• Title/Summary/Keyword: Defense Program Analysis

Search Result 258, Processing Time 0.032 seconds

Durability Analysis and Experiments of a Vehicle Component (차량 부품의 내구도 해석과 실험의 비교)

  • Park, Dong-Woon;Park, Su-Jin;Yoo, Wan-Suk
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.15 no.2
    • /
    • pp.28-34
    • /
    • 2007
  • In design stage of vehicles, the application of virtual durability analysis techniques enables us to cut down the necessary time and cost to carry out various physical experiments. In this study, computer simulations of vehicle suspensions were carried out with DADS program including component flexibility, and the durability analysis of vehicle components was executed with MSC/Fatigue program using the load history obtained from vehicle dynamic simulation. Driving test of a vehicle was also carried out to obtain precise input data for the durability analysis, and the results of virtual durability analysis were compared to those of experiments.

A Study on Analysis Model for Weapon Acquisition Alternatives (국방 무기체계 획득방안 연구 방법론 제안)

  • Lee, Ji-Young
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.6
    • /
    • pp.91-96
    • /
    • 2019
  • Recently, it is expected for requirement for more scientific research of weapon systems acquisition alternatives with reliability and objectivity. For these needs, study on methodology of weapon systems acquisition alternatives is but on-going, but it is still in its early stages and is unprofessional. We compared general decision making methods, government development program decision making methods, methodologies of weapon systems acquisition alternatives research such as AHP, ANP, KAAM and proposed AHP as weapon acquisition analysis. This study guarantees objectivity and derives scientific research results reliability by analyzing and comparing comprehensive elements such as cost, effectiveness, deployment schedule, program management risk. Further study on AHP weight and other decision making methods is needed considering category of weapon systems and program characteristics.

A Study of Optimization Approach for GPS Anti-Jamming System's Integration on Military Aircraft Based on the Requirement of Capability (요구성능 기반의 군용 항공기 항재밍 GPS 체계 구축 최적화 방안 연구)

  • Lee, Moongul;Shin, Kisu;Choi, Jaesik
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.1
    • /
    • pp.66-83
    • /
    • 2015
  • Global Positioning System(hereafter; GPS) is recently an essential element in the various navigation and weapon delivery systems of military aircraft. However, GPS is vulnerable to the jamming threats since its signal power is very weak. Therefore, ROK defense has been concerning how to resolve this issue and how to integrate these systems needed, and is trying to acquire the proper anti-jamming GPS system. This study is to provide several schemes against the jamming threats effectively. We propose the several processes to analyze the required capability and demonstrate the result's of modeling and simulations(hereafter; M&S) for this integration of military aircraft, and the mathematical programming model for system optimization of military aircraft anti-jamming GPS system on the basis analysis of M&S results which could be considered available budget and the project characteristic. These schemes will be helpful on proper acquisition of these systems and. We are looking forward to contributing to the integration of anti-jamming GPS system of ROK military aircraft.

Design and Implementation of Network Defense Simulator (네트워크 방어 시뮬레이터 설계 및 구현)

  • 이철원;윤주범;임을규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4C
    • /
    • pp.441-447
    • /
    • 2004
  • Information security simulator is required for the study on the cyber intrusion and defense as information security has been increasingly popular Until now, the main purposes of information security simulation are security estimation of small network as well as performance analysis of information protection systems. However, network simulators that can simulate attacks in a huge network are in needs since large scale internet attacks are very common in these days. In this paper we proposed a simulator design and its implementation details. Our simulator is implemented by expanding the SSFNet program to the client-sewer architecture. A cyber attack scenario used in our simulator is composed by the advanced attack tree model. We analyzed the simulation results to show the correctness of our network defense simulator.

