• Title/Summary/Keyword: Weapon System Software

Search Result 118, Processing Time 0.02 seconds

A Study on Improvement of Directional Errors for K-MLRS Launcher (천무 발사대 방향성 오류현상 개선에 관한 연구)

  • Kim, Hyeeun;Kim, Minchang;Yu, Hanjun;Bae, Gongmyeong;Oh, Eunbin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.705-713
    • /
    • 2021
  • Because the cage assembly serves as the launch platform, an accurate aim is essential to ensure shooting accuracy for the target. On the other hand, the abnormal rotation of the cage due to the directional errors of the K-MLRS has continuously caused quality problems. The quality problem of weapon systems may have a negative impact on the military's power loss. In this study, improvement plans were derived by examining the defects and analyzing the directional errors of the K-MLRS launcher. In addition, all possible causes of directional errors were derived from the flow diagram for cage directionality. Based on the results, the defense design through the software program was intended to prevent the loss of direction. Through this study, the signal error of the resolver was improved by preventing unspecific signals in the data. Furthermore, the directional judgment method was improved to minimize the impact of data distortion. Lastly, directional storage and verification methods were improved so that data for the cage rotation direction would not be affected by errors. For the design improvement method, the reliability was verified through the system applicability. This study is expected to be a reference for failure analysis and design for similar weapon systems in the future.

Flatness Characteristics Analysis Technique of Attenuator Using Thermal Voltage Converter and AC Measurement Standard (열전압변환기와 교류측정표준을 사용한 감쇠기 평탄도 특성 분석 기법)

  • Cha, Yun-bae;Kim, Boo-il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.2
    • /
    • pp.330-337
    • /
    • 2018
  • This paper proposes a technique to analyze the flatness characteristics of the attenuator at 10Hz to $50\text\tiny{MHz}$ on the basis of $1\text\tiny{kHz}$ using a Thermal Voltage Converter and AC measurement standard. In the proposed technique, the input voltage of the attenuator for each measuring frequency is supplied at the same rate as $1\text\tiny{kHz}$ using TVC, and the flatness characteristics of the attenuator are analyzed by the voltage variation indicated in the AC measurement standard. The results of the analysis of the attenuator flatness characteristics show that the maximum uncertainty of $866{\mu}V/V$ can be measured from $10\text\tiny{dB}$ to $70\text\tiny{dB}$ and the uncertainty is reduced by about 37% compared to $2.31\text\tiny{mV}$/V using the network measurement method. The improved attenuator flatness characteristic values can be applied to the frequency flatness calibration from 2.2V to 2.2mV at the low voltage of the AC measurement standard.

Analysis of Experience Knowledge of Shooting Simulation for Training Using the Text Mining and Network Analysis (Text Mining과 네트워크 분석을 활용한 교육훈련용 모의사격 시뮬레이션 경험지식 분석)

  • Kim, Sungkyu;Son, Changho;Kim, Jongman;Chung, Sehkyu;Park, Jaehyun;Jeon, Jeonghwan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.5
    • /
    • pp.700-707
    • /
    • 2017
  • Recently, the military need more various education and training because of the increasing necessity of various operation. But the education and training of the military has the various difficulties such as the limitations of time, space and finance etc. In order to overcome the difficulties, the military use Defense Modeling and Simulation(DM&S). Although the participants in training has the empirical knowledge from education and training based on the simulation, the empirical knowledge is not shared because of particular characteristics of military such as security and the change of official. This situation obstructs the improving effectiveness of education and training. The purpose of this research is the systematizing and analysing the empirical knowledge using text mining and network analysis to assist the sharing of empirical knowledge. For analysing texts or documents as the empirical knowledge, we select the text mining and network analysis. We expect our research will improve the effectiveness of education and training based on simulation of DM&S.

Development of C2 Virtual Linked Simulator For Engineering and Engagement Level Battle Experimentation (공학-교전급 전투실험을 위한 C2 가상모의 연동 시뮬레이터 개발)

