• Title/Summary/Keyword: Defense ability

Search Result 231, Processing Time 0.037 seconds

Model-Based Design and Enhancement of Operational Procedure for Guided Missile Flight Test System (유도무기 비행시험 시스템을 위한 모델 기반 운용절차의 설계 및 개선)

  • Park, Woong;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.479-488
    • /
    • 2019
  • The flight test operational procedure artifact includes mission planning, execution methods, and safety measures for each step of test progress. As the development of guided missiles has become more advanced and strategic, flight test has become increasingly complex and broadened. Therefore, increased reliability of the flight test operation procedures was required to ensure test safety. Particularly, the design of the flight test operational procedures required verification through M&S to predict and prepare for the uncertainty in a new test. The relevant studies have published the optimal framework development for flight tests and the model-based improvements of flight test processes, but they lacked the specificity to be applied directly to the flight test operational procedures. In addition, the flight test operational procedures, which consist of document bases, have caused problems such as limitations of analysis capabilities, insensitive expressions, and lack of scalability for the behavior and performance analysis of test resources. To improve these problems, this paper proposes how to design operational procedure of guided missile flight test system by applying MBSE(Model-based Systems Engineering). This research has improved reliability by increasing the ability to analyze the behavior and performance of test resources, and increased efficiency with the scalability applicable to multiple flight tests. That can be also used continuously for the guided missile flight tests that will be developed in the future.

Method for evaluating the safety performance and protection ability of the mobile steel protective wall during the high-explosive ammunition test (고폭탄 탄약시험 간 이동형 강재 방호벽의 안전성능 판단 및 유효 방호력 평가 방법)

  • Jeon, In-Beom
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.573-582
    • /
    • 2021
  • In this study, a series of processes for evaluating the effective protection against barriers that should be equipped in institutions that perform reliability tests on high-risk ammunition, such as high-explosive ammunition, were introduced. The impact that high-explosive bombs can have on personnel includes damage to the eardrum and lungs caused by explosion overpressure and penetrating wounds that can be received by fragments generated simultaneously with the explosion. Therefore, a high-explosive with COMP B explosives as its contents were set up, and an explosion protection theory investigation to calculate the degree of damage, numerical calculations and simulations were performed to verify the protection power. A numerical calculation revealed the maximum explosion overpressure on the protective wall when the high-explosive exploded and the penetration force of the fragment against a 50 mm-thick protective wall to be 77.74 kPa and 41.34 mm, respectively. In the simulation verification using AUTODYN, the maximum explosion overpressures affecting the firewall and personnel were 56.68 kPa and 18.175 kPa, respectively, and the penetration of fragments was 35.56 mm. This figure is lower than the human damage limit, and it was judged that the protective power of the barrier would be effective.

The Rationalization of PDM in Pusan Port for the Period of Round Pacific Area (환태평양 시대의 부산항 물류산업 합리화)

  • Park, S. Y.;Park, C. S.
    • Journal of Korean Port Research
    • /
    • v.6 no.1
    • /
    • pp.93-110
    • /
    • 1992
  • The most change in this century is supposed to be declination of ideology, and block of world economy. Addition to down full of cold war atmosphere around Northeast Asia, not only economic and social mood in this region is dramatically changed, but also it gave birth to the block of Northeast economy that accerlated new hub of world economy. According to dramatic change of economic surroundings the dynamic potential of growth in this region will be guided to enlarge inter-regional trade and increase volume of trade, thus suggests to grow steadily transportation. cargos in this region will have to arrange the system of delivery and inner transportation, accessary facilities, inter-regional harbors if North America and EC has connected easily. As have accerlated GATT and UR represented multilateralism and regionalism, it has regulated to increase trades of region due to relief of the trade barrier through specific areas has agreed with separately. The flow of regionalism of world economy has appeared to realize EC and NAFTA centered U.S.A, and also has presented to free trade region or one-size market agreement in Asia as APEC, EAEG in Malaysia, and etc. In defense to this block and internationalism of world economy, Pusan has to come forward to the hub of Northeast others has proposed a project to dominate the Northeast, Economy Association Agreement as Far East comprehensive development project in USSR, Hunchun development project in NK, and East Sea development project in PRC, Niigate regional development in Japan, Duman River development project in NK, and East Sea development project in Korea. As this exercise has proceed, Pusan also have arranged development strategy definitely and prepared provisions systematically. Engaging to participate center of delivery system is meant to be completed complex functions, namely the transfer storage processing & assembly function of international commodity. Pusan has ability to be terminal point of TSR. it had been connected to EC as the biggest economy block and TKR as complex transportation root to Far East, it would be the center of inground and seabase delivery terminal to Rotterdom as the biggest container pier and major piers to North-East and South East Asia. In order to provide a Role of 21 century's internationalization, Pusan has appealed to participate in management information research and development connected to Pohang-Ulsan-Changwon-Masan, and has utilized efficiently the resources such as man, material, money and information.

