• Title/Summary/Keyword: 국방기술

Search Result 4,325, Processing Time 0.025 seconds

Improving the Efficiency of National Defense Transportation Information System by using ITS (ITS를 활용한 국방수송정보체계 효율성 증진에 관한 연구)

  • O, Byeong-Eun;Kim, Hyeong-Jin;Son, Bong-Su
    • Journal of Korean Society of Transportation
    • /
    • v.24 no.1 s.87
    • /
    • pp.85-94
    • /
    • 2006
  • Currently, when the military performs military operations in wartime and peace time, it is important for him to obtain repeatedly updated traffic information for security of the military supply support. The purpose of this study is to present an acquisition way of the repeatedly updated traffic information which the military is available. To achieve this Purpose, firstly, this paper finded types of traffic information which the military demanded and limitations caused by an connection of traffic information network between the military and associated government agencies. Also. grasped ITS(Intelligent Transportation systems) equipment operation by associated government agencies (Ministry Construction & Transportation, Korea Highway Corporation, Seoul Metropolitan Government, National Police Agency, Korea Institute of Construction Technology) and connection situations of traffic information network among associated government agencies. On the basis of these materials, this study presented the most efficient connection method in the field of the space and the contents of traffic information between the military and associated government agencies and ITS connection system between the military and associated government agencies was contrived. Throughout the upper processes, this paper showed a method which is available for acquiring ITS traffic information of associated government agencies. In addition to the connection method of ITS traffic information network, resolutions for the problems caused by connection of ITS network were come up with. But the more deep study for this matter is needed since resolutions for the problems of the ITS network connection, which this paper presented, were very restricted.

Development of Kill Chain Based Effective Maritime Operations Model for Naval Task Forces (Kill Chain 기반 해상기동부대의 효과적인 해상작전 모델 제안)

  • Lee, Chul-Hwa;Jang, Dong-Mo;Lee, Tae-Gong;Lim, Jae-Sung
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.2
    • /
    • pp.177-186
    • /
    • 2012
  • Navy establishes the Naval Task Forces (TF) for many kinds of maritime operations. Then the TF in the maritime environment performs simultaneous component operations such as ASUW (Anti-Surface Warfare), ASW (Anti-Submarine Warfare), AAW (Anti-Aircraft Warfare), and assault operations. The TF consists of many tactical systems for the completion of missions C4I, VOIP (Voice Over Internet Protocol), DMHS (Digital Massage Handling System), and TDLs (Tactical Data Links) such as LINK-11, 16, ISDL (Inter Site Data Link). When the TF executes naval operations to complete a mission, we are interested in the kill chain for the maritime operations in the TF. The kill chain is a standard procedure for the naval operations to crush enemy defenses. Although each ship has a procedure about a manual for 'how to fight', it leave something to be desired for the TF detailed kill chain currently. Therefore, in this paper, we propose the naval TF's kill chain to perform the naval operations. Then, the operational effectiveness of the TF in the kill chain environment is determined through operation scenarios of TDL system implementation. It is to see the operational information sharing effect to a data link model based on MND-AF OV 6c (statement of tracking operational status) in the maritime operations applied to TDL and is to identify improvements in information dissemination process. We made the kill chain of maritime TF for the effective naval operations.

An Automatic Business Service Identification for Effective Relevant Information Retrieval of Defense Digital Archive (국방 디지털 아카이브의 효율적 연관정보 검색을 위한 자동화된 비즈니스 서비스 식별)

  • Byun, Young-Tae;Hwang, Sang-Kyu;Jung, Chan-Ki
    • Journal of the Korean Society for information Management
    • /
    • v.27 no.4
    • /
    • pp.33-47
    • /
    • 2010
  • The growth of IT technology and the popularity of network based information sharing increase the number of digital contents in military area. Thus, there arise issues of finding suitable public information with the growing number of long-term preservation of digital public information. According to the source of raw data and the time of compilation may be variable and there can be existed in many correlations about digital contents. The business service ontology makes knowledge explicit and allows for knowledge sharing among information provider and information consumer for public digital archive engaged in improving the searching ability of digital public information. The business service ontology is at the interface as a bridge between information provider and information consumer. However, according to the difficulty of semantic knowledge extraction for the business process analysis, it is hard to realize the automation of constructing business service ontology for mapping from unformed activities to a unit of business service. To solve the problem, we propose a new business service auto-acquisition method for the first step of constructing a business service ontology based on Enterprise Architecture.

