• Title/Summary/Keyword: reconnaissance

Search Result 367, Processing Time 0.024 seconds

A Study of Key Node Search in Reconnaissance Surveillance Sensor Networks (감시정찰 센서네트워크에서 중요노드 탐색 연구)

  • Kook, Yoon-Ju;Kang, Ji-Won;Kim, Jeom-Goo;Kim, Kiu-Nam
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.7
    • /
    • pp.1453-1458
    • /
    • 2009
  • Sensor network for the human approach in a difficult area and a wide range of surveillance and the boundaries for the purpose and mission is the utilization significantly. In this paper we searched important nodes from the surveillance reconnaissance sensor network based on the virtual data. we generated data within the sensor's measurement range in the data transmitted from sensor nodes, and used PCA(Principle Component Analysis) for searching key node. If the important sensor node searched, and we can have easy management and establishing security measures when security problems is happened about nodes. This is for the sensor network in terms of effectiveness and cost-effectively and is directly connected with life span.

MFSK Signal Individual Identification Algorithm Based on Bi-spectrum and Wavelet Analyses

  • Ye, Fang;Chen, Jie;Li, Yibing;Ge, Juan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.4808-4824
    • /
    • 2016
  • Signal individual reconnaissance and identification is an extremely important research topic in non-cooperative domains such as electronic countermeasures and intelligence reconnaissance. Facing the characteristics of the complexity and changeability of current communication environment, how to realize radiation source signal individual identification under the low SNR conditions is an emphasis of research. A novel emitter individual identification method combined bi-spectrum analysis with wavelet feature is presented in this paper. It makes a feature fusion of bi-spectrum slice characteristics and energy variance characteristics of the secondary wavelet transform coefficient to identify MFSK signals under the low SNR (signal-to-noise ratios) environment. Theoretical analyses and computer simulation results show that the proposed algorithm has good recognition performance with the ability to suppress noise and interference, and reaches the recognition rate of more than 90% when the SNR is -6dB.

The 26 september 2019 Istanbul Earthquake, its characteristics and reminders

  • Gullu, Ahmet;Yuksel, Ercan
    • Earthquakes and Structures
    • /
    • v.23 no.1
    • /
    • pp.75-85
    • /
    • 2022
  • The megacity Istanbul was struck by an earthquake on September 26, 2019, with a moment magnitude (Mw) of 5.8. The mainshock was followed by many aftershocks. Although the peak ground acceleration (PGA) of the mainshock was as low as 0.08 g, its effect has been more than expected. The intensive reconnaissance studies were accomplished in the highly populated Zeytinburnu and Pendik districts of Istanbul. While the earthquake (EQ) was relatively smaller concerning record-specific intensity measures; the damages such as concrete spalling in reinforced concrete (RC) members, detachment and diagonal cracking of infill walls in RC frames as well as cracks in masonry structures were reported from non-engineered and some engineered buildings. Many studies in the literature state that record-specific intensity measures are not sufficient to evaluate the seismic performance of the structures. The structure-specific intensity measures, soil characteristics, as well as significant duration, energy, and frequency content of EQs should be considered for the evaluation. Dependently, the frequency and energy contents of the Istanbul Earthquake are evaluated to discuss the possible reasons for the perceived effects and the damages. It is concluded that the EQ caused resonance effects on a variety of structures because of its complex frequency content as well as rather low building quality.

A Study of Security Evaluation Criteria for Reconnaissance Drone (정찰 드론 보안성 평가 기준에 대한 연구)

  • Gu, Do-hyung;Kim, Seung-joo;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.591-605
    • /
    • 2022
  • As drones are widely used, attack attempts using drone vulnerabilities are increasing, and drone security is growing in importance. This paper derives security requirements for reconnaissance drone delivered to government office through threat modeling. Threats are analyzed by the data flow of the drone and collecting possible vulnerabilities. Attack tree is built by analyzed threats. The security requirements were derived from the attack tree and compared with the security requirements suggested by national organizations. Utilizing the security requirements derived from this paper will help in the development and evaluation of secure drones.

