• Title/Summary/Keyword: Target Drone

Search Result 95, Processing Time 0.027 seconds

A Study on the Techniques of Path Planning and Measure of Effectiveness for the SEAD Mission of an UAV (무인기의 SEAD 임무 수행을 위한 임무 경로 생성 및 효과도 산출 기법 연구)

  • Woo, Ji Won;Park, Sang Yun;Nam, Gyeong Rae;Go, Jeong Hwan;Kim, Jae Kyung
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.5
    • /
    • pp.304-311
    • /
    • 2022
  • Although the SEAD(suppression to enemy air defenses) mission is a strategically important task in modern warfare, the high risk of direct exposure to enemy air defense assets forces to use of unmanned aerial vehicles. this paper proposes a path planning algorithm for SEAD mission for an unmanned aerial vehicle and a method for calculating the mission effectiveness on the planned path. Based on the RRT-based path planning algorithm, a low-altitude ingress/egress flight path that can consider the enemy's short-range air defense threat was generated. The Dubins path-based Intercept path planning technique was used to generate a path that is the shortest path while avoiding the enemy's short-range anti-aircraft threat as much as possible. The ingress/intercept/egress paths were connected in order. In addition, mission effectiveness consisting of fuel consumption, the survival probability, the time required to perform the mission, and the target destruction probability was calculated based on the generated path. The proposed techniques were verified through a scenario.

Development of application for guidance and controller unit for low cost and small UAV missile based on smartphone (스마트폰을 활용한 소형 저가 유도탄 유도조종장치용 어플리케이션 개발)

  • Noh, Junghoon;Cho, Kyongkuk;Kim, Seongjun;Kim, Wonsop;Jeong, Jinseob;Sang, Jinwoo;Park, Chung-Woon;Gong, Minsik
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.45 no.7
    • /
    • pp.610-617
    • /
    • 2017
  • In the recent weapon system trend, it is required to develop small and low cost guidance missile to track and strike the enemy target effectively. Controling the such small drone typed weapon demands a integrated electronic device that equipped with not only a wireless network interface, a high resolution camera, various sensors for target tracking, and position and attitude control but also a high performance processor that integrates and processes those sensor outputs in real-time. In this paper, we propose the android smartphone as a solution for that and implement the guidance and control application of the missile. Furthermore, the performance of the implemented guidance and control application is analyzed through the simulation.

A Case Study of Recent New Terrorism and Potential Patterns in South Korea (최근 국외 뉴테러리즘의 사례분석과 국내 발생가능 유형에 대한 연구)

  • Jeon, Yong-Jae;Lee, Chang-Bae;Lee, Seung-Hyun
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.11-33
    • /
    • 2017
  • Terrorism has existed in the entire human history and has become a significant topic in criminology while prior studies has focused on North Korea as the perpetrator, and this prevents an in-depth discussion of the international trends of terrorism. As soft targets are the main target of new terrorism and because we never ignore the significance of the consequences, there are needs for more studies on the topic. This study conducted a case study of major terrorism attacks and surveyed professionals in the field via an AHP analysis in order to find the characteristics of terrorism and its potential patterns in South Korea. As a result, we found that North Korea or the left-wing may utilize homemade bomb, motor vehicle or drone for the purpose of attacking multi-use facilities in South Korea. For policy implications, we insist developing a better CPTED approach on those facilities, improving professionalism of cyber-watchdog via more training and education, stricter control on drone permit, and operation of counseling centers for preventing radicalization.

  • PDF

Optical Flow-Based Marker Tracking Algorithm for Collaboration Between Drone and Ground Vehicle (드론과 지상로봇 간의 협업을 위한 광학흐름 기반 마커 추적방법)

  • Beck, Jong-Hwan;Kim, Sang-Hoon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.3
    • /
    • pp.107-112
    • /
    • 2018
  • In this paper, optical flow based keypoint detection and tracking technique is proposed for the collaboration between flying drone with vision system and ground robots. There are many challenging problems in target detection research using moving vision system, so we combined the improved FAST algorithm and Lucas-Kanade method for adopting the better techniques in each feature detection and optical flow motion tracking, which results in 40% higher in processing speed than previous works. Also, proposed image binarization method which is appropriate for the given marker helped to improve the marker detection accuracy. We also studied how to optimize the embedded system which is operating complex computations for intelligent functions in a very limited resources while maintaining the drone's present weight and moving speed. In a future works, we are aiming to develop collaborating smarter robots by using the techniques of learning and recognizing targets even in a complex background.

