• Title/Summary/Keyword: 국방기술

Search Result 4,307, Processing Time 0.023 seconds

Calibrating Electrode Misplacement in Underwater Electric Field Sensor Arrays for the Electric Field-Based Localization of Underwater Vessels (수중 이동체의 전기장 신호 기반 위치추정을 위한 수중 전기장 배열센서의 전극 부설 위치 오차 보정 방법)

  • Kim, Jason;Lee Ingyu;Bae, Ki-Woong;Yu, Son-Cheol
    • Journal of Sensor Science and Technology
    • /
    • v.31 no.5
    • /
    • pp.330-336
    • /
    • 2022
  • This paper proposes a method to calibrate the electrode misplacement in underwater electric field sensor arrays (EFSAs) for accurate measurements of underwater electric field signatures. The electrode misplacement of an EFSA was estimated by measuring the electric field signatures generated by a known electric source and by comparing the measurements with the theoretical calculations under similar measurement conditions. When the EFSA measured the electric field signatures induced by an unknown electric source, the electric properties of the unknown electric source were approximated by considering the optimized estimation of the electrode misplacement of the EFSA. Finally, the measured electric field signatures were calibrated by calculating the theoretical electric field signatures to be measured with an ideally installed EFSA without electrode misplacement; the approximated electric properties of the unknown electric source were also taken into account. Simulations were conducted to test the proposed calibration method. The results showed that the electrode misplacement could be estimated. Further, the electric field measurements and the electric field-based localization of underwater vessels became more accurate after the application of the proposed calibration method. The proposed method will contribute to applications such as the detection and localization of underwater electric sources, which require accurate measurements of underwater electric field signatures.

A Study on Structural-Thermal-Optical Performance through Laser Heat Source Profile Modeling Using Beer-Lambert's Law and Thermal Deformation Analysis of the Mirror for Laser Weapon System (Beer-Lambert 법칙을 적용한 레이저 열원 프로파일 모델링 및 레이저무기용 반사경의 열변형 해석을 통한 구조-열-광학 성능 연구)

  • Hong Dae Gi
    • Journal of Aerospace System Engineering
    • /
    • v.17 no.4
    • /
    • pp.18-27
    • /
    • 2023
  • In this paper, the structural-thermal-optical performance analysis of the mirror was performed by setting the laser heat source as the boundary condition of the thermal analysis. For the laser heat source model, the Beer-Lambert model considering semi-transparent optical material based on Gaussian beam was selected as the boundary condition, and the mechanical part was not considered, to analyze the performance of only the mirror. As a result of the thermal analysis, thermal stress and thermal deformation data due to temperature change on the surface of the mirror were obtained. The displacement data of the surface due to thermal deformation was fitted to a Zernike polynomial to calculate the optical performance, through which the performance of the mirror when a high-energy laser was incident on the mirror could be predicted.

A Study on Developing a Model for the History Compilation of Public Institutions (공공기관의 기관사(機關史) 편찬 모형 개발에 관한 연구)

  • Chan Mi Koo;Yeon-Kyoung Chung
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.23 no.3
    • /
    • pp.21-37
    • /
    • 2023
  • The history compilation of public institutions is a type of record compilation that can be very useful record content for users. The study aims to develop a model for the history compilation of public institutions that can be flexibly applied to the task while providing practical guidance for the actual work of institutional history compilation. To achieve this goal, literature reviews, task analyses, questionnaire surveys, in-depth interviews, and expert evaluations were conducted. Based on these results, the 5 processes were organized into 20 work areas and 45 detailed work elements, which were divided into 31 essential tasks and 14 optional tasks to design the final version of an institutional history compilation model for public institutions. The model of this study can be used in public institutions to carry out tasks regarding history compilation and can also be used to establish schedules and plans by identifying overall tasks to be performed in the preparation stage for history compilation.

