• Title/Summary/Keyword: Defense Technical Information

Search Result 92, Processing Time 0.022 seconds

Development of Ministry of National Defense Architecture Framework(MND AF) (국방아키텍처프레임워크의 개발)

  • Choi, Nam-Yong;Jin, Jong-Hyeon;Song, Young-Jae
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.407-414
    • /
    • 2004
  • The US DoD architecture framework defines architecture Products according to three viewpoints : operational view, system view, and technical view. But, its coarse-grained development process causes leakage of the details In transforming among different views. It also uses different methods for architecture products development, so that the levels of those products are not consistent. So. we propose MND AF(Ministry of National Defense Architecture Framework) for military environment to solve those problems. We propose additional architecture products to achieve consistency, including “architecture disciplines definition description,”“organization-to-activity relationships matrix,” “system definition description,” and “technical reference model,” etc. We also propose the architecture development process in more detail through seven steps. In addition, we propose the applicability of those products to the life cycle processes of the acquisition management. MND AF can provide consistency and traceability of architecture products, provide the basis for sl·stem integration and interoperability. Also, architecture developers can construct architecture in a more effective and efficient way through MND AF.

A study on Decision Model of Disuse Status for the Commercial Vehicles Considering the Military Operating Environment

  • Lee, Jae-Ha;Moon, Ho-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.1
    • /
    • pp.141-149
    • /
    • 2020
  • The proportion of commercial vehicles currently used by the private sector among the vehicles operated by the military is very high at 58% and plans to increase further in the future. As the proportion of commercial vehicles in the military has increased, it is also an important issue to determine whether to disuse of commercial vehicles. At present, the decision of disuse of commercial vehicles is subjectively judged by vehicle technical inspector using design life and vehicle usage information. However, the difference according to the military operation environment is not reflected and objective judgment criteria are not presented. The purpose of this study is to develop a model to determine the disuse status of commercial vehicles in consideration of military operating environment. The data used in the study were 1,746 commercial vehicles of three types: cars, vans and trucks. Using the information of the operating area, climate characteristic, vehicle condition the decision model of disuse status was constructed using the classification machine learning technique. The proposed decision model of disuse status has an average accuracy of about 97% and can be used in the field. Based on the results of the study, the policy suggestions were proposed in the short and long term to improve the performance of decision model of disuse status of commercial vehicles in the future and to establish a new data construction method within the logistics information system.

Research on Application of Requirements-based Software Reliability Verification to Domestic Military Aircraft (요구사항 기반 소프트웨어 신뢰성 인증의 국내 군용 항공기 적용방안 연구)

  • Jeong, Sang-gyu;Seo, Young-jin;Jang, Min-uk;Lee, Yoon-woo
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.4
    • /
    • pp.264-270
    • /
    • 2018
  • In recent years, It is required to verify software reliability according to DO-178, which announced by radio technical commission for aeronautics (RTCA) and recognized by the Federal Aviation Administration (FAA), for civil aircraft developed or intended to fly in the United States or Europe. This is because the reliance on software in each field is deepening, and the efforts for improvement of software reliability have been made first in civil aviation field where economic and social impacts are catastrophic in the event of an accident. In this paper, we have identified some issues to be considered for requirements-based reliability verification required by DO-178 to improve software reliability and present the major elements of the present weapon system acquisition procedure of DAPA for each stage. In addition, we analyzed the results of applying the identified main check factors to a domestic aircraft development project based on the information accumulated in overseas aircraft development projects. As a result, we have shown that it is possible to verify requirements-based software reliability according to DO-178 by adding key checkpoints to the current weapon system acquisition procedure and providing objective inspection criteria.

