• Title/Summary/Keyword: Acquisition Environment

Search Result 819, Processing Time 0.024 seconds

The Development of the Data Acquisition & Analysis System for Multi-Function Radar (다기능레이더 데이터 획득 및 분석 장치 개발)

  • Song, Jun-Ho
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.1
    • /
    • pp.106-113
    • /
    • 2011
  • This paper describes Data Acquisition & Analysis System(DAS) for analysis of the multi-function radar. There are various information - beam probing data, clutter map data, plot data, target tracking data, RT tracking data, radar signal processing data, interface data - this device saves. The most important thing of data analysis is that a researcher gets a view of the whole data. The DAS intergrates with all of the data and provides overall information on the time matters occur. This is very useful advantage for approaching the matter easily. System algorithms of multi-function radar are improved by using this advantage. As a result of, range blank region have fallen about 72% and it is able to keep track in jammer environment.

A Study on the Analysis of the Cost-Effectiveness for the New Generation Multiple Launcher Rocket System Using AHP & Parametric Estimating (AHP & 모수추정법을 이용한 차기 다련장로켓의 비용대 효과분석)

  • Cho, Ki-Hong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.1
    • /
    • pp.84-90
    • /
    • 2010
  • Korean army currently considers the development of the new generation MLRS(Multiple Launcher Rocket System) as a new alternative, which responses on the renovation of the artillery and future battlefield environment. This study suggests that it presents cost-effectiveness of MLRS based on the Analytic Hierarchy Process and Parametric Estimating(PRICE H). According to this study, the cost-effectiveness of new generation MLRS presented that alternative A is 2.30 times and alternative B is 1.70 times, which are better than currently operating M270A1. Therefore, The best acquisition is alternative A that launcher is carried on currently operating 10ton standard truck but final acquisition alternative should be politically decided to consider viability of operator, performance and the latest of equipment.

Reliability Development Programs for Korean Weapon Systems

  • Hong, Yeon-Woong;Park, Sung-Ho;Cho, Kyu-Sang
    • Journal of the Korean Data and Information Science Society
    • /
    • v.17 no.3
    • /
    • pp.727-742
    • /
    • 2006
  • In general, weapon systems require very high reliability. Recently Korean defense reliability technologies growth rapidly. However, there are some matters of reform in reliability management, reliability assurance, and defense acquisition environment, etc. In this paper, we propose the reliability development plan for Korean defense system as follows; 1) reliability improvement programs for each acquisition stages, 2) reliability improvement methods for logistics support, 3) reliability improvement programs for developers and manufacturers, 4) reform matters for the defense acquisition law, 6) establishment of defense reliability assessment center and defense reliability committee.

  • PDF

Research on key management for supervisory control and data acquisition system (원격 감시 제어시스템에서 키 관리 방안 연구)

  • Lee, Keonjik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.4
    • /
    • pp.29-42
    • /
    • 2020
  • SCADA (Supervisory Control and Data Acquisition) systems for remote monitoring, data acquisition and control are applied to major industrial infrastructures including power, water and railroad. Recently, there are many researches on key management scheme for secure communication due to change to the open network environment. These systems are located at far distances and are connected to the main control center through various types of communication methods. Due to the nature of these systems, they are becoming the significant targets of cyber attack. We propose an efficient key management scheme which is established on ID-based cryptosystem without an expensive computation on MTU (Master Terminal Unit), Sub-MTU, and RTU (Remote Terminal Unit). The proposed method is secure and effective in key management among multiple legitimate devices.

Radiation image mapping system (방사선 영상 매핑 장치)

  • 최영수;박순용;이종민
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1997.10a
    • /
    • pp.1884-1887
    • /
    • 1997
  • The increasing concern over radiation exposure in the nuclear industry has fostered agrressive efforts to reduce the levels of radiation exposure. One area of the effot to reduce the radiation exposure is the development of a remote radiation monitoring system. Remote radiation monitoring can serve many benificaial functions reduce exposure to radiation by plant personnel, impruve the quality of the data that is collected and recognize the radiation environment easily. Radiation mapping system gives a good information that represents radiation level distribution. The system we have developed consists of a data acquistion parts, mobile robot and remote control parts. Data acquisition parts consist of radiation detection module and vision acquistion module which collect radiation data, visiion data and distance information. In remote control parts, the acquision data are processed and displayed. We have constructed radiation mapping image by overlaying the vision and radiation data. The radiation mapping techniques for displaying the results of the survey in an easily comprehendable form will facilitate a better understanding of the radiation environment in the facility. This system can reduce workers radiation exposure and aid to help work plan, so it has significant benifits in cost and safety.

