17 research outputs found

    A Study on Target Echo Analysis and Target State Estimation for an Active SONAR

    Get PDF
    In order to develope underwater guidance weapon system with an excellent detection performance, precise analysis and modeling on underwater acoustic environment and target echo must be precede. Performance prediction and optimization of detection parameters can be possible by simulation based on a precise modeling. A study on underwater acoustic environment and target echo is performed by both the numerical modeling method based on theory and the analytical method based on analyzing the acoustic data acquired on laboratory and sea test. Experiment for such an acoustic approach can be classified into scaled target experiment and sea experiment. Data acquisition by means of a scaled target experiment can be performed using smaller budget and less effect comparing with a sea experiment. Also, a scaled target experiment has merits on precise controlling of target aspect and acquisiting of target echo with good signal to noise ratio. This experiment is necessary to clarify the relationship between target echo and transmitting pulse such as coating effect and inner structure effect of a target, and designing transmitting pulse depending on a target. Data acquisition in the state of precise target aspect makes a study on target echo possible. This paper is important on the fact that two major research topics in the field of target acoustic, target echo modelling(forward model) and target state estimation technique(inverse model), are developed and verified. Target echo modeling simulates target echo using the selected model parameters, and is a kind of forward modeling. On the other hand, TSE technique estimates important target parameters using the recoded target echo, and is a kind of inverse or parameter estimation technique. A study on target echo analysis classifies target echo into 4 components based on outer and inner structure such as specular reflection, acoustic diffraction, elastic scattering, and multiple scattering. Through the theoretical studies, these 4 components are separated into moving HL and fixed HL depending on each characteristics, and are applied to target echo model. Also, using the developed HL resolving algorithm, target highlight position is precisely estimated and theory is verified