• Title/Summary/Keyword: Defense Standard

Search Result 381, Processing Time 0.028 seconds

Defense software test procedure improvement measure reflecting the TMMi (TMMi를 반영한 국방 소프트웨어 테스트 절차 발전방안)

  • Park, Yeon-Dong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.1
    • /
    • pp.87-93
    • /
    • 2021
  • As the portion of modern weapons systems equipped with electronic components increases, the presence of embedded software has also increased, subsequently drawing interest in quality management and development methods. Unlike mechanical systems, software is logically intangible, hard to troubleshoot, and hard to reuse, making it hard to utilize limited resources when exposed to failures. The United States had successful results in establishing the Capability Maturity Model (CMM) by studying and applying separate processes for development and quality management of defense software. South Korea has also established, and utilizes, a standard of development and quality management for defense software based on international standards. However, some say those standards still remain at a basic level, and should be modified along with the progress in software. If the standard stays at a basic level, compared to software progression, the cost to reuse and restore resources will increase exponentially. This paper discusses improvement in the test processes for defense software through the Test Maturity Model-integration (TMMi)-derived from the CMM-and presents a blueprint for defense software quality management.

A Study on Implementation of the advance Defense Technology inforMation Service (차세대 국방기술정보통합서비스 구축에 관한 연구)

  • Kim, Mi-Jeong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.6
    • /
    • pp.636-645
    • /
    • 2017
  • An information system for defense technology information management should assist the user's work and manager's decision-making by managing and timely providing data held by defense-related organizations. This paper proposes a plan for constructing an advance defense technology information service. DTiMS concentrates on the collection and management of defense science technology information but not its distribution. Therefore, it is important that the advanced distribution service model be established on the concept of total life cycle management that utilizes user information, so that it can provide proper information to each user in the defense field who require the information processed by their roles. This study examined the management of information and operation method through advanced case analysis. In addition, the analysis of existing services revealed improvements in the management of an information standard, the trace ability of information and usability, and improved user-interface. The proposed development direction was implemented by deploying the advanced DTiMS. Therefore, it is expected that the proposed methodology will contribute to the weapon system total life cycle, and will support defense technology planning, and R&D decisions.

A Study on the Development of Evaluation Model for Selecting a Standard for DITA using AHP (AHP를 이용한 국방정보기술표준 선정 평가 모델 개발에 관한 연구)

  • Kim, Ja-Hee;Kim, Woo-Je;Cho, Hyun-Ki;Lee, Eun-Young;Seo, Min-Woo
    • IE interfaces
    • /
    • v.25 no.1
    • /
    • pp.96-105
    • /
    • 2012
  • Recently, the interoperability has become more important to enhance the net-centric capabilities of the warfighter. DITA (Defense Information Technical stAndard) is the set of IT standards for improving interoperability, scalability, effectiveness, and efficiency. In this paper, we analyzed the standardizing process to derive the selection criteria and structurized the derived selection criteria using the KJ (Kawakita Jiro) method. Finally, we developed an evaluation model for selecting a standard for DITA using AHP (Analytic Hierarchy Process). As a result, we present eight selection criteria (maintainability, trend, stability, portability, effect of other standard, constraint of the network, and applicability to the systems). We also applied some examples that several IT standards to our selection model for validating the model. We expect our model to help to decide objectively whether the new standard can be listed in DITA.

A Study on the Revision Efficiency of Referenced Specifications/Standards for Raw and Subsidiary Materials in the Field of National Defense (국방분야 인용 원·부자재 규격/표준 개정 효율화 연구)

  • Park, KC;Baek, HM;Kim, TW;Gil, HJ;Kwon, JS;Lee, IL;Song, SB;Won, SH
    • Journal of Korean Society for Quality Management
    • /
    • v.46 no.3
    • /
    • pp.497-508
    • /
    • 2018
  • Purpose: The purpose of this study is to research the revision efficiency of the referenced specifications/standards for raw and subsidiary materials in the field of national defense. Methods: Firstly, it was carried out to investigate the all of the Korean military drawings and establish the database for specifications/standards referenced in the field of national defense. Secondly, it was reviewed the validity of referenced specifications/standards of raw and subsidiary materials. Finally, proposal documents were made for invalid referenced specifications/standards of raw and subsidiary materials in order to suggest alternative specifications/standards. Results: All of the specifications/standards referenced in the Korean military drawings were 11,924 kinds and raw and subsidiary specifications/standards were 2,711 kinds. The proposal documents for revision of invalid referenced specifications/standards were suggested and approved by the military procurement standardization committee of DAPA (Defense Acquisition Program Administration). Therefore, the revision process of 472 kinds of referenced specifications/standards and 160,177 papers of the Korean military drawings were finished. Conclusion: Based on the results of this investigation, it could be significantly reduce to administrative costs and efforts through revision of referenced specifications/standards instead of conventional engineering change.

Fatigue Analysis to Determine the Repair Limit for the Damaged Fastener Hole of Aging Aircraft(P-3CK) (노후항공기(P-3CK) 패스너 홀 손상 수리 한계 설정을 위한 피로해석)

  • Kim, Young-Jin;Kim, Hyeung-Geun;Kim, Chang-Young;Chang, Joong-Jin;Lee, Mal-Young
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.41 no.12
    • /
    • pp.959-966
    • /
    • 2013
  • In this study, based on P-3CK project using aging aircraft without any design information, the structural assessments of fastener holes to repair the short edge distance defects are investigated. For this purpose, the nacelle longeron which has many defects is selected and then conservative stress is calculated by performing the static analysis of 1.5ED, 1.8ED, 2.0ED defects of longeron fastener holes. This result applies to TWIST standard load spectrum to generate flight load spectrum. Then the crack growth analysis is performed by using flight load spectrum. Through this, the validity of a repaired fastener hole is evaluated. Finally, the standard of repair and the period of maintenance for a defected fastener hole are established.