  • Lee, Sangtae;Lee, Seungyoung;Hwang, Kun-Chul;Kim, Saehwan;Lee, Kyuhyun
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.4
    • /
    • pp.11-19
    • /
    • 2013
  • The Korean naval weapon systems, combat experiments establish the concept of Battle operations, and create the future of the new weapons system. Doctrine development and training as well as ranging from experiments for evaluate the performance of mission operations for combat experiments are used. The battle lab is effectively support tool for the Korean Naval battle experiments. The battle lab is through a dedicated testing facility and to build efficient and effective simulation-based acquisition supporting environment. In this paper, the ship / submarines C2 operations virtual simulator was developed to support the concept of Battle operations of naval combat experiments in training and tactical development. The ship C2 operations virtual simulator makes the anti-ship and anti-aircraft the engagement scenario for performed experiments using the SADM. The submarines C2 operations virtual simulator makes the anti-submarine engagement scenario for performed experiments using EAS. EAS System was created before reuse. EAS system by modifying the additional interfaces HLA-RTI has been reused. Reflected in the tactics and training after analysis of the results through the battle experiment. Also increase training fidelity through operator involvement. The anti-ship and anti-aircraft system architecture (SADM) and anti-submarine system architecture (EAS) requires unique design of system framework since two separate architectures should be integrated into a system. An C2 virtual linked architecture was used to integrate different system architecture. A C2 virtual linked software framework, designed that have integrated protocol for battle experimental linkage and battlefield visualization environment.

A Study on Proving RMF A&A in Real World for Weapon System Development (무기체계 개발을 위한 RMF A&A의 실증에 관한 연구)

  • Cho, Kwangsoo;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.817-839
    • /
    • 2021
  • To manage software safely, the military acquires and manages products in accordance with the RMF A&A. RMF A&A is standard for acquiring IT products used in the military. And it covers the requirements, acquisition through evaluation and maintenance of products. According to the RMF A&A, product development activities should reflect the risks of the military. In other words, developers have mitigated the risks through security by design and supply chain security. And they submit evidence proving that they have properly comply with RMF A&A's security requirements, and the military will evaluate the evidence to determine whether to acquire IT product. Previously, case study of RMF A&A have been already conducted. But it is difficult to apply in real-world, because it only address part of RMF A&A and detailed information is confidential. In this paper, we propose the evidence fulfilling method that can satisfy the requirements of the RMF A&A. Furthermore, we apply the proposed method to real-world drone system for verifying our method meets the RMF A&A.

A Study on Implications of the naval Strategy in West Germany and Future Direction of Korean Navy (냉전기 서독해군 전략의 시사점과 향후 대한민국 해군의 방향성에 관한 연구)

  • Shin, Hong-Jung
    • Strategy21
    • /
    • s.46
    • /
    • pp.159-204
    • /
    • 2020
  • This study is written to bring the proposal forward for the direction of south korean naval force. The political situation and the circumstance of the world, especially in the area of Pacific Ocean, are changing very rapidly. North Korea has been always the conventional existing intimidator for South Korea since the 6·25-War. Additionally, the strengthening movements of the national defense, which is easily noticed from China and Russia, is also an other part of intimidating countries against South Korea. Those three mentioned countries are continually developing the asymmetrical warfare systems, for example a strategic nuclear weapon. Since the Obama Administration, the Asia-Pacific Rebalancing-Strategy has been changed as an East Asian foreign policy. Nowadays, Trump Administration renamed the 'United States Pacific-Command' to 'United States Indo-Pacific Command'. The purpose of this is not only letting India to participate in american alliance, but also reducing an economic burden, which is often mentioned in USA. West Germany was located in the very similar geopolitical position during the Cold War just like South Korea these days. And that's why the strategy of West German Navy is worthy of notice for south korean naval force to decide its suitable strategy. Most of all, the two most important things to refer to this study are the plan to expand naval air force and the realistic political stand for us to take it. In conclusion, I laid an emphasis on maintenance of 'green-water-navy'. instead of selecting the strategy as a 'blue-water-navy'. The reason I would like to say, is that south korean navy is not available to hold the unnecessary war potential, just like Aircraft-Carrier. However, this is not meaning to let the expansion of naval force carelessly. We must search the best solution in order to maintain the firm peace within the situation. To fulfill this concept, it is mostly very important to maintain the stream of laying down a keel of destroyers, submarines and air-defense-missile, as well as the hight-tech software system, taking a survey of 4th industrial revolution. Research and development for the best solution of future aircraft by south korean navy is likewise necessary. Besides, we must also set the international diplomatic flexibly. As well as maintaining the relationship with US Forces, it is also very important to improve the relationship with other potential allied nation.

