• Title/Summary/Keyword: Defense acquisition process

Search Result 130, Processing Time 0.025 seconds

A Study on the Improvement for RAM for Weapon Systems (무기체계 신뢰도 향상방안 연구)

  • Choi, Seok-Cheol;Son, Mun-Kuk
    • Journal of Applied Reliability
    • /
    • v.8 no.1
    • /
    • pp.39-59
    • /
    • 2008
  • The performance of weapon system, based on the acceleration of advanced scientific technology, has been reinforced to the state of precision, complexion and multi-function. People have given great interest for a long time on its development, acquisition cost and enormous expense of operation/support. Under this environmental situation, this research paper proposes two kinds of implementation that can improve the RAM(Reliability, Availability, Maintainability) on weapon system. The first section is to understand all of the actual states on its reliability, in the acquisition process and to make the improvement for RAM at the milestones on the acquisition steps. The next section is to establish a defense RAM center, which will be closely cooperated with acquisition organization such as Ministry of Defense, DAPA(Defense Acquisition Program Administration), DTaQ(Defense agency for Technology and Quality) and ADD(Agency for Defense Development), etc. and to conclusively improve the RAM of weapon system in South Korea.

  • PDF

A Study on the AoA Based Defense Decision Making

  • Lee, Kyoung Haeng;Kwon, Yong Soo
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.7 no.1
    • /
    • pp.1-7
    • /
    • 2011
  • This work describes a study on the Analysis of Alternatives (AoA) based defense decision making. Future battle-space is transformed into a System of Systems (SoS) concept which is accomplished missions and their functions through network based battle management systems under forming their grids of various sensors and shooters in a single theater. The acquisition process is, therefore, changing over from single system requirements to capabilities based acquisition of SoS. AoA help to justify the need for starting, stopping, or continuing an acquisition program. AoA identify potentially viable solutions and provide comparative cost, effectiveness, and risk assessments of each solution to a baseline. The decision making must consider not only cost-effectiveness, risk, and military worth, but also domestic policy, foreign policy, technological maturity of the solution, the environment, the budget, treaties, and a host of additional factors. In this point of view, this paper analyzes AoA template which are critical elements of the defense decision making. From results of this analysis of AoA template for Korean acquisition environment are presented.

Suggestions for IT Convergence on Defense in the IT Firm's Perspective (IT기업 관점에서의 국방IT융합 추진방향)

  • Lee, Dong Hoon;Lee, Sangho
    • Journal of Information Technology Services
    • /
    • v.13 no.1
    • /
    • pp.57-69
    • /
    • 2014
  • IT convergence technology can boost the advancement of weapon systems and efficient operation for the military reformation in Korea. This study investigated IT firms' concern about the defense acquisition process for IT-convergent systems and the role of IT firms in the process with Focus Group Interview and in-depth interview on executives of IT firms, and classified the concern to three major issues. They are the clarification of IT firms' role in the defense IT-convergent efforts, the establishment of the control tower for defense IT convergence, and reasonable estimation of software development cost in the defense acquisition process.

RUP Model Based SBA Effectiveness Analysis by Considering the V Process and Defense Simulation Hierarchy (V 프로세스와 국방시뮬레이션 모델유형을 고려한 RUP 모델 기반의 SBA 효과도 분석)

  • Cha, HyunJu;Kim, Hyung Jong;Lee, Hae Young
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.3
    • /
    • pp.55-60
    • /
    • 2015
  • This paper presents an SBA (simulation-based acquisition) effectiveness analysis environment using the RUP (Relational Unified Process) model. The RUP model has 4 phases which cover the whole development steps such as requirement analysis, design, development and test. By applying the RUP model, SW development can be represented with the iterations of developments for each phase. Such a characteristics of the model would make the model suitable for defense acquisition. In this paper, we show the relation between the RUP model and V process model, which is the foundation for defense acquisition. In order to show how the model could be applied to SBA effectiveness analysis, graphical user interfaces for the analysis are presented at the end of the paper.

A Study on the Analysis of Information Management of the Defense M&S and Improvement of Aquisition Supporting System (국방M&S 정보관리 현황분석 및 획득업무 지원체계 개선방안 연구)

  • Jeong, Hye-soo;Ahn, Ho-il;Yang, Jin-seok
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.131-138
    • /
    • 2020
  • The SBA Integrated Information system is constructed and operated for scientific and systematic management of Defense information utilizing whole process of weapon system acquisition from requirement institution to operation maintenance. In order to utilize m&s resources actively and effectively in the life cycle of weapon system acquisition, efficient management plans of the SBA integrated Information system is required. As a result of identifying usage on SBA Information system and performance of operation performance measurement, it was defined that establishment of the SBA Integrated Information system process and provision of detailed system are mandatory for activating m&s resource and supporting process of acquisitions. In this study, Defense m&s information system is analyzed and improvement plans of SBA Integrated Information system is provided for efficient operation of SBA integrated Information system.

