• Title/Summary/Keyword: Defense ability

Search Result 231, Processing Time 0.03 seconds

Tests on explosion-resisting properties of high-performance equal-sized-aggregate concrete composite sandwich plates

  • Yizhong Tan;Songlin Yue;Gan Li;Chao Li;Yihao Cheng;Wei Dai;Bo Zhang
    • Structural Engineering and Mechanics
    • /
    • v.87 no.4
    • /
    • pp.297-304
    • /
    • 2023
  • Targeted introduction of explosion-resisting and energy-absorbing materials and optimization of explosion-resisting composite structural styles in underground engineering are the most important measures for modern engineering protection. They could also improve the survivability of underground engineering in wartime. In order to test explosion-resisting and energy-absorbing effects of high-performance equal-sized-aggregate (HPESA) concrete, the explosive loading tests were conducted on HPESA concrete composite plates by field simple explosion craters. Time-history curves of the explosion pressure at the interfaces were obtained under six conditions with different explosion ranges and different thicknesses of the HPESA concrete plate. Test results show that under the same explosion range, composite plate structures with different thicknesses of the HPESA concrete plate differ significantly in terms of the wave-absorbing ability. Under the three thicknesses in the tests, the wave-absorbing ability is enhanced with the growing thickness and the maximum pressure attenuation index reaches 83.4%. The energy attenuation coefficient of the HPESA concrete plate under different conditions was regressively fitted. The natural logarithm relations between the interlayer plate thickness and the energy attenuation coefficient under the two explosion ranges were attained.

A Study on a Radar Absorbing Structure for Aircraft Leading Edge Application

  • Baek, Sang Min;Lee, Won Jun;Joo, Young Sik
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.18 no.2
    • /
    • pp.215-221
    • /
    • 2017
  • An electromagnetic (EM) wave absorber reduces the possibility of radar detection by minimizing the radar cross section (RCS) of structures. In this study, a radar absorbing structure (RAS) was applied to the leading edge of a blended wing body aircraft to reduce RCS in X-band (8.2~12.4GHz) radar. The RAS was composed of a periodic pattern resistive sheet with conductive lossy material and glass-fiber/epoxy composite as a spacer. The applied RAS is a multifunctional composite structure which has both electromagnetic (EM) wave absorbing ability and load-bearing ability. A two dimensional unit absorber was designed first in a flat-plate shape, and then the fabricated leading edge structure incorporating the above RAS was investigated, using simulated and free-space measured reflection loss data from the flat-plate absorber. The leading edge was implemented on the aircraft, and its RCS was measured with respect to various azimuth angles in both polarizations (VV and HH). The RCS reduction effect of the RAS was evaluated in comparison with a leading edge of carbon fabric reinforced plastics (CFRP). The designed leading edge structure was examined through static structural analysis for various aircraft load cases to check structural integrity in terms of margin of safety. The mechanical and structural characteristics of CFRP, RAS and CFRP with RAM structures were also discussed in terms of their weight.

Extraction of Military Ontology Using Six-Step Bottom-up Approach (6단계 상향식 방법에 의한 국방 온톨로지 추출)

  • Ra, Min-Young;Yang, Kyung-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.6
    • /
    • pp.17-26
    • /
    • 2009
  • In national defense, established information systems are mainly based on simple information processing, such as mass data query. They have thus lacked intelligent ability of information and knowledge representation ability. We therefore need the research about the construction of military ontology which is the main topic for knowledge construction. Military ontology can help us develop the intelligent national defense information system which can search and manage information efficiently. In this paper, we present the six-step bottom-up approach for military ontology extraction, then we apply this approach to one of military domain, called national defense educational training, and finally implement it using $Prot\acute{e}g\acute{e}$ which is one of the most useful ontology development tool.

