• 제목/요약/키워드: Threat Value

검색결과 172건 처리시간 0.025초

무기할당을 위한 계층적 레이지 그리디 알고리즘 (Hierarchical Lazy Greedy Algorithm for Weapon Target Assignment)

  • 정혜선
    • 한국군사과학기술학회지
    • /
    • 제23권4호
    • /
    • pp.381-388
    • /
    • 2020
  • Weapon target assignment problem is an essential technology for automating the operator's rapid decision-making support in a battlefield situation. Weapon target assignment problem is a kind of the optimization problem that can build up an objective function by maximizing the number of threat target destructed or maximizing the survival rate of the protected assets. Weapon target assignment problem is known as the NP-Complete, and various studies have been conducted on it. Among them, a greedy heuristic algorithm which guarantees (1-1/e) approximation has been considered a very practical method in order to enhance the applicability of the real weapon system. In this paper, we formulated the weapon target assignment problem for supporting decision-making at the level of artillery. The lazy strategy based on hierarchical structure is proposed to accelerate the greedy algorithm. By experimental results, we show that our algorithm is more efficient in processing time and support the same level of the objective function value with the basic greedy algorithm.

Probabilistic Assessment of Voltage Stability Margin in Presence of Wind Speed Correlation

  • Li, Hongxin;Cai, DeFu;Li, Yinhong
    • Journal of Electrical Engineering and Technology
    • /
    • 제8권4호
    • /
    • pp.719-728
    • /
    • 2013
  • Probabilistic assessment of voltage stability margin (VSM) with existence of correlated wind speeds is investigated. Nataf transformation is adopted to establish wind speed correlation (WSC) model. Based on the saddle-node bifurcation transversality condition equations and Monte Carlo simulation technique, probability distribution of VSM is determined. With correlation coefficients range low to high value, the effect of WSC on VSM is studied. In addition, two risk indexes are proposed and the possible threat caused by WSC is evaluated from the viewpoint of risk analysis. Experimental results show that the presence of correlated wind speeds is harmful to safe and stable operation of a power system as far as voltage stability is concerned. The achievement of this paper gives a detailed elaboration about the influence of WSC on voltage stability and provides a potentially effective analytical tool for modern power system with large-scale wind power sources integration.

Flexible membranes with a hierarchical nanofiber/microsphere structure for oil adsorption and oil/water separation

  • Gao, Jiefeng;Li, Bei;Wang, Ling;Huang, Xuewu;Xue, Huaiguo
    • Journal of Industrial and Engineering Chemistry
    • /
    • 제68권
    • /
    • pp.416-424
    • /
    • 2018
  • Oil spill and oily wastewater have now become a serious threat to the freshwater and marine environments. Porous materials with super-hydrophobicity and super-oleophilicity are good candidates for the oil adsorption and oil/water separation. Here, flexible hybrid nanofibrous membrane (FHNM) containing $SiO_2$/polyvinylidene fluoride (PVDF) microspheres was prepared by simultaneous electrospinning and electrospraying. The obtained FHNM combined the flexibility of the nanofiber mat and super-hydrophobicity of the microspheres, which could not be achieved by either only electrospinning or only electrospraying. It was found that when the weight ratio between the $SiO_2$ and PVDF reached a critical value, the $SiO_2$ nanoparticles were present on the PVDF microsphere surface, significantly improving the surface roughness and hence the contact angle of the FHNM. Compared with the pure electrospun PVDF nanofiber mat, most of the FHNMs have a higher oil adsorption capacity. The FHNM could separate the oil with water quickly under the gravity and displayed a high efficiency and good reusability for the oil/water separation. More importantly, the FHNM could not only separate the oil with the pure water but also the corrosive solution including the salt, acid and alkali solution.

