• Title/Summary/Keyword: National Defense Weapons

Search Result 81, Processing Time 0.021 seconds

Attack Capability Analysis for Securing Self-Survival of Air Defense Weapons (대공방어무기의 자기생존성 확보를 위한 공격능력분석)

  • Kim, Sea Ill;Shin, Jin
    • Journal of the Korea Society for Simulation
    • /
    • v.30 no.3
    • /
    • pp.11-17
    • /
    • 2021
  • The 30mm anti-aircraft gun has been developed with various types of weapon systems such as protective, protective complex, and wheel-type anti-aircraft artillery. The role of this anti-aircraft gun is an important anti-aircraft weapon in charge of air defense. Anti-aircraft weapons are tasked with defending the airspace from aircraft attacks. In particular, anti-aircraft weapons are organized in combination with mechanized units. And anti-aircraft weapons are prone to attack by enemies because they operate on the front lines of the battlefield. The enemy is expected to attack our troops by covering up or concealing as much as possible in order to increase their viability. Therefore, this study analyzed whether our 30mm anti-aircraft bullets could subdue the enemy in cover. This study analyzed the performance of 30mm anti-aircraft bullets using the M&S technique. For this study, live shooting and simulation method by M&S were used for the experiment. In this study, steel plate and plywood were used for the live shooting experiment. In addition, in the simulation process through M&S, this study used the PRODAS model, AUTODYN model, and Split-x model to analyze the trajectory, penetration, and fragmentation capability of 30mm anti-aircraft bullets. According to the experimental results, it has been proven that 30mm anti-aircraft bullets can destroy enemy armored vehicles. 30mm anti-aircraft bullets succeeded in quickly subduing enemies concealed in general buildings or forests. In this way, it was possible to minimize damage to allies in advance.

A Study on the Evaluation Method of Defense Technology Valuation Using the Readability Level Assessment of Core National Defense Technology (국방 핵심기술의 성숙도(Readiness Level)평가를 활용한 국방기술가치평가 방안 연구)

  • Lee, Hyung-Seog;Shin, Chung-Jin;Kang, Seok-Joong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1710-1719
    • /
    • 2019
  • This study is intended to understand defense technologies that require the convergence of various technologies and the integration of systems, and to propose valuation methods that reflect the characteristics of each field. The measure of technology level, integration (system integration technology) between technologies, preparation of manufacturing, and maturity scale of the weapons system to be valued are measured according to the items of measurement factors to verify system performance, and to present a framework for estimating the quantitative values of core technologies using system maturity. Considering the characteristics of each technology field, the research suggests a proper valuation method. In evaluating the value of defense technologies, A proposal is made to evaluate the value of defense technology by competent technical experts in each field, using SRL, which can be evaluated according to the evaluation criteria reflecting the technical characteristics of each field, and to evaluate the completion of the entire system in quantitative terms.

An assessment of sanctions on North Korea and the prospect (대북 제재 조치 평가 및 전망)

  • Cheon, Seong- Whu
    • Strategy21
    • /
    • s.31
    • /
    • pp.5-26
    • /
    • 2013
  • The South Korean society has experienced many changes since the sinking of ROKS Cheonan. The government reviewed its defense posture and adopted the 5·24 Measure in its relations with North Korea. As a result, the people of South Korea became more conscious of security situations on the Korean peninsula while North Korea's economy suffered badly. Meanwhile, the South Korean government has taken a flexible stance toward North Korea in terms of exchange and cooperation since September 2011. The flexible stance was to manage inter-Korea relations in a stable manner and relieve the hardships of the North Korean people while preserving the spirits and purposes of the 5·24 Measure. The UN Security Council adopted twenty-six resolutions and statements on North Korea since June 25, 1950. They include thirteen U.N. Security Council resolutions including those concerning nuclear weapons or missile programs, nine Presidential statements, and four press statements. Resolution 82, the first U.N. resolution on North Korea, came when the Korean War broke out. Resolution 825, the first one related to nuclear or missile programs, was adopted in response to North Korea's withdrawal from the NPT. Apart from these U.N. resolutions, the United States has imposed separate sanctions against North Korea. North Korea's nuclear weapons program can be considered in comparison with that of Iran in terms of the consequences they create for the regional security. The Security Council has adopted six resolutions on Iran so far. One should note that the resolutions on Iran have had much stronger sanctions compared to those imposed on North Korea. That is, while the North Korea case may be viewed as a more serious threat to international security from the perspective of nuclear weapons development or proliferation, tougher sanctions have been placed on Iran. There are two approaches that South Korea should take in addressing the related issues. First, we should aim to reduce the gap between sanctions imposed on Iran and North Korea. It is difficult to understand that a country with more serious problems is rewarded with lighter sanctions. We should take measures through the Security Council Sanctions Committee to make individuals and groups in North Korea that play a central role in developing nuclear weapons and missiles subject to additional sanctions. Second, we have to change. Other countries in the international community have become tired of North Korea's nuclear issue and now they look to South Korea for initiative. We should correctly understand this current situation and play a leading role within our capacity. Knowingly and unknowingly, the notion that the North Korean nuclear issue may be left to South Korea has been spread around the international community. Although the situation is grave, we should try to open a new horizon in ushering in the unification era by taking the initiative with confidence that there is a looming hope ahead of us. For these tasks, we should stop thinking in the old way that has been ossified for the last two decades. We should not be pushed around by neighboring great powers in dealing with North Korea related issues anymore; we should take the initiative with resolution that we will play our role at the center of four great powers and with confidence that we can do it. Based on the confidence that the Republic of Korea has become a country with enough capacity to take the initiative, we should establish a 'National Grand Strategy' representing South Korea's strategic vision that the unification is the ultimate solution to the problems related to North Korea's nuclear weapons program.