by resolving target echo into each component using the data, recoded on scaled target experiment. Target echo model developed through theoretical study and verification improve reliance of simulation used in developing underwater guidance weapon system. For verification of the TSE algorithm, we analyze the errors of TSE using the target echo model as a function of target aspect angle and resolution. Based on the analysis of TSE error, we gave a limitation of the algorithm. The second topic of this paper is result on selecting SONAR designing parameters which maximize SONAR performance. Detecting performance of a SONAR priority determined by hardware performance such as transmitting power, beam pattern, and receiving sensitivity. However, the components, next predetermined hardware, which determine the detecting performance are SONAR operating and detecting parameter. Primarily, target strength is the most important parameter among target detecting parameters. In the case of studying target characteristics, this parameter easily considered as depending on target itself. On other hand, in the side of active SONAR detecting performance, this parameter varies on the transmitting pulse length, pulse type, and detection algorithm. Conditions to improve target strength are studied. Next, TSE algorithm is to resolve highlights and to estimate spatial position of each highlight. In this case, the temporal resolution becomes important performance. In this algorithm, signal is processed using the matched filter. HL resolution(temporal resolution) of this algorithm is proposed and verified using result, from simulated signal and scaled target experiment. Also, the fact, that HL resolution changes according to the degree of window overlapping which is decided by hardware computing speed, is verified. HL resolution of a system can be estimated using two resolution limitsresolution limits by algorithm and computing speed. In the last, the concept of processing gain, which is algorithm effect in SONAR equation used to estimate SONAR performance, is proposed and computed. Processing gain is estimated using signal model and is varied with the degree of window overlapping which decided by hardware computing speed. Processing gain can be obtained maximum 18dB by using a matched filter, and can be minus depending on the degree of window overlapping