Adversarial Detection with Gaussian Process Regression-based Detector

  • Lee, Sangheon;Kim, Noo-ri;Cho, Youngwha;Choi, Jae-Young;Kim, Suntae;Kim, Jeong-Ah;Lee, Jee-Hyong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권8호
    • /
    • pp.4285-4299
    • /
    • 2019
  • Adversarial attack is a technique that causes a malfunction of classification models by adding noise that cannot be distinguished by humans, which poses a threat to a deep learning model. In this paper, we propose an efficient method to detect adversarial images using Gaussian process regression. Existing deep learning-based adversarial detection methods require numerous adversarial images for their training. The proposed method overcomes this problem by performing classification based on the statistical features of adversarial images and clean images that are extracted by Gaussian process regression with a small number of images. This technique can determine whether the input image is an adversarial image by applying Gaussian process regression based on the intermediate output value of the classification model. Experimental results show that the proposed method achieves higher detection performance than the other deep learning-based adversarial detection methods for powerful attacks. In particular, the Gaussian process regression-based detector shows better detection performance than the baseline models for most attacks in the case with fewer adversarial examples.

탄도미사일 탐지 확률 향상을 위한 레이더 배치에 관한 연구 (Study on radar deployment for improving the ballistic missile detection probability)

  • 박태용
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2014년도 추계학술대회
    • /
    • pp.518-520
    • /
    • 2014
  • 레이더를 이용하여 표적을 탐지함에 있어 표적의 Radar Cross Section(RCS)은 매우 중요한 요소이다. 동일한 표적이라도 레이더를 바라보는 방향에 따라 RCS 값이 크게 차이 나며, 레이더로 표적을 탐지하는 확률을 높이기 위해 RCS가 크게 나타나는 곳에 레이더를 배치하는 것이 유리하다. 북한의 탄도미사일은 우리의 안보에 큰 위협이 되고 있으며, 탄도미사일 방어를 위해 레이더를 이용하여 미사일을 조기에 탐지하여 추적하여야한다. 본 논문에서는 탄도미사일의 RCS 특성과 북한 탄도미사일의 탄도를 분석하여 탄도미사일의 탐지확률을 높이기 위한 레이더 배치 방안을 제시하였다.

  • PDF

A stress model reflecting the effect of the friction angle on rockbursts in coal mines

  • Fan, Jinyang;Chen, Jie;Jiang, Deyi;Wu, Jianxun;Shu, Cai;Liu, Wei
    • Geomechanics and Engineering
    • /
    • 제18권1호
    • /
    • pp.21-27
    • /
    • 2019
  • Rockburst disasters pose serious threat to mining safety and underground excavation, especially in China, resulting in massive life-wealth loss and even compulsive closed-down of some coal mines. To investigate the mechanism of rockbursts that occur under a state of static forces, a stress model with sidewall as prototype was developed and verified by a group of laboratory experiments and numerical simulations. In this model, roadway sidewall was simplified as a square plate with axial compression and end (horizontal) restraints. The stress field was solved via the Airy stress function. To track the "closeness degree" of the stress state approaching the yield limit, an unbalanced force F was defined based on the Mohr-Coulomb yield criterion. The distribution of the unbalanced force in the plane model indicated that only the friction angle above a critical value could cause the first failure on the coal in the deeper of the sidewall, inducing the occurrence of rockbursts. The laboratory tests reproduced the rockburst process, which was similar to the prediction from the theoretical model, numerical simulation and some disaster scenes.

ISP(Internet Service Provider) 네트워크의 정량적인 위험분석을 위한 시스템 설계 및 구현 (Design and Implementation of Quantitative Risk Analysis System for ISP Network)

  • 문호건;최진기;김형순
    • 정보보호학회논문지
    • /
    • 제14권2호
    • /
    • pp.101-111
    • /
    • 2004
  • ISP 네트워크의 보안수준 진단과 대응방안을 수립하기 위해서는 네트워크상의 정보자산에 대한 취약점과 위협 요인을 식별하고, 피해 발생시 예상되는 손실의 정도를 산정하는 위험분석 절차가 필수적이다. 하지만, 기존의 위험분석 방법론 및 도구들은 대부분 방법론적 분석절차와 수단만을 제공하며, 개별 시스템의 취약점 및 위협요인의 변동정보를 실시간으로 반영할 수가 없다. 따라서. 본 논문에서는 네트워크 침입탐지 시스템과 취약점 분석 시스템의 탐지 정보들을 실시간으로 수집, 분석하여 네트워크 자산에 발생할 수 있는 위험의 가능성을 찾아내고, 정량적인 위험수준을 평가하는 시스템을 제안한다. 또한, 실험을 통해 시스템의 성능수준을 제시하였다.

