• Title/Summary/Keyword: 탐지 효과도 분석

Search Result 487, Processing Time 0.029 seconds

Analysis of Detecting Effectiveness of a Homing Torpedo using Combined Discrete Event & Discrete Time Simulation Model Architecture (이산 사건/이산 시간 혼합형 시뮬레이션 모델 구조를 사용한 유도 어뢰의 탐지 효과도 분석)

  • Ha, Sol;Cha, Ju-Hwan;Lee, Kyu-Yeul
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.2
    • /
    • pp.17-28
    • /
    • 2010
  • Since a homing torpedo system consists of various subsystems, organic interactions of which dictate the performance of the torpedo system, it is necessary to estimate the effects of individual subsystems in order to obtain an optimized design of the overall system. This paper attempts to gain some insight into the detection mechanism of a torpedo run, and analyze the relative importance of various parameters of a torpedo system. A database for the analysis was generated using a simulation model based on the combined discrete event and discrete time architecture. Multiple search schemes, including the snake-search method, were applied to the torpedo model, and some parameters of the torpedo were found to be stochastic. We then analyzed the effectiveness of torpedo’s detection capability according to the torpedo speed, the target speed, and the maximum detection range.

A Requirement Analysis on Evaluation of Correlation System (연관성 분석 시스템 평가를 위한 요구사항 분석)

  • 송준학;서정택;이은영;박응기;이건희;김동규
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.385-387
    • /
    • 2004
  • 현재의 침입탐지 시스템의 문제점들을 개선하기 위해 침입탐지 정보의 축약기술 및 연관성 분석 기법들에 대한 연구들이 진행 중이다. 또한 최근에는 침입탐지 정보의 연관성 분석 시스템에 대한 효과성 검증에 대한 연구도 진행 중이다. 본 논문에서는 침입탐지 정보의 축약기술 및 연관성 분석 시스템의 효과성을 검증하기 위한 평가방안을 제안하였다 즉, 침입탐지 정보의 연관성 분석 시스템에 필요한 기능 요구사항을 제시하고, 그러한 기능을 객관적으로 평가할 수 있는 방법으로 가중치 및 행렬에 의한 방법을 제안하였다.

  • PDF

Effectiveness Analysis of Multistatic Sonar Network (Multistatic 소나망의 효과도 분석)

  • Goo Bonhwa;Hong Wooyoung;Ko Hanseok
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • autumn
    • /
    • pp.475-478
    • /
    • 2004
  • 본 논문에서는 multistatic 소나망의 효과도 분석을 하였다. 특히 본 논문에서는 multistatic 소나망의 탐지 성능 분석을 통해 효용성을 알아보았다. Multistatic 소나망은 송/수신기가 분리된 일종의 다중 분산 센서 시스템으로, 최적의 탐지 성능을 갖기 위해서는 적절한 융합 규칙 및 센서 배치가 필요하다. 분산 센서 융합 기법으로 bayesian 결정 기법을 기반으로 한 융합 기법을 적용하였으며, 실제 해양 환경하에서의 탐지 성능 분석을 위해 개선된 bistatic 표적 강도 모델과 거리 종속 전송 손실 모델을 이용한 multistatic 소나망 탐지 모델을 제안하였다. 기존 소나망과의 모의 비교 실험을 통해 multistatic 소나망의 우수성을 입증하였다.

  • PDF

An Analysis of the Operational Effectiveness of Target Acquisition Radar (포병 표적탐지 레이더 운용의 계량적 효과 분석)

  • Kang, Shin-Sung;Lee, Jae-Yeong
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.2
    • /
    • pp.63-72
    • /
    • 2010
  • In the future warfare, the importance of the counter-fire operation is increasing. The counter-fire operation is divided into offensive counter-fire operation and defensive counter-fire operation. Reviewing the researches done so far, the detection asset of offensive counter-fire operation called UAV(Unmanned Aerial Vehicle) and its operational effectiveness analysis is continually progressing. However, the analysis of the detection asset of defensive counterfire called Target Acquisition Radar(TAR) and its quantitative operational effectiveness are not studied yet. Therefore, in this paper, we studied operational effectiveness of TAR using C2 Theory & MANA Simulation model, and showed clear quantitative analysis results by comparing both cases of using TAR and not using TAR.

DEVS-Based Simulation Model Development for Composite Warfare Analysis of Naval Warship (함정의 복합전 효과도 분석을 위한 DEVS 기반 시뮬레이션 모델 개발)

  • Mi Jang;Hee-Mun Park;Kyung-Min Seo
    • Journal of the Korea Society for Simulation
    • /
    • v.32 no.4
    • /
    • pp.41-58
    • /
    • 2023
  • As naval warfare changes to composite warfare that includes simultaneous engagements against surface, underwater, and air enemies, performance and tactical analysis are required to respond to naval warfare. In particular, for practical analysis of composite warfare, it is necessary to study engagement simulations that can appropriately utilize the limited performance resources of the detection system. This paper proposes a DEVS (Discrete Event Systems Specifications)-based simulation model for composite warfare analysis. The proposed model contains generalized models of combat platforms and armed objects to simulate various complex warfare situations. In addition, we propose a detection performance allocation algorithm that can be applied to a detection system model, considering the characteristics of composite warfare in which missions must be performed using limited detection resources. We experimented with the effectiveness of composite warfare according to the strength of the detection system's resource allocation, the enemy force's size, and the friendly force's departure location. The simulation results showed the effect of the resource allocation function on engagement time and success. Our model will be used as an engineering basis for analyzing the tactics of warships in various complex warfare situations in the future.

