• Title/Summary/Keyword: A military unit

Search Result 321, Processing Time 0.026 seconds

Accuracy of virtual models in the assessment of maxillary defects

  • Kamburoglu, Kivanc;Kursun, Sebnem;Kilic, Cenk;Ozen, Tuncer
    • Imaging Science in Dentistry
    • /
    • v.45 no.1
    • /
    • pp.23-29
    • /
    • 2015
  • Purpose: This study aimed to assess the reliability of measurements performed on three-dimensional (3D) virtual models of maxillary defects obtained using cone-beam computed tomography (CBCT) and 3D optical scanning. Materials and Methods: Mechanical cavities simulating maxillary defects were prepared on the hard palate of nine cadavers. Images were obtained using a CBCT unit at three different fields-of-views (FOVs) and voxel sizes: 1) $60{\times}60mm$ FOV, $0.125mm^3$ ($FOV_{60}$); 2) $80{\times}80mm$ FOV, $0.160mm^3$ ($FOV_{80}$); and 3) $100{\times}100mm$ FOV, $0.250mm^3$ ($FOV_{100}$). Superimposition of the images was performed using software called VRMesh Design. Automated volume measurements were conducted, and differences between surfaces were demonstrated. Silicon impressions obtained from the defects were also scanned with a 3D optical scanner. Virtual models obtained using VRMesh Design were compared with impressions obtained by scanning silicon models. Gold standard volumes of the impression models were then compared with CBCT and 3D scanner measurements. Further, the general linear model was used, and the significance was set to p=0.05. Results: A comparison of the results obtained by the observers and methods revealed the p values to be smaller than 0.05, suggesting that the measurement variations were caused by both methods and observers along with the different cadaver specimens used. Further, the 3D scanner measurements were closer to the gold standard measurements when compared to the CBCT measurements. Conclusion: In the assessment of artificially created maxillary defects, the 3D scanner measurements were more accurate than the CBCT measurements.

A Quantitative Study on How the Cheonghae Anti-piracy Unit influences the Occurrence of Maritime Piracy near Somalia (청해부대 파병(다국적 해군의 대(對)해적 작전)이 소말리아 인근 해적사건 발생에 미치는 영향에 관한 정량적연구)

  • Han, Jong-Hwan
    • Strategy21
    • /
    • s.46
    • /
    • pp.123-157
    • /
    • 2020
  • This research focuses on one important type of non-traditional threat, maritime piracy, and tries to supplement previous research from the perspective of military power, especially naval power. When considering the elements of military power, naval power is a core independent variable to explain piracy incidents. Indeed, naval power can play a key role in solving piracy problems, since naval power is the only legitimate force to respond to piracy in the sea. It is natural that well equipped and trained naval power in the sea increases the probability of capturing pirates, which leads to increasing the costs of piracy and decreasing its occurrences. In addition, since naval combatant ships have more impressive weapons than those of pirate boats, just the presence of naval combatant ships could serve to deter piracy incidents in the sea. The main purpose of this research is finding the effectiveness of large multinational naval efforts to deter piracy incidents in Africa. With this research purpose, I analyze 771 piracy incidents that occurred in African states from 2009 to 2014. Furthermore, I include all 33 coastal states in Africa regardless of the experiences of piracy incidents in order to avoid selection bias, which is very common in quantitative-based piracy incidents research. The dependent variable of this research is frequency of maritime piracy incidents for a country-year and the independent variable is the number of multi-national naval warships that operate near Somalia. With this analysis, I find the large number of multi-state naval combatant ships are negatively related to piracy incidents. In other words, as a main means to counteract piracy incidents, multi-state naval combatant ships are conducive to reduce piracy incidents near Somalia, since it increases costs (being captured) of conducting piracy.

