• Title/Summary/Keyword: Defense method

Search Result 2,461, Processing Time 0.033 seconds

Self-Collision Detection/Avoidance for a Rescue Robot by Modified Skeleton Algorithm (보완 골격 알고리듬을 이용한 구난로봇의 자체 충돌감지/회피)

  • Lee, Wonsuk;Hong, Seongil;Park, Gyuhyun;Kang, Younsik
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.4
    • /
    • pp.451-458
    • /
    • 2015
  • This paper handles self-collision avoidance for a rescue robot with redundant manipulators. In order to detect all available self-collisions in advance, minimum distances between arbitrary robot parts should be monitored in real-time. For the minimum distance estimation, we suggest a modified method from a previous skeleton algorithm which has less computation burden and realize collision avoidance based on a potential function using the proposed algorithm. The resultant command by collision avoidance should not disturb a given primary task, so null-space of joint solution from a CLIK is utilized for collision avoidance by a gradient projection method.

Negative evidence on the transgenerational inheritance of defense priming in Arabidopsis thaliana

  • Yun, Se-Hun;Noh, Bosl;Noh, Yoo-Sun
    • BMB Reports
    • /
    • v.55 no.7
    • /
    • pp.342-347
    • /
    • 2022
  • Defense priming allows plants to enhance their immune responses to subsequent pathogen challenges. Recent reports suggested that acquired resistances in parental generation can be inherited into descendants. Although epigenetic mechanisms are plausible tools enabling the transmission of information or phenotypic traits induced by environmental cues across generations, the mechanism for the transgenerational inheritance of defense priming in plants has yet to be elucidated. With the initial aim to elucidate an epigenetic mechanism for the defense priming in plants, we reassessed the transgenerational inheritance of plant defense, however, could not observe any evidence supporting it. By using the same dipping method with previous reports, Arabidopsis was exposed repeatedly to Pseudomonas syringae pv tomato DC3000 (Pst DC3000) during vegetative or reproductive stages. Irrespective of the developmental stages of parental plants that received pathogen infection, the descendants did not exhibit primed resistance phenotypes, defense marker gene (PR1) expression, or elevated histone acetylation within PR1 chromatin. In assays using the pressure-infiltration method for infection, we obtained the same results as above. Thus, our results suggest that the previous observations on the transgenerational inheritance of defense priming in plants should be more extensively and carefully reassessed.

A Simulator Development of Surface Warship Torpedo Defense System considering Bubble-Generating Wake Decoy (기포발생식 항적기만기를 고려한 수상함 어뢰방어체계 시뮬레이터 개발)

  • Wooshik Kim;Myoungin Shin;Jisung Park;Ho Seuk Bae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.3
    • /
    • pp.416-427
    • /
    • 2024
  • The wake-homing underwater guided weapon that detects and tracks wake generated during voyage of a surface ship is impossible to avoid with the present acoustic deception torpedo defense system. Therefore, research on bubble-generating wake decoy is necessary to deceive wake-homing underwater guided weapon. Experiments in various environments are required to verify the effective operation method and performance of the wake decoy, but performance verification through underwater experiment is limited. In this paper, we develop a simulator for an torpedo defense system of surface ship, which is applied bubble-generating wake decoy, against acoustic, wake, and hybrid homing underwater guided weapon attack. The simulator includes surface ship model, acoustic decoy(static, mobile) model, bubble-generating wake decoy model, search and motion model of underwater guided weapon and so on. By integrating various models, MATLAB GUI simulator was developed. Through the simulation results for various environmental variables by this simulator, it is judged that effective operation method and performance verification of the bubble-generating wake decoy can be performed.

Novel Radar Signal Blanking Method for Electronic warfare Support (전자전지원을 위한 새로운 레이더 신호 수신 블랭킹 기법)

  • Song, Kyu-Ha;Lee, Dong-Weon;Han, Jin-Woo;Lyu, Si-Chan
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.335-336
    • /
    • 2007
  • The blanking interface between an ES system and a radar system on the same platform cause the unwanted radar signal separation in the process of the signal measurement of the ES system. In this paper, we propose the novel radar signal blanking method for ES. The proposed method extracts a standard of judgement which we can decide whether a radar signal is separated by the blanking interface and presents how to merge the separated signals. Test result is presented to show the performance of the proposed method.

  • PDF

Network Attack and Defense Game Theory Based on Bayes-Nash Equilibrium

  • Liu, Liang;Huang, Cheng;Fang, Yong;Wang, Zhenxue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.5260-5275
    • /
    • 2019
  • In the process of constructing the traditional offensive and defensive game theory model, these are some shortages for considering the dynamic change of security risk problem. By analysing the critical indicators of the incomplete information game theory model, incomplete information attack and defense game theory model and the mathematical engineering method for solving Bayes-Nash equilibrium, the risk-averse income function for information assets is summarized as the problem of maximising the return of the equilibrium point. To obtain the functional relationship between the optimal strategy combination of the offense and defense and the information asset security probability and risk probability. At the same time, the offensive and defensive examples are used to visually analyse and demonstrate the incomplete information game and the Harsanyi conversion method. First, the incomplete information game and the Harsanyi conversion problem is discussed through the attack and defense examples and using the game tree. Then the strategy expression of incomplete information static game and the engineering mathematics method of Bayes-Nash equilibrium are given. After that, it focuses on the offensive and defensive game problem of unsafe information network based on risk aversion. The problem of attack and defense is obtained by the issue of maximizing utility, and then the Bayes-Nash equilibrium of offense and defense game is carried out around the security risk of assets. Finally, the application model in network security penetration and defense is analyzed by designing a simulation example of attack and defense penetration. The analysis results show that the constructed income function model is feasible and practical.

