• Title/Summary/Keyword: defense performance

Search Result 2,006, Processing Time 0.033 seconds

A Study on Optimal Hydrophone Arrangement for The Direction Finding of High Speed Moving Target in Underwater (수중에서 고속 기동하는 표적의 방위 탐지를 위한 최적의 청음기 배치 연구)

  • Han, Min-Su;Choi, Jae-Yong;Kang, Dong-Seok;Son, Kweon;Lee, Phil-ho
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.3
    • /
    • pp.369-375
    • /
    • 2017
  • One of good DF(Direction Finding) methods is based on TDOA(Time Difference of Arrival) estimation when finding underwater moving target. For small DF error, high time resolution A/D(Analog-to-digital) conversion board and long baseline are needed. But the result of sea trial about close-range and high speed moving target, spatial correlation coefficient and appeared poor properties below 0.3 when hydrophone arrangement are separated over 6 ${\lambda}$ because of underwater fading channel. And we also find out that the distance between hydrophone should be under 4 ${\lambda}$ apart to take advantage of spatial correlation coefficient gain and performance of DF in underwater moving channel environments.

Defense Strategy against Multiple Anti-Ship Missiles using Anti-Air Missiles (다수 대함유도탄에 대한 함정의 대공방어유도탄 운용기법 연구)

  • Kim, Do-Wan;Yun, Joong-Sup;Ryoo, Chang-Kyung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.39 no.4
    • /
    • pp.354-361
    • /
    • 2011
  • In this paper, an efficient defense strategy of single naval ship using short range anti-air missiles against the threat of multiple anti-ship missiles is suggested. The defense logic is based on the estimated future trajectory of anti-ship missiles by using current radar information. The logic is designed to maximize the range of interception of anti-ship missiles so that the chance of interception can be increased although the prior tries turn out to be fail. Basically, the decision making for the allocation of a defense missile is achieved by comparing the total kill probability and the estimated intercepting point. Performance of the proposed logic is investigated by nonlinear planar numerical simulations.

A Detection Rule Exchange Mechanism for the Collaborative Intrusion Detection in Defense-ESM (국방통합보안관제체계에서의 협업 침입탐지를 위한 탐지규칙 교환 기법)

  • Lee, Yun-Hwan;Lee, Soo-Jin
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.57-69
    • /
    • 2011
  • Many heterogeneous Intrusion Detection Systems(IDSs) based in misuse detection technique including the self-developed IDS are now operating in Defense-ESM(Enterprise Security Management System). IDS based on misuse detection may have different capability in the intrusion detection process according to the frequency and quality of its signature update. This makes the integration and collaboration with other IDSs more difficult. In this paper, with the purpose of creating the proper foundation for integration and collaboration between heterogeneous IDSs being operated in Defense-ESM, we propose an effective mechanism that can enable one IDS to propagate its new detection rules to other IDSs and receive updated rules from others. We also prove the performance of rule exchange and application possibility to defense environment through the implementation and experiment.

150 kJ Compact Capacitive Pulsed Power System for an Electrothermal Chemical Gun

  • Lee, Byung-Ha;Kim, Jin-Sung;Kim, Seong-Ho;Lee, Young-Hyun;Yang, Kyung-Seung
    • Journal of Electrical Engineering and Technology
    • /
    • v.7 no.6
    • /
    • pp.971-976
    • /
    • 2012
  • A 150 kJ compact capacitive pulsed power system (CCPPS) capable of delivering electrical energy into an electrothermal chemical (ETC) gun on a vehicle has been studied. The CCPPS provides pulsed electrical energy into a capillary plasma injector which generates plasma of tens of thousands $^{\circ}K$ in temperature and has a nonlinear resistance depending on the current. The design requirements of the CCPPS are as follows: the maximum power of 250 MW, the pulse width of about 0.6 ms, the volume of no more than 0.5 cubic meter, the efficiency of energy transfer over 80 % and the repetition rate of 4~5 times per minute. The constructed CCPPS is composed of four 37.5 kJ capacitor bank modules in parallel to make a trapezoid pulse shape and to satisfy the design requirements. Each module is designed to achieve high reliability, safety, efficiency and energy density to endure severe operating conditions. The results of the performance test on the CCPPS using a 120 mm ETC gun are described.

The Investigation of the Leased Line Modem Usability in the Wireless Internet Protocol Network (무선 IP 네트워크에서 전용선 모뎀 사용가능성 검증)

  • PARK, MINHO;Baek, Hae Hyeon;Kum, Dong Won;Choi, Hyungseok;Lee, Jong Sung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.4
    • /
    • pp.423-431
    • /
    • 2015
  • A leased line modem usability was evaluated and investigated in the wireless internet protocol(IP) network. The signal of the modem in the circuit switching network was translated to IP packet by using several voice codecs (PCM, G.711A, $G.711{\mu}$, and etc.) and transmitted through the wireless IP network. The wireless IP network was simulated by the Tactical information and communication network Modeling and simulation Software(TMS). The performance and usability of the leased line modem are simulated using the system-in-the-loop(SITL) function of TMS with respect to packet delay, jitter, packet discard ratio, codecs, and wireless link BER.