The Development of Artificial Intelligence-Enabled Combat Swarm Drones in the Future Intelligent Battlefield (지능화 전장에서 인공지능 기반 공격용 군집드론 운용 방안)

  • Hee Chae;Kyung Suk Lee;Jung-Ho Eom
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.65-71
    • /
    • 2023
  • The importance of combat drones has been highlighted through the recent outbreak of the Russia-Ukraine war. The combat drones play a significant role as a a game changer that alters the conventional wisdom of traditional warfare. Many pundits expect the role of combat swarm drones would be more crucial in the future warfare. In this regard, this paper aims to analyze the development of artificial intelligence-enabled combat swarm drones. To transform the human-operated swarm drones into fully autonomous weaponry system our suggestions are as follows. Developments of (1) AI algorithms for optimized swarm drone operations, (2) decentralized command and control system, (3) inter-drones' mission analysis and allocation technology, (4) enhanced drone communication security and (5) set up of ethical guideline for the autonomous system. Specifically, we suggest the development of AI algorithms for drone collision avoidance and moving target attacks. Also, in order to adjust rapidly changing military environment, decentralized command and control system and mission analysis allocation technology are necessary. Lastly, cutting-edging secure communication technology and concrete ethical guidelines are essential for future AI-enabled combat swarm drones.

Implementation of a Filming Drone with Target Tracking Function (목표물 추적 기능을 갖춘 촬영용 드론의 구현)

  • Choi, Duk-Kyu;Kim, Ui-Jun;Lee, Jonghyeon;Kim, Seunguk;Kim, Changmin;Lee, Changmin;Paik, Gidong;Kim, Sanghyeon;Kim, Junhyeong;Myoung, Sanggi
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.01a
    • /
    • pp.173-174
    • /
    • 2021
  • 드론은 군사, 촬영, 배송, 인명구조, 조사, 단속 분야 등 산업 전반적인 영역에 활용되고 있다. 그중 촬영용 드론은 영상제작에 있어서 다양한 구도를 제공함으로써 영상제작과 구도의 다양성에 도움을 주어서 방송국에서 촬영을 위해 활용을 한다. 하지만 1인 제작자는 누군가의 도움 없이 드론 조종을 하면서 촬영하는 것은 어려움이 많고 현재 1인 제작 영상이나 사진을 찍기 위해서는 머리에 캠을 부착하거나 손에 삼각대나 지지대를 들고 다녀야하는 번거로움이 있다. 유도 촬영드론을 이용해 촬영 범위가 보다 넓어질 수 있고 장시간 손에 들고 있지 않아도 된다는 장점이 있다. 영상 촬영의 방법과 구도를 증가시킬 수 있고 1인 영상제작자에게는 다른 이의 도움 없이 홀로 자유롭고 편하게 드론 촬영을 할 수 있다.

  • PDF

Analysis of spraying performance of agricultural drones according to flight conditions

  • Dae-Hyun Lee;Baek-Gyeom Seong;Seung-Woo Kang;Soo-Hyun Cho;Xiongzhe Han;Yeongho Kang;Chun-Gu Lee;Seung-Hwa Yu
    • Korean Journal of Agricultural Science
    • /
    • v.50 no.3
    • /
    • pp.427-435
    • /
    • 2023
  • This study was conducted to evaluate the spraying performance according to the flight conditions of agricultural drones for the development of a variable control system. The analyzed flight conditions comprised six factors: spraying direction, flight speed, altitude, wind speed, wind direction, and rotor rotational speed. The ratio of the area sprayed on the water-sensitive paper was used as the coverage, and the distribution and amount of the coverage were evaluated. The coverage distribution based on the distance from the drone was used to evaluate a spray pattern, and the distribution was expressed as a Gaussian function approximation. In addition, the probability distribution based on coverage was expressed as the cumulative probability via Gamma function approximation to analyze the spraying efficiency in the target area. The results showed that the averaged coverage decreased significantly as the flight speed and wind speed increased, and the wind direction changed the spray pattern without a coverage decrease. This study contributes to the development of a control technique for the precision control system of agricultural drones.