and the time of target echo. The listed results of this paper can be applied to TSE algorithm and ACCM logic for an underwater guidance weapon system. In the future, these results can be applied to techniques for target identification, anti-torpedo torpedo, and stealth as a core technique.Abstract i ๋ชฉ์ฐจ iv List of Figures vii List of Tables xiii List of Abbreviations xiv 1. ์„œ ๋ก  1 1.1 ํ‘œ์  ์Œํ–ฅ ์—ฐ๊ตฌ ๊ฐœ์š” 1 1.2 ์ถ•์†Œ ํ‘œ์ ์‹œํ—˜ ๋ฐ ์—ฐ๊ตฌ์˜ ํ•„์š”์„ฑ 4 1.3 ์—ฐ๊ตฌ ๋™ํ–ฅ 5 1.4 ์—ฐ๊ตฌ ๋‚ด์šฉ 6 2. ํ‘œ์ ์˜ ๋ฐ˜ํ–ฅ์Œ ์ด๋ก  8 2.1 ์Œํ–ฅ์‚ฐ๋ž€์˜์—ญ์— ๋Œ€ํ•œ ์‚ฐ๋ž€์ด๋ก  8 2.2 ํ‘œ์ ์˜ ๋ฐ˜ํ–ฅ์Œ 9 2.3 ํ‘œ์ ์˜ ๋ฐ˜ํ–ฅ์Œ ์„ฑ๋ถ„ 10 2.3.1 ๊ฑฐ์šธ๋ฉด ๋ฐ˜์‚ฌ 10 2.3.2 ์Œํ–ฅ ํšŒ์ ˆ 16 2.3.3 ํƒ„์„ฑ ์‚ฐ๋ž€ 15 2.3.4 ๋‹ค์ค‘ ์‚ฐ๋ž€ 18 2.4 ํ‘œ์  ๋ฐ˜ํ–ฅ์Œ ํ•ฉ์„ฑ 21 3. ํ‘œ์ ์˜ ์ƒํƒœ ์ถ”์ • ์ด๋ก  23 3.1 ํ‘œ์ ์˜ ์ƒํƒœ ์ถ”์ • 23 3.2 ์ •ํ•ฉ ํ•„ํ„ฐ 24 3.2.1 CW ์‹ ํ˜ธ์— ๋Œ€ํ•œ ๋ชจํ˜ธํ•จ์ˆ˜ 27 3.2.2 LFM ์‹ ํ˜ธ์— ๋Œ€ํ•œ ๋ชจํ˜ธํ•จ์ˆ˜ 29 3.3 ๋ฐฉ์œ„ ์ถ”์ • 31 3.4 ๊ณต๋ณ€ ํ–‰๋ ฌ์„ ์ด์šฉํ•œ ํ‘œ์ ์˜ ์ƒํƒœ ์ถ”์ • 35 3.5 HL๋ฅผ ์ด์šฉํ•œ ํ‘œ์  ์ƒํƒœ ์ถ”์ •์‹œ ์˜ค์ฐจ ๋ฐœ์ƒ ์š”์†Œ 36 4. ์ถ•์†Œ ํ‘œ์  ์‹œํ—˜ ๋ฐ ๊ฒฐ๊ณผ ๋ถ„์„ 38 4.1 ์ถ•์†Œ ํ‘œ์  ์‹œํ—˜ 38 4.1.1 ์ถ•์†Œํ‘œ์  ์‹œํ—˜ ์žฅ๋น„ 38 4.1.2 ์ถ•์†Œํ‘œ์  ์‹œํ—˜ ๋‚ด์šฉ 47 4.2 ์ถ•์†Œ ํ‘œ์  ์‹œํ—˜ ๊ฒฐ๊ณผ๋ฅผ ์ด์šฉํ•œ ๋ฐ˜ํ–ฅ์Œ ๋ถ„์„ 48 4.2.1 CW ์‹ ํ˜ธ๋ฅผ ์ด์šฉํ•œ ๋ฐ˜ํ–ฅ์Œ ๋ถ„์„ 48 4.2.2 LFM ์‹ ํ˜ธ ๋ถ„์„ ํ”„๋กœ๊ทธ๋žจ 53 4.2.3 LFM ์‹ ํ˜ธ๋ฅผ ์ด์šฉํ•œ ๋ฐ˜ํ–ฅ์Œ ๋ถ„์„ 55 4.3 ์ถ•์†Œ ํ‘œ์  ์‹œํ—˜์„ ์ด์šฉํ•œ ํ‘œ์ ์˜ ์ƒํƒœ ์ถ”์ • 62 4.3.1 ํ‘œ์ ์˜ ์ƒํƒœ ์ถ”์ • ๊ฒฐ๊ณผ 62 4.3.2 ๋ถ„ํ•ด๋Šฅ์— ๋”ฐ๋ฅธ ํ‘œ์ ์˜ ์ƒํƒœ ์ถ”์ • ๊ฒฐ๊ณผ 69 5. ์†Œ๋‚˜์˜ ์„ฑ๋Šฅ ํ–ฅ์ƒ์„ ์œ„ํ•œ ๋ณ€์ˆ˜ ์„ค์ • 72 5.1 ํ‘œ์  ๊ฐ•๋„์— ๋”ฐ๋ฅธ ํŽ„์Šค ๊ธธ์ด ์„ค๊ณ„ 72 5.1.1 ํ‘œ์ ๊ฐ•๋„ 72 5.1.2 ์ถ•์†Œํ‘œ์ ์˜ ํ‘œ์ ๊ฐ•๋„ ์ธก์ • 78 5.2 HL ๋ถ„ํ•ด๋Šฅ 81 5.2.1 TSE ์•Œ๊ณ ๋ฆฌ์ฆ˜ ๋ถ„ํ•ด๋Šฅ์˜ ์ด๋ก ์  ํ•œ๊ณ„ 81 5.2.2 ์ถ•์†Œํ‘œ์ ์‹ ํ˜ธ์— ๋Œ€ํ•œ ๋ถ„ํ•ด๋Šฅ 85 5.2.3 ์œˆ๋„์šฐ ๊ฒน์นจ์— ๋”ฐ๋ฅธ ๋ถ„ํ•ด๋Šฅ 92 5.3 ์ •ํ•ฉ ํ•„ํ„ฐ์˜ ์—ฐ์‚ฐ ์ด๋“ 94 5.3.1 ์—ฐ์‚ฐ์ด๋“ ์ •์˜ 94 5.3.2 ์‹ ํ˜ธ ๋ชจ๋ธ ๋ฐ ์‹œ๋ฎฌ๋ ˆ์ด์…˜ ๊ฒฐ๊ณผ 96 5.3.3 ์œˆ๋„์šฐ ๊ฒน์นจ์— ๋”ฐ๋ฅธ ์—ฐ์‚ฐ์ด๋“์˜ ๋ณ€ํ™” 97 6. ๊ฒฐ๋ก  103 6.1 ํ‘œ์  ๋ฐ˜ํ–ฅ์Œ ์—ฐ๊ตฌ ๋ฐ ํ‘œ์  ์ƒํƒœ ์ถ”์ • 103 6.2 ์†Œ๋‚˜ ์„ฑ๋Šฅ ํ–ฅ์ƒ์„ ์œ„ํ•œ ๋ณ€์ˆ˜ ์„ค์ • 104 7. ์ฐธ๊ณ  ๋ฌธํ—Œ 106 ๋ถ€๋ก 1. ํ‘œ์  ํ˜•์ƒ์— ์˜ํ•œ ํ‘œ์  ๋ฐ˜์‚ฌ ๊ณ„์ˆ˜ 110 ๋ถ€๋ก 2. LFM ์‹ ํ˜ธ์˜ ์‹œ๊ฐ„ ํ•จ์ˆ˜ 114 ๋ถ€๋ก 3. ํ‘œ์  ์ข…๋ฅ˜์— ๋Œ€ํ•œ CW ์‹ ํ˜ธ ๋ถ„์„ ๊ทธ๋ฆผ 116 ๋ถ€๋ก 4. ์—ฐ์‚ฐ์ด๋“์ด ํฌํ•จ๋œ ์†Œ๋‚˜๋ฐฉ์ •์‹ 12

