• Title/Summary/Keyword: weapons

Search Result 684, Processing Time 0.029 seconds

What are Technical Hurdles of Verification for North Korea's Nuclear Program?

  • Choi, Sungyeol;Jun, Eunju
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.20 no.1
    • /
    • pp.111-118
    • /
    • 2022
  • The denuclearization of North Korea was unpredictable and resulted in radical changes. Despite the skepticism and disappointment surrounding denuclearization, it is important for certain verification technologies to establish what is technically possible or practically impossible, and how reliable these technical means are. This article presents the technical hurdles in nuclear verification by systematically categorizing them into issues of correctness and completeness. Moreover, it addresses the safety and security risks during the denuclearization process, including the radiological impact on humans, environmental effects, and the illegal transfer of material, information, and technologies.

Microstructure investigation and component analysis of iron weapons found at Hadong-gun, Kyungnam Province (경남 하동군 발견 철제무구류의 금속조직 조사 및 성분분석)

  • Yu, Jae-Eun;Go, Hyeoung-Sun;Hwong, Jin-Ju
    • 보존과학연구
    • /
    • s.21
    • /
    • pp.177-206
    • /
    • 2000
  • In the study of iron artifacts, microstructure investigation is an indispensable step to find out the manufacturing method and skill. The iron weapons that we have excavated and investigated at the ruins of Gohyun Castle site, Hadong-gun, Kyungnam Province are traced to the era of Choson Dynasty. By sampling specimens of some artifacts, we have made microstructure investigation and component analysis of them. For microstructure investigation we used metallographic microscopes, and for component analysis we used the methods of C/S analysis and Inductively coupled plasma emission spectrometry (ICP) analysis which is designed to verify components and contenets of a very small amount elememt. Microstructure of the artifacts is mainly divided into three parts. Inner part is Widmanstatten, a typical overheated structure, upon which we can see another part with fine grains and with extremely small quantities of carbon. And on the surface, there is a carbonized part. When the shape is formed through forging process at a high temperature the carbon content of the surface is getting down and the grains come to be finer. Next, carbonizing process is to be done for hardening the surface, which is followed by cooling process. Cooling rates seem to be different from artifacts to artifacts. All artifacts have clearly distinguishable grain boundaries in their unique structure. Since this kind of structure is rarely found, it seems to offer a clue to find out the manufacturing method. The outcome of component analysis is almost the same with that of microstructure investigation. As is demonstrated by C/S analysis, carbon content is 0.39-1.24% and sulfur is contained 0.0005-0.010%.

  • PDF

Design and Implementation of Surveillance and Combat Robot Using Smart Phone (스마트폰을 이용한 정찰 및 전투 로봇의 설계와 구현)

  • Kim, Do-Hyun;Park, Young-Sik;Kwon, Sung-Gab;Yang, Yeong-Yil
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.48 no.5
    • /
    • pp.93-98
    • /
    • 2011
  • In this paper, we propose the surveillance and combat robot framework for remote monitoring and robot control on the smart phone, which is implemented with the fusion technology called RITS(Robot technology & Information Technology System). In our implemented system, the camera phone mounted on the robot generates signals to control the robot and sends images to the smart phone of the operator. Therefore, we can monitor the surrounding area of the robot with the smart phone. Besides the control of the movement of the robot, we can fire the weapons armed on the robot by sending the fire command. From experimental results, we can conclude that it's possible to control the robot and monitor the surrounding area of the robot and fire the weapons in real time in the region where the 3G(Generation) mobile communication is possible. In addition, we controlled the robot using the 2G mobile communication or wired phone when the robot is in the visual range.

A new method to estimate the striking velocity for small caliber projectiles (소구경 탄자의 충돌속도 추정방법 제안)

  • Yoo, Sangjun;Kim, Jeyong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.3
    • /
    • pp.1288-1293
    • /
    • 2014
  • This paper proposes a new method to estimate the striking velocity for ballistic limit velocity in MIL-STD-662F. The method from MIL-STD-662F needs relative air density, drag coefficient, form factor, ballistic coefficient for estimating striking velocity. So precedent studies are essential. However, the new method can estimate striking velocity only using measured velocities and distance between the screen and the target. To prove new method, we compared estimation of striking velocity from both the new method and the method from MIL-STD-662F on the basis of datain PRODAS. The new method shows bigger errors in some velocity ranges. But it could still calculate ballistic limit velocity. It also shows smaller errors in most velocity ranges.

A Study on the Measures against Suicide Terrorism (자살테러에 대한 대책 연구)

