Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Military Science and Technology
Journal Basic Information
Journal DOI :
The Korea Institute of Military Science and Technology
Editor in Chief :
Volume & Issues
Volume 11, Issue 6 - Dec 2008
Volume 11, Issue 5 - Oct 2008
Volume 11, Issue 4 - Aug 2008
Volume 11, Issue 3 - Jun 2008
Volume 11, Issue 2 - Apr 2008
Volume 11, Issue 1 - Feb 2008
Selecting the target year
A Study on Operational Concept of Military Guard and Surveillance Robots
Seo, Dong-Cheul ; Lee, Woo-Chan ; Hwang, Chun-Sik ;
Journal of the Korea Institute of Military Science and Technology, volume 11, issue 1, 2008, Pages 5~14
In this paper, we propose operational concepts and technology requirements for guard and surveillance robots in military field. After surveying on current trend of guard robots, we present an operational scenario and technology requirements. To begin with, we discriminate the use of fixed type guard robots(fixed robots) and mobile guard and surveillance robots(mobile robots). Fixed robots are used for substituting daily guard by human soldier. In contrast, mobile robots are used for compensating shadow area where not to be covered by fixed type robots. To be specific, mobile robots adopt communication relays to extend operational range and sensor networks to collecting information. In addition, we present technology requirements composed of wireless communication system, platform, sensor nodes, unmanned driving technology, power supply system and IFF etc. In conclusion, in order to maximize co-operational functionality, fixed robots and mobile robots should be tightly related.
1-hop Data Traffic Reduction Method in Tactical Wireless Mobile Ad-Hoc Network based on MIL-STD-188-220C
You, Ji-Sang ;
Journal of the Korea Institute of Military Science and Technology, volume 11, issue 1, 2008, Pages 15~24
The data delivery confirmation method of MIL-STD-188-220C, which is a tactical wireless mobile Ad-Hoc communication protocol, is that a source node requires the end-to-end ack from all destination nodes and the data-link ack from 1-hop neighboring destination nodes and relaying nodes, regardless of the hop distance from a source node to destination nodes. This method has the problem to degrade the whole communication network performance because of excessive data traffic due to the duplicate use of end-to-end ack and data-link ack, and the collision among end-to-end acks on the wireless network in the case of confirming a data delivery within an 1-hop distance. In order to solve this problem, this paper has proposed the method to perform the data delivery confirmation with the improvement of communication network performance through the data traffic reduction by achieving the reliable data delivery confirmation requiring the only data-link ack within an 1-hop distance. The effects of the proposed method are analyzed in the two aspects of the data delivery confirmation delay time and the data delivery confirmation success ratio.
An Analysis for Efficient Appliance of TDL Protocol and IP on Link-K System
Jee, Seung-Bae ;
Journal of the Korea Institute of Military Science and Technology, volume 11, issue 1, 2008, Pages 25~32
In this paper, we propose how to efficiently apply IP and TDL(Tactical Datalink) protocol to the Link-K network for using their applications on the host system. We classify 3 kinds of communication method between IP network and TDL network. We explain the concepts of Like-to-Like communication (Link-K over IP, IP over Link-K) and Any-to-Any communication. We describe the characteristics and the implementation range of tactical datalink processor for each communication method.
A Study on the Defense Standardization Policy Roadmap
Kim, Jin-Chul ; Choi, Seok-Cheol ;
Journal of the Korea Institute of Military Science and Technology, volume 11, issue 1, 2008, Pages 33~42
Many advanced countries including the U.S. consider defense standardization as a critical task for the efficient acquisition and effective operation of weapon systems and have implemented the appropriate standardization policy by synchronizing the defense acquisition strategies and nation standardization policy with defense standardization. It is required to develop the long-term defense standardization policy that can cope with the future domestic and international defense environmental changes. Therefore, it is an inevitable task to investigate the standardization trends and strategy in the domestic and international perspectives. The study aims to provide the vision of defense standardization policy, act/regulation, organization/personnel, education/training and information system.
A Study on Simulation-Based Worm Damage Assessment on ATCIS
Kim, Ki-Hwan ; Kim, Wan-Ju ; Lee, Soo-Jin ;
Journal of the Korea Institute of Military Science and Technology, volume 11, issue 1, 2008, Pages 43~50
The army developed the ATCIS(Army Tactical Command Information System) for the battlefield information system with share the command control information through the realtime. The using the public key and the encryption equipment in the ATCIS is enough to the confidentiality, integrity. But, it is vulnerable about the availability with the zero day attack. In this paper, we implement the worm propagation simulation on the ATCIS infrastructure through the modelling on the ATCIS operation environment. We propose the countermeasures based on the results from the simulation.
Improving Flexibility of External Data Exchange in Count-fire Operation System by Adapting Dynamic Parser Software
Hong, Won-Eui ;
Journal of the Korea Institute of Military Science and Technology, volume 11, issue 1, 2008, Pages 51~56
The counter-fire operation system performs its mission exchanging information with other related systems such as command & control systems and military information systems. In the process of exchanging information, the counter-fire operation system uses a type of data message which contains exchange data information in the format of KMTF. The requirement of data exchange of count-fire operation will continue to evolve. But the EDX(External Data eXchange) configuration item of the current counter-fire operation system can not effectively cope with the variation of data exchange requirements due to its fixed software structure. In the paper, a solution for improving flexibility of external data exchange in counter-fire operation system is proposed.
