• Title/Summary/Keyword: defense performance

Search Result 2,006, Processing Time 0.031 seconds

Investigation of the Effects of UAV Nozzle Configurations on Aircraft Lock-on Range (무인항공기의 노즐 형상 변화가 Lock-on Range에 미치는 영향에 관한 연구)

  • Kim, Min-Jun;Kang, Dong-Woo;Myong, Rho-Shin;Kim, Won-Cheol
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.43 no.3
    • /
    • pp.204-212
    • /
    • 2015
  • The infrared lock-on range of target aircraft plays a critical role in determining the aircraft survivability. In this investigation, the effects of various UAV engine nozzle configurations on the aircraft lock-on range were theoretically analyzed. A virtual subsonic aircraft was proposed first, based on the mission requirement and the engine performance analysis, and convergent-type nozzles were then designed. After determining thermal flow field and nozzle surface temperature distribution with the CFD code, an additional analysis was conducted to predict the IR signature. Also, atmospheric transmissivity for various latitude and seasons was calculated, using the LOWTRAN code. Finally, the lock-on and lethal envelopes were calculated for different nozzle configurations, assuming the sensor threshold of the given IR guided missile. It was shown that the maximum 55.3% reduction in lock-on range is possible for deformed nozzles with the high aspect ratio.

A Study on Cockpit Voice Command System for Fighter Aircraft (전투기용 음성명령 시스템에 대한 연구)

  • Kim, Seongwoo;Seo, Mingi;Oh, Yunghwan;Kim, Bonggyu
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.41 no.12
    • /
    • pp.1011-1017
    • /
    • 2013
  • The human voice is the most natural means of communication. The need for speech recognition technology is increasing gradually to increase the ease of human and machine interface. The function of the avionics equipment is getting various and complicated in consequence of the growth of digital technology development, so that the load of pilots in the fighter aircraft must become increased since they don't concentrate only the attack function, but also operate the complicated avionics equipments. Accordingly, if speech recognition technology is applied to the aircraft cockpit as regards the operating the avionics equipments, pilots can spend their time and effort on the mission of fighter aircraft. In this paper, the cockpit voice command system applicable to the fighter aircraft has been developed and the function and the performance of the system verified.

GRASP Algorithm for Dynamic Weapon-Target Assignment Problem (동적 무장할당 문제에서의 GRASP 알고리즘 연구)

  • Park, Kuk-Kwon;Kang, Tae Young;Ryoo, Chang-Kyung;Jung, YoungRan
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.47 no.12
    • /
    • pp.856-864
    • /
    • 2019
  • The weapon-target assignment (WTA) problem is a matter of effectively allocating weapons to a number of threats. The WTA in a rapidly changing dynamic environment of engagement must take into account both of properties of the threat and the weapon and the effect of the previous decision. We propose a method of applying the Greedy Randomized Adaptive Search Procedure (GRASP) algorithm, a kind of meta-heuristic method, to derive optimal solution for a dynamic WTA problem. Firstly, we define a dynamic WTA problem and formulate a mathematical model for applying the algorithm. For the purpose of the assignment strategy, the objective function is defined and time-varying constraints are considered. The dynamic WTA problem is then solved by applying the GRASP algorithm. The optimal solution characteristics of the formalized dynamic WTA problem are analyzed through the simulation, and the algorithm performance is verified via the Monte-Carlo simulation.

New Proxy Blind Signcryption Scheme for Secure Multiple Digital Messages Transmission Based on Elliptic Curve Cryptography

  • Su, Pin-Chang;Tsai, Chien-Hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5537-5555
    • /
    • 2017
  • Having the characteristics of unlinkability, anonymity, and unforgeability, blind signatures are widely used for privacy-related applications such as electronic cash, electronic voting and electronic auction systems where to maintain the anonymity of the participants. Among these applications, the blinded message is needed for a certain purpose by which users delegate signing operation and communicate with each other in a trusted manner. This application leads to the need of proxy blind signature schemes. Proxy blind signature is an important type of cryptographic primitive to realize the properties of both blind signature and proxy signature. Over the past years, many proxy blind signature algorithms have been adopted to fulfill such task based on the discrete logarithm problem (DLP) and the elliptic curve discrete log problem (ECDLP), and most of the existing studies mainly aim to provide effective models to satisfy the security requirements concerning a single blinded message. Unlike many previous works, the proposed scheme applies the signcryption paradigm to the proxy blind signature technology for handling multiple blinded messages at a time based on elliptic curve cryptography (ECC). This innovative method thus has a higher level of security to achieve the security goals of both blind signature and proxy signature. Moreover, the evaluation results show that this proposed protocol is more efficient, consuming low communication overhead while increasing the volume of digital messages compared to the performance from other solutions. Due to these features, this design is able to be implemented in small low-power intelligent devices and very suitable and easily adoptable for e-system applications in pervasive mobile computing environment.

A Study on Web Service Security Testing Methodology for Performance Evaluation (웹 서비스 보안 성능 평가 테스트 방법론 연구)

  • Lee, Dong-Hwi;Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.31-37
    • /
    • 2010
  • The risks and threats in IT security systems to protect, prevent damage and Risk should be minimized. Context of information security products such as information processing, storage, delivery, and in the process of information system security standards, That is the basic confidentiality, availability, integrity and secondary clarity, potential evidence, detection, warning and defense capabilities, to ensure sufficient and should be. Web services are the most important elements in the security, the web nature of port 80 for the service to keep the door open as a structure, Web applications, web sources and servers, networks, and to hold all the elements are fundamental weaknesses. Accordingly, these elements through a set of Web application development errors and set-up errors and vulnerabilities in Web applications using their own home pages and web servers to prevent hacking and to improve the efficiency of Web services is proposed methodology performs security BMT.

