• Title/Summary/Keyword: 국방기술

Search Result 4,348, Processing Time 0.034 seconds

An Analysis of Haeseong Guided Missile Launcher Reliability Using Naval Field Data (야전운용자료를 활용한 해성 유도무기 발사체계 신뢰도 분석)

  • Hur, Jangwan;Oh, Kyungwon
    • Journal of Aerospace System Engineering
    • /
    • v.11 no.3
    • /
    • pp.39-46
    • /
    • 2017
  • Required military demands for high reliability of weapons systems throughout stages of life cycles as high technologies combined with weapons systems, research and development continue to drive costs upwards. However, for studies on reliability of national defense weapons systems, empirical research is limited because of a lack of interest or limitations relative to data collection. This study proposes a collection process relative to field operating specifications, based on data relative to experience and management collected by visiting vessels onsite, that operate weapons systems. In addition, after drawing the operating MTBF of the launching system for the Haeseong guided missile launcher, this study compared and analyzed that with values predicted during development and identifies parts with low operating values as compared to predicted values. Results of this study relative to maintenance support troops and weapon systems development companies will contribute to maintaining operational deployment of the launching system of the Haeseong guided weapons system.

The Study on The Production Testing Equipment for the Improvement of System Test Reliability in FCS (사격통제장치 시스템 시험의 신뢰성 향상을 위한 생산시험장비에 관한 연구)

  • Choi, Kyungjin
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.11
    • /
    • pp.139-147
    • /
    • 2016
  • This study described the design scheme for each step of the production test for the Fire Control System(FCS) of the K-55A1 PIP business of Hanwha Thales since 2011. From the time of receipt of the product It is necessary to improve the FCS's reliability by using the Unit Test, burn-In test, System Test. FCS of K-55A1 acts as a 'head' that control the self-propelled howitzer, and connected with the electrical and physical connection of self-propelled howitzer's multiple unit (Inertial navigation systems(IN), Muzzle Velocity Radar (MVR)) for the normal operation without an inch of error in operating. We designed the production testing equipment automatically as much as possible and designed with the environment similar to the self-propelled howitzer. by using this production testing equipment, It should help for the strengthen national defense of the Republic of Korea.

Automatic Test Report Recording Program Design and Implementation for Integration Test (통합시험을 위한 자동 시험일지 작성프로그램 설계 및 구현)

  • Jeong, Younghwan;Song, Kyoungrok;Lee, Wonsik;Wi, Sounghyouk
    • KIISE Transactions on Computing Practices
    • /
    • v.24 no.1
    • /
    • pp.33-39
    • /
    • 2018
  • For the integration test in the current field of defense simulation, each actual equipment and simulator's logging information is automated. Although the event of the integrated test system is written in the test log, it is not automated, and relies on the operator's handwriting or file creation, resulting in ineffective aspects such as low-quality record content and repetition of the same content. In this study, we propose the automatic test report recording program that solves these problems. Automatic test report recording program uses framework-based technology to receive information from the test control computer and user to record a log of the test log. Automatic test report recording program allows the user to record the repeated test content in a stable manner. Additionally, even if the number of test operators is limited, the efficiency is improved so that we can fucus on the integration test.

A Study on Priority Decision Method of Required Capability for North West Islands (서북도서에 대한 요구능력 우선순위 결정방법에 관한 연구)

  • Jang, Dong Mo;Lim, Gye Hwan
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.45-56
    • /
    • 2013
  • In order to prepare against the unpredictable provocation of nK on NWI, instead of the threat based force enhancement, sufficient capability based force planning is required in consideration to enemy capability, operations environment, and technological development. This thesis proposes a method on how to prioritize the required capabilities of NWI during the process of identifying capabilities and investing on the decided acquisition assets. Ambiguity in deciding the priority is eliminated and detailed planning is possible through instituting relationship of organization, operation and capability, and by designating weight based on the above relationship. This method identify the various operations and required capabilities, classify the order of priority clearly for NWI, when compare to other method of priority decision. Although capability based force planning requires more assets and faces limitations due to budget, this method will provide and efficient decision making procedure through precise prioritization.

Transformation Method for a State Machine to Increase Code Coverage (코드 커버리지를 높이기 위한 상태 머신 변환 방법)

  • Yoon, YoungDong;Choi, HyunJae;Chae, HeungSeok
    • Journal of KIISE
    • /
    • v.43 no.9
    • /
    • pp.953-962
    • /
    • 2016
  • Model-based testing is a technique for performing the test by using a model that represents the behavior of the system as a system specification. Industrial domains such as automotive, military/aerospace, medical, railway and nuclear power generation require model-based testing and code coverage-based testing to improve the quality of software. Despite the fact that both model-based testing and code coverage-based testing are required, difficulty in achieving a high coverage using model-based testing caused by the abstraction level difference between the test model and the source code, results in the need for performing model-based testing separately. In this study, to overcome the limitations of the existing model-based testing, we proposed the state machine transformation method to effectively improve the code coverage using the protocol state machine, one of the typical modeling methods is used as the test model in model-based testing, as the test model. In addition, we performed a case study of both systems and analyzed the effectiveness of the proposed method.

