Sanguk Noh

Work place: School of Computer Science and Information Engineering, The Catholic University of Korea, Bucheon 14662, Republic of Korea

E-mail: sunoh@catholic.ac.kr

Website:

Research Interests: Computer systems and computational processes, Computational Learning Theory, Real-Time Computing, Solid Modeling

Biography

Sanguk Noh received a B.S. in biology, an M.S. in computer science and engineering from Sogang University, Seoul, Korea, in 1987 and 1989, respectively, and a Ph.D. in computer science and engineering from the University of Texas, Arlington, TX, in 1999.

He is currently a professor in the School of Computer Science and Information Engineering at the Catholic University of Korea, Korea. He previously held research positions at the Agency for Defense Development, Korea (1989-1995), in the Center for Human-Computer Communication, Oregon Graduate Institute, Beaverton, OR (2000), and was an assistant professor in the Department of Computer Science at the University of Missouri, Rolla, MO (2000-2002). His research interests include intelligent real-time systems, machine learning, modeling and simulation, multi-agent systems, and knowledge management.

Author Articles
Simulation for the Reverse Extrapolation of Radar Threats and their Verification

By Sanguk Noh So Ryoung Park

DOI: https://doi.org/10.5815/ijisa.2019.07.01, Pub. Date: 8 Jul. 2019

Various and unpredictable electronic warfare situations drive the development of an integrated electronic warfare (EW) simulator that can perform electronic warfare modeling and simulation on radar threats. This paper introduces the basic components of simulation system that enables our agents to be operational in EW settings. In various simulation of EW environments, our agents can preset their path in the existence of enemy radars' surveillance and autonomously be aware of radar threats while they proceed in their own route. As reversely extrapolating radar threats given radio-active parameters received, our agents perform an appropriate jamming technique in order to deceive the enemy radar keeping track of our agents. Based upon the response of the radar threat attacked by the jamming techniques, our agents figure out the types of the radar threat and verify its identification. For the actual and helpful information, real radars with the probability of similarity could be prioritized from radar database. The integrated EW simulator that we have designed and developed in this paper enables our agents to perform such capabilities as reverse extrapolation of RF threats, its verification using jamming, and recommendation of similar radars, and to evaluate their autonomous behaviors in a tapestry of realistic scenarios.

[...] Read more.
Other Articles