• Title/Summary/Keyword: Target Signature

Search Result 87, Processing Time 0.023 seconds

Three-Dimensional Conjugate Heat Transfer Analysis for Infrared Target Modeling (적외선 표적 모델링을 위한 3차원 복합 열해석 기법 연구)

  • Jang, Hyunsung;Ha, Namkoo;Lee, Seungha;Choi, Taekyu;Kim, Minah
    • Journal of KIISE
    • /
    • v.44 no.4
    • /
    • pp.411-416
    • /
    • 2017
  • The spectral radiance received by an infrared (IR) sensor is mainly influenced by the surface temperature of the target itself. Therefore, the precise temperature prediction is important for generating an IR target image. In this paper, we implement the combined three-dimensional surface temperature prediction module against target attitudes, environments and properties of a material for generating a realistic IR signal. In order to verify the calculated surface temperature, we are using the well-known IR signature analysis software, OKTAL-SE and compare the result with that. In addition, IR signal modeling is performed using the result of the surface temperature through coupling with OKTAL-SE.

Feature Extraction and Classification of Target from Jet Engine Modulation Signal Using Frequency Masking (제트 엔진 변조신호에서 주파수 마스킹을 이용한 표적의 특징 추출 및 식별)

  • Kim, Si-Ho;Kim, Chan-Hong;Chae, Dae-Young
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.25 no.4
    • /
    • pp.459-466
    • /
    • 2014
  • This paper deals with the method to classify the aircraft target by analyzing its JEM signal. We propose the method to classify the engine model by analyzing JEM spectrum using the harmonic frequency mask generated from the blade information of jet engine. The proposed method does not need the complicated logic algorithm to find the chopping frequency in each rotor stage and the pre-simulated engine spectrum DB used in the previous methods. In addition, we propose the method to estimate the precise spool rate and it reduces the error in estimating the number of blades or in calculating the harmonic frequency of frequency mask.

Rethinking of the Uncertainty: A Fault-Tolerant Target-Tracking Strategy Based on Unreliable Sensing in Wireless Sensor Networks

  • Xie, Yi;Tang, Guoming;Wang, Daifei;Xiao, Weidong;Tang, Daquan;Tang, Jiuyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.6
    • /
    • pp.1496-1521
    • /
    • 2012
  • Uncertainty is ubiquitous in target tracking wireless sensor networks due to environmental noise, randomness of target mobility and other factors. Sensing results are always unreliable. This paper considers unreliability as it occurs in wireless sensor networks and its impact on target-tracking accuracy. Firstly, we map intersection pairwise sensors' uncertain boundaries, which divides the monitor area into faces. Each face has a unique signature vector. For each target localization, a sampling vector is built after multiple grouping samplings determine whether the RSS (Received Signal Strength) for a pairwise nodes' is ordinal or flipped. A Fault-Tolerant Target-Tracking (FTTT) strategy is proposed, which transforms the tracking problem into a vector matching process that increases the tracking flexibility and accuracy while reducing the influence of in-the-filed factors. In addition, a heuristic matching algorithm is introduced to reduce the computational complexity. The fault tolerance of FTTT is also discussed. An extension of FTTT is then proposed by quantifying the pairwise uncertainty to further enhance robustness. Results show FTTT is more flexible, more robust and more accurate than parallel approaches.

A Forward-Secure Certificate-Based Signature Scheme with Enhanced Security in the Standard Model