  • PDF

Metabolic Regulation of Longevity and Immune Response in Caenorhabditis elegans by Ingestion of Lacticaseibacillus rhamnosus IDCC 3201 Using Multi-Omics Analysis

  • Daniel Junpyo Lee;Ju Young Eor;Min-Jin Kwak;Junbeom Lee;An Na Kang;Daye Mun;Hyejin Choi;Minho Song;Jong Nam Kim;Jun-Mo Kim;Jungwoo Yang;Hyung Wook Kim;Sangnam Oh;Younghoon Kim
    • Journal of Microbiology and Biotechnology
    • /
    • v.34 no.5
    • /
    • pp.1109-1118
    • /
    • 2024
  • Probiotics, specifically Lacticaseibacillus rhamnosus, have garnered attention for their potential health benefits. This study focuses on evaluating the probiotic properties of candidate probiotics L. rhamnosus IDCC 3201 (3201) using the Caenorhabditis elegans surrogate animal model, a well-established in vivo system for studying host-bacteria interactions. The adhesive ability to the host's gastrointestinal tract is a crucial criterion for selecting potential probiotic bacteria. Our findings demonstrated that 3201 exhibits significantly higher adhesive capabilities compared with Escherichia coli OP50 (OP50), a standard laboratory food source for C. elegans and is comparable with the widely recognized probiotic L. rhamnosus GG (LGG). In lifespan assay, 3201 significantly increased the longevity of C. elegans compared with OP50. In addition, preconditioning with 3201 enhanced C. elegans immune response against four different foodborne pathogenic bacteria. To uncover the molecular basis of these effects, transcriptome analysis elucidated that 3201 modulates specific gene expression related to the innate immune response in C. elegans. C-type lectin-related genes and lysozyme-related genes, crucial components of the immune system, showed significant upregulation after feeding 3201 compared with OP50. These results suggested that preconditioning with 3201 may enhance the immune response against pathogens. Metabolome analysis revealed increased levels of fumaric acid and succinic acid, metabolites of the citric acid cycle, in C. elegans fed with 3201 compared with OP50. Furthermore, there was an increase in the levels of lactic acid, a well-known antimicrobial compound. This rise in lactic acid levels may have contributed to the robust defense mechanisms against pathogens. In conclusion, this study demonstrated the probiotic properties of the candidate probiotic L. rhamnosus IDCC 3201 by using multi-omics analysis.

Construction and Application of Intelligent Decision Support System through Defense Ontology - Application example of Air Force Logistics Situation Management System (국방 온톨로지를 통한 지능형 의사결정지원시스템 구축 및 활용 - 공군 군수상황관리체계 적용 사례)