A study on method of setting up the defense integrated security system (군 통합보안시스템 구축 방안 연구)

  • Jang, Worl-Su;Choi, Jung-Young;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.575-584
    • /
    • 2012
  • A established military security tast based on existing manual and off-line needs the change and development to support effective and systematic task performance according to environment change of informational and scientific project in the military. Therefore this study suggests to set up the standard model of the defense integrated security system to automate and informationize major defense security task based on actual and problem in the area of major defense of security task and case analysis of these in America, England and other countries. The standard model consist of unit systems were made up integrated security system, security management system, man entrance system, vehicle entrance system, high-tech guard system, terror prevention system and the security accident analysis system, and this suggested model based on possible technology and system. If this model is apply to each real military unit, we will expect the development of defense security.

Study of Aging and Performance About Separation Devices Has Been Stored (장기 보관된 분리장치의 성능 및 노화에 관한 연구)

  • Kim, Dong-seong;Jin, Hong-Sik
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.7
    • /
    • pp.565-572
    • /
    • 2021
  • In this study, a study on the performance and aging of explosive bolts stored for a long time among pyrotechnic mechanical devices(PMD) used as separation devices in the defense field is conducted. For this, explosive bolts that had been installed in the weapon system for about 10 years are secured. Performance and life extension test procedures are established based on the AIAA Standard and MIL-STD. Before performance evaluation, non-functional tests are performed to check whether external changes or failures occurred. Next, circuit inspection and X-ray tests are conducted to check the failure in internal circuits and structures. After that, performance test is carried out to confirm the operation of the samples that passed the non-functional test. Through this test, separation of bolt and separation time are measured, and some samples are tested after a high temperature storage test to confirm the remaining life and the possibility of extension. Finally, the remaining life and reliability are predicted based on the results of the test and the Arrhenius model to identify remaining shelf life and reliability depend on time.

함정용 대공방어 시스템 이지스

  • Korea Defense Industry Association
    • Defense and Technology
    • /
    • no.6 s.208
    • /
    • pp.40-45
    • /
    • 1996
  • 이지스 시스템은 미국이 고성능 대함 미사일을 함정에서 요격하기 위하여 개발한 함정용 대공 방어 시스템이다. 이지스(Aegis)는 그리스 신화에 나오는 방패(모든 사악한 것으로부터 몸을 지킨다는 방패)로, 중앙에 괴물 고르곤(Gorgon)의 머리 모양이 그려져 있다. 고르곤은 머리털이 뱀이며 그 눈을 본 사람은 무서운 나머지 돌로 변했다고 전해지는 스테노(Stheno), 에우리알레(Euryale), 메두사(medusa) 등 3자매중 하나를 말한다. 이 방패는 처음에 제우스(Zeus)가 소유하였으나, 뒤에 자신의 딸인 지혜.예술.전쟁의 여신 아테나(Athena)에게 주었다. 이지스 시스템은 요격용 대공 미사일인 Standard Missile SM-MR(RIM-66시리즈)과 위상 배열 레이다 SPY-1을 중심으로 하여, 그 외의 함내 센서(탐지 장치), 전술 정보처리장치 등 많은 무기 체계의 기능을 통합시킨 집합체이며, 이 위상 배열 안테나는 이지스 시스템의 상징으로 되어 있다. 현재 미국 해군의 Ticonderogal(CG-47)급 순양함, Arleigh Burke(DDG-51)급 구축함, 그리고 일본 해상 자위대 Kongo(DD-173)급 구축함에 탑재되어 작전의 효율성을 높이고 있다.

  • PDF

Novel Radar Signal Blanking Method for Electronic warfare Support (전자전지원을 위한 새로운 레이더 신호 수신 블랭킹 기법)

  • Song, Kyu-Ha;Lee, Dong-Weon;Han, Jin-Woo;Lyu, Si-Chan
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.335-336
    • /
    • 2007
  • The blanking interface between an ES system and a radar system on the same platform cause the unwanted radar signal separation in the process of the signal measurement of the ES system. In this paper, we propose the novel radar signal blanking method for ES. The proposed method extracts a standard of judgement which we can decide whether a radar signal is separated by the blanking interface and presents how to merge the separated signals. Test result is presented to show the performance of the proposed method.

  • PDF

Defense Strategy of Network Security based on Dynamic Classification

  • Wei, Jinxia;Zhang, Ru;Liu, Jianyi;Niu, Xinxin;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5116-5134
    • /
    • 2015
  • In this paper, due to the network security defense is mainly static defense, a dynamic classification network security defense strategy model is proposed by analyzing the security situation of complex computer network. According to the network security impact parameters, eight security elements and classification standard are obtained. At the same time, the dynamic classification algorithm based on fuzzy theory is also presented. The experimental analysis results show that the proposed model and algorithm are feasible and effective. The model is a good way to solve a safety problem that the static defense cannot cope with tactics and lack of dynamic change.