• Title/Summary/Keyword: Defense S/W Process

Search Result 14, Processing Time 0.026 seconds

Reduction and Spark Plasma Sintering of the W(Tungsten) Nanopowder Produced by the Electric Explosion of Wire Process (전기선폭발법으로 제조한 나노 W(텅스텐) 분말의 환원처리 및 방전플라즈마소결에 의한 조밀화)

  • Kim Ji-Soon;Kim Cheol-Hee;Park Eun-Ju;Kwon Young-Soon;Kim Jin-Chun;Lee Sung-Ho;Jung Dong-Ik
    • Journal of Powder Materials
    • /
    • v.13 no.4 s.57
    • /
    • pp.269-277
    • /
    • 2006
  • [ ${\beta}-W(W_3O)$ ] oxide layer on the surface of each W(tungsten) nanopowder produced by the electric explosion of wire(EEW) process were formed during the 1vol.% air passivation process. The oxide layer hindered sintering densification of compacts during SPS process. The oxide phase was reduced to the pure W phase during SPS. The W nanopowder's compacts treated by the hydrogen reduction showed high sintered density of 94.5%. after SPS process at $1900^{\circ}C$.

A Study on Software Product-Line Architecture Design Process (소프트웨어 제품계열 아키텍처 설계 프로세스)

  • Oh, Young-Bae
    • Journal of Information Technology Services
    • /
    • v.4 no.2
    • /
    • pp.47-59
    • /
    • 2005
  • S/W product line is a S/W product or a set of S/W system, which has common functions. We can develop a specific S/W product, which satisfiesrequirements of a particular market segment and a mission in a specific domain by reusing the core asset such as the developed S/W architecture through the S/W product line. S/W development methodology based on the S/W product line can develop a S/W more easily and fast by reusing the developed S/W core asset. An advanced country of S/W technology selects S/W product line as a core field of S/W production technology, and support technology development. In case of USA, CMU/SEI (Carnegie Mellon University / Software Engineering Institute) developed product-line framework 4.0 together with the industry and the Ministry of National Defense. Europe is supporting the development of product line technology through ITEA(IT for European Advancement) program. In this paper, we aim to construct reference architecture of S/W product line for production of the S/W product line.

An Operational Concept for Information Systems: A Case of the D Information Resource Management Information System (정보시스템 운영개념 연구: D정보자원관리시스템 사례)

  • Lee, Sang-Ho;Sim, Seung-Bae
    • Journal of Information Technology Services
    • /
    • v.5 no.1
    • /
    • pp.129-147
    • /
    • 2006
  • This study analyzed an operational concept for the D Information Resource Management Information System (DIRMIS) to manage any IT resources effectively in defense area. We first deduced the concept of the information resource management (IRM) for defense area from the literature review, and we suggested a guideline, which has used in defense area, of the documentation for the operational concept description (OCD). Moreover, we developed the operational concept for the DIRMIS following the guideline. Especially, this study is a practical approach for suggesting of a case, and the share of accumulated cases will contribute to advance in System Integration (SI) industry as well as academic research.

A Study on the Priority of Users' Requirements for the Development of Military Vehicles by Analytic Hierarchy Process (AHP 기법을 통한 군용차량 개발시 운용자 요구사항 우선순위 설정 연구)

  • Lee, Bum-Koo;Shin, Yong-Cheol;Ryou, Hwang-Bin;Cho, Yong-Kun
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.36 no.2
    • /
    • pp.117-124
    • /
    • 2010
  • The military vehicles are an inevitable resource that is indispensible to successfully perform modern wars. Military vehicles used in the Korean Army are the copycats of American out-dated military vehicles, but limited to fulfill the specific requirements by the operators. Korean army are nowadays trying to launch a new developmental plan for military vehicles of new concepts by the Korean Army. This article, hence, extracts the necessary factors upon the advancement of military vehicles by the expertises with the operation of military vehicles as well as sufficient experiences about maintenance. Suggesting and setting up the priority, the result makes practical application for the decision of the development of military vehicles.