  • PDF

Stochastic Weapon Target Assignment Problem under Uncertainty in Targeting Accuracy (명중률의 불확실성을 고려한 추계학적 무장-표적 할당 문제)

  • Lee, Jinho;Shin, Myoungin
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.41 no.3
    • /
    • pp.23-36
    • /
    • 2016
  • We consider a model that minimizes the total cost incurred by assigning available weapons to existing targets in order to reduce enemy threats, which is called the weapon target assignment problem (WTAP). This study addresses the stochastic versions of WTAP, in which data, such as the probability of destroying a target, are given randomly (i.e., data are identified with certain probability distributions). For each type of random data or parameter, we provide a stochastic optimization model on the basis of the expected value or scenario enumeration. In particular, when the probabilities of destroying targets depending on weapons are stochastic, we present a stochastic programming formulation with a simple recourse. We show that the stochastic model can be transformed into a deterministic equivalent mixed integer programming model under a certain discrete probability distribution of randomness. We solve the stochastic model to obtain an optimal solution via the mixed integer programming model and compare this solution with that of the deterministic model.

The Study on Airworthiness Certification Process on Military Airborne Safety Critical Software based on DO-178 (DO-178 기반의 군용항공기 탑재 안전필수 소프트웨어 감항인증 방안에 대한 고찰)

  • Heo, Jin Gu;Kim, Min Sung;Kim, Man Tae;Moon, Yong Ho
    • Journal of Aerospace System Engineering
    • /
    • v.13 no.1
    • /
    • pp.62-68
    • /
    • 2019
  • The software installed on an aircraft is directly related to its safety. Therefore, it shall comply with the standards of the airworthiness certification to ensure safety of flight. Airborne software should be developed in accordance with the DO-178 (Software Consideration in Airborne Systems and Equipment Certification) to comply with the airworthiness certification criterion. However, the military airborne software has been developed in accordance with the DAPA weapons system software development and management manual. In this paper, we completed a questionnaire survey of software experts. We also suggest a military airborne software development/certification process based on DO-178.

A Study on the Finding of Promising Export Items in Defense industry for Export Market Expansion-Focusing on Text Mining Analysis-

  • Yeo, Seoyoon;Jeong, Jong Hee;Kim, Seong Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.10
    • /
    • pp.235-243
    • /
    • 2022
  • This paper aims to find promising export items for market expansion of defense export items. Germany, the UK, and France were selected as export target countries to obtain unstructured forecast data on weapons system acquisition plans for the next ten years by each country. Using the TF-IDF in text mining analysis, keywords that appeared frequently in data from three countries were derived. As a result of this paper, keywords for each country's major acquisition projects drawing. However, most of the derived keywords were related to mainstay weapon systems produced by domestic defense companies in each country. To discover promising export items from text mining, we proposed that the drawn keywords are distinguished as similar weapon systems. In addition, we assort the weapon systems that the three countries will get a plan to acquire commonly. As a result of this paper, it can be seen that the current promising export item is a weapon system related to the information system. Prioritizing overseas demands using key words can set clear market entry goals. In the case of domestic companies based on needs, it is possible to establish a specific entry strategy. Relevant organizations also can provide customized marketing support.

A Study on the Metadata Schema for the Collection of Sensor Data in Weapon Systems (무기체계 CBM+ 적용 및 확대를 위한 무기체계 센서데이터 수집용 메타데이터 스키마 연구)

  • Jinyoung Kim;Hyoung-seop Shim;Jiseong Son;Yun-Young Hwang
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.161-169
    • /
    • 2023
  • Due to the Fourth Industrial Revolution, innovation in various technologies such as artificial intelligence (AI), big data (Big Data), and cloud (Cloud) is accelerating, and data is considered an important asset. With the innovation of these technologies, various efforts are being made to lead technological innovation in the field of defense science and technology. In Korea, the government also announced the "Defense Innovation 4.0 Plan," which consists of five key points and 16 tasks to foster advanced science and technology forces in March 2023. The plan also includes the establishment of a Condition-Based Maintenance system (CBM+) to improve the operability and availability of weapons systems and reduce defense costs. Condition Based Maintenance (CBM) aims to secure the reliability and availability of the weapon system and analyze changes in equipment's state information to identify them as signs of failure and defects, and CBM+ is a concept that adds Remaining Useful Life prediction technology to the existing CBM concept [1]. In order to establish a CBM+ system for the weapon system, sensors are installed and sensor data are required to obtain condition information of the weapon system. In this paper, we propose a sensor data metadata schema to efficiently and effectively manage sensor data collected from sensors installed in various weapons systems.

