• Title/Summary/Keyword: 국방기술

Search Result 4,324, Processing Time 0.025 seconds

Removal of Clutter from Doppler Radar Signal to Measure Accurate Muzzle Velocity (도플러 레이더를 이용한 포구속도 계측 시 클러터 제거 방법)

  • Kim, Hyoung-rae
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.2
    • /
    • pp.142-150
    • /
    • 2019
  • Muzzle Velocity is one of the most important measurement items for evaluation of ammunition. The muzzle velocity is defined as the velocity when the projectile leaves the muzzle. Particularly, since the muzzle velocity is closely related to the performance of the propellant, precise measurement of muzzle velocity is required. Doppler radar is used to measure the muzzle velocity, but the quality of Doppler radar signal depends on the test site environment. In this paper, a method to remove the clutter that degrades the signal quality of Doppler radar by improving the structure of the test site and the signal processing method is suggested. For the application of the improved signal processing method, a program for acquiring Doppler radar's raw Doppler data was created. Statistical verification of the velocity data obtained through the improvement of the test site structure and signal processing method proved that the proposed method is effective for the removal of clutter as compared with the existing method.

Topology Optimization of Beam Splitter for Multi-Beam Forming Based on the Phase Field Design Method (페이즈 필드 설계법 기반의 다중 빔 형성을 위한 빔 분배기 위상최적설계)

  • Kim, Han-Min
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.32 no.3
    • /
    • pp.141-147
    • /
    • 2019
  • In this paper, a systematic beam splitter design for multi-beam forming is proposed. The objective of this research is to a design beam splitter that splits and focuses scattering microwaves into intense beams in multiple directions. It is difficult to split multi-beam to non-specific directions with theoretical approaches. Therefore, instead of using transformation optics(TO), which is a widely used process for controlling electromagnetic wave propagation, we used a systematic design process called the phase field design method to obtain an optimal topological structure of beam splitter. The objective function is to maximize the norm of electric field of the target areas of each direction. To avoid island structure and obtain the structure in one body, volume constraint is added to the optimization problem by using augmented Lagrangian. Target frequency is set to X-band 10GHz. The optimal beam splitter performed well in multi-beam forming and the transported electric energy of target areas improved. A frequency dependency test was conducted in the X-band to determine effective frequency range.

Simulation Study on Search Strategies for the Reconnaissance Drone (정찰 드론의 탐색 경로에 대한 시뮬레이션 연구)

  • Choi, Min Woo;Cho, Namsuk
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.1
    • /
    • pp.23-39
    • /
    • 2019
  • The use of drone-bots is demanded in times regarding the reduction of military force, the spread of the life-oriented thought, and the use of innovative technology in the defense through the fourth industrial revolution. Especially, the drone's surveillance and reconnaissance are expected to play a big role in the future battlefield. However, there are not many cases in which the concept of operation is studied scientifically. In this study, We propose search algorithms for reconnaissance drone through simulation analysis. In the simulation, the drone and target move linearly in continuous space, and the target is moving adopting the Random-walk concept to reflect the uncertainty of the battlefield. The research investigates the effectiveness of existing search methods such as Parallel and Spiral Search. We analyze the probabilistic analysis for detector radius and the speed on the detection probability. In particular, the new detection algorithms those can be used when an enemy moves toward a specific goal, PS (Probability Search) and HS (Hamiltonian Search), are introduced. The results of this study will have applicability on planning the path for the reconnaissance operations using drone-bots.

Quantum Inspired Eco-system Transformation in Augmented Reality (양자 기법 기반 증강현실 객체 간 생태계 변형)

  • Kim, Ju-Hwan;Jo, Dongsik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.573-575
    • /
    • 2019
  • Recently, augmented reality (AR) technology has been widely used in a variety of fields such as defense, medical, education, and entertainment. In the augmented reality environment, a user can interact a virtual object by the user 's specific behaviors. Also, it is necessary to use a technique to automatically interacts among the generated virtual objects. In this paper, we propose an authoring model to apply augmented reality environments based on quantum computing inspired entanglement and overlapping phenomenon. For example, it is possible to allow the user to automatically increase and decrease the number of the object with the characteristics of the virtual object without user intervention. As a tested platform for this purpose, this paper provide an augmented reality eco-system environment with automatic interaction among virtual animals.

  • PDF

Effect of Flight Altitude on Minimal Infrared Signature of Combat Aircraft (고도 변화에 따른 전투기 적외선 신호 최소 조건 분석)

  • Nam, Juyeong;Chang, Injoong;Lee, Yongwoo;Kim, Jihyun;Cho, Hyung Hee
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.33 no.6
    • /
    • pp.375-382
    • /
    • 2020
  • Owing to the rapid development of infrared guided weapon systems, the threat to aircraft survivability is constantly increasing, and research on infrared stealth technologies are being conducted to ensure aircraft survival. In this study, we analyze the minimum infrared signature of an aircraft according to its flight altitude by considering the characteristics of infrared guided missiles, which detect the contrast signature between the aircraft and background. We conducted computational fluid dynamics simulations for the convective coefficient, and heat transfer simulations were performed considering convection, conduction, and radiation for flight conditions. Thus, we obtained the surface temperature distribution of the aircraft and analyzed the aircraft infrared signature based on the flow characteristics around it. Furthermore, the optimum emissivity for the minimum infrared signature was derived, and the effect of the infrared signature was analyzed when this optimum emissivity was applied to the fuselage surface for each flight condition.