CIA-Level Driven Secure SDLC Framework for Integrating Security into SDLC Process (CIA-Level 기반 보안내재화 개발 프레임워크)

  • Kang, Sooyoung;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.909-928
    • /
    • 2020
  • From the early 1970s, the US government began to recognize that penetration testing could not assure the security quality of products. Results of penetration testing such as identified vulnerabilities and faults can be varied depending on the capabilities of the team. In other words none of penetration team can assure that "vulnerabilities are not found" is not equal to "product does not have any vulnerabilities". So the U.S. government realized that in order to improve the security quality of products, the development process itself should be managed systematically and strictly. Therefore, the US government began to publish various standards related to the development methodology and evaluation procurement system embedding "security-by-design" concept from the 1980s. Security-by-design means reducing product's complexity by considering security from the initial phase of development lifecycle such as the product requirements analysis and design phase to achieve trustworthiness of product ultimately. Since then, the security-by-design concept has been spread to the private sector since 2002 in the name of Secure SDLC by Microsoft and IBM, and is currently being used in various fields such as automotive and advanced weapon systems. However, the problem is that it is not easy to implement in the actual field because the standard or guidelines related to Secure SDLC contain only abstract and declarative contents. Therefore, in this paper, we present the new framework in order to specify the level of Secure SDLC desired by enterprises. Our proposed CIA (functional Correctness, safety Integrity, security Assurance)-level-based security-by-design framework combines the evidence-based security approach with the existing Secure SDLC. Using our methodology, first we can quantitatively show gap of Secure SDLC process level between competitor and the company. Second, it is very useful when you want to build Secure SDLC in the actual field because you can easily derive detailed activities and documents to build the desired level of Secure SDLC.

A Study on Differences of Contents and Tones of Arguments among Newspapers Using Text Mining Analysis (텍스트 마이닝을 활용한 신문사에 따른 내용 및 논조 차이점 분석)

  • Kam, Miah;Song, Min
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.3
    • /
    • pp.53-77
    • /
    • 2012
  • This study analyses the difference of contents and tones of arguments among three Korean major newspapers, the Kyunghyang Shinmoon, the HanKyoreh, and the Dong-A Ilbo. It is commonly accepted that newspapers in Korea explicitly deliver their own tone of arguments when they talk about some sensitive issues and topics. It could be controversial if readers of newspapers read the news without being aware of the type of tones of arguments because the contents and the tones of arguments can affect readers easily. Thus it is very desirable to have a new tool that can inform the readers of what tone of argument a newspaper has. This study presents the results of clustering and classification techniques as part of text mining analysis. We focus on six main subjects such as Culture, Politics, International, Editorial-opinion, Eco-business and National issues in newspapers, and attempt to identify differences and similarities among the newspapers. The basic unit of text mining analysis is a paragraph of news articles. This study uses a keyword-network analysis tool and visualizes relationships among keywords to make it easier to see the differences. Newspaper articles were gathered from KINDS, the Korean integrated news database system. KINDS preserves news articles of the Kyunghyang Shinmun, the HanKyoreh and the Dong-A Ilbo and these are open to the public. This study used these three Korean major newspapers from KINDS. About 3,030 articles from 2008 to 2012 were used. International, national issues and politics sections were gathered with some specific issues. The International section was collected with the keyword of 'Nuclear weapon of North Korea.' The National issues section was collected with the keyword of '4-major-river.' The Politics section was collected with the keyword of 'Tonghap-Jinbo Dang.' All of the articles from April 2012 to May 2012 of Eco-business, Culture and Editorial-opinion sections were also collected. All of the collected data were handled and edited into paragraphs. We got rid of stop-words using the Lucene Korean Module. We calculated keyword co-occurrence counts from the paired co-occurrence list of keywords in a paragraph. We made a co-occurrence matrix from the list. Once the co-occurrence matrix was built, we used the Cosine coefficient matrix as input for PFNet(Pathfinder Network). In order to analyze these three newspapers and find out the significant keywords in each paper, we analyzed the list of 10 highest frequency keywords and keyword-networks of 20 highest ranking frequency keywords to closely examine the relationships and show the detailed network map among keywords. We used NodeXL software to visualize the PFNet. After drawing all the networks, we compared the results with the classification results. Classification was firstly handled to identify how the tone of argument of a newspaper is different from others. Then, to analyze tones of arguments, all the paragraphs were divided into two types of tones, Positive tone and Negative tone. To identify and classify all of the tones of paragraphs and articles we had collected, supervised learning technique was used. The Na$\ddot{i}$ve Bayesian classifier algorithm provided in the MALLET package was used to classify all the paragraphs in articles. After classification, Precision, Recall and F-value were used to evaluate the results of classification. Based on the results of this study, three subjects such as Culture, Eco-business and Politics showed some differences in contents and tones of arguments among these three newspapers. In addition, for the National issues, tones of arguments on 4-major-rivers project were different from each other. It seems three newspapers have their own specific tone of argument in those sections. And keyword-networks showed different shapes with each other in the same period in the same section. It means that frequently appeared keywords in articles are different and their contents are comprised with different keywords. And the Positive-Negative classification showed the possibility of classifying newspapers' tones of arguments compared to others. These results indicate that the approach in this study is promising to be extended as a new tool to identify the different tones of arguments of newspapers.