The Battle Warship Simulation of Agent-based with Reinforcement and Evolutionary Learning (강화 및 진화 학습 기능을 갖는 에이전트 기반 함정 교전 시뮬레이션)

  • Jung, Chan-Ho;Park, Cheol-Young;Chi, Sung-Do;Kim, Jae-Ick
    • Journal of the Korea Society for Simulation
    • /
    • v.21 no.4
    • /
    • pp.65-73
    • /
    • 2012
  • Due to the development of technology related to a weapon system and the info-communication, the battle system of a warship has to manage many kinds of human intervention tactics according to the complicated battlefield environment. Therefore, many kinds of studies about M&S(Modeling & Simulation) have been carried out recently. The previous M&S system based on an agent, however, has simply used non-flexible(or fixed) tactics. In this paper, we propose an agent modeling methodology which has reinforcement learning function for spontaneous(active) reaction and generation evolution learning Function using Genetic Algorithm for more proper reaction for warship battle. We experiment with virtual 1:1 warship combat simulation on the west sea so as to test validity of our proposed methodology. We consequently show the possibility of both reinforcement and evolution learning in a warship battle.

Design and Implementation of 3D Visualization Information System with RFID Tag Data (RFID 태그 데이터를 이용한 3차원 시각화 정보 시스템 설계 및 구현)

  • Ryu, Nam-Hoon;Ban, Kyeong-Jin;Song, Seung-Heon;Kim, Eung-Kon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.2 no.4
    • /
    • pp.203-208
    • /
    • 2007
  • Ministry of Information and Communication is pushing for IT 839 strategy that has main points : 8 major service which can develop IT industry of Korea on the whole, 3 major infra, and 9 major new growth power. Of these, RFID/USN utilizing service is expected to exert a great influence the whole industry from field that is closely related with our life to national defense, supply, construction, transportation, physical distribution, manufacture, circulation, and service. In domestic case, departure of RFID/USN field is a little bit later than advanced nation's, and a technique difference between domestic field and that of advanced nation is about 2 years. In this situation, in order to develop middleware of various field gearing RFID Tag efficiently, we have to study about user interface and data analysis technique that is used in middleware commonly. This paper searches about WPF that appears in user interface field with up-to-date technique, and embodies 3 dimension visualization information system with WPF.

  • PDF

A Study of the UML modeling and simulation for an analysis and design of the reconnaissance UAV system (정찰용 무인기 체계 분석/설계를 위한 UML 모델링 및 시뮬레이션 연구)

  • Kim, Cheong-Young;Park, Young-Keun;Lee, Jun-Kyu;Kim, Myun-Yeol;Reu, Tae-Kyu
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.36 no.11
    • /
    • pp.1112-1120
    • /
    • 2008
  • The real-time distributed simulation at the present age concentrates on the construction of a system development environment in order to accomplish a synthetic battlefield environment connected with Live-Virtual-Constructive simulation and to realize the Simulation Based Acquisition which supports the life cycle of weapon system. Accordingly this paper describes the development environment of the UML modeling and simulation which integrates the system analysis and design methods performed during the conceptual design phase of the reconnaissance UAV system development. An integrated framework linked with the UML simulation and X-plane visualization is suggested to efficiently perform the system analysis and design, and finally the implementation contents, the analysis of experiment results and concluding remarks are described.

New ADD Injection Driven Transonic Wind Tunnel and Test With the AGARD Model (신규 건설 ADD 천음속풍동 소개 및 AGARD 표준모형 공력계수 비교)

  • Seo, Kyugnwon;Lee, Jong Geon;Shin, Seongbeom;Han, Sang Hyun;Park, Keum Yong;Kim, Young Jun;Kim, Namgyun;Jin, Hyeon
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.48 no.2
    • /
    • pp.119-125
    • /
    • 2020
  • A high Reynolds number transonic wind tunnel has been built in 2018 at Agency for Defense Development(ADD). The tunnel has a closed circuit with a 1.5m×1.5m test section and is injection driven from a 140bar air supply system. The Mach number range is 0.3-1.2 with a conventional contracting nozzle and 1.4 with a convergent-divergent contraction. The stagnation pressure range is 100-550kPa at the lowest Mach number. An AGARD-B standard model is tested in the transonic wind tunnel to obtain 6-DOF aerodynamic coefficients. The results are compared with those obtained from ADD trisonic wind tunnel and others. We verify that the transonic wind tunnel become available to develop an aircraft from the testing results.

A Study on the Operation Concept of Cyber Warfare Execution Procedures (사이버전 수행절차 운영개념에 관한 연구)

  • Kim, Sung-Joong;Yoo, JiHoon;Oh, HaengRok;Shin, Dongil;Shin, DongKyoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.73-80
    • /
    • 2020
  • Due to the expansion of cyber space, war patterns are also changing from traditional warfare to cyber warfare. Cyber warfare is the use of computer technology to disrupt the activities of nations and organizations, especially in the defense sector. However, the defense against effective cyber threat environment is inadequate. To complement this, a new cyber warfare operation concept is needed. In this paper, we study the concepts of cyber intelligence surveillance reconnaissance, active defense and response, combat damage assessment, and command control in order to carry out cyber operations effectively. In addition, this paper proposes the concept of cyber warfare operation that can achieve a continuous strategic advantage in cyber battlefield.