  • PDF

A Security Analysis of a Key Management Scheme for PCS/SCADA Sensor Networks (PCS/SCADA 센서 네트워크용 키 관리 프로토콜에 대한 보안 분석)

  • Park, DongGook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.2
    • /
    • pp.123-131
    • /
    • 2009
  • Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. Recently, Nilsson et al. proposed a key management scheme for PCS/SCADA, which was claimed to provide forward and backward secrecies. In this paper, we define four different types of adversaries or attackers in wireless sensor network environments in order to facilitate the evaluation of protocol strength. We then analyze Nilsson et al. 's protocol and show that it does not provide forward and backward secrecies against any type of adversary model.

A Forward & Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA

  • Park, Dong-Gook
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.2
    • /
    • pp.98-106
    • /
    • 2009
  • Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. In this paper, a key management scheme is proposed to defeat node capture attack by offering both forward and backward secrecies. Our scheme overcomes the pitfalls which Nilsson et al.'s scheme suffers from, and is not more expensive than their scheme.

An Analysis on the Influential Factors to Set the Path Planning Algorithm for Unmanned Ground Vehicle in Combat Environment (전장환경에서 무인전투차량의 경로계획 알고리즘설정 영향요인 분석)

  • Baek, Jong-Sung;Lee, Choon-Joo
    • The Journal of Korea Robotics Society
    • /
    • v.4 no.3
    • /
    • pp.233-242
    • /
    • 2009
  • This paper briefly reviews the path planning methods that are applicable to the autonomous mobile robots for the military. Two distinct path search algorithms, $A^*$ and $D^*$ that are most popular and flexible in public applications, among those reviewed are coded and analyzed in terms of combat environment assessment factors called METT+TC for the area of operations. The results imply that it is important to consider the characteristics of defense acquisition process and the specific requirements of defense operation so that the successful technology development of the Robot products is directly linked to the defense procurement of Robot products.

  • PDF

국가 지하수 정보 종합관리 체계의 구축과 활용(II) - 두레박 프로그램과 지하수세상 홈페이지 -

  • 손영철;김규범;최영진
    • Proceedings of the Korean Society of Soil and Groundwater Environment Conference
    • /
    • 2000.11a
    • /
    • pp.270-274
    • /
    • 2000
  • We have developed the computer system with MOCT which is called "The Integrated National Groundwater Information system" since 1995 and now begin to supply the database and related informations for ground water by internet homepage. The integrated system is composed of four sub systems which are "Groundwater Information System", "DUREBAK", "Hydrogeologic Map Management System" and "Groundwater World Homepage". The local government offices use the "DUREBAK" program to manage the well development and maintenance. About 1,000,000 wells are managed in "DUREBAK" program and they submit the well database to MOCT every year. And now everyone can obtain the well data and other informations through internet homepage. We have set the standard process of data acquisition and management for ground water last four years.s of data acquisition and management for ground water last four years.

  • PDF

A Real Time, Internet Accessed, Monitoring System of the Ocean and Harbor Environment (인터넷을 이용한 실시간 해양항만 환경모니터링 시스템의 설계)

  • 서규우;김가야
    • Journal of Ocean Engineering and Technology
    • /
    • v.18 no.1
    • /
    • pp.10-15
    • /
    • 2004
  • For effective conservation of the oceans and harbors, long-term and systematic development of the ocean and harbor monitoring system is essential. A monitoring system capable of real-time and accurate data acquisition is necessary for dealing with the level of contamination by situations, such as red tide and foods. This paper introduces an effective and economical real-time harbor environmental monitoring system that utilizes PCS wireless data communication technology. The monitoring system has various functions, such as multiple communication, TCP/IP protocol for wireless internet access, system time synchronization, and bi-directional communication between the measuring device and the server. The system has been implemented at Shinseondae harbor pier in Busan to validate the system's stability and effectiveness in data acquisition. The acquired real-time ocean and harbor environmental data is expected to have a large effect, when shared with the public through the Internet.