• Title/Summary/Keyword: Defense Program Analysis

Search Result 258, Processing Time 0.023 seconds

Analysis of △△ Guided Missile Inspection Period Based on Storage Reliability (저장신뢰도 기반의 △△ 유도탄 검사주기 분석)

  • Jeong, Sang-hun;Lee, Sangbok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.592-598
    • /
    • 2017
  • The purpose of this study is to suggest a new inspection period of ${\triangle}{\triangle}$ guided missiles by analyzing their reliability using field data. The ${\triangle}{\triangle}$ guided missile has an inspection period of five years which was determined using prediction data during its development process. However, from the analysis of its field data, it was shown that the inspection period could be extended to more than 18 years. Based on this result, a policy is proposed to reevaluate the inspection period by means of practical reliability tests.

A case study on calibration of computational model for a reasonable cost estimation of missile development program (A case of guidance & control system of X missile) (유도무기 연구개발사업의 합리적인 비용 추정을 위한 전산모델 보정방안 사례 연구 (X 유도무기 유도조종장치 사례를 중심으로))

  • Park, Chung-Hee
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.139-148
    • /
    • 2014
  • In recent years, computational models using parametric estimation method have been developed and used widely for efficient cost analysis. In this research, by applying experienced data from Guidance and Control Systems in Missile System field, the cost analysis for engineering model and commercial computational model(Price H, HL, M, S) are conducted and its result is analysed, so that the difference between two models and its grounds are apprehended. Comparing the calibrated value of computational model based on the data base of similar equipment and the cost from the engineering estimation, the two results are very close. It means that the credibility of data is enhanced through calibration. Also, for cost analysis of similar components in the future, the method for calibration of the computational models is also examined. When estimating development cost in this research, although many parts have been estimated through uncertain elements, the reliability could have been enhanced by applying computational model which secures objectivity. It is a very reasonable estimation method by utilizing calibration of the computational models based on existing accumulated development data.

The Effect of Health Risk Factors on Gender in Early Adolescents: The Application of Logit Analysis (초기청소년대상자의건강위험요인이성별에미치는영향요인분석: 로짓분석의활용)

  • Yoo, Keun-Hwan
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.7
    • /
    • pp.85-93
    • /
    • 2019
  • The purpose of this study is to identify the influence of demographic characteristics such as inappropriate lifestyle, stress, and health status among health risk factors of early adolescents according to gender. There is a gender difference in the perception of mental and physical health of early adolescents, and the result can be different in behavior patterns between men and women. This study was conducted to identify the health risk factors as independent variables for early adolescents in Daegu and Gyeongbuk area, and to analyze the determinants of gender (male, female) differences by parents, family environment, friends, academic background, appearance, grade, location, school grades, family situation, and health status as demographic factors. And, the Odds Ratio of the early adolescents was analyzed through logit analysis and the differences according to the influence relationship of each of them were examined. As a result of the analysis, the more the sleep and physical activity, parents, home environment, friends, academic background, and appearance are increased, the more the influence is likely to become on the male students. On the contrary, the rest of the health risk factors can increase, and the threat to the health risk factors is likely to become severe to the female students.Among them, it is necessary to develop a pre-preventive program for early adolescents' health risk factors, provide basic data for practical application in the field, and seek a detailed program according to the gender of early adolescents.

Analysis of Tropospheric Zenith Path Delay of GPS Code Based Precise Time Comparison Technique (GPS 코드 기반 정밀시각비교기법의 대류층 천정지연모델 분석)

  • Yu, Dong-Hui;Yang, Sung-Hoon;Do, Jae-Chul;Lee, Chang-Bok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.61-69
    • /
    • 2012
  • This paper shows results of the precise time comparison technique based on GPS code transfer in order to determine the UTC(Universal Time Coordinated) and generate TAI(International Atomic Time). CGGTTS(CCTF Group on GNSS Time Transfer Standards) which is generated by GPS timing receivers is used as the international standard format. For geodetic receivers which provide RINEX formats as GPS time transfer results, ROB(Royal Observatory of Belgium) developed a conversion program, r2cggtts, and have distributed the program to timing laboratories participating in TAI link all over the world. Timing laboratories generate the time comparison results of GPS code transfer by the program and send them to BIPM(Bureau International des Poids et Mesures) periodically. In this paper, we introduce the delay features generated while GPS code is transferred and the calibration methods of them. Then, we introduce the tropospheric delay and analyze the results of Saastamoinen model and NATO(North Atlantic Treaty organization) model. Saastamoinen model is the representative tropospheric zenith path delay model and NATO model is applied to the legacy r2cggtts program.

