• Title/Summary/Keyword: 표적 취약성

Search Result 17, Processing Time 0.025 seconds

Methodologies for Analyzing Interaction between Shape Charge Jets and Targets (성형작약제트와 표적 상호작용 해석 방법론)

  • Kang, Min Ah;Park, Sung Jun;Greulich, S.;Hartmann, T.;Moon, Sei-Hoon
    • Journal of the Korea Society for Simulation
    • /
    • v.31 no.3
    • /
    • pp.11-21
    • /
    • 2022
  • Two methods for analyzing interaction between shaped charge jets and targets are taken in AVEAM-MT (ADD Vulnerability and Effectiveness Assessment Model for Materiel Target), which is a model for vulnerability analysis of materiel targets and being developed by ADD. One is an empirical method improved from the Fireman-Pugh technique for rapid penetration calculation into target components. The other is ADD-TSC(ADD Tandem Shaped Charge), which is a physics-based model extended to be applicable for shaped charge jets from the Walker-Anderson penetration model for higher fidelity analysis. In this paper, the two methods are briefly described, and the empirical technique is compared to the physics-based model in the prediction of residual penetration capacity. The latter is also compared to experimental results found in literature in predicting penetration capacity. These comparisons show that both methods can be used for fast calculations or higher fidelity calculations in vulnerability analysis models like AVEAM-MT which is required to perform a considerable amount of iterative simulation for damage analysis.

A Study on the Penetration Characteristics of a Steel Fragment Impacting on the Target Plate of Aluminum 2024 (알루미늄 2024 표적에 대한 HE 탄두 파편의 관통 특성 연구)

  • Kim, Deuksu;Kang, Sunbu;Jung, Daehan;Chung, Youngjin;Park, Yongheon;Park, Seikwon;Hwang, Changsu
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.46 no.3
    • /
    • pp.257-268
    • /
    • 2018
  • We have studied the damage mechanism of a metallic thin plate by the highly energetic fragments generated from high explosive(HE) warhead. The penetration process has presumed that the velocity of a fragment is in the range of 350 m/s to 3353 m/s, the thickness of Aluminum 2024 target plate is in the range of 1 mm~6.3 mm thick. The mass of fragment with hemisphere nose shape is in the range of 0.32 g to 16 g. The analytical solution for penetration process has been derived by using the report of the project THOR. The results of analysis implied that the closed forms by an exponentially decay function well fit the change of the ballistic limit velocity, loss velocity and loss mass of fragment as the mass of fragment and the thickness of target plate increase.

Framework of Weapon Effects Calculator for Hardened Targets (견고표적 무기효과 산출 알고리즘에 관한 연구)

  • Park, Jong Yil
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.3
    • /
    • pp.340-347
    • /
    • 2013
  • Weapon effect is a key issue throughout the life cycle of weapon systems. Only when weapon effect is considered properly, Effects Based Operation(EBO), Effects Based Acquisition(EBA), and Effects Based Development(EBD) could be possible. Because the transfer of weapon effect technologies is restricted in most foreign counties, independent development is necessary. In this paper, framework of weapon effects calculator for hardened targets is proposed to meet the own development needs. It is designed focusing on running time, validation and expandibility by adoption of modular architecture. Required technologies for each module are identified, and unclassified ones are summarized.

An Analysis of Anti-Jamming of GPS Guided Weapon (GPS 유도무기 재밍대응 분석)

  • Choi, Chang-Mook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.962-963
    • /
    • 2015
  • 첨단 과학기술의 발전으로 미래전은 정밀타격이 보편화되는 방향으로 발전할 것이며, 이때 정밀유도무기가 적의 핵심표적만을 선별 공격함으로써 빠른 시간 내에 적 전력의 기능을 마비시킬 수 있을 것이다. 그러나 최근 정밀유도무기에 적용되고 있는 GPS 유도방식은 재밍상황에 그 취약성을 들어 낼 수 있다. 따라서 본 논문에서는 GPS 유도방식인 정밀유도무기를 사용하여 공격할 경우 재밍에 대응하기 위한 방편의 하나로 방위각을 제어함으로써 재밍 대응이 가능한지 여부를 실험 및 분석하였다. 분석결과 방위각 140도까지는 제어 가능함을 확인하였다.

  • PDF

The study on the expention program of Digital Opportunity for information disadvantaged groups (취약계층 정보활용기회 확대방안 연구)

  • Jo, Seon-Gu;No, Yeong;Jeong, Hae-Yong
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.239-252
    • /
    • 2005
  • 본 논문에서는 이론적, 실무적 선행연구들에 대한 검토를 토대로 통합적인 정보격차 요인모형을 제시하고 정보격차 요인모형에서 도출된 변수들과 기존정책들을 중심으로 표적집단심층면접법(Focus Group Interview, FGI)를 이용하여 정보취약계층인 장애인, 노인층, 저소득층을 대상으로 정보활용기회를 확대하기 위한 방안들을 실증적으로 도출하였으며 또한 기존 정책에 대한 만족도 및 효과성을 측정하였다. FGI 조사결과 취약계층별로 차별화된 정책적 요구사항이 도출되었으며, 통합적으로 정보접근, 정보이용, 정보활용을 지원할 수 있는 통합적 지원체계가 가장 절실한 것으로 나타났다. 또한, 취약계층별 개별 대상자의 개별적인 정보화수준 및 요구사항을 반영하기 위하여 개별 인적자원에 대한 통합관리가 필요한 것으로 나타났다. 아울러, 정보접근정책 및 정보이용지원정책, 정보활용지원정책별로 포괄적인 만족도 조사를 실시한 결과 공히 만족도 수준이 보통이하인 것으로 나타나 개별 정책에 대한 지원전략의 수정이 필요한 것으로 나타났다.

