• Title/Summary/Keyword: defense performance

Search Result 2,006, Processing Time 0.03 seconds

Smart Anti-jamming Mobile Communication for Cloud and Edge-Aided UAV Network

  • Li, Zhiwei;Lu, Yu;Wang, Zengguang;Qiao, Wenxin;Zhao, Donghao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.12
    • /
    • pp.4682-4705
    • /
    • 2020
  • The Unmanned Aerial Vehicles (UAV) networks consisting of low-cost UAVs are very vulnerable to smart jammers that can choose their jamming policies based on the ongoing communication policies accordingly. In this article, we propose a novel cloud and edge-aided mobile communication scheme for low-cost UAV network against smart jamming. The challenge of this problem is to design a communication scheme that not only meets the requirements of defending against smart jamming attack, but also can be deployed on low-cost UAV platforms. In addition, related studies neglect the problem of decision-making algorithm failure caused by intermittent ground-to-air communication. In this scheme, we use the policy network deployed on the cloud and edge servers to generate an emergency policy tables, and regularly update the generated policy table to the UAVs to solve the decision-making problem when communications are interrupted. In the operation of this communication scheme, UAVs need to offload massive computing tasks to the cloud or the edge servers. In order to prevent these computing tasks from being offloaded to a single computing resource, we deployed a lightweight game algorithm to ensure that the three types of computing resources, namely local, edge and cloud, can maximize their effectiveness. The simulation results show that our communication scheme has only a small decrease in the SINR of UAVs network in the case of momentary communication interruption, and the SINR performance of our algorithm is higher than that of the original Q-learning algorithm.

The Optical Tracking Method of Flight Target using Kalman Filter with DTW (DTW와 Kalman Filter를 결합한 비행표적의 광학추적 방법)

  • Jang, Sukwon
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.3
    • /
    • pp.217-222
    • /
    • 2021
  • EOTS(Electro-Optical Tracking System) is utilized in acquiring visual information to assess a guided missile's performance. As the missile travels so fast, it is almost impossible for operator to re-capture the lost target. The RADAR or telemetry data are used to re-capture the lost target however facilities to receive real time data is required, which constrains selection of tracking site. Unlike aforementioned data, pre-calculated nominal trajectory can be used without communication facility. This paper proposes a method to predict lost target's state by employing nominal trajectory. Firstly, observed trajectory and nominal trajectory are compared using DTW and current target's state is predicted. The predicted state is used as observation in Kalman filter's correction phase to predict target's next state. The plausibility of the proposed method is verified by applying on actual missile trajectory.

An Experimental Study on Internal Drag Correction of High Speed Vehicle Using Three Probes (세 가지 프로브를 이용한 초고속 비행체 내부 항력 보정 기법의 실험적 연구)

  • Jin, Hyeon
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.7
    • /
    • pp.529-537
    • /
    • 2021
  • Wind tunnel tests were carried out with a scramjet high speed vehicle. Since the scramjet engine does not have a compressor, it has a simple structure, but it is important to design the intake for the supersonic combustion in the combustion chamber. In this study, internal flow characteristics and the starting condition were analyzed by measuring the pressure at the isolator exit just before the combustion chamber, and the intake performance parameters were calculated and compared the result on every Mach number. The aerodynamic characteristics of the flow-through high speed vehicle were analyzed and internal drag correction is required to precisely analyze the aerodynamic characteristics. In this paper, an experimental technique using three probes for internal drag correction was proposed. By applying internal drag correction, it was able to figure out the effect of the internal flow on the aerodynamic force of the vehicle.

