• Title/Summary/Keyword: Defense data

Search Result 1,790, Processing Time 0.028 seconds

Performance Analysis of a Cascaded Interference Canceller using Dead Zone Decision for DS/CDMA System (DS/CDMA 시스템에서 Dead Zone 검출방식을 이용한 직렬 간섭제거의 성능분석)

  • Lee, Sang-Hun;Kim, Nam
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.11 no.5
    • /
    • pp.689-696
    • /
    • 2000
  • In this paper, the cascaded co-channel interference canceller using the dead zone decision is proposed to reduced the co-channel interference in the DS/CDMA communication with the multipath fading and its performance is analyzed. The cancellation scheme creates the replica of the co-channel interference using the data decision of correlator output and removes it at the next stage. The canceller uses the dead zone decision which is detecting strong signal to obtain a good performance in the mobile communication. The results of performance analysis show that the proposed cancellation scheme has the improved performance and the number of user is increased 4 times compared with the conventional receiver, and increased 17% compared with the hard decision. And also the perfect power control is required along with increasing the number of user.

  • PDF

A Method of ISAR Geometric Calibration for Point Target Using Impulse-Radio UWB (임펄스 초광대역 레이다를 이용한 점표적의 ISAR 기하 보정 방법)

  • Yu, Jiwoong;Nikitin, Konstantin;Paek, Inchan;Jang, Jong Hun;Ka, Min-Ho
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.26 no.4
    • /
    • pp.397-403
    • /
    • 2015
  • In this paper, a method of ISAR geometric calibration is represented by using impulse-radio UWB radar. The ir-UWB is good for using a signal processing in time domain, so, it does not occur a multi-path or coupling problem. If a signal that between antennas and target is assumed a plane wave, a center of rotation in ISAR geometry model can be estimated by using point target. Before image is reconstructed with sinogram, the center of rotation can be calculated by using least square fitting. This method can be obtained a more contrast image, and a maximum value of entropy of image. The method, that estimates a center of rotation in received data, will be used a initial setup of instruments or a periodic compensation to reconstruct image. It would be useful in medical, security and surveillance imaging equipments that have a fixed geometry.

Analysis of Micro-Doppler Signatures from Rotating Propellers Using Modified HHT Method (수정된 HHT 기법을 이용하여 회전하는 프로펠러 날개에 의한 마이크로 도플러 신호의 해석)

  • Park, Ji-Hoon;Choi, Ik-Hwan;Myung, Noh-Hoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.9
    • /
    • pp.1100-1106
    • /
    • 2012
  • This paper has presented the analysis of the micro-Doppler signatures scattered from the blades of the rotating propeller using the modified HHT method, one of the joint time-frequency analysis methods. The field scattered from the blade edge of the propeller was calculated using equivalent current method(ECM). After the acquisition of the scattered field data in the time domain, the modified HHT method was applied to analyze the micro-Doppler signature. The analysis results showed not only a good agreement with the realistic dynamic characteristic of the blade but also sinusoidally varing characteristics of the micro-Doppler signatures generated from rotating objects. It could be concluded that the joint time-frequency analysis via the modified HHT provided the discriminative characteristics for recognizing a small aircraft target with small RCS value.

Study on the Performance Enhancement of Radar Target Recognition Using Combining of Feature Vectors (특성 벡터 융합을 이용한 레이더 표적 인식 성능 향상에 관한 연구)

  • Lee, Seung-Jae;Choi, In-Sik;Chae, Dae-Young
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.9
    • /
    • pp.928-935
    • /
    • 2013
  • This paper proposed a combining technique of feature vectors which improves the performance of radar target recognition. The proposed method obtains more information than monostatic or bistatic case by combining extracted feature vectors from two receivers. For verifying the performance of the proposed method, we calculated monostatic and bistatic RCS(BRCS) of three full-scale fighters by changing the receiver position. Then, the scattering centers are extracted using 1-D FFT-based CLEAN from the calculated RCS data. Scattering centers are used as feature vectors for neural network classifier. The results show that our method has the better performance than the monostatic or bistatic case.