Research on Broadband Signal Processing Techniques for the Small Millimeter Wave Tracking Radar (소형 밀리미터파 추적 레이더를 위한 광대역 신호처리 기술 연구)

  • Choi, Jinkyu;Na, Kyoung-Il;Shin, Youngcheol;Hong, Soonil;Park, Changhyun;Kim, Younjin;Kim, Hongrak;Joo, Jihan;Kim, Sosu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.6
    • /
    • pp.49-55
    • /
    • 2021
  • Recently, a small tracking radar requires the development of a small millimeter wave tracking radar having a high range resolution that can acquire and track a target in various environments and disable the target system with a single blow. Small millimeter wave tracking radar with high range resolution needs to implement a signal processor that can process wide bandwidth signals in real time and meet the requirements of small tracking radar. In this paper, we designed a signal processor that can perform the role and function of a signal processor for a small millimeter wave tracking radar. The signal processor for the small millimeter wave tracking radar requires the real-time processing of input signal of OOOMHz center frequency and OOOMHz bandwidth from 8 channels. In order to satisfy the requirements of the signal processor, the signal processor was designed by applying the high-performance FPGA (Field Programmable Gate Array) and ADC (Analog-to-digital converter) for pre-processing operations, such as DDC (Digital Down Converter) and FFT (Fast Fourier Transform). Finally, the signal processor of the small millimeter wave tracking radar was verified via performance test.

A Comparative Study of Machine Learning Algorithms Using LID-DS DataSet (LID-DS 데이터 세트를 사용한 기계학습 알고리즘 비교 연구)

  • Park, DaeKyeong;Ryu, KyungJoon;Shin, DongIl;Shin, DongKyoo;Park, JeongChan;Kim, JinGoog
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.3
    • /
    • pp.91-98
    • /
    • 2021
  • Today's information and communication technology is rapidly developing, the security of IT infrastructure is becoming more important, and at the same time, cyber attacks of various forms are becoming more advanced and sophisticated like intelligent persistent attacks (Advanced Persistent Threat). Early defense or prediction of increasingly sophisticated cyber attacks is extremely important, and in many cases, the analysis of network-based intrusion detection systems (NIDS) related data alone cannot prevent rapidly changing cyber attacks. Therefore, we are currently using data generated by intrusion detection systems to protect against cyber attacks described above through Host-based Intrusion Detection System (HIDS) data analysis. In this paper, we conducted a comparative study on machine learning algorithms using LID-DS (Leipzig Intrusion Detection-Data Set) host-based intrusion detection data including thread information, metadata, and buffer data missing from previously used data sets. The algorithms used were Decision Tree, Naive Bayes, MLP (Multi-Layer Perceptron), Logistic Regression, LSTM (Long Short-Term Memory model), and RNN (Recurrent Neural Network). Accuracy, accuracy, recall, F1-Score indicators and error rates were measured for evaluation. As a result, the LSTM algorithm had the highest accuracy.

A Study on the Cloud Detection Technique of Heterogeneous Sensors Using Modified DeepLabV3+ (DeepLabV3+를 이용한 이종 센서의 구름탐지 기법 연구)

  • Kim, Mi-Jeong;Ko, Yun-Ho
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.5_1
    • /
    • pp.511-521
    • /
    • 2022
  • Cloud detection and removal from satellite images is an essential process for topographic observation and analysis. Threshold-based cloud detection techniques show stable performance because they detect using the physical characteristics of clouds, but they have the disadvantage of requiring all channels' images and long computational time. Cloud detection techniques using deep learning, which have been studied recently, show short computational time and excellent performance even using only four or less channel (RGB, NIR) images. In this paper, we confirm the performance dependence of the deep learning network according to the heterogeneous learning dataset with different resolutions. The DeepLabV3+ network was improved so that channel features of cloud detection were extracted and learned with two published heterogeneous datasets and mixed data respectively. As a result of the experiment, clouds' Jaccard index was low in a network that learned with different kind of images from test images. However, clouds' Jaccard index was high in a network learned with mixed data that added some of the same kind of test data. Clouds are not structured in a shape, so reflecting channel features in learning is more effective in cloud detection than spatial features. It is necessary to learn channel features of each satellite sensors for cloud detection. Therefore, cloud detection of heterogeneous sensors with different resolutions is very dependent on the learning dataset.

