• Title/Summary/Keyword: Weapon Computer

Search Result 97, Processing Time 0.024 seconds

A Study on the Technology Level Survey and Analysis of Problems for improving the Defense IT Survey (국방 정보기술조사 개선을 위한 실태 분석 및 기술수준조사 연구)

  • Kwon, Kyeong-Yong;Seo, Min-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.1
    • /
    • pp.111-121
    • /
    • 2013
  • In this paper, we propose a study on the technology level survey and analysis of problems for improving the defense IT survey. Existing in 2008 and 2009, were surveyed and the documents were distributed. It's managed on system. It was surveyed 86 technology but, the selection method and content was simple. we surveyed and interviewed to work-related parties for improving and analyzed management system and documents. So we derived improvements. we selected defense IT from various aspects. and commissioned survey for document review and technology level to about 130 experts. The technology level is composed of the best technology weapon states, technology gap, spread effect, technology achievement time and research & development method.. We finally selected 40 technology, and suggested results of the technology level survey.

Review on improving measurement of cyber terror management system

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.6
    • /
    • pp.89-96
    • /
    • 2016
  • Damage and attack size of cyber terror is growing to the national size. Not only targeting at a certain companies or individuals but number of cyber terror targeting government bodies or unspecific people is increasing. This is because compared to traditional weapon, input cost is very cheap but ripple effect and shock are much stronger, affecting not only certain groups but also each individuals. 'Anti-terror measurement for protection of nation and public safety' passed last month is one of the renowned measurement passed regardless of objection from opposition party. The opposition party went against this through filibuster for 192 hours but this finally passed National Congress due to lack of oppositions. Korean government is taking post actions after passage of anti-terror measurement. Legislation of enforcement ordinance and regulations is due by 6th of next month. This regulation will be executed from June 4th after legislation. Whenever there is any security issues such as hacking of Korea Hydro and Nuclear Power and National Intelligence Service happens, lot of attention is made to those hackers. However, social recognition or management of those hackers need lot more improvement. Especially, as market of internet of things is increasing, there is an increased anxiety on information security. But as we only rely on security solutions, this problems are keep happening. Therefore, active investment on nurturing hackers who play the role of 'spear and shield' shall be made. Government should put more efforts to allow white hackers to show their abilities. We should have a policy for supporting high-quality programs such as BoB. To make information protection industry into future growth engine, it is necessary to nurture professionals for information protection and white hackers through special programs. Politicians should make related regulations as soon as possible to remove factors that prevent swift management of cyber attack due to lack of legislation. Government should pay lot more financial investment to nurturing professional manpower than now. Protecting life and asset of nation is responsibility and duty of our government. We all should recognize that controlling cyber attack is a part of national defense.

A Taxonomy of Embedded Systems (임베디드 시스템의 분류)

  • So, Sun Sup;Son, Kyung A;Eun, Seongbae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.818-825
    • /
    • 2020
  • The embedded system can be defined as a special purpose system with a built-in computer, and has a wide variety of applications such as home appliances, office equipment, and weapon systems. A well-defined taxonomy in a specific field is advantageous for learning and education, however, the classification scheme for embedded systems is difficult to find. In this paper, we propose a taxonomy for embedded systems. First, the generalized structure of the embedded system was presented. And, it is divided into two parts: "firmware based" and "embedded OS based". In addition, according to the characteristics of embedded system applications, it is divided into two categories: "non-dependable" application and "dependable" application, which makes 4 planes. We describe the features of each quadrant and show that the classification is well suited by showing examples. Our taxonomy can be used to set teaching and learning methods of embedded systems.