Passive Benign Worm Propagation Modeling with Dynamic Quarantine Defense

  • Toutonji, Ossama;Yoo, Seong-Moo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.1
    • /
    • pp.96-107
    • /
    • 2009
  • Worm attacks can greatly distort network performance, and countering infections can exact a heavy toll on economic and technical resources. Worm modeling helps us to better understand the spread and propagation of worms through a network, and combining effective types of mitigation techniques helps prevent and mitigate the effects of worm attacks. In this paper, we propose a mathematical model which combines both dynamic quarantine and passive benign worms. This Passive Worm Dynamic Quarantine (PWDQ) model departs from previous models in that infected hosts will be recovered either by passive benign worms or quarantine measure. Computer simulation shows that the performance of our proposed model is significantly better than existing models, in terms of decreasing the number of infectious hosts and reducing the worm propagation speed.

Recent U.S. Efforts on RMA/MTR and Suggestions for ROK Military Progress (미국의 군사혁명(RMA/MTR)추세와 우리군의 미래발전방향)

  • 권태영;정춘일
    • Journal of the military operations research society of Korea
    • /
    • v.22 no.2
    • /
    • pp.1-17
    • /
    • 1996
  • Sun Tzu once clarified that "One who knows the enemy and knows himself will not be endangered in a hundred engagements, " while Clausewitz explained that "A victory will be guaranteed for one who can overcome 'fog and friction' at a battlefield." Now the U.S. is striving hard to develop an American version of RMA (Revolution in Military Affairs)/MTR (Military Technical Revolution) by utilizing its rapidly emerging information technology in the information age. The U.S. firmly believes that its RMA/MTR with less defense expenditure can provide all combat players in the battlespace with "dominant battle awareness, " by which no nation will be able to challenge U.S. military superiority. In this paper, the recent efforts of the U.S. Armed Forces on RMA/MTR will be briefly introduced, some lessons and expertises from the U.S. RMA/MTR are extracted, and, in this regard, several suggestions are provided for the progress of the ROK Armed Forces.gress of the ROK Armed Forces.

  • PDF

A Study on VV&A Application Method for Credibility Improvement of The DM&S for C4I Test and Evaluation (C4I체계 시험평가 국방M&S 신뢰도 향상을 위한 VV&A 적용방안 연구)

  • Kim, Kyung-Hee;Kang, Seok-Joong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.6
    • /
    • pp.1080-1090
    • /
    • 2010
  • A study for improvement of credibility on test & evaluation result of interoperability in battle management information system which focused in C4I systems is very essential in rapid change of battle field environment. Realization of effective operation process with integration of developed IT also core factor for reducing of operational response time such as information gathering from sensor to shooter, time for commander's decision making. Therefore, by required to meet of high technical T&E, meet of complex software's user requirement, long-term system development period, system integration ability's request by various linkage of systems, it is high a M&S dependency to optimal performance, interpoerability's guarantee. Especially credibility on test & evaluation using M&S is very important. This paper will propse a VV&A applied methods using other VV&A case to improve credibility of M&S on test & evaluation.

A Study for Development Plan of SAR Core Technology Through Technology Readiness Level Survey and Analysis (기술 수준조사 및 분석을 통한 SAR(합성개구면 레이다) 핵심기술 개발방안 연구)

  • Kwak, Jun-Young;Jeong, Dae-Gwon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.4
    • /
    • pp.655-662
    • /
    • 2011
  • SAR(Synthetic Aperture Radar) has the ability to generate high resolution images regardless of a weather condition(e.g. visibility good or poor and day or night, etc.). SAR is considered as one of the most important powers and needs for the future since it has been utilized in a number of important military fields such as early warning, urban defense, missile guidance system, etc. Additionally there are many civilian demands and applications in aviation, traffic control, earth and space explorations, weather forecast etc. This days, the ability to acquire and analyze information is needed to cope with the urgency of global politics and international changes. In this paper, technical survey and development review for SAR systems are investigated to derive the core and immature technologies of domestic defense industry.

