• Title/Summary/Keyword: Defense Model

Search Result 1,790, Processing Time 0.03 seconds

PBR(Physically based Render) simulation considered mathematical Fresnel model for Game Improvement (효율적 게임개선을 위한 프레넬수학모델의 PBR 시뮬레이션)

  • Kim, Seongdong
    • Journal of Korea Game Society
    • /
    • v.16 no.1
    • /
    • pp.111-118
    • /
    • 2016
  • This paper proposes the mathematical model of Fresnel effect used to illuminate and simulate a surface character model for defense game play. The term illumination is used to represent the process by which the amount of light reaching a surface character model used on game play is determined. The character surface shaders generally use a mathematical model to predict how light will reflect on triangles. The shading normally represents the methods used to determine the color and intensity of light reflected toward the viewer for each pixel representing the character surface model of the game. This model computes the reflection and transmission coefficients and compares simulated results to the Fresnel equations for the real game improvement.

A Study on Strategic R&D Governance for Defense Sector (국방연구개발 전략 수립을 위한 R&D 거버넌스 연구)

  • Lee, Joo-Sung;Baek, Jong-Ho;Nam, Mi-Young
    • Journal of Technology Innovation
    • /
    • v.17 no.1
    • /
    • pp.149-177
    • /
    • 2009
  • Today, the phase of modem war is very different from past war. That is, the winning of war depends on the ability to obtain information and high technology. The purposes of this research are to propose an effective R&D governance model in national defense sector and to present R&D strategy for obtaining core national defense technology. As a part of collaborative innovation, the strategy to exchange R&D results actively between the defense sector and the private sector will be discussed. The main contribution of this research is dearly defining the concept of R&D governance in national defense sector and applying it to an actual case. The national defense R&D governance model proposed in this paper is based on the characteristics of national defense R&D which are different from other industries. The analysis of business success factors for national defense R&D through the T-50 case study is presented in detail. The T-50 case study reveals the importance of strategic intent, core technology knowledge base, organizational structure, and project management.

  • PDF

A Study of Implementation of Defense Configuration Management System based on PLM (PLM 기반의 국방 형상관리 정보체계 구축 사례연구)

  • Lim, Chae-O
    • Korean Journal of Computational Design and Engineering
    • /
    • v.13 no.4
    • /
    • pp.305-313
    • /
    • 2008
  • A configuration management system was implemented by applying PLM to the defense field. The PLM system has recently been incorporated in a wide range of industries, and it has allowed for improvements in work productivity and expansion of related services by comprehensively managing and securing connection regarding configuration information in the defense field. Implementations include acquisition of configuration related information and reinforcement of BOM-oriented configuration management function, securing compatibility among 3D drawings of different agencies, improvement of drawing and document management functions, comprehensive systematic configuration management focused on product structure, strengthened configuration control functions, a management system according to the work flow and life cycle functions, an integrated configuration management system of 3D model CAD resources and an enhanced management system. This paper covers a case study reviewing the implementation of a PLM-based configuration management information system and its results, so that the information can be made available to other agencies and companies seeking to apply PLM in their organizations.

Efficient Signature Schemes from R-LWE

  • Wang, Ting;Yu, Jianping;Zhang, Peng;Zhang, Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3911-3924
    • /
    • 2016
  • Compared to the classical cryptography, lattice-based cryptography is more secure, flexible and simple, and it is believed to be secure against quantum computers. In this paper, an efficient signature scheme is proposed from the ring learning with errors (R-LWE), which avoids sampling from discrete Gaussians and has the characteristics of the much simpler description etc. Then, the scheme is implemented in C/C++ and makes a comparison with the RSA signature scheme in detail. Additionally, a linearly homomorphic signature scheme without trapdoor is proposed from the R-LWE assumption. The security of the above two schemes are reducible to the worst-case hardness of shortest vectors on ideal lattices. The security analyses indicate the proposed schemes are unforgeable under chosen message attack model, and the efficiency analyses also show that the above schemes are much more efficient than other correlative signature schemes.

Failure Data Error according to Characteristics of One-Shot Weapon System and its Solution (일회성 무기체계 특성에 따른 고장 데이터의 오차 및 극복방안)

  • Choi, Yunsuk;Ma, Jungmok
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.5
    • /
    • pp.599-606
    • /
    • 2018
  • Failure data of systems in many field can be erroneous, which influences the reliability analysis of the systems. The general form of failure data is right censored data with accurate time information. But due to its nature of data collection in the military field, failure time of one-shot weapon systems can have errors which are related to the maintenance period. So this paper suggests a model that can reduce the error by utilizing interval censored data as an alternative to right censored data in weibull distribution.

