• Title/Summary/Keyword: Defense Systems

Search Result 2,105, Processing Time 0.029 seconds

A Sequential Estimation Algorithm for TDOA/FDOA Extraction for VHF Communication Signals (VHF 대역 통신 신호에서 TDOA/FDOA 정보 추출을 위한 순차 추정 알고리즘)

  • Kim, Dong-Gyu;Kim, Yong-Hee;Park, Jin-Oh;Lee, Moon Seok;Park, Young-Mi;Kim, Hyoung-Nam
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.7
    • /
    • pp.60-68
    • /
    • 2014
  • In modern electronic warfare systems, a demand on the more accurate estimation method based on TDOA and FDOA has been increased. TDOA/FDOA localization consists of two-stage procedures; the extraction of information from signals, and the estimation of emitter location. CAF(complex ambiguity function) is known as a basic method in the extraction stage. However, when we extract TDOA and FDOA information from VHF(very high frequency) communication signals, conventional CAF algorithms may not work within a permitted time because of much computation. Therefore, in this paper, an improved sequential estimation algorithm based on CAF is proposed for effective calculation of extracting TDOA and FDOA estimates in terms of computational complexity. The proposed method is compared with the conventional CAF-based algorithms through simulation. In addition, we derive the optimal performance based on the CRLB(Cramer-Lao lower bound) to check the extraction performance of the proposed method.

A Study on the Initial Design Method for an Effective Acquisition of Future Ground Combat Vehicles (미래지상전투차량의 효과적 획득을 위한 초기설계기법에 관한 연구)

  • Kim, Hee-young;Kwon, Seung Man;Lee, Kyu Noh
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.2
    • /
    • pp.41-49
    • /
    • 2017
  • In the acquisition program, the conceptual design is the most important step toward specifying the military objectives, establishing requirements and determining future developmental directions, of a target system. However, if both the requirements and directions are incorrectly set due to the lack of development experiences and literature backgrounds in the target systems, such as future ground combat vehicles, it may become a major risk in the future design phases and the entire acquisition program. In order to correct these errors in the future phases, time, effort and cost are required. Therefore, it is necessary to reduce the errors that occur in the initial stages to effectively acquire the future ground combat vehicles. This paper describes the initial design method for verifying the requirements and the developmental directions and estimating the system performance at the conceptual design through the system-level physical modeling and simulation (M&S) and the target system performance analysis. The system-level physical M&S use cutting-edge design tools, model-based designs and geometric-based designs. The system performance estimation is driven from the results of the system-level physical M&S and the specialized system analysis software.

Fire Protection Regulations for Ensuring Fire Safety during Decommissioning Nuclear Power Plants in Korea (해체원전 화재안전 확보를 위한 화재방호 규정 고찰)

  • Kim, Jung-Wun;Park, Chan-Geun
    • Fire Science and Engineering
    • /
    • v.34 no.3
    • /
    • pp.134-140
    • /
    • 2020
  • Nuclear power plants (NPPs) in Korea are required to be maintained using a defense in-depth approach to prevent leakage of radioactive substances outside the plant and allow safe shutdown in the event of a fire. Periodic testing must be conducted to ensure that the fire protection facilities perform as required by the laws for various nuclear reactor types. In June 2017, for the first time in Korea, a nuclear plant, Kori Unit 1, was permanently shut down. It was prepared for decommissioning in accordance with the fire protection regulations imposed by the regulatory body. However, a standard protocol is necessary for systematically establishing the fire protection program for decommissioning of NPPs in the future. Therefore, the nuclear legal systems of countries with many operating nuclear power plants, such as the United States, Japan, Canada, and various European countries, were reviewed and guidelines for establishing a fire protection program for decommissioning NPPs was suggested; the fire protection requirements stated by Reg Guide 1.191 (Decommissioning fire protection program for NPPs during decommissioning and permanent shutdown) were used as a model. Suggestions for establishing legal regulations to optimize fire protection programs and secure basic technology for decommissioning NPPs were also made.

Weighted Energy Detector for Detecting Uunknown Threat Signals in Electronic Warfare System in Weak Power Signal Environment (전자전 미약신호 환경에서 미상 위협 신호원의 검출 성능 향상을 위한 가중 에너지 검출 기법)

  • Kim, Dong-Gyu;Kim, Yo-Han;Lee, Yu-Ri;Jang, Chungsu;Kim, Hyoung-Nam
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.3
    • /
    • pp.639-648
    • /
    • 2017
  • Electronic warfare systems for extracting information of the threat signals can be employed under the circumstance where the power of the received signal is weak. To precisely and rapidly detect the threat signals, it is required to use methods exploiting whole energy of the received signals instead of conventional methods using a single received signal input. To utilize the whole energy, numerous sizes of windows need to be implemented in a detector for dealing with all possible unknown length of the received signal because it is assumed that there is no preliminary information of the uncooperative signals. However, this grid search method requires too large computational complexity to be practically implemented. In order to resolve this complexity problem, an approach that reduces the number of windows by selecting the smaller number of representative windows can be considered. However, each representative window in this approach needs to cover a certain amount of interval divided from the considering range. Consequently, the discordance between the length of the received signal and the window sizes results in degradation of the detection performance. Therefore, we propose the weighted energy detector which results in improved detection performance comparing with the conventional energy detector under circumstance where the window size is smaller than the length of the received signal. In addition, it is shown that the proposed method exhibits the same performance under other circumstances.

