• Title/Summary/Keyword: Defense IT

Search Result 3,761, Processing Time 0.033 seconds

Correlation between Dielectric Constant Change and Oxidation Behavior of Silicon Nitride Ceramics at Elevating Temperature up to 1,000 ℃ (질화규소 세라믹스의 고온(~1,000 ℃) 유전상수 변화와 산화 거동의 상관관계 고찰)

  • Seok-Min, Yong;Seok-Young, Ko;Wook Ki, Jung;Dahye, Shin;Jin-Woo, Park;Jaeho, Choi
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.6
    • /
    • pp.580-585
    • /
    • 2022
  • In this study, the high-temperature dielectric constant of Si3N4 ceramics, a representative non-oxide-based radome material, was evaluated and the cause of the dielectric constant change was analyzed in relation to the oxidation behavior. The dielectric constant of Si3N4 ceramics was 7.79 at room temperature, and it linearly increased as the temperature increased, showing 8.42 at 1,000 ℃. As results of analyzing the microstructure and phase for the Si3N4 ceramics before and after heat-treatment, it was confirmed that oxidation did not occur at all or occurred only on the surface at a very insignificant level below 1,000 ℃. Based on this, it is concluded that the increase in the dielectric constant according to the temperature increase of Si3N4 ceramics is irrelevant to the oxidation behavior and is only due to the activation of charge polarization.

Suggestion of Using Defense Quality Score based on Taguchi Loss Function in Korea Defense Area (다구찌 손실함수 개념을 응용한 국방품질스코어 적용 가능성에 대한 연구 : 군수품 사례 위주)

  • Ahn, Namsu;Park, Sangwon;Chae, Jongmok;Lee, Youngwoo;Oh, Byeongin
    • Journal of Korean Society for Quality Management
    • /
    • v.41 no.3
    • /
    • pp.443-456
    • /
    • 2013
  • Purpose: Recently, many quality issues are aroused in military forces, such as failures in K-series weapons, combat boots defects and 40mm ammunition explosion accident. To address these problems, this paper suggests to use so called, Defense Quality Score, which is based on Taguchi loss function and developed in this research. Methods: Current defense specification states only the minimum requirement to produce the military supplies. Therefore, it is not easy to indue the continuous quality improvement of the supplies. This research suggests to use the defense quality score which measures the current status of defense supplies'quality characteristics. Results: We applied the defense quality score concept into the hot pepper sauce and long time stockpiled ammunition. We first categorize the quality characteristics into three categories, then assign the certain amount of score based on the importance of the characteristics. Lastly, we applied the modified Taguchi loss function to calculate the achieved score of the characteristics. The perfect score is 100 and the closer to the score, the better product it indicates. Conclusions: In this research, we developed the modified Taguchi loss function to apply into the korean defense supplies. The loss function is utilized to calculate the achieved level of satisfaction of the supplies based on the defense specifications. The application of defense quality score may help to stimulate the continuous quality improvement and encourage the good will quality competition among the military providers.

Cyber Attack and Defense Modeling Using Vulnerability Metrics (취약성 매트릭스를 이용한 사이버 공격 및 방어 모델링)

  • Lee Jang-Se;Chi Sung-Do;Choi Gyoo-Seok
    • Journal of the Korea Society for Simulation
    • /
    • v.13 no.3
    • /
    • pp.11-20
    • /
    • 2004
  • The major objective of this paper is to perform modeling of cyber attack and defense using vulnerability metrics. To do this, we have attempted command level modeling for realizing an approach of functional level proposed by Nong Ye, and we have defined vulnerability metrics that are able to apply to DEVS(Discrete Event System Specification) and performed modeling of cyber attack and defense using this. Our approach is to show the difference from others in that (i) it is able to analyze behaviors of systems being emerged by interaction between functional elements of network components, (ii) it is able to analyze vulnerability in quantitative manner, and (iii) it is able to establish defense suitably by using the analyzed vulnerability. We examine an example of vulnerability analysis on the cyber attack and defense through case study.

  • PDF

Cyber Attack and Defense Modeling Using Vulnerability Metrics (취약성 매트릭스를 이용한 사이버 공격 및 방어 모델링)

  • 이장세;지승도
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2003.06a
    • /
    • pp.191-198
    • /
    • 2003
  • The major objective of this paper is to perform modeling of cyber attack and defense using vulnerability metrics. To do this, we have attempted command level modeling for realizing an approach of functional level proposed by Nong Ye, and we have defined vulnerability metrics that are able to apply to DEVS(Discrete Event System Specification) and performed modeling of cyber attack and defense using this. Our approach is to show the difference from others in that (ⅰ) it is able to analyze behaviors of system emerged by interaction with functional elements of components composing network and each other, (ⅱ) it is able to analyze vulnerability in quantitative manner, and (ⅲ) it is able to establish defense suitably by using the analyzed vulnerability. We examine an example of vulnerability analysis on the cyber attack and defense through case study.