A Empirical Study on the Patch Impact Assessment Method for Industrial Control Network Security Compliance (산업제어망 보안 컴플라이언스를 위한 패치 영향성 평가 방안에 관한 실증 연구)

  • Choi, Inji
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1141-1149
    • /
    • 2020
  • Most of the industrial control network is an independent closed network, which is operated for a long time after installation, and thus the OS is not updated, so security threats increase and security vulnerabilities exist. The zero-day attack defense must be applied with the latest patch, but in a large-scale industrial network, it requires a higher level of real-time and non-disruptive operation due to the direct handling of physical devices, so a step-by-step approach is required to apply it to a live system. In order to solve this problem, utility-specific patch impact assessment is required for reliable patch application. In this paper, we propose a method to test and safely install the patch using the regression analysis technique and show the proven results. As a patch impact evaluation methodology, the maximum allowance for determining the safety of a patch was derived by classifying test types based on system-specific functions, performance, and behavior before and after applying the patch. Finally, we report the results of case studies applied directly to industrial control networks, the OS patch has been updated while ensuring 99.99% availability.

A Study on the Characteristics of Underwater Explosion for the Development of a Non-Explosive Test System (무폭약 시험 장치 개발을 위한 수중폭발 특성에 대한 연구)

  • Lee, Hansol;Park, Kyudong;Na, Yangsub;Lee, Seunggyu;Pack, Kyunghoon;Chung, Hyun
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.57 no.6
    • /
    • pp.322-330
    • /
    • 2020
  • This study deals with underwater explosion (UNDEX) characteristics of various non-explosive underwater shock sources for the development of non-explosive underwater shock testing devices. UNDEX can neutralize ships' structure and the equipment onboard causing serious damage to combat and survivability. The shock proof performance of naval ships has been for a long time studied through simulations, but full-scale Live Fire Test and Evaluation (LFT&E) using real explosives have been limited due to the high risk and cost. For this reason, many researches have been tried to develop full scale ship shock tests without using actual explosives. In this study, experiments were conducted to find the characteristics of the underwater shock waves from actual explosive and non-explosive shock sources such as the airbag inflators and Vaporizing Foil Actuator (VFA). In order to derive the empirical equation for the maximum pressure value of the underwater shock wave generated by the non-explosive impact source, repeated experiments were conducted according to the number and distance. In addition, a Shock Response Spectrum (SRS) technique, which is a frequency-based function, was used to compare the response of floating bodies generated by underwater shock waves from each explosion source. In order to compare the magnitude of the underwater shock waves generated by each explosion source, Keel Shock Factor (KSF), which is a measure for estimating the amount of shock experienced by a naval ship from an underwater explosionan, was used.

The Study on Data Governance Research Trends Based on Text Mining: Based on the publication of Korean academic journals from 2009 to 2021 (텍스트 마이닝을 활용한 데이터 거버넌스 연구 동향 분석: 2009년~2021년 국내 학술지 논문을 중심으로)

  • Jeong, Sun-Kyeong
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.133-145
    • /
    • 2022
  • As a result of the study, the poorest keywords were information, big data, management, policy, government, law, and smart. In addition, as a result of network analysis, related research was being conducted on topics such as data industry policy, data governance performance, defense, governance, and data public. The four topics derived through topic modeling were "DG policy," "DG platform," "DG in laws," and "DG implementation," of which research related to "DG platform" showed an increasing trend, and "DG implementation" tended to shrink. This study comprehensively summarized data governance-related studies. Data governance needs to expand research areas from various perspectives and related fields such as data management and data integration policies at the organizational level, and related technologies. In the future, we can expand the analysis targets for overseas data governance and expect follow-up studies on research directions and policy directions in industries that require data-based future industries such as Industry 4.0, artificial intelligence, and Metaverse.