A Model to Identify Expeditiously During Storm to Enable Effective Responses to Flood Threat

  • Husain, Mohammad;Ali, Arshad
    • International Journal of Computer Science & Network Security
    • /
    • 제21권5호
    • /
    • pp.23-30
    • /
    • 2021
  • In recent years, hazardous flash flooding has caused deaths and damage to infrastructure in Saudi Arabia. In this paper, our aim is to assess patterns and trends in climate means and extremes affecting flash flood hazards and water resources in Saudi Arabia for the purpose to improve risk assessment for forecast capacity. We would like to examine temperature, precipitation climatology and trend magnitudes at surface stations in Saudi Arabia. Based on the assessment climate patterns maps and trends are accurately used to identify synoptic situations and tele-connections associated with flash flood risk. We also study local and regional changes in hydro-meteorological extremes over recent decades through new applications of statistical methods to weather station data and remote sensing based precipitation products; and develop remote sensing based high-resolution precipitation products that can aid to develop flash flood guidance system for the flood-prone areas. A dataset of extreme events has been developed using the multi-decadal station data, the statistical analysis has been performed to identify tele-connection indices, pressure and sea surface temperature patterns most predictive to heavy rainfall. It has been combined with time trends in extreme value occurrence to improve the potential for predicting and rapidly detecting storms. A methodology and algorithms has been developed for providing a well-calibrated precipitation product that can be used in the early warning systems for elevated risk of floods.

접속로그와 패스워드에 따른 가변 및 동적솔트에 관한 연구 (A Study on the Variable and Dynamic Salt According to Access Log and Password)

  • 정진호;차영욱;김춘희
    • 한국멀티미디어학회논문지
    • /
    • 제24권1호
    • /
    • pp.58-66
    • /
    • 2021
  • The user's password must be encrypted one-way through the hash function and stored in the database. Widely used hash functions such as MD5 and SHA-1 have also been found to have vulnerabilities, and hash functions that are considered safe can also have vulnerabilities over time. Salt enhances password security by adding it before or after the password before putting it to the hash function. In the case of the existing Salt, even if it is randomly assigned to each user, once it is assigned, it is a fixed value in a specific column of the database. If the database is exposed to an attacker, it poses a great threat to password cracking. In this paper, we suggest variable-dynamic Salt that dynamically changes according to the user's password during the login process. The variable-dynamic Salt can further enhance password security during login process by making it difficult to know what the Salt is, even if the database or source code is exposed.

탄도미사일의 비행궤적 예측 방법 연구 - 탄종별 비행경로각과 사거리를 중심으로 - (A Study on the Flight Trajectory Prediction Method of Ballistic Missiles - BM type by Adjusting the Angle of a Flight Path and a Range -)

  • 유병천;김주현;권용수;최봉완
    • 시스템엔지니어링학술지
    • /
    • 제16권2호
    • /
    • pp.131-140
    • /
    • 2020
  • The characteristics of ballistic missiles are changing rapidly but studies have mostly focused on fragmentary flight trajectory analysis estimating the changing characteristics of some types, while there is a lack of research on comprehensive and efficient ballistic search, detection and prediction for missiles including the new types that have been gaining attention lately. This paper analyzes the flight trajectory characteristics of ballistic missiles at various ranges considering flight path angle adjustment, specific impulse and drag force with altitude based on the optimized equations of motion reflecting the parameters of North Korea's general and new types of ballistic missiles. The flight trajectory characteristics of representative ranges for each ballistic missile were analyzed by adjusting the flight path angle in the minimum energy method, lofted method, and depressed method. In addition, High value target can attacked by ballistic missiles considering flight path angle adjustment at various points. It's expected to be used to Threat Evaluation and Weapon Allocation, and deployment of defense systems by interpreting the analysis of the latest Iskander-class ballistic missiles and the new multiple rocket launcher.