  • Jo, Wongi;Kim, Hak-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.2
    • /
    • pp.77-97
    • /
    • 2019
  • The large amount of data that emerges from the initial connection environment of the Fourth Industrial Revolution is a major factor that distinguishes the Fourth Industrial Revolution from the existing production environment. This environment has two-sided features that allow it to produce data while using it. And the data produced so produces another value. Due to the massive scale of data, future information systems need to process more data in terms of quantities than existing information systems. In addition, in terms of quality, only a large amount of data, Ability is required. In a small-scale information system, it is possible for a person to accurately understand the system and obtain the necessary information, but in a variety of complex systems where it is difficult to understand the system accurately, it becomes increasingly difficult to acquire the desired information. In other words, more accurate processing of large amounts of data has become a basic condition for future information systems. This problem related to the efficient performance of the information system can be solved by building a semantic web which enables various information processing by expressing the collected data as an ontology that can be understood by not only people but also computers. For example, as in most other organizations, IT has been introduced in the military, and most of the work has been done through information systems. Currently, most of the work is done through information systems. As existing systems contain increasingly large amounts of data, efforts are needed to make the system easier to use through its data utilization. An ontology-based system has a large data semantic network through connection with other systems, and has a wide range of databases that can be utilized, and has the advantage of searching more precisely and quickly through relationships between predefined concepts. In this paper, we propose a defense ontology as a method for effective data management and decision support. In order to judge the applicability and effectiveness of the actual system, we reconstructed the existing air force munitions situation management system as an ontology based system. It is a system constructed to strengthen management and control of logistics situation of commanders and practitioners by providing real - time information on maintenance and distribution situation as it becomes difficult to use complicated logistics information system with large amount of data. Although it is a method to take pre-specified necessary information from the existing logistics system and display it as a web page, it is also difficult to confirm this system except for a few specified items in advance, and it is also time-consuming to extend the additional function if necessary And it is a system composed of category type without search function. Therefore, it has a disadvantage that it can be easily utilized only when the system is well known as in the existing system. The ontology-based logistics situation management system is designed to provide the intuitive visualization of the complex information of the existing logistics information system through the ontology. In order to construct the logistics situation management system through the ontology, And the useful functions such as performance - based logistics support contract management and component dictionary are further identified and included in the ontology. In order to confirm whether the constructed ontology can be used for decision support, it is necessary to implement a meaningful analysis function such as calculation of the utilization rate of the aircraft, inquiry about performance-based military contract. Especially, in contrast to building ontology database in ontology study in the past, in this study, time series data which change value according to time such as the state of aircraft by date are constructed by ontology, and through the constructed ontology, It is confirmed that it is possible to calculate the utilization rate based on various criteria as well as the computable utilization rate. In addition, the data related to performance-based logistics contracts introduced as a new maintenance method of aircraft and other munitions can be inquired into various contents, and it is easy to calculate performance indexes used in performance-based logistics contract through reasoning and functions. Of course, we propose a new performance index that complements the limitations of the currently applied performance indicators, and calculate it through the ontology, confirming the possibility of using the constructed ontology. Finally, it is possible to calculate the failure rate or reliability of each component, including MTBF data of the selected fault-tolerant item based on the actual part consumption performance. The reliability of the mission and the reliability of the system are calculated. In order to confirm the usability of the constructed ontology-based logistics situation management system, the proposed system through the Technology Acceptance Model (TAM), which is a representative model for measuring the acceptability of the technology, is more useful and convenient than the existing system.

A Study on Integrated Logistic Support (통합병참지원에 관한 연구)

  • 나명환;김종걸;이낙영;권영일;홍연웅;전영록
    • Proceedings of the Korean Reliability Society Conference
    • /
    • 2001.06a
    • /
    • pp.277-278
    • /
    • 2001
  • The successful operation of a product In service depends upon the effective provision of logistic support in order to achieve and maintain the required levels of performance and customer satisfaction. Logistic support encompasses the activities and facilities required to maintain a product (hardware and software) in service. Logistic support covers maintenance, manpower and personnel, training, spares, technical documentation and packaging handling, storage and transportation and support facilities.The cost of logistic support is often a major contributor to the Life Cycle Cost (LCC) of a product and increasingly customers are making purchase decisions based on lifecycle cost rather than initial purchase price alone. Logistic support considerations can therefore have a major impact on product sales by ensuring that the product can be easily maintained at a reasonable cost and that all the necessary facilities have been provided to fully support the product in the field so that it meets the required availability. Quantification of support costs allows the manufacturer to estimate the support cost elements and evaluate possible warranty costs. This reduces risk and allows support costs to be set at competitive rates.Integrated Logistic Support (ILS) is a management method by which all the logistic support services required by a customer can be brought together in a structured way and In harmony with a product. In essence the application of ILS:- causes logistic support considerations to be integrated into product design;- develops logistic support arrangements that are consistently related to the design and to each other;- provides the necessary logistic support at the beginning and during customer use at optimum cost.The method by which ILS achieves much of the above is through the application of Logistic Support Analysis (LSA). This is a series of support analysis tasks that are performed throughout the design process in order to ensure that the product can be supported efficiently In accordance with the requirements of the customer.The successful application of ILS will result in a number of customer and supplier benefits. These should include some or all of the following:- greater product uptime;- fewer product modifications due to supportability deficiencies and hence less supplier rework;- better adherence to production schedules in process plants through reduced maintenance, better support;- lower supplier product costs;- Bower customer support costs;- better visibility of support costs;- reduced product LCC;- a better and more saleable product;- Improved safety;- increased overall customer satisfaction;- increased product purchases;- potential for purchase or upgrade of the product sooner through customer savings on support of current product.ILS should be an integral part of the total management process with an on-going improvement activity using monitoring of achieved performance to tailor existing support and influence future design activities. For many years, ILS was predominantly applied to military procurement, primarily using standards generated by the US Government Department of Defense (DoD). The military standards refer to specialized government infrastructures and are too complex for commercial application. The methods and benefits of ILS, however, have potential for much wider application in commercial and civilian use. The concept of ILS is simple and depends on a structured procedure that assures that logistic aspects are fully considered throughout the design and development phases of a product, in close cooperation with the designers. The ability to effectively support the product is given equal weight to performance and is fully considered in relation to its cost.The application of ILS provides improvements in availability, maintenance support and longterm 3ogistic cost savings. Logistic costs are significant through the life of a system and can often amount to many times the initial purchase cost of the system.This study provides guidance on the minimum activities necessary to Implement effective ILS for a wide range of commercial suppliers. The guide supplements IEC60106-4, Guide on maintainability of equipment Part 4: Section Eight maintenance and maintenance support planning, which emphasizes the maintenance aspects of the support requirements and refers to other existing standards where appropriate. The use of Reliability and Maintainability studies is also mentioned in this study, as R&M is an important interface area to ILS.

