• Title/Summary/Keyword: 위협체

Search Result 169, Processing Time 0.029 seconds

Dispersion Pattern Simulation of Tungsten Impactors According to Mass and Shape of Explosives (폭약 질량과 형상에 따른 텅스텐 충격자의 분산 패턴 시뮬레이션)

  • Sakong, Jae;Woo, Sung-Choong;Bae, Yong-Woon;Choi, Yeoun-Jin;Cha, Jung-Phil;Ga, In-Han;Kim, Tae-Won
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.38 no.12
    • /
    • pp.1325-1333
    • /
    • 2014
  • The dispersion pattern of a near miss neutralizer has a great effect on the disablement of a threatening projectile. This study numerically investigated the dispersion pattern of cylindrical tungsten impactors by an explosion in the near miss neutralizer. The mass and shape of the explosive were considered as influencing factors on the dispersion pattern. The explosives were set using two shape models: a parallel shape with the same upper and lower thicknesses and a tapered shape with different upper and lower thicknesses. In the simulation results, the dispersed impactors formed a ring-shaped pattern on a two-dimensional plane in an arbitrary space. In addition, the fire net area increased with the explosive mass when the explosive shapes were identical. In particular, the tapered shape explosive formed a larger fire net area than the parallel shape explosive. Based on the analysis of the fire net area along with the dispersion density, both the explosive mass and shape representing the physical characteristics should be considered for controlling the dispersion pattern of impactors in a near miss neutralizer.

An Economical Visualization of DMM based on Open Source (오픈소스 기반의 경제적인 DMM 시각화)

  • Park, Myeong-Chul;Park, Seok-Gyu
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.01a
    • /
    • pp.179-180
    • /
    • 2011
  • 항공기의 비행경로 시각화는 저고도 임무나 지형고도에 대한 위협을 해소하기 위하여 널리 사용되는 시스템이다. 하지만, 시스템을 구성하기 위하여 GPS와 방대한 지리정보를 구축해야하는 제약으로 인하여 게임 등의 저가형 시스템에 사용되기에는 불가능하다. 본 논문에서는 비행경로를 경제적으로 시각화하기 위한 오픈소스 기반의 DMM(Digital Moving Map) 시스템을 제한한다. 먼저 X-Plane에서 UDP를 통하여 비행정보를 전달받아 구글어스에서 시연 및 지형고도 정보를 DMM 시스템에 전달한다. DMM 시스템에서는 비행체의 고도와 현 위치의 지형고도를 매핑하여 ArcGIS의 MapServer를 통해 가져온 지도 정보상에 비행경로를 시각화한다. 시간간격에 다른 지형고도와 비행체의 고도 비교를 위하여 별도의 모니터링 화면을 제공한다. 본 논문의 결과물은 게임 및 연구 등의 목적으로 비행경로를 시각화하는 분야에 경제적인 도구로 사용될 수 있을 것이다.

  • PDF

An Analysis of Threat Factors for Strengthen Maritime Safety around Delphi/AHP-Based Launch Site and Flight Paths (Delphi/AHP 기반 발사장 주변 및 비행경로의 해상안전 강화를 위한 위협요인 분석)

  • Ahn-Tae Shin;Byung-Mun Park;Hun-Soo Byun
    • Korean Chemical Engineering Research
    • /
    • v.61 no.2
    • /
    • pp.208-216
    • /
    • 2023
  • In this study, using the Delphi method, 20 responses to 4 questions (need for launch safety control, top-priority considerations for ensuring public safety during launch, necessary improvements for securing maritime safety, and maritime safety threat factors) regarding launch vehicles and public safety were obtained from experts, and their importance was evaluated to analyze the factors that threaten the reinforcement of maritime safety around launch sites and flight paths when launching. According to the results of an analytic hierarchy process (AHP) analysis, the consistency ratio of the four questions was 4.8%, which is lower than CR ≤ 0.1(10%), and the consistency percentage of the lower measurement indicators was 3.9~5.7%. The derived importance and priority of maritime safety threat factors during launching were in the following order: Substantial human and physical damage in case of launch accidents(0.36), Prepare legal bases (e.g., penalty details) regarding maritime control(0.32), Secure the safety of personnel, equipment, and facilities in danger zone(0.31), Unauthorized entry of vessels in maritime control zones and non-compliance to restrictions(0.30). This article can serve as a reference for strengthening maritime safety in areas around launch sites and flight paths.