A Comparison of Guided Missile Simulations Between EADSIM and SADM in Composite Combat Mission Planning Simulation Environments

  • Kim, Jingyu
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.8
    • /
    • pp.1066-1074
    • /
    • 2020
  • High Level Architecture/Run-Time Infrastructure (HLA/RTI) is used to connect individual simulators on networks in order to interoperate heterogeneous simulators. In defense domain, Ship Air Defense Model (SADM) and Extended Air Defense Simulation (EADSIM) are two of most advanced simulation tools. To interoperate these SADM and EADSIM, this paper attempts to use HLA/RTI that helps to support a Composite Combat Mission Planning Simulation Environment (CCMPSE). The CCMPSE allows us to analyze a group of simulations for comprehensive and accurate experiments. For the first time, this paper analyzes guided missile simulations in EADSIM and SADM by comparing related simulation models in their parameters and considerations. It presents characteristics of these models in view of guided missile simulation perspectives. For the contributions of this paper, it provides insights to select guided missiles between SADM and EADSIM on the CCMPSE according to specific simulation purposes.

Experiments of Mixed Dynamic Stiffness of a Control Fin and Actuator and Correction of Experiment Results (구동장치 연동된 조종날개 혼합동강성 실험 및 특성보정)

  • Shin Young-Sug;Hwang Cheol-Gyu;Yang Hae-Seok;Lee Yeol-Wha
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.7 no.4 s.19
    • /
    • pp.107-113
    • /
    • 2004
  • In order to model a connection part between a control fin and actuator, the related characteristics of a dynamic stiffness were extracted from experiments. These characteristics include the static stiffness of a control fin and the dynamic stiffness of an actuator, so they are called the mixed dynamic stiffness here. This mixed dynamic stiffness is used as the boundary condition of a control fin connected to an actuator when the flutter characteristics are analyzed. The simulated stiffness of an actuator is corrected from the experiment results and the mixed dynamic is finally formulated in the domain of frequencies.

A Study on the Vulnerability Assessment Model for National Defense Intelligence System Using SNA (사회연결망분석 개념을 적용한 국방정보체계 취약점 분석·평가 모형 연구)

  • Jang, Youngcheon;Kang, Kyongran;Choi, Bongwan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.3
    • /
    • pp.421-430
    • /
    • 2017
  • In this research, we propose a methodology for assessing security vulnerability of the national defense intelligence system, considering not only target elements but also the interconnection relationship of the whole system. Existing approaches decide the security vulnerability of the whole system by assessing only target elements. However, those approaches have an issue with potentially showing the same outcome for the systems that have identical target elements but the different types of interconnection relationships. We propose a more practical assessment method which takes the interconnection relationship of a whole system into consideration based on the concept of SNA(Social Network Analysis).

Impact of Maintenance Time of Anti-Ship Missile Harpoon on Operational Availability with Field Data (야전데이터 기반 하푼 유도탄 정비 소요시간이 가동률에 미치는 영향 연구)

  • Choi, Youngjae;Ma, Jungmok
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.4
    • /
    • pp.426-434
    • /
    • 2020
  • This paper studies the impact of the maintenance time of anti-ship missile Harpoon on operational availability with real field data. The Harpoon maintenance simulation model is developed as a testbed for identifying the optimal inventory levels on operational availability. Using multiple linear regression analysis and integer programming, the optimal inventory levels of essential assemblies are suggested. Finally, the result of sensitivity analysis shows the quantitative impact of maintenance time on operational availability and inventory costs. The authors believe that this quantitative analysis can support policy decisions to decrease maintenance time of missiles.

The Method of Construction for Defense Information Technology Evaluation Model (국방정보화 평가모델 구축방안)

  • Hong, Jin-Ki;Sim, Seung-Bae;Cho, Sung-Rim
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2003.11a
    • /
    • pp.293-300
    • /
    • 2003
  • 지난 수년간 정보화수준 및 투자효과분석을 위한 많은 연구가 진행되고, 실제 평가가 수행되었음에도 불구하고 여전히 정보화 수준을 객관적으로 평가하기 위한 평가모델이 요구되고있다. 특히 조직이나 사업의 정보화 목표에 맞게 정보화를 진단할 수 있는 평가방법론이 필요하다. 기존의 기업 정보화수준 평가모델의 경우 업종별로 다른 평가 모델을 적용하지만, 이 경우에도 업종 외에 해당 조직의 정보화 목표 및 범위에 대한 요소를 중요하게 고려하지 않았다. 정보화 평가모델은 크게 조직 중심의 전반적인 정보화 수준을 평가하는 모델과 투자한 사업에 대한 투자 효과를 분석하기 위한 모델로 나눌 수 있다. 두 개의 모델은 조직 또는 사업의 정보화 목표에 맞게 정보화가 진행되었는지를 평가하며, 평가한 결과를 피평가 조직에 피드백하여 차기 정보화 사업 추진에 활용하게 된다. 본 연구에서는 국방 분야의 여러 가지 특성을 고려한 정보화 평가모델의 구축 방법론을 제안하고, 평가의 유형 중에서 정보화 수준 평가 모델의 적용 방안에 대하여 논의하였다.

  • PDF