• Title/Summary/Keyword: Defense Technology Protection

Search Result 121, Processing Time 0.025 seconds

Mechanical Performance Study of Flexible Protection Tube for Submarine Cables (해저케이블용 유연보호튜브의 기계적 성능 연구)

  • Kyeong Soo Ahn;Yun Jae Kim;Jin-wook Choe;Jinseok Lim;Sung Woong Choi
    • Composites Research
    • /
    • v.37 no.2
    • /
    • pp.101-107
    • /
    • 2024
  • Demand for submarine cable is increasing due to advances in submarine power transmission technology and submarine cable manufacturing technology. Submarine cable use various types of protective equipment to prevent problems such as high maintenance costs in the event of cable damage and power outages during maintenance periods. Among them, flexible protection tube is a representative protective equipment to protect cables and respond to external forces such as waves and current. The flexible protection tube is made of polyurethane 85A hyperelastic material, so the calculation of mechanical behavior is carried out using mechanical properties based on experimental results. In this study, a study was conducted to determine the bending performance and tensile performance of flexible protection tube through analytical methods. The physical properties obtained through the multiaxial tensile test of polyurethane 85A were used for the analysis. Bending and tensile performance were determined for the maximum bending moment standard of 15 kN·m and the tensile load standard of 50 kN. As a result, it was confirmed that when the maximum bending moment of 15 kN·m of the flexible protection tube occurred, the bending performance of the MBR was secured at 13 m and when a tensile load of 50 kN, it was applied the maximum vertical displacement was 968 mm, confirming that the tensile performance was secured.

A Multi-Perspective Benchmarking Framework for Estimating Usable-Security of Hospital Management System Software Based on Fuzzy Logic, ANP and TOPSIS Methods

  • Kumar, Rajeev;Ansari, Md Tarique Jamal;Baz, Abdullah;Alhakami, Hosam;Agrawal, Alka;Khan, Raees Ahmad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.240-263
    • /
    • 2021
  • One of the biggest challenges that the software industry is facing today is to create highly efficient applications without affecting the quality of healthcare system software. The demand for the provision of software with high quality protection has seen a rapid increase in the software business market. Moreover, it is worthless to offer extremely user-friendly software applications with no ideal security. Therefore a need to find optimal solutions and bridge the difference between accessibility and protection by offering accessible software services for defense has become an imminent prerequisite. Several research endeavours on usable security assessments have been performed to fill the gap between functionality and security. In this context, several Multi-Criteria Decision Making (MCDM) approaches have been implemented on different usability and security attributes so as to assess the usable-security of software systems. However, only a few specific studies are based on using the integrated approach of fuzzy Analytic Network Process (FANP) and Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) technique for assessing the significant usable-security of hospital management software. Therefore, in this research study, the authors have employed an integrated methodology of fuzzy logic, ANP and TOPSIS to estimate the usable - security of Hospital Management System Software. For the intended objective, the study has taken into account 5 usable-security factors at first tier and 16 sub-factors at second tier with 6 hospital management system softwares as alternative solutions. To measure the weights of parameters and their relation with each other, Fuzzy ANP is implemented. Thereafter, Fuzzy TOPSIS methodology was employed and the rating of alternatives was calculated on the foundation of the proximity to the positive ideal solution.

Application and Development Strategies of a Secure Real-Time Operating System in Weapon Systems within the Defense Sector (국방분야 보안 RTOS의 무기체계 적용 및 발전 방안)

  • Sang-Seung Lee;Keun-Ha Choi;Seung-Hyeon Hwang;Hyun-Ji Kim;Kyung-Deok Seo;Hwa-Eun Seong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.5
    • /
    • pp.189-193
    • /
    • 2024
  • As cyber threats increase in the defense sector, the security of weapon system software is becoming increasingly important. Currently, most of the embedded software installed in domestic weapon systems operates based on foreign real-time operating systems(RTOS) that have no security. As a result, the localization and security enhancement of embedded software for weapon systems have emerged as urgent tasks. This study aims to propose the application and development strategies of secure RTOS for weapon systems. To this end, we examined the technological trends of domestic and foreign RTOS and secure RTOS, and analyzed the problems of current embedded software in weapon systems. The results revealed major issues such as low localization, vulnerability to cyber attacks, difficulty in maintenance, increased costs, and loss of opportunities for accumulating technological capabilities. An investigation of the current status of embedded software applied to existing weapon systems found that embedded SW are in operation across all fields, including maneuver, firepower, protection, command and control, communication, naval vessels, and aircraft. Among them, 99% rely on foreign RTOS such as VxWorks. A review of the core functions and applicability of secure RTOS to weapon systems suggests that it can be applied to key areas requiring real-time performance and security, such as fire control, navigation devices, and flight control in existing and future weapon systems. However, ensuring performance and reliability, securing verification and compatibility, and systematic government support were raised as prerequisites.