An Enhanced Data Communication Protocol based on HF Radios for supporting Naval Operations (해상작전 지원을 위한 HF 무전기 기반 개선된 데이터 통신 프로토콜)

  • Lee, Seung Gu;Kang, Seung Nam;Lee, Soon Bok;So, Eul-Deuk;Lim, Jae Sung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.10
    • /
    • pp.1990-1998
    • /
    • 2017
  • The success of naval operation prioritizes the implementation of a robust communication network that delivers accurate and prompt communications to one another. The satellite, which is the main communication network of the military, is required to construct a preliminary communication network because of the enemy radio disturbance and weak point of fixed antenna. The military operational communication network has been in transition from voice-centered wireless communication network to text message-based communication network. In this paper we suggest an enhanced communication method built on Roll Call, the main communication method of ROK Navy operating tactical data link called Link-11. Simulation results display that the proposed method reduces the transmission time per unit frame by 4.3 times compared to the Roll Call and 6.3 times compared with the Round Robin & Broadcasting; it is also proved that the higher the direct reception rate, the shorter the transmission time required by 1.6 times maximum.

Design and Performance Analysis of Common data link digital modem for surveillance UAVs (정찰용 무인기를 위한 공용데이터링크 모뎀 설계 및 성능 분석)

  • Jung, Sungjin;Kim, Younggil;Lee, Daehong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.162-168
    • /
    • 2018
  • The UAV(Unmanned Aerial Vehicle) system, including the drone of a variety of fields, which has become an issue and utilized in various fields, has begun to develop in military fields and is actively developed in the commercial field. In various types of UAV systems, which have been developed recently, the communication system that is responsible for the connection between the ground control unit and the UAVs is called the data link. Especially, common data link used in military UAVs is required stability of communication to transmit surveillance and reconnaissance intelligence information and UAV's status. In this paper, the requirement for a modem was defined to secure the communication stability of the common data link used in surveillance UAVs. And, the design of the data link modem to satisfy applicable specifications was proposed. The proposed modem design was verified through the performance measurement of the implemented systems.

The Analysis of Granger Causality between GDP and R&D Investments in Government, Private, Defense Sectors (국방 R&D 투자 및 정부, 민간 R&D 투자와 국민소득간의 상호 인과관계 분석)

  • Lee, Jin-Woo;Kwon, O-Sung
    • Journal of the military operations research society of Korea
    • /
    • v.34 no.1
    • /
    • pp.79-98
    • /
    • 2008
  • The purpose of this paper is to find the desirable R&D policies in defense area by analyzing causality between GDP and R&D investments in government, private, defense sectors. We have five variables which are composed of GDP, total R&D investment, R&D investments in government, private and defense sectors to figure out the causality between R&D investment in defense sector and other components. In the course of analysis on causality, we took the unit root test of variables to prevent spurious regression. Also we need to take cointegration test about non-stationary variables before the causality test. According to these test results, we took the causality test using ECM(Error Correction Model) for the models which have cointegrating relations. And we took ordinary Granger causality test for model which doesn't have a long-run stationary relationship. As a result of the causality test, it was shown that there exists the long-nu causality to GDP and R&D investments in government and private sectors from other variables. However, there doesn't exist the causality to defense R&D investment from other variables. We found that there doesn't exist the causality between R&D investments in defense and private sectors, and that they are independent.

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.

Prediction of Sea Water Temperature by Using Deep Learning Technology Based on Ocean Buoy (해양관측부위 자료 기반 딥러닝 기술을 활용한 해양 혼합층 수온 예측)

  • Ko, Kwan-Seob;Byeon, Seong-Hyeon;Kim, Young-Won
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.3
    • /
    • pp.299-309
    • /
    • 2022
  • Recently, The sea water temperature around Korean Peninsula is steadily increasing. Water temperature changes not only affect the fishing ecosystem, but also are closely related to military operations in the sea. The purpose of this study is to suggest which model is more suitable for the field of water temperature prediction by attempting short-term water temperature prediction through various prediction models based on deep learning technology. The data used for prediction are water temperature data from the East Sea (Goseong, Yangyang, Gangneung, and Yeongdeok) from 2016 to 2020, which were observed through marine observation by the National Fisheries Research Institute. In addition, we use Long Short-Term Memory (LSTM), Bidirectional LSTM, and Gated Recurrent Unit (GRU) techniques that show excellent performance in predicting time series data as models for prediction. While the previous study used only LSTM, in this study, the prediction accuracy of each technique and the performance time were compared by applying various techniques in addition to LSTM. As a result of the study, it was confirmed that Bidirectional LSTM and GRU techniques had the least error between actual and predicted values at all observation points based on 1 hour prediction, and GRU was the fastest in learning time. Through this, it was confirmed that a method using Bidirectional LSTM was required for water temperature prediction to improve accuracy while reducing prediction errors. In areas that require real-time prediction in addition to accuracy, such as anti-submarine operations, it is judged that the method of using the GRU technique will be more appropriate.