Case Study on the Trends of North Korean Strategic UAV 'Satbyol'

  • Kang-Il Seo;Jong-Hoon Kim;Man-Hee Won;Dong-Min Lee;Jae-Hyung Bae;Sang-Hyuk Park
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.4
    • /
    • pp.317-321
    • /
    • 2023
  • After 'emphasizing the development of the precision reconnaissance drone' in 2021, North Korea unveiled two strategic drones in July 2023, just two years later. Despite the majority of experts offering negative assessments and stating that "the performance may not be good," North Korea can be seen as having not only enhanced its routine surveillance capabilities through strategic drones but also possessing limited long-range strike capabilities. In other words, although the performance of North Korea's strategic unmanned aerial vehicles (UAVs), namely the 'Satbyol-4' and '9' models, may not match that of U.S. drones, they appear to play a significant role in offsetting North Korea's considerable aerial and surveillance inferiority compared to the joint forces of South Korea and the United States. Based on these trends, North Korea seems to be concentrating on drone development to counterbalance its considerable aerial power and surveillance capabilities deficit compared to the joint forces of South Korea and the United States, especially as the global use of drones continues to increase.

Design of L-Band-Phased Array Radar System for Space Situational Awareness (우주감시를 위한 L-Band 위상배열레이다 시스템 설계)

  • Lee, Jonghyun;Choi, Eun Jung;Moon, Hyun-Wook;Park, Joontae;Cho, Sungki;Park, Jang Hyun;Jo, Jung Hyun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.29 no.3
    • /
    • pp.214-224
    • /
    • 2018
  • Continuous space development increases the occurrence probability of space hazards such as collapse of a satellite and collision between a satellite and space debris. In Korea, a space surveillance network with optical system has been developed; however, the radar technology for an independent space surveillance needs to be secured. Herein, an L-band phased array radar system for the detection and tracking of space objects is proposed to provide a number of services including collision avoidance and the prediction of re-entry events. With the mission analysis of space surveillance and the case analysis of foreign advanced radar systems, the radar parameters are defined and designed. The proposed radar system is able to detect a debris having a diameter of 10 cm at a maximum distance of 1,576 km. In addition, we confirmed the possibility of using the space surveillance mission for domestic satellites through the analysis of the detection area.

Utilization Evaluation of Digital Surface Model by UAV for Reconnaissance Survey of Construction Project (건설공사 현황측량을 위한 UAV DSM의 활용성 평가)

  • Park, Joon-Kyu;Um, Dae-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.3
    • /
    • pp.155-160
    • /
    • 2018
  • The unmanned aerial vehicle (UAV) is used in various fields, such as land surveying, facility management, and disaster monitoring and restoration because it has low operational costs, fast data acquisition, and can generate a digital surface model (DSM). Recently, the UAV has been applied to process management in construction projects. Construction projects are widely distributed not only in urban areas but also in mountainous areas and rural areas where people are rarely in traffic or in vehicles. Projects range from a few hundred meters to several kilometers long. In order to perform a reconnaissance survey, a surveying method using a global positioning system (GPS) or a total station has mainly been used. However, these methods have a disadvantage in that a lot of time is required for data acquisition. This study's purpose is to evaluate the usability of a UAV DSM for surveying a construction area. Data was acquired using the UAV and a three-dimensional (3D) laser scanner, and the DSM of the construction site was created through data processing. The UAV DSM showed accuracy to within 30 cm based on the 3D laser scanner data, and a process comparison between the two work methods was able to present the usability of the UAV DSM in the field of construction surveying. Future utilization of the UAV DSM is expected to greatly improve the efficiency of work in construction projects.

