• Title/Summary/Keyword: military applications

Search Result 464, Processing Time 0.022 seconds

Optimal Surveillance Trajectory Planning for Illegal UAV Detection for Group UAV using Particle Swarm Optimization (불법드론 탐지를 위한 PSO 기반 군집드론 최적화 정찰궤적계획)

  • Lim, WonHo;Jeong, HyoungChan;Hu, Teng;Alamgir, Alamgir;Chang, KyungHi
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.5
    • /
    • pp.382-392
    • /
    • 2020
  • The use of unmanned aerial vehicle (UAV) have been regarded as a promising technique in both military and civilian applications. Nevertheless, due to the lack of relevant and regulations and laws, the misuse of illegal drones poses a serious threat to social security. In this paper, aiming at deriving the three-dimension optimal surveillance trajectories for group monitoring drones, we develop a group trajectory planner based on the particle swarm optimization and updating mechanism. Together, to evaluate the trajectories generated by proposed trajectory planner, we propose a group-objectives fitness function in accordance with energy consumption, flight risk. The simulation results validate that the group trajectories generated by proposed trajectory planner can preferentially visit important areas while obtaining low energy consumption and minimum flying risk value in various practical situations.

Qualification Process of T700/701K Engine for KUH (한국형 기동헬기 엔진 (T700/701K) 인증 과정)

  • Jung, Yong-Wun;Kim, Jae-Hwan;Ahn, Iee-Ki
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2011.11a
    • /
    • pp.344-347
    • /
    • 2011
  • This paper presents qualification process of the T700/701K turbo-shaft engine for Korean Utility Helicopter(KUH). The T700/701K is the rear-drive variant of the GE's T700-701C/D engine which was qualified for military applications in the world. The main scope of the development is the modification from a front-drive engine to a rear-drive one, the performance enhancement of the power turbine and the incorporation of two channel FADEC(Full Authority Digital Engine Control) system for more reliable operation. Therefore, T700/701K engine must be qualified by Korean government in order to perform a flight in the country. Reflecting the influence of developing scope, the main requirements including performance and control are verified by test and analysis, while the requirement for module or component that is same to that of T700-701C/D are verified by similarity.

  • PDF

A Multiversion-Based Spatiotemporal Indexing Mechanism for the Efficient Location-based Services (효율적인 위치 기반 서비스를 위한 다중 버전 기반의 시공간 색인 기법)

  • 박현규;손진현;김명호
    • Journal of KIISE:Databases
    • /
    • v.30 no.1
    • /
    • pp.41-51
    • /
    • 2003
  • The spatiotemporal database concerns about the time-varying spatial attributes. One of the important research areas is related to the support of various location-based services in motile communication environments. It is known that database systems may be difficult to manage the accurate geometric locations of moving objects due to their continual changes of locations. However, this requirement is necessary in various spatiotemporal applications including mobile communications, traffic control and military command and control (C2) systems. In this paper we propose the $B^{st}$-tree that utilizes the concept of multi-version B-trees. It provides an indexing method (or the historical and future range query Processing on moving object's trajectories. Also we present a dynamic version management algorithm that determines the appropriate version evolution induced by the mobility patterns to keep the query performance. With experiments we .;hi)w that our indexing approach is a viable alternative in this area.

Trust-Based Filtering of False Data in Wireless Sensor Networks (신뢰도 평가를 통한 무선 센서 네트워크에서의 거짓 데이타 제거)

  • Hur, Jun-Beom;Lee, Youn-Ho;Yoon, Hyun-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.1
    • /
    • pp.76-90
    • /
    • 2008
  • Wireless sensor networks are expected to play a vital role in the upcoming age of ubiquitous computing such as home environmental, industrial, and military applications. Compared with the vivid utilization of the sensor networks, however, security and privacy issues of the sensor networks are still in their infancy because unique challenges of the sensor networks make it difficult to adopt conventional security policies. Especially, node compromise is a critical threat because a compromised node can drain out the finite amount of energy resources in battery-powered sensor networks by launching various insider attacks such as a false data injection. Even cryptographic authentication mechanisms and key management schemes cannot suggest solutions for the real root of the insider attack from a compromised node. In this paper, we propose a novel trust-based secure aggregation scheme which identifies trustworthiness of sensor nodes and filters out false data of compromised nodes to make resilient sensor networks. The proposed scheme suggests a defensible approach against the insider attack beyond conventional cryptographic solutions. The analysis and simulation results show that our aggregation scheme using trust evaluation is more resilient alternative to median.

A Network Time Server using CPS (GPS를 이용한 네트워크 시각 서버)

  • 황소영;유동희
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.5
    • /
    • pp.1004-1009
    • /
    • 2004
  • Precise time synchronization is a main technology in high-speed communications, parallel and distributed processing systems, Internet information industry and electronic commerce. Synchronized clocks are useful for many leasers. Often a distributed system is designed to realize some synchronized behavior, especially in real-time processing in factories, aircraft, space vehicles, and military applications. Nowadays, time synchronization has been compulsory thing as distributed processing and network operations are generalized. A network time server obtains, keeps accurate and precise time by synchronizing its local clock to standard reference time source and distributes time information through standard time synchronization protocol. This paper describes design issues and implementation of a network time server for time synchronization especially based on a clock model. The system uses GPS (Global Positioning System) as a standard reference time source and offers UTC (universal Time coordinated) through NTP (Network Time protocol). Implementation result and performance analysis are also presented.