Influence of Motivation·Opportunity·Ability Factors on Knowledge Sharing and the Moderating Effect of System Use Voluntariness - Focused on the Defense Knowledge Sharing System - (동기·기회·능력요인이 지식제공 행위에 미치는 영향과 시스템 사용 자발성의 조절효과 - 국방 지식공유시스템을 중심으로 -)

  • Kim, Byoung-Su;Baek, Seung-Nyoung
    • Management & Information Systems Review
    • /
    • v.35 no.1
    • /
    • pp.23-50
    • /
    • 2016
  • The purpose of this study is to investigate the determinants of employees' knowledge contribution to 'Easysam', the Defense Knowledge Sharing System(DKSS), and provide managers and system designers with implications for enhancing the usage of the DKSS. Although the system seems to be helpful for employees to conduct their tasks by sharing and applying knowledge from the system, use of the system is confined to restricted employees and little empirical, systematic research has been done for this area. Therefore, using the motivation opportunity ability theory of behavior, this study hypothesizes that motivation factors(enjoy helping, reward confirmation), opportunity factor(system accessibility), and ability factor(self-rated expertise, tenure in the field) increase the level of employees' knowledge contribution to the DKSS. This research also includes hypotheses which address the effect of system use voluntariness, a moderator, on the relationship between predictors described above and knowledge provision. Survey results show that the effect of enjoy helping, reward confirmation, self-rated expertise and system accessibility is significant on employees knowledge provision. However, tenure in the field has no influence on its contribution of knowledge to the system. Theoretical and practical implications are provided.

  • PDF

AP2/EREBP Transcription Factors in Rice

  • Kim, Yun-Ju;Jung, Eui-Whan;Hwang, Seon-Hee;Go, Seong-Joo;Hwang, Duk-Ju
    • The Plant Pathology Journal
    • /
    • v.20 no.1
    • /
    • pp.41-45
    • /
    • 2004
  • Plants have the ability to defend themselves against pathogens by activating a series of defense responses. SA is known to be a signal molecule in plant defense responses. Nevertheles, SA is not the only one signal mediating defense responses. In addition to SA, ethylene and jasmonic acid have also been known to mediate plant defense responses against pathogens. The activation of a series of plant defense responses is known to be through varieties of transcription factors. Specially AP2/EREBP transcription factors are involved in ethylene mediated defense signaling. In this review, recent progress on AP2/EREBP transcription factors in arabidopsis, tomato and tobacco and a few of AP2/ EREBP transcription factors in rice related to biotic stresses will be discussed.

Danger detection technology based on multimodal and multilog data for public safety services

  • Park, Hyunho;Kwon, Eunjung;Byon, Sungwon;Shin, Won-Jae;Jung, Eui-Suk;Lee, Yong-Tae
    • ETRI Journal
    • /
    • v.44 no.2
    • /
    • pp.300-312
    • /
    • 2022
  • Recently, public safety services have attracted significant attention for their ability to protect people from crimes. Rapid detection of dangerous situations (that is, abnormal situations where someone may be harmed or killed) is required in public safety services to reduce the time required to respond to such situations. This study proposes a novel danger detection technology based on multimodal data, which includes data from multiple sensors (for example, accelerometer, gyroscope, heart rate, air pressure, and global positioning system sensors), and multilog data, which includes contextual logs of humans and places (for example, contextual logs of human activities and crime-ridden districts) over time. To recognize human activity (for example, walk, sit, and punch), the proposed technology uses multimodal data analysis with an attitude heading reference system and long short-term memory. The proposed technology also includes multilog data analysis for detecting whether recognized activities of humans are dangerous. The proposed danger detection technology will benefit public safety services by improving danger detection capabilities.

Evaluation system of dynamically changing cryptographic algorithms using the SEBSW-1:PCI-based encryption and decryption PC board

  • Kajisaki, Hirotsugu;Kurokawa, Takakazu
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.145-148
    • /
    • 2002
  • In a network communication process, cryptographic algorithms play important role for secure process. This paper presents a new system architecture named "DCCS." This system can handle flexible operations of both cryptographic algorithms and the keys. For experimental evaluation, two representative cryptographic algorithms DES and Triple-DES are designed and implemented into an FPGA chip on the SEBSW-1. Then the developed board is confirmed to change its cryptographic algorithms dynamically. Also its throughput confirmed the ability of the real-time net-work use of the designed system.

