• Title/Summary/Keyword: 전장설계

Search Result 253, Processing Time 0.026 seconds

Behavior of Yellow Tail , Seriola quinqueradiata and File Fish , Navodon Modestus to the Model Set Net (모형정치망에 대한 방어 및 말쥐치의 행동)

  • Gwon, Hyeok-Sa;Lee, Byeong-Gi
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.26 no.3
    • /
    • pp.230-236
    • /
    • 1990
  • To examine the behavior of yellow tail Seriola quinqueradiata and of file fish Navodon modestus to set net, the 1/30 scale model net of the actual set net used in the east coast of Korea was made of netting and set in the indoor experimental tank(700cm W$\times$700cm L$\times$100cm D), of which the water depth was kept 70cm. Total length of yellow tail examined were 37~45cm and file fish were 18~21cm. The fishes were released as groups of 3 to 20 individuals. The number of fish entered into the pound net or the bag net, escaped from the net was counted every minute and accumulated for 10minutes to check the ratio entered and the ratio escaped. The result obtained can be summarized as follows: 1. In case of yellow tail, even though the ratio entered into the pound net was not so high, that into the bag net was comparatively high. Traces of the fish swimming were comparatively smooth and both entering into the pound net and escaping from it was easily done. 2. In case of file fish, even though the ratio entered into the pound net was higher than that of yellow tail, that into the bag net was lower than that into the pound net. Traces of the fish swimming were roundly meandered. Entering into the bag net was not so smoothly done, even though that into the playground was smoothly done. 3. Both yellow tail and file fish, the ratio escaped from the bag net was almost0 and that from the pound net was less than 10%.

  • PDF

A Study on OBC Integrated 1.5kW LDC Converter for Electric Vehicle. (전기자동차용 OBC 일체형 1.5kW급 LDC 컨버터에 대한 연구)

  • Kim, Hyung-Sik;Jeon, Joon-Hyeok;Kim, Hee-Jun;Ahn, Joon-Seon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.4
    • /
    • pp.456-465
    • /
    • 2019
  • PHEV(Plug in Hybrid Electric Vehicle) and BEV(Battery Electric Vehicle) equip high voltage batteries to drive motor and vehicle electric system. Those vehicle require OBC(On-Board Charger) for charging batteries and LDC(Low DC/DC Converter) for converting from high voltage to low voltage. Since the charger and the converter actually separate each other in electrical vehicles, there is a margin to reduce the vehicle weight and area of installation by integration two systems. This paper studies a 1.5kW LDC converter that can be integrated into an OBC using an isolated current-fed converter by simplifying the design of LDC transformers. The proposed LDC can control the final output voltage of the LDC by using a fixed arbitrary output voltage of the bidirectional buck-boost converter, so that Compared to the existing OBC-LDC integrated system, it has the advantage of simplifying the transformer design considering the battery voltage range, converter duty ratio and OBC output turn ratio. Prototype of the proposed LDC was made to confirm normal operation at 200V ~ 400V input voltage and maximum efficiency of 91.885% was achieved at rated load condition. In addition, the OBC-LDC integrated system achieved a volume of about 6.51L and reduced the space by 15.6% compared to the existing independent system.

A Study on the Framework for Analyzing the Effectiveness of Cyber Weapon Systems Associated with Cyberspace and Physical Space (사이버 공간과 물리 공간이 연계된 사이버 무기체계의 효과성 분석 프레임워크 연구)

  • Jang, Ji-su;Kim, Kook-jin;Yoon, Suk-joon;Park, Min-seo;Ahn, Myung-Kil;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.111-126
    • /
    • 2022
  • As operations that were only conducted in physical space in the past change to operations that include cyberspace, it is necessary to analyze how cyber attacks affect weapon systems using cyber systems. For this purpose, it would be meaningful to analyze a tool that analyzes the effects of physical weapon systems in connection with cyber. The ROK military has secured and is operating the US JMEM, which contains the results of analyzing the effects of physical weapon systems. JMEM is applied only to conventional weapon systems, so it is impossible to analyze the impact of cyber weapon systems. In this study, based on the previously conducted cyber attack damage assessment framework, a framework for analyzing the impact of cyber attacks on physical missions was presented. To this end, based on the MOE and MOP of physical warfare, a cyber index for the analysis of cyber weapon system effectiveness was calculated. In addition, in conjunction with JMEM, which is used as a weapon system effect manual in physical operations, a framework was designed and tested to determine the mission impact by comparing and analyzing the results of the battle in cyberspace with the effects of physical operations. In order to prove the proposed framework, we analyzed and designed operational scenarios through domestic and foreign military manuals and previous studies, defined assets, and conducted experiments. As a result of the experiment, the larger the decrease in the cyber mission effect value, the greater the effect on physical operations. It can be used to predict the impact of physical operations caused by cyber attacks in various operations, and it will help the battlefield commander to make quick decisions.

