• Title/Summary/Keyword: 피아식별

Search Result 24, Processing Time 0.018 seconds

IFF Technique using the Color of Military Uniform (군복의 색깔을 이용한 피아식별 기법)

  • Heo, Woo-Hyung;Gu, Eun-Jin;Cha, Eui-Young
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.01a
    • /
    • pp.23-25
    • /
    • 2013
  • 본 논문에서는 차세대 무인 군사 로봇에 활용할 수 있는 적군 및 아군 식별 수단으로 군복의 색깔을 이용한 기법을 제안한다. 이 기법은 전장지역의 군사로봇이 할 수 있는 피아식별법 중에 하나로 로봇에 부착되어 있는 카메라 외에 추가적으로 가져야 하는 장비가 필요 없기 때문에 추가비용 없이 효과적으로 적군을 포착할 수 있다. 군복의 색깔 차이를 식별하기 위해서는 먼저 HOG(Histogram of Oriented Gradients) 기법을 이용하여 사람을 검출한 다음, 이후 검출된 사람영역에 대하여 인체 비율을 고려해서 추출한 상의 부분의 색깔 데이터를 받는다. 이때 색공간은 HSV 공간으로 하여 조명의 변화에 덜 민감하도록 하였다. 북한 군복 색깔 영역의 pixel들만 추출하여 이진화를 한 후, 상의 전체 픽셀에 대한 개수 비율을 계산한다. 비율이 임계값 보다 높을 경우 적으로 인식한다.

  • PDF

The Study on The Identification Model of Friend or Foe on Helicopter by using Binary Classification with CNN

  • Kim, Tae Wan;Kim, Jong Hwan;Moon, Ho Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.33-42
    • /
    • 2020
  • There has been difficulties in identifying objects by relying on the naked eye in various surveillance systems. There is a growing need for automated surveillance systems to replace soldiers in the field of military surveillance operations. Even though the object detection technology is developing rapidly in the civilian domain, but the research applied to the military is insufficient due to a lack of data and interest. Thus, in this paper, we applied one of deep learning algorithms, Convolutional Neural Network-based binary classification to develop an autonomous identification model of both friend and foe helicopters (AH-64, Mi-17) among the military weapon systems, and evaluated the model performance by considering accuracy, precision, recall and F-measure. As the result, the identification model demonstrates 97.8%, 97.3%, 98.5%, and 97.8 for accuracy, precision, recall and F-measure, respectively. In addition, we analyzed the feature map on convolution layers of the identification model in order to check which area of imagery is highly weighted. In general, rotary shaft of rotating wing, wheels, and air-intake on both of ally and foe helicopters played a major role in the performance of the identification model. This is the first study to attempt to classify images of helicopters among military weapons systems using CNN, and the model proposed in this study shows higher accuracy than the existing classification model for other weapons systems.

KRNIC의 다중 전파식별자 지원 검색서비스 도입 방안

  • Kim, Won;Na, Jung-Jung;Im, Hyun-Duk
    • Information and Communications Magazine
    • /
    • v.21 no.6
    • /
    • pp.53-66
    • /
    • 2004
  • 1935년 미국에서 레이더에 관한 연구 결과로 처음으로 등장한 전파식별(RFID : Radio Frequency IDentification) 기술은 접근하는 비행물체의 피아식별을 위하여 사용되었다. 1960대 후반에 들어와서 핵과 같은 위험 물질을 감시하기 위하여 전파식별에 대한 연구가 미국에서 이에 대한 연구가 본격적으로 시작되었다. 그로부터 얼마후인 1972년 Schlage Electronics(현재 Westinghouse)사에서 군용 섬유유리 에폭시카드에 삽입되는 전파식별 카드가 개발되었다. 군사목적 위주로 진행되던 전파식별 관련 기술개발은 1977년에 이르러 Los Alamos Scientific 연구소에 의해 공공부분으로 확대되기 시작했다.(중략)

Design of IFF(Identification of Friend and Foe) Landmine using RFID Technology (RFID 기술을 이용한 피아식별 지뢰 설계)

  • Jang, Jong Hun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.4
    • /
    • pp.414-421
    • /
    • 2013
  • In this paper, a novel IFF(Identification of Friend and Foe) landmine system has been designed and fabricated using RFID(Radio Frequency Identification) wireless communication system. The IFF landmine system is composed of RECOMS(Remote Controlled Munition System), RFID reader and RFID tag. When the friendly forces have been identified by RFID wireless communication, the IFF landmine is unloaded automatically and indicates the warning message to the operator. Through the discussion, the detailed designs and the test results of identification distance have been described and antenna revision plans for improving the performance have been mentioned.

T lymphocyte에 관한 연구동향

  • 김길현
    • The Microorganisms and Industry
    • /
    • v.17 no.1
    • /
    • pp.32-37
    • /
    • 1991
  • 이 글에서는 다음의 내용을 다루었다. 1. T세포에 있어서 피아식별의 기본 메카니즘 2. T세포의 활성화와 그에 관련된 세포 표면 분자들 3. T세포가 분비하는 lymphokine

  • PDF

Performance Prediction and Analysis of Identification Friend or Foe(IFF) Radar by using Modeling & Simulation Methodology (M&S 기법을 통한 피아식별 레이다 성능예측 및 분석)

  • Kim, Hyunseung;Park, Myunghoon;Jeon, Woojoong;Hong, Sungmin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.2
    • /
    • pp.159-167
    • /
    • 2020
  • In actual battlefield environment, IFF radar plays an important role in distinguishing friend or foe targets and assigning unique identification code to management. Performance of IFF radar is greatly affected by radio environment including atmosphere and terrain, target maneuvering and operation mode. In this paper, M&S tool is consisted of interrogator(IFF radar) and answering machine(target) for radar performance analysis. The wave propagation model using APM(Advanced Propagation Model) and radar actuator system were modeled by considering beam waveform of individual operation beam mode. Using this tool, IFF radar performance was analyzed through two experimental results. As a result, it is expected that performance of IFF radar can be predicted in the operational environment by considering target maneuvering and operation beam mode.

