• Title/Summary/Keyword: vehicle attack

Search Result 156, Processing Time 0.025 seconds

Numerical Investigation of Drag and Lift Characteristics of Cavitator of Supercavitating Underwater Vehicle (초공동 수중운동체 캐비테이터의 항력과 양력특성에 관한 수치해석적 연구)

  • Kang, Byung Yun;Jang, Seyeon;Kang, Shin-Hyoung
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.38 no.10
    • /
    • pp.797-805
    • /
    • 2014
  • The purpose of this study was to investigate the drag and lift characteristics of the cavitator of a supercavitating underwater vehicle and the pressure loss due to water intake. These investigations were performed by changing the diameter, velocity, radius of curvature of the intake, and angle of attack of the cavitator. With increasing ratio of the intake diameter to the cavitator diameter ratio($d/D_1$), the drag coefficient and the pressure loss coefficient of the water intake decreased. The greater the increase in the ratio of the intake velocity-to-free stream velocity ratio(S), the smaller was the decrease in the drag coefficient and the lift coefficient. When the intake had a radius of curvature(c), the pressure loss coefficient decreased. On the contrary, the effect of the radius of curvature on the drag coefficient was imperceptible. For angles of attack (${\alpha}$) of the caviatator in the range of $0^{\circ}$ to $10^{\circ}$, the drag coefficient and the pressure loss coefficient changed slightly, whereas the lift coefficient increased linearly with increasing angle of attack.

An Experimental Study for Construction of Aerodynamic Database of the Commercial Propeller (상용 프로펠러 공력 데이터베이스 구축을 위한 실험적 연구)

  • Shim, HoJoon;Kim, Geon-Hong;Cheon, HyeJin
    • Journal of Aerospace System Engineering
    • /
    • v.15 no.5
    • /
    • pp.60-71
    • /
    • 2021
  • Propeller performance measurement system for commercial propeller was designed and applied to the wind tunnel test for 3 commercial propeller models with diameters of 30 inch. The thrust and torque of the propeller was directly measured by using 6-components balance installed on the rotating axis. The measurement system was validated by using wind tunnel balance calibration equipment. Propeller test stand including measurement and rotating system was validated by using QTP propeller. In the hovering condition, we compared the performance test results and the specifications of the commercial propeller provided by the manufacturer and confirmed that there are differences in the thrust and the torque. We measured the propeller performance with various wind speeds, propeller models and angles of attack and was summarized by thrust coefficients. We confirmed that the trend of the thrust coefficients was different in the low angle of attack and high angle of attack. An aerodynamics database that can be used for future aerodynamic design of an unmanned aerial vehicle was secured.

An Intelligent Bluetooth Intrusion Detection System for the Real Time Detection in Electric Vehicle Charging System (전기차 무선 충전 시스템에서 실시간 탐지를 위한 지능형 Bluetooth 침입 탐지 시스템 연구)

  • Yun, Young-Hoon;Kim, Dae-Woon;Choi, Jung-Ahn;Kang, Seung-Ho
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.11-17
    • /
    • 2020
  • With the increase in cases of using Bluetooth devices used in the electric vehicle charging systems, security issues are also raised. Although various technical efforts have beed made to enhance security of bluetooth technology, various attack methods exist. In this paper, we propose an intelligent Bluetooth intrusion detection system based on a well-known machine learning method, Hidden Markov Model, for the purpose of detecting intelligently representative Bluetooth attack methods. The proposed approach combines packet types of H4, which is bluetooth transport layer protocol, and the transport directions of the packet firstly to represent the behavior of current traffic, and uses the temporal deployment of these combined types as the final input features for detecting attacks in real time as well as accurate detection. We construct the experimental environment for the data acquisition and analysis the performance of the proposed system against obtained data set.

Vulnerability Case Analysis of Wireless Moving Vehicle (무선이동체의 취약점 사례 분석)

  • Oh, Sangyun;Hong, Jinkeun
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.8
    • /
    • pp.41-46
    • /
    • 2018
  • As the industry related to drones has been activated, the public interest in drones has increased explosively, and many cases of drone-using are increasing. In the case of military drones, the security problem is the level of defense of the aircraft or cruise missiles, but commercial small and low cost drones are often released and utilized without security count-measure. This makes it possible for an attacker to easily gain access to the root of the drones, access internal files, or send fake packets. However, this droning problem can lead to another dangerous attack. In this regard, this paper has identified the vulnerabilities inherent in the commercial drones by analyzing the attack cases in the communication process of the specific drones. In this paper, we analyze and test the vulnerability in terms of scanning attack, meson attack, authentication revocation attack, packet stop command attack, packet retransmission attack, signal manipulation and de-compile attack. This study is useful for the analysis of drones attack and vulnerability.

