• Title/Summary/Keyword: 탐지장비

Search Result 381, Processing Time 0.029 seconds

군사과학의 EMI 문제

  • 최태인
    • 전기의세계
    • /
    • v.38 no.9
    • /
    • pp.46-51
    • /
    • 1989
  • TEMPEST란 통신장비나 정보처리장비에서 발산되는 미약한 전자신호가 탐지, 도청되는 현상인데 각국에서는 명칭에 대한 의미조차도 비밀로 제한하기 때문에 이 분야에 대한 정확한 기술현황 파악은 어렵다. 일반적으로 전산터미널 또는 전동타자기에서 발산되는 전자파는 단순 주파수성분을 가지며 신호의 크기도 상당히 강하므로 고감도 수신장비를 사용하면 신호를 탐지, 재생시켜 정보를 획득할 수 있다. 또한 암호장치를 사용한 통신장비의 신호도 탐지가능할 뿐 아니라 암호화되기 전의 전도성 발산신호와 안테나를 통한 복사성 발산신호를 비교하여 암호장치 자체의 알고리즘도 탐지가능하게 될 것으로 예측된다. 이와같은 전자파도청을 방지하기 위해 주요 통신 장비나 전자장비는 차폐상자를 사용하여 전자파의 복사성 발산신호를 비교하여 암호장치 자체의 알고리즘도 탐지가능하게 될 것으로 예측된다.

  • PDF

On the study of Chemical Disaster Cause Chemical Detection Process (화학재난 현장에서의 사건원인 화학물질 탐지절차 연구)

  • Kim, Sungbum;Ahn, Seungyoung;Lee, Jinhwan
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.3
    • /
    • pp.452-457
    • /
    • 2014
  • The event of a Chemical disaster response personnel are causative events quickly Appearance & residual contaminant concentrations, should be identified accurately. In addition, the chemical disaster response procedure appropriate progress in the field of Chemical Composition and contaminant concentrations in order confirmation is essential. Use in the field to using the characteristics of each equipment. on-Site response equipment can not verify all the chemicals, materials detection, limited by each equipment. Detection range of equipment & specific materials should be considered complementary. In this study, using the equipment on-site detection of detection kit and detector tube, electronic detection equipment utilized for the rapid response procedure for helping a person to cope.

An Analysis of Intrusion Detection techniques assorted by malicious traffic directions (유해 트래픽 방향에 따른 침입 탐지 기법 분석)

  • Choi, Byung-Ha
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06a
    • /
    • pp.57-59
    • /
    • 2012
  • 본 논문은 유해 트래픽을 탐지하는 보안 장비와 그에 따른 탐지 또는 차단 기법들을 분석한다. 즉 서버측의 방화벽, 침입 탐지 시스템과 웹 방화벽의 순서로 보안 장비의 배치와 클라이언트 측의 보안 시스템을 보여주고 이들의 탐지 기법들을 소개한다. 이후 이 장비들의 유해트래픽의 방향에 따른 탐지 기법들을 분석하고 유해트래픽 방향에 따라 침입을 탐지할 수 있는 탐지 기법들을 분석한다. 또한 유해 트래픽의 방향에 따라 탐지기법이 부족한 방향을 제시한다.

The Measurement and Application of the Minimum Detectable Irradiance for the Infrared Point Source Detection System (적외선 점광원 탐지장비의 최소탐지조도 측정 및 활용)

  • Kim, Hyun-Sook;Yang, Yu-Kyung;Park, Yong-Chan
    • Korean Journal of Optics and Photonics
    • /
    • v.22 no.1
    • /
    • pp.58-63
    • /
    • 2011
  • A procedure and method for the MDI(Minimum Detectable Irradiance) measurement of an infrared point source detection system is described in detail and its experimental result is analyzed. The proposed measurement method for MDI can be realized with a collimator in the laboratory environment. In addition, an estimation method of the maximum detection range of the infrared point source detection system is introduced and its performed result is shown.

최신 방향탐지 장비의 발전추세

  • Jeong, Sun-Ho
    • Defense and Technology
    • /
    • no.10 s.272
    • /
    • pp.58-63
    • /
    • 2001
  • 과거의 전쟁양상과는 달리 미래전은 전자전이 전쟁의 승패에 중추적 역할을 담당하게 될 것이다. 전자전 지원장비인 방탐장비는 주요국가들에게 고유의 모델과 기술로 제작 운용하고 있으며, 해외구입시 기술적 종속 및 정보누출의 위험에 노출될 수 있는 소지가 있다. 이 글에서는 방탐장비의 기본원리와 탐지기법 등 이론적인 설명을 하였으며, 주요 선진국의 방향탐지 장비현황 및 발전추세를 철저히 분석하여 우리 군이 미래전에 대비하여 나아가야 할 방향과 방법을 제시하였다.

