• Title/Summary/Keyword: reconnaissance

Search Result 372, Processing Time 0.027 seconds

Estimation Model on Stress of Structures using TLS and FEM (TLS와 FEM을 이용한 구조물의 음력평가 모델 개발)

  • Kang, Deok-Shin;Lee, Hong-Min;Park, Hyo-Seon;Lee, Im-Pyeong
    • 한국방재학회:학술대회논문집
    • /
    • 2007.02a
    • /
    • pp.49-52
    • /
    • 2007
  • Terrestrial Laser Scanning(TLS) was developed at the mid-to-late 1990s. This technique enables to perform reconnaissance surveying of regions or structures hard to access. Besides, TLS has been extended its application gradually such as preservation of historical remains, underground surveys, slopes, glaciers monitoring and so on. However, though the technique has a lot of advantages, an application for structural health and safety monitoring is a beginning stage and it need much research. Therefore in this study, as a groundwork, the estimation model on stress of structures using TLS and Finite Element Method(FEM) applied by the Digital Elevation Model(DEM) technique of geoinformatics is proposed. For the verification of this model, experiments were performed with a continuous steel beam subjected to point loads and outputs were compared with those of electrical strain sensors.

  • PDF

Reconnaissance study on the Water Quality of Miomotegawa River for the evaluation of the impacts of acid pollution

  • Yang, Hyung-Jae;Satake, Kenichi
    • Proceedings of the Korean Sanitation Conference
    • /
    • 2006.11a
    • /
    • pp.33-42
    • /
    • 2006
  • We decided Miomotegawa river was the object of our investigation since it is one of the most important salmon rivers in Japan. A great number of salmonshave returned to the river, and it was expected to contain relatively lower cation concentrations since granite is widely distributed in the river catchment area. The concentration of calcium and magnesium were less than a half of that of other major rivers. The concentration of analyzed parameters indicating water quality effect on salmons, $NO_{3},\;SO_{4}\;and\;NH_{4}$, were 1.37, 4.08 and 0.01mg/l, respectively. Most parameters down stream were greater in concentration than in the upper stream.

  • PDF

Chain code based New Decision Technique of Edge Orientation (체인코드를 이용한 새로운 에지 방향 결정 기법)

  • Sung, Min-Chul;Lee, Sang-Hwa;Cho, Nam-Ik
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.10 no.1
    • /
    • pp.101-106
    • /
    • 2007
  • In this paper, we propose chain code based decision technique of edge orientation. Edge Information is one of the most important information for handling image signals, and is applied to various civilian and military area, such as image surveillance for military reconnaissance, restoration of noised image signal, fingerprint recognition, and so on. The conventional methods to find edge orientations exploit a certain size of mask which weights for a certain direction, so they showed limitations in the case of diagonal edges except 45 degrees. We find edge orientations using chain code. According to the experiments, the proposed method shows better performance than the conventional approaches. The exact edge orientations including diagonal directions are well found.

A Study on Visual Servoing Image Information for Stabilization of Line-of-Sight of Unmanned Helicopter (무인헬기의 시선안정화를 위한 시각제어용 영상정보에 관한 연구)

  • 신준영;이현정;이민철
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2004.10a
    • /
    • pp.600-603
    • /
    • 2004
  • UAV (Unmanned Aerial Vehicle) is an aerial vehicle that can accomplish the mission without pilot. UAV was developed for a military purpose such as a reconnaissance in an early stage. Nowadays usage of UAV expands into a various field of civil industry such as a drawing a map, broadcasting, observation of environment. These UAV, need vision system to offer accurate information to person who manages on ground and to control the UAV itself. Especially LOS(Line-of-Sight) system wants to precisely control direction of system which wants to tracking object using vision sensor like an CCD camera, so it is very important in vision system. In this paper, we propose a method to recognize object from image which is acquired from camera mounted on gimbals and offer information of displacement between center of monitor and center of object.

  • PDF

A Path Planning to Maximize Survivability for Unmanned Aerial Vehicle based on 3-dimensional Environment (3차원 환경 기반 무인 항공기 생존성 극대화를 위한 이동 경로 계획)

  • Kim, Ki-Tae;Jeon, Geon-Wook
    • IE interfaces
    • /
    • v.24 no.4
    • /
    • pp.304-313
    • /
    • 2011
  • An Unmanned Aerial Vehicle(UAV) is a powered pilotless aircraft, which is controlled remotely or autonomously. UAVs are currently employed in many military missions(surveillance, reconnaissance, communication relay, targeting, strike etc.) and a number of civilian applications(communication service, broadcast service, traffic control support, monitoring, measurement etc.). For accomplishing the UAV's missions, guarantee of survivability should be preceded. The main objective of this study is the path planning to maximize survivability for UAV based on 3-dimensional environment. A mathematical programming model is suggested by using MRPP(Most Reliable Path Problem) and solved by transforming MRPP into SPP(Shortest Path Problem). This study also suggests a $A^*PS$ algorithm based on 3-dimensional environment to UAV's path planning. According to comparison result of the suggested algorithm and SPP algorithms (Dijkstra, $A^*$ algorithm), the suggested algorithm gives better solution than SPP algorithms.

