• Title/Summary/Keyword: Tactical Information

Search Result 342, Processing Time 0.024 seconds

Optimization of Broadband Antenna Parasitic Elements for TACAN (TACAN용 광대역 안테나 기생소자 최적화)

  • Park, Sang Jin;Koo, Kyung Heon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.26 no.5
    • /
    • pp.483-491
    • /
    • 2015
  • This paper describes the design optimization of parasitic elements used for TACAN broadband antenna. We deployed parasitic elements arranged in a circular array to electronically rotate the antenna instead of employing a mechanically rotated antenna to generate the composite radiation pattern of 15 Hz and 135 Hz including bearing information and to meet the harmonic contents specification of MIL-STD-291C. We performed the simulation for optimization of the parasitic elements and fabricated the antenna composed of 16 parasitic elements of 15 Hz and 63 parasitic elements of 135 Hz. With harmonics magnitude reduction by increasing the number of steps using vector composition of the reflectors, the measured result meets the specification of MIL-STD-291C.

Group Key Management Scheme for Survelliance and Reconnaissance Sensor Networks based on Probabilistic Key Sharing (확률론적 키 공유를 통한 감시정찰 센서네트워크에서의 그룹 키 관리 기법)

  • Bae, Si-Hyun;Lee, Soo-Jin
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.29-41
    • /
    • 2010
  • Survelliance and Reconnaissance Sensor Network(SRSN) which can collect various tactical information within battlefield in real time plays an important role in NCW environment, of sensor to shooter architecture. However, due to the resource-limited characteristics of sensor nodes and the intrinsic attributes of sensor network such as wireless communication, the SRSN may be vulnerable to various attacks compared to traditional networks. Therefore, in this paper, we propose a new group key management scheme to guarantee confidentiality, integrity, availability, and authentication during the operation of the SRSN. Proposed scheme generates and distributes the group key based on the topological characteristic of the SRSN and the probabilistic key sharing. The communication cost for distributing the group key is O(logn).

Reality and Improvement Plan of Information-Oriented Age Conscription Administration and Barracks informationization (정보화시대 병무행정과 병영정보화의 실태와 발전 방안)

  • Kim, Doo-Hyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.109-112
    • /
    • 2014
  • Korean informationization technology development speed is growing fastly and IT technology become world-class. Especially, by grafting IT technology to war commanding system, built an network center operational environment. However, conscription administration and the barracks informationization have inadequate points, to provide the people who have a duty of military service and parents with benefits and develop conscription administration and the barracks informationization base system conformed to IT age include using online system to guarantee military personnel's studying environment, writer proposed an improvement plan.

Maneuverability of a DWT 8,000-ton oil/chemical tanker by real sea trials - A comparison between the semi-balanced rudder and the flap rudder - (실선시험에 의한 DWT 8,000톤 선박의 조종성능 - Semi-balanced rudder and flap rudder -)

  • An, Young-Su;Lee, Hyeong-Geun;Park, Byung-Soo;Jang, Choong-Sik
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.51 no.2
    • /
    • pp.257-264
    • /
    • 2015
  • This study is intended to provide navigator with specific information necessary to assist the avoidance of collision and the operation of ships to evaluate the maneuverability of dead weight tonnage 8,000 tons Oil/Chemical tanker. The actual maneuvering characteristics of ship can be adequately judged from the results of typical ship trials. Author carried out sea trials based full scale for turning test, Z" maneuvering test, man overboard rescue maneuver test, inertia stopping test. Consequently, $2^{st}$ Overshoot yaw angle of the semi balanced rudder and flap rudder in ${\pm}20^{\circ}$ zig-zag test showed $22.2^{\circ}$ and $18.0^{\circ}$, respectively. The maneuverability of the vessel was good in the flap rudder. The man overboard rescue maneuver maneuverability test was most favorable in the flap rudder and the full load condition. The results from tests could be compared directly with the standards of maneuverability of IMO and consequently the maneuvering qualities of the ship is full satisfied with its.

A study on the turning ability of a DWT 8,000-ton oil/chemical tanker by real sea trials - A comparison between the semi-balanced rudder and the flap rudder - (실선시험에 의한 DWT 8,000톤 선박의 선회성능 - Semi-balanced rudder and flap rudder -)

  • Lee, Hyeong-Geun;An, Young-Su;Park, Byung-Soo;Jang, Choong-Sik
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.51 no.2
    • /
    • pp.245-256
    • /
    • 2015
  • This study is intended to provide navigator with specific information necessary to assist the avoidance of collision and the operation of ships to evaluate the maneuverability of dead weight tonnage 8,000 tons Oil/Chemical tanker. The actual maneuvering characteristics of ship can be adequately judged from the results of typical ship trials. Author carried out sea trials based full scale for turning test in ballast condition and full load condition, semi balanced rudder and flap rudder. The turning circle maneuvering were performed on the starboard and port sides with $35^{\circ}$ rudder angle at the normal continuous rating. The results from tests could be compared directly with the standards of maneuverability of IMO and consequently the maneuvering qualities of the ship is full satisfied with its.