Contrast Analysis for CBRN attacks on educational research and best practices (테러대비를 위한 CBRNE교육 선진사례 분석에 관한 연구)

  • Kim, Tae hwan;Park, Dae woo;Hong, Eun sun
    • Journal of the Society of Disaster Information
    • /
    • v.5 no.1
    • /
    • pp.78-100
    • /
    • 2009
  • This study is to protect peoples' life, minimize the property damage by coping with threats quickly and take more preventive measures in advance against nuclear bomb, CBR, and potential explosive. For this, CBRNE(Chemical, Biological, Radiological, Nuclear, Explosive) program research was used. Thanks to advance in technology, terrorist groups and even individuals make or keep nuclear and CBR weapons. And also it's likely that disaster and threats from a toxic gas, acute pathogens, accidents in the nuclear power plants and a high explosive could be happened a lot. Recently more organized terrorist groups maintain random attacks for unspecified individuals and also it's highly likely that a large-scale terrorist attack by WMD and CBRNEwill be done. To take strict measures against CBRNE attacks by terrorists is on the rise as an urgent national task. Moreover biological weapons are relatively easy and inexpensive to obtain or produce and cause mass casualties with a small amount. For this reason, more than 25 countries have already possessed them. In the 21 st century, the international safety environment marks the age of complicated threats : transnational threats such as comprehensive security and terror, organized crime, drug smuggling, illegal trade of weapons of mass destruction, and environmental disruption along with traditional security threats. These cause military threats, terror threats, and CBRNE threats in our daily life to grow. Therefore it needs to come up with measures in such areas as research development, policy, training program. Major industrial nations on CBRNE like USA, Canada, Switzerland, and Israel have implemented various educational programs. These researches could be utilized as basic materials for drawing up plans for civil defense, emergency services and worldwide countermeasures against CBRNE.

  • PDF

South Korea's Defense Industry Development Strategy - Focusing on Technology Protection Policy - (한국의 방위산업 발전전략 연구 - 기술보호정책을 중심으로 -)

  • Geum-Ryul Kim
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.83-93
    • /
    • 2024
  • As the paradigm of the global defense industry changes due to the Russia-Ukraine war, Korea's cutting-edge conventional weapons systems are attracting attention from around the world. In 2023, Korea ranked 9th in world arms exports, and is pursuing innovation in the defense industry with the goal of becoming the world's 4th largest defense exporter by 2027. The defense industry is a national strategic industry that requires a long period of time and a large budget, and defense technology is a core technology that has a great impact on the advancement of defense and the national economy. Over the past five years, Korea has suffered economic losses worth approximately 25 trillion won due to the outflow of cutting-edge technology overseas, and there is an urgent need for institutional improvement to prevent the outflow of defense technology. Therefore, this study presented Korea's defense industry development strategy by examining the laws and systems that the three key players in the Indo-Pacific region, the United States, China, and Japan, are promoting to protect defense industry technology. To foster the defense industry as a promising future industry in Korea, it is necessary to respond to the fast-evolving pace of development of advanced science and technology in connection with securing technological sovereignty and protect defense technology, which is a key technology of the country, by improving related laws and systems.

Chinese Naval Power Build-up and Measures for Regional Maritime Cooperation (중국의 해군력 발전과 지역 해양안보 협력 방안)

  • Park, Chang-Hee
    • Strategy21
    • /
    • s.40
    • /
    • pp.162-189
    • /
    • 2016
  • This research deals with the PLAN's capabilities and its implication for regional security, and suggests some measures for maritime security cooperation among regional states. China has began to focus its national strategy more on 'rising as a new maritime power' since the 18th Party Convention in November 2012. Chinese new strategy aims at building a strong navy, contributing economic prosperity and national security, and thus elevating its prestige in international society. Most of all, building a strong navy is the foremost task at this time, and that is why the PLAN has the priority for military modernization. Chinese new maritime strategy could cause naval arms race in East Asia and aggravate maritime territorial disputes among concerned parties. It is the time for regional states to discuss some measures to build confidence, such as arms control of naval weapons, establishment of multilateral maritime security mechanism, and foundation of regional security regime, thus enhancing regional maritime cooperation.