The EU-Korea FTA in the Viewpoints of the New Member States (신 회원국의 관점에서의 한-EU 자유무역협정)

  • Utai, Uprasen
    • International Area Studies Review
    • /
    • v.15 no.1
    • /
    • pp.3-30
    • /
    • 2011
  • When the European Union countries (EU27) are viewed as the composition between the old member countries (EU15) and the new member states (NMS12), the statistics exhibit that the EU15 is the largest trade partner of the NMS12. According to the Korea-EU FTA agreement, the existing patterns of trade among the EU15, the NMS12, and Korea may create not only the increase in trade opportunity between the NMS12 and Korea, but also the higher rivalry threat on export from the NMS12 to the EU15 destination due to the potential increase in export from Korea to the EU15 market. This research examines in both potential impacts at the 3-digit level of SITC Rev.3 industry, in the point of view of the NMS12. Various conventional trade indices are employed in the study. However, the existing trade index exhibits the limitation for measuring the different degree of rivalry threat on exports of two different exporters in the same export destination. Hence, this study develops a new trade index, the so-called Rivalry Threat Index (RTI), to measure the export competition between the NMS12 and Korea in the EU15 destination. The results indicate that from the point of view of the NMS12, the EU-Korea FTA agreement may cause Korea acts as a trade partner and as an export competitor simultaneously.

Unsupervised Learning-Based Threat Detection System Using Radio Frequency Signal Characteristic Data (무선 주파수 신호 특성 데이터를 사용한 비지도 학습 기반의 위협 탐지 시스템)

  • Dae-kyeong Park;Woo-jin Lee;Byeong-jin Kim;Jae-yeon Lee
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.147-155
    • /
    • 2024
  • Currently, the 4th Industrial Revolution, like other revolutions, is bringing great change and new life to humanity, and in particular, the demand for and use of drones, which can be applied by combining various technologies such as big data, artificial intelligence, and information and communications technology, is increasing. Recently, it has been widely used to carry out dangerous military operations and missions, such as the Russia-Ukraine war and North Korea's reconnaissance against South Korea, and as the demand for and use of drones increases, concerns about the safety and security of drones are growing. Currently, a variety of research is being conducted, such as detection of wireless communication abnormalities and sensor data abnormalities related to drones, but research on real-time detection of threats using radio frequency characteristic data is insufficient. Therefore, in this paper, we conduct a study to determine whether the characteristic data is normal or abnormal signal data by collecting radio frequency signal characteristic data generated while the drone communicates with the ground control system while performing a mission in a HITL(Hardware In The Loop) simulation environment similar to the real environment. proceeded. In addition, we propose an unsupervised learning-based threat detection system and optimal threshold that can detect threat signals in real time while a drone is performing a mission.

스마트폰 정보보호

  • Jeong, Hyeon-Cheol
    • TTA Journal
    • /
    • s.132
    • /
    • pp.28-33
    • /
    • 2010
  • 지난 10년 동안 인터넷은 우리 생활에 가히 혁명적인 영향을 끼쳐 왔습니다. 그러나 지난 10년이 인터넷 혁명의 시대였다고 한다면 향후 10년간은 모바일 혁명의 시대가 될 것이라고들 이야기합니다. 모바일 혁명 시대의 핵심에는 스마트폰이 자리하고 있습니다. 작년 이맘때쯤 국내에 아이폰이 도입되면서 국내에도 불붙기 시작한 스마트폰 광풍은 모든 비즈니스와 우리 생활에서 혁명을 예고하고 있습니다. 스마트폰 플랫폼 개발업체, 이동통신업체, 단말 기업체, 콘텐츠 개발자 등 다양한 플레이어들이 모바일 생태계 속에서 새로운 비즈니스 모델들을 탄생시키고 있고, 개인들의 생활속에서도 스마트폰은 깊숙이 자리매김하고 있습니다. 이처럼 우리 산업 전반과 삶에 새로운 변화를 일으키고 있는 스마트폰은 과연 안전한 것일까요? 스마트폰은 다양한 앱이 구동될 수 있는 개방형 플랫폼을 가지고 있고, 앱스토어를 통해 누구나 앱 사용자이자 제공자도 될 수 있습니다. 또한, 3G뿐만 아니라 Wi-Fi, Bluetooth, PC Sync 등 다양한 네트워킹 기능을 제공해 줍니다. 이러한 개방성을 바탕으로 스마트폰은 급격하게 성장하고 있지만 개방성은 악성코드 감염, 해킹, 프라이버시 침해 등 역기능이 발생할 수 있는 여건도 마련해 주고 있습니다. 실제로 스마트폰 해킹 사고는 국내외에서 빈번하게 발생되고 있고 그 피해가 증가하고 있는 추세입니다. 올 4월에 국내에서도 첫 스마트폰용 악성코드가 발견되었고, 전 세계적으로 524건의 모바일 악성코드가 발견되었습니다. 이처럼 스마트폰 해킹은 현실화되어 우리를 위협하고 있습니다. 본 특집에서는 스마트폰 보안과 관련한 정부의 정책방향, 보안위협과 사례, 프라이버시 이슈, 보안시장 전망, 국내외 표준화 동향, 전문인력 양성계획 등을 살펴보도록 하겠습니다.

