• Title/Summary/Keyword: Mission implement

Search Result 69, Processing Time 0.022 seconds

Control Moment Gyroscope Torque Measurements Using a Kistler Table for Microsatellite Applications

  • Goo-Hwan Shin;Hyosang Yoon;Hyeongcheol Kim;Dong-Soo Choi;Jae-Suk Lee;Yeong-Ho Shin;EunJi Lee;Sang-sub Park;Seokju Kang
    • Journal of Space Technology and Applications
    • /
    • v.4 no.1
    • /
    • pp.12-26
    • /
    • 2024
  • Attitude control of a satellite is very important to ensure proper for mission performance. Satellites launched in the past had simple missions. However, recently, with the advancement of technology, the tasks to be performed have become more complex. One example relies on a new technology that allows satellites quickly alter their attitude while orbiting in space. Currently, one of the most widely used technologies for satellite attitude control is the reaction wheel. However, the amount of torque generated by reaction wheels is too low to facilitate quick maneuvers by the satellite. One way to overcome this is to implement posture control logic using a control moment gyroscope (CMG). Various types of CMGs have been applied to space systems, and CMGs are currently mounted on large-scale satellites. However, although technological advancements have continued, the market for CMGs applicable to, small satellites remains in its early stages. An ultra-small CMG was developed for use with small satellites weighing less than 200 kg. The ultra-small CMG measured its target performance outcomes using a precision torque-measuring device. The target performance of the CMG, at 800 mNm, was set through an analysis. The final torque of the CMG produced through the design after the analysis was 821mNm, meaning that a target tolerance level of 10% was achieved.

A Dynamic Orchestration Framework for Supporting Sustainable Services in IT Ecosystem (IT 생태계의 지속적인 운영을 위한 동적 오케스트레이션 프레임워크)

  • Park, Soo Jin
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.12
    • /
    • pp.549-564
    • /
    • 2017
  • Not only services that are provided by a single system have been various with the development of the Internet of Things and autonomous software but also new services that are not possible before are provided through collaboration between systems. The collaboration between autonomous systems is similar to the ecosystem configuration in terms of biological viewpoints. Thus, it is called the IT Ecosystem, and this concept has arisen newly in recent years. The IT Ecosystem refers to a concept that achieves a mission of each of a number of heterogeneous systems rather than a single system utilizing their own autonomy as well as achieving the objectives of the overall system simultaneously in order to meet a single common goal. In our previous study, we proposed architecture of elementary level and as well as basic several meta-models to implement the IT Ecosystem. This paper proposes comprehensive reference architecture framework to implement the IT Ecosystem by cleansing the previous study. Among them, a utility function based on cost-benefit model is proposed to solve the dynamic re-configuration problem of system components. Furthermore, a measure of using genetic algorithm is proposed as a solution to reduce the dynamic re-configuration overhead that is increased exponentially according to the expansion of the number of entities of components in the IT Ecosystem. Finally, the utilization of the proposed orchestration framework is verified quantitatively through probable case studies on IT Ecosystem for unmanned forestry management.

Adaptive Intrusion Tolerance Model and Application for Distributed Security System (분산보안시스템을 위한 적응형 침입감내 모델 및 응용)

  • 김영수;최흥식
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.6C
    • /
    • pp.893-900
    • /
    • 2004
  • While security traditionally has been an important issue in information systems, the problem of the greatest concern today is related to the availability of information and continuity of services. Since people and organizations now rely on distributed systems in accessing and processing critical services and mission, the availability of information and continuity of services are becoming more important. Therefore the importance of implementing systems that continue to function in the presence of security breaches cannot be overemphasized. One of the solutions to provide the availability and continuity of information system applications is introducing an intrusion tolerance system. Security mechanism and adaptation mechanism can ensure intrusion tolerance by protecting the application from accidental or malicious changes to the system and by adapting the application to the changing conditions. In this paper we propose an intrusion tolerance model that improves the developmental structure while assuring security level. We also design and implement an adaptive intrusion tolerance system to verify the efficiency of our model by integrating proper functions extracted from CORBA security modules.