A Study on the Design Verification by Using Finite Elements Method and Quality Improvement of Radar by Managing Change Points of 4M (유한요소 기법을 활용한 설계검증 및 4M 변경점 관리를 통한 레이더장비 품질 신뢰성 확보에 관한 연구)

  • Jo, Hee Jin;Pak, Se Jin;Lee, Nam Ho;Jung, Won Yong
    • Journal of Korean Society for Quality Management
    • /
    • v.47 no.3
    • /
    • pp.437-451
    • /
    • 2019
  • Purpose: The purpose of this study is to improve the quality of the PGM system by improving the structure and production process of slip-ring rotary joint for radar. Methods: The improvement measures for each cause are established through failure analysis of broken items. Specifically, changing in the housing to improve the heating system. Changing the transportation method to prevent damage to equipment during transport. Changing work process of the attenuator ring to prevent damage. etc. Results: The results of this study are as follows; improving the heating system reduces heat generated by the attenuator by about 7 degrees and obtain additional temperature margins. Reduction of defect rate because of adding X-band rotary joint run-out measurement test, ESS of slip-ring rotary joint and Transportation improvement(reinforced flight boxes, tube protection, etc). Getting stable VSWR values by improving work process of attenuator overheating due to a bad bonding process. Conclusion: Through this study, improvements were made to slip-ring rotary joint that failed repeatedly for various reasons. As a result of the application of the improvements, the same fault does not occur until now, so we can see that the quality of PGM has improved.

A Study of IP Spoofing Attack and Defense Through Proxy Server (Proxy Server를 통한 IP Spoofing 공격과 방어 연구)

  • Lee, Bo-Man;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.281-284
    • /
    • 2010
  • The characteristics of International Hacking is that because even if with tracing techniques, nobody can find Real IP address of the attacker so it is true that Great difficulty in the investigation. so that an attacker goes through the Proxy Server Many times and they use techniques of IP Spoofing to hide their IP address. In this paper, study How attackers use IP Spoofing Technique and the application of Proxy Server. In addition, to Propose IP Spoofing attacks through the Proxy Server attack and defend methods also IP traceback methods so this study materials will contribute to the development of International Hacking and Security Protection Technology.

  • PDF

Analysis of Radiation Protection, Awareness and Attitude of Radiological Technologist in Mammography Room (유방촬영실에 근무하는 방사선사의 방사선 방어, 인식 및 태도에 관한 분석)

  • Hong, Dong-Hee
    • Journal of radiological science and technology
    • /
    • v.40 no.4
    • /
    • pp.557-565
    • /
    • 2017
  • This study was conducted to investigate the radiation protection, awareness, and attitude of radiological technologists in the mammography room due to the low energy use of breast imaging. Data collection was performed by 222 independent radiological technologists in the breast and breast clinic of six hospitals except Jeju Island. The independent sample t-test and oneway variance analysis were performed. As a result, it was found that the lower the number of men(p<0.05), the age of 30s(p<0.05), the marriage(p<0.05), the work experience of more than 10 years(p<0.05), the working hours of 8 hours(p<0.01), the less the impact of radiation(p<0.01), the more important it was to radiation defense. appear. This is thought to be influenced by the work specificity and work environment of the mammography room, and it will be used as a basic data to raise awareness and act on the exposure through analysis with other factors.