  • PDF

A Study on the Investigation and Analysis of Defense Information Technical Standard Application (국방정보기술표준 적용실태 조사 분석에 관한 연구)

  • Kim, Hye-Lyeong;Choi, Sang-Yeong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.3
    • /
    • pp.325-332
    • /
    • 2009
  • This study is aimed to investigate the application of DITA(Defense Information Technical stAndard) on the weapon information systems and defense management information systems in order not only to update the current DITA version 4.0, but also to develop SoS(System of systems) interoperability policy in the armed forces of Korea. For this study, 18 information systems were considered, their development products(System/Sub-system Specification, Technical architecture View, System Interoperability Test and Evaluation products) were reviewed and analysed. As a result of the investigation and analysis, it was found that the 44% of the DITA standard profiles were used for the development of the defense information systems. We conclude that DITA should be updated to be a minimal set so that all the defense information systems should be DITA-compliant. And it should be reviewed periodically to reflect the new information technology.

A suggestion for reforming defense education system and army college education program in the next decade (국방교육체계 정립과 육군대학 군사학 교육체계 발전방향)

  • Choe, In-Su
    • Journal of National Security and Military Science
    • /
    • s.3
    • /
    • pp.35-72
    • /
    • 2005
  • The purpose of this paper is to recommend the Ministry of Defense(MOD) for revolutionizing the current defense education system. As an instructor and an education planning officer of the ROK Army College, for last dozen months, the author has been embarrassed whenever tried to figure out what would be the role, functions, and educational goals of the college. In a nutshell, there has not been any general guidance for educating field grade officers. This unbelievable defect mainly comes from the absence of a responsible organization in the MOD. Even though it has the education branch under the department of personnel affairs, it doesn't have capabilities to design and implement the consistent and valuable education policy. Therefore, the development of defense education should begin with reinforcing the organization and functions of the MOD education branch. We need more experts on education( i.e. Ph.Ds of Education) and experienced specialties on defense education so that we could develop the overall guidance for military professional education. In addition, we need to enact the "defense or military education act" in a tentative name. This will ensure the legitimacy and continuity of defense education guidance initiated by the MOD. In a conclusion, it is senseless to think the blueprint for the Army College out until the preconditions mentioned above are matured. We must begin with rectifying the higher educational system.

  • PDF

Statistical Approach for the Prediction of Improper Businessman in Defense Procurement

  • Han, Hongkyu;Choi, Seokcheol
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.7 no.2
    • /
    • pp.21-30
    • /
    • 2011
  • The contractor management for the effective defense project is essential factor in the modern defense acquisition project. The occurrence of Improper Businessman causes the reason in which defense acquisition project is unable to be reasonably fulfilled and setback to the deployment of defense weapon system. In this paper, we develop a prediction model for the effective defense project by using the Discriminant Analysis, the Logistic Regression & Artificial Neural Network and analyse the core variables that determine the Improper Businessman in many variables. It is expected that our model can be used to improve the project management capability of defense acquisition and contribute to the establishment of efficient procurement procedure through entry of the reliable domestic manufacturer.

A Study on the Effective Preprocessing Methods for Accelerating Point Cloud Registration

  • Chungsu, Jang;Yongmin, Kim;Taehyun, Kim;Sunyong, Choi;Jinwoo, Koh;Seungkeun, Lee
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.1
    • /
    • pp.111-127
    • /
    • 2023
  • In visual slam and 3D data modeling, the Iterative Closest Point method is a primary fundamental algorithm, and many technical fields have used this method. However, it relies on search methods that take a high search time. This paper solves this problem by applying an effective point cloud refinement method. And this paper also accelerates the point cloud registration process with an indexing scheme using the spatial decomposition method. Through some experiments, the results of this paper show that the proposed point cloud refinement method helped to produce better performance.

Architecture of A Launch Control Unit for the Compatibility of Weapon Systems Based on Shipboard (함정 기반 다중 무장 호환 운용을 위한 발사제어기 아키텍처)

  • Shin, JinBeom;Cho, KilSeok;Yoo, MyongHwan;Kim, TaeHyon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.2
    • /
    • pp.176-184
    • /
    • 2020
  • In this paper, we have proposed hardware and software architecture of a launch control unit for the compatibility between air defense weapon systems loaded on shipboard. Until now, there is no compatibility between weapon systems loaded in battleships of korean navy. In the case of HaeGung system recently completed the test and evaluations, although it will be deployed on several kinds of shipboards, it has no compatibility and flexibility with other air defense weapon systems. Recently it reports that a long range air defense weapon system will be carried on future korean destroyer KDDX. Because the HaeGung and a long range air defense system will be operated together in KDDX, it is necessary to provide the compatibility between two weapon systems. So we have proposed architecture to provide the compatibility of the launch control unit that controls the launching system and the missile interface unit, and the missile in each weapon systems.

R&BD Performance Analysis of Defense Venture Program Using DEA (DEA를 활용한 국방벤처 지원사업 연구개발 및 사업화 성과 분석)

  • Park, Jin-Soo;Kim, Jin-Ha
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.50-59
    • /
    • 2021
  • The defense venture support program supports development so that it can be applied to the defense sector based on their technology and ideas to revitalize the private advancement of small and medium-sized enterprises to the defense sector. Since 2015, it has been operated with contributions from the Defense Acquisition Program Administration and has supported 84 projects. Moreover, it is an early stage in which results have been derived after 2018. In this study, the R&BD efficiency derived according to the budget for each project was compared using data envelopment analysis and classified and analyzed according to the characteristics of each project to identify the performance factors for each outstanding project. Based on the analysis results, this study considered support plans for efficient support programs and continuous performance creation in the future. As a result, it is expected that the effectiveness of the defense venture support project will be strengthened, and excellent performance will be expanded based on this study.