Mark XIIA(Mode 5) IFF System Integration and Certification Test for Surface to Air Missile System (유도무기체계 모드 5 피아식별 체계통합 및 인증시험)

  • Kim, Woo-Hyun;Jung, Se-Young;Lee, Yun-Soo;Chang, Se-Myong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.2
    • /
    • pp.160-168
    • /
    • 2022
  • The new IFF mode, Mode-5 replacing Mode-4, has already been established by the US DoD for its allies and NATO forces. A IFF retrofit program for replacing the Mark XII Mode-4 with Mark XIIA Mode-5 is in progress in order to overcome the security limitations of the former in R.O.K. IFF certification test for the new mode, Mode-5, has been performed on medium range surface to air missile platform of the Korean armed forces for the first time in R.O.K and this is regarded as a monumental event in Korean defense industry. The present paper is a discussion on the procedures applied to the IFF system retrofit and integration, lessons learned from AIMS test with the US AIMS PO as observer. The minimum modification from the existing Mark XII Mode-4 to Mark XIIA Mode-5 and evolutional adaption from previous design including interoperability are required for the system retrofit. Letter of Certification was received from the US AIMS PO after the tests. The authors propose that the lessons learned and know-how acquired during the tests are managed by the R.O.K Government as the standard structure of a database. It is expected that the use of the database will reduce the developmental difficulties and risk, also increase efficiency in future developments and other projects.

A Proposal for Drone Entity Identification and Secure Information Provision Technology Using Quantum Entropy Chip-Based Cryptographic Module in WLAN Environment (무선랜 환경에서 양자 엔트로피 칩 기반 암호모듈을 적용한 드론 피아식별과 안전한 정보 제공 기술 제안)

  • Jung, Seowoo;Yun, Seunghwan;Yi, Okyeon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.891-898
    • /
    • 2022
  • Along with global interest, drones are expanding the base of utilization such as transportation of goods, forest protection, and safety management, and cluster flights are being applied in various fields such as military operations and environmental monitoring. Currently, specialized networks such as e-UM 5G for services in specific industries are being established in Korea. In this regard, drone systems are also moving to establish specialized networks to provide services that are fused with AI and autonomous flight. As drones converge with various services, various security threats in various environments are also subordinated, and in response, requirements and guidelines for drone security are being prepared in Korea. In this paper, we propose a technology method for peer identification and safe information provision between cluster flight drones by utilizing a cryptographic module equipped with wireless LAN and quantum entropy-based random number generator in a cluster flight system and a mobile communication network such as e-UM 5G.

대전차 무기로 각광받는 휴대용 대전차 미사일(2)

  • Sin, Jun-Ho
    • Defense and Technology
    • /
    • no.12 s.238
    • /
    • pp.72-79
    • /
    • 1998
  • 전차는 제1차 세계대전 중인 1916년 영국 육군에 의해 Mark-I 전차가 등장한 이래, 80여년동안 지상전에서 중요한 역할을 수행했으며, 미래에도 더욱 정교한 무기체계(피아식별 장비 부착, 개량형 장갑/방호기술, 강력한 추진 시스템, 무기의 유효성 등)로 발전될 것이다. 이에 따라 대전차 무기체계도 바주카형에서 LAW 및 다목적 대장갑차무기, 특히 대전차 미사일의 눈부신 발달(소형화, 견착식, 상부공격력, 관통능력 향상, 전자파 방해방지 등)로 전차와 대전차 무기는 "탁구 게임"을 연상케하는 치열한 경쟁이 되어 왔다. 즉 "창"과 "방패"와 같이 상대적 발전에 따라 지속적으로 첨단과학기술이 총동원되고 있는 추세이다. 이 글에서는 대전차미사일의 개발 성과와 발전 추세를 소개하고자 한다

  • PDF

Identifying Friendly and Foe Using a Watermarking Technique During Military Communication (군 통신상에서 워터마킹 기술을 이용한 피아식별 방법)

  • Lee, Jong-Kwan;Choi, Hyun-Joo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.9 no.4
    • /
    • pp.81-89
    • /
    • 2006
  • In this paper, a watermark technique for identifying friendly and foe is proposed during communication. The speech signal is processed in several stages. First, speech signal is partitioned into small time frames and the frames are transformed into frequency domain using DFT(Discrete Frequency Transform). The DFT coefficients are quantized and the watermark signal is embedded into the quantized DFT coefficients. At the destination channel quantization errors of received signal are regarded as the watermark signal. Identification of friendly and foe are done by correlating the detected watermark and the original watermark. As in most other watermark techniques, this method has a trade off between noise robustness and quality. However, this is solved by a partial quantization and a noise level dependent quantization step. Simulation results in the various noisy environments show that the proposed method is reliable for identification between friendly and foe.