Inundation Analysis on Coastal Zone around Masan Bay by Typhoon Maemi (No. 0314) (태풍 매미(0314호)에 의한 마산만 주변연안역에서의 범람해석)

  • Chun, Jae-Young;Lee, Kwang-Ho;Kim, Ji-Min;Kim, Do-Sam
    • Journal of Ocean Engineering and Technology
    • /
    • v.22 no.3
    • /
    • pp.8-17
    • /
    • 2008
  • Wrenching climatic changes due to ecocide and global wanning are producing a natural disaster. Coastal zones have been damaged by typhoons and accompanying storm surges. Severe waves, and destruction of the environment are adding to the severity of coastal disasters. There has been an increased interest in these coastal zone problems, and associated social confusion, after the loss of life and terrible property damage caused by typhoon Maemi. Especially if storm surges coincide with high ticks, the loss of life and property damage due to high waters are even worse. Therefore, it is desirable to accurately forecast not only the timing of storm surges but also the amount water level increase. Such forecasts are very important from the view point of coastal defense. In this study, using a numerical model, storm surge was simulated to examine its fluctuation characteristics for the coastal area behind Masan Bay, Korea. In the numerical model, a moving boundary condition was incorporated to explain wave run-up. Numerically predicted inundation regimes and depths were compared with measurements from a field survey. Comparisons of the numerical results and measured data show a very good correlation. The numerical model adapted in this study is expected to be a useful tool for analysis of storm surges, and for predicting inundation regimes due to coastal flooding by severe water waves.

Mutual Authentication and Secure Session Termination Scheme in iATA Protocol

  • Ong, Ivy;Lee, Shirly;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.4
    • /
    • pp.437-442
    • /
    • 2010
  • Ubiquitous mobile computing is becoming easier and more attractive in this ambient technological Internet world. However, some portable devices such as Personal Digital Assistant (PDAs) and smart phones are still encountering inherent constraints of limited storages and computing resources. To alleviate this problem, we develop a cost-effective protocol, iATA to transfer ATA commands and data over TCP/IP network between mobile appliances and stationary servers. It provides mobile users a virtual storage platform which is physically resided at remote home or office. As communications are made through insecure Internet connections, security risks of adopting this service become a concern. There are many reported cases in the history where attackers masquerade as legitimate users, illegally access to network-based applications or systems by breaking through the poor authentication gates. In this paper, we propose a mutual authentication and secure session termination scheme as the first and last defense steps to combat identity thief and fraud threat in particular for iATA services. Random validation factors, large prime numbers, current timestamps, one-way hash functions and one-time session key are deployed accordingly in the scheme. Moreover, we employ the concept of hard factorization problem (HFP) in the termination phase to against fraud termination requests. Theoretical security analysis discussed in later section indicates the scheme supports mutual authentication and is robust against several attacks such as verifiers' impersonation, replay attack, denial-of-services (DoS) attack and so on.

Development of an AVL System for Fire Fighting Services (소방용 AVL 시스템 개발)

  • Kim, Dong-Yong;Moon, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.4
    • /
    • pp.886-892
    • /
    • 2010
  • It is possible to use wireless communication any time in every place because of well-developed wireless networks and mobile devices. The AVL(Automatic Vehicle Location) system, therefore, has made practical use in situation control, distribution industry, home delivery service, and ITS(Intelligent Transportation System) area. In this paper, we design and implement an AVL system in order to use for fire fighting activities such as emergency rescue and relief. To do this, first, we investigate and analyze the existing researches and systems related to AVL system. In details, we develop an AVL server and clients to support stable communication each other using wireless networks. Using AVL system, calling cars find the position of accidents quickly and the fire defense headquarters control unforeseen accidents efficiently because the state of calling cars are confirmed in real time by their GPS data.

Study on Policies for National Cybersecurity (국가 사이버안보를 위한 정책 연구)

  • Ham, Seung-hyeon;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1666-1673
    • /
    • 2017
  • Republic of Korea is divided into South Korea and North Korea, creating military conflicts and social conflicts. North Korea is conducting cyberattacks against South Korea and has hacked South Korea's defense network. In the world of cyberspace, the boundaries of the borders are becoming obscured, and cyberattacks and cyberterrorism for cyberwarfare operate with digital computing connected to points, time and space. Agenda and manual are needed for national cybersecurity. Also, it is necessary to study national cybersecurity laws and policies that can create and implement nationalcyber security policy. This paper investigates cyberterrorism situation in North and South Korean confrontation situation and damage to cyberwarfare in the world. We also study cybersecurity activities and cyberwarfare response agendas, manuals and new technologies at home and abroad. And propose national cybersecurity policy and propose policies so that '(tentative) The National Cybersecurity Law' is established. This study will be used as basic data of national cybersecurity law and policy.