  • Choi, Jin-Tai
    • Journal of the Society of Disaster Information
    • /
    • v.2 no.1
    • /
    • pp.139-155
    • /
    • 2006
  • Over the past two decades suicide terrorism has become an ever-widening phenomenon. When suicide terrorism was first introduced in the Middle East it seemed that this new phenomenon was invincible and that it might change the innate imbalance between terror groups and their rivalry governments. This did not in fact occur. Looking at history of terrorism, it can be seen that suicide attacks are in actuality a very old modus operandi. However, contemporary suicide terrorism differs from such historical tactics, just as the whole phenomenon of terrorism differs from ancient modes of warfare. Modern suicide terrorism is aimed at causing devastating physical damage. through which it inflicts profound fear and anxiety. Its goal is to produce a negative psychological effect on an entire population rather than just the victims of the actual attack. The relatively high number of casualties guaranteed in such attacks, which are usually carried out in crowded areas, ensures full media coverage. Thus, suicide terrorism, ranks with other spectacular modus operandi such as blowing up airplanes in mid air or the use of Weapons of Mass Destruction as a sure means to win maximum effect. For the purposes of this paper a suicide terror attack is defined as a politically motivated violent attack perpetrated by a self-aware individual (or individuals) who actively and purposely causes his own death through blowing himself up along with his chosen target. The perpetrator's ensured death is a precondition for the success of his mission. The greatest potential risk suicide terrorism may pose in future is if terrorists carry out operations combined with other spectacular tactics such as blowing up airplanes or the use of Weapons of Mass Destruction. Such a combination will increase immensely the death toll of a single terror attack and will have a shocking psychological effect on public moral. At this level suicide terrorism would constitute a genuine strategic threat and would probably be confronted as such. This study portrays a general overview of the modern history of suicide terror activity worldwide, focusing on its main characteristics and the various aims and motivations of the terror groups involved. In addition, This study provides an overview what is to be done to prevent such terrorist attacks.

  • PDF

A Study on the Planning of Civil Defense Shelter and Design 3 - Focusing on Considerations Related to Military Threat - (민방위 대피시설 계획 및 설계 방안에 관한 연구 3 - 군사위협에 따른 고려 요소를 중심으로 -)

  • Park, Namkwun
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.1
    • /
    • pp.97-106
    • /
    • 2015
  • Currently, South Korea is exposed to various attacks of North Korea such as traditional, nuclear, and ABC weapons. Now it is hard to make an accurate estimate the damage may have been occurred to citizens due to those attacks. It is only possible to assume the rough outline. As a countermeasure to such military threats of North Korea, government-aided evacuation facilities services are going along across the board concerning the object, installation range, budget, and drawing standards. Whereas, in case of public evacuation facilities, there is no special regulation or principle in designation. Since various facilities are regarded as applicable, any protection against military threats can't be anticipated. In this study, military threats provoked by North Korea are figured out, thus the problem of plan and design that public evacuation facilities have are pointed out. This study suggest the result and proposal.

An improvement method of weapon system software standards material quality using virtualization technology (가상화 기술을 활용한 무기체계 소프트웨어 규격자료 품질향상 방안 연구)

  • Choi, Minkwan;Kook, Seunghak;Lee, Taeho
    • Journal of Software Engineering Society
    • /
    • v.29 no.1
    • /
    • pp.1-6
    • /
    • 2020
  • Recently, software has taken up an increasing share of the weapons system. The software development environment is also becoming very diverse. In the field of weapons software, software technical documents, source codes, and execution files are standardized as defense standards material. Through defense standards, the software file lists and development environments for creating software execution files are required to be documented. However, additional efforts to rebuild the software development environment are needed to recreate the software execution file based on defense standards material after the end of R&D. Therefore, in this study, we propose an improvement method for the quality of software standards material using virtualization technology. This is expected to reduce efforts to rebuild the software development environment and solve problems caused by discontinuation of the development environment.

Development of Timely Counter-scenario on Small Scale Engagements (소규모 교전에서의 적시 대응 시나리오 개발 방안 연구)

  • Ahn, Euikoog;Chang, Dae S.;Pyun, JaiJeong;Kwon, Yongjin James;Park, Sang C.
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.2
    • /
    • pp.63-71
    • /
    • 2013
  • Developing future weapons systems has become increasingly complicated and costly. There, modeling and simulation techniques have been highly interested in developing the defense systems. Modeling and simulation techniques provide a means to simulate military training, strategies, military doctrines, and weapons acquisition. In this paper, we proposed a small scale engagement scenario generation method for engagement M&S model. Generated scenario is one of critical factors in the field of commander training, operational analysis, and tactical evaluation. The objective of this paper is to develop a scenario generation method for small scale engagement using the FSA(Finite State Automata) and DFS(Depth First Search) algorithm. The proposed method is verified using a one-on-one combat engagement scenario between assault ship and reconnaissance ship. Also, we are visualized using Delta3D$^{TM}$.

Hit Rate Prediction Algorithm for Laser Guided Bombs Using Image Processing (영상처리 기술을 활용한 레이저 유도폭탄 명중률 예측 알고리즘)

  • Ahn, Younghwan;Lee, Sanghoon
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.3
    • /
    • pp.247-256
    • /
    • 2015
  • Since the Gulf War, air power has played a key role. However, the effect of high-tech weapons, such as laser-guided bombs and electronic optical equipment, drops significantly if they do not match the weather conditions. So, aircraft that are assigned to carry laser-guided bombs must replace these munitions during bad weather conditions. But, there are no objective criteria for when weapons should be replaced. Therefore, in this paper, we propose an algorithm to predict the hit rate of laser-guided bombs using cloud image processing. In order to verify the accuracy of the algorithm, we applied the weather conditions that may affect laser-guided bombs to simulated flight equipment and executed simulated weapon release, then collected and analyzed data. Cloud images appropriate to the weather conditions were developed, and applied to the algorithm. We confirmed that the algorithm can accurately predict the hit rate of laser-guided bombs in most weather conditions.