A Study on the Organization and Procedures for Acquiring Power Support System and the Development of Collaborative System (전력지원체계 획득조직 및 절차와 협업체계 발전방안 연구)

  • Kyojoon Choo;Myoungjin Choi
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.4
    • /
    • pp.304-311
    • /
    • 2023
  • The 4th Industrial Revolution and the continuous development of Science and Technology have also required a speedy business promotion method in the defense industry. Advanced countries including the United States are already boldly innovating the existing high-cost and long-term acquisition system with the highest priority in weapons development to cope with the military rise of Russia and China. The Ministry of National Defense and the Defense Acquisition Program Administration have also recently introduced a quick acquisition system and are applying it to business promotion. In addition, some small-scale projects and weapons systems are being reorganized so that they can be managed by the units demanding them. After an organizational diagnosis of the Project Acquisition Group by the Ministry of National Defense in 2020, it has been reassigned as a subordinate unit of the Army Logistics Command from a direct unit managed by the Army HQ. As a result, problems such as work conflict or redundancy have been identified. In addition, a system has been implemented to shorten the acquisition period by applying a rapid acquisition program in the field of weapons systems by benchmarking the rapid acquisition program of advanced countries. The force support system project process will also need to introduce such a quick acquisition system. In addition, the Ministry of National Defense is considering ways to delegate some weapon systems to each military, which will then carry out tasks ranging from requirements determination to project management. Accordingly, it is now time to expand the organization for the management of the Army's weapons system acquisition project. Therefore, in this paper, the Army Project Acquisition Group was analyzed on its organization, acquisition procedures, and cooperation systems, with presentations of development plans for each field.

A Standardization of Program Management Process based on BPM for Korea Defense Acquisition (BPM 기반 국방사업관리 프로세스 표준화)

  • Lee, Hee-Sung;Kim, Ho-Kyung;Park, Jin-Sub
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2008.11a
    • /
    • pp.84-87
    • /
    • 2008
  • 방위사업청은 방위력개선업무의 투명성, 효율성, 전문성을 제고하는 한편, 방산 경쟁력을 강화하기 위해 "통합사업관리정보체계" 구축 사업을 추진 중이다. 동 체계는 전사적개념으로 국방사업관리 전반에 BPM을 적용한 최초의 사례로서, 이의 적용을 통해 업무정보의 효율적인 공유, 신속한 업무처리, 효율적인 협업 및 의사소통이 기대된다. 본 논문에서는 "통합사업관리정보체계"에 BPM을 도입하는 과정을 소개하는 한편, 이를 통한 업무에 대한 면밀한 분석 및 통합, 업무 프로세스의 표준화 및 체계 구현 결과를 기술하고, 동 체계내 BPMS 구축과정에서 발생한 이론과 실제의 차이와 교훈, 발전방향을 도출한다.

  • PDF

Transition of ACTD by Measuring the Technology Readiness Level (기술성숙도 측정을 통한 ACTD 과제 전이 결정에 관한 연구)

  • Bae, Yoon-Ho;Choin, Seok-Cheol;Moon, Hee-Seung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.1
    • /
    • pp.60-69
    • /
    • 2009
  • Recently, request far application of advanced commercial technology to the defense acquisition process, to reduce the budget and shorten development time, has been increased. To accomplish these goals, the Advanced Concept Technology Demonstration(ACTD) is used for the defense acquisition process in Korea. And User Utility Assessment is tested to make a decision for transition to acquisition process. But this process does not include measurement of technology maturity and impacts of interface and interaction among the technologies. In this research, we propose the needs of measurement of TRL and IRL and application of SRL to reduce the risk during development phase, to understand the relations of technologies, and to fulfill the requirement far transition of the ACTD project to system development and demonstration process.

An Analysis of Weapon Systems Operational Requirements Document in National Defense Acquisition Process (국방획득 프로세스의 무기체계 운용요구서 작성사례 분석)

  • Hur, Jangwan;Oh, Kyungwon
    • Journal of Aerospace System Engineering
    • /
    • v.11 no.2
    • /
    • pp.1-8
    • /
    • 2017
  • Delivering clear requirements of the military in the defense acquisition process is a key activity for successful weapon acquisition. In the field of defense, Operational Requirements Documents (ORDs) are prepared to derive and deliver the requirements of the military. In this study, we compare and analyze the form and content of the recent domestic ORD with reference to the US Department of Defense (DoD) ORD. As a result of the study, it is found that the domestic ORD form needs to be supplemented with in accordance with the purpose of the operation, while the requirement parameter, which is a core item of ORD, is insufficient. In order to address these issues, detailed contents of the ORD form suitable for the purpose of this study are presented. Also, we provide clear definitions, explanations, and examples of the operational system's key performance parameters and suggest ways to clearly communicate the requirements of the military.

Applying Cybersecurity and Anti-Tamper Methods for Secure Operating of Unmanned Weapon Systems (무인화 무기체계의 안정적인 운용을 위한 Cybersecurity 및 Anti-Tamper의 적용)

  • Lee, Min Woo
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.16 no.1
    • /
    • pp.36-42
    • /
    • 2020
  • Due to the population of the Republic of Korea is getting less, the shortage of available troops has become a big issue. In response to this, the need for Unmanned weapon systems is rising. To operate an Unmanned weapon system near borderlines or low altitude, it is necessary to protect not only the system itself but also operational information communicated between the Unmanned system and control station, so that they should be safe using Cybersecurity measures. Besides, it is critical to protect a few core technologies applied to Unmanned weapon systems throughout the Anti-Tamper measures. As the precedent studies only focus partially, Cybersecurity or Anti-Tamper, it is acknowledged that comprehensive studies are needed to be conducted. This study is to incorporate both concepts into Korea's defense acquisition process. Specifically, we will outline the concepts and needs of Cybersecurity and Anti-Tamper, and briefly present ways to apply them simultaneously.