• Title/Summary/Keyword: Military operation

Search Result 821, Processing Time 0.027 seconds

Impact of ITSM Military Service Quality and Value on Service Trust

  • Woo, Hanchul;Lee, Sangdo;Huh, Jun-Ho;Jeong, Sukjae
    • Journal of Multimedia Information System
    • /
    • v.7 no.1
    • /
    • pp.55-72
    • /
    • 2020
  • As the IT service environment grows, it is critical in terms of IT service quality to minimize the occurrence of failures due to changes in applications and to diagnose and recover in a short period of time how failure will affect the business. Thus, the Defense Acquisition Program Administration (DAPA) has been building and operating ITSMs to implement IT service management in a leading manner. Information Technology Service Management (ITSM) is divided into events, obstacles, changes, versions and setup management to ensure flexibility and stability in service delivery. It is also operated separately from service level, availability, capacity, financial and IT service continuity management to ensure service quality and cost efficiency. Based on ITSM military service history, this study looks at the impact of quality of service on value, satisfaction, and trust. The results of the analysis are highly valuable for future ITSM implementation and operation.

A Study on the Improvement of the Utilization of the Korean Airspace (한국공역의 활용도 제고방안에 관한 연구)

  • Choe, Young-Il
    • Journal of Advanced Navigation Technology
    • /
    • v.3 no.1
    • /
    • pp.69-90
    • /
    • 1999
  • The Korean airspace is very much limited, but its users are many. Especially many special using airspaces for military aircraft are formulated within the Taegu Flight Information Region and it is so restricted for civil aircraft to use the military airspaces. However, as the demand of civil air traffic is increasing, positive cooperation among the users of the airspace is needed to cope with the demand and to uplift the utilitation of the Korean airspace. Most of airspace except airways within the FIR are restricted areas, prohibited areas or operation areas for the military purpose. This thesis shows how to improve the utilitation of the Korean airspace and how much economical benefit the suggestion gives.

  • PDF

Aircraft Combat Survivability Analysis Model for the Air-to-Ground Mission (공대지 임무를 위한 항공기 전투생존성 분석모형)

  • 김인동;하석태
    • Journal of the military operations research society of Korea
    • /
    • v.24 no.2
    • /
    • pp.1-16
    • /
    • 1998
  • Aircraft combat survivability(ACS) can be defined here as the probability of an aircraft to accomplish a given mission and not to be killed by enemy threats. The purpose of this thesis is to obtain analytically the combat survivability of the military aircraft according to the enemy and operation environment. Five factors under which a mission is being carried out are considered in this study. These factors are types and performance of enemy threats, aircraft susceptibility, aircraft vulnerability, ECM(electronic counter measures) capability, and pilot's capability. The model constructed in this study would be a useful tool to analyze ACS based on analytical method. It is also able to provide a better input data for wargaming simulation and present a criterion on determining optimal sorties for aircraft's air-to-ground mission.

  • PDF

A Study on An Architecture of the Security improved Document DRM for preventing Information Leakage in Military Information System Environment (국방 정보시스템 환경에서 정보유출 방지를 위한 보안성이 강화된 문서 DRM 설계에 관한 연구)

  • Eom, Jung Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.41-49
    • /
    • 2011
  • We designed a security improved document DRM for protecting document based military information which is transmitted in the military information system environment. The user should be could not access document which not related to his/her role and duty, and must view the only document appropriate for his/her role and security level according to the security level of document. We improved the security of document DRM by adding to the access control module in DRM server. Our system allows operation mode authorizations for the document, considering the user's role & security level and the security level of document. And it prevents indiscriminate access to the document and damage the confidentiality and integrity of information.

A Basic Study on the Jamming Mechanisms and Characteristics against GPS/GNSS Based on Navigation Warfare

  • Ko, Kwang-Soob
    • Journal of Navigation and Port Research
    • /
    • v.34 no.2
    • /
    • pp.97-103
    • /
    • 2010
  • It has been recognized that the risk from the vulnerability of GPS can lead to the extreme damage in the infrastructure of the civil and military in recent years. As an example, the intentional interference to GPS signal, named GPS jamming, was really performed to misguide GPS guided weapons during Iraq war in 2003, and the fact has also followed by the serious issues on GPS in civilian community. In the modernized military society, the navigation warfare(NAVWAR) based on the GPS jamming has been emerged and introduced as a military operation. The intentional interference to the future global navigation satellite system(GNSS) involving GPS must be also an important issue to civilian users in near future. This study is focused on the fundamental research prior to the research on "Potential principle of NAVWAR" under NAVWAR of the future warfare. In this paper, we would study on the investigation of NAVWAR based on electronic warfare(EW) and analyze characteristics of the jamming against GNSS's receivers. Then the general mechanism on GNSS jamming is proposed.