    ์ด๋™์ด‰์ง„ ์ฆ์ฐฉ๋ฐฉ๋ฒ•์œผ๋กœ ์„ฑ์žฅํ•œ ์–‘์ž์ค„์˜ ์ž๊ธฐ๊ด‘ํ•™์ ์ธ ํŠน์„ฑ ๋ถ„์„

    No full text
    Thesis (doctoral)--์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› :๋ฌผ๋ฆฌํ•™๊ณผ,1998.Docto

    ADH1 ํ”„๋กœ๋ชจํ„ฐ์™€ STA ๋ถ„๋น„์„œ์—ด์„ ์ด์šฉํ•œ glucanase์˜ ํšจ๋ชจ์—์„œ์˜ ๋ฐœํ˜„๊ณผ ๋ถ„๋น„ ์—ฐ๊ตฌ

    No full text
    Thesis (master`s)--์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› :ํ™”ํ•™๊ณตํ•™๊ณผ,1996.Maste

    ๋น„๋งŒ, ๋‹น๋‡จ๋ณ‘ ๊ทธ๋ฆฌ๊ณ  ์ง€๋ฐฉ๊ฐ„ ๊ฐœ์„ ์— ์žˆ์–ด์„œ ๋ฒ ๋ฅด๋ฒ ๋ฆฐ์˜ ์ž‘์šฉ๊ธฐ์ „์— ๊ด€ํ•œ ์—ฐ๊ตฌ

    No full text
    Thesis(doctors) --์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› :์ƒ๋ช…๊ณผํ•™๋ถ€,2009.8.Docto

