• Title/Summary/Keyword: military applications

Search Result 464, Processing Time 0.022 seconds

Design and Development of 30W Military Grade DC-DC Converter for Guided Weapon and Aircraft (유도무기 및 항공기 탑재장비용 30W급 군사용 DC-DC 변환장치 개발)

  • Park, Sang-Min;Joo, Dong-Myoung;Chae, Soo-Yong;Kim, Hyung-Jung;Lee, Byoung-Kuk
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.9
    • /
    • pp.1341-1350
    • /
    • 2017
  • In this paper, a high reliability 30W DC-DC converter is designed considering military standard (MIL-STD) for military applications such as guided weapon and aircraft. The performances and specifications of conventional military grade DC-DC converter are practically analyzed. The requirements for military grade DC-DC converter are established in consideration of MIL-STD and analysis results of conventional product. Two isolated DC-DC converter, forward and fly-back converter, are designed and compared to determine topology. From experimental results under various operating conditions, the forward topology satisfied performances and specifications of MIL-STD for military DC-DC converter.

Low Delay Data Transmission Mechanism for Military Surveillance in Wireless Sensor Networks (무선 센서 네트워크에서 군 감시 정찰을 위한 저 지연 데이터 전송 메커니즘)

  • Jeon, Jun-heon;Lee, Sung-choon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.4
    • /
    • pp.855-860
    • /
    • 2017
  • One of the most important issues in Wireless Sensor Networks is to save energy of the sensor node. But transmission latency is also the problem to solve for some applications such as military surveillance, object tracking. In these applications sensor node needs to send lots of data in limited time when an even such as object appearance occurs. So a delay efficient data transmission method is required. In this paper we propose a MAC protocol adequate for those applications. This paper proposed a low delay data transmission mechanism for military surveillance in wireless sensor networks. In the MAC protocol, a receiver node sends another beacon frame to sender node after receiving data packet. Using this second beacon frame, fast hop-to-hop transmission can be performed. Results have shown that the proposed MAC control mechanism outperformed RI-MAC protocol in the terms of latency.

Verification, Validation, and Accreditation (VV&A) Considering Military and Defense Characteristics

  • Kim, Jung Hoon;Jeong, Seugmin;Oh, Sunkyung;Jang, Young Jae
    • Industrial Engineering and Management Systems
    • /
    • v.14 no.1
    • /
    • pp.88-93
    • /
    • 2015
  • In this paper, we identify the characteristics of modeling and simulation (M&S) for military and defense and propose the method of verification, validation, and accreditation (VV&A) using the identified characteristics. M&S has been widely used for many different applications in military and defense, including training, analysis, and acquisition. Various methods and processes of VV&A have been proposed by researchers and M&S practitioners to guarantee the correctness of M&S. The notion of applying formal credibility assessment in VV&A originated in software engineering reliability testing and the systems engineering development process. However, the VV&A techniques and processes proposed for M&S by the research community have not addressed the characteristics and issues specific to military and defense. We first identify the characteristics and issues of military/defense M&S and then propose techniques and methods for VV&A that are specific for military/defense M&S. Possible approaches for the development of VV&A are also proposed.

An Application of Information Technology to the Revolution of Military Affairs (정보기술을 활용한 군사혁신 방안에 관한 연구)

  • 강신철;최성필
    • Journal of Information Technology Application
    • /
    • v.2 no.1
    • /
    • pp.83-111
    • /
    • 2000
  • To preserve competitiveness in rapidly changing world military market and to adapt themselves to newly-developed warfare, many developed counties have been readjusting their military organizations and technical procedures. In a private sector, business reengineering and other innovative efforts were made to respond to this change, using structural approaches. In the military sector, the United States is the one leading this move. She has been trying to reorganize her military structure to hold her hegemony in world politics for the coming 21st century. The purpose of this paper, is, (1) to analyze the information technology on the military revolution, (2) to deduce what to be changed, and (3) to infer how to change. The comparison between Korea and U.S. in terms of the real military situation was made to analyze these three research questions. The study was based on the structural contingency theory, one of the environmental analysis models, being introduced to explore the Revolution in Military Affairs(RMA) case in United States and Korea. The conclusion may be summarized as follows; First, information-based society which is characterized by the development of information technology and environmental, complexity and weakness in security affairs will affect the military factors such as the issue of holding information superiority, changing warfare in proportion to the military-scientific development and weakness in military security. This trend will be more deep-rooted and multiple in its influence on the military affairs.

  • PDF

Identification of a Cancer Stem-like Population in the Lewis Lung Cancer Cell Line

  • Zhang, An-Mei;Fan, Ye;Yao, Quan;Ma, Hu;Lin, Sheng;Zhu, Cong-Hui;Wang, Xin-Xin;Liu, Jia;Zhu, Bo;Sun, Jian-Guo;Chen, Zheng-Tang
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.3
    • /
    • pp.761-766
    • /
    • 2012
  • Objective: Although various human cancer stem cells (CSCs) have been defined, their applications are restricted to immunocompromised models. Developing a novel CSC model which could be used in immunocompetent or transgenic mice is essential for further understanding of the biomolecular characteristics of tumor stem cells. Therefore, in this study, we analyzed murine lung cancer cells for the presence of CSCs. Methods: Side population (SP) cells were isolated by fluorescence activated cell sorting, followed by serum-free medium (SFM) culture, using Lewis lung carcinoma cell (LLC) line. The self-renewal, differentiated progeny, chemosensitivity, and tumorigenic properties in SP and non-SP cells were investigated through in vitro culture and in vivo serial transplantation. Differential expression profiles of stem cell markers were examined by RT-PCR. Results: The SP cell fraction comprised 1.1% of the total LLC population. SP cells were available to grow in SFM, and had significantly enhanced capacity for cell proliferation and colony formation. They were also more resistant to cisplatin in comparison to non-SP cells, and displayed increased tumorigenic ability. Moreover, SP cells showed higher mRNA expression of Oct-4, ABCG2, and CD44. Conclusion: We identified SP cells from a murine lung carcinoma, which possess well-known characteristics of CSCs. Our study established a useful model that should allow investigation of the biological features and pharmacosensitivity of lung CSCs, both in vitro and in syngeneic immunocompetent or transgenic/knockout mice.