S-FEAR: Secure-Fuzzy Energy Aware Routing Protocol for Wireless Sensor Networks

  • Almomani, Iman;Saadeh, Maha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1436-1457
    • /
    • 2018
  • Secure routing services in Wireless Sensor Networks (WSNs) are essential, especially in mission critical fields such as the military and in medical applications. Additionally, they play a vital role in the current and future Internet of Things (IoT) services. Lightness and efficiency of a routing protocol are not the only requirements that guarantee success; security assurance also needs to be enforced. This paper proposes a Secure-Fuzzy Energy Aware Routing Protocol (S-FEAR) for WSNs. S-FEAR applies a security model to an existing energy efficient FEAR protocol. As part of this research, the S-FEAR protocol has been analyzed in terms of the communication and processing costs associated with building and applying this model, regardless of the security techniques used. Moreover, the Qualnet network simulator was used to implement both FEAR and S-FEAR after carefully selecting the following security techniques to achieve both authentication and data integrity: the Cipher Block Chaining-Message Authentication Code (CBC-MAC) and the Elliptic Curve Digital Signature Algorithm (ECDSA). The performance of both protocols was assessed in terms of complexity and energy consumption. The results reveal that achieving authentication and data integrity successfully excluded all attackers from the network topology regardless of the percentage of attackers. Consequently, the constructed topology is secure and thus, safe data transmission over the network is ensured. Simulation results show that using CBC-MAC for example, costs 0.00064% of network energy while ECDSA costs about 0.0091%. On the other hand, attacks cost the network about 4.7 times the cost of applying these techniques.

Development of Message Define & Management System based on Distributed Processing Environment for Naval Combat Systems (함정 전투체계를 위한 분산처리 환경 기반 메시지 정의 및 관리 시스템의 개발)

  • Lee, Juwon
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.12
    • /
    • pp.670-676
    • /
    • 2017
  • Naval combat systems use real-time processing and compositing of collected information to provide the optimal combat capabilities that maximize survival and ensure mission effectiveness. The software for a combat system has dozens to thousands of components depending on the size of the system, and the communication between the components is achieved via DDS. Although the message interface of the combat system is managed through MDMS, an increase in the system size can result in problems such as the deterioration of the development efficiency. In this paper, we implement XMDMS to operate a distributed processing environment and then solve the problem of the reduction in the development efficiency caused by a load at the server. The experimental results shows that XMDMS improves the processing delay and network performance compared to MDMS.

Product Line Development Process for Mobile Software based on Product Line (프로덕트 라인 기반의 모바일 소프트웨어 개발 프로세스)

  • Kim Haeng-Kon;Son Lee-Kyeong
    • The KIPS Transactions:PartD
    • /
    • v.12D no.3 s.99
    • /
    • pp.395-408
    • /
    • 2005
  • Ubiquitous computing spans a very broad range of technologies and needs very complicated user's requirements. There are many scenarios and technologies involved in ubiquitous computing. We need new software development tools and methodology to meet the requirements. A software product line is one of promising new technology for it. A software product line is a set of software intensive systems that share a common, managed set of features satisfying the specific needs of a particular market segment or mission and that are developed from a common set of core assets. Software architecture-based development is the exploration and maturation of the role of software architecture in the product line life cycle. In this thesis, we identify the foundational concepts underlying software product lines and the essential activities to develop the mobile application systems. So, we define, design, and implement the Mobile Application System Architecture(MASA) that includes the development process for applying into mobile business domain and encompass scoping and gathering requirements for the Product line based on Component Based Development(CBD).