Analysis of Iran's Air Defense Network and Implications for the Development of South Korea's Air Defense Network

  • Hwang Hyun-Ho
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.2
    • /
    • pp.249-257
    • /
    • 2024
  • This study analyzes the current status and prospects of Iran's air defense network, focusing on the Russian-made S-300 system, and derives implications for the development of South Korea's air defense network. Iran's air defense network exhibits strengths such as long-range detection and interception capabilities, multi-target processing, high-altitude interception, and electronic warfare response. However, it also reveals weaknesses, including lack of mobility, difficulty in detecting low-altitude targets, obsolescence, training level of operating personnel, and vulnerability to electronic warfare. Real-world cases confirm these weaknesses, making the system susceptible to enemy evasion tactics, swarm drone attacks, and electronic warfare. Drawing from Iran's case, South Korea should establish a multi-layered defense system, strengthen low-altitude air defense and electronic warfare capabilities, foster the domestic defense industry for technological self-reliance, and enhance international cooperation. By addressing these aspects, South Korea can establish a robust air defense network and firmly protect its national security. Future research should aim to secure and analyze materials from the Iranian perspective for a more objective evaluation of Iran's air defense network and continuously track Iran's efforts to improve its air defense network and the trend of strengthening drone forces to predict changes in the Middle East security situation.

Development of a Method for Calculating the Allowable Storage Capacity of Rivers by Using Drone Images (드론 영상을 이용한 하천의 구간별 허용 저수량 산정 방법 개발)

  • Kim, Han-Gyeol;Kim, Jae-In;Yoon, Sung-Joo;Kim, Taejung
    • Korean Journal of Remote Sensing
    • /
    • v.34 no.2_1
    • /
    • pp.203-211
    • /
    • 2018
  • Dam discharge is carried out for the management of rivers and area around rivers due to rainy season or drought. Dam discharge should be based on an accurate understanding of the flow rate that can be accommodated in the river. Therefore, understanding the allowable storage capacity of river is an important factor in the management of the environment around the river. However, the methods using water level meters and images, which are currently used to determine the allowable flow rate of rivers, show limitations in terms of accuracy and efficiency. In order to solve these problems, this paper proposes a method to automatically calculate the allowable storage capacity of river based on the images taken by drone. In the first step, we create a 3D model of the river by using the drone images. This generation process consists of tiepoint extraction, image orientation, and image matching. In the second step, the allowable storage capacity is calculated by cross section analysis of the river using the generated river 3D model and the road and river layers in the target area. In this step, we determine the maximum water level of the river, extract the cross-sectional profile along the river, and use the 3D model to calculate the allowable storage capacity for the area. To prove our method, we used Bukhan river's data and as a result, the allowable storage volume was automatically extracted. It is expected that the proposed method will be useful for real - time management of rivers and surrounding areas and 3D models using drone.

A Study on Cyber Operational Elements Classification and COA Evaluation Method for Cyber Command & Control Decision Making Support (사이버 지휘통제 의사결정 지원을 위한 사이버 작전요소 분류 및 방책 평가 방안 연구)

  • Lee, Dong-hwan;Yoon, Suk-joon;Kim, Kook-jin;Oh, Haeng-rok;Han, In-sung;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.99-113
    • /
    • 2021
  • In these days, as cyberspace has been recognized as the fifth battlefield area following the land, sea, air, and space, attention has been focused on activities that view cyberspace as an operational and mission domain in earnest. Also, in the 21st century, cyber operations based on cyberspace are being developed as a 4th generation warfare method. In such an environment, the success of the operation is determined by the commander's decision. Therefore, in order to increase the rationality and objectivity of such decision-making, it is necessary to systematically establish and select a course of action (COA). In this study, COA is established by using the method of classifying operational elements necessary for cyber operation, and it is intended to suggest a direction for quantitative evaluation of COA. To this end, we propose a method of composing the COES (Cyber Operational Elements Set), which becomes the COA of operation, and classifying the cyber operational elements identified in the target development process based on the 5W1H Method. In addition, by applying the proposed classification method to the cyber operation elements used in the STUXNET attack case, the COES is formed to establish the attack COAs. Finally, after prioritizing the established COA, quantitative evaluation of the policy was performed to select the optimal COA.