    5G Cybersecurity Strategy of Europe: the Huawei Case

    No full text
    ํ•™์œ„๋…ผ๋ฌธ(์„์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต๋Œ€ํ•™์› : ์‚ฌํšŒ๊ณผํ•™๋Œ€ํ•™ ์ •์น˜์™ธ๊ตํ•™๋ถ€(์™ธ๊ตํ•™์ „๊ณต), 2023. 2. ๊น€์ƒ๋ฐฐ.๋ฏธ์ค‘(็พŽไธญ)๊ณผ ์„ธ๊ณ„ ๊ฐ๊ตญ์€ 5G ๊ธฐ์ˆ ์˜ ์ „๋žต์  ์ค‘์š”์„ฑ์„ ์ธ์ง€ํ•˜๊ณ , ์˜ํ–ฅ๋ ฅ์„ ํ™•๋ณดํ•˜๊ธฐ ์œ„ํ•ด ๊ฐ์ถ•์„ ๋ฒŒ์˜€๋‹ค. ํŠนํžˆ, ์ด ๊ธฐ์ˆ ์— ๋Œ€ํ•œ ์šฐ์œ„์˜ ํ™•๋ณด๋ฅผ ๋‘๊ณ  ๋ฒŒ์–ด์ง„ ํ™”์›จ์ด ์‚ฌํƒœ๋Š” ๊ธฐ์ˆ ์˜ ๋ฌธ์ œ๊ฐ€ ์•ˆ๋ณด์˜ ๋ฌธ์ œ๋กœ ๊ฑฐ๋“ญ๋‚˜๊ฒŒ ๋œ ๋Œ€ํ‘œ์ ์ธ ์‚ฌ๋ก€๋ผ๊ณ  ํ•  ์ˆ˜ ์žˆ๋‹ค. ์œ ๋Ÿฝ์—ฐํ•ฉ์˜ ๊ฒฝ์šฐ ์ดˆ๊ธฐ ํ™”์›จ์ด์— ์šฐํ˜ธ์ ์ด์—ˆ๊ณ , ํšŒ์›๊ตญ๋“ค๋„ 5G ์žฅ๋น„ ๋„์ž…๊ณผ ๊ด€๋ จํ•˜์—ฌ ์œ ๋ณด์  ๋‚ด์ง€๋Š” ํ—ˆ์šฉ์  ํƒœ๋„๋ฅผ ๋ณด์˜€๋‹ค. ๊ทธ๋Ÿฌ๋‚˜, ์ดํ›„ ์œ ๋Ÿฝ์—ฐํ•ฉ์€ ํ‰๊ฐ€์— ์˜ํ•œ ๋ฐฐ์ œ์ „๋žต์ธ 5G ํˆด๋ฐ•์Šค ๊ฐ€์ด๋“œ๋ผ์ธ์„ ๋ฐœํ‘œํ•˜๊ณ  ํšŒ์›๊ตญ๋“ค์— ๋„์ž…์„ ๊ถŒ๊ณ ํ–ˆ๊ณ , ํ”„๋ž‘์Šค์™€ ๋…์ผ๋„ ๊ฐ๊ฐ 2019-810๋ฒ•๊ณผ IT๋ณด์•ˆ๋ฒ•2.0์„ ํ†ต๊ณผ์‹œํ‚ค๋ฉด์„œ ์ž๊ตญ ๋„คํŠธ์›Œํฌ์—์„œ ํ™”์›จ์ด ์žฅ๋น„๋ฅผ ์ œ๊ฑฐํ•˜๊ธฐ ์œ„ํ•œ ์›€์ง์ž„์„ ๋ณด์˜€๋‹ค. ๋ณธ ๋…ผ๋ฌธ์€ ํ™”์›จ์ด ์‚ฌํƒœ ์ด์ต, ๊ด€๋…, ์ œ๋„ ๋ณ€์ˆ˜๊ฐ€ ์œ ๋Ÿฝ์—ฐํ•ฉ๊ณผ ํ”„๋ž‘์Šค, ๋…์ผ์˜ ํ™”์›จ์ด ๋ฐฐ์ œ ์ „๋žต์˜ ํ˜•์„ฑ์— ๋ฏธ์นœ ์˜ํ–ฅ์„ ๊ตฌ์„ฑ์  ์ œ๋„์ฃผ์˜์˜ ์ด๋ก  ํ‹€์„ ํ†ตํ•ด ์„ค๋ช…ํ•˜์˜€๋‹ค. ํŠนํžˆ, ๊ฒฝ์ œ์  ๊ธฐํšŒ์™€ ์•ˆ๋ณด์  ๋ฆฌ์Šคํฌ ๊ฐ„ ์„ ํƒ์˜ ๋ฌธ์ œ์—์„œ ๊ทœ๋ฒ”์„ ์ค‘์š”์‹œํ•˜๋Š” ์œ ๋Ÿฝ์—ฐํ•ฉ๊ณผ ํ”„๋ž‘์Šค, ๋…์ผ์—๊ฒŒ ์ค‘๊ตญ์— ๋Œ€ํ•œ ์œ„ํ˜‘์ธ์‹์œผ๋กœ ๋Œ€ํ‘œ๋˜๋Š” ๊ด€๋… ์š”์ธ์ด ํ™”์›จ์ด ๋ฐฐ์ œ ์กฐ์น˜์— ๋ฏธ์นœ ์˜ํ–ฅ์„ ํƒ๊ตฌํ•˜๊ณ , ์ •๋ณดํ˜‘๋ ฅ์„ ๋‘๊ณ  ํŽผ์ณ์ง„ ๋ฏธ๊ตญ์˜ ์••๋ฐ•๊ณผ ์ค‘๊ตญ๊ณผ ํ™”์›จ์ด๊ฐ€ ์ œ๊ณตํ•˜๋Š” ๊ฒฝ์ œ์  ๊ธฐํšŒ, ๊ตญ๋‚ด ์ •์น˜์ œ๋„์™€ ๊ฐ™์€ ์ œ๋„์  ์š”์ธ, ์œ ๋Ÿฝ์—ฐํ•ฉ์˜ 5G ํˆด๋ฐ•์Šค ๊ฐ€์ด๋“œ๋ผ์ธ์˜ ์˜ํ–ฅ ๋“ฑ ์ฃผ์š”ํ•˜๊ฒŒ ์ œ๊ธฐ๋˜๋Š” ๋ณ€์ˆ˜์™€ ๊ทธ๋“ค์˜ ์ƒํ˜ธ์ž‘์šฉ์„ ํฌ์ฐฉํ–ˆ๋‹ค. ๋ณธ ์—ฐ๊ตฌ๋Š”๋Œ€์ค‘๊ตญ ์œ„ํ˜‘์ธ์‹์˜ ๊ฐ•ํ™”์™€ ๊ณต์œ ๋ฅผ ๊ฐ€์žฅ ์ผ๊ด€์ ์ด๊ณ , ๊ฒฐ์ •์ ์ธ ์˜ํ–ฅ์„ ๋ฏธ์นœ ๋ณ€์ˆ˜๋กœ ์ง€์ ํ•œ๋‹ค. ๊ตญ์ œ๊ทœ๋ฒ”์„ ์ค‘์‹œํ•˜๋Š” ์ œ๋„์  ํ† ์–‘์„ ์ง€๋‹Œ ์œ ๋Ÿฝ์—ฐํ•ฉ์˜ ๊ฒฝ์šฐ ์ค‘๊ตญ๊ณผ ์ธ๊ถŒ ๋“ฑ ๋งˆ์ฐฐ์„ ๊ฑฐ๋“ญํ•˜๋ฉด์„œ ์ค‘๊ตญ์— ๋Œ€ํ•œ ์œ„ํ˜‘์ธ์‹์ด ๊ฐ•ํ™”๋œ ๊ฒƒ์ด 5G ํˆด๋ฐ•์Šค ๋ฐœํ‘œ์— ๊ฒฐ์ •์  ์˜ํ–ฅ์„ ๋ฏธ์ณค๋‹ค. ํ”„๋ž‘์Šค๋Š” ํ™”์›จ์ด ์‚ฌํƒœ ์ดˆ๊ธฐ๋ถ€ํ„ฐ ํ–‰์ •๋ถ€ ๋‚ด ์œ„ํ˜‘์ธ์‹์˜ ๊ณต์œ ์ˆ˜์ค€์ด ๋†’์•˜๊ณ , ์˜ํšŒ์—์„œ๋„ ๊ณ ์œ„ํ—˜ ๋„คํŠธ์›Œํฌ ๊ด€๋ จ ๋ฐฐ์ œ์กฐ์น˜๊ฐ€ ํ•„์š”ํ•˜๋‹ค๋Š” ์ธ์‹์ด ์žˆ์–ด ์ผ๋ถ€ ๋ฌด๋ฆฌํ•˜๋‹ค๊ณ  ํŒ๋‹จ๋˜๋Š” ๋‚ด์šฉ๋งŒ์ด ์กฐ์ •๋˜์–ด ๋น„๊ต์  ์กฐ์†ํ•˜๊ฒŒ 2019-810๋ฒ•์„ ํ†ต๊ณผ์‹œํ‚ฌ ์ˆ˜ ์žˆ์—ˆ๋‹ค. ๋…์ผ์˜ ๊ฒฝ์šฐ ์ •๋ถ€ ๋‚ด ์œ„ํ˜‘์ธ์‹ ๊ณต์œ ์— ์–ด๋ ค์›€์ด ์žˆ์—ˆ์ง€๋งŒ, ๋Šฆ๊ฒŒ๋‚˜๋งˆ ๊ณต์œ ์— ๋Œ€ํ•œ ์›€์ง์ž„์ด ์ด๋ฃจ์–ด์ง€๋ฉฐIT๋ณด์•ˆ๋ฒ•2.0์„ ํ†ต๊ณผ์‹œํ‚ค๋Š” ๋ชจ์Šต์„ ๋ณด์˜€๋‹ค.Recognizing the strategic importance of the 5G technology, states are increasingly competing to secure their influence, In particular, the Huawei incident that took place over securing superiority in this technology can be said to be a representative case in which a problem of technology has been reborn as a problem of security. The European Union was initially friendly to Huawei, and member states also showed a reserved or permissible attitude regarding the introduction of 5G equipment. However, afterwards, the European Union announced the guidelines for the '5G Toolbox', a ban on assessment strategy, and recommended its member states to introduce it. The member states also started to make moves to remove Huawei equipment from its network. This research explained the