A Comparative Study of Technological Forecasting Methods with the Case of Main Battle Tank by Ranking Efficient Units in DEA (DEA기반 순위선정 절차를 활용한 주력전차의 기술예측방법 비교연구)

  • Kim, Jae-Oh;Kim, Jae-Hee;Kim, Sheung-Kown
    • Journal of the military operations research society of Korea
    • /
    • v.33 no.2
    • /
    • pp.61-73
    • /
    • 2007
  • We examined technological forecasting of extended TFDEA(Technological Forecasting with Data Envelopment Analysis) and thereby apply the extended method to the technological forecasting problem of main battle tank. The TFDEA has the possibility of using comparatively inefficient DMUs(Decision Making Units) because it is based on DEA(Data Envelopment Analysis), which usually leads to multiple efficient DMUs. Therefore, TFDEA may result in incorrect technological forecasting. Instead of using the simple DEA, we incorporated the concept of Super-efficiency, Cross-efficiency, and CCCA(Constrained Canonical Correlation Analysis) into the TFDEA respectively, and applied each method to the case study of main battle tank using verifiable practical data sets. The comparative analysis shows that the use of CCCA with TFDEA results in very comparable prediction accuracies with respect to MAE(Mean Absolute Error), MSE(Mean Squared Error), and RMSE(Root Mean Squared Error) than using the concept of Super-efficiency and Cross-efficiency.

Acceleration of the Multi-Level Fast Multipole Algorithm using Double Interpolation Technique (이중 보간 기법을 이용한 MLFMA 가속기법)

  • Yun, Dal-Jae;Kim, Hyung-Ju;Lee, Jae-In;Yang, Seong-Jun;Yang, Woo-Yong;Bae, Jun-Woo;Myung, Noh-Hoon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.3
    • /
    • pp.311-319
    • /
    • 2019
  • This paper proposes an acceleration of the multi-level fast multipole algorithm(MLFMA) by using a double interpolation method. The MLFMA has been primarily used to conduct scattering analysis of electrically large targets, e.g. stealth aircraft. In the MLFMA, radiation functions of each basis functions are first precomputed, and then aggregated. After transfer calculations for the aggregations, each interaction is disaggregated, and then received in the testing function. The key idea of the proposed method is to decrease the sampling rates of the radiation and receiving functions. The computational complexity of the unit sphere integration in terms of the testing functions is thus highly alleviated. The remaining insufficient sampling rate is then complemented by using additional interpolation. We demonstrate the performance of the proposed method through radar cross-section(RCS) calculations for realistic aircraft.

A Study on the Effect of Organizational Communication on Organizational Citizenship Behavior - Focusing on the Moderating Effect of Transformational Leadership - (조직커뮤니케이션과 조직시민행동 관계에 대한 연구 - 변혁적 리더십의 조절효과를 중심으로 -)

  • Park, Ji-Cheol;Chang, Sug-In
    • Management & Information Systems Review
    • /
    • v.33 no.3
    • /
    • pp.189-208
    • /
    • 2014
  • This research is on the relationship among organizational communication and organizational citizenship behavior focused on the moderating effect of transformational leadership. The objective of this research is to conduct positive verification of organizational communication impacting on organizational citizenship behavior. Also, to perform positive verification on moderating effect of transformational leadership. The variables are downward communication, upward communication, unofficial communication, organizational citizenship behavior including participatory actions, altruistic behavior, mindful behaviors, and transformational leadership. It was verified on survey of 232 peoples. The verification and analysis results will be provided to impact of organizational communication on organizational citizenship behavior, the downward communication impacts all elements of citizens' behaviors, and upward communication impacts of participatory actions. On the other hand, the unofficial communication did not impact at all. Moreover the results of moderating effect of transformational leadership. The transformational leadership act as moderator in downward, upward communications. but did not act as a moderator on the unofficial communication. The research suggests to use transformational leaderships to commanders and leaderships at military organizations to put efforts on active communication in order to manage unit more effectively and efficiently and to make members of organization to voluntarily. It is assessed that this paper will serve as a reference to whoever in military reform group or organization working for military developments working for creating elite forces.

  • PDF