Development of an Advanced Rotorcraft Preliminary Design Framework

  • Lim, Jae-Hoon;Shin, Sang-Joon;Kim, June-Mo
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.10 no.2
    • /
    • pp.134-139
    • /
    • 2009
  • Various modules are generally combined with one another in order to perform rotorcraft preliminary design and its optimization. At the stage of the preliminary design, analysis fidelity is less important than the rapid assessment of a design is. Most of the previous researchers attempted to implement sophisticated applications in order to increase the fidelity of analysis, but the present paper focuses on a rapid assessment while keeping the similar level of fidelity. Each small-sized module will be controlled by an externally-operated global optimization module. Results from each module are automatically handled from one discipline to another which reduces the amount of computational effort and time greatly when compared with manual execution. Automatically handled process decreases computational cycle and time by factor of approximately two. Previous researchers and the rotorcraft industries developed their own integrated analysis for rotorcraft design task, such as HESCOMP, VASCOMP, and RWSIZE. When a specific mission profile is given to these programs, those will estimate the aircraft size, performance, rotor performance, component weight, and other aspects. Such results can become good sources for the supplemental analysis in terms of stability, handling qualities, and cost. If the results do not satisfy the stability criteria or other constraints, additional sizing processes may be used to re-evaluate rotorcraft size based on the result from stability analysis. Trade-off study can be conducted by connecting disciplines, and it is an important advantage in a preliminary design study. In this paper among the existing rotorcraft design programs, an adequate program is selected for a baseline of the design framework, and modularization strategy will be applied and further improvements for each module be pursued.

Implementation of JDAM virtual training function using machine learning

  • You, Eun-Kyung;Bae, Chan-Gyu;Kim, Hyeock-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.9-16
    • /
    • 2020
  • The TA-50 aircraft is conducting simulated training on various situations, including air-to-air and air-to-ground fire training, in preparation for air warfare. It is also used for pilot training before actual deployment. However, the TA-50 does not have the ability to operate smart weapon forces, limiting training. Therefore, the purpose of this study is to implement the TA-50 aircraft to enable virtual training of one of the smart weapons, the Point Direct Attack Munition (JDAM). First, JDAM functions implemented in FA-50 aircraft, a model similar to TA-50 aircraft, were analyzed. In addition, since functions implemented in FA-50 aircraft cannot be directly utilized by source code, algorithms were extracted using machine learning techniques(TensorFlow). The implementation of this function is expected to enable realistic training without actually having to be armed. Finally, based on the results of this study, we would like to propose ways to supplement the limitations of the research so that it can be implemented in the same way as it is.

Concept Design of Angular Deviation and Development of Measurement System for Transparency in Aircraft (항공기 투명체의 편각개념 설계 및 측정 시스템 개발)

  • Moon, Tae-Sang;Woo, Seong-Jo;Kwon, Seong-Il;Ryu, Kwang-Yeol
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.38 no.11
    • /
    • pp.1123-1129
    • /
    • 2010
  • Angular Deviation(AD) on transparency applied to TA-50 Aircraft deteriorates armament system's accuracy because it makes a difference in between actual and theoretical targets. In order to increase accuracy, therefore, TA-50 Aircraft measures AD on transparency and provide the measured values for the integrated mission display computer as a type of AD coefficients. This makes AD revised so that pilots can accurately see the actual target on their head-up display. In order to implement such mechanism into a real field, we develop a new device and system automatically measuring AD for the first time. We also deal with basic concept including AD induction formula as well as operating systems. As a consequence of testing the accuracy and precision for verifying reliability of the system, we got satisfactory results. In specific, the accuracy was within the resultant criterion of 1%. The precision was also satisfied with respect to the whole criteria. The system developed through this research is qualified as a military standard equipment for transparency of the canopy.

Empirical Capability Assessment Methodology of Quick Look using Weapon Score of Joint Integrated Contingency Model (전구급 워게임 모형의 무기점수를 활용한 Quick Look의 실증적 능력평가 방법론)

  • Kim, Hyungkwon;Kim, Youngho
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.1
    • /
    • pp.55-67
    • /
    • 2017
  • The requirement planning system of Korea military has used top down planning approach after introducing Joint Combat Development System since 2007. But this new system has not been propelled harmoniously because it does not have any connection with the current planning system. Due to current time-exhaustive analysis and assessment process in requirement planning system, it not only delays proper decision making, but also hinders understanding on the problem in a whole perspectiveand finding a reasonable solution to our problem. In this study, we present a methodology which can analyze and assess capability utilizing the weapon score of JICM(Joint Integrated Contingency Model). The process identifies capability gap from a mission-oriented perspective in the requirement planning phase and suggests an appropriate solution to our problem. A Quick Look tool which has been developed using Python Script to implement the methodology is also introduced in this study.