• Title/Summary/Keyword: Defense Model

Search Result 1,790, Processing Time 0.026 seconds

The Optimal Allocation Model for SAM Using Multi-Heuristic Algorithm : Focused on Theater Ballistic Missile Defense (복합-휴리스틱 알고리즘을 이용한 지대공 유도무기(SAM) 최적배치 방안 : 탄도미사일 방어를 중심으로)

  • Lee, Jae-Yeong;Kwak, Ki-Hoon
    • IE interfaces
    • /
    • v.21 no.3
    • /
    • pp.262-273
    • /
    • 2008
  • In Korean peninsular, Air Defense with SAM(Surface-to-Air Missile) is very important, because of threatening by North Korea's theater ballistic missiles installed with nuclear or biochemistry. Effective and successful defense operation largely depends on two factors, SAM's location and the number of SAM for each target based on missile's availability in each SAM's location. However, most previous papers have handled only the former. In this paper, we developed Multi-heuristic algorithm which can handle both factors simultaneously for solving allocation problem of the batteries and missile assignment problem in each battery. To solve allocation problem, genetic algorithm is used to decide location of the batteries. To solve missile assignment problem, a heuristic algorithm is applied to determine the number of SAM for each target. If the proposed model is applied to allocation of SAM, it will improve the effectiveness of missile defense operations.

The Mediating Effect of Defense Mechanism in the Relation between Disconnection and rejection Schema and Mental Health (단절 및 거절 도식과 정신건강 간의 관계에서 방어기제의 매개효과)

  • KIM, Haeng-Shin;SEO, Su-Gyun
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.27 no.3
    • /
    • pp.656-671
    • /
    • 2015
  • The purpose of the present study is to examine relationships between disconnection and rejection schema, defense mechanism, and mental health in college students using structural equation modeling. The present study suggested a proposed model in which defense mechanism exerted a full mediating effect on the relation between disconnection and rejection schema and mental health. Goodness of fit tests were used to compare the proposed model against competing models. The subjects consisted of 304 college students. They completed the Young Schema Questionnaire(YSQ-SF), the Defense Style Questionnaire(DSQ), and the Mental Health Scale. The results showed that the second model had a better goodness of fit. Based on these findings, it is suggested that psychological interventions for mental health in college students should consider strategies to use more flexible and more adaptive defense mechanism style.

An Optimization Model for Determining the Number of Military Cargo-plane (군용 수송기 소요 산정 최적화 모형)

  • Hee Soo Kim;Moon Gul Lee;Ho Seok Moon;Seong In Hwang
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.4
    • /
    • pp.160-172
    • /
    • 2023
  • In contemporary global warfare, the significance and imperative of air transportation have been steadily growing. The Republic of Korea Air Force currently operates only light and medium-sized military cargo planes, but does not have a heavy one. The current air transportation capability is limited to meet various present and future air transport needs due to lack of performance such as payload, range, cruise speed and altitude. The problem of population cliffs and lack of airplane parking space must also be addressed. These problems can be solved through the introduction of heavy cargo planes. Until now, most studies on the need of heavy cargo plane and increasing air transport capability have focused on the necessity. Some of them suggested specific quantity and model but have not provided scientific evidence. In this study, the appropriate ratio of heavy cargo plane suitable for the Korea's national power was calculated using principal component analysis and cluster analysis. In addition, an optimization model was established to maximize air transport capability considering realistic constraints. Finally we analyze the results of optimization model and compare two alternatives for force structure.

A Simulator Development of Surface Warship Torpedo Defense System considering Bubble-Generating Wake Decoy (기포발생식 항적기만기를 고려한 수상함 어뢰방어체계 시뮬레이터 개발)

  • Wooshik Kim;Myoungin Shin;Jisung Park;Ho Seuk Bae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.3
    • /
    • pp.416-427
    • /
    • 2024
  • The wake-homing underwater guided weapon that detects and tracks wake generated during voyage of a surface ship is impossible to avoid with the present acoustic deception torpedo defense system. Therefore, research on bubble-generating wake decoy is necessary to deceive wake-homing underwater guided weapon. Experiments in various environments are required to verify the effective operation method and performance of the wake decoy, but performance verification through underwater experiment is limited. In this paper, we develop a simulator for an torpedo defense system of surface ship, which is applied bubble-generating wake decoy, against acoustic, wake, and hybrid homing underwater guided weapon attack. The simulator includes surface ship model, acoustic decoy(static, mobile) model, bubble-generating wake decoy model, search and motion model of underwater guided weapon and so on. By integrating various models, MATLAB GUI simulator was developed. Through the simulation results for various environmental variables by this simulator, it is judged that effective operation method and performance verification of the bubble-generating wake decoy can be performed.

A Study on the Evaluation Model for Company Selection of Defense Information System R&D Projects (국방 정보시스템 연구개발사업 업체선정 평가모형 개발에 관한 연구)

  • Kim, Sun-Young;Lee, Young-Jae
    • The Journal of Information Systems
    • /
    • v.19 no.2
    • /
    • pp.73-95
    • /
    • 2010
  • This study shows the scientific and systematic Evaluation Model using factor analysis and AHP methods for the success of defense Information System R&D projects. The evaluation model was divided into 7 evaluation factors such as Developing support, Developing infrastructure, Developing management and test & evaluation, Support factors for strength, Understanding & developing strategy, Developing technology & organization, and Developing performance. And those were composed of totally 24 low level Evaluation index. The Developed Evaluation Model in the paper could be contributed more to objectively and transparently company selection of defense Information System R&D and other defense R&D Projects in the future.