  • PDF

A Study Consequence Management System of the Terrorism (테러리즘의 대응관리체제에 관한 고찰 - "9. 11 테러"를 중심으로 -)

  • Kim, Yi-Soo;Ahn, Byung-Soo;Han, Nam-Soo
    • Korean Security Journal
    • /
    • no.7
    • /
    • pp.95-124
    • /
    • 2004
  • It can be said that 'the September 11th Terrorist Attacks' in 2001 were not only the indiscriminate attacks on innocent people but also the whole - political, economical and military - attacks on human life. Also, 'the September 11th Terrorist Attacks' can be regarded as the significant events in the history of world, which were on the peak of the super-terrorism or new-terrorism that had emerged from the 1980s. However, if one would have analysed the developments of terrorism from the 1970s, they could have been foreknown without difficulty. The finding from this study can be summarized as the followings, First, in spite that the USA responsive system against terrorism had been assessed as perfect before 'the September 11th Terrorist Attacks', the fragilities were found in the aspects of the response on the new-terrorism or super-terrorism. The previous responsive system before 'the September 11th Terrorist Attacks' had the following defects as the followings: (1) it was impossible to establish the integrated strategy, because the organizations related to the response against terrorism had not integrated; (2) there were some weakness to collect and diffuse the informations related to terrorism; (3) the security system for the domestic airline service in USA and the responsive system of air defense against terrors on aircraft were very fragile. For these reasons, USA government established the 'Department of Homeland Security' of which the President is the head so that the many organizations related to terrorism were integrated into a single management system. And, it legislated a new act to protect security from terrors, which legalized of the wiretapping in spite of the risk of encroachment upon personal rights, increased the jail terms upon terrorists, froze the bank related to terrorist organization, and could censor e-mails. Second, it seem that Korean responsive system against terrors more fragile than that of USA. One of the reasons is that people have some perception that Korea is a safe zone from terrors, because there were little attacks from international terrorists in Korea. This can be found from the fact that the legal arrangement against terrorism is only the President's instruction No. 47. Under this responsive system against terrorism dependent on only the President's instruction, it is expected that there would be a poor response against terrors due to the lack of unified and integrated responsive agency as like the case of USA before 'the September 11th Terrorist Attacks'. And, where there is no legal countermeasure, it is impossible to expect the binding force on the outside of administrative agencies and the performances to prevent and hinder the terrorist actions can not but be limited. That is to say, the current responsive system can not counteract effectively against the new-terrorism and super-terrorism. Third, although there were some changes in Korean government's policies against terrorism. there still are problems. One of the most important problems is that the new responsive system against terrorism in Korea, different from that of USA, is not a permanent agency but a meeting body that is organized by a commission. This commission is controled by the Prime Minister and the substantial tasks are under the National Intelligence Service. Under this configuration, there can be the lack of strong leadership and control. Additionally, because there is no statute to response against terrorism, it is impossible to prevent and counteract effectively against terrorism. The above summarized suggests that, because the contemporary super-terrorism or new-terrorism makes numerous casualties of unspecified persons and enormous nationwide damages, the thorough prevention against terrorism is the most important challenge, and that the full range of legal and institutional arrangements for the ex post counteraction should be established. In order to do so, it is necessary for the government to make legal and institutional arrangements such as the permanent agency for protection from terrorism in which the related departments cooperates with together and the development of efficient anti-terror programs, and to show its willingness and ability that it can counteract upon any type of domestic and foreign terrorism so that obtain the active supports and confidence from citizens.