Resupply Behavior Modeling in Small-unit Combat Simulation using Decision Trees (소부대 전투 모의를 위한 의사결정트리 기반 재보급 행위 모델링)

  • Seil An;Sang Woo Han
    • Journal of the Korea Society for Simulation
    • /
    • v.32 no.3
    • /
    • pp.9-21
    • /
    • 2023
  • The recent conflict between Russia and Ukraine underscores the significant of military logistics support in modern warfare. Military logistics support is intricate and specialized, and traditionally centered on the mission-level operational analysis and functional models. Nevertheless, there is currently increasing demand for military logistics support even at the engagement level, especially for resupply using unmanned transport assets. In response to the demand, this study proposes a task model of the military logistics support for engagement-level analysis that relies on the logic of ammunition resupply below the battalion level. The model employs a decisions tree to establish the priority of resupply based on variables such as the enemy's level of threat and the remaining ammunition of the supported unit. The model's feasibility is demonstrated through a combat simulation using OneSAF.

Development of Simulation Architecture Framework for Simulation Based Acquisition (모의기반획득을 위한 시뮬레이션 아키텍처 프레임워크 개발)

  • Cho, Kyu-Tae;Shim, Jun-Yong;Lee, Yong-Heon;Lee, Seung-Young;Kim, Sae-Hwan
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.3
    • /
    • pp.81-89
    • /
    • 2010
  • Recent modeling and simulation technology is being used in various fields. Especially in the field of military, Simulation-Based Acquisition (SBA) is recognized as a essential policy. To effectively carry out SBA, modeling and simulation techniques should be applied in the whole life-cycle for the weapon system development, and simulation architecture framework which provides easily reusable and interoperability is needed. Through reusability and interoperability, the costs of constructing the integrated collaborate environment for simulation based acquisition can be minimized. In this study, we define requirements, issues for enhancing reusability and interoperability, and propose simulation framework as a solution of the problem including structural design. Proposing simulation framework provides common functions for producing simulator as reusable units and easily changeable structure on user's purpose. In addition, we provide the result for applying simulation framework to our project.

Research trends of biomimetic covert underwater acoustic communication (생체모방 은밀 수중 음향 통신 연구 동향)

  • Seol, Seunghwan;Lee, Hojun;Kim, Yongcheol;Kim, Wanjin;Chung, Jaehak
    • The Journal of the Acoustical Society of Korea
    • /
    • v.41 no.2
    • /
    • pp.227-234
    • /
    • 2022
  • Covert Underwater Communication (CUC) signals should not be detected by other unintended users. Similar to the method used in Radio Frequency (RF), covert communication technique sending information underwater is designed in consideration of the characteristics of Low Probability of Detection (LPD) and Low Probability of Intercept (LPI). These conventional methods, however, are difficult to be used in the underwater communications because of the narrow frequency bandwidth. Unlike the conventional methods of reducing transmission power or increasing the modulation bandwidth, a method of mimicking the acoustic signal of an underwater mammal is being studied. The biomimetic underwater acoustic communication mainly mimics the click or whistle sound produced by dolphin or whale. This paper investigates biomimetic communication method and introduces research trends to understand the potential for the development of such biomimetic covert underwater acoustic communication and future research areas.

A Study on the Effects of Information Security Policy Types and Information Security Stress on Information Security Behavior (정보보안 정책 유형과 보안 스트레스가 정보보안 행동에 미치는 영향에 대한 연구)

  • Lee Kwang Ho;Jung Chan gi
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.113-120
    • /
    • 2022
  • Despite the limitations of existing security policies due to technological development, companies are unable to actively respond to changes by maintaining a closed security policy. This study classified information security policy into three types: regulatory type policy, advisory type policy, and informative type policy. For each classified policy type, the effect on the information security policy compliance behavior of organizational members was investigated by applying the extended theory of planned behavior, and the moderating effect of information security stress was investigated. SmartPLS 2.0 and SPSS 21.0, which are structural equation modeling techniques, were used to analyze the relationship affecting each factor. As a result of the study, regulatory type, advisory type, and informative type security policies affected organizational members' information security policy compliance behavior, and security stress had an effect on information security compliance attitudes and subjective norms on information security, which are prerequisites for planned behavior theory. gave. This study suggests that various types of corporate information security policies can be applied and that security stress can affect information security behaviors of members.