3-D Finite Element Analysis of Superplastic Forming/Diffusion Bonding Processes with Consideration of Contact between Deformable Bodies
Kang, Yung-Kil ; Song, Jae-Sun ; Hong, Sung-Suk ; Kim, Yong-Hwan ;
Journal of the Korea Institute of Military Science and Technology, volume 11, issue 1, 2008, Pages 57~65
Superplastic forming/diffusion bonding(SPF/DB) processes with inner contact were analyzed using a 3-D rigid visco-plastic finite element method. A constant-triangular element based on membrane approximation and an incremental theory of plasticity are employed for the formulation. The hierarchical search algorithm for the contact searching has been applied. The algorithms for contact force processing were designed to handle equally well contact between deformable bodies, as well as rigid bodies. The plate of three and four sheets for 3-D SPF/DB model are analyzed using the developed program. The validity for the analysis is verified by comparison between analysis, experiment and results in the literature.
Scale Invariant Target Detection using the Laplacian Scale-Space with Adaptive Threshold
Kim, Sung-Ho ; Yang, Yu-Kyung ;
Journal of the Korea Institute of Military Science and Technology, volume 11, issue 1, 2008, Pages 66~74
This paper presents a new small target detection method using scale invariant feature. Detecting small targets whose sizes are varying is very important to automatic target detection. Scale invariant feature using the Laplacian scale-space can detect different sizes of targets robustly compared to the conventional spatial filtering methods with fixed kernel size. Additionally, scale-reflected adaptive thresholding can reduce many false alarms. Experimental results with real IR images show the robustness of the proposed target detection in real world.
Reliable Measurement Selection for The Small Target Detection and Tracking in The IR Scanning Images
Yang, Yu-Kyung ; Kim, Sung-Ho ;
Journal of the Korea Institute of Military Science and Technology, volume 11, issue 1, 2008, Pages 75~84
A new automatic small target detection and tracking algorithm for the real-time IR surveillance system is presented. The automatic target detection and tracking algorithm of the real-time systems, requires low complexity and robust tracking performance in the cluttered environment. Linear-array and parallel-scan IR systems usually suffer from severe scan noise caused by the detector non-uniformity. After the spatial filtering and thresholding, this scan noise still remains as high amplitude clutter which degrades the target detection rate and tracking performance. In this paper, we propose a new feature which consists of area and validity information of a measurement. By adopting this feature to the measurements selection and track confirmation, we can increase the target detection rate and reduce both the track loss rate and false track rate. From the experimental results, we can validate the feasibility of the proposed method in the noisy IR images.
A Survey on Track Fusion for Radar Target Tracking
Choi, Won-Yong ; Hong, Sun-Mog ; Lee, Dong-Gwan ; Jung, Jae-Kyung ;
Journal of the Korea Institute of Military Science and Technology, volume 11, issue 1, 2008, Pages 85~92
An architecture for multiple radar tracking systems can be broadly categorized according to the methods in which the tracking functions are performed : central-level tracking and distributed tracking. In the central-level tracking, target tracking is performed using observations from all radar systems. This architecture provides optimal solution to target tracking. In distributed tracking, tracking is performed at each radar system and the composite track information is formed through track fusion integrating multiple radar-level tracks. Track-to-track fusion and track-to-track association are required to perform in this architecture. In this paper, issues and recent research on the two tracking architectures are surveyed.
Threat Decision Algorithm of Missile Warning Radar Using Azimuth Angular Rate
Ha, Jong-Soo ;
Journal of the Korea Institute of Military Science and Technology, volume 11, issue 1, 2008, Pages 93~101
It is difficult for a MWR(Missile Warning Radar) to perform a threat decision accurately since there is no tracking part which gives more accurate threat information to the MWR. In this paper, the threat decision algorithm is proposed using an azimuth angular rate to improve the accuracy. The azimuth angular rate is dependent upon the direction of an approaching target. The target is classified into a threat or non-threat using a boundary condition of the azimuth angular rate. The boundary condition is determined using the Monte-Carlo simulation. The performance of the proposed algorithm is evaluated using this condition at field tests of MWR. The efficiency of the proposed method for the threat decision is proved by comparing the results of field tests with the simulation results.
A Study on the Basic Model for Simulating Performance of Thermal-Batteries
Ji, Hyun-Jin ;
Journal of the Korea Institute of Military Science and Technology, volume 11, issue 1, 2008, Pages 102~111
This paper describes the basic model and simulation results of thermal battery. Voltage and thermal analysis is a critical part of thermal-battery design because of the need to maintain the inner temperature above the electrolyte melting point. Traditionally, battery design has depended on an empirical approach, in which prototype batteries are outfitted with thermocouples and the design of subsequent batteries is refined accordingly. We have developed the basic model that allows the design engineer to configure or modify a battery, quickly conduct a thermal analysis, and efficiently review the results. Based on performance tests, the thermal-battery model was established and the effect of design parameters on battery performance was analyzed.