pp.951-957
    • /
    • 2013
  • In this paper, we propose a performance evaluation process of aircraft blade antennas. The process consists of various sub-processes that should be considered for a stable communication link with the base station. The process begins with the settlement of the ground shape and size to evaluate the impedance matching characteristics of a stand-alone antenna. Next, the main communications area of the antenna is determined by considering a flight scenario, and then the minimum gain requirements of the antenna are derived in the operating frequency band. Finally, the proposed evaluation process is applied for a commercial aircraft blade antenna. The results demonstrate that the proposed process is suitable to be adopted for the evaluation of aircraft blade antennas.

A Study on the DB establishment and traceable management of the Urban transit standardization project (도시철도 표준화사업의 데이터베이스 구축 및 추적성 관리에 관한 연구)

  • Lee, Woo-Dong;Chung, Jong-Duck
    • Journal of the Korean Society for Railway
    • /
    • v.14 no.6
    • /
    • pp.501-506
    • /
    • 2011
  • The study and techniques of system engineering have been applied to various fields including space-air, national defense division in advanced countries. Korea is currently in the early stages of introducing system engineering scheme in railway system and national defense division restrictedly. As theory and application of system engineering covers a wide scope, documents management and requirement analysis technology applied to establishment of standard and core unit development of the research target. The techniques which are historical management and trace among standards for establishment of standard are introduced using SE tools and participating agencies shared the information by constructing of database from all documents which are generated from the project. Through the functional analysis of the requirements for the intelligent station monitoring system in basic design stage, established requirements are verified and will be made official announcement as standard of the intelligent station monitoring system.

Research of a Development Plan on the Integrated Weapon System Database based on Integrated Operation and Management System for the Aircraft Development Management (항공기 체계운영관리시스템 기반의 통합무기체계데이터베이스 발전 방안 연구)

  • Chung, Joon-Young;Kim, Cheon-Youn;Kim, Jong-Jin;Lee, Sang-Bum
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.269-276
    • /
    • 2007
  • National defense research and development is trying to develop the weapon system to satisfy users' requirements at minimum cost, high quality and the shortest period. Under integrated database computer environments, development processes and tools have been developed to implement system engineering and concurrent engineering systematically. In the aerospace defense weapon system, the fixed wing development department has developed and operated the integrated operation and management information system based on web technology to manage efficiently the technical information generated by the R&D process. When this system was applied to the existing R&D project for the aircraft weapon system, it proved and verified its efficiency. In this paper, we describe the future development plan of an integrated R&D framework and an integrated weapon system database based on the integrated operation and management information system which are able to centrol the technical information of KF-X, UAV(Unmanned Aerial Vehicles) and UCAV(Unmanned Combat Aerial Vehicles) programs. We also describe an interoperability and integration plan with WISEMAN which will be operated soon in our research Institute.

  • PDF

Fabrication and Characterization of 5000V class 4-inch Light Triggered Thyristor (4인치 광점호 Thyristor의 제조 및 특성 분석에 대한 연구)

  • Cho, Doohyung;Won, Jongil;Yoo, Seongwook;Ko, Sangchoon;Park, Jongmoon;Lee, Byungha;Bae, Youngseok;Koo, Insu;Park, Kunsik
    • Proceedings of the KIPE Conference
    • /
    • 2019.07a
    • /
    • pp.230-232
    • /
    • 2019
  • Light Triggerd Thyristor (LTT)는 HVDC 및 산업용 스위치 등에 사용되는 대전력 반도체소자이다. 일반적인 Thyristor가 전기적 신호에 의해 trigger 되는 것과는 다르게 LTT는 광신호에 의해 동작하는 소자이다. 본 논문에서는 5,000V, 2,200A 급의 4인치 LTT 소자의 제작 및 전기적인 특성평가 결과를 기술하였다. 4인치 LTT의 구조적인 특징은 전면부 중앙에 광신호가 주입되는 수광부가 위치해 있으며 입력 전류 증폭을 위한 4-단계 증폭 게이트 (gate) 구조를 가지도록 설계하였다. $400{\Omega}{\cdot}cm$ 비저항을 갖는 1mm 두께의 n-형 실리콘 웨이퍼에 boron 이온주입과 열처리 공정으로 약 $30{\mu}m$ 깊이의 p-base를 형성하였으며, 고내압 저지를 위한 edge termination은 VLD (variable lateral doping) 기술을 적용하였다. 제작된 4인치 LTT는 6,500 V의 순방향 항복전압 ($V_{DRM}$) 특성을 나타내었으며, 100V의 어노드전압 ($V_A$)과 20 mA의 게이트전류 ($I_G$)에 의하여 thyristor가 trigger 됨을 확인하였다. 제작한 LTT 소자는 disk형 press-pack 패키지를 진행한 후, LTT의 수광부에 $10{\mu}s$, 50 mW의 900 nm 광 펄스를 조사하여 전류 특성을 평가하였다. LTT 패키지 샘플에 60 Hz 주파수의 광 펄스를 조사한 경우 2,460 A의 순방향 평균전류 ($I_T$)와 $336A/{\mu}s$의 반복전류상승기울기 (repetitive di/dt)에 안정적으로 동작함을 확인하였다. 또한, 펄스 전류 시험의 경우 61.6 kA의 최대 통전 전류 (ITSM, surge current)와 $1,050A/{\mu}s$의 펄스전류 상승 기울기 (di/dt of on-state pulse current)에도 LTT의 손상 없이 동작함을 확인하였다.

  • PDF

Dynamic Verification Methodology of User Code in AddSIM Environment (AddSIM 환경에서의 사용자 코드 동적 검증 방법론)

  • Yang, Jiyong;Choi, Changbeom
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.1
    • /
    • pp.41-47
    • /
    • 2019
  • Defense simulation is actively used to test various weapon systems and evaluate their effectiveness. The AddSIM environment is a simulation framework designed to support the weapon systems dealt with in defense simulation from an integrated point of view and is designed for reuse and scalability. Models used in AddSIM require base model structure fidelity and verification of user code area. Therefore, this paper describes the dynamic verification method used for completeness of models used in AddSIM. For the dynamic verification of user code, the specification method and the verification algorithm are described. Also, we introduce the prototype of the dynamic verifier implemented based on verification specification method and algorithm. The case study analyzes the verification results based on the simulation example implemented in AddSIM environment.

Analysis of Defense Method for HTTP POST DDoS Attack base on Content-Length Control (Content-Length 통제기반 HTTP POST DDoS 공격 대응 방법 분석)

  • Lee, Dae-Seob;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.809-817
    • /
    • 2012
  • One of the OSI 7 Layer DDoS Attack, HTTP POST DDoS can deny legitimate service by web server resource depletion. This Attack can be executed with less network traffic and legitimate TCP connections. Therefore, It is difficult to distinguish DDoS traffic from legitimate users. In this paper, I propose an anomaly HTTP POST traffic detection algorithm and http each page Content-Length field size limit with defense method for HTTP POST DDoS attack. Proposed method showed the result of detection and countermeasure without false negative and positive to use the r-u-dead-yet of HTTP POST DDoS attack tool and the self-developed attack tool.