Integrated Navigation Design Using a Gimbaled Vision/LiDAR System with an Approximate Ground Description Model

  • Yun, Sukchang;Lee, Young Jae;Kim, Chang Joo;Sung, Sangkyung
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.14 no.4
    • /
    • pp.369-378
    • /
    • 2013
  • This paper presents a vision/LiDAR integrated navigation system that provides accurate relative navigation performance on a general ground surface, in GNSS-denied environments. The considered ground surface during flight is approximated as a piecewise continuous model, with flat and slope surface profiles. In its implementation, the presented system consists of a strapdown IMU, and an aided sensor block, consisting of a vision sensor and a LiDAR on a stabilized gimbal platform. Thus, two-dimensional optical flow vectors from the vision sensor, and range information from LiDAR to ground are used to overcome the performance limit of the tactical grade inertial navigation solution without GNSS signal. In filter realization, the INS error model is employed, with measurement vectors containing two-dimensional velocity errors, and one differenced altitude in the navigation frame. In computing the altitude difference, the ground slope angle is estimated in a novel way, through two bisectional LiDAR signals, with a practical assumption representing a general ground profile. Finally, the overall integrated system is implemented, based on the extended Kalman filter framework, and the performance is demonstrated through a simulation study, with an aircraft flight trajectory scenario.

Optimal Allocation Model of Anti-Artillery Radar by Using ArcGIS and its Specifications (지형공간정보와 제원 특성을 적용한 대포병레이더 최적배치모형)

  • Lee, Moon Gul
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.41 no.2
    • /
    • pp.74-83
    • /
    • 2018
  • It is very crucial activities that Korean army have to detect and recognize enemy's locations and types of weapon of their artillery firstly for effective operation of friendly force's artillery weapons during wartime. For these activities, one of the most critical artillery weapon systems is the anti-artillery radar (hereafter; radars) for immediate counter-fire operations against the target. So, in early wartime these radar's roles are very important for minimizing friendly force's damage because arbiters have to recognize a several enemy's artillery positions quickly and then to take an action right away. Up to date, Republic of Korea Army for tactical artillery operations only depends on individual commander's intuition and capability. Therefore, we propose these radars allocation model based on integer programming that combines ArcGIS (Geographic Information System) analysis data and each radar's performances which include allowable specific ranges of altitude, azimuth (FOV; field of view) and distances for target detection, and weapons types i.e., rocket, mortars and cannon ammo etc. And we demonstrate the effectiveness of their allocation's solution of available various types of radar asset through several experimental scenarios. The proposed model can be ensured the optimal detection coverage, the enhancement of artillery radar's operations and assisting a quick decision for commander finally.

ROI Image Compression Method Using Eye Tracker for a Soldier (병사의 시선감지를 이용한 ROI 영상압축 방법)

  • Chang, HyeMin;Baek, JooHyun;Yang, DongWon;Choi, JoonSung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.3
    • /
    • pp.257-266
    • /
    • 2020
  • It is very important to share tactical information such as video, images, and text messages among soldiers for situational awareness. Under the wireless environment of the battlefield, the available bandwidth varies dynamically and is insufficient to transmit high quality images, so it is necessary to minimize the distortion of the area of interests such as targets. A natural operating method for soldiers is also required considering the difficulty in handling while moving. In this paper, we propose a natural ROI(region of interest) setting and image compression method for effective image sharing among soldiers. We verify the proposed method through prototype system design and implementation of eye gaze detection and ROI-based image compression.

A Study on the Seeker Technology in Guided Weapon System (유도무기체계 탐색기 기술에 관한 연구)

  • Lee, Young-Uk
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.103-109
    • /
    • 2008
  • In this paper, a study on the seeker technology in guided weapon system development. Seeker is guided weapons mounted on the device that is targeted for implementation homing guided looking for confirmation of the target after picking up, tracking, command, induce calculations necessary to induce the target's direction or control device to provide location information to perform a series of features. Therefore, the Seeker is guided weapons systems and important device that determines the performance of one guided control. Explorer is a tactical and strategy guided weapons from different goals and specifications of weapons systems development and encourage economic efficiency, Interoperability, designed to improve the reliability and hit requirements and the more numerous. Therefore, this research through the Explorer's attributes and weapons systems encourage the development direction of the technical details of the offer.

  • PDF

An Intrusion Detection Technique Suitable for TICN (전술정보통신체계(TICN)에 적합한 침입탐지 기법)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.6
    • /
    • pp.1097-1106
    • /
    • 2011
  • Tactical Information Communication Network(TICN), a concept-type integrated Military Communication system that enables precise command control and decision making, is designed to advance into high speed, large capacity, long distance wireless relay transmission. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. Ad-hoc network works properly only if the participating nodes cooperate in routing and packet forwarding. However, if selfish nodes not forwarding packets of other nodes and malicious nodes making the false accusation are in the network, it is faced to many threats. Therefore, detection and management of these misbehaving nodes is necessary to make confident in Ad-hoc networks. To solve this problem, we propose an efficient intrusion detection technique to detect and manage those two types of attacks. The simulation-based performance analysis shows that our approach is highly effective and can reliably detect a multitude of misbehaving node.