  • Lu, Yang;Li, Jiguo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1502-1522
    • /
    • 2019
  • Leakage of secret keys may be the most devastating problem in public key cryptosystems because it means that all security guarantees are missing. The forward security mechanism allows users to update secret keys frequently without updating public keys. Meanwhile, it ensures that an attacker is unable to derive a user's secret keys for any past time, even if it compromises the user's current secret key. Therefore, it offers an effective cryptographic approach to address the private key leakage problem. As an extension of the forward security mechanism in certificate-based public key cryptography, forward-secure certificate-based signature (FS-CBS) has many appealing merits, such as no key escrow, no secure channel and implicit authentication. Until now, there is only one FS-CBS scheme that does not employ the random oracles. Unfortunately, our cryptanalysis indicates that the scheme is subject to the security vulnerability due to the existential forgery attack from the malicious CA. Our attack demonstrates that a CA can destroy its existential unforgeability by implanting trapdoors in system parameters without knowing the target user's secret key. Therefore, it is fair to say that to design a FS-CBS scheme secure against malicious CAs without lying random oracles is still an unsolved issue. To address this problem, we put forward an enhanced FS-CBS scheme without random oracles. Our FS-CBS scheme not only fixes the security weakness in the original scheme, but also significantly optimizes the scheme efficiency. In the standard model, we formally prove its security under the complexity assumption of the square computational Diffie-Hellman problem. In addition, the comparison with the original FS-CBS scheme shows that our scheme offers stronger security guarantee and enjoys better performance.

Prohibiting internal data leakage to mass storage device in mobile device (모바일 단말에서 외부 저장 매체로의 불법 데이터 유출 방지 기법)

  • Chung, Bo-Heung;Kim, Jung-Nyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.125-133
    • /
    • 2011
  • According to proliferation of mobile devices, security threats have been continuously increased such as illegal or unintentional file transmission of important data to an external mass-storage device. Therefore, we propose a protection method to prohibit an illegal outflow to this device and implement this method. This method extracts signatures from random locations of important file and uses them to detect and block illegal file transmission. To get signatures, a target file is divided by extracting window size and more than one signatures are extracted in this area. To effective signature sampling, various extraction ways such as full, binomial distribution-based and dynamic sampling are implemented and evaluated. The proposed method has some advantages. The one is that an attacker cannot easily predict the signature and its extraction location. The other is that it doesn't need to modify original data to protect it. With the help of these advantages, we can say that this method can increase efficiency of easy-to-use and it is a proper way leakage prevention in a mobile device.

Efficient Measurement System to Investigate Micro-Doppler Signature of Ballistic Missile

  • Choi, In-O;Kim, Kyung-Tae;Jung, Joo-Ho;Kim, Si-Ho;Park, Sang-Hong
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.17 no.4
    • /
    • pp.614-621
    • /
    • 2016
  • Micro-Doppler (MD) shift caused by the micro-motion of a ballistic missile (BM) can be very useful to identify it. In this paper, the MD signatures of three scale-model BMs are investigated using a portable measurement system. The measurement system consists of an X-band 2-by-2 phase comparison mono-pulse radar, and a mechanical device that can impart controlled spinning and coning motions simultaneously to a model to yield the MD signature that replicates the characteristic of each target and the corresponding micro-motion. The coning motion determined the overall period of MD, and the spinning motion increased its amplitude. MD was also dependent on aspect angle. The designed system is portable, and can implement many micro-motions; it will contribute to analysis of MD in various situations.

Computation of RCS and TES of Curved Objects Using a Curved-Patch Physical Optics Method (곡면패치 물리광학법을 이용한 곡면체의 RCS 및 TES 계산)

  • Sung-Youn Boo
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.38 no.1
    • /
    • pp.62-71
    • /
    • 2001
  • Prediction of ship's signature of RCS(Radar Cross Section) and TES(Target Echo Strength) is mostly required in the initial design stage of naval craft, because RCS is directly related to the radar detection while TES to the sonar detection. In this research, a numerical scheme using a curved-patch physical optics method is proposed to evaluate signature of a perfectly reflecting curved object. The scheme is validated by comparing numerical RCS values of circular cylinder, sphere and NACA3317 airfoil with available data. It is also further applied to predict RCS of a surfaced submarine and TES of fully submerged one. Major reflectors of the surfaced or submerged submarine for the various incident angles of radar and sonar waves are investigated as well.

