• Title/Summary/Keyword: 항공위협

Search Result 165, Processing Time 0.024 seconds

Automated Plan Of Harmful Birds At Air Force Runways Using CNN (CNN을 활용한 공군 활주로 유해조류 퇴치 자동화 방안)

  • Bok-Yeong Kang;Hyeon-Jun Ko;Kyu-Hui Kim;Jae-In Min;Mi-Suk Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.1051-1052
    • /
    • 2023
  • 조류충돌(Bird Strike)은 경제적 손실, 인명적 피해를 야기하여 공군의 항공작전을 제한하는 위협요소이다. 현 공군에서는 조수퇴치조(Bird Alert Team)의 경보 발령에 의존하거나 조류의 행동을 연구하는 등 인적 역량에 의존하는 시스템을 채택하고 있다. 본 연구는 CNN을 이용하여 활주로의 유해조류를 인식 및 분류하는 자동화 시스템에 대한 제안이다. 웹캠을 활용한 실시간 유해조류를 인식하는 연구를 통해 향후 운항관제대와의 연계, 지향성 조류퇴치 장비와의 연동 방안을 제시하여 공군의 조수퇴치조(Bird Alert Team)에 대한 자동화를 실현하고 공군에서 추진중인 스마트 비행단에 이바지하고자 한다.

Transponder and Ground Station Systems for Drones

  • Kim, Ki-Su;Ha, Heon-Seong;Lee, Jong-Chan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.9-15
    • /
    • 2020
  • In this paper, we propose a case that drone (unmanned aerial vehicle), one of the representative technologies of the 4th Industrial Revolution, threatens airport safety and privacy infringement, and describes a drone control system proposal to solve the problem. Unmanned aerial vehicle (Drone) is creating a serious problem recently, In Korea, on May 21, 19, according to the Jeju Regional Aviation Administration, drones flew over Jeju Jeongseok Airfield twice in the same month, causing problems in aircraft operation. In overseas cases, two drones near the runway of Gatwick International Airport in the UK There has been a disturbance in which the takeoff and landing of the aircraft flies for a while, and various problems have occurred, such as voyeuring the private life of an individual using a drone. This paper is equipped with an Acess Point transponder mounted on a drone (unmanned aerial vehicle), and unspecified many who want to receive flight information (coordinates, altitude, and obstacles) of the drone access the drone AP, receive and receive the flight information of the drone, and receive unspecified multiple Drone AP flight information is collected and collected to provide the information of the drone currently floating on one user interface screen. In addition, an AP transponder is proposed to operate a safe drone (unmanned aerial vehicle) and the drone's flight information is transmitted., To receive and collect and collect data.

Protective plan by the drone development in Major National Facilities (무인항공기 발전에 따른 국가중요시설 보호방안)

  • Cho, Min Sang;Shin, Seung Gyoon
    • Convergence Security Journal
    • /
    • v.15 no.3_1
    • /
    • pp.3-9
    • /
    • 2015
  • With the development of technology, small UAVs are used in various forms. From military UAV to the Amazon drone, the UAVs are applied to increasing fields for its merits which can replace human work more fast and precisely than what human used to do. Yet, the use and development of UAVs cannot be embraced indiscreetly. There exist negative aspects along with its convenience and positive use. In military use, for instance, the use of UAV can handle dangerous missions in place of human beings but at the same time, it can be very threatening weapons that put people in danger of being attacked at unknown time and places. Therefore, this study discusses the safety measures for major national facilities. Through theoretical understanding of UAVs and major national facilities, the study explores into key concepts and reviewed the cases that threatened our nation's safety. The study also makes suggestions on the policies of the use of UAV to secure national safety.

Development of Security Functional Requirements for Secure-Introduction of Unmanned Aerial Vehicle (무인항공기의 안전한 도입을 위한 보안기능요구사항 개발)

  • Kang, Dongwoo;Won, Dongho;Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.97-105
    • /
    • 2019
  • With the possibility of wireless control of the aircraft by Nicola Tesla, Unmanned Aerial Vehicle(UAV) was mainly used for military and defense purposes with the rapid development through World War I and II. As civilian applications of unmanned aerial vehicles have expanded, they have been used with various services, and attempts have been made to control various environmental changes and risk factors of unmanned aerial vehicles. However, GPS spoofing, Jamming attack and security accidents are occurring due to the communication in the unmaned aerial vehicle system or the security vulnerability of the unmanned aerial vehicle itself. In order to secure introduction of Unmanned aerial vehicle, South Korea has established Unmanned Aerial Vehicle verification system called Airworthiness Certification. However, the existing cerfication system is more focused on test flight, design and structure's safety and reliability. In this paper, we propose a unmanned aerial vehicle system model and propose security functional requirements on unmanned aerial vehicle system in the corresponding system model for secure-introduction of Unmanned Aerial Vehicle. We suggest the development direction of verification technology. From this proposal, future development directions of evaluation and verification technology of Unmanned Aerial Vehicle will be presented.