A Study on 3D Virtual Restoration and Convergence Utilization of Gas Masks for Digital Reproduction of War Cultural Heritage (전쟁 문화유산 디지털 재현을 위한 방독면 3D 가상 복원 및 융합 활용 연구)

  • Hyoung-Ki Ahn;Seung-Jun Oh;Ho-Yeon Lee;Young-Guy Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.1
    • /
    • pp.89-95
    • /
    • 2023
  • In January 2007, the Remains Excavation and Investigation Team of the Ministry of National Defense was established, and full-scale excavation of remains was promoted. Currently, the scope of the excavation is being expanded to Baekma Hill within the DMZ, where fierce battles were fought during the Korean War. Now, many remains and remains are being excavated in Baekma hill. Most are in damaged condition. Therefore, in this study, the original form of the excavated remains was restored using 3D scanning and 3D modeling. This digital restoration method can be an alternative to compensate for the disadvantages of the manual method. Currently, various digital restorations using 3D technology are active in the field of cultural heritage. Digitally restored materials can be used as basic data for digital heritage. Based on this, various contents related to excavation of remains and patriots and veterans can be developed. Furthermore, if digital human restoration is made based on the excavated remains, it will be possible to reproduce the appearance of the dead.

Re-establishing Method of Stability Margin Airworthiness Certification Criteriafor Flight Control System (비행제어시스템 안정성 여유 감항인증 기준 재정립 방안)

  • Kim, Dong-hwan;Kim, Chong-sup;Lim, Sangsoo;Koh, Gi-oak;Kim, Byoung soo
    • Journal of Aerospace System Engineering
    • /
    • v.16 no.1
    • /
    • pp.17-27
    • /
    • 2022
  • A certain level of stability margin airworthiness criteria should be met to secure robustness against uncertainties between the real plant and the model in a flight control system design. The U.S. Department of Defense (DoD) specification of MIL-F-9490D and airworthiness certification standard of MIL-HDBK-516B uses gain and phase margin criteria of flight control system. However, the same stability margin criteria is applied at all development phases without considering the design maturity of each development phase of the aircraft. Ultimately, a problem arises when the aircraft operation envelope is excessively restricted. This paper proposes the relation of handling qualities and stability margin, and presents re-established stability margin criteria as a development phases and verification methods. The results of the research study are considered to contribute to the verification of the stability margin criteria more flexibly and effectively by applying the method to not only the currently manned developing aircrafts but also the unmanned vehicle to be developed in the future.

Analysis of Infiltration Route using Optimal Path Finding Methods and Geospatial Information (지형공간정보 및 최적탐색기법을 이용한 최적침투경로 분석)

  • Bang, Soo Nam;Heo, Joon;Sohn, Hong Gyoo;Lee, Yong Woong
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.1D
    • /
    • pp.195-202
    • /
    • 2006
  • The infiltration route analysis is a military application using geospatial information technology. The result of the analysis would present vulnerable routes for potential enemy infiltration. In order to find the susceptible routes, optimal path search algorithms (Dijkstra's and $A^*$) were used to minimize the cost function, summation of detection probability. The cost function was produced by capability of TOD (Thermal Observation Device), results of viewshed analysis using DEM (Digital Elevation Model) and two related geospatial information coverages (obstacle and vegetation) extracted from VITD (Vector product Interim Terrain Data). With respect to 50m by 50m cells, the individual cost was computed and recorded, and then the optimal infiltration routes was found while minimizing summation of the costs on the routes. The proposed algorithm was experimented in Daejeon region in South Korea. The test results show that Dijkstra's and $A^*$ algorithms do not present significant differences, but A* algorithm shows a better efficiency. This application can be used for both infiltration and surveillance. Using simulation of moving TOD, the most vulnerable routes can be detected for infiltration purpose. On the other hands, it can be inversely used for selection of the best locations of TOD. This is an example of powerful geospatial solution for military application.

A Study on 3-Dimensional Near-Field Source Localization Using Interference Pattern Matching in Shallow Water Environments (천해에서 간섭패턴 정합을 이용한 근거리 음원의 3차원 위치추정 기법연구)

  • Kim, Se-Young;Chun, Seung-Yong;Son, Yoon-Jun;Kim, Ki-Man
    • The Journal of the Acoustical Society of Korea
    • /
    • v.28 no.4
    • /
    • pp.318-327
    • /
    • 2009
  • In this paper, we propose a 3-D geometric localization method for near-field broadband source in shallow water environments. According to the waveguide invariant theory, slope of the interference pattern which is seen in a sensor spectrogram directly proportional to a range of the source. The relative ratio of the range between source and sensors was estimated by matching of two interference patterns in spectrogram. Then this ratio is applied to the Apollonius's circle which shows the locus of a source whose range ratio from two sensors is constant. Two Apollonius's circles from three sensors make the intersection point that means the horizontal range and the azimuth angle of the source. And this intersection point is constant with source depth. Therefore the source depth can be estimated using 3-D hyperboloid equation whose range difference from two sensors is constant. To evaluate a performance of the proposed localization algorithm, simulation is performed using acoustic propagation program and analysis of localization error is demonstrated. From simulation results, error estimate for range and depth is described within 50 m and 15 m respectively.