Huawei case with variables of interests, ideas, and institutions on the formation of the European Union, France, and Germany's strategy to exclude Huawei through the theoretical framework of constructive institutionalism. In particular, this study explored the influence of the ideological factor represented by the perception of China as a threat to the European Union, France, and Germany, which place importance on norms in the matter of choosing between economic opportunities and security risks, and captured the influence of key variables including the U.S. pressure, economic opportunities provided by China and Huawei, institutional factors such as domestic political institutions, and the impact of the European Union's 5G Toolbox guidelines. This study points out 'strengthening and sharing of threat perceptions against China' as the key variable that had the most consistent and decisive effect on the policy making process. In the case of the European Union, which has an institutional foundation that values international norms, the announcement of the 5G Toolbox was decisively influenced by the strengthened perception of threats to China as it repeatedly clashed with China over human rights issues. In France, from the beginning of the Huawei incident, the level of sharing of threat perception within the administration was relatively high, and the parliament also recognized the need for ban of the high-risk suppliers. In the case of Germany, the 'IT Security Act 2.0' was passed belatedly as it had difficulties sharing threat perception within its government.์ œ 1 ์žฅ ์„œ๋ก  1 ์ œ 1 ์ ˆ ์—ฐ๊ตฌ๋ฐฐ๊ฒฝ 1 ์ œ 2 ์ ˆ ๋ฌธ์ œ์ œ๊ธฐ 5 ์ œ 3 ์ ˆ ๊ธฐ์กด ์—ฐ๊ตฌ ๊ฒ€ํ†  8 ์ œ 4 ์ ˆ ๋…ผ๋ฌธ์˜ ๊ตฌ์„ฑ 11 ์ œ 2 ์žฅ ์œ ๋Ÿฝ์—ฐํ•ฉ 12 ์ œ 1 ์ ˆ ์œ ๋Ÿฝ์—ฐํ•ฉ์˜ ๋”œ๋ ˆ๋งˆ: ๊ฒฝ์ œยทํ†ต์ƒ๊ณผ ์•ˆ๋ณด ์‚ฌ์ด 12 1. ํ™”์›จ์ด์™€ ์ค‘๊ตญ: 4์ฐจ ์‚ฐ์—…ํ˜๋ช… ์‹œ๋Œ€ ์ƒ์กด์„ ์œ„ํ•œ ์„ ํƒ 12 2. ํ™”์›จ์ด์˜ ์‹ ๋ขฐ์„ฑ๊ณผ ๋ฏธ๊ตญ์˜ ํด๋ฆฐ ๋„คํŠธ์›Œํฌ 16 ์ œ 2 ์ ˆ ๋””์ง€ํ„ธ ์ฃผ๊ถŒ๋ก ๊ณผ ์ค‘๊ตญ์œ„ํ˜‘๋ก  18 ์ œ 3 ์ ˆ ๊ตญ์ œ๊ทœ๋ฒ”๊ณผ ๋ฆฌ์Šค๋ณธ ์กฐ์•ฝ 26 ์ œ 4 ์ ˆ 5G Toolbox: ํ‰๊ฐ€์— ์˜ํ•œ ๋ฐฐ์ œ ์ „๋žต 29 ์ œ 3 ์žฅ ํ”„๋ž‘์Šค 40 ์ œ 1 ์ ˆ ํ”„๋ž‘์Šค์˜ ๋”œ๋ ˆ๋งˆ: ๊ฒฝ์ œยทํ†ต์ƒ๊ณผ ์•ˆ๋ณด ์‚ฌ์ด 40 1. ํ™”์›จ์ด ์˜์กด๊ณผ ์ ์ฆํ•˜๋Š” ๋Œ€(ๅฐ)์ค‘ ๋ฌด์—ญ 40 2. ์‚ฌ์ด๋ฒ„์•ˆ๋ณด์™€ ๋Œ€(ๅฐ)๋ฏธ ์ •๋ณดํ˜‘๋ ฅ ๊ฐˆ๋ง 44 ์ œ 2 ์ ˆ ๋“œ๊ณจ์ฃผ์˜์™€ ๋Œ€(ๅฐ)์ค‘ ์œ„ํ˜‘์ธ์‹ 47 ์ œ 3 ์ ˆ ์ง‘ํ–‰๋ถ€์ค‘์‹ฌ ์ฒด์ œ์˜ ์‹ ์†์„ฑ 56 ์ œ 4 ์ ˆ 2019-810๋ฒ•: ์ ๊ทน์  ์žฌ๋Ÿ‰ ํ™œ์šฉ์˜ ์ด์ค‘์ „๋žต 57 ์ œ 4 ์žฅ ๋…์ผ 64 ์ œ 1 ์ ˆ ๋…์ผ์˜ ๋”œ๋ ˆ๋งˆ: ๊ฒฝ์ œยทํ†ต์ƒ๊ณผ ์•ˆ๋ณด ์‚ฌ์ด 64 1. ํ™”์›จ์ด์™€ ๋Œ€(ๅฐ)์ค‘ ๊ฒฝ์ œ ์˜์กด ์‹ฌํ™” 64 2. ์‚ฌ์ด๋ฒ„์•ˆ๋ณด์™€ ๋Œ€(ๅฐ)๋ฏธ ๊ตฐ์‚ฌ์•ˆ๋ณด ํ˜‘๋ ฅ ์ค‘์‹œ 66 ์ œ 2 ์ ˆ ์ฃผ์ €ํ•˜๋Š” EU ๋ฆฌ๋”์˜ ๋Œ€(ๅฐ)์ค‘ ์œ„ํ˜‘์ธ์‹ 67 ์ œ 3 ์ ˆ ์˜ํšŒ์ค‘์‹ฌ ์ฒด์ œ์™€ ํ•ฉ์˜์ œ ๋ฏผ์ฃผ์ฃผ์˜ 73 ์ œ 4 ์ ˆ IT๋ณด์•ˆ๋ฒ• 2.0: ๊ตญ๋‚ด์ •์น˜์  ๋ถ„์—ด๊ณผ ์œ ๋ณดใ†ํšŒํ”ผ์ „๋žต 74 ์ œ 5 ์žฅ ๊ฒฐ๋ก  81 ์ฐธ๊ณ ๋ฌธํ—Œ 88 Abstract 103์„

    ์†Œํ”„ํŠธ์›จ์–ด ํ’ˆ์งˆ ์ธ์ฆ์„ ์œ„ํ•œ ์ธ์ฆ ๋ฉ”ํƒ€ ๋ชจ๋ธ

    No full text
    ํ•™์œ„๋…ผ๋ฌธ(์„์‚ฌ)--์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› :์ „๊ธฐยท์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€,2002.Maste

    Target Scattering Echo Simulation for Active Sonar System in the Geometric Optics Region

    No full text

    Realtime Active Target Signal Simulation

    No full text
    corecore