  • PDF

Robust Backup Path Selection in Overlay Routing with Bloom Filters

  • Zhou, Xiaolei;Guo, Deke;Chen, Tao;Luo, Xueshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.8
    • /
    • pp.1890-1910
    • /
    • 2013
  • Routing overlay offers an ideal methodology to improve the end-to-end communication performance by deriving a backup path for any node pair. This paper focuses on a challenging issue of selecting a proper backup path to bypass the failures on the default path with high probability for any node pair. For existing backup path selection approaches, our trace-driven evaluation results demonstrate that the backup and default paths for any node pair overlap with high probability and hence usually fail simultaneously. Consequently, such approaches fail to derive a robust backup path that can take over in the presence of failure on the default path. In this paper, we propose a three-phase RBPS approach to identify a proper and robust backup path. It utilizes the traceroute probing approach to obtain the fine-grained topology information, and systematically employs the grid quorum system and the Bloom filter to reduce the resulting communication overhead. Two criteria, delay and fault-tolerant ability on average, of the backup path are proposed to evaluate the performance of our RBPS approach. Extensive trace-driven evaluations show that the fault-tolerant ability of the backup path can be improved by about 60%, while the delay gain ratio concentrated at 14% after replacing existing approaches with ours. Consequently, our approach can derive a more robust and available backup path for any node pair than existing approaches. This is more important than finding a backup path with the lowest delay compared to the default path for any node pair.

Research of Communication Coverage and Terrain Masking for Path Planning (경로생성 및 지형차폐를 고려한 통신영역 생성 방법)

  • Woo, Sang Hyo;Kim, Jae Min;Beak, InHye;Kim, Ki Bum
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.4
    • /
    • pp.407-416
    • /
    • 2020
  • Recent complex battle field demands Network Centric Warfare(NCW) ability to control various parts into a cohesive unit. In path planning filed, the NCW ability increases complexity of path planning algorithm, and it has to consider a communication coverage map as well as traditional parameters such as minimum radar exposure and survivability. In this paper, pros and cons of various propagation models are summarized, and we suggest a coverage map generation method using a Longley-Rice propagation model. Previous coverage map based on line of sight has significant discontinuities that limits selection of path planning algorithms such as Dijkstra and fast marching only. If there is method to remove discontinuities in the coverage map, optimization based path planning algorithms such as trajectory optimization and Particle Swarm Optimization(PSO) can also be used. In this paper, the Longley-Rice propagation model is used to calculate continuous RF strengths, and convert the strength data using smoothed leaky BER for the coverage map. In addition, we also suggest other types of rough coverage map generation using a lookup table method with simple inputs such as terrain type and antenna heights only. The implemented communication coverage map can be used various path planning algorithms, especially in the optimization based algorithms.

A Study on the Planning of Civil Defense Shelter and Design 4 - Focusing on the Applicability of Existing Facility - (민방위 대피시설 계획 및 설계 방안에 관한 연구 4 - 기존 시설물에 대한 활용가능성을 중심으로 -)

  • Park, Namkwun
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.3
    • /
    • pp.400-405
    • /
    • 2015
  • Operating system of CBRNE(Chemical, Biological, Radiological, Nuclear, and High-yield explosive)) weapon in North Korea has reached an internationally significant level. In preparation against the CBRNE weapon attack, the US is securing various forms of defense shelters and operating it based on classification by disaster characteristics. However, it is currently difficult to expect an efficient protective ability from South Korea due to the reckless designation of defense shelters without consideration of disaster characteristics. At this, this study examined the present condition of formerly used facilities, analyzed the characteristics of each facilities for the sorting of defense shelters that are possible of conversion into shelter against CBRNE weapon, and presented results and proposals gained through this study research.