Design Anamorphic Lens Thermal Optical System that Focal Length Ratio is 3:1 (초점거리 비가 3:1인 아나모픽 렌즈 열상 광학계 설계)

  • Kim, Se-Jin;Ko, Jung-Hui;Lim, Hyeon-Seon
    • Journal of Korean Ophthalmic Optics Society
    • /
    • v.16 no.4
    • /
    • pp.409-415
    • /
    • 2011
  • Purpose: To design applied anamorphic lens that focal length ratio is 3:1 optical system to improve detecting distance. Methods: We defined a boundary condition as $50^{\circ}{\sim}60^{\circ}$ for viewing angle, horizontal direction 36mm, vertical direction 12 mm for focal length, f-number 4, $15{\mu}m{\times}15{\mu}m$ for pixel size and limit resolution 25% in 33l p/mm. Si, ZnS and ZnSe as a materials were used and 4.8 ${\mu}m$, 4.2 ${\mu}m$, 3.7 ${\mu}m$ as a wavelength were set. optical performance with detection distance, narcissus and athermalization in designed camera were analyzed. Results: F-number 4, y direction 12 mm and x direction 36 mm for focal length of the thermal optical system were satisfied. Total length of the system was 76 mm so that an overall volume of the system was reduced. Astigmatism and spherical aberration was within ${\pm}$0.10 which was less than 2 pixel size. Distortion was within 10% so there was no matter to use as a thermal optical camera. MTF performance for the system was over 25% from 33l p/mm to full field so it was satisfied with the boundary condition. Designed optical system was able to detect up to 2.9 km and reduce a diffused image by decreasing a narcissus value from all surfaces except the 4th surface. From sensitivity analysis, MTF resolution was increased on changing temperature with the 5th lens which was assumed as compensation. Conclusions: Designed optical system which used anamorphic lens was satisfied with boundary condition. an increasing resolution with temperature, longer detecting distance and decreasing of narcissus were verified.

I3A Framework of Defense Network Centric Based C2 Facilities (국방 NC 기반 C2 시설 I3A Framework)

  • Kim, Young-Dong;Lee, Tae-Gong;Park, Bum-Shik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.8
    • /
    • pp.615-625
    • /
    • 2014
  • Ministry of National Defense, MND, established a "Master Plan of Military Facility" in 2010 based on the defense reform to prepare for future war. It was a plan for consolidating small military facilities into battalion units, reflecting on and preparing for the needs of various changes in defense environment as well as balanced growth of ROK Army, Navy, and Air Force. However, to move forward with "Military Facility Master Plan," current design criteria for military facilities need to be revised to be enacted due to numerous calculation errors in facility footprints because of the absence of a sound facility criteria. Because the future war environment will be changed from Platform basis to Network Centric Warfare basis, Command & Control capability of C4I systems is getting more important. Therefore, Successful mission accomplishment can be secured by convergence of facility and military Information Technology(IT). So, MND should quickly prepare for the operational guidance, design criteria and policy that are suitable for Network Centric Warfare accomplishment, and implement infrastructure of IT and installation of C2 facility in conjunction with consolidation movement of military facilities. In this paper, we propose the defense I3A framework in order to solve this problem.

Implementation of Smartphone Adaptor for Real-Time Live Simulations (실시간 Live 시뮬레이션을 위한 스마트폰 연동기 구현)

  • Kim, Hyun-Hwi;Lee, Kang-Sun
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.1
    • /
    • pp.9-20
    • /
    • 2013
  • Defense M&S for weapons effectiveness is a realistic way to support virtual warfare similar to real warfare. As the war paradigm becomes platform-centric to network-centric, people try to utilize smartphones as the source of sensor, and command/control data in the simulation-based weapons effectiveness analysis. However, there have been limited researches on integrating smartphones into the weapon simulators, partly due to high modeling cost - modeling cost to accomodate client-server architecture, and re-engineering cost to adapt the simulator on various devices and platforms -, lack of efficient mechanisms to exchange large amount of simulation data, and low-level of security. In this paper, we design and implement Smartphone Adaptor to utilize smartphones for the simulationbased weapons effectiveness analysis. Smartphone Adaptor automatically sends sensor information, GPS and motion data of a client's smartphone to a simulator and receives simulation results from the simulator on the server. Also, we make it possible for data to be transferred safely and quickly through JSON and SEED. Smartphone Adaptor is applied to OpenSIM (Open simulation engine for Interoperable Models) which is an integrated simulation environment for weapons effectiveness analysis, under development of our research team. In this paper, we will show Smartphone Adaptor can be used effectively in constructing a Live simulation, with an example of a chemical simulator.

