• Title/Summary/Keyword: Weapon system software

Search Result 119, Processing Time 0.04 seconds

A Study on the Measurement System Design for Measuring Properties of AC Magnetic Field Sensor (교류 자기센서 특성 시험장치 설계에 관한 연구)

  • Chung, Hyun-Ju;Yang, Chang-Seob;Jung, Woo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.3
    • /
    • pp.244-252
    • /
    • 2015
  • This paper describes design and construction results of the measurement system developed on the purpose of measuring properties of AC magnetic field sensors used in the weapon system. The system for measuring the properties of AC magnetic field sensors consist of 3-axis helmholtz coil, signal generator, signal amplifier, sensor data acquisition unit and AC magnetic field sensor property measurement & analysis equipment including the operating software. By using this system, we can measure various properties of AC magnetic field sensor such as sensitivity, linearity and dynamic response in the frequency from 1 Hz to 10 kHz. Finally we also verified its performance by measuring the property of a MAG 639, standard magnetic field sensor of bartington instruments, with the developed measurement system.

Analysis of Improving Requirement on Military Security Regulations for Future Command Control System (미래 지휘통제체계를 위한 보안 규정 개선 요구사항 분석)

  • Kang, Jiwon;Moon, Jae Woong;Lee, Sang Hoon
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.69-75
    • /
    • 2020
  • The command control system, like the human brain and nervous system, is a linker that connects the Precision Guided Missile(PGR) in information surveillance and reconnaissance (ISR) and is the center of combat power. In establishing the future command and control system, the ROK military should consider not only technical but also institutional issues. The US Department of Defense establishes security policies, refines them, and organizes them into architectural documents prior to the development of the command and control system. This study examines the security architecture applied to the US military command control system and analyzes the current ROK military-related policies (regulations) to identify security requirements for the future control system. By grouping the identified security requirements, this study identifies and presents field-specific enhancements to existing security regulations.

A Test Case Generation Method for Data Distribution System of Submarine (잠수함 데이터 분산 시스템을 위한 테스트 케이스 생성 기법)

  • Son, Suik;Kang, Dongsu
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.4
    • /
    • pp.137-144
    • /
    • 2019
  • Testing maturity is critical to the system under development with lack of experience and skills in the acquisition of the weapon systems. Defects have a huge impact on important system operations. Sharing real-time information will lead to rapid command and mission capability in submarine. DDS(Data Distribution System) is a very important information sharing system and interface between various manufacturers or data formats. In this paper, we analyze data distribution characteristics of distributed data system to group data-specific systems and proposes a test case-generation method using path search of postorder and preorder which is a tree traversal in path testing method. The proposed method reduces 73.7.% testing resource compare to existing methods.

A Reliability Growth Prediction for a One-Shot System Using AMSAA Model (AMSAA 모델을 이용한 일회성 체계의 신뢰도성장 예측)

  • Kim, Myung Soo;Chung, Jae Woo;Lee, Jong Sin
    • Journal of Applied Reliability
    • /
    • v.14 no.4
    • /
    • pp.225-229
    • /
    • 2014
  • A one-shot device is defined as a product, system, weapon, or equipment that can be used only once. After use, the device is destroyed or must undergo extensive rebuild. Determining the reliability of a one-shot device poses a unique challenge to the manufacturers and users due to the destructive nature and costs of the testing. This paper presents a reliability growth prediction for a one-shot system. It is assumed that 1) test duration is discrete(i.e. trials or rounds); 2) trials are statistically independent; 3) the number of failures for a given system configuration is distributed according to a binomial distribution; and 4) the cumulative expected number of failures through any sequence of configurations is given by AMSAA model. When the system development is represented by three configurations and the number of trials and failures during configurations are given, the AMSAA model parameters and reliability at configuration 3 are estimated by using a reliability growth analysis software. Further, if the reliability growth predictions do not meet the target reliability, the sample size of an additional test is determined for achieving the target reliability.

A Study on the Verification of Integrity of Message Structure in Naval Combat Management System

  • Jung, Yong-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.209-217
    • /
    • 2022
  • Naval CMS(Combat Management System) is linked to various sensors and weapon equipment and use DDS(Data Distribution Service) for efficient data communication between ICU(Interface Control Unit) Node and IPN(Information Processing Node). In order to use DDS, software in the system communicates in an PUB/SUB(Publication/Subscribe) based on DDS topic. If the DDS messages structure in this PUB/SUB method does not match, problems such as incorrect command processing and wrong information delivery occur in sending and receiving application software. To improve this, this paper proposes a DDS message structure integrity verification method. To improve this, this paper proposes a DDS message structure integrity verification method using a hash tree. To verify the applicability of the proposed method to Naval CMS, the message integrity verification rate of the proposed method was measured, and the integrity verification method was applied to CMS and the initialization time of the existing combat management system was compared and the hash tree generation time of the message structures was measured to understand the effect on the operation and development process of CMS. Through this test, It was confirmed that the message structure verification method for system stability proposed in this paper can be applied to the Naval CMS.