Protective Effects of Sweet Orange, Unshiu Mikan, and Mini Tomato Juice Powders on t-BHP-Induced Oxidative Stress in HepG2 Cells

  • Jannat, Susoma;Ali, Md Yousof;Kim, Hyeung-Rak;Jung, Hyun Ah;Choi, Jae Sue
    • Preventive Nutrition and Food Science
    • /
    • v.21 no.3
    • /
    • pp.208-220
    • /
    • 2016
  • The aim of this study was to investigate the protective effects of juice powders from sweet orange [Citrus sinensis (L.) Osbeck], unshiu mikan (Citrus unshiu Marcow), and mini tomato (Solanum lycopersicum L.), and their major flavonoids, hesperidin, narirutin, and rutin in tert-butyl hydroperoxide (t-BHP)-induced oxidative stress in HepG2 cells. The increased reactive oxygen species and decreased glutathione levels observed in t-BHP-treated HepG2 cells were ameliorated by pretreatment with juice powders, indicating that the hepatoprotective effects of juice powders and their major flavonoids are mediated by induction of cellular defense against oxidative stress. Moreover, pretreatment with juice powders up-regulated phase-II genes such as heme oxygenase-1 (HO-1), thereby preventing cellular damage and the resultant increase in HO-1 expression. The high-performance liquid chromatography profiles of the juice powders confirmed that hesperidin, narirutin, and rutin were the key flavonoids present. Our results suggest that these fruit juice powders and their major flavonoids provide a significant cytoprotective effect against oxidative stress, which is most likely due to the flavonoid-related bioactive compounds present, leading to the normal redox status of cells. Therefore, these fruit juice powders could be advantageous as bioactive sources for the prevention of oxidative injury in hepatoma cells.

Design of a 3:1 Wideband Circular Polarizer with Multilayered Meanderline Using Hybrid Method (하이브리드 방법을 이용한 다층 미앤더선로 구조의 3:1 광대역 원편파 편파기 설계)

  • Lee, Cheol-Soo;Pack, Jeong-Ki
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.26 no.8
    • /
    • pp.730-739
    • /
    • 2015
  • In this paper, a wideband circular polarizer operating in the frequency range of 6~18 GHz is designed and fabricated using a multilayer structure with meanderlines. A T matrix expression for the unit structure, which consists of meanderline, dielectric substrate and spacer, was derived using the boundary value solution. A proposed meanderline structure was modeled as an array of unit meanderline cell in order to apply the waveguide model with PEC and PMC boundary conditions. The calculation procedures to obtain an equivalent susceptance of the unit meanderline cell using HFSS was also suggested. Using a hybrid method, which combines the T matrix with the HFSS results, and cut-and-try method, a wideband circular polarizer with low insertion loss and good AR performance was designed. The fabricated polarizer has the return loss less than -10 dB within 92 % bandwidth, the average insertion loss less than -0.24 dB, and the average AR below 2.6 dB for full 3:1 bandwidth.

An Implementation of Interferometric Radar Altimeter Simulator (간섭계 레이더 고도계용 시뮬레이터 구현)

  • Paek, Inchan;Lee, Sangil;Yoo, Kyungju;Jang, Jong Hun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.26 no.1
    • /
    • pp.81-87
    • /
    • 2015
  • We present an implementation result of a computer GUI-based simulator using MATLAB to verify the performance of interferometric radar altimeter(IRA) which is possible to measure the slant range altitude and the cross-track angle to the nearest point for terrain aided navigation(TAN). After a brief description of the principle of TAN and IRA, we present that the grids are divided for the modeling of the reflected signal in digital elevation map(DEM) and so the radar cross section(RCS) of each grid is calculated and the signal-noise ratio(SNR) of the reflected signal in the radar beam width. And the signal processing procedures of the IRA and the structure of the IRA simulator are shown.

A Study on Development of the Dual-thrust Flight Motor for Enhancing the Hit Probability (명중률 향상을 위한 이중추력형 비행모터 개발에 대한 연구)

  • Kim, Hanjun;Kim, Eunmi;Kim, Namsik;Lee, Wonbok;Yang, Youngjun
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.18 no.4
    • /
    • pp.74-80
    • /
    • 2014
  • This paper describes the development of the dual-thrust flight motor for enhancing the hit probability of unguided rockets. We designed dual-thrust flight motor by shape modification of the double base propellant with high burning rate, and confirmed the dual-thrust performance by static firing tests. The test results showed the thrust ratio of about 1:7.6 between sustaining phase and boosting phase, and had a quietly normal dual-thrust characteristics. And the results showed that there was not the fire extinction phenomenon of propellant due to the pressure drop.

Development of formulation Q1As method for quadrupole noise prediction around a submerged cylinder

  • Choi, Yo-Seb;Choi, Woen-Sug;Hong, Suk-Yoon;Song, Jee-Hun;Kwon, Hyun-Wung;Seol, Han-Shin;Jung, Chul-Min
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.9 no.5
    • /
    • pp.484-491
    • /
    • 2017
  • Recent research has shown that quadrupole noise has a significant influence on the overall characteristics of flow-induced noise and on the performance of underwater appendages such as sonar domes. However, advanced research generally uses the Ffowcs Williams-Hawkings analogy without considering the quadrupole source to reduce computational cost. In this study, flow-induced noise is predicted by using an LES turbulence model and a developed formulation, called the formulation Q1As method to properly take into account the quadrupole source. The noise around a circular cylinder in an underwater environment is examined for two cases with different velocities. The results from the method are compared to those obtained from the experiments and the permeable FW-H method. The results are in good agreement with the experimental data, with a difference of less than 1 dB, which indicates that the formulation Q1As method is suitable for use in predicting quadrupole noise around underwater appendages.