• Title/Summary/Keyword: 미국 국방부

Search Result 81, Processing Time 0.03 seconds

Object Management Design and Implementation for Air Traffic Control Simulation Based on HLA/RTI (HLA/RTI 기반 항공교통관제 시뮬레이션의 객체 관리 설계 및 구현)

  • Kim, Se-Hwan;Chae, Soo-Hoan
    • Annual Conference of KIPS
    • /
    • 2005.11a
    • /
    • pp.783-786
    • /
    • 2005
  • HLA는 상호 운용성과 재사용성을 목적으로 미국 국방성 산하 기관인 DMSO에서 개발되어진 분산 시스템 프레임워크이다. 이러한 HLA가 민간 부분 적용을 위해 표준이 발표되었고, HLA는 여러 분야의 범용성을 가지기 위해 복잡한 구현 시스템을 가지게 된다. 특히, 객체의 속성변화를 반영하기 위해서는 많은 통신 부하가 발생한다. 이런 단점을 해결하기 위해 제안하였던 객체 관리 모듈을 이용한 항공 교통관제 시뮬레이션을 구현하여 객체 관리 모듈의 성능 및 적용 분야를 평가한다.

  • PDF

Object Management Performance Enhancement of Distributed Simulation Based on HLA/RTI (HLA/RTI 기반 분산시뮬레이션의 객체 관리 성능향상)

  • Kim, Se-Hwan;Chae, Soo-Hoan;Lee, Sang-Min
    • Annual Conference of KIPS
    • /
    • 2005.05a
    • /
    • pp.955-958
    • /
    • 2005
  • HLA는 상호운영성과 재사용성을 목적으로 미국 국방성 산하 기관인 DMSO에서 개발되어진 분산 시스템 프레임워크이다. 이러한 HLA가 민간 부분 적용을 위해 표준이 발표되었고, HLA는 여러 분야의 범용성을 가지기 위해 복잡한 구현 시스템을 가지게 된다. 특히, federate들내에 존재하는 객체와 객체의 속성을 사용하기 위해서는 복잡한 절차를 구현해한다. 또한 객체의 속성변화를 반영하기 위해서는 많은 통신 부하가 발생한다. 이런 단점을 해결하기 위해 HLA 기반의 시뮬레이션에서 객체를 분리 관리하는 방안을 제안한다.

  • PDF

Application Strategies of Superintelligent AI in the Defense Sector: Emphasizing the Exploration of New Domains and Centralizing Combat Scenario Modeling (초거대 인공지능의 국방 분야 적용방안: 새로운 영역 발굴 및 전투시나리오 모델링을 중심으로)

  • PARK GUNWOO
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.19-24
    • /
    • 2024
  • The future military combat environment is rapidly expanding the role and importance of artificial intelligence (AI) in defense, aligning with the current trends of declining military populations and evolving dynamics. Particularly, in the civilian sector, AI development has surged into new domains based on foundation models, such as OpenAI's Chat-GPT, categorized as Super-Giant AI or Hyperscale AI. The U.S. Department of Defense has organized Task Force Lima under the Chief Digital and AI Office (CDAO) to conduct research on the application of Large Language Models (LLM) and generative AI. Advanced military nations like China and Israel are also actively researching the integration of Super-Giant AI into their military capabilities. Consequently, there is a growing need for research within our military regarding the potential applications and fields of application for Super-Giant AI in weapon systems. In this paper, we compare the characteristics and pros and cons of specialized AI and Super-Giant AI (Foundation Models) and explore new application areas for Super-Giant AI in weapon systems. Anticipating future application areas and potential challenges, this research aims to provide insights into effectively integrating Super-Giant Artificial Intelligence into defense operations. It is expected to contribute to the development of military capabilities, policy formulation, and international security strategies in the era of advanced artificial intelligence.

A Business Service Identification and Quality Evaluation Using Enterprise Architecture (전사적 아키텍처 기반 비즈니스 서비스 식별 및 품질평가)

  • Jung, Chan-Ki;Hwang, Sang-Kyu;Byun, Young-Tae
    • The KIPS Transactions:PartD
    • /
    • v.17D no.5
    • /
    • pp.347-352
    • /
    • 2010
  • Automatic service identification and quality evaluation is one of key characteristics for a Service-Oriented Computing, being receiving a lot of attention from researchers in recent years. However, most researchers focus on identifying and evaluating application services and do not present methods for automatically identifying and evaluating business services from business processes. In general, the manual business service identification process by a human expert is a highly expensive and ambiguous task and may result in the service design with bad quality because of errors and misconception. We propose an automatic business service identification and quality evaluation method using Enterprise Architecture as a machine understandable knowledge-base. We verify the effectiveness of the proposed method through a case study on Department of Defense Enterprise Architecture.

A Study on the Improvement of Airworthiness Certification (항공기 감항증명제도에 대한 고찰)

  • Hwang, Ho-Won;Hong, Seung-Taek
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.26 no.1
    • /
    • pp.31-63
    • /
    • 2011
  • Since Korea has invested only on developing an aircraft, it is true that Korea has neglected detailed standards and procedures about certification activities including essential safety procedures. Most developed countries have implemented mandatory airworthiness system by legislating it for operational safety of aircraft based on ICAO Annex 8, and the U.S. Department of Defense and the FAA's Airworthiness system have been adapted it to the realities of their circumstance. Therefore, Airworthiness system that can guarantee the safety of the aircraft at international level is necessary to enhance flight safety and to create export opportunities of an aircraft as a country which can develop an aircraft by itself To achieve this, a study on the improvement of aircraft airworthiness was carried out by analyzing the problem of domestic airworthiness system and by reflecting international best practices on the establishment of a system for improved Airworthiness.

