• Title/Summary/Keyword: Defense Science Technology

Search Result 1,866, Processing Time 0.03 seconds

Rethinking of the Uncertainty: A Fault-Tolerant Target-Tracking Strategy Based on Unreliable Sensing in Wireless Sensor Networks

  • Xie, Yi;Tang, Guoming;Wang, Daifei;Xiao, Weidong;Tang, Daquan;Tang, Jiuyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.6
    • /
    • pp.1496-1521
    • /
    • 2012
  • Uncertainty is ubiquitous in target tracking wireless sensor networks due to environmental noise, randomness of target mobility and other factors. Sensing results are always unreliable. This paper considers unreliability as it occurs in wireless sensor networks and its impact on target-tracking accuracy. Firstly, we map intersection pairwise sensors' uncertain boundaries, which divides the monitor area into faces. Each face has a unique signature vector. For each target localization, a sampling vector is built after multiple grouping samplings determine whether the RSS (Received Signal Strength) for a pairwise nodes' is ordinal or flipped. A Fault-Tolerant Target-Tracking (FTTT) strategy is proposed, which transforms the tracking problem into a vector matching process that increases the tracking flexibility and accuracy while reducing the influence of in-the-filed factors. In addition, a heuristic matching algorithm is introduced to reduce the computational complexity. The fault tolerance of FTTT is also discussed. An extension of FTTT is then proposed by quantifying the pairwise uncertainty to further enhance robustness. Results show FTTT is more flexible, more robust and more accurate than parallel approaches.

A Study on General-Standard Conformance Test Framework and Methodology of Defense Information Technical Standard (국방정보기술표준 일반 표준적합성시험 프레임워크 및 방법론 연구)

  • Seo, Minwoo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.6
    • /
    • pp.744-751
    • /
    • 2016
  • Interoperability tests are required to determine whether network-based defense systems successfully share and exchange certain services, information, and data. We must examine various aspects of interoperability. The DITA (Defense Information Technical stAndard) is the basis for interoperability. However, DITA is being applied to the defense system in a state that the standard test methods and procedures are not established. And there is no test method and procedure of the DITA well applicable to military weapons systems or information systems. Therefore, in this paper, we propose a framework that includes procedures, methodologies, so as to test whether a standard is applied to the DITA in terms of Standard Conformance Test.

Elimination of Outlier from Technology Growth Curve using M-estimator for Defense Science and Technology Survey (M-추정을 사용한 국방과학기술 수준조사 기술성장모형의 이상치 제거)

  • Kim, Jangheon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.1
    • /
    • pp.76-86
    • /
    • 2020
  • Technology growth curve methodology is commonly used in technology forecasting. A technology growth curve represents the paths of product performance in relation to time or investment in R&D. It is a useful tool to compare the technological performances between Korea and advanced nations and to describe the inflection points, the limit of improvement of a technology and their technology innovation strategies, etc. However, the curve fitting to a set of survey data often leads to model mis-specification, biased parameter estimation and incorrect result since data through survey with experts frequently contain outlier in process of curve fitting due to the subjective response characteristics. This paper propose a method to eliminate of outlier from a technology growth curve using M-estimator. The experimental results prove the overall improvement in technology growth curves by several pilot tests using real-data in Defense Science and Technology Survey reports.

A Study on the Improvement of the Defense-related International Patent Classification using Patent Mining (특허 마이닝을 이용한 국방관련 국제특허분류 개선 방안 연구)

  • Kim, Kyung-Soo;Cho, Nam-Wook
    • Journal of Korean Society for Quality Management
    • /
    • v.50 no.1
    • /
    • pp.21-33
    • /
    • 2022
  • Purpose: As most defense technologies are classified as confidential, the corresponding International Patent Classifications (IPCs) require special attention. Consequently, the list of defense-related IPCs has been managed by the government. This paper aims to evaluate the defense-related IPCs and propose a methodology to revalidate and improve the IPC classification scheme. Methods: The patents in military technology and their corresponding IPCs during 2009~2020 were utilized in this paper. Prior to the analysis, patents are divided into private and public sectors. Social network analysis was used to analyze the convergence structure and central defense technology, and association rule mining analysis was used to analyze the convergence pattern. Results: While the public sector was highly cohesive, the private sector was characterized by easy convergence between technologies. In addition, narrow convergence was observed in the public sector, and wide convergence was observed in the private sector. As a result of analyzing the core technologies of defense technology, defense-related IPC candidates were identified. Conclusion: This paper presents a comprehensive perspective on the structure of convergence of defense technology and the pattern of convergence. It is also significant because it proposed a method for revising defense-related IPCs. The results of this study are expected to be used as guidelines for preparing amendments to the government's defense-related IPC.