A Requirement Assessment Algorithm for Anti-Ballistic Missile Considering Ballistic Missile's Flight Characteristics (탄도미사일의 비행특성을 고려한 요격미사일 소요 알고리즘)

  • Kim, Heung-Seob;Kim, Ki-Tae;Jeon, Geon-Wook
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.6
    • /
    • pp.1009-1017
    • /
    • 2011
  • A Ballistic Missile(BM) is a missile that follows a sub-orbital ballistic flightpath with the objective of delivering one or more wardheads to a predetermined target and An Anti-Ballistic Missile(ABM) is a missile designed to destroy a ballistic missile before reaching its target. The main objective of this study is to assess the requirement of ABM by considering both flight characteristic of the SCUD-B/C, Nodong missiles and intercept performance of ABM in the Lower tier Ballistic Missile Defense(BMD). The Ballistic Missile's flight characteristics, such as trajectory, velocity etc., are estimated by simulation using the physical motion equations. The requirement of ABM is calculated by evaluating whether the BMD forces can defend those when the ballistic missiles attack prime facilities.

Research of Considerations for Effective Operation of Weapons Data Link (무장데이터링크의 효과적인 운용을 위한 고려사항 고찰)

  • Woo, Sang Hyo;Baek, Inhye;Kwon, Ki-Jeong;Kim, Ki Bum
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.6
    • /
    • pp.886-893
    • /
    • 2018
  • U.S. and the allies attacked chemical weapons sites in Syria in 2018, and verbal battles are carried out about the effectiveness of the air strike. Syria claimed 13 missiles were shot down, and Russia claimed 71 missiles were shot down while the U.S. released pictures of completely destroyed targets, only. It led controversy about the effectiveness of missile defense system. If there is a method to observe mission success rate of the air strike, it can not only improve combat awareness but also can be a good sales strategy in military industry. This paper describes effects and considerations of a Weapon Data Link(WDL) technology which can be used as a smoking gun of effectiveness. The paper describes WDL abilities such as In-Flight Track Update, Loiter, and Bomb Hit Indication etc., and presents examples of expected effectiveness of the WDL. In addition, this paper briefly summarizes operational consideration for better performance.

An Intelligent MAC Protocol Selection Method based on Machine Learning in Wireless Sensor Networks

  • Qiao, Mu;Zhao, Haitao;Huang, Shengchun;Zhou, Li;Wang, Shan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5425-5448
    • /
    • 2018
  • Wireless sensor network has been widely used in Internet of Things (IoT) applications to support large and dense networks. As sensor nodes are usually tiny and provided with limited hardware resources, the existing multiple access methods, which involve high computational complexity to preserve the protocol performance, is not available under such a scenario. In this paper, we propose an intelligent Medium Access Control (MAC) protocol selection scheme based on machine learning in wireless sensor networks. We jointly consider the impact of inherent behavior and external environments to deal with the application limitation problem of the single type MAC protocol. This scheme can benefit from the combination of the competitive protocols and non-competitive protocols, and help the network nodes to select the MAC protocol that best suits the current network condition. Extensive simulation results validate our work, and it also proven that the accuracy of the proposed MAC protocol selection strategy is higher than the existing work.

A Discovery System of Malicious Javascript URLs hidden in Web Source Code Files

  • Park, Hweerang;Cho, Sang-Il;Park, Jungkyu;Cho, Youngho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.5
    • /
    • pp.27-33
    • /
    • 2019
  • One of serious security threats is a botnet-based attack. A botnet in general consists of numerous bots, which are computing devices with networking function, such as personal computers, smartphones, or tiny IoT sensor devices compromised by malicious codes or attackers. Such botnets can launch various serious cyber-attacks like DDoS attacks, propagating mal-wares, and spreading spam e-mails over the network. To establish a botnet, attackers usually inject malicious URLs into web source codes stealthily by using data hiding methods like Javascript obfuscation techniques to avoid being discovered by traditional security systems such as Firewall, IPS(Intrusion Prevention System) or IDS(Intrusion Detection System). Meanwhile, it is non-trivial work in practice for software developers to manually find such malicious URLs which are hidden in numerous web source codes stored in web servers. In this paper, we propose a security defense system to discover such suspicious, malicious URLs hidden in web source codes, and present experiment results that show its discovery performance. In particular, based on our experiment results, our proposed system discovered 100% of URLs hidden by Javascript encoding obfuscation within sample web source files.

A Research on the SILS System for Design and Analysis of Non-Communication Electronic Warfare Weapons based on the Engineering M&S Technique (공학급 M&S 기반 비통신 전자전무기체계 설계 분석 지원을 위한 SILS 시스템 연구)

  • Shin, Dongcho;Shin, Wookheon;Kim, Taehyun;Lee, Chiho;Jeong, Unseob
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.3
    • /
    • pp.272-280
    • /
    • 2021
  • We research and develop a SW-based virtual testing product that can be commonly used in the design/development of non-communication EW systems before the production of physical test products. Through this study, we have developed M&S technology to improve the accuracy of EW weapon system analysis/design and to verify and predict the performance of EW equipment, and to develop proven engineering module models and model base systems. It proposes a technology to build an EW M&S framework that can flexibly link/integrate various engineering/engage-level EW heterogeneous M&S systems.