  • PDF

Optimal Terminal Guidance Law for BTT Missiles considering Impact Angle (표적 충돌각을 고려한 BTT 미사일용 최적 종말 유도 법칙)

  • Park, Noh-Yong;Park, Jin-Won;Song, Seong-Ho;Ha, In-Joong
    • Proceedings of the KIEE Conference
    • /
    • 2007.10a
    • /
    • pp.217-218
    • /
    • 2007
  • 최근 개발된 비선형 자동조종 제어기를 사용하면 비행 환경에 무관하게 BTT 미사일의 입출력 동특성이 일정한 선형 시스템의 형대로 표현될 수 있다. 본 논문에서는 이와 같은 특성을 바탕으로 BTT 미사일이 목표물의 취약 지점을 정밀하게 요격할 수 있도록 자동조종장치 동역학의 시간 지연 효과를 고려하여 표적 충돌각을 최소화하는 최적 종말 유도 법칙을 설계하였다. 제안된 최적 종말 유도 법칙은 극좌표 변환을 사용하지 않기 때문에 가제어성을 보장하며, 가속도 편향값을 사용하지 않기 때문에 기존의 유도 법칙에 비하여 미사일의 기동성을 향상시킬 수 있는 장점을 갖는다.

  • PDF

Cluster-Based Similarity Calculation of IT Assets: Method of Attacker's Next Targets Detection

  • Dongsung Kim;Seon-Gyoung Shon;Dan Dongseong Kim;Huy-Kang Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.5
    • /
    • pp.1-10
    • /
    • 2024
  • Attackers tend to use similar vulnerabilities when finding their next target IT assets. They also continuously search for new attack targets. Therefore, it is essential to find the potential targets of attackers in advance. Our method proposes a novel approach for efficient vulnerable asset management and zero-day response. In this paper, we propose the ability to detect the IT assets that are potentially infected by the recently discovered vulnerability based on clustering and similarity results. As the experiment results, 86% of all collected assets are clustered within the same clustering. In addition, as a result of conducting a similarity calculation experiment by randomly selecting vulnerable assets, assets using the same OS and service were listed.

A Weapon Effectiveness Evaluation Model for Top-Attack Smart Munitions (상부공격 지능탄 무기효과 평가모델)

  • Kang, Min-Ah
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.4
    • /
    • pp.458-466
    • /
    • 2012
  • We have developed a weapon effectiveness evaluation model for top-attack smart munitions(WEEM/TASM), which is a many on many Monte Carlo Model evaluating the effectiveness of top-attack smart munitions against armoured ground vehicles. In this model the battle is reduced to a one-sided battle situation in that the target vehicles are regarded as being stationary and passive. It can simulate the whole attack process of smart munitions from firing artillery dispenser to sensing and hitting processes after dispense. It can also calculate the probability of kill of each target and the numbers of rounds required to fulfill the degree of damage in statistical manners. In this paper, we describe the basis for our design concepts reflected in the model to simulate the weapon effectiveness of top-attack smart munitions and provide simulation results for an example case.

The Target Modeling and The Shot Line Analysis System to Assess Vulnerability of the Ground Combat Vehicle (지상전투차량 취약성 평가를 위한 표적 모델링과 피격선 분석 시스템)

  • Yoo, Chul;Jang, Eun Su;Park, Kang;Choi, Sang Yeong
    • Korean Journal of Computational Design and Engineering
    • /
    • v.20 no.3
    • /
    • pp.238-245
    • /
    • 2015
  • Vulnerability assessment is a process to calculate the damage degree of a combat vehicle when the combat vehicle is attacked by an enemy. When the vehicle is hit, it is necessary to analyze the shot line to calculate which components are damaged and judge whether the armor of the vehicle is penetrated by enemy's warhead. To analyze the shot line efficiently, this paper presents the target modeling and the shot line analysis system to assess vulnerability of the ground combat vehicle. This system is easily able to do several functions: 1) the program reads STL files converted from CAD model which is designed by commercial CAD software. 2) It calculates the intersection between triangle of STL mesh and the shot line, and check if the components of the model are penetrated. 3) This program can visualize the results using OpenGL. The vulnerability assessment using the shot line analysis can be used to model the armor of the combat vehicle and arrange the inner components effectively in the early stage of development of the combat vehicle.