  • PDF

New Terrorism and National Crisis Management (뉴테러리즘과 국가위기관리)

  • Kim, Boum-Joong;Cho, Ho-Dae
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.10
    • /
    • pp.284-291
    • /
    • 2009
  • Changes in the environment of the 21st century, national crisis, national security threats taempoga yimyeonseo type of fast, flexible and diverse, principal, resulting in a diagnosis of a threat far greater than in the past and deal with uncertainty in the features have done. That this study, the traditional concept of terrorism and to examine the characteristics of new terrorism, terrorism by analyzing the actual conditions of, any country to be a target of terrorism, and terrorism, people also can become the target of a real national crisis management in situations In contrast with the policy dimensions of terrorism is to the recommendations.

A Study on Moving Target Defense Issue and Certification Requirements (Moving Target Defense 이슈 및 평가인증 요구사항에 대한 연구)

  • Moon, Seo Yeon;Kim, Jae Woong;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.158-161
    • /
    • 2018
  • 2011년 미국에서 최초로 소개된 후 기존 보안 기술과 다른 새로운 정보시스템 보호 기술로 Moving Target Defense(MTD)가 활발히 연구 되고 있다. MTD는 시스템의 구성 요소들을 뷸규칙적이고 동적으로 변화시켜 공격표면(Attack surface)을 줄임으로써 외부 공격에 대한 보안성을 높인다. 주로 시스템 정보를 수집 및 분석하여 공격하는 보안 위협들에 효과적이며 특히 지능형 지속 보안 위협(Advanced Persistent Threat), 킬 체인(Kill-Chain) 보안에 뛰어난 성능을 기대할 수 있다. 최근 MTD 시스템 구현 및 개발로 상용화가 시작되었으나 MTD 활용을 통해 어느 정도의 보안성 및 효율성을 가지는지에 대한 성능 평가인증, 시험지침 등이 표준화 되어있지 않아 기준이 모호한 실정이다. 본 논문에서는 이러한 최근 MTD 이슈에 대해 살펴보고 MTD와 연관 되어있는 각 분야에 어떤 평가인증 요구사항들이 있는지 분석한다. 이를 통해 MTD에 어떠한 평가인증 요구사항이 있는지 도출하여 앞으로 MTD 평가인증 표준화 참고 및 활용에 기여 할 수 있을 것으로 전망한다.

Cyber Security Governance Analysis in Major Countries and Policy Implications (주요국 사이버보안 거버넌스 분석과 정책적 시사점)

  • Joo, Moon-ho;Kwon, Hun-Yeong;Lim, Jong-in
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1259-1277
    • /
    • 2018
  • This study analyzes cyber security strategies, laws, organizations, and the roles of the ministries in the US, Germany, UK, Japan, China, and Korea and draws implications for establishing a practical and efficient next generation national cyber security governance. Under this goal, this study analyzes cyber security strategies, laws, organizations, and the roles of the ministries in the US, Germany, UK, Japan, China, and Korea and draws implications for establishing a practical and efficient next generation national cyber security governance. Based on the results of this analysis, this study suggests suggestions and directions for improvement of domestic cyber security governance.

A Development of the Operational Architecture of a Low Altitude Air Defense Automation System (저고도 방공자동화체계의 운용아키덱처 개발)

  • Son, Hyun-Sik;Kwon, Yong-Soo
    • Journal of the military operations research society of Korea
    • /
    • v.34 no.1
    • /
    • pp.31-45
    • /
    • 2008
  • This paper describes a development of the operational architecture of a low altitude air defense automation system using a systems engineering approach. The future battlefield is changing to new system of systems that command and control by the network based BM/C4I. Also, it is composed of various sensors and shooters in an single theater. Future threats may be characterized as unmanned mewing bodies that the strategic effect is great such as UAVs, cruise missiles or tactical ballistic missiles. New threats such as low altitude stealth cruise missiles may also appear. The implementation of a low altitude air defense against these future threats is required to complex and integrated approach based on systems engineering. In this view, this work established an operational scenario and derived operational requirements by identifying mission and future operational environments. It is presented the operational architecture of the low altitude air defense automation system by using the CORE 5.0.