Internet Marketing Channel of Airline and Strategies of Travel Agency : Intertype Competition and Re-intermediation (인터넷 유통경로 형성에 따른 기존 경로구성원의 대응전략: 항공권 유통경로에서 여행사의 관점을 중심으로)

  • Park, Jin-Yong;Kim, Sung-Hee
    • Journal of Distribution Research
    • /
    • v.12 no.3
    • /
    • pp.49-67
    • /
    • 2007
  • The rapid spread of Internet has significant effects on changes in the distribution channel. The direct transaction between manufacturer and consumer could create the threats of dis-intermediation to existing channel members as middlemen. Air-ticket market also has changed in Internet marketing channel era. This study is mainly concerned with understanding the reaction of travel agency to Internet marketing channel. The objectives of this study is to propose and test the model that the perceived threats of dis-intermediation affect the reactions of travel agency: increasing channel competence, decreasing concentration, and deriving diversification. The model basically adopted the arguments of intertype competition, considering the arguments of re- intermediation in order to explain the reaction of using Internet. The result of survey from 158 travel agencies supported most of hypotheses. All the hypotheses are accepted except the relationship between threats of dis-intermediation and increasing channel competence.

  • PDF

"우주물체 전자광학 감시체계 기술개발" 소개

  • Park, Jang-Hyeon;Choe, Yeong-Jun;Jo, Jung-Hyeon;Im, Hong-Seo;Mun, Hong-Gyu;Park, Jong-Uk;Choe, Jin;Kim, Jae-Hyeok;Jo, Gi-In
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.36 no.2
    • /
    • pp.130.1-130.1
    • /
    • 2011
  • 인류의 우주공간에 대한 영향력이 확대됨에 따라, 우주공간에서의 인위적인 활동에 영향을 미칠 수 있는 모든 종류의 상황들에 대한 이해가 최근 전 세계적으로 매우 중요한 이슈로 부상하고 있다. 이를 Space Situational Awareness (SSA)라고 하는데, 특히 근지구공간에서의 인위적, 자연적 우주물체는, 우주발사체의 지속적인 증가와 이리듐-코스모스 위성의 상호 충돌 및 중국 폐기위성 파괴 등과 같은 사건으로 기하급수적으로 증가된 우주물체의 개체수로 인해 대한민국 국적의 모든 위성에도 실제적인 위협 요인으로 대두되고 있다. 이에 기초 기술연구회와 한국천문연구원은 이러한 위협을 국가적으로 해결해야할 과제(National Agenda Project) 중의 하나로 정의하고, 이를 해결하기 위해 우주물체 전자광학 감시체계 기술개발(OWL; Optical Wide-field patroL) 사업을 시작하였다. 이 사업의 목표는 자국위성에 대한 궤도력을 독자적으로 유지할 수 있는 시스템을 개발하는 것이며, 이를 위하여 2011년부터 6년 동안 총 5개소의 해외 관측소에 50cm급 광시야 망원경을 각각 설치하여 자국위성을 자동으로 상시관측하고, 관측된 자료를 이용한 궤도계산을 통하여 독자적으로 궤도력을 유지할 계획이다. 또한, 우주잔해물 감시는 하나의 국가에서 단독으로 할 수 없기 때문에 2m급 우주물체 감시망원경을 개발하여 국제공동으로 진행할 계획이다. 사업 첫해인 2011년 4월 시스템 요구사항 분석을 완료하였고 10월말 시스템 기본설계를 완료할 예정이다. 최종 완성될 소구경 광시야 망원경과 우주물체 감시망원경의 주요 임무는 우주물체 관측이지만, 향후 광시야를 이용한 다양한 탐사천문학에도 기여할 수 있을 것으로 기대한다. 한편, 자국위성에 대한 충돌 위험도 분석 및 회피기동에 관한 연구는 한국항공우주연구원이 이 사업의 협동연구로 참여하고 있다.