Implementation of OpenGL SC Emulation Library over OpenGL (OpenGL 상에서 OpenGL SC 에뮬레이션 라이브러리 구현)

  • Baek, Nak-Hoon
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.3
    • /
    • pp.440-448
    • /
    • 2011
  • The needs for the OpenGL-family of the rendering library standards are highly increasing, especially for the graphical human-machine Interface on the various systems including smart phones and personal information devices. Additionally, in the case of safety-critical market for avionics, military, medical and automotive applications, OpenGL SC, the safety critical profile of the OpenGL library plays the major role for the graphical interfaces. In this paper, we represent our OpenGL SC emulation library on the OpenGL 1.x rendering pipeline which is widely available on the existing embedded systems, to provide the features of OpenGL SC standard cost-effectively. Our method can provide the OpenGL SC features at the low development cost on the embedded systems, and its implementation is also one of the fundamental elements for the emulation of embedded systems in the PC environment. Our final result now works on both of Linux-based and VxWORKS systems, showing correct execution results at the reasonable speed.

GPS AOA Choosing Algorithm in Environment of High-Power Interference Signals (고 전력 간섭 환경에서의 GPS AOA 선택 알고리즘)

  • Hwang, Suk-Seung
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.4
    • /
    • pp.649-656
    • /
    • 2012
  • The Global Positioning System (GPS) is widely utilized for commercial and military applications to estimate the location of the user or object. The GPS suffers from various intentional or unintentional interferers and it requires estimating the accurate angle-of-arrival (AOA) of the GPS signal to suppress interference signals and to efficiently detect GPS data. Since the power of GPS signal is very low comparing with the noise and interference signals, it is extremely difficult to estimate GPS AOA before despreading. Although AOA of GPS signal is usually estimated after despreading, it requires choosing the GPS AOA among results of AOA estimation because they include AOAs of interference and GPS signals when existing high-power interferers. In this paper, we propose the efficient choosing algorithm of the GPS signal among the estimated AOAs. The proposed algorithm compares the estimated results before despreading and after despreading for choosing AOA of GPS signal. Computer simulation examples are presented to illustrate the performance of the proposed algorithm.

Development of Security Functional Requirements for Secure-Introduction of Unmanned Aerial Vehicle (무인항공기의 안전한 도입을 위한 보안기능요구사항 개발)

  • Kang, Dongwoo;Won, Dongho;Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.97-105
    • /
    • 2019
  • With the possibility of wireless control of the aircraft by Nicola Tesla, Unmanned Aerial Vehicle(UAV) was mainly used for military and defense purposes with the rapid development through World War I and II. As civilian applications of unmanned aerial vehicles have expanded, they have been used with various services, and attempts have been made to control various environmental changes and risk factors of unmanned aerial vehicles. However, GPS spoofing, Jamming attack and security accidents are occurring due to the communication in the unmaned aerial vehicle system or the security vulnerability of the unmanned aerial vehicle itself. In order to secure introduction of Unmanned aerial vehicle, South Korea has established Unmanned Aerial Vehicle verification system called Airworthiness Certification. However, the existing cerfication system is more focused on test flight, design and structure's safety and reliability. In this paper, we propose a unmanned aerial vehicle system model and propose security functional requirements on unmanned aerial vehicle system in the corresponding system model for secure-introduction of Unmanned Aerial Vehicle. We suggest the development direction of verification technology. From this proposal, future development directions of evaluation and verification technology of Unmanned Aerial Vehicle will be presented.

Design and Implementation of 150W Portable Fuel Cell Power Pack (150W급 휴대용 연료전지 Power Pack 설계 및 제작)

  • Woo, Dong-Gyun;Joo, Dong-Myoung;Kim, Yun-Sung;Oh, Jae-Gi;Lee, Byoung-Kuk
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.17 no.6
    • /
    • pp.553-561
    • /
    • 2012
  • Existing energy sources convert chemical energy into mechanical energy, while fuel cell directly generates electricity through an electrochemical reaction between hydrogen and oxygen. Therefore, it has a lot of strong points such as high efficiency, zero emission, and etc. In addition, with the development of hydrogen preservation technique, some companies have been researching and releasing portable fuel cell power packs for specific applications like military equipment, automobile, and so on. However, there are some drawbacks to the fuel cell, high cost and slow dynamic response. In order to compensate these weak points, auxiliary energy storages could be applied to the fuel cell system. In this paper, the optimum structure for a 150W portable fuel cell power pack with a battery pack is selected considering the specification of the system, and the design process of main parts is described in detail. Here, main objectives are compact size, simple control, high efficiency, and low cost. Then, an automatic mode change algorithm, which converts the operating mode depending on the states of fuel cell stack, battery pack, and load, is introduced. Finally, performance of the designed prototype using the automatic mode change control is verified through experiments.

An Energy-Efficient Access Control Scheme forWireless Sensor Networks based on Elliptic Curve Cryptography

  • Le, Xuan Hung;Lee, Sung-Young;Butun, Ismail;Khalid, Murad;Sankar, Ravi;Kim, Miso Hyoung-Il;Han, Man-Hyung;Lee, Young-Koo;Lee, Hee-Jo
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.599-606
    • /
    • 2009
  • For many mission-critical related wireless sensor network applications such as military and homeland security, user's access restriction is necessary to be enforced by access control mechanisms for different access rights. Public key-based access control schemes are more attractive than symmetric-key based approaches due to high scalability, low memory requirement, easy key-addition/revocation for a new node, and no key predistribution requirement. Although Wang et al. recently introduced a promising access control scheme based on elliptic curve cryptography (ECC), it is still burdensome for sensors and has several security limitations (it does not provide mutual authentication and is strictly vulnerable to denial-of-service (DoS) attacks). This paper presents an energy-efficient access control scheme based on ECC to overcome these problems and more importantly to provide dominant energy-efficiency. Through analysis and simulation based evaluations, we show that the proposed scheme overcomes the security problems and has far better energy-efficiency compared to current scheme proposed byWang et al.