A study on method of setting up the defense integrated security system (군 통합보안시스템 구축 방안 연구)

  • Jang, Worl-Su;Choi, Jung-Young;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.575-584
    • /
    • 2012
  • A established military security tast based on existing manual and off-line needs the change and development to support effective and systematic task performance according to environment change of informational and scientific project in the military. Therefore this study suggests to set up the standard model of the defense integrated security system to automate and informationize major defense security task based on actual and problem in the area of major defense of security task and case analysis of these in America, England and other countries. The standard model consist of unit systems were made up integrated security system, security management system, man entrance system, vehicle entrance system, high-tech guard system, terror prevention system and the security accident analysis system, and this suggested model based on possible technology and system. If this model is apply to each real military unit, we will expect the development of defense security.

Research of organized data extraction method for digital investigation in relational database system (데이터베이스 시스템에서 디지털 포렌식 조사를 위한 체계적인 데이터 추출 기법 연구)

  • Lee, Dong-Chan;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.565-573
    • /
    • 2012
  • To investigate the business corruption, the obtainments of the business data such as personnel, manufacture, accounting and distribution etc., is absolutely necessary. Futhermore, the investigator should have the systematic extraction solution from the business data of the enterprise database, because most company manage each business data through the distributed database system, In the general business environment, the database exists in the system with upper layer application and big size file server. Besides, original resource data which input by user are distributed and stored in one or more table following the normalized rule. The earlier researches of the database structure analysis mainly handled the table relation for database's optimization and visualization. But, in the point of the digital forensic, the data, itself analysis is more important than the table relation. This paper suggests the extraction technique from the table relation which already defined in the database. Moreover, by the systematic analysis process based on the domain knowledge, analyzes the original business data structure stored in the database and proposes the solution to extract table which is related incident.

Correlation Power Analysis Attacks on the Software based Salsa20/12 Stream Cipher (소프트웨어 기반 스트림 암호 Salsa20/12에 대한 상관도 전력분석 공격)

  • Park, Young-Goo;Bae, Ki-Seok;Moon, Sang-Jae;Lee, Hoon-Jae;Ha, Jae-Cheul;Ahn, Mahn-Ki
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.35-45
    • /
    • 2011
  • The Salsa20/12 stream cipher selected for the final eSTREAM portfolio has a better performance than software implementation of AES using an 8-bit microprocessor with restricted memory space, In the theoretical approach, the evaluation of exploitable timing vulnerability was 'none' and the complexity of side-channel analysis was 'low', but there is no literature of the practical result of power analysis attack. Thus we propose the correlation power analysis attack method and prove the feasibility of our proposed method by practical experiments, We used an 8-bit RISC AVR microprocessor (ATmegal128L chip) to implement Salsa20/12 stream cipher without any countermeasures, and performed the experiments of power analysis based on Hamming weight model.

A Study on the Characteristics of Underwater Explosion for the Development of a Non-Explosive Test System (무폭약 시험 장치 개발을 위한 수중폭발 특성에 대한 연구)

  • Lee, Hansol;Park, Kyudong;Na, Yangsub;Lee, Seunggyu;Pack, Kyunghoon;Chung, Hyun
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.57 no.6
    • /
    • pp.322-330
    • /
    • 2020
  • This study deals with underwater explosion (UNDEX) characteristics of various non-explosive underwater shock sources for the development of non-explosive underwater shock testing devices. UNDEX can neutralize ships' structure and the equipment onboard causing serious damage to combat and survivability. The shock proof performance of naval ships has been for a long time studied through simulations, but full-scale Live Fire Test and Evaluation (LFT&E) using real explosives have been limited due to the high risk and cost. For this reason, many researches have been tried to develop full scale ship shock tests without using actual explosives. In this study, experiments were conducted to find the characteristics of the underwater shock waves from actual explosive and non-explosive shock sources such as the airbag inflators and Vaporizing Foil Actuator (VFA). In order to derive the empirical equation for the maximum pressure value of the underwater shock wave generated by the non-explosive impact source, repeated experiments were conducted according to the number and distance. In addition, a Shock Response Spectrum (SRS) technique, which is a frequency-based function, was used to compare the response of floating bodies generated by underwater shock waves from each explosion source. In order to compare the magnitude of the underwater shock waves generated by each explosion source, Keel Shock Factor (KSF), which is a measure for estimating the amount of shock experienced by a naval ship from an underwater explosionan, was used.

A Study on the Effect of Trust in the Army Perceived by University Students on Perception of National Security (대학생이 지각하는 군 신뢰가 안보의식에 미치는 영향에 관한 연구)

  • Chun, Kyung Kook
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.13-25
    • /
    • 2020
  • The most important responsibility of a government is to protect citizen lives and its own territory from outside threats. Especially recent political changes surrounding the Korea Peninsula seriously threaten the korean national security. To copy the situation, perception of national security based on citizen's trust in the army is needed. Accordingly survey analysis on effect of trust in the army on perception of national security had been conducted on students of a university located in Ulsan. Result of the statistical analysis as follows. First, while social contribution and military abilities among trust in the army are highly evaluated, integrity and characteristics of organizational culture are low evaluated. Second, all the correlation coefficients among studying variables are significantly positive. But correlation coefficient between social contribution and perception of national security is relatively low. Third, integrity, characteristics, and military abilities has a significant and positive effect on perception of national security, but social contribution has no significant effect.