Discrimination of Bacillus anthracis Spores by Direct in-situ Analysis of Matrix-Assisted Laser Desorption/Ionization Time-Of-Flight Mass Spectrometry

  • Jeong, Young-Su;Lee, Jonghee;Kim, Seong-Joo
    • Bulletin of the Korean Chemical Society
    • /
    • v.34 no.9
    • /
    • pp.2635-2639
    • /
    • 2013
  • The rapid and accurate identification of biological agents is a critical step in the case of bio-terror and biological warfare attacks. Recently, matrix-assisted laser desorption/ionization time-of-flight mass spectrometry has been widely used for the identification of microorganisms. In this study, we describe a method for the rapid and accurate discrimination of Bacillus anthracis spores using MALDI-TOF MS. Our direct in-situ analysis of MALDI-TOF MS does not involve subsequent high-resolution mass analyses and sample preparation steps. This method allowed the detection of species-specific biomarkers from each Bacillus spores. Especially, B. anthracis spores had specific biomarker peaks at 2503, 3089, 3376, 6684, 6698, 6753, and 6840 m/z. Cluster and PCA analyses of the mass spectra of Bacillus spores revealed distinctively separated clusters and within-groups similarity. Therefore, we believe that this method is effective in the real-time identification of biological warfare agents such as B. anthracis as well as other microorganisms in the field.

Compensation Method of Gyro Bias Hysteresis Error using the Rate of Temperature (온도 변화율을 이용한 자이로 바이어스 히스테리시스 오차 보상 기법)

  • Yu, Haesung;Kim, Cheon Joong;Sung, Changgi;Lee, Inseop;Park, SangEun;Park, Heung-won
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.2
    • /
    • pp.109-114
    • /
    • 2015
  • A method to compensate a bias hysteresis error of the ring laser gyro using the rate of temperature is proposed in this paper. Until now, we generally have measured and compensated the error of gyro and accelerometer using the temperature. However, we utilize the measured values of the temperature dependent error elements on the temperature rate in navigation system level. We show through experiments that the proposed method can improve the navigation performance and be very effective.

A DDoS Attack Test, Analysis and Mitigation Method in Real Networks (DDoS 공격 실험 결과, 분석 및 피해 완화 방안)

  • Yang, Jin-Seok;Kim, Hyoung-Chun;Chung, Tai-Myoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.3
    • /
    • pp.125-132
    • /
    • 2013
  • In this paper, We send DDoS(Distributed Denial of Service) attack traffic to real homepages in real networks. We analyze the results of DDoS attack and propose mitigation method against DDoS Attacks. In order to analyze the results of DDoS Attacks, We group three defense level by administrative subjects: Top level defense, Middle level defense, Bottom level defense. Also We group four attack methods by feature. We describe the results that average of attack success rate on defense level and average of attack success rate on attack categories about 48ea homepages and 2ea exceptional cases. Finally, We propose mitigation method against DDoS attack.

Real-virtual Point Cloud Augmentation Method for Test and Evaluation of Autonomous Weapon Systems (자율무기체계 시험평가를 위한 실제-가상 연계 포인트 클라우드 증강 기법)

  • Saedong Yeo;Gyuhwan Hwang;Hyunsung Tae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.3
    • /
    • pp.375-386
    • /
    • 2024
  • Autonomous weapon systems act according to artificial intelligence-based judgement based on recognition through various sensors. Test and evaluation for various scenarios is required depending on the characteristics that artificial intelligence-based judgement is made. As a part of this approach, this paper proposed a LiDAR point cloud augmentation method for mixed-reality based test and evaluation. The augmentation process is achieved by mixing real and virtual LiDAR signals based on the virtual LiDAR synchronized with the pose of the autonomous weapon system. For realistic augmentation of test and evaluation purposes, appropriate intensity values were inserted when generating a point cloud of a virtual object and its validity was verified. In addition, when mixing the generated point cloud of the virtual object with the real point cloud, the proposed method enhances realism by considering the occlusion phenomenon caused by the insertion of the virtual object.

Study Radiological Defense Interrelationship Research in Career (경력에 따른 방사선방어 상관성 연구)

  • Kim, Jean Soo
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.16 no.2
    • /
    • pp.135-138
    • /
    • 2012
  • Purpose : This research the isotope of handling was to an actual act of the radiological defense which it follows in career of the clinical pathological companies in order to inquire the interrelation for a radiological defense. Materials and Methods : The tool of this research with question from 2010 October until November did electrification Chwung Cheng and the Seoul isotope thread clinical pathological company with the object person and it investigated in direct question or mail method, the data which is collected used SPSS19.0 programs and frequency and percentage and t-test, ANOVA, it used it analyzed a multiple regression analysis method. Results : The interrelationship of the radiological defense which it follows in career was visible the interrelation which considers statistically (p<0.01). But the correlation coefficient appeared lowly with 0.196. With the variable who affects in radiological defense act it appeared with worker providing by law educations and RI license acquisitions. Conclusion : There is to business progress and the radiological defense act respects a worker safety stands the unit only is the fact which is important. Consequently a possibility of saying that the radiation worker education is necessary, it executes the education which is continuous, RI license acquisitions, there is.

  • PDF