• Title/Summary/Keyword: Smart Defence

Search Result 17, Processing Time 0.029 seconds

Design of Smart flap actuators for swept shock wave/turbulent boundary layer interaction control

  • Couldrick, Jonathan;Shankar, Krishnakumar;Gai, Sudhir;Milthorpe, John
    • Structural Engineering and Mechanics
    • /
    • v.16 no.5
    • /
    • pp.519-531
    • /
    • 2003
  • Piezoelectric actuators have long been recognised for use in aerospace structures for control of structural shape. This paper looks at active control of the swept shock wave/turbulent boundary layer interaction using smart flap actuators. The actuators are manufactured by bonding piezoelectric material to an inert substrate to control the bleed/suction rate through a plenum chamber. The cavity provides communication of signals across the shock, allowing rapid thickening of the boundary layer approaching the shock, which splits into a series of weaker shocks forming a lambda shock foot, reducing wave drag. Active control allows optimum control of the interaction, as it would be capable of positioning the control region around the original shock position and unimorph tip deflection, hence mass transfer rates. The actuators are modelled using classical composite material mechanics theory, as well as a finite element-modelling program (ANSYS 5.7).

A Study of Client Side Defence Method of UDP/ICMP Attack (UDP/ICMP 플러딩 공격에 대한 클라이언트 측 방어 기법 연구)

  • Kim, Dong-Hoon;Lee, Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.667-669
    • /
    • 2012
  • Traditional DDoS defence methods are performed at server side which was attacked. If servers detect DDoS attack, they use some methods for defending the attack such as increasing the bandwidth, bypassing the traffic, blocking the IP addresses or blocking the ports by the firewall. But as lots of people use smart-phones, it is possible a smart-phone to be a zombie and DDoS attack could be much more a huge and powerful forms than now. Victims are not only a server but also a host which becomes a zombie. While it performs DDoS attack, zombie smart-phone users have to pay the extra charge. After finish the attack, DDoS try to destroy hard drives of zombie hosts. Therefore the situation is changed rather than to defend DDoS server side only, we should protect a client side who needs to prevent DDoS attacks. In this paper, we study a defence method that we terminates a process which perform the attack, send the information to different hosts when a zombie PC or smart-phone perform DDoS attacks.

  • PDF

Development Trends of Defense Science and Technology based on the 4th Industrial Revolution (제4차 산업혁명 기반의 국방과학기술 개발 동향)

  • Jeong, Y.H.;Kim, S.N.;Park, H.S.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.6
    • /
    • pp.56-67
    • /
    • 2020
  • The core technologies of the 4th Industrial Revolution, such as artificial intelligence, the Internet of Things, the cloud, big data, and mobile networks, are inspiring major changes and innovations in the defense sector worldwide. The United States, China, and Russia are pursuing defense research and development strategies that seek to maintain their leadership on the battlefield in the future through the overwhelming superiority of defense science technology. Defense science and technology concentrate on the development of challenging new disruptive technologies to efficiently respond to future battlefield environments, where the immediate process of determining the outcome of a war will lead to combat power. In this paper, we first look at the development strategies of the 4th Industrial Revolution in major countries and describe the latest trends in defense science and technology accordingly.

A study on DDoS Attack, Detecting and Defence in ubiquitous system (유비쿼터스환경에서의 DDoS의 공격과 탐지, 방어시스템에 관한 연구)

  • Jung, Chang-Duk;Cha, Joo-Won;Hwang, Sun-Il
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2009.11a
    • /
    • pp.544-548
    • /
    • 2009
  • The underlying success of logistics depends on the flow of data and information for effective management. Over the last 30 years, we have seen the power of microprocessors double about every 18months. This continuing trend means that computers will become considerably smaller, cheaper, and more abundant; indeed, they are becoming ubiquitous and are even finding their way into everyday objects, resulting in the creation of smart things. In the long term, ubiquitous technologies will take on great economic significance. Industrial products will become smart because of their integrated information processing capacity, or take on an electronic identity that can be queried remotely, or be equipped with sensors for detecting their environment, enabling the development of innovative products and totally new services. The global marketplace runs on logistics, security, speed, agility and flexibility..In this paper we report that pairing these traditional logistics functions with RFID technology can be a huge value-driver for companies. This winning combination yields increased logistics management effectiveness and more efficient visibility into the supply chain management.

  • PDF

A Case Study on Foreign Smart City (해외 스마트 시티 사례 연구)

  • Lee, Seong-Hoon
    • Journal of Digital Convergence
    • /
    • v.12 no.4
    • /
    • pp.305-310
    • /
    • 2014
  • We called a current society the convergence generation. In information society, digital convergence means a service or new product which appeared through fusion of unit technologies in information and communication regions. The effects of convergence technologies and social phenomenons are visualized in overall regions of society such as economy, society, culture, etc. In 2011, The Government introduced "IT Convergence Technology Prediction Survey 2025". This report includes 10 ICT industries. In this paper, we described a smart city which was leading case in digital convergence and related with our life.

Smart Device Security Technology for Cyber Defense (사이버 국방을 위한 스마트 단말 보안기술)

  • Son, Iek-Jae;Kim, Il-Ho;Yang, Jong-Hyu;Lee, Nam-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.986-992
    • /
    • 2012
  • As the utilization of smart mobile devices such as smartphones increases, the desire to utilize such devices to control and monitor combat situations also arises. As smart mobile devices with various ICT get integrated with various weaponry system, a new phase of future warfare can be introduced. Moreover, smartphone-based real-time information technology for joint battle command system will be converged with surveillance control to become a leading example of convergence of cyber defense and information technology. Furthermore, mobile device security technology ideal for mobile wireless network environments can be applied to military robots. The following paper will give an overview of smart mobile device usage used for military purposes in battle command system, various security threats and the mobile device security technology to correspond to such security threats.