  • PDF

Application of Safety Analysis and Management in Software Development Process (소프트웨어 개발 프로세스에서의 안전성 분석 및 관리 활동의 적용방안)

  • Kim, Soon-Kyeom;Hong, Jang-Eui
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.1
    • /
    • pp.7-15
    • /
    • 2016
  • As most devices in a wide range of automotive, aerospace, and missile have built-in software that controls the system behaviors, the safety of the software is growing in its importance. That is, the software safety has emerged as one of big issues because the threat of accidents caused by software malfunction is rising. Accident by software can be occurred from user mal-operation, but the fundamental reason of the accident comes from insufficient verification of the safety in software development process. Therefore, this paper presents how the software safety analysis and management activities should be done in the development process. In particular, we propose how to apply the safety analysis and management activities in the prototype or incremental development process.

Analysis of Improvement Targets for Public Safety Threats in the Maritime Area Around the Launch Site (발사장 주변 해상의 공공안전 위협요인에 대한 개선 대상 분석)

  • Ahn-Tae Shin;Hun-Soo Byun
    • Korean Chemical Engineering Research
    • /
    • v.62 no.2
    • /
    • pp.153-162
    • /
    • 2024
  • Securing safety in the maritime danger zone around the launch site before a launch is a fundamental requirement. If maritime safety is not ensured, the launch is halted or postponed. However, challenges have arisen in the process of securing public safety at sea due to factors such as the increasing population engaged in water leisure activities. These challenges include unauthorized entry of vessels into controlled areas, unauthorized access by water leisure activity participants, and non-compliance with regulations. In this paper, we employed the Delphi/Analytic Hierarchy Process to survey 22 experts, including professionals in launch vehicle development and launch site operation, to identify 10 factors posing threats to maritime public safety. Additionally, we identified five issues that need improvement for ensuring maritime safety. This study verified the consistency of expert opinions and conducted an analysis of importance and prioritization, objectively confirming the necessity for amendments to relevant laws or the enactment of new laws concerning the establishment and control of danger zones around launch sites.

Computational Simulation of Lightning Strike on Aircraft and Design of Lightning Protection System (항공기 낙뢰 전산 시뮬레이션 및 보호시스템 설계)

  • Kim, Jong-Jun;Baek, Sang-Tae;Song, Dong-Geon;Myong, Rho-Shin
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.44 no.12
    • /
    • pp.1071-1086
    • /
    • 2016
  • The safety of aircraft can be threatened by environmental factors, such as icing, turbulence, and lightning strike. Due to its adverse effects on aircraft structure and electronic components of aircraft, lightning strike is one of the biggest hazards on aircraft safety. Lightning strike can inject high voltage electric current to the aircraft, which may generate strong magnetic field and extreme hot spots, leading to severe damage of structure or other equipment in aircraft. In this work, mechanism of lightning strike and associated direct and indirect effects of lightning on aircraft were studied. First, on the basis of aircraft lightning regulations provided by Aerospace Recommended Practice (ARP), we considered different lightning waveform and zones of an aircraft. A coupled thermal-electrical computational model of ABAQUS was then used for simulating flow of heat and electric current caused by a lightning strike. A study on fuel tank, with and without lightning protection system, was also conducted using the computational model. Finally, electric current flow on two full scale airframes was analyzed using the EMA3D code.

Replay Attack based Neutralization Method for DJI UAV Detection/Identification Systems (DJI UAV 탐지·식별 시스템 대상 재전송 공격 기반 무력화 방식)

  • Seungoh Seo;Yonggu Lee;Sehoon Lee;Seongyeol Oh;Junyoung Son
    • Journal of Aerospace System Engineering
    • /
    • v.17 no.4
    • /
    • pp.133-143
    • /
    • 2023
  • As drones (also known as UAV) become popular with advanced information and communication technology (ICT), they have been utilized for various fields (agriculture, architecture, and so on). However, malicious attackers with advanced drones may pose a threat to critical national infrastructures. Thus, anti-drone systems have been developed to respond to drone threats. In particular, remote identification data (R-ID)-based UAV detection and identification systems that detect and identify illegal drones with R-ID broadcasted by drones have been developed, and are widely employed worldwide. However, this R-ID-based UAV detection/identification system is vulnerable to security due to wireless broadcast characteristics. In this paper, we analyze the security vulnerabilities of DJI Aeroscope, a representative example of the R-ID-based UAV detection and identification system, and propose a replay-attack-based neutralization method using the analyzed vulnerabilities. To validate the proposed method, it is implemented as a software program, and verified against four types of attacks in real test environments. The results demonstrate that the proposed neutralization method is an effective neutralization method for R-ID-based UAV detection and identification systems.