• Title/Summary/Keyword: information warfare

Search Result 374, Processing Time 0.022 seconds

Signal Processing Algorithm to Reduce RWR Electro-Magnetic Interference with Tail Rotor Blade of Helicopter

  • Im, Hyo-Bin;Go, Eun-Kyoung;Jeong, Un-Seob;Lyu, Si-Chan
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.10 no.2
    • /
    • pp.117-124
    • /
    • 2009
  • In the environment where various and complicated threat signals exist, RWR (Radar Warning Receiver), which can warn pilot of the existence of threats, has long been a necessary electronic warfare (EW) system to improve survivability of aircraft. The angle of arrival (AOA) information, the most reliable sorting parameter in the RWR, is measured by means of four-quadrant amplitude comparison direction finding (DF) technique. Each of four antennas (usually spiral antenna) of DF unit covers one of four quadrant zones, with 90 degrees apart with nearby antenna. According to the location of antenna installed in helicopter, RWR is subject to signal loss and interference by helicopter body and structures including tail bumper, rotor blade, and so on, causing a difficulty of detecting hostile emitters. In this paper, the performance degradation caused by signal interference by tail rotor blades has been estimated by measuring amplitude video signals into which RWR converts RF signals in case a part of antenna is screened by real tail rotor blade in anechoic chamber. The results show that corruption of pulse amplitude (PA) is main cause of DF error. We have proposed two algorithms for resolving the interference by tail rotor blades as below: First, expand the AOA group range for pulse grouping at the first signal analysis phase. Second, merge each of pulse trains with the other, that signal parameter except PRI and AOA is similar, after the first signal analysis phase. The presented method makes it possible to use RWR by reducing interference caused by blade screening in case antenna is screened by tail rotor blades.

A Study on the Analysis of U.S.A Navy and R.O.K Military C4I System and Future Development (미해군과 한국군 C4I 체계 분석 및 발전 방향에 관한 연구)

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Jo, Yong-Gun;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.59-66
    • /
    • 2011
  • The representative concept of the future war is NCW. The main point of NCW is that it is connected by networ ks and gathers the battlefield status in real time, managing and controlling it. This is most needed in the navy. Operations of the navy are carried out in wide areas, individually or together. During this process, sharing information between each warship should be essential. Furthermore in the case of the American navy, they see the entire world as the operation area so it is a representative example of NCW. The C4I system of the Korean army is separated a ccording to the difference of each army's tactics and weapon system, being developed and managed differently. The refore there is a problem of interoperability lacking in each system. This paper analyzes the developed C4I system of the American navy to analyze the problems of C4I system of the Korean army, and propose the future direction of its development.

Codebook-Based Foreground-Background Segmentation with Background Model Updating (배경 모델 갱신을 통한 코드북 기반의 전배경 분할)

  • Jung, Jae-young
    • Journal of Digital Contents Society
    • /
    • v.17 no.5
    • /
    • pp.375-381
    • /
    • 2016
  • Recently, a foreground-background segmentation using codebook model has been researched actively. The codebook is created one for each pixel in the image. The codewords are vector-quantized representative values of same positional training samples from the input image sequences. The training is necessary for a long time in the most of codebook-based algorithms. In this paper, the initial codebook model is generated simply using median operation with several image frames. The initial codebook is updated to adapt the dynamic changes of backgrounds based on the frequencies of codewords that matched to input pixel during the detection process. We implemented the proposed algorithm in the environment of visual c++ with opencv 3.0, and tested to some of the public video sequences from PETS2009. The test sequences contain the various scenarios including quasi-periodic motion images, loitering objects in the local area for a short time, etc. The experimental results show that the proposed algorithm has good performance compared to the GMM algorithm and standard codebook algorithm.

A Study on Establishing of the Future Development Strategy for National Cyber Terror Response (국가 사이버테러대응 미래 발전전략 수립에 관한 연구)

  • Kim, MinSu;Yang, Jeongmo
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.15-24
    • /
    • 2020
  • Cyber terror and cyberwarfare are no longer virtual, but real, and as an actual security situation, it is necessary to have new understanding through expanding the concept of war to neutralize not only the other country's military command system, but also the country's main functions such as telecommunications, energy, finance, and transport systems, and it also needs to establish the future development strategy of cyber terror response at the national level. Through analysis of cyberwarfare trends in each country and current status of cyberwarfare in Korea, it will systematically explore the demand of new policy based on laws and systems, including the strategies of cyber security technology development, industry promotion, and manpower training and existing information protection policies. through this, it effectively manages a sustainable national crisis, and it suggests to establish a future strategy for the medium and long term cyber security that can effectively and actively respond to cyberwarfare.

A Study on Methodology of Capability-Based Force Development (능력기반 전력개발 방법론에 관한 연구)

  • Lee, Yong-Sin;Lee, Soo-Hwan;Lee, Tae-Gong;Lim, Byung-Youn;Jeong, Yong-Won
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.4
    • /
    • pp.517-536
    • /
    • 2013
  • Warfare paradigm has been changed from PCW to NCW and the military requirement/acquisition system has been changed from bottom-up process(Weapon-Centric) to top-down process(Capability-Centric) in orde to improving the effectiveness of NCW. The concept of top down acquisition process focused on acquiring the capability based on CBP through CBA. However, implementing the concepts and embdding them into methodology will be chanllenging. So, we analyze existing examples overseas and to create new methodology which identify the our force capability through the CBA based on enimy capability. The proposed methodology can be implemented military operation area, public safety area and disaster relief area for CBP based on CBA.