An Analysis of Influence Factor of ROK Military Supply-Network Efficiency by Social Network Analysis (사회연결망분석을 통한 한국군 공급네트워크 구조의 효율성 영향요인 분석)

  • Eom, Jin-Wook;Won, You-Jae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.47-55
    • /
    • 2019
  • The army of republic of korea have been continued to transform their logistics support system structure for better efficient logistics support system in preparation for the future environment. Logistics system has supply network structure which is connected by various units and supply network structure received attention as a factor of success of supply network. Many researchers have continuously researched inventory management, transportation or economy factors for supply network, but such a study on the one in military supply network structure analysis is still slower than the study of analysis of other factors until now. In this study, we identify military supply network structure influence factor by application of social network analysis method which is used broadly and analyze co-relationships between supply network structure influence factor and valued APL(average path length) as a criteria of efficiency of military supply network. By this study it has value of military supply network influence factor identification for the better military supply network fabrication.

A Study on the Methodology for Combat Experimental Testing of Future Infantry Units using Simulation (시뮬레이션을 활용한 미래 보병부대 전투실험)

  • Lim, Jong-Won;Choi, Bong-Wan;Yim, Dong-Soon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.429-438
    • /
    • 2021
  • Owing to the development of science technology, particularly the smart concept and defense policy factors of the 4th industry, military weapon systems are advanced, and the scientific and operational force is reduced dramatically. The aspect of the future war is characterized by the operation of troops with reduced forces from advanced and scientific weapon systems in an operational area that has expanded more than four times compared to the present. Reflecting on these situational factors, it is necessary to improve combat methods based on the changes in the battlefield environment and advanced weapon systems. In this study, to find a more efficient future combat method in a changing war pattern, this study applied the battle experiment methodology using Vision21 war game model, which is an analytical model used by the army. Finally, this study aimed to verify the future combat method and unit structure. Therefore, the scenario composition and experiment method that reflect the change in the ground operational environment and weapon system was first composed. Subsequently, an analysis method based on the combat effectiveness was applied to verify the effective combat performance method and unit structure of future infantry units.

A Study on the Method of Computing Standard Wartime Maintenance Man-Hour Incorporating Wartime Maintenance Condition (전장 정비환경을 고려한 전시 표준정비인시 산출방안 연구)

  • Kim, Min-Hyuk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.477-483
    • /
    • 2021
  • In a military maintenance system, the standard maintenance man-hour of weapon systems is a tool to estimate the maintenance capabilities of maintenance units, provide standards for determining the maintenance needs and workload, and provide basic data for establishing a maintenance plan. The standard maintenance man-hours of major weapon systems have already been derived and used, but the standard maintenance man-hour in a wartime maintenance environment has not been computed. Therefore, the standard wartime maintenance man-hours need to be derived and This study proposes a process and method of computing the maintenance man-hours. In addition, this work suggests the criteria of collecting and screening data that is necessary for estimating the standard maintenance man-hours and introduces a methodology for analyzing the characteristics of maintenance man-hour distribution in the process. The proposed process first designs a model that reflects the wartime maintenance environment, selects statistical techniques, collects maintenance data, analyzes the descriptive statistics, estimates the distribution, and finally presents representative values of maintenance man-hour. Based on the proposed method, the standard wartime maintenance man-hours of the four weapon systems were calculated, and the distribution of the maintenance man-hours was analyzed to follow a lognormal distribution, and the method presented reliable results.

A study on the cyber common operation picture for situational awareness in cyberspace (사이버공간 내 상황인식을 위한 사이버 공통 작전 상황도 연구)

  • Kim, Kook-jin;Youn, Jae-pil;Yoon, Suk-joon;Kang, Ji-won;Kim, Kyung-shin;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.87-101
    • /
    • 2022
  • Cyber-attacks occur in the blink of an eye in cyberspace, and the damage is increasing all over the world. Therefore, it is necessary to develop a cyber common operational picture that can grasp the various assets belonging to the 3rd layer of cyberspace from various perspectives. By applying the method for grasping battlefield information used by the military, it is possible to achieve optimal cyberspace situational awareness. Therefore, in this study, the visualization screens necessary for the cyber common operational picture are identified and the criteria (response speed, user interface, object symbol, object size) are investigated. After that, the framework is designed by applying the identified and investigated items, and the visualization screens are implemented accordingly. Finally, among the criteria investigated by the visualization screen, an experiment is conducted on the response speed that cannot be recognized by a photograph. As a result, all the implemented visualization screens met the standard for response speed. Such research helps commanders and security officers to build a cyber common operational picture to prepare for cyber-attacks.