Parallelization of Probabilistic RoadMap for Generating UAV Path on a DTED Map (DTED 맵에서 무인기 경로 생성을 위한 Probabilistic RoadMap 병렬화)

  • Noh, Geemoon;Park, Jihoon;Min, Chanoh;Lee, Daewoo
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.50 no.3
    • /
    • pp.157-164
    • /
    • 2022
  • In this paper, we describe how to implement the mountainous terrain, radar, and air defense network for UAV path planning in a 3-D environment, and perform path planning and re-planning using the PRM algorithm, a sampling-based path planning algorithm. In the case of the original PRM algorithm, the calculation to check whether there is an obstacle between the nodes is performed 1:1 between nodes and is performed continuously, so the amount of calculation is greatly affected by the number of nodes or the linked distance between nodes. To improve this part, the proposed LineGridMask method simplifies the method of checking whether obstacles exist, and reduces the calculation time of the path planning through parallelization. Finally, comparing performance with existing PRM algorithms confirmed that computational time was reduced by up to 88% in path planning and up to 94% in re-planning.

Low Complexity Linear Receiver Implementation of SOQPSK-TG Signal Using the Cross-correlated Trellis-Coded Quadrature Modulation(XTCQM) Technique (SOQPSK-TG 신호의 교차상관 격자부호화 직교변조(XTCQM) 기법을 사용한 저복잡도 선형 수신기 구현)

  • Kim, KyunHoi;Eun, Changsoo
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.50 no.3
    • /
    • pp.193-201
    • /
    • 2022
  • SOQPSK-TG is a modulated signal for aircraft telemetry with excellent frequency efficiency and power efficiency. In this paper, the phase waveform of the partial response SOQPSK-TG modulation is linearly approximated and modeled as a full response double duobinary SOQPSK (SOQPSK-DD) signal. And using the XTCQM method and the Laurent decomposition method, the SOQPSK-DD signal was approximated as OQPSK having linear pulse waveforms, and the results of the two methods were proved to be the same. In addition, it was confirmed that the Laurent decomposition waveform of the SOQPSK-DD signal approximates the Laurent decomposition waveform of the original SOQPSK-TG signal. And it was shown that the decision feedback IQ-detector, which applied the Laurent decomposition waveform of SOQPSK-DD to the detection filter, exhibits almost the same performance even with a simpler waveform than before.

A study on the Generation Method of Aircraft Wing Flexure Data Using Generative Adversarial Networks (생성적 적대 신경망을 이용한 항공기 날개 플렉셔 데이터 생성 방안에 관한 연구)

  • Ryu, Kyung-Don
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.3
    • /
    • pp.179-184
    • /
    • 2022
  • The accurate wing flexure model is required to improve the transfer alignment performance of guided weapon system mounted on a wing of fighter aircraft or armed helicopter. In order to solve this problem, mechanical or stochastical modeling methods have been studying, but modeling accuracy is too low to be applied to weapon systems. The deep learning techniques that have been studying recently are suitable for nonlinear. However, operating fighter aircraft for deep-learning modeling to secure a large amount of data is practically difficult. In this paper, it was used to generate amount of flexure data samples that are similar to the actual flexure data. And it was confirmed that generated data is similar to the actual data by utilizing "measures of similarity" which measures how much alike the two data objects are.

Object Recognition Using Convolutional Neural Network in military CCTV (합성곱 신경망을 활용한 군사용 CCTV 객체 인식)

  • Ahn, Jin Woo;Kim, Dohyung;Kim, Jaeoh
    • Journal of the Korea Society for Simulation
    • /
    • v.31 no.2
    • /
    • pp.11-20
    • /
    • 2022
  • There is a critical need for AI assistance in guard operations of Army base perimeters, which is exacerbated by changes in the national defense and security environment such as force reduction. In addition, the possibility for human error inherent to perimeter guard operations attests to the need for an innovative revamp of current systems. The purpose of this study is to propose a real-time object detection AI tailored to military CCTV surveillance with three unique characteristics. First, training data suitable for situations in which relatively small objects must be recognized is used due to the characteristics of military CCTV. Second, we utilize a data augmentation algorithm suited for military context applied in the data preparation step. Third, a noise reduction algorithm is applied to account for military-specific situations, such as camouflaged targets and unfavorable weather conditions. The proposed system has been field-tested in a real-world setting, and its performance has been verified.