QoS Support in the Air Defense Alternative System (방공작전 예비체계의 QoS 지원)

  • Sim, Dong-Sub;Lee, Young-Ran;Kim, Ki-Hyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.5
    • /
    • pp.903-909
    • /
    • 2010
  • ADAS is the air defense control system performing air surveillance and identification of ROK and near air. This system is self-developed by Air Force, currently operated successfully as the alternative system of MCRC. ADAS processes converting and combining transferred the real time radar data detected by radars. additionally, it displays significant radar data as producing in tracks. Then, it uses the message queue for IPC(Inter Process Communication). the various tactical data processed in the server is ultimately send to the network management process through the message queue for transmitting to the weapon director console. the weapon director receives this transmitted tactical data through the console to execute air defense operations. However, there is a problem that data packet is delayed or lost since the weapon Director does not receive as the amount of tactical data from the server overflowed with air tracks and missions increased. This paper improved the algorism to display and transmit the various tactical data processed from ADAS server to numbers of the weapon director console in the real time without any delay or lost. Improved the algorism, established at exercise, the development server in the real operation network and the weapon director console, is proved by comparing the number of sending tactical data packets in the server and receiving packets in the weapon director.

A Study on Quality Assurance of Embedded Software Source Codes for Weapon Systems by Improving the Reliability Test Process (신뢰성 시험 프로세스 개선을 통한 무기체계 내장형 소프트웨어 소스코드 품질확보에 관한 연구)

  • Kwon, Kyeong Yong;Joo, Joon Seok;Kim, Tae Sik;Oh, Jin Woo;Baek, Ji Hyun
    • Journal of KIISE
    • /
    • v.42 no.7
    • /
    • pp.860-867
    • /
    • 2015
  • In the defense field, weapon systems are increasing in importance, as well as the weight of the weapon system embedded software development as an advanced technology. As the development of a network-centric warfare has become important to secure the reliability and quality of embedded software in modern weapons systems in battlefield situations. Also, embedded software problems are transferred to the production stage in the development phase and the problem gives rise to an enormous loss at the national level. Furthermore, development companies have not systematically constructed a software reliability test. This study suggests that approaches about a qualityverification- system establishment of embedded software, based on a variety of source code reliability test verification case analysis.

Depth estimation of an underwater target using DIFAR sonobuoy (다이파 소노부이를 활용한 수중표적 심도 추정)

  • Lee, Young gu
    • The Journal of the Acoustical Society of Korea
    • /
    • v.38 no.3
    • /
    • pp.302-307
    • /
    • 2019
  • In modern Anti-Submarine Warfare, there are various ways to locate a submarine in a two-dimensional space. For more effective tracking and attack against a submarine the depth of the target is a critical factor. However, it has been difficult to find out the depth of a submarine until now. In this paper a possible solution to the depth estimation of submarines is proposed utilizing DIFAR (Directional Frequency Analysis and Recording) sonobuoy information such as contact bearings at or prior to CPA (Closest Point of Approach) and the target's Doppler signals. The relative depth of the target is determined by applying the Pythagorean theorem to the slant range and horizontal range between the target and the hydrophone of a DIFAR sonobuoy. The slant range is calculated using the Doppler shift and the target's velocity. the horizontal range can be obtained by applying a simple trigonometric function for two consecutive contact bearings and the travel distance of the target. The simulation results show that the algorithm is subject to an elevation angle, which is determined by the relative depth and horizontal distance between the sonobuoy and target, and that a precise measurement of the Doppler shift is crucial.

Feature Extraction of Radar Signals Using Streaming Process (스트리밍 처리에 의한 레이더 신호 특성 추출)

  • Kim, Gwan-Tae;Ju, Young-Kwan;Jeon, Joongnam
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.12
    • /
    • pp.31-38
    • /
    • 2020
  • Radar signal identification of electronic warfare is a technology that recognizes the pulse repetition interval (PRI) from a set of pulse description words (PDWs) generated by the signal receiver. Conventionally batch processing is widely used in which a number of PDWs are collected as a unit and identifies PRI from the batch. In this paper, we propose a feature extraction algorithm based on the streaming process. This technique does not wait to form a batch. Whenever a PDW(Pulse Description Word) is generated from the signal receiver, the streaming process tries to form a cluster of PDWs, and makes the DTOA (Difference of Time of Arrival) histogram, finds out the frame PRI based on the concentration ratio, and decides the number of stagger stages. Experiments proved that the proposed algorithm derives stable recognition results as the cluster size increases.

Bidirectional LSTM based light-weighted malware detection model using Windows PE format binary data (윈도우 PE 포맷 바이너리 데이터를 활용한 Bidirectional LSTM 기반 경량 악성코드 탐지모델)

  • PARK, Kwang-Yun;LEE, Soo-Jin
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.87-93
    • /
    • 2022
  • Since 99% of PCs operating in the defense domain use the Windows operating system, detection and response of Window-based malware is very important to keep the defense cyberspace safe. This paper proposes a model capable of detecting malware in a Windows PE (Portable Executable) format. The detection model was designed with an emphasis on rapid update of the training model to efficiently cope with rapidly increasing malware rather than the detection accuracy. Therefore, in order to improve the training speed, the detection model was designed based on a Bidirectional LSTM (Long Short Term Memory) network that can detect malware with minimal sequence data without complicated pre-processing. The experiment was conducted using the EMBER2018 dataset, As a result of training the model with feature sets consisting of three type of sequence data(Byte-Entropy Histogram, Byte Histogram, and String Distribution), accuracy of 90.79% was achieved. Meanwhile, it was confirmed that the training time was shortened to 1/4 compared to the existing detection model, enabling rapid update of the detection model to respond to new types of malware on the surge.