  • PDF

A Study on the Improvement of Metal Detector Equipment Standards by Aviation Security Level (항공보안 등급별 금속탐지장비 기준 개선 방안 연구)

  • Ryu, Hanseul;Park, Hanjun;Kim, Yosik;Choi, YongHun
    • Journal of Aerospace System Engineering
    • /
    • v.15 no.1
    • /
    • pp.95-101
    • /
    • 2021
  • The detection sensitivity of a Walk Through Metal Detector (WTMD) currently being developed and operated in Korea differs from one manufacturer to another, making it difficult for them to be used based on Aviation Security level. In addition, the FAA 3-GUN Test approved by the domestic aviation authority for aviation security supervision is a single test object. There is no Operational Test Piece (OTP) consisting of multiple test objects for the operation of aviation security for a WTMD. This paper, the detection sensitivity of a WTMD applied by a commercial OTP was measured and detection sensitivity standards for a WTMD were developed based on results of measurement. Furthermore, institutional plans to maintain the same detection sensitivity for domestic aviation security were made through suggestions for Korean standards OTP development methods, taking characteristics of the aviation field into consideration.

The chemical reactivity of detecting tube detection equipment for incident responder (화학사고 초기대응자를 위한 검지관식 탐지장비의 반응성 연구)

  • Ahn, Seung-Young;Kim, Jungmin;Kim, Sungbum;Chun, Kwangsoo;Lee, Jin-Seon;Park, Choonhwa
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.1
    • /
    • pp.33-39
    • /
    • 2014
  • Chemical accidents are the cause of the accident site during the initial responders to quickly and easily see materials and concentration method for the U.S. Environmental Protection Agency(EPA) is widely used in the initial response team direct reading detection equipment used. Ministry of the tubular gas detection equipment to detect direct reading detection equipment used in the event of an accident scene, and shell-and-tube gas detector for rapid detection and identification and precise analysis of causative pollutants before about strategically can identify the quantitative and qualitative useful equipment. However, those who initially respond to the scene of a direct reading detection equipment and a simple lack of understanding of how to use the numbers only because of the way you want to check the accuracy of detection results have been raising questions about the increase. The scene of the accident in order to obtain an accurate detection results used in this paper, the Ministry of Environment of gas detectors detect tubular Kitagawa and Draeger detector tube to check the reactivity of the material on-site detection of early response of those who were to raise the accuracy of the results.

3-D Optimal Disposition of Direction Finders (방향탐지장비의 삼차원 최적 배치)

  • Lee, Ho-Joo;Kim, Chang-Geun;Kang, Sung-Su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.4
    • /
    • pp.765-772
    • /
    • 2011
  • In this paper, a simulation-based method is presented to dispose direction finders in three dimensional space for locating targets using the directional data. A direction finder(DF) is a military weapon that is used to find locations of targets that emit radio frequencies by operating two or more DFs simultaneously. If one or more DFs are operated in the air, the accuracy of location estimation can be enhanced by disposing them in a better configuration. By extending the line method, which is a well-known algorithm for 2-D location estimation, into 3-D space, the problem of 3-D location estimation is defined as an nonlinear programming form and solved analytically. Then the optimal disposition of DFs is considered with the presented method in which methods of simulation and search technique are combined. With the suggested algorithm for 3-D disposition of DFs, regions in which targets exist can be effectively covered so that the operation effect of DF be increased.

Improving compensation method of target detection area difference between Electro-optical tracking system and radar (전자광학추적장비와 레이더 사이의 표적탐지영역의 차이보상방법 개선)

  • Yoo, Hyeong-Gon;Kwon, Kang-Hoon;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.12
    • /
    • pp.3023-3029
    • /
    • 2013
  • This is an example we generally have a variety of equipment that can detect and track the targets and track them quickly and accurately through the information exchange among each piece of equipment. These equipment have similar detection areas (FOV), but some are different due to the limit of the resolution of the equipment. In this paper, we studied the method of reducing detection time and tracking the targets automatically.

The detection of threats using loging data analing of network resource (네트워크 자원의 로그 분석을 통한 보안 위협 탐지)

  • Kim Jin-Hong;Lee Haeng-Gon;Jo In-June
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.179-182
    • /
    • 2006
  • 정부, 기관(연구기관, 교육기관 등) 심지어 일반 개인 생활에서 인터넷의 활용도가 증가하면서 네트워크 장비의 중요성은 한층 강조되고 있다. 현재 네트워크 장비의 보안은 방화벽, 침입탐지장치에 의존하고 있으나, 이 장비들은 잘 알려진 공격을 기준으로 패턴 매정 방식으로 검출한다. 따라서 잘 알려지지 않은 공격에는 취약하다. 본 논문에서는 네트워크 보안장비를 위회한 보안위협이 탐지될 경우 네트워크 자원에서 발생하는 로그를 실시간으로 수집하여 관리함으로써 침해사고 시 그 원인을 분석할 수 있는 근거자료를 확보하고, 실시간 로그 분석을 통해 신속한 보안 위협의 탐지 및 해결방안을 제공한다.

  • PDF