A study on the factors affecting shelf-life for 60, 81mm mortar ammunition (60, 81mm 박격포탄의 저장수명 요인 연구)

  • Jang, SooHee;Chun, Heuiju;Cho, Inho;Yoon, KeunSig;Kang, MinJung;Park, DongSoo
    • The Korean Journal of Applied Statistics
    • /
    • v.31 no.5
    • /
    • pp.611-620
    • /
    • 2018
  • Limitations on human and material resources make it is difficult to conduct Ammunition Stockpile Reliability Program (ASRP) tasks for the entire ammunition. Stockpile ammunition life prediction studies can contribute to efficient ASRP tasks. This study assess the shelf-life of ammunition, using survival analysis based on ASRP results for 60mm and 81mm mortar ammunition from 2003 to 2016. Traditional assessments often use solely storage duration as the only main independent variable; however, this assessment used other factors such as ammunition magazine shape and weather factors with the stockpile shelf-life as independent variables to conduct a Cox's proportional hazard model analysis. This was then followed by an assessment of ammunition magazine type, maximum temperature and rainfall factors influence on the shelf-life of 60mm and 81mm mortar ammunition. As a result, the type of ammunition magazine, maximum temperature and the rainfall influence the shelf-life of 60mm and 81mm mortar ammunition.

Transcriptome Analysis of Early Responsive Genes in Rice during Magnaporthe oryzae Infection

  • Wang, Yiming;Kwon, Soon Jae;Wu, Jingni;Choi, Jaeyoung;Lee, Yong-Hwan;Agrawal, Ganesh Kumar;Tamogami, Shigeru;Rakwal, Randeep;Park, Sang-Ryeol;Kim, Beom-Gi;Jung, Ki-Hong;Kang, Kyu Young;Kim, Sang Gon;Kim, Sun Tae
    • The Plant Pathology Journal
    • /
    • v.30 no.4
    • /
    • pp.343-354
    • /
    • 2014
  • Rice blast disease caused by Magnaporthe oryzae is one of the most serious diseases of cultivated rice (Oryza sativa L.) in most rice-growing regions of the world. In order to investigate early response genes in rice, we utilized the transcriptome analysis approach using a 300 K tilling microarray to rice leaves infected with compatible and incompatible M. oryzae strains. Prior to the microarray experiment, total RNA was validated by measuring the differential expression of rice defense-related marker genes (chitinase 2, barwin, PBZ1, and PR-10) by RT-PCR, and phytoalexins (sakuranetin and momilactone A) with HPLC. Microarray analysis revealed that 231 genes were up-regulated (>2 fold change, p < 0.05) in the incompatible interaction compared to the compatible one. Highly expressed genes were functionally characterized into metabolic processes and oxidation-reduction categories. The oxidative stress response was induced in both early and later infection stages. Biotic stress overview from MapMan analysis revealed that the phytohormone ethylene as well as signaling molecules jasmonic acid and salicylic acid is important for defense gene regulation. WRKY and Myb transcription factors were also involved in signal transduction processes. Additionally, receptor-like kinases were more likely associated with the defense response, and their expression patterns were validated by RT-PCR. Our results suggest that candidate genes, including receptor-like protein kinases, may play a key role in disease resistance against M. oryzae attack.

The Calmodulin-Binding Transcription Factor OsCBT Suppresses Defense Responses to Pathogens in Rice