Evaluation of the Use of Inertial Navigation Systems to Improve the Accuracy of Object Navigation

  • Iasechko, Maksym;Shelukhin, Oleksandr;Maranov, Alexandr;Lukianenko, Serhii;Basarab, Oleksandr;Hutchenko, Oleh
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.71-75
    • /
    • 2021
  • The article discusses the dead reckoning of the traveled path based on the analysis of the video data stream coming from the optoelectronic surveillance devices; the use of relief data makes it possible to partially compensate for the shortcomings of the first method. Using the overlap of the photo-video data stream, the terrain is restored. Comparison with a digital terrain model allows the location of the aircraft to be determined; the use of digital images of the terrain also allows you to determine the coordinates of the location and orientation by comparing the current view information. This method provides high accuracy in determining the absolute coordinates even in the absence of relief. It also allows you to find the absolute position of the camera, even when its approximate coordinates are not known at all.

The Digital Mock-Up Information System for New Car Development

  • Min, Sung-Ki;Lee, Chul-Woo
    • Proceedings of the CALSEC Conference
    • /
    • 1999.07a
    • /
    • pp.277-299
    • /
    • 1999
  • Since Chrysler Motor Co. had experienced the digital development system in the beginning of 1990's, most of leading automobile companies are trying to apply a digital information system for their own business process reengineering based upon concurrent engineering system from product planning phase. This is called as virtual DMU(Digital Mock-Up) system instead of the traditional PMU(Physical Mock-Up) system. By using the virtual prototype, all of the design requirements and system specifications can be checked, changed and optimized more quickly and more efficiently. This paper consists of five chapters for the DMU information system. In the 1$^{st}$ chapter, the principle of digital design system is suggested by using four basic modules such as product design module, process design module, manufacturing system design module and central control module. The basic scheme of DMU is introduced with the benefits of application in the chapter 2. In the chapter 3, a digital design process of new car development is explained with the detailed DMU design and design review processes. In the chapter 4, the practical DMU manufacturing techniques and applications are introduced as CAD/CAM analyses, DPA(Digital Pre-Assembly)reviews for development, production, operation and maintenance phases, digital tolerance analyses and digital factory analyses for assembling line simulation, automated robot welding processes, production jig & fixtures and painting process simulation. Finally, the activities of digital design support; CAS-styling, CAE-engineering and CAT-testing are summarized for design optimization in the chapter 5. As today's automobile manufactures and related business organizations are struggling to compete in the global marketplace, they are concentrating on efficient use of DMU information system to reduce the new car development cost, to have shorten the delivery schedule and to improve product design quality. To meet the demand of those automobile industries on digital information systems, the CALS(Computer aided Acquisition and Logistics Support) and EC(Electronic Commerce)initiative has been focused as a dominant philosophy in defense & commercial industries, specially automobile industries.s.

  • PDF

A pioneer scheme in the detection and defense of DrDoS attack involving spoofed flooding packets

  • Kavisankar, L.;Chellappan, C.;Sivasankar, P.;Karthi, Ashwin;Srinivas, Avireddy
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.5
    • /
    • pp.1726-1743
    • /
    • 2014
  • DDoS (Distributed Denial of Service) has been a continuous threat to the cyber world with the growth in cyber technology. This technical evolution has given rise to a number of ultra-sophisticated ways for the attackers to perform their DDoS attack. In general, the attackers who generate the denial of service, use the vulnerabilities of the TCP. Some of the vulnerabilities like SYN (synchronization) flooding, and IP spoofing are used by the attacker to create these Distributed Reflected Denial of Service (DrDoS) attacks. An attacker, with the assistance of IP spoofing creates a number of attack packets, which reflects the flooded packets to an attacker's intended victim system, known as the primary target. The proposed scheme, Efficient Spoofed Flooding Defense (ESFD) provides two level checks which, consist of probing and non-repudiation, before allocating a service to the clients. The probing is used to determine the availability of the requested client. Non-repudiation is taken care of by the timestamp enabled in the packet, which is our major contribution. The real time experimental results showed the efficiency of our proposed ESFD scheme, by increasing the performance of the CPU up to 40%, the memory up to 52% and the network bandwidth up to 67%. This proves the fact that the proposed ESFD scheme is fast and efficient, negating the impact on the network, victim and primary target.