A Study on the Automation Algorithm to Identify the Geological Lineament using Spatial Statistical Analysis (공간통계분석을 이용한 지질구조선 자동화 알고리즘 연구)

  • Kwon, O-Il;Kim, Woo-Seok;Kim, Jin-Hwan;Kim, Gyo-Won
    • The Journal of Engineering Geology
    • /
    • v.27 no.4
    • /
    • pp.367-376
    • /
    • 2017
  • Recently, tunneling under the seabed is becoming increasingly common in many countries. In Korea, there are proposals to tunnel from the mainland to Jeju Island. Safe construction requires geologic structures such as faults to be characterized during the design and construction phase; however, unlike on land, such structures are difficult to survey seabed. This study aims to develop an algorithm that uses geostatistics to automatically derive large-scale geological structures on the seabed. The most important considerations in this method are the optimal size of the moving window, the optimal type of spatial statistics, and determination of the optimal percentile standard. Finally, the optimal analysis algorithm was developed using the R program, which comprehensibly presents variations in spatial statistics. The program allows the type and percentile standard of spatial statistics to be specified by the user, thus enabling an analysis of the geological structure according to variations in spatial statistics. The geotechnical defense-training algorithm shows that a large, linear geological lineament is best visualized using a $3{\times}3$ moving window and a 10% upper standard based on the moving variance value and fractile. In particular, setting the fractile criterion to the upper 0.5% almost entirely eliminates the error values from the contour image.

A Study on the Initial Design Method for an Effective Acquisition of Future Ground Combat Vehicles (미래지상전투차량의 효과적 획득을 위한 초기설계기법에 관한 연구)

  • Kim, Hee-young;Kwon, Seung Man;Lee, Kyu Noh
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.2
    • /
    • pp.41-49
    • /
    • 2017
  • In the acquisition program, the conceptual design is the most important step toward specifying the military objectives, establishing requirements and determining future developmental directions, of a target system. However, if both the requirements and directions are incorrectly set due to the lack of development experiences and literature backgrounds in the target systems, such as future ground combat vehicles, it may become a major risk in the future design phases and the entire acquisition program. In order to correct these errors in the future phases, time, effort and cost are required. Therefore, it is necessary to reduce the errors that occur in the initial stages to effectively acquire the future ground combat vehicles. This paper describes the initial design method for verifying the requirements and the developmental directions and estimating the system performance at the conceptual design through the system-level physical modeling and simulation (M&S) and the target system performance analysis. The system-level physical M&S use cutting-edge design tools, model-based designs and geometric-based designs. The system performance estimation is driven from the results of the system-level physical M&S and the specialized system analysis software.

Modeling and Verification of Multibody Dynamics Model of Military Vehicle Using Measured Data (실차 측정 정보를 이용한 군용 차량의 다물체 동역학 모델링 및 검증)

  • Ryu, Chi Young;Jang, Jin Seok;Yoo, Wan Suk;Cho, Jin Woo;Kang, E-Sok
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.38 no.11
    • /
    • pp.1231-1237
    • /
    • 2014
  • It is essential to perform driving performance tests of military vehicles on rough terrain. A full car test is limited by cost and time constraints, because of which a dynamic analysis via computer simulation is preferred. In this study, a vehicle model is developed using MSC.ADAMS, a commercial multibody analysis program, and compared via experiments. FTire is modeled using the results of a tire performance test to obtain the vertical stiffness. A nonlinear damper is modeled by a characteristic experiment. Leaf springs are modeled with beam force elements and consisted to a vehicle model. The vertical force and acceleration response of the wheel are identified when vehicle is passing over a simple bump as well as a sinusoidal road. The developed vehicle model is verified with the results of a full car test.