A study on establishing the aerodynamic database though the external flow method of a rotating vehicle (회전 운동하는 비행체의 외부 유동장 해석을 통한 공력데이터베이스 구축 연구)

  • Kang, Tae-Woo;Ahn, Jong-Moo;Lee, Hee-Rang;Choi, Jae-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.8
    • /
    • pp.41-47
    • /
    • 2017
  • With the introduction of new technologies, ground weapons have led to the development of artificial intelligence and the attention of major developed countries. In this study, CFD was performed through the BLU-103 model to obtain aerodynamic data for aircraft that are subjected to rotational motion. To simulate the steady-state of a rotating body, the body was fixed and the principle of rotating the body by rotating the surrounding air was used. In order to examine the aerodynamic feasibility of the rotating aircraft, the analysis was carried out at intervals of $30^{\circ}$ angle from $0^{\circ}$ to $90^{\circ}$ for the simple shape and the side slip angle. It was confirmed that the drag coefficient for the simple model satisfies the quantitative results of 1.0 ~ 1.2 through CD presented in "Drag Book". The aerodynamic data was constructed by applying the valid input verified through the simple type analysis conditions to the actual shape, and the tendency was analyzed. The analysis confirmed that CX, CZ and CY increase not only in the simple model but also in the rotation of the actual model. Especially, the influence of CZ was judged to have contributed to the flight.

Transmission Performance of Application Service Traffic on MANET with IDS (IDS가 있는 MANET에서 응용 서비스 트래픽의 전송 성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.584-587
    • /
    • 2012
  • MANET, which can be constructed with only terminal devices, has structural advantages of ease installation and operation, also has environmental change of rapid supply of smart phone, it's usage can be extended to application area likes as emergency communication, leasure, exploration and investigations. But, as one characteristic of MANET, no use of communicaton infrastructure caused disadvantage of weakness for information intrusion which is frequently occurred, nowadays. In this paper, the effects of IDS(Intrusion Detection System), one of defence tools for information intrusion, is analyzed for transmission performance. Blackhole attack is assumed as a type of intrusion, MANET defence with IDS from intrusions. Computer simulation based on NS-2 used for performance measurement. In this paper, performance measurement is done for application service to analyze application level effects of IDS. VoIP service is used as application service.

  • PDF

Building plan research of Smart Ammunition Logistics System based on the 4th industrial technology (4차산업혁명기술 기반 스마트 탄약물류체계 구축 방안 연구)

  • Choi, Jong-Geun;Kim, Byung-Kyoo;Chang, Yoon Seok
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.135-145
    • /
    • 2022
  • This paper presented a method to build a predictable smart ammunition logistics system using the 4th industrial technology for ammunition logistics, which is the core functions in the field of defense and logistics. We have analyzed the current level of ammunition logistics with various perspectives such as domestic and overseas logistics policies, technology trends, ammunition logistics characteristics, the smart logistics certification measures by Ministry of Land, Infrastructure and Transport. As a result it is considered that the current ammunition logistics needs needs improvement. To improve this, we presented a direction based on the implications derived after analyzing various ongoing programs such as wired/wireless-based automation, smart ammunition depots, and logistics innovation of the army, navy, and air force that can be applied to the ammunition logistics. In order to implement a data-based smart ammunition logistics management system that can achieve innovation and efficiency of total life cycle while meeting changes in the battlefield environment, we presented 4 objectives such as "automation and modernization of field work", "3D-based storage management & improvement of issuing at war," and "data management for prediction-oriented ammunition management". it is expected that there will be benefits such as improvement of operational continuity, guarantee of ammunition reliability, budget reduction, improvement of inefficiencies such as delay, waiting, and double work, and reduction of accidents.

Developing an Interactive Character having an Artificial Emotion for a Smart Phone (인공정서를 가진 스마트폰용 인터랙티브 캐릭터 개발)

  • Ham, Jun-Seok;Yeo, Ji-Hye;Park, Sung-Ho;Ko, Il-Ju
    • Science of Emotion and Sensibility
    • /
    • v.14 no.4
    • /
    • pp.483-494
    • /
    • 2011
  • This paper purposes to develop an artificial emotion reflecting emotional features contains situations, time, and characteristics, also to develop an interactive character having this artificial emotion with a smart phone. The artificial emotion has an Emotion Module and Drive Module for expressing emotion according to external emotional stimulus and internal drive. The Emotion Module administrates emotions according to time, characteristic, interrelation between different emotions. The Drive Module controls sensitivities of emotion according to changing drives over long time. Also due to defence mechanism for expressing emotions, emotions are processed by two pathways: The first pathway which is affected by the Emotion Module and the Drive Module, and the second pathway that is not to be done. We developed an interactive character having the artificial emotion with this structure using smart phone. And we simulated the artificial emotion what differences there are according to situations, characteristic, and time under same input conditions. The result of this paper has meanings developing the interactive character having the artificial emotion actually, and making it possible to personalize an artificial emotion with expressing the artificial emotion using smart phone.

  • PDF