A Study on Korean Defense Specification Practice Standard Development Initiative (국방규격작성 방법 발전방안에 관한 연구)

  • Song, Jae-Yong;Son, Seung-Hyun;Sung, In-Cheol
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.6
    • /
    • pp.90-101
    • /
    • 2008
  • Korean defense specifications are the technical criteria of military products and major factor of acquisition system. Weapon systems and acquisition technique have been advanced dramatically after 1990's, but Korean defense specification practice standard has stayed after early 1980's except embedded software. The current status of current Korean defense specification practice standard and trend of related design and acquisition techniques like M&S, SBA, and digital manufacturing have been reviewed. This paper suggests that transfer to product, IT oriented specification structure, adaptation of digital product model and reinforcement of engineering management systems to establish a development initiative of Korean defense specification practice standard.

Development of Software Interoperated Weapon System using DEVS Modeling Tool based on GUI (GUI 기반 DEVS 모델링 도구를 이용한 무기체계 연동 소프트웨어 개발)

  • Kim, Young-Seung;Cho, Kyu-Tae;Lee, Seung-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.492-493
    • /
    • 2016
  • 최근 모델링 및 시뮬레이션(M&S) 기술이 다양한 분야에서 적용되어 활용되고 있으며, 특히 국방 분야에서의 중요성이 더욱 부각되고 있다. 무기체계 획득 절차 전반에 활용되는 시뮬레이션 시스템을 신속하고 편리하게 개발하기 위해서는 모델링에서 디버깅에 이르는 통합된 환경이 제공되어야 한다. 본 연구에서는 GUI 기반의 DEVS 모델링 도구인 QUEST를 이용해 실제 무기체계와 연동되는 시뮬레이션 시스템의 개발 사례를 소개한다.

Design of the TFM Based System Test Model for embedded Software of Weapon Systems (TFM 기반 무기체계 소프트웨어의 시스템 테스트 모델 설계)

  • Kim Jae-Hwan;Yoon Hee-Byung
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06c
    • /
    • pp.172-174
    • /
    • 2006
  • 본 연구에서는 시간 요소를 고려한 무기체계 소프트웨어의 시스템 테스트 모델을 제시한다. 이를 위해 컴포넌트 기반의 UML 표기법과 무기체계의 시간 제약 특징을 고려한 무기체계 소프트웨어의 시스템 테스트 모델인 TFM(Time Factor Method) 모델을 제안한다. TFM 모델은 세 가지 요소인 (X.Y,Z)으로 구성되어 있는데. "X" 에서는 최대시간경로를 선정하는 알고리즘을 통해 테스트 케이스가 도출되고, "Y" 에서는 Sequence Diagram과 관련된 컴포넌트(오브젝트)를 식별하고, "Z"에서는 Timing Diagram을 통하여 식별된 각각의 컴포넌트의 실행시간을 측정한다. 또한 제안된 TFM 모델의 적용사례를 들어 테스트 케이스를 도출한다.

  • PDF

Directions of Military Structure Improvement Preparing for Future Warfare (미래전쟁에 대비한 군 구조 개선방향)

  • Kim, Yong-Hyeon
    • Journal of National Security and Military Science
    • /
    • s.2
    • /
    • pp.91-119
    • /
    • 2004
  • Development of science technology, computer network and software technology has not only changed various areas of the society, but also brought rapid change in the condition and the way of performing war. Historical lessons learned from the war in Iraq tells that military capabilities corresponding to the new paradigms of war needs to be assured in order to preserve national interest and take victory in future warfare. Thus, the performance in the latest war in Iraq, the estimated performance in future war and the performance of war in the Korean Peninsula has been put together and analyzed to indicate the direction our force should be built and the structure to be improved. Under all circumstances and threats the military must defend our nation and territory. When war breaks out the military must perform it's basic duty to end war by decisive operations. As the saying is "To preserve peace, prepare for war," continuous increase of military strength and improvement of military structure corresponding to the change of national security environment and weapon system is necessary.

  • PDF

Study Trend of Applying Secure Coding for Weapon System Embeded Software (무기체계 내장형 소프트웨어 시큐어 코딩 적용 연구 동향)

  • Choi, Moonjeong;Choi, Junesung;Jeong, Ikrae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.511-513
    • /
    • 2015
  • 향후 사이버전 환경에서는 기존의 인터넷망과 인터넷 서비스에 대한 사이버 공격을 통한 서비스의 마비 뿐만 아니라, 무기체계 자체에 대한 사이버 공격을 통해 군사 지휘통제에 대한 전략적 수단과 군사작전 수행의 마비를 위한 전술적 수단으로써의 다양한 사이버 공격형태들이 발생할 것이 예상된다. 이러한 사이버 공격에 대한 대응 수단으로 무기체계 내장형 소프트웨어에 대한 시큐어 코딩의 적용이 필요하며, 본 논문에서는 무기체계 내장형 소프트웨어에 대한 시큐어 코딩 적용 관련한 그 동안의 연구 동향을 살펴보고 향후 연구 방향을 제안하였다.