ROLE OF REACTIVE OXYGEN SPECIES IN MALE INFERTILITY

  • Sharma, Rakesh K.;Agarwal, Ashok
    • 대한생식의학회:학술대회논문집
    • /
    • 2000.06a
    • /
    • pp.13-28
    • /
    • 2000
  • Human spermatozoa exhibit a capacity to generate ROS and initiate peroxidation of the unsaturated fatty acids in the sperm plasma membrane, which plays a key role in the etiology of male infertility. The short half-life and limited diffusion of these molecules is consistent with their physiologic role in key biological events such as acrosome reaction and hyperactivation. The intrinsic reactivity of these metabolites in peroxidative damage induced by ROS, particularly $H_2O_2$ and the superoxide anion, has been proposed as a major cause of defective sperm function in cases of male infertility. The number of antioxidants known to attack different stages of peroxidative damage is growing, and it will be of interest to compare alpha-tocopherol and ascorbic acid with these for their therapeutic potential in vitro and in vivo. Both spermatozoa and leukocytes generate ROS, although leukocytes produce much higher levels. The clinical significance of leukocyte presence in semen is controversial. Seminal plasma confers some protection against ROS damage because it contains enzymes that scavenge ROS, such as catalase and superoxide dismutase. A variety of defense mechanisms comprising a number of antioxidants can be employed to reduce or overcome oxidative stress caused by excessive ROS. Determination of male infertility etiology is important, as it will help us develop effective therapies to overcome excessive ROS generation. ROS can have both beneficial and detrimental effects on the spermatozoa and the balancing between the amounts of ROS produced and the amounts scavenged at any moment will determine whether a given sperm function will be promoted or jeopardized. Accurate assessment of ROS levels and, subsequently, OS is Vital, as this will help clinicians both elucidate the fertility status and identify the subgroups of patients that respond or do not respond to these therapeutic strategies. The overt commercial claims of antioxidant benefits and supplements for fertility purposes must be cautiously looked into, until proper multicentered clinical trials are studied. From the current data it appears that no Single adjuvant will be able to enhance the fertilizing capacity of sperm in infertile men, and a combination of the possible strategies that are not toxic at the dosage used would be a feasible approach.

  • PDF

A comparative analysis of odontogenic maxillofacial infections in diabetic and nondiabetic patients: an institutional study

  • Kamat, Rahul D.;Dhupar, Vikas;Akkara, Francis;Shetye, Omkar
    • Journal of the Korean Association of Oral and Maxillofacial Surgeons
    • /
    • v.41 no.4
    • /
    • pp.176-180
    • /
    • 2015
  • Objectives: The increased prevalence of antibiotic resistance is an outcome of evolution. Most patients presenting with odontogenic space infections also have associated systemic co-morbidities such as diabetes mellitus resulting in impaired host defense. The present study aims to compare the odontogenic spaces involved, antibiotic susceptibility of microorganisms, length of hospital stay, and the influence of systemic comorbidities on treatment outcome in diabetic patients. Materials and Methods: A 2-year prospective study from January 2012 to January 2014 was conducted on patients with odontogenic maxillofacial space infections. The patients were divided into two groups based on their glycemic levels. The data were compiled and statistically analyzed. Results: A total of 188 patients were included in the study that underwent surgical incision and drainage, removal of infection source, specimen collection for culture-sensitivity, and evaluation of diabetic status. Sixty-one out of 188 patients were found to be diabetic. The submandibular space was the most commonly involved space, and the most prevalent microorganism was Klebsiella pneumoniae in diabetics and group D Streptococcus in the nondiabetic group. Conclusion: The submandibular space was found to be the most commonly involved space, irrespective of glycemic control. Empiric antibiotic therapy with amoxicillin plus clavulanic acid combined with metronidazole with optimal glycemic control and surgical drainage of infection led to resolution of infection in diabetic as well as nondiabetic patients. The average length of hospital stay was found to be relatively longer in diabetic individuals.