A Study on Threat Detection Model using Cyber Strongholds (사이버 거점을 활용한 위협탐지모델 연구)

  • Inhwan Kim;Jiwon Kang;Hoonsang An;Byungkook Jeon
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.19-27
    • /
    • 2022
  • With the innovative development of ICT technology, hacking techniques of hackers are also evolving into sophisticated and intelligent hacking techniques. Threat detection research to counter these cyber threats was mainly conducted in a passive way through hacking damage investigation and analysis, but recently, the importance of cyber threat information collection and analysis is increasing. A bot-type automation program is a rather active method of extracting malicious code by visiting a website to collect threat information or detect threats. However, this method also has a limitation in that it cannot prevent hacking damage because it is a method to identify hacking damage because malicious code has already been distributed or after being hacked. Therefore, to overcome these limitations, we propose a model that detects actual threats by acquiring and analyzing threat information while identifying and managing cyber bases. This model is an active and proactive method of collecting threat information or detecting threats outside the boundary such as a firewall. We designed a model for detecting threats using cyber strongholds and validated them in the defense environment.

A Study on the Characteristics of the New Generation of Soldiers and the Ways to Cultivate the Leadership of Marine Corps Officers (신세대 장병의 특성과 해병대 간부들의 리더십 배양 방안에 관한 연구)

  • Kim Ho Chun
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.149-158
    • /
    • 2022
  • R.o.K Marine Corps was established on April 15, 1949 at Deoksan Air Base in Jinhae. When they fought in the Korean War and the Vietnam War, they were sure to win, so they were loved and trusted by the people. Strong combat power is only possible when an advanced barracks culture is established. Today's new generation of soldiers have strong characteristics ; self-centered and individualistic. R.o.K Marine Corps officers must understand the characteristics of the new generation of soldiers and strive to develop creative leadership in order to make them utilize their characteristics. In addition, as cutting-edge science and technology develops along with the 4th industrial revolution, R.o.K Marine Corps officers should work hard to acquire professional tactical knowledge and self-development. Therefore, Marine Corps officers should do their best to understand the characteristics of the new generation of soldiers and demonstrate leadership to become a strong force trusted by the people.

Enhancing Existing Products and Services Through the Discovery of Applicable Technology: Use of Patents and Trademarks (제품 및 서비스 개선을 위한 기술기회 발굴: 특허와 상표 데이터 활용)

  • Seoin Park;Jiho Lee;Seunghyun Lee;Janghyeok Yoon;Changho Son
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.4
    • /
    • pp.1-14
    • /
    • 2023
  • As markets and industries continue to evolve rapidly, technology opportunity discovery (TOD) has become critical to a firm's survival. From a common consensus that TOD based on a firm's capabilities is a valuable method for small and medium-sized enterprises (SMEs) and reduces the risk of failure in technology development, studies for TOD based on a firm's capabilities have been actively conducted. However, previous studies mainly focused on a firm's technological capabilities and rarely on business capabilities. Since discovered technologies can create market value when utilized in a firm's business, a firm's current business capabilities should be considered in discovering technology opportunities. In this context, this study proposes a TOD method that considers both a firm's business and technological capabilities. To this end, this study uses patent data, which represents the firm's technological capabilities, and trademark data, which represents the firm's business capabilities. The proposed method comprises four steps: 1) Constructing firm technology and business capability matrices using patent classification codes and trademark similarity group codes; 2) Transforming the capability matrices to preference matrices using the fuzzy function; 3) Identifying a target firm's candidate technology opportunities using the collaborative filtering algorithm; 4) Recommending technology opportunities using a portfolio map constructed based on technology similarity and applicability indices. A case study is conducted on a security firm to determine the validity of the proposed method. The proposed method can assist SMEs that face resource constraints in identifying technology opportunities. Further, it can be used by firms that do not possess patents since the proposed method uncovers technology opportunities based on business capabilities.