Comparison of Performance Between Incremental and Batch Learning Method for Information Analysis of Cyber Surveillance and Reconnaissance (사이버 감시정찰의 정보 분석에 적용되는 점진적 학습 방법과 일괄 학습 방법의 성능 비교)

  • Shin, Gyeong-Il;Yooun, Hosang;Shin, DongIl;Shin, DongKyoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.3
    • /
    • pp.99-106
    • /
    • 2018
  • In the process of acquiring information through the cyber ISR (Intelligence Surveillance Reconnaissance) and research into the agent to help decision-making, periodic communication between the C&C (Command and Control) server and the agent may not be possible. In this case, we have studied how to effectively surveillance and reconnaissance. Due to the network configuration, agents planted on infiltrated computers can not communicate seamlessly with C&C servers. In this case, the agent continues to collect data continuously, and in order to analyze the collected data within a short time in When communication is possible with the C&C server, it can utilize limited resources and time to continue its mission without being discovered. This research shows the superiority of incremental learning method over batch method through experiments. At an experiment with the restricted memory of 500 mega bytes, incremental learning method shows 10 times decrease in learning time. But at an experiment with the reuse of incorrectly classified data, the required time for relearn takes twice more.

Energy Efficient Clustering Algorithm for Surveillance and Reconnaissance Applications in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율적인 감시·정찰 응용의 클러스터링 알고리즘 연구)

  • Kong, Joon-Ik;Lee, Jae-Ho;Kang, Jiheon;Eom, Doo-Seop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1170-1181
    • /
    • 2012
  • Wireless Sensor Networks(WSNs) are used in diverse applications. In general, sensor nodes that are easily deployed on specific areas have many resource constrains such as battery power, memory sizes, MCUs, RFs and so on. Hence, first of all, the efficient energy consumption is strongly required in WSNs. In terms of event states, event-driven deliverly model (i.e. surveillance and reconnaissance applications) has several characteristics. On the basis of such a model, clustering algorithms can be mostly used to manage sensor nodes' energy efficiently owing to the advantages of data aggregations. Since a specific node collects packets from its child nodes in a network topology and aggregates them into one packet to relay them once, amount of transmitted packets to a sink node can be reduced. However, most clustering algorithms have been designed without considering can be reduced. However, most clustering algorithms have been designed without considering characteristics of event-driven deliverly model, which results in some problems. In this paper, we propose enhanced clustering algorithms regarding with both targets' movement and energy efficiency in order for applications of surveillance and reconnaissance. These algorithms form some clusters to contend locally between nodes, which have already detected certain targets, by using a method which called CHEW (Cluster Head Election Window). Therefore, our proposed algorithms enable to reduce not only the cost of cluster maintenance, but also energy consumption. In conclusion, we analyze traces of the clusters' movements according to targets' locations, evaluate the traces' results and we compare our algorithms with others through simulations. Finally, we verify our algorithms use power energy efficiently.

Study on Combat Efficiency According to Change in Quantity of Small Reconnaissance Drones in the Infantry Company Responsibility Area (중대급 작전지역에서 소형 감시정찰 드론의 수량 변화에 따른 전투 효율 연구)

  • Kyongsoo, Kim;Yongchan, Bae
    • Journal of the Korea Society for Simulation
    • /
    • v.31 no.4
    • /
    • pp.23-31
    • /
    • 2022
  • The development of innovative technology through the 4th Industrial Revolution is actively used in the defense field. In particular, surveillance and reconnaissance capabilities using drones will be of great help to the development of military combat capabilities, such as preparing for future military personnel reductions and reinforcing alert capabilities. In this study, we analyze the combat efficiency of drones how helpful drones can be to the military operations through simulations. Drones and enemy move in the efficient shortest path within a two-dimensional space in which operational areas are mapped into number such as detection probability. Based on the detection probability of an enemy infiltrating along the path with the lowest detection probability, the detection probability change that occurs whenever a drone is additionally deployed is presented, and we analyze the combat efficiency according to the additional drone input. Simulation proves that the increase in combat efficiency decreases as more drones are added in small operational areas such as company-level operational areas. This study is expected to contribute to the efficient operation of a limited number of drones in company-level units and to help determine the most desirable quantity of drones for additional combat power improvement.