A study on a schedule-cost analysis model for defense R&D project planning (국방 R&D프로젝트의 일정-비용분석모델의 연구)

  • 황홍석;류정철;정덕길
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1996.04a
    • /
    • pp.213-216
    • /
    • 1996
  • R'||'&'||'D project management is a process of decisions concerned with the achievement of goals of objectives. Especially, defense R'||'&'||'D project planning is the key in the successfull management of defense development. The defense project managers are constantly having to perform "what if\ulcorner" exercise, such as what if the project is extended out for an additional cost\ulcorner In this reserch, we developed a schedule-cost analysis model based upon Critical Path Method(CPM) and Venture Evaluation and Review Technique(VERT) for schedule-cost trade off analysis defense R'||'&'||'D projects. In the first step, a deterministic model is developed as a heuristic which deterministic model is developed as a heuristic which determines the schedule extension and reduction cost as a function desired schedule. In the second step, a stochastic network simulation model is developed to analyse the project risk (sucess and failure). The expected time and cost can be determined for desired schedule under the assumptions of stochastic arc data (time and cost) with a various precedence relationships. This model provides the defense R'||'&'||'D managers with an estimated and expected cost for curtailing or extending a project a given amount of time. The effectiveness and efficiency of the proposed methods, a heuristic and stochastic networks simulations, have been demonstrated through examples.

  • PDF

Model Development and Analysis for Assessment of the National Defense Industry Quality Management (국방 군수업체 품질경영 수준 평가 모델 개발 및 분석)

  • Kim, Sung-Do;Bae, Suk-Joo;Yang, Ji-Eung;Chung, Kyu-Suk;Riew, Moon-Charn;Lim, Sung-Uk;Kim, Myung-joon;Park, Sang Ho;Jeong, Ji-Sun
    • Journal of Korean Society for Quality Management
    • /
    • v.44 no.2
    • /
    • pp.277-296
    • /
    • 2016
  • Purpose: Propose model to diagnose and assess National Defense Industry and quality management by investigating and analyzing established standard model. Methods: Research on established internal model including MB, EQA and JQA model and make standard index for quality index extraction and quantitative index to test objectively for internal state. Results: Extract advantage and disadvantage by performance of National Defense Industry level diagnose and build foundation for quality management policy and road map. Conclusion: Due to result of diagnostic assesment of quality management of national defense industry, dependability, SCQM and safety part shows vulnerability and require improvement and support.

Performance Analysis of Missile/Rocket Defense System for RPG-7 Defense of Main Battle Tank (미사일/로켓 방어체계의 RPG-7에 대한 전차방호 성능분석)

  • Ha, Jong-Soo;Lee, Eui-Hyuk;Lee, Hyun-Ah;Park, Gyu-Churl;Cho, Kyu-Gong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.3
    • /
    • pp.350-357
    • /
    • 2014
  • MRDS is a short range missile/rocket defense system which protects a main battle tank(MBT) from threats at a short range. It is composed of 2 radars, 2 infrared trackers(IRT)s, 1 fire control computer(FCC), 2 launchers and countermeasures. In this paper, the radar and the IRT models based on sensing errors, the FCC model based on filtering errors, the launcher model based on driving errors and the countermeasure model based on flying errors are proposed to analyze the defense performance with the approaching RPG-7 and the moving MBT. The simulation results are presented to evaluate and verify the effectiveness of the proposed method.

Discriminant Analysis for the Prediction of Unlawful Company in Defense Procurement (국방조달에서 부정당업자 판별분석 모형 개발)

  • Han, Hong-Kyu;Choi, Seok-Cheol
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.3
    • /
    • pp.467-473
    • /
    • 2011
  • The contractor management for the effective defense project is essential factor in the modern defense acquisition task. The occurrence of unlawful company causes hastiness for project manager and setback to the deployment of defense weapon system. In this paper, we develop a prediction model for the effective defense project by using the discriminant analysis and analyse the variables that discriminate the unlawful company in many variables. It is expected that our model can be used to improve the project management capability of defense acquisition and contribute to the establishment of efficient procurement procedure through entry of the reliable defense manufacturer.

Network Attack and Defense Game Theory Based on Bayes-Nash Equilibrium

  • Liu, Liang;Huang, Cheng;Fang, Yong;Wang, Zhenxue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.5260-5275
    • /
    • 2019
  • In the process of constructing the traditional offensive and defensive game theory model, these are some shortages for considering the dynamic change of security risk problem. By analysing the critical indicators of the incomplete information game theory model, incomplete information attack and defense game theory model and the mathematical engineering method for solving Bayes-Nash equilibrium, the risk-averse income function for information assets is summarized as the problem of maximising the return of the equilibrium point. To obtain the functional relationship between the optimal strategy combination of the offense and defense and the information asset security probability and risk probability. At the same time, the offensive and defensive examples are used to visually analyse and demonstrate the incomplete information game and the Harsanyi conversion method. First, the incomplete information game and the Harsanyi conversion problem is discussed through the attack and defense examples and using the game tree. Then the strategy expression of incomplete information static game and the engineering mathematics method of Bayes-Nash equilibrium are given. After that, it focuses on the offensive and defensive game problem of unsafe information network based on risk aversion. The problem of attack and defense is obtained by the issue of maximizing utility, and then the Bayes-Nash equilibrium of offense and defense game is carried out around the security risk of assets. Finally, the application model in network security penetration and defense is analyzed by designing a simulation example of attack and defense penetration. The analysis results show that the constructed income function model is feasible and practical.