  • PDF

Proposal of the development plan for the ROK military data strategy and shared data model through the US military case study (미군 사례 고찰을 통한 한국군 데이터 전략 및 공유 데이터 모델 개발방안 제안)

  • Lee, Hak-rae;Kim, Wan-ju;Lim, Jae-sung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.6
    • /
    • pp.757-765
    • /
    • 2021
  • To carry out multi-domain operations included in the U.S. Department of Defense's national security strategy in 2018, timely data sharing between C4I systems is critical. Several studies of the Korean military have also raised the problems of interface and standardization between C4I systems, and it is necessary to establish a new plan to solve this problem. In this study, a solution to the problem was derived through case analysis that the U.S. Department of Defense has been pursuing for about 20 years to implement the data strategy after establishing the data strategy in 2003. and by establishing a data strategy suitable for the ROK military C4I system operating environment, developing a data model, selecting a standard for data sharing, and proposing a shared data development procedure, we intend to improve the data sharing capability between ROK military C4I systems.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

드론 핵심 기술 및 향후 과제

  • Yun, Gwang-Jun
    • The Optical Journal
    • /
    • s.158
    • /
    • pp.52-54
    • /
    • 2015
  • 최근 무인항공기를 지칭하는 드론 관련 산업이 미래를 이끌 신산업으로 부상하고 있다. 드론은 20세기 초에 군사용으로 개발되어 정찰 감시 및 폭격과 같은 군사임무를 수행하여 왔으나 최근 들어 독일 DHL, 아마존, 구글 등과 같은 다국적 기업들이 상업적 용도로 활용을 선언하며 연구 개발에 뛰어 들면서 그 시장이 예상보다 빨리 커지고 있다. 미국 틸 그룹의 보고서에 의하면 2013년 세계 드론 시장의 규모는 66억 달러였고 그 중 군사용이 90% 이상을 차지하고 있으나 향후 민수용 시장 비율이 상당히 커질 것으로 예상된다. 2022년에는 114억 달러 규모로 커질 것으로 예상하고 있다. 현재 민수용으로 사진 촬영용 소형 드론으로부터 정밀농업, 인프라 관리, 택배 및 화물 수송 등으로 운용 범위를 확대하고 있다. 국내 드론 산업은 군수 위주로 시작되어 세계 7위권의 기술력을 확보한 것으로 평가되고 있다. 무인기 분야의 연구개발은 국방과학연구소와 한국항공우주연구원 등 정부출연연구소가 주도하는 가운데, 한국항공우주산업, 대한 항공이 주로 체계종합(System Integrator) 및 비행체 개발을 담당하고 LIG넥스원, 삼성탈레스, 삼성테크윈 등의 대기업을 포함한 중소업체들이 부체계 기술을 개발하고 있다. 최근 소형 드론을 중심으로 시장형성이 가시화되는 민수 시장에서는 가격, 기술 경쟁력의 열위에 있어, 국내 산업 경쟁력 확보와 미래 시장을 선도할 핵심 제품 개발이 시급한 실정이다. 또한 무인기의 비행체 국산화는 상당한 수준으로 진행되었으나, 광학(EO) 적외선(IR) 카메라 등 핵심 부가가치를 구성하는 탑재 임무장비의 경우 원천기술의 부족으로 해외에 의존하고 있다.

  • PDF

Object Management Method for Air Traffic Control Simulation Based on HLA/RTI (HLA/RTI 기반 항공교통관제 시뮬레이션에 효율적 객체 관리법)

  • Kim, Myung-Kyu;Kim, Jung-Ho;Chae, Soo-Hoan
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.2
    • /
    • pp.165-171
    • /
    • 2009
  • HLA is made for interoperability and reusability as distributed system framework under DMSO. RTI provides the necessary services for message transmission, object management as HLA 's understructure. But its performance can decrease as it becomes larger and more complex because of communication overhead. To solve this problem, RTI and TCP socket are partially used during data exchange and OMM is designed to efficiently manage objects. The efficiency of the proposed method is proved through simulation when it is applied to an air traffic control simulation based on HLA/RTI.

  • PDF

A study of aviation leisure sport demand creation strategy (항공레저스포츠 시장창출 전략 연구)

  • Park, Jin-seo;Sim, Ga-ram;Sung, yeun-young;Kim, Mee-sook
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.30 no.1
    • /
    • pp.181-206
    • /
    • 2015
  • Due to the increased leisure time, national income levels, and increasing the desire for new experience, interest causes increasing demand for recent aviation leisure sport. This leads to the need for a competitive foundation of the expansion of aviation leisure sports market potential. In 2014, the MOLIT(Ministry of Land, Infrastructure and Transport) created definition of sport and recreational aviation industry in the Aviation Act. The most significant change in Aviation Act related to sport and recreational aviation, it allows easier access for those wishing to participate in the joy of flight and also creating a sport and recreational aviation business market expansion. Therefore, in this paper, by analyzing the trend of foreign policy trends and domestic policies that sport and recreational aviation has been enabled, it is trying to present the activation policy proposals of sport and recreational aviation that is suitable for Korea.