Attack Datasets for ROS Intrusion Detection Systems (ROS 침입 탐지 시스템을 위한 공격 데이터셋 구축)

  • Hyunghoon Kim;Seungmin Lee;Jaewoong Heo;Hyo Jin Jo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.681-691
    • /
    • 2024
  • In recent decades, research and development in the field of industrial robotics, such as an unmanned ground vehicle (UGV) and an unmanned aerial vehicle (UAV), has been significant progress. In these advancements, it is important to use middleware, which facilitates communication and data management between different applications, and various industrial communication middleware protocols have been released. The robot operating system (ROS) is the most widely adopted as the main platform for robot system development among the communication middleware protocols. However, the ROS is known to be vulnerable to various cyber attacks, such as eavesdropping on communications and injecting malicious messages, because it was initially designed without security considerations. In response, numerous studies have proposed countermeasures to ROS vulnerabilities. In particular, some work has been proposed on generating ROS datasets for intrusion detection systems (IDS), but there is a lack of research in this area. In this paper, in order to contribute to improving the performance of ROS IDSs, we propose a new type of attack scenario that can occur in the ROS and build ROS attack datasets collected from a real robot system and make it available as an open dataset.

Utilization of wheel derailment test facilities (차륜탈선 시험설비의 활용방안)

  • Ham, Young-Sam;You, Won-Hee
    • Proceedings of the KSR Conference
    • /
    • 2011.05a
    • /
    • pp.1128-1133
    • /
    • 2011
  • This is a testing equipment system to analyze variation of creep force according to wheel-rail tread profile, running speed of vehicle, vertical and lateral force, wheel/rail contact point, attack angle and so on. The creep force affect vehicle derailment, especially climbing derailment. This system is composed of main frame, wheelset and rail disks driver, hydraulic actuator, controller, environmental chamber, safety system and so on.

  • PDF

Optimization Analysis of Trajectory for Re-Entry Vehicle Using Global Orthogonal Polynomial

  • Lee Dae-Woo
    • Journal of Mechanical Science and Technology
    • /
    • v.20 no.10
    • /
    • pp.1557-1566
    • /
    • 2006
  • We present a procedure for the application of global orthogonal polynomial into an atmospheric re-entry maneuvering problem. This trajectory optimization is imbedded in a family of canonically parameterized optimal control problem. The optimal control problem is transcribed to nonlinear programming via global orthogonal polynomial and is solved a sparse nonlinear optimization algorithm. We analyze the optimal trajectories with respect to the performance of re-entry maneuver.

21Century of Combat Aspects of North Korean Attack Drones Through the War of the Century (21세기 전쟁을 통해 본 북한 공격 드론의 전투 양상 전망)

  • Kang-Il Seo;Sang-Keun Cho;Jong-Hoon Kim;Ki-Won Kim;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.299-304
    • /
    • 2023
  • Recently, drones have been used as a major means of attack drones in major wars around the world, and it seems likely that they will evolve into game changers in the future. Recently, drones have been used as a major means of attack drones in major wars around the world, and it seems likely that they will evolve into game changers in the future. In the major wars of the 21century, attack drones are used for precision fire-guided or self-destruct attacks, For the purpose of cognitive warfare, its territory is expanding not only to land and air, but also to sea and water. These attack drones will perform multi-domain operations, and for this purpose, the level of autonomy will be improved and High-Low Mix We will continue to develop by strengthening concept-based scalability. North Korea has also been making considerable efforts to operate attack drones for a long time, and activities such as third-country-level self-explosive drones, artificial intelligence-based clustered self-explosive drones, and self-destructive stealth unmanned semi-submersible are expected. In addition to North Korea's provocations and attacks, it is hoped that there will be a need for active follow-up research on our military's countermeasures and utilization plans.

FLOWING OF THE SYSTEM THE UNDERWATER VEHICLES HULL THE NOZZLE OF PUMP-JET PROPELLER WITH AMOLES OF ATTACK

  • Lee, Kwi-Joo;Nikushchenko, Dmitry V.;Park, Weon-Me
    • Proceedings of the Korea Committee for Ocean Resources and Engineering Conference
    • /
    • 2002.05a
    • /
    • pp.275-280
    • /
    • 2002
  • Results of a numerical simulation of a flowing of the underwater vehicles hull with the pump-jet nozzle are presented. It was calculate velocity distributions and coefficients of the lift force and the longitudinal moment of the hull with the pump-jet nozzle and isolated hull for some values of angle of attack. It was shown that the area of tile influence of the nozzle on the velocities distribution of the hull and character of changing of coefficients of the lift force and the longitudinal moment and their derivatives depending on angle of attack.

  • PDF

A Numerical Study on Real Gas Effect due to High Temperature and Speed Flow (고온 고속유동으로 인한 실제 기체효과의 수치해석적 연구)

  • 송동주
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.18 no.9
    • /
    • pp.2431-2442
    • /
    • 1994
  • In this paper the efficient space marching Viscous Shock Layer and Parabolized Navier-Stokes method have been applied to study the complex 3-D hypersonic equilibrium chemically reacting flowfilelds over sphere-cone($10^{\circ}$) vehicle at low angles of attack($0^{\circ}~5^{\circ}), Mach 20, and an altitude of 35km. The current bluntbody/afterbody space marching numerical method predicts the complex flowfields accurately and efficiently even on a small computer. The shock thickness from equilibrium air model is thinner than that from the perfect gas model. The windside wall heat-transfer rate, pressure and skin friction force were increased significantly when compared with those of leeside. The CA, CN, CM were increased almost linearly with the angle of attack in this region. The wall pressure, heat transfer, skin friction and axial force coeffient from equilibrium model were much higher than those from perfect gas model. The center of pressure moved forward with the increase of angle of attack.