A Study on the Verification of Integrity of Message Structure in Naval Combat Management System

  • Jung, Yong-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.209-217
    • /
    • 2022
  • Naval CMS(Combat Management System) is linked to various sensors and weapon equipment and use DDS(Data Distribution Service) for efficient data communication between ICU(Interface Control Unit) Node and IPN(Information Processing Node). In order to use DDS, software in the system communicates in an PUB/SUB(Publication/Subscribe) based on DDS topic. If the DDS messages structure in this PUB/SUB method does not match, problems such as incorrect command processing and wrong information delivery occur in sending and receiving application software. To improve this, this paper proposes a DDS message structure integrity verification method. To improve this, this paper proposes a DDS message structure integrity verification method using a hash tree. To verify the applicability of the proposed method to Naval CMS, the message integrity verification rate of the proposed method was measured, and the integrity verification method was applied to CMS and the initialization time of the existing combat management system was compared and the hash tree generation time of the message structures was measured to understand the effect on the operation and development process of CMS. Through this test, It was confirmed that the message structure verification method for system stability proposed in this paper can be applied to the Naval CMS.

Priority of Modularization in Weapon System by using Grey Relational Analysis (GRA를 활용한 무기체계 모듈화 우선순위선정)

  • Lee, Kang-Taek;Lee, Jung-Hoon;Cho, Il-Hoon;Jung, Joo-Hyun;Kim, Geun-Hyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.647-654
    • /
    • 2016
  • In the defense industry, national security takes priority over economic sense and this has translated into high cost and long-term research and development. However, the exponential growth of technology and rapid changes in the security situation in recent years have resulted in a call for the development of systems at a low cost within a short period of time. In order to implement a modularization strategy in the field of defense, the introduction of line replaceable units in OO systems needs to be prioritized. This study selects six criteria following a literature review and prioritizes 11 modules for OO systems using the project evaluation method, Grey Relational Analysis (GRA). Based on the GRA results, the grey relational grades were derived as 0.83, 0.81 and 0.80 for the M11 (Main board), M8 (EMI module), M3 (Single board computer) modules, respectively. The cost and time of development is expected to be reduced in accordance with the grey relational grade. The results of this research could be utilized for decision making on adopting modularization in similar system development or product improvement programs (PIPs).

A Method for Eliminating Aiming Error of Unguided Anti-Tank Rocket Using Improved Target Tracking (향상된 표적 추적 기법을 이용한 무유도 대전차 로켓의 조준 오차 제거 방법)

  • Song, Jin-Mo;Kim, Tae-Wan;Park, Tai-Sun;Do, Joo-Cheol;Bae, Jong-sue
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.1
    • /
    • pp.47-60
    • /
    • 2018
  • In this paper, we proposed a method for eliminating aiming error of unguided anti-tank rocket using improved target tracking. Since predicted fire is necessary to hit moving targets with unguided rockets, a method was proposed to estimate the position and velocity of target using fire control system. However, such a method has a problem that the hit rate may be lowered due to the aiming error of the shooter. In order to solve this problem, we used an image-based target tracking method to correct error caused by the shooter. We also proposed a robust tracking method based on TLD(Tracking Learning Detection) considering characteristics of the FCS(Fire Control System) devices. To verify the performance of our proposed algorithm, we measured the target velocity using GPS and compared it with our estimation. It is proved that our method is robust to shooter's aiming error.

Estimation of Tritium Concentration in the Environment based upon Global Tritium Cycling Model (글로벌 삼중수소 순환 모델을 이용한 삼중수소 환경 방사능 추정)

  • Choi, Heui-Joo;Lee, Han-Soo;Kang, Hee-Suk;Lee, Chang-Woo
    • Journal of Radiation Protection and Research
    • /
    • v.28 no.1
    • /
    • pp.1-8
    • /
    • 2003
  • The periodic safety review of operational nuclear power plants requires that the plants should keep a well organized environmental monitoring program. The past records of environment monitoring data were analyzed. and the tritium concentrations of the samples in the surface and ground water around Kori site were measured. It was shown that the tritium concentrations around the Kori site were slightly higher than that of natural background. The change of background tritium concentration was estimated through a numerical modeling. Two different versions of 7 compartments model - the world and the northern hemisphere - defined in NCRP-62 were modeled for the global tritium