Analysis of the Human Performance and Communication Effects on the Operator Tasks of Military Robot Vehicles by Using Extended Petri Nets (확장된 페트리네트를 이용한 차량형 군사로봇의 운용자 성능 및 통신장애 영향분석)

  • Choi, Sang Yeong;Yang, Ji Hyeon
    • Korean Journal of Computational Design and Engineering
    • /
    • v.22 no.2
    • /
    • pp.162-171
    • /
    • 2017
  • Unmanned military vehicles (UMVs) are most commonly characterized as dealing with dull, dirty, and dangerous tasks with automation. Although most of the UMVs are designed to a high degree of autonomy, the human operator will still intervene in the robot's operation, and teleoperate them to achieve his or her mission. Thus, operator capacity, together with robot autonomy and user interface, is one of the most important design factors in the research and development of the UMVs. Further, communication may affect the operator task performance. In this paper, we analyze the operator performance and the communication effects on the operator performance by using the extended Petri nets, called OTSim nets. The OTSim nets was designed by the authors, being extended using pure Petri nets.

A Study on Airworthiness Certification Standards for Military Small Rotary-Wing Unmanned Aerial Vehicles (군용 소형 회전익무인기 감항인증기준에 대한 연구)

  • Yang, Junmo;Lee, Sangchul
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.29 no.2
    • /
    • pp.78-83
    • /
    • 2021
  • In modern society, the use of small rotary-wing unmanned aerial vehicles such as drones is increasing. As the military considers tactics using drones, demand for drones is increasing. However, there is still no airworthiness certification standard for drones for safety. In this paper, we proposed airworthiness certification standards for small rotorcraft unmanned aerial vehicles based on CS-LURS in Europe and STANG-4703, 4738 (draft) of the North Atlantic Treaty Organization. In addition, airworthiness certification standards have been strengthened through the case of unmanned aerial vehicle accidents in operation by the Korean military. The airworthiness certification standards for small rotary-wing unmanned aerial vehicles will be supplemented through a demonstration project.

Analysis of scientific military training data using zero-inflated and Hurdle regression (영과잉 및 허들 회귀모형을 이용한 과학화 전투훈련 자료 분석)

  • Kim, Jaeoh;Bang, Sungwan;Kwon, Ojeong
    • Journal of the Korean Data and Information Science Society
    • /
    • v.28 no.6
    • /
    • pp.1511-1520
    • /
    • 2017
  • The purpose of this study is to analyze military combat training data to improve military operation and training methods and verify required military doctrine. We set the number of combat disabled enemies, which the individual combatants make using their weapons, as the response variable regarding offensive operations from scientific military training data of reinforced infantry battalion. Our response variable has more zero observations than would be allowed for by the traditional GLM such as Poisson regression. We used the zero-inflated regression and the hurdle regression for data analysis considering the over-dispersion and excessive zero observation problems. Our result can be utilized as an appropriate reference in order to verify a military doctrine for small units and analysis of various operational and tactical factors.

A Study on the Method for Judging the EMP Protection Plan and Required Level through Decision Making (의사결정론을 통한 EMP 방호대책 및 수준 판단방안 제시에 관한 연구)

  • Kim, Kuk-Joo;Park, Sang-Woo;Baek, Jang-Woon;Park, Young-Jun
    • Journal of the Korea Institute of Building Construction
    • /
    • v.19 no.2
    • /
    • pp.193-200
    • /
    • 2019
  • In the context of increasing threats of EMP by neighboring countries in the security situation on the Korean peninsula, EMP protection facilities are a very important means of ensuring military operational capability. These EMP protection facilities should be constructed by comprehensively judging various factors about operation units. However, Defense Military Facilities Criteria and National Technical Guideline for EMP protection require at least 80dB shielding effectiveness without considering other options. In this study, we use objective and statistical methods to refine the consideration of the required EMP protection level based on the opinions of the experts. To do this, the Delphi technique is used for this study, and the survey was conducted from 53 experts related to EMP protection standard in the military and civilian sectors. The first questionnaire investigated the appropriate level of EMP protection, and the second questionnaire analyzed the factors considered in establishing EMP protection level. As a result of the factor analysis on the opinions of the experts, it was concluded that the EMP protection requirement level should be determined by variables of METT + TC.

Analysis of Operational Efficiency of Military Department of University Using Data Envelopment Analysis Method (자료포락분석법을 활용한 일반대학 군사학과의 운영 효율성 분석)

  • Young-Min Bae;Sweng-Kyu Lee
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.95-102
    • /
    • 2023
  • The purpose of this paper was to confirm the operational level of the military department of universities, which plays a key role in the officer training process, through empirical research and confirm meaningful results for improvement. There are 11 university military departments operated through the Army, agreements, and semi-agreement, and the Data Envelopment Analysis (DEA) was applied from the perspective of resource input and performance for each university's military department operation to analyze relative efficiency and confirm specific directions for improvement. As a result of operational efficiency analysis, 6 DMUs (Decsision Making Unit) were found to be efficient in the BCC model out of 11 DMUs, and the evaluation results could be confirmed through classification of efficient and inefficient groups through data capture analysis. This paper may be of practical value in that it checks the efficiency of the comparative university military departments and confirms specific information for development through the DEA-Additive model that reflects several evaluation factors at once. Through this, the operators of each university's military department are admitted.