Discriminant Analysis for the Prediction of Unlawful Company in Defense Procurement (국방조달에서 부정당업자 판별분석 모형 개발)

  • Han, Hong-Kyu;Choi, Seok-Cheol
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.3
    • /
    • pp.467-473
    • /
    • 2011
  • The contractor management for the effective defense project is essential factor in the modern defense acquisition task. The occurrence of unlawful company causes hastiness for project manager and setback to the deployment of defense weapon system. In this paper, we develop a prediction model for the effective defense project by using the discriminant analysis and analyse the variables that discriminate the unlawful company in many variables. It is expected that our model can be used to improve the project management capability of defense acquisition and contribute to the establishment of efficient procurement procedure through entry of the reliable defense manufacturer.

The Development of Torpedo Defense Experimental Technique based on M&S (M&S 기반 어뢰방어전 모의실험 기술 구현)

  • Nah, Young-In;Lee, Sim-Yong;Yoon, Han-Saem
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.5
    • /
    • pp.818-823
    • /
    • 2010
  • Exploiting models and simulations are encouraged among the defense acquisition society, as now enforced by the Defense Aquisition Program Administration's regulations. They are useful and, sometimes, inevitable especially in an earlier phase of system development. Computer-simulation-based experimentation technique for the system operational performance analysis for a torpedo defense system is introduced in this paper. Problem definition for the torpedo defense system analysis and engineering efforts for models and simulations development are presented here, including defining measures of performance and effectiveness for the torpedo defense system, conceptual modeling for torpedo engagement and defense simulation, design of experimentation, design of simulator and experimentor, and hardware and software implementation of an analysis support tool - a system operations demonstration and experimentation simulator.

Avionics Architecture Design for Military Unmanned Aerial Vehicles (군용 무인기의 항공전자 아키텍처 설계)

  • Jae Ick, Shim;Jae Won, Choi;Yong Tae, Kim;Dong Wan, Yoo;Kook Bo, Yang;Hyun Seok, Ha;Sang Jin, Kim;Seung Yul, Lee;Sang Jun, Jung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.6
    • /
    • pp.628-636
    • /
    • 2022
  • This paper describes the design of the avionics architecture for military unmanned aerial vehicles considering the airworthiness requirements for the first time. This design considers the redundancy in the system data bus and the power system and the data link system to meet the system safety requirements of the airworthiness requirements of military UAVs. This avionics architecture design has been verified through the system integration test and the flight test after manufacturing the UAV.

A Fast and Robust Algorithm for Fighting Behavior Detection Based on Motion Vectors

  • Xie, Jianbin;Liu, Tong;Yan, Wei;Li, Peiqin;Zhuang, Zhaowen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.2191-2203
    • /
    • 2011
  • In this paper, we propose a fast and robust algorithm for fighting behavior detection based on Motion Vectors (MV), in order to solve the problem of low speed and weak robustness in traditional fighting behavior detection. Firstly, we analyze the characteristics of fighting scenes and activities, and then use motion estimation algorithm based on block-matching to calculate MV of motion regions. Secondly, we extract features from magnitudes and directions of MV, and normalize these features by using Joint Gaussian Membership Function, and then fuse these features by using weighted arithmetic average method. Finally, we present the conception of Average Maximum Violence Index (AMVI) to judge the fighting behavior in surveillance scenes. Experiments show that the new algorithm achieves high speed and strong robustness for fighting behavior detection in surveillance scenes.

PRI: A Practical Reputation-based Incentive Scheme for Delay Tolerant Networks

  • Zhang, Xi;Wang, Xiaofei;Liu, Anna;Zhang, Quan;Tang, Chaojing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.4
    • /
    • pp.973-988
    • /
    • 2012
  • Delay tolerant networks (DTNs) characterized by the lack of guaranteed end-to-end paths exploit opportunistic data forwarding mechanism, which depends on the hypothesis that nodes are willing to store, carry, and forward the in-transit messages in an opportunistic way. However, this hypothesis might easily be violated by the presence of selfish nodes constrained with energy, bandwidth, and processing power. To address this problem, we propose a practical reputation-based incentive scheme, named PRI, to stimulate honest forwarding and discipline selfish behavior. A novel concept of successful forwarding credential and an observation protocol are presented to cope with the detection of nodes' behavior, and a reputation model is proposed to determine egoistic individuals. The simulation results demonstrate the effectiveness and practicality of our proposal.

An Intelligent MAC Protocol Selection Method based on Machine Learning in Wireless Sensor Networks

  • Qiao, Mu;Zhao, Haitao;Huang, Shengchun;Zhou, Li;Wang, Shan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5425-5448
    • /
    • 2018
  • Wireless sensor network has been widely used in Internet of Things (IoT) applications to support large and dense networks. As sensor nodes are usually tiny and provided with limited hardware resources, the existing multiple access methods, which involve high computational complexity to preserve the protocol performance, is not available under such a scenario. In this paper, we propose an intelligent Medium Access Control (MAC) protocol selection scheme based on machine learning in wireless sensor networks. We jointly consider the impact of inherent behavior and external environments to deal with the application limitation problem of the single type MAC protocol. This scheme can benefit from the combination of the competitive protocols and non-competitive protocols, and help the network nodes to select the MAC protocol that best suits the current network condition. Extensive simulation results validate our work, and it also proven that the accuracy of the proposed MAC protocol selection strategy is higher than the existing work.