Analysis of Causes PCB Failure for Collective Protection Equipment and Improvement of Quality (집단보호장비 내의 회로카드조립체 고장 원인 분석 및 품질 향상)

  • Pak, Se-Jin;Ki, Sang-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.87-92
    • /
    • 2019
  • This study is the analysis of causes of printed circuit board (PCB) in collective protection equipment failure and quality improvement. The equipment is a component of the weapon system currently in operation and serves to defend against enemy chemical and biological attack as well as heating and cooling functions. However, during operation in the military, fans of condensate assembly failed to operate. The cause of the failure is the burning of PCB. It was found that the parts were heated according to the continuous cooling operation under the high temperature environmental conditions. Accordingly, the electronic components exposed to high temperature were deteriorated and destroyed. To solve this problem, PCB apply to heatsink. The performance test of improved PCB has been completed. Futhermore system compatibility, positive pressure maintenance and noise test were performed. This improvement confirmed that no faults have occurred in PCB so far. Therefore, the quality of the equipment has improved.

Risk Management-Based Application of Anti-Tampering Methods in Weapon Systems Development (무기 시스템 개발에서 기술보호를 위한 위험관리 기반의 Anti-Tampering 적용 기법)

  • Lee, Min-Woo;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.99-109
    • /
    • 2018
  • Tampering involves illegally removing technologies from a protected system through reverse engineering or developing a system without proper authorization. As tampering of a weapon system is a threat to national security, anti-tampering measures are required. Precedent studies on anti-tampering have discussed the necessity, related trends, application cases, and recent cybersecurity-based or other protection methods. In a domestic situation, the Defense Technology Protection Act focuses on how to prevent technology leakage occurring in related organizations through personnel, facilities and information systems. Anti-tampering design needs to determine which technologies are protected while considering the effects of development cost and schedule. The objective of our study is to develop methods of how to select target technologies and determine counter-measures to protect these technologies. Specifically, an evaluation matrix was derived based on the risk analysis concept to select the protection of target technologies. Also, based on the concept of risk mitigation, the classification of anti-tampering techniques was performed according to its applicability and determination of application levels. Results of the case study revealed that the methods proposed can be systematically applied for anti-tampering in weapon system development.

Study on Emerging Security Threats and National Response

  • Il Soo Bae;Hee Tae Jeong
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.4
    • /
    • pp.34-41
    • /
    • 2023
  • The purpose of this paper is to consider the expansion of non-traditional security threats and the national-level response to the emergence of emerging security threats in ultra-uncertain VUCA situations. As a major research method for better analysis, the theoretical approach was referred to papers published in books and academic journals, and technical and current affairs data were studied through the Internet and literature research. The instability and uncertainty of the international order and security environment in the 21st century brought about a change in the security paradigm. Human security emerged as the protection target of security was expanded to individual humans, and emerging security was emerging as the security area expanded. Emerging security threatsthat have different characteristicsfrom traditionalsecurity threats are expressed in various ways, such as cyber threats, new infectious disease threats, terrorist threats, and abnormal climate threats. First, the policy and strategic response to respond to emerging security threats is integrated national crisis management based on artificial intelligence applying the concept of Foresight. Second, it is to establish network-based national crisis management smart governance. Third, it is to maintain the agile resilience of the concept of Agilience. Fourth, an integrated response system that integrates national power elements and national defense elements should be established.

Development Direction of Maritime Manned-Unmanned Systems through Measurement of Combat Effectiveness against Major Threats on Sea Lines of Communication (해상교통로 상 주요 위협별 전투 효과 측정을 통한 해양 유·무인 복합체계 발전방향)

  • Yong-Hoon Kim;Yonghoon Ha
    • Journal of Industrial Convergence
    • /
    • v.21 no.11
    • /
    • pp.29-41
    • /
    • 2023
  • In this study, assuming that the maritime manned-unmanned systems, which will be used as the main force of the ROK Navy in the future, conducts its sea line of communication(SLOC) protection operations, the combat effectiveness against major threats was measured, and through this, the development direction of the manned-unmanned systems was suggested. Multi-criteria decision-making techniques such as Delphi and AHP were used to measure combat effectiveness, and the AHP survey was conducted on 40 naval officers, including 25 senior officers who are well-understood in the combat effectiveness of the weapons system and MUM-T. As an evaluation index for measuring combat effectiveness, the OODA loop was set as the main attribute, followed by Observe(0.358), Orient(0.315), Act(0.217), and Decide(0.110). The combat effectiveness of each major threat in SLOC, the lowest alternative, was measured to be 1.68 times higher than the response to maritime conflicts in neighboring countries and 3.61 times higher than the response to transnational threats. These results are expected to support rational decision-making in determining the level of technology required for acquisition of marine manned-unmanned systems and establishing operational plans for naval forces.