A Study on Applying SDSS to Landcover Change Detection for Enhanced Performance (토지피복 변화탐지력 제고를 위한 의사결정방법 도입에 관한 연구)

  • Kim, Sun-Soo;Heo, Yong;Yu, Ki-Yun;Kim, Yong-Il
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.13 no.2 s.32
    • /
    • pp.3-12
    • /
    • 2005
  • Change detections are widely used for its usefulness. During the process two factors are important; one is which method is to be adopted and the other is what should be the appropriate critical value. Until far, these factors are mostly decided by users based upon their knowledge from past experiences. In this paper we propose a set of methodologies that allow users maintaining optimal decisions on which change detection method is the desirable one, what might be the suitable critical value, and what does the introducing SDSSs(Spatial Decision Support Systems) to change detections means.

  • PDF

Effectiveness Analysis Tool for Underwater Acoustics Detection in Quasi-static Underwater Acoustics Channel based on Underwater Environmental Information DB (수중 환경 정보 DB 기반 준-정적 수중음향 채널 수중음향 탐지 효과도 분석 모의 도구 구현)

  • Kim, Jang Eun;Han, Dong Seog
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.10
    • /
    • pp.148-158
    • /
    • 2015
  • It is difficult to test a detection system in underwater acoustics channel environments. The system can be evaluated by using simulation analysis tool. In this paper, a simulation tool is proposed to analyze the effectiveness of underwater acoustics detection based on database for real environments. First, the underwater environment is built based on HYCOM underwater environment database. Then, a multipath characteristic is considered through calculating underwater acoustics propagation path/pressure based on the ray theory. Also, hydrophone thermal noise and underwater ambient noise are considered to reflect underwater noise characteristics.

Estimating Characteristic Data of Target Acquisition Systems for Simulation Analysis (모의 분석을 위한 표적 획득 체계의 특성 데이터 산출)

  • Tae Yoon Kim;Sang Woo Han;Seung Man Kwon
    • Journal of the Korea Society for Simulation
    • /
    • v.32 no.1
    • /
    • pp.45-54
    • /
    • 2023
  • Under combat simulation environment when inputting the detection performance data of the real system into the simulated object the given data affects the simulation analysis result. ACQUIRE-Target Task Performance Metric (TTPM)-Target Angular Size (TAS) model is used as a target acquisition model to simulate the detection ability of entities in the main combat simulation tool. This model estimates the decomposition curve of the object sensor and output the detection distance according to the target type. However, it is not easy to apply the performance of the new detection object that the user wants to input to the target acquisition model. Users want to input the detection distance into the target acquisition model, but the target acquisition model requires sensor decomposition curve data according to encounter conditions. In this paper, we propose a method of inversely deriving the sensor decomposition curve data of the target acquisition model by taking the detection distance to the target as an input. Here, the sensor decomposition curve data simultaneously satisfies each detection distance for three types of targets: personnel, ground vehicles, and aircraft. Finally, the detection distance of various reconnaissance equipment is applied to the detection object, and the detection effect according to the reconnaissance equipment is analyzed.

A Study on Improvement of Effectiveness Using Anomaly Analysis rule modification in Electronic Finance Trading (전자금융거래의 이상징후 탐지 규칙 개선을 통한 효과성 향상에 관한 연구)

  • Choi, Eui-soon;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.615-625
    • /
    • 2015
  • This paper proposes new methods and examples for improving fraud detection rules based on banking customer's transaction behaviors focused on anomaly detection method. This study investigates real example that FDS(Fraud Detection System) regards fraudulent transaction as legitimate transaction and figures out fraudulent types and transaction patterns. To understanding the cases that FDS regard legitimate transaction as fraudulent transaction, it investigates all transactions that requied additional authentications or outbound call. We infered additional facts to refine detection rules in progress of outbound calling and applied to existing detection rules to improve. The main results of this study is the following: (a) Type I error is decreased (b) Type II errors are also decreased. The major contribution of this paper is the improvement of effectiveness in detecting fraudulent transaction using transaction behaviors and providing a continuous method that elevate fraud detection rules.

A Comparative Study on the Performance of SVM and an Artificial Neural Network in Intrusion Detection (SVM과 인공 신경망을 이용한 침입탐지 효과 비교 연구)

  • Jo, Seongrae;Sung, Haengnam;Ahn, Byung-Hyuk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.2
    • /
    • pp.703-711
    • /
    • 2016
  • IDS (Intrusion Detection System) is used to detect network attacks through network data analysis. The system requires a high accuracy and detection rate, and low false alarm rate. In addition, the system uses a range of techniques, such as expert system, data mining, and state transition analysis to analyze the network data. The purpose of this study was to compare the performance of two data mining methods for detecting network attacks. They are Support Vector Machine (SVM) and a neural network called Forward Additive Neural Network (FANN). The well-known KDD Cup 99 training and test data set were used to compare the performance of the two algorithms. The accuracy, detection rate, and false alarm rate were calculated. The FANN showed a slightly higher false alarm rate than the SVM, but showed a much higher accuracy and detection rate than the SVM. Considering that treating a real attack as a normal message is much riskier than treating a normal message as an attack, it is concluded that the FANN is more effective in intrusion detection than the SVM.