Effects of Camellia sinensis Extracts on the Antioxidant System and Alcohol Down-Regulation Enzymes in Sub-Acute Ethanol Treated ICR Mice (차나무(Camellia sinensis) 추출물이 아급성 알코올 투여 마우스의 항산화 및 알코올 분해 효소 활성에 미치는 영향)

  • Koo, Sung-Ja;Choi, Il-Sook;Kong, Yeon-Hee;Choi, Sang-Yoon;Jo, Youn-Ock
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.36 no.9
    • /
    • pp.1134-1139
    • /
    • 2007
  • This study was conducted to investigate the effects of four kinds of tea (Camellia sinensis) extracts on the antioxidant defense systems as well as the activities of alcohol dehydrogenase (ADH) and acetaldehyde dehydrogenase (ALDH) in ethanol administered ICR mice. According to the results, treatment with puerh tea significantly increased the superoxide dismutase activity and glutathion reductase activity in liver. In addition, the group treated with oolong tea exhibited higher superoxide dismutase activity and glutathion reductase activity in serum than those of puerh tea, green tea and black tea treated groups. The oolong tea and puerh tea also reduced malondealdehyde contents in both liver and serum. These results suggested that puerh tea and oolong tea were the most effective against alcohol-induced oxidative damage among the Camellia sinensis teas. On the other hand, in the measurement of alcohol break-down enzyme activities, the group treated with green tea exhibited the highest hepatic ADH and ALDH activities, suggesting that the group treated with green tea might be useful for alcohol down-regulation.

A 2-Step Global Optimization Algorithm for TDOA/FDOA of Communication Signals (통신 신호에서 TDOA/FDOA 정보 추출을 위한 2-단계 전역 최적화 알고리즘)

  • Kim, Dong-Gyu;Park, Jin-Oh;Lee, Moon Seok;Park, Young-Mi;Kim, Hyoung-Nam
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.4
    • /
    • pp.37-45
    • /
    • 2015
  • In modern electronic warfare systems, a demand on the more accurate estimation method based on TDOA and FDOA has been increased. TDOA/FDOA localization consists of two-stage procedures: the extraction of information from signals and the estimation of emitter location. Various algorithms based on CAF(complex ambiguity function), which is known as a basic method, has been presented in the area of extractions. When we extract TDOA and FDOA information using a conventional method based on the CAF algorithm from communication signals, considerably long integration time is required for the accurate position estimation of an unknown emitter far from sensors more than 300 km. Such long integration time yields huge amount of transmission data from sensors to a central processing unit, resulting in heavy computiational complexity. Therefore, we theoretically analyze the integration time for TDOA/FDOA information using CRLB and propose a two-stage global optimization algorithm which can minimize the transmission time and a computational complexity. The proposed method is compared with the conventional CAF-based algorithms in terms of a computational complexity and the CRLB to verify the estimation performance.

Erosion and Recovery of Coastal Dunes after Tropical Storms (태풍의 통과로 인한 해안사구 지형의 침식과 회복)

  • Choi, Kwang Hee;Jung, Pil Mo;Kim, Yoonmi;Suh, Min Hwan
    • Journal of The Geomorphological Association of Korea
    • /
    • v.19 no.1
    • /
    • pp.17-27
    • /
    • 2012
  • Coastal dunes help stabilize the coastal landscape and protect the hinterland through dynamic interaction with sand beaches. Sometimes dune erosion occurs during the tropical cyclones, while dune recovery may naturally follow after the event. As the typhoon Kompasu passed through the Korean Peninsula early-September in 2010, it caused a rise in water in association with the storm, wave run-ups, and heavy rains in coastal areas. As the result, coastal dunes along the west coast of Korea were severely damaged during the storm. However, the degree and extent of erosion and recovery of dunes were found to be related with the condition of beach-dune systems including gradients of foreshore and front slope of the dune, sediment supply, vegetation, wind activity, and human interferences. Some dunes retreated landward more and more after the erosional event, while others recovered its original profile by aeolian transport processes mainly during the winter season. Vegetated dunes with pine trees were less recovered after the erosion than grass-covered dunes. In addition, dunes with artificial defense were more eroded and less recovered than those without hard constructions. According to the observation after the severe storm, it is likely that the sand transport process is critical to the dune recovery. Therefore, the interactions between beach and dune must be properly evaluated from a geomorphological perspective for the effective management of coastal dunes, including natural recovery after the erosion by storm events.