네트워크 주소 변이 기반 Moving Target Defense 연구 동향

  • Woo, Samuel;Park, Kyungmin;Moon, Daesung;Kim, Ikkyun
    • Review of KIISC
    • /
    • v.28 no.2
    • /
    • pp.5-11
    • /
    • 2018
  • 지능형 지속 위협(Advanced Persistent Threat) 공격은 Intrusion Kill Chain과 같은 일련의 단계로 구성되어 있기 때문에 특정 단계가 차단되면 공격은 실패하게 된다. Moving Target Defense(MTD)는 보호대상의 주요 속성(네트워크, 운영체제, 소프트웨어, 데이터)을 변화시켜 Intrusion Kill Chain을 구성하는 각 단계를 차단하는 능동적 사전 보안 기술이다. MTD 전략 중에서 네트워크 주소 변이(Network Address Mutation) 기술은 보호대상의 네트워크 주소(IP. Port)를 능동적으로 변이하는 기술로써, Intrusion Kill Chain의 첫 단계인 정찰(Reconnaissance) 행위에 소요되는 비용을 급격하게 증가시킬 수 있는 효율적인 보안 기술이다. 본 논문은 네트워크 주소 변이 기술 분야의 관련 연구들을 살펴보고 네트워크 주소 변이 기술 설계 시 고려해야하는 보안 요구사항과 기능 요구사항을 제안한다.

Lateral force-displacement ductility relationship of non-ductile squat RC columns rehabilitated using FRP confinement

  • Galal, K.
    • Structural Engineering and Mechanics
    • /
    • v.25 no.1
    • /
    • pp.75-89
    • /
    • 2007
  • Post-earthquake reconnaissance and experimental research indicate that squat reinforced concrete (RC) columns in existing buildings or bridge piers are vulnerable to non-ductile shear failure. Recently, several experimental studies were conducted to investigate upgrading the shear resistance capacity of such columns in order to modify their failure mode to ductile one. Among these upgrading methods is the use of fibre-reinforced polymer (FRP) jackets. One of the preferred analytical tools to simulate the response of frame structures to earthquake loading is the lumped plasticity macromodels due to their computational efficiency and reasonable accuracy. In these models, the columns' nonlinear response is lumped at its ends. The most important input data for such type of models is the element's lateral force-displacement backbone curve. The objective of this study is to verify an analytical method to predict the lateral force-displacement ductility relationship of axially and laterally loaded rectangular RC squat columns retrofitted with FRP composites. The predicted relationship showed good accuracy when compared with tests available in the literature.

A Study on the Use of Ubiquitous Technologies in Military Sector

  • Ju Min-Seong;Kim Seok-Soo
    • International Journal of Contents
    • /
    • v.2 no.2
    • /
    • pp.6-9
    • /
    • 2006
  • The style of war in the $21^{st}$ century became digitalized cooperative union tactic, which relies heavily on the system providing real time information. Critical information is provided during the war from sensing to shooting. Therefore, epochal development in observation, reconnaissance (ISR), commanding (C4I) and precision strike (PGM) are necessary. Application of ubiquitous computing and network technologies in national defense is necessary for carrying out with various types of wars in the $21^{st}$ century. Therefore, the author wants to research core technology sector that can be developed and applied in preparation of ubiquitous national defense era. Also plans for applying recent u-Defense technology to the military sector had been suggested. Particularly, the author have suggested plans for utilizing combined future information technologies such as ad-hoc network, RFID for the logistic supply in construction of u-Defense system. By utilizing these information technologies, combat power and strategic capabilities of the military can be enhanced greatly.

  • PDF

A Study on the Optimum Design Flowrate for Tunnel-Type Small Hydro Power Plants

  • Lee, Chul-Hyung;Park, Wan-Soon
    • Korean Journal of Hydrosciences
    • /
    • v.3
    • /
    • pp.81-96
    • /
    • 1992
  • This study represents the methodology for feasibility analysis of small hydro power SHP plant. Cumulative density function of Weibull distribution and Thiessen method were adopted to decide flow duration curve at SHP candidate site. The perfomance prediction model and construction cost estimation model for tunnel-type SHP plant were developed. Eight tunnel -type SHP candidate sites existing on Han-river were selected and surveyed for actual site reconnaissance. The performance characteristics and economical feasibility for these sites were analyzed by using developed models. As a result, it was found that the optimum design flowrate with the lowest unit generation cost for tunel-type SHP candidate site were the flowrate concerming with between 20% and 30% of time ratio on the flow duration curve. Additionally, primary design specifications such as design flowrate, effective head, capacity, annual averageload factor, annual electricity production were estimated and discussed for eight surveyed SHP candidate sites.

  • PDF

A Study on the Fuzzy Controller for an Unmanned Surface Vessel Designed for Sea Probes

  • Park, Soo-Hong;Kim, Jong-Kwon;Lee, Won-Boo;Jang, Cheol-Soon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.586-589
    • /
    • 2005
  • Recently, the applications of unmanned system are steadily increasing. Unmanned automatic system is suitable for routine mission such as reconnaissance, environment monitoring, resource conservation and investigation. Especially, for the ocean environmental probe mission, many ocean engineers had scoped with the routine and even risky works. The unmanned surface vessel designed for sea probes can replace the periodic and routine missions such as water sampling, temperature and salinity measuring, etc. In this paper, an unmanned surface vessel was designed for ocean environmental probe missions. A classical and an adaptive fuzzy control system were designed and tested for the unmanned surface vessel. The design methodologies and performance of the surface vessel and fuzzy control algorithm were illustrated and verified with this unmanned vessel system designed for sea probes.

  • PDF