Jammer Suppression by Eigen Analysis in Multi-Carrier Radar (멀티캐리어 레이더에서 고유치 해석에 의한 재머 억제)

  • Jeon, Hyeon-Mu;Shin, Seong-Kwan;Chung, Yong-Seek;Chung, Won-Zoo;Kim, Jong-Mann;Yang, Hoon-Gee
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.25 no.12
    • /
    • pp.1284-1291
    • /
    • 2014
  • For detection and parameter estimation, a multicarrier radar should discriminate a channel containing jamming signal and either leave it out or regenerate jammer suppressed target signal. To discriminate jamming channels, we use the angular spectrum of an eigenvector that embeds target echoes and jamming signals. We propose a criteria to discriminate the jammer channels and its basis through mathematical analysis. Moreover, we show some procedures to regenerate the jammer suppressed target echoes. Finally, the validity of the proposed method is demonstrated through simulation results showing improved performance in terms of direction of arrival(DOA) estimation.

Assessment of the Educational Effects through the Building Information Modeling for the Establishment of the Wartime Relocatable Military Facilities (전시 이동형 군사시설 구축을 위한 BIM의 교육효과 분석)

  • Kim, Tae-Hui;Ahn, Sung-Jin;Park, Jang-Kweon;Kim, Heung-Bin;Park, Young-Jun
    • Journal of the Korea Institute of Building Construction
    • /
    • v.14 no.6
    • /
    • pp.545-550
    • /
    • 2014
  • The re-locatable military facilities are significant in combat zones with limited infrastructures. Military tents are particularly one of the most essential components in the battlefields, During the offensive operation. This study assesses educational effectiveness of the 4D Building Information Modeling (BIM), which is used to deliver educational information with considering re-locatable military facility construction. Furthermore, the real time for constructing temporary concentration camp was measured, By using analysis of variance associated with the educational effects of the 4D BIM. Statistically, understandability of facility construction using 4D BIM was found to be higher than the conventional educational materials with field manual.

Vulnerability Analysis on a VPN for a Remote Monitoring System

  • Kim Jung Soo;Kim Jong Soo;Park Il Jin;Min Kyung Sik;Choi Young Myung
    • Nuclear Engineering and Technology
    • /
    • v.36 no.4
    • /
    • pp.346-356
    • /
    • 2004
  • 14 Pressurized Water Reactors (PWR) in Korea use a remote monitoring system (RMS), which have been used in Korea since 1998. A Memorandum of Understanding on Remote Monitoring, based on Enhanced Cooperation on PWRs, was signed at the 10th Safeguards Review Meeting in October 2001 between the International Atomic Energy Agency (IAEA) and Ministry Of Science and Technology (MOST). Thereafter, all PWR power plants applied for remote monitoring systems. However, the existing method is high cost (involving expensive telephone costs). So, it was eventually applied to an Internet system for Remote Monitoring. According to the Internet-based Virtual Private Network (VPN) applied to Remote Monitoring, the Korea Atomic Energy Research Institute (KAERI) came to an agreement with the IAEA, using a Member State Support Program (MSSP). Phase I is a Lab test. Phase II is to apply it to a target power plant. Phase III is to apply it to all the power plants. This paper reports on the penetration testing of Phase I. Phase I involved both domestic testing and international testing. The target of the testing consisted of a Surveillance Digital Integrated System (SDIS) Server, IAEA Server and TCNC (Technology Center for Nuclear Control) Server. In each system, Virtual Private Network (VPN) system hardware was installed. The penetration of the three systems and the three VPNs was tested. The domestic test involved two hacking scenarios: hacking from the outside and hacking from the inside. The international test involved one scenario from the outside. The results of tests demonstrated that the VPN hardware provided a good defense against hacking. We verified that there was no invasion of the system (SDIS Server and VPN; TCNC Server and VPN; and IAEA Server and VPN) via penetration testing.