Design and Implementation of a Real-time Integrated Analysis Framework based on Multiprocessor Search Modules against Malicious Codes (악성코드 대응 MPSM기반 실시간통합분석체계의 설계 및 구현)

  • Moon, Yoon Jong
    • Convergence Security Journal
    • /
    • v.15 no.1
    • /
    • pp.69-82
    • /
    • 2015
  • This dissertation introduce how to react against the cybercrime and analysis of malware detection. Also this dissertation emphasize the importance about efficient control of correspond process for the information security. Cybercrime and cyber breach are becoming increasingly intelligent and sophisticated. To correspond those crimes, the strategy of defense need change soft kill to hard kill. So this dissertation includes the study of weak point about OS, Application system. Also this dissertation suggest that API structure for handling and analyzing big data forensic.

Characteristics of MHEMT Devices Having T-Shaped Gate Structure for W-Band MMIC (W-Band MMIC를 위한 T-형태 게이트 구조를 갖는 MHMET 소자 특성)

  • Lee, Jong-Min;Min, Byoung-Gue;Chang, Sung-Jae;Chang, Woo-Jin;Yoon, Hyung Sup;Jung, Hyun-Wook;Kim, Seong-Il;Kang, Dong Min;Kim, Wansik;Jung, Jooyong;Kim, Jongpil;Seo, Mihui;Kim, Sosu
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.33 no.2
    • /
    • pp.99-104
    • /
    • 2020
  • In this study, we fabricated a metamorphic high-electron-mobility transistor (mHEMT) device with a T-type gate structure for the implementation of W-band monolithic microwave integrated circuits (MMICs) and investigated its characteristics. To fabricate the mHEMT device, a recess process for etching of its Schottky layer was applied before gate metal deposition, and an e-beam lithography using a triple photoresist film for the T-gate structure was employed. We measured DC and RF characteristics of the fabricated device to verify the characteristics that can be used in W-band MMIC design. The mHEMT device exhibited DC characteristics such as a drain current density of 747 mA/mm, maximum transconductance of 1.354 S/mm, and pinch-off voltage of -0.42 V. Concerning the frequency characteristics, the device showed a cutoff frequency of 215 GHz and maximum oscillation frequency of 260 GHz, which provide sufficient performance for W-band MMIC design and fabrication. In addition, active and passive modeling was performed and its accuracy was evaluated by comparing the measured results. The developed mHEMT and device models could be used for the fabrication of W-band MMICs.

A 3 ~ 5 GHz CMOS UWB Radar Chip for Surveillance and Biometric Applications

  • Lee, Seung-Jun;Ha, Jong-Ok;Jung, Seung-Hwan;Yoo, Hyun-Jin;Chun, Young-Hoon;Kim, Wan-Sik;Lee, Noh-Bok;Eo, Yun-Seong
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.11 no.4
    • /
    • pp.238-246
    • /
    • 2011
  • A 3-5 GHz UWB radar chip in 0.13 ${\mu}m$ CMOS process is presented in this paper. The UWB radar transceiver for surveillance and biometric applications adopts the equivalent time sampling architecture and 4-channel time interleaved samplers to relax the impractical sampling frequency and enhance the overall scanning time. The RF front end (RFFE) includes the wideband LNA and 4-way RF power splitter, and the analog signal processing part consists of the high speed track & hold (T&H) / sample & hold (S&H) and integrator. The interleaved timing clocks are generated using a delay locked loop. The UWB transmitter employs the digitally synthesized topology. The measured NF of RFFE is 9.5 dB in 3-5 GHz. And DLL timing resolution is 50 ps. The measured spectrum of UWB transmitter shows the center frequency within 3-5 GHz satisfying the FCC spectrum mask. The power consumption of receiver and transmitter are 106.5 mW and 57 mW at 1.5 V supply, respectively.