  • Koo, Sung Cheol;Choi, Man Soo;Chun, Hyun Jin;Shin, Dong Bum;Park, Bong Soo;Kim, Yul Ho;Park, Hyang-Mi;Seo, Hak Soo;Song, Jong Tae;Kang, Kyu Young;Yun, Dae-Jin;Chung, Woo Sik;Cho, Moo Je;Kim, Min Chul
    • Molecules and Cells
    • /
    • v.27 no.5
    • /
    • pp.563-570
    • /
    • 2009
  • We previously isolated the OsCBT gene, which encodes a calmodulin (CaM)-binding protein, from a rice expression library constructed from fungal elicitor-treated rice suspension cells. In order to understand the function of OsCBT in rice, we isolated and characterized a T-DNA insertion mutant allele named oscbt-1. The oscbt-1 mutant exhibits reduced levels of OsCBT transcripts and no significant morphological changes compared to wild-type plant although the growth of the mutant is stunted. However, oscbt-1 mutants showed significant resistance to two major rice pathogens. The growth of the rice blast fungus Magnaporthe grisea, as well as the bacterial pathogen Xanthomonas oryzae pv. oryzae was significantly suppressed in oscbt-1 plants. Histochemical analysis indicated that the hypersensitive-response was induced in the oscbt-1 mutant in response to compatible strains of fungal pathogens. OsCBT expression was induced upon challenge with fungal elicitor. We also observed significant increase in the level of pathogenesis-related genes in the oscbt-1 mutant even under pathogen-free condition. Taken together, the results support an idea that OsCBT might act as a negative regulator on plant defense.

Analysis of Power Transmission Characteristics for Hydro-mechanical Transmission Using Extended Tetwork theory (확장된 네트워크기법을 이용한 정유압 기계식 번속장치의 동력전달 특성해석)

  • Kim, Won;Chung, Soon-Bae;Kim, Hyun-Soo
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.20 no.5
    • /
    • pp.1426-1435
    • /
    • 1996
  • In this paper. a network theory for generaltransmission systme was extended considering the direction of power flow. Also, a modified network model was suggested for a node with 4 shafts in order to verify the power flow. Based on the extended network theory, a simulation program was developed to analyze a hydro-mecaanical tranmission(HMT) system consistion of two hydrostatic pump motors, severeal planetary gear trains steer differential gear. The simulation result showed that the extendednotwork analysis program develped can predict the power circulation as well as the magnitude of torque and speed for each transmission element and can be used design tool for genaral power transmission system.

A Study on the Improvement Plan for Enhancing Utilization of Defense Critical Technologies (국방 핵심기술 활용성 증대를 위한 개선 방안 연구)

  • Cho, Il-Ryun;Kim, Chan-Soo;Noh, Sang-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.6
    • /
    • pp.120-125
    • /
    • 2018
  • Various security threats, such as North Korea's nuclear tests and intercontinental ballistic missile developments, are becoming issues. Considering the current security situation in South Korea, proper selection of weapons and efficient defense acquisition systems are essential. In this paper, we conduct a survey and analysis of the defense core technology necessary for the development of weapons systems, and review whether current defense research and development is carried out efficiently. A theoretical study was conducted on ways to enhance the linkage between defense core technology and weapons systems development. As a result of the study, the necessity for development of weapons systems and the linking of defense core technology planning with the need for institutional improvement in enhanced utilization of defense core technology were derived. We propose a method for a long-term weapons systems concept plan that integrates defense core technology planning with forces planning and pre-project research programs to improve planning efficiency.

Indirect Branch Target Address Verification for Defense against Return-Oriented Programming Attacks (Return-Oriented Programming 공격 방어를 위한 간접 분기 목적 주소 검증 기법)

  • Park, Soohyun;Kim, Sunil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.5
    • /
    • pp.217-222
    • /
    • 2013
  • Return-Oriented Programming(ROP) is an advanced code-reuse attack like a return-to-libc attack. ROP attacks combine gadgets in program code area and make functions like a Turing-complete language. Some of previous defense methods against ROP attacks show high performance overhead because of dynamic execution flow analysis and can defend against only certain types of ROP attacks. In this paper, we propose Indirect Branch Target Address Verification (IBTAV). IBTAV detects ROP attacks by checking if target addresses of indirect branches are valid. IBTAV can defends against almost all ROP attacks because it verifies a target address of every indirect branch instruction. Since IBTAV does not require dynamic execution flow analysis, the performance overhead of IBTAV is relatively low. Our evaluation of IBTAV on SPEC CPU 2006 shows less than 15% performance overhead.