• Title/Summary/Keyword: Mission management

Search Result 471, Processing Time 0.027 seconds

Mission Management Technique for Multi-sensor-based AUV Docking

  • Kang, Hyungjoo;Cho, Gun Rae;Kim, Min-Gyu;Lee, Mun-Jik;Li, Ji-Hong;Kim, Ho Sung;Lee, Hansol;Lee, Gwonsoo
    • Journal of Ocean Engineering and Technology
    • /
    • v.36 no.3
    • /
    • pp.181-193
    • /
    • 2022
  • This study presents a mission management technique that is a key component of underwater docking system used to expand the operating range of autonomous underwater vehicle (AUV). We analyzed the docking scenario and AUV operating environment, defining the feasible initial area (FIA) level, event level, and global path (GP) command to improve the rate of docking success and AUV safety. Non-holonomic constraints, mounted sensor characteristic, AUV and mission state, and AUV behavior were considered. Using AUV and docking station, we conducted experiments on land and at sea. The first test was conducted on land to prevent loss and damage of the AUV and verify stability and interconnection with other algorithms; it performed well in normal and abnormal situations. Subsequently, we attempted to dock under the sea and verified its performance; it also worked well in a sea environment. In this study, we presented the mission management technique and showed its performance. We demonstrated AUV docking with this algorithm and verified that the rate of docking success was higher compared to those obtained in other studies.

Accident of Special Mission Helicopter and Safety Management (특수임무 헬리콥터의 사고분석과 안전관리)

  • Choi, Youn-Chul
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.16 no.4
    • /
    • pp.63-68
    • /
    • 2008
  • Compared with past, helicopters have remarkably high level of safety and accidents due to mechanical defects are decreased about 15%. Most of their duties, however, are to commit at duty area which is hard to access. Because of them, collision probability is high and also has relatively higher accident rates than other aircraft with special mission. A result of analysis is that accident rate is relative high with prevention of disasters, putting out a fire and crop-dusting missions under 500ft. In addition, most of accidents are related with human factors. According to this, it is required to pilots who carry these mission that safety education and detailed analysis about their mission.

  • PDF

Analysis of Dedicated Mission Software Architecture for Unmanned Vehicles for Public Mission (공공임무를 위한 무인이동체 탑재용 임무소프트웨어 구조 분석)

  • Park, Jong-Hong;Choi, Sungchan;Ahn, Il-Yeup
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.3
    • /
    • pp.435-440
    • /
    • 2020
  • The application of the unmanned vehicles in various fields has been attracting attention, and the development of a service utilizing unmanned vehicles has been proceeding. As the service market using the unmanned vehicles rapidly increases, the demand for the development of software for performing the mission with unmanned vehicles is increasing. In particular, as the demand for unmanned vehicle utilization services for public missions such as fire detection, mail delivery, and facility management increases, the importance of developing mission software for unmanned vehicle is increasing. To develop common mission software, architecture design should be made so that unmanned vehicle service provider can easily develop software using reusable libraries or functions through analysis commonly required by various public institutions. In this paper, we discuss the research trends of mission software for public mission unmanned vehicles. In addition, the architecture design of developing formal mission software is proposed. Finally, we propose a data transfer architecture between mission software and data platform.

A management scheme of departed network in the crowd group (군집 그룹에서 이탈 네트워크에 대한 관리 방안)

  • Park, Sangjoon;Lee, Jongchan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.541-542
    • /
    • 2021
  • In this paper, we consider the straggled network treatment in multiple sensor groups. During the moving or the implement of mission, the departed network should be handled. The loss of network group affects the mission implement of overall sensor networks, and it also requests the immediate treatment. In urgent mission environments, the network management of mobile sink should be considered to the group damage.

  • PDF

Autonomous Mission Management Software Design and Verification Technique for Unmanned Aerial Vehicles (무인기 자율 임무관리 소프트웨어 설계 및 검증 기법)

  • Chang, Woohyuk;Lee, Seung-Gyu;Kim, Yun-Geun;Oh, Taegeun
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.6
    • /
    • pp.505-513
    • /
    • 2021
  • We propose an autonomous mission management software design and verification technique for unmanned aerial vehicles to autonomously mitigate dynamic situation changes occurred in the inside and outside of an aircraft in compliance with the mitigation priority order. The proposed autonomous mission management software is designed in a modular architecture that consists of concurrently executing multiple threads. To verify it, we suggest three verification steps: 1) software integration by checking the expected request/response messages between the threads for all possible dynamic situation changes; 2) integration test to verify the software functionality; 3) performance test to verify the quantitative software performance. Especially, the software integration test environment is built and utilized to carry out the integration and performance tests.