Impact Analysis of the Processor Alteration on Embedded Computer (임베디드 컴퓨터에서 프로세서 변경에 따른 영향 분석)

  • Kim, Hyung-Moon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.10 no.2
    • /
    • pp.115-125
    • /
    • 2007
  • The ubiquitous embedded computers are firmly established as the basic electronic component of design that control military systems. Such applications can be found everywhere in the field of military system. A embedded computer is required to redesign when system needs performance upgrade or production-state of processor is NRND or EOL. This paper describes a scheme about impact analysis of designing processor alteration on embedded computer. In this case, hardware architecture and interrupt source of target system must be considered. Also, performance and throughput of that must be analyzed.

Development of an IMU-based Wearable Ankle Device for Military Motion Recognition (군사 동작 인식을 위한 IMU 기반 발목형 웨어러블 디바이스 개발)

  • Byeongjun Jang;Jeonghoun Cho;Dohyeon Kim;Kyeong-Won Park
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.2
    • /
    • pp.23-34
    • /
    • 2023
  • Wearable technology for military applications has received considerable attention as a means of personal status check and monitoring. Among many, an implementation to recognize specific motion states of a human is promising in that allows active management of troops by immediately collecting the operational status and movement status of individual soldiers. In this study, as an extension of military wearable application research, a new ankle wearable device is proposed that can glean the information of a soldier on the battlefield on which action he/she takes in which environment. Presuming a virtual situation, the soldier's upper limbs are easily exposed to uncertainties about circumstances. Therefore, a sensing module is attached to the ankle of the soldier that may always interact with the ground. The obtained data comprises 3-axis accelerations and 3-axis rotational velocities, which cannot be interpreted by hand-made algorithms. In this study, to discern the behavioral characteristics of a human using these dynamic data, a data-driven model is introduced; four features extracted from sliced data (minimum, maximum, mean, and standard deviation) are utilized as an input of the model to learn and classify eight primary military movements (Sitting, Standing, Walking, Running, Ascending, Descending, Low Crawl, and High Crawl). As a result, the proposed device could recognize a movement status of a solider with 95.16% accuracy in an arbitrary test situation. This research is meaningful since an effective way of motion recognition has been introduced that can be furtherly extended to various military applications by incorporating wearable technology and artificial intelligence.

Microarrays for the Detection of HBV and HDV

  • Sun, Zhaohui;Zheng, Wenling;Zhang, Bao;Shi, Rong;Ma, Wenli
    • BMB Reports
    • /
    • v.37 no.5
    • /
    • pp.546-551
    • /
    • 2004
  • The increasing pace of development in molecular biology during the last decade has had a direct effect on mass testing and diagnostic applications, including blood screening. We report the model Microarray that has been developed for Hepatitis B virus (HBV) and Hepatitis D virus (HDV) detection. The specific primer pairs of PCR were designed using the Primer Premier 5.00 program according to the conserved regions of HBV and HDV. PCR fragments were purified and cloned into pMD18-T vectors. The recombinant plasmids were extracted from positive clones and the target gene fragments were sequenced. The DNA microarray was prepared by robotically spotting PCR products onto the surface of glass slides. Sequences were aligned, and the results obtained showed that the products of PCR amplification were the required specific gene fragments of HBV, and HDV. Samples were labeled by Restriction Display PCR (RD-PCR). Gene chip hybridizing signals showed that the specificity and sensitivity required for HBV and HDV detection were satisfied. Using PCR amplified products to construct gene chips for the simultaneous clinical diagnosis of HBV and HDV resulted in a quick, simple, and effective method. We conclude that the DNA microarray assay system might be useful as a diagnostic technique in the clinical laboratory. Further applications of RD-PCR for the sample labeling could speed up microarray multi-virus detection.

Self-Identification of Boundary's Nodes in Wireless Sensor Networks

  • Moustafa, Kouider Elouahed;Hafid, Haffaf
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.128-140
    • /
    • 2017
  • The wireless sensor networks (WSNs) became a very essential tool in borders and military zones surveillance, for this reason specific applications have been developed. Surveillance is usually accomplished through the deployment of nodes in a random way providing heterogeneous topologies. However, the process of the identification of all nodes located on the network's outer edge is very long and energy-consuming. Before any other activities on such sensitive networks, we have to identify the border nodes by means of specific algorithms. In this paper, a solution is proposed to solve the problem of energy and time consumption in detecting border nodes by means of node selection. This mechanism is designed with several starter nodes in order to reduce time, number of exchanged packets and then, energy consumption. This method consists of three phases: the first one is to detect triggers which serve to start the mechanism of boundary nodes (BNs) detection, the second is to detect the whole border, and the third is to exclude each BN from the routing tables of all its neighbors so that it cannot be used for the routing.