  • PDF

Study on Infrared Signature Variations of a Naval Ship Operated at sea Near Geoje-do Island (거제도 인근해상에서 운용되는 함정의 적외선 신호 변화 특성에 대한 연구)

  • Kil, Tae-Jun;Kim, Tae-Kuk
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.1
    • /
    • pp.15-24
    • /
    • 2014
  • It is essential to understand the infrared signature of a naval ship to survive against various missile attacks under variable environmental conditions. As guided missiles are developing to equip more accurate IR seekers, research works for countermeasure and IR stealth technology are strongly required. But challenging works are continuously suggested for predicting and analyzing IR signal status of naval ships to achieve low observable performance under various weather conditions, variable missions and developing threats. In this study, overall guidelines of setting design criteria for low observable ships are proposed by considering varying environmental conditions including daily and seasonal variations. Test and evaluation criteria for newly constructed ships for target and background temperature difference is proposed as a design criteria which can be predicted by change of condition and ship's speed. Through the proposed techniques and procedures, it is expected to establish the measurement and evaluation criteria by using temperature, IR Signal differences between the ship and the background.

Applications of Transposon-Based Gene Delivery System in Bacteria

  • Choi, Kyoung-Hee;Kim, Kang-Ju
    • Journal of Microbiology and Biotechnology
    • /
    • v.19 no.3
    • /
    • pp.217-228
    • /
    • 2009
  • Mobile genetic segments, or transposons, are also referred to as jumping genes as they can shift from one position in the genome to another, thus inducing a chromosomal mutation. According to the target site-specificity of the transposon during a transposition event, the result is either the insertion of a gene of interest at a specific chromosomal site, or the creation of knockout mutants. The former situation includes the integration of conjugative transposons via site-specific recombination, several transposons preferring a target site of a conserved AT-rich sequence, and Tn7 being site-specifically inserted at attTn7, the downstream of the essential glmS gene. The latter situation is exploited for random mutagenesis in many prokaryotes, including IS (insertion sequence) elements, mariner, Mu, Tn3 derivatives (Tn4430 and Tn917), Tn5, modified Tn7, Tn10, Tn552, and Ty1, enabling a variety of genetic manipulations. Randomly inserted transposons have been previously employed for a variety of applications such as genetic footprinting, gene transcriptional and translational fusion, signature-tagged mutagenesis (STM), DNA or cDNA sequencing, transposon site hybridization (TraSH), and scanning linker mutagenesis (SLM). Therefore, transposon-mediated genetic engineering is a valuable discipline for the study of bacterial physiology and pathogenesis in living hosts.

Unusual Radar Echo from the Wake of Meteor Fireball in Nearly Horizontal Transits in the Summer Polar Lower-Thermosphere

  • Lee, Young-Sook;Kirkwood, Sheila;Kwak, Young-Sil
    • Journal of Astronomy and Space Sciences
    • /
    • v.35 no.2
    • /
    • pp.83-92
    • /
    • 2018
  • The summer polar lower thermosphere (90-100 km) has an interesting connection to meteors, adjacent to the mesopause region attaining the lowest temperature in summer. Meteors supply condensation nuclei for charged ice particles causing polar mesospheric summer echoes (PMSE). We report the observation of meteor trail with nearly horizontal transit at high speed (20-50 km/s), and at last with re-enhanced echo power followed by diffusive echoes. Changes in phase difference between radar receivers aligned in meridional and zonal directions are used to determine variations in horizontal displacements and speeds with respect to time by taking advantage of radar interferometric analysis. The actual transit of echo target is observed along the straight pathway vertically and horizontally extended as much as a distance of at least 24 km and at most 29 km. The meteor trail initially has a signature similar to 'head echoes', with travel speeds from 20 - 50 km/s. It subsequently transforms into a different type of echo target including specular echo and then finally the power reenhanced. The reenhancement of echo power is followed by fume-like diffusive echoes, indicating sudden release of plasma as like explosive process probably involved. We discuss a possible role of meteor-triggered secondary plasma trail, such as fireball embedded with electrical discharge that continuously varies the power and transit speed.