An 8-b 1GS/s Fractional Folding CMOS Analog-to-Digital Converter with an Arithmetic Digital Encoding Technique

  • Lee, Seongjoo;Lee, Jangwoo;Lee, Mun-Kyo;Nah, Sun-Phil;Song, Minkyu
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.13 no.5
    • /
    • pp.473-481
    • /
    • 2013
  • A fractional folding analog-to-digital converter (ADC) with a novel arithmetic digital encoding technique is discussed. In order to reduce the asymmetry errors of the boundary conditions for the conventional folding ADC, a structure using an odd number of folding blocks and fractional folding rate is proposed. To implement the fractional technique, a new arithmetic digital encoding technique composed of a memory and an adder is described. Further, the coding errors generated by device mismatching and other external factors are minimized, since an iterating offset self-calibration technique is adopted with a digital error correction logic. A prototype 8-bit 1GS/s ADC has been fabricated using an 1.2V 0.13 um 1-poly 6-metal CMOS process. The effective chip area is $2.1mm^2$(ADC core : $1.4mm^2$, calibration engine : $0.7mm^2$), and the power consumption is 88 mW. The measured SNDR is 46.22 dB at the conversion rate of 1 GS/s. Both values of INL and DNL are within 1 LSB.

Network-based Simulation System Framework for the Safety Assessment of Ship (선박의 안전성 평가를 위한 네트워크 기반의 시뮬레이션 시스템 프레임워크)

  • Lee K.-H.;Kim H.-S.;Han S.-W.;Park J.-H;Oh J.
    • Korean Journal of Computational Design and Engineering
    • /
    • v.10 no.5
    • /
    • pp.356-364
    • /
    • 2005
  • As a ritual of modern people is getting higher, the safety assessment of the structure related to people has become the most important part in the process of the design. Especially, in the case of a ship, as regulations about the safety of passengers and the pollution in the ocean are strictly reinforcing, the safety assessment has become the most important part in the process of the design. However, because the established safety assessment is mostly depend on the experienced theory, it is so difficult to assess the safety considering a lot of situations such as various ocean environments, the mistake of sailors and emergency situations. As the way to solve this problem, lately the study of the simulation using a computer has been processed. In this paper, we suggested network-based simulation system framework using HLA (High Level Architecture) among many kind of simulations to assess the safety of the ship. Because HLA has already become a standard of the future simulation system in the U.S. DoD(Department of Defense) and Korea army, we expect to raise the possibility in the future. In addition, because HLA makes a standard of documents and a reused component(Federate) of simulation(Federation) by OMT(Object Model Template) and RTI(Runtime Infrastructure), we expect that this study will be developing the safety assessment of ship as well as operation in warship and cooperation with another applications.

A Study on Cyber Operational Elements Classification and COA Evaluation Method for Cyber Command & Control Decision Making Support (사이버 지휘통제 의사결정 지원을 위한 사이버 작전요소 분류 및 방책 평가 방안 연구)

  • Lee, Dong-hwan;Yoon, Suk-joon;Kim, Kook-jin;Oh, Haeng-rok;Han, In-sung;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.99-113
    • /
    • 2021
  • In these days, as cyberspace has been recognized as the fifth battlefield area following the land, sea, air, and space, attention has been focused on activities that view cyberspace as an operational and mission domain in earnest. Also, in the 21st century, cyber operations based on cyberspace are being developed as a 4th generation warfare method. In such an environment, the success of the operation is determined by the commander's decision. Therefore, in order to increase the rationality and objectivity of such decision-making, it is necessary to systematically establish and select a course of action (COA). In this study, COA is established by using the method of classifying operational elements necessary for cyber operation, and it is intended to suggest a direction for quantitative evaluation of COA. To this end, we propose a method of composing the COES (Cyber Operational Elements Set), which becomes the COA of operation, and classifying the cyber operational elements identified in the target development process based on the 5W1H Method. In addition, by applying the proposed classification method to the cyber operation elements used in the STUXNET attack case, the COES is formed to establish the attack COAs. Finally, after prioritizing the established COA, quantitative evaluation of the policy was performed to select the optimal COA.