  • PDF

The Effect of Hydrogen Peroxide on Inducible Nitric Oxide Synthase Expression in Murine Macrophage RA W264.7 Cells (Murine macrophage RAW264.7에서 과산화수소가 유발형 산화질소 합성효소의 발현에 미치는 영향)

  • Ahn, Joong-Hyun;Song, Jeong-Sup
    • Tuberculosis and Respiratory Diseases
    • /
    • v.47 no.2
    • /
    • pp.172-183
    • /
    • 1999
  • Background: Nitric oxide is a short-lived effector molecule derived from L-arginine by the nitric oxide synthase(NOS). Nitric oxide plays a role in a number of physiologic and pathophysiologic functions including host defense, edema formation, and regulation of smooth muscle tone. Some kinds of cells including macrophage are known to produce large quantities of nitric oxide in response to inflammatory stimuli such as interleukin-$1\beta$(IL-$1\beta$), tumor necrosis factor-$\alpha$(TNF-$\alpha$), interferon-$\gamma$(IFN-$\gamma$) and lipopolysaccharide(LPS). Reactive oxygen species are also known to be important in the pathogenesis of acute cell and tissue injury such as acute lung injury model Methods: Using the RA W264.7 cells, we have examined the ability of oxidant hydrogen peroxide($H_2O_2$) to stimulate nitric oxide production and inducible NOS mRNA expression. Also, we have examined the effects of NOS inhibitors and antioxidants on $H_2O_2$ induced nitric oxide production. Results: Stimulation of RAW264.7 cells with combinations of 100 ng/ml IL-$1\beta$, 100 ng/ml TNF-$\alpha$, and 100 U/ml IFN-$\gamma$ or 100 U/ml IFN-$\gamma$ and $1{\mu}g/ml$ LPS induced the synthesis of nitric oxide as measured by the oxidation products nitrite($NO_2^-$) and nitrate($NO_3^-$). Addition of $250 {\mu}M-2$ mM $H_2O_2$ to the cytokines significantly augmented the synthesis of $NO_2^-$ and $NO_3^-$(p<0.05). When cells were incubated with increasing concentrations of $H_2O_2$ in the presence of IL-$1\beta$, TNF-$\alpha$ and IFN-$\gamma$ at constant level, the synthesis of $NO_2^-$ and $NO_3^-$ was dose-dependently increased(p<0.05). $N^G$-nitro-L-arginine methyl ester(L-NAME), dose dependently, significantly inhibited the formation of $NO_2^-$ and $NO_3^-$ in cells stimulated with LPS, IFN-$\gamma$ and $H_2O_2$ at constant level(p<0.05). Catalase significantly inhibited the $H_2O_2$-induced augmentation of cytokine-induced $NO_2^-$ and $NO_3^-$ formation(p<0.05). But, boiled catalase did not produce a significant inhibition in comparison with the native enzyme. Another antioxidant 2-mercaptoethanol and orthophenanthroline dose-dependently suppressed $NO_2^-$ and $NO_3^-$ synthesis(p<0.05). Northern blotting demonstrated that H:02 synergistically stimulated the cytokine-induced iNOS mRNA expression in RA W264.7. Conclusion: These results suggest that $H_2O_2$ contributes to inflammatory process by augmenting the iNOS expression and nitric oxide synthesis induced by cytokines.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Improvement of Mid-Wave Infrared Image Visibility Using Edge Information of KOMPSAT-3A Panchromatic Image (KOMPSAT-3A 전정색 영상의 윤곽 정보를 이용한 중적외선 영상 시인성 개선)

  • Jinmin Lee;Taeheon Kim;Hanul Kim;Hongtak Lee;Youkyung Han
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.6_1
    • /
    • pp.1283-1297
    • /
    • 2023
  • Mid-wave infrared (MWIR) imagery, due to its ability to capture the temperature of land cover and objects, serves as a crucial data source in various fields including environmental monitoring and defense. The KOMPSAT-3A satellite acquires MWIR imagery with high spatial resolution compared to other satellites. However, the limited spatial resolution of MWIR imagery, in comparison to electro-optical (EO) imagery, constrains the optimal utilization of the KOMPSAT-3A data. This study aims to create a highly visible MWIR fusion image by leveraging the edge information from the KOMPSAT-3A panchromatic (PAN) image. Preprocessing is implemented to mitigate the relative geometric errors between the PAN and MWIR images. Subsequently, we employ a pre-trained pixel difference network (PiDiNet), a deep learning-based edge information extraction technique, to extract the boundaries of objects from the preprocessed PAN images. The MWIR fusion imagery is then generated by emphasizing the brightness value corresponding to the edge information of the PAN image. To evaluate the proposed method, the MWIR fusion images were generated in three different sites. As a result, the boundaries of terrain and objects in the MWIR fusion images were emphasized to provide detailed thermal information of the interest area. Especially, the MWIR fusion image provided the thermal information of objects such as airplanes and ships which are hard to detect in the original MWIR images. This study demonstrated that the proposed method could generate a single image that combines visible details from an EO image and thermal information from an MWIR image, which contributes to increasing the usage of MWIR imagery.