A Research on Network Intrusion Detection based on Discrete Preprocessing Method and Convolution Neural Network (이산화 전처리 방식 및 컨볼루션 신경망을 활용한 네트워크 침입 탐지에 대한 연구)

  • Yoo, JiHoon;Min, Byeongjun;Kim, Sangsoo;Shin, Dongil;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.2
    • /
    • pp.29-39
    • /
    • 2021
  • As damages to individuals, private sectors, and businesses increase due to newly occurring cyber attacks, the underlying network security problem has emerged as a major problem in computer systems. Therefore, NIDS using machine learning and deep learning is being studied to improve the limitations that occur in the existing Network Intrusion Detection System. In this study, a deep learning-based NIDS model study is conducted using the Convolution Neural Network (CNN) algorithm. For the image classification-based CNN algorithm learning, a discrete algorithm for continuity variables was added in the preprocessing stage used previously, and the predicted variables were expressed in a linear relationship and converted into easy-to-interpret data. Finally, the network packet processed through the above process is mapped to a square matrix structure and converted into a pixel image. For the performance evaluation of the proposed model, NSL-KDD, a representative network packet data, was used, and accuracy, precision, recall, and f1-score were used as performance indicators. As a result of the experiment, the proposed model showed the highest performance with an accuracy of 85%, and the harmonic mean (F1-Score) of the R2L class with a small number of training samples was 71%, showing very good performance compared to other models.

A Study on the Surveillance System and the Location of Fortress of the Sil-la Dynasty by a Cumulative Visibility Analysis (누적가시도 분석을 이용한 신라시대의 산성 입지와 감시체계에 관한 연구)

  • Kim, Choong-Sik;Lee, Jae-Yong;Kim, Young-Mo
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.29 no.3
    • /
    • pp.12-21
    • /
    • 2011
  • We investigated the location and surveillance system of fortress using inter-visibility analysis between fortress and the capital of the Silla Dynasty. The digital terrain model(DTM) was generated with $10{\times}10m$ grid in Arcview 3.2. Then three fortresses lines(Myeonghwal-sanseong, Namsan-shinseong, Seohyeong-sanseong) were superimposed on the DTM. 4 results of this study were drew out from the cumulative visibility analysis. First, the most of fortress lines which showed the high visible frequency from the Sila-Capital(538 viewpoints) have a good aspect toward the capital. It means that 3 fortresses secured the visibility to the capital. Second, the cumulative visibility analysis from 3 fortresses generated evenly distributed visible frequency across the inside of fortress. It shows that the inner area of fortress is more advantageous to command during the war. On the contrary, a number of invisible(vulnerable) regions which is scattered on the outside were supplemented by adjacent fortress. Third, the north area of the Sila-captial showed the highest visible frequency generated by sum up the visibility from 3 fortresses. The northern captial is placed within 4km distance easy to support at the Myeonghwal and Seohyeong-sanseong. We proved that the Sila-capital had organized a solid surveillance system by 3 fortresses. Fourth, we could infer the practical process of fortress layout from comparing a cumulative visibility map. For the secure of visibility and defense systems, the fortress line would form a rising shape to the peak. This practical location theory can replace the vague common location theory that the fortress would constructed on two thirds of mountain height. It will be an empirical method in the ancient remains research.

Effect of Hypersonic Missiles on Maritime Strategy: Focus on Securing and Exploiting Sea Control (극초음속 미사일이 해양전략에 미치는 영향: 해양통제의 확보와 행사를 중심으로)

  • Cho, Seongjin
    • Maritime Security
    • /
    • v.1 no.1
    • /
    • pp.241-271
    • /
    • 2020
  • The military technology currently receiving the most attention is the hypersonic missile. hypersonic is faster than the speed of sound or Mach 5+. The vast majority of the ballistic missiles that it inspired achieved hypersonic speeds as they fell from the sky. Rather than speed, today's renewed attention to hypersonic weapons owes to developments that enable controlled flight. These new systems have two sub-varieties: hypersonic glide vehicles and hypersonic cruise missiles. Hypersonic weapons could challenge detection and defense due to their speed, maneuverability, and low altitude of flight. The fundamental question of this study is: 'What effect will the hypersonic missile have on the maritime strategy?' It is quite prudent to analyze and predict the impact of technology in the development stage on strategy in advance. However, strategy is essential because it affect future force construction. hypersonic missiles act as a limiting factor in securing sea control. The high speed and powerful destructive power of the hypersonic missile are not only difficult to intercept, but it also causes massive ship damage at a single shot. As a result, it is analyzed that the Securing sea control will be as difficult as the capacity of sea denial will be improved geographically and qualitatively. In addition, the concept of Fortress Fleet, which was criticized for its passive strategy in the past, could be reborn in a modern era. There are maritime power projection/defence, SLOC attack/defence in exploiting sea control. The effects of hypersonic missiles on exploiting sea control could be seen as both limiting and opportunity factors.

  • PDF