A Study on Selection of Core Services for Deciding ISMS Scope

  • Kang, Hyunsik;Kim, Jungduk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.2
    • /
    • pp.51-57
    • /
    • 2017
  • The first thing to be prioritized is to set the scope of the management system when establishing an information security management system for systematic and effective information security management. It is important to set the scope for an organization's information security goals due to the scope affects the organization's overall information security activities. If the scope is set incorrectly, it might become impossible to protect important services and therefore, the scope of the management system should be determined in consideration of the core business services of the organization. We propose a core service selection model based on the organization's mission-critical service and high risk service in order to determine the effective information security management system scope in this paper. Core service selection criteria include the type of service, contribution to sales, socio-economic impact, and linkage with other services.

A Simple Thermal Model of Fuel Thermal Management System in Aircraft Engine

  • Youngjin Kim;Jeonghwan Jeon;Gonghoe Gimm
    • Journal of Aerospace System Engineering
    • /
    • v.17 no.5
    • /
    • pp.11-18
    • /
    • 2023
  • The architecture of the Fuel Thermal Management System (FTMS) in a commercial aircraft engine was built to model and simulate the fuel system. The study shows the thermal interactions between the fuel and engine lubrication oil through the mission profile of a high bypass ratio, two-spool turbofan engine. Fuel temperature was monitored as it flowed through each sub-component of the fuel system during the mission. The heat load in the fuel system strongly depended on the fuel flow rate, and was significantly increased for the periods of cruise and descent with decrease of fuel flow rate, rather than for the periods of take-off. Due to the thermal interaction in the pump housing, the fuel temperature at the outlet of the low-pressure pump was increased (4.0, 9.2, and 30.0) % over the case without thermal interaction for take-off, cruise, and descent, respectively.

A Study on the Assessment of Critical Assets Considering the Dependence of Defense Mission (국방 임무 종속성을 고려한 핵심 자산 도출 방안 연구)

  • Kim Joon Seok;Euom Ieck Chae
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.189-200
    • /
    • 2024
  • In recent years, the development of defense technology has become digital with the introduction of advanced assets such as drones equipped with artificial intelligence. These assets are integrated with modern information technologies such as industrial IoT, artificial intelligence, and cloud computing to promote innovation in the defense domain. However, the convergence of the technology is increasing the possibility of transfer of cyber threats, which is emerging as a problem of increasing the vulnerability of defense assets. While the current cybersecurity methodologies focus on the vulnerability of a single asset, interworking of various military assets is necessary to perform the mission. Therefore, this paper recognizes these problems and presents a mission-based asset management and evaluation methodology. It aims to strengthen cyber security in the defense sector by identifying assets that are important for mission execution and analyzing vulnerabilities in terms of cyber security. In this paper, we propose a method of classifying mission dependencies through linkage analysis between functions and assets to perform a mission, and identifying and classifying assets that affect the mission. In addition, a case study of identifying key assets was conducted through an attack scenario.

Introduction of Smart-Management into the System of Public Management of Regional Development in the Context of Strengthening National Security of Ukraine

  • Ivashova, Liudmyla;Larin, Stanislav;Shevchenko, Nataliia;Antonova, Liudmyla;Yurchenko, Serhii;Kryshtanovych, Myroslav
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.369-375
    • /
    • 2022
  • The article substantiates the need and shows the features of introducing SMART management into the system of public management of regional development in the context of strengthening the national security of Ukraine. Disclosed are such provisions as: goal-setting; state mission; state mission in Ukraine; goals of the Ukrainian state; strategic management priorities in Ukraine. Differences between the purpose of the organization and the purpose of the state are determined. The characteristic of the goal at the state level is given. The management standards in SMART management are characterized. The issues of the exhaustibility of existing SMART criteria are reviewed and it is proposed to supplement them with two such as: inspiration (inspiration) and ity (ethics). Two main principles are defined (evaluated (assessment), reviewed (review)), which must be observed when introducing SMART management into the system of public management of regional development in the context of strengthening the national security of Ukraine.

Protection Management for Guaranteed User-Driven Virtual Circuit Services in Dynamic Multi-domain Environments: Design Issues and Challenges

  • Lim, Huhnkuk
    • ETRI Journal
    • /
    • v.37 no.2
    • /
    • pp.369-379
    • /
    • 2015
  • Fault management of virtualized network environments using user-driven network provisioning systems (NPSs) is crucial for guaranteeing seamless virtual network services irrespective of physical infrastructure impairment. The network service interface (NSI) of the Open Grid Forum reflects the need for a common standard management API for the reservation and provisioning of user-driven virtual circuits (VCs) across global networks. NSI-based NPSs (that is, network service agents) can be used to compose user-driven VCs for mission-critical applications in a dynamic multi-domain. In this article, we first attempt to outline the design issues and challenges faced when attempting to provide mission-critical applications using dynamic VCs with a protection that is both user-driven and trustworthy in a dynamic multi-domain environment, to motivate work in this area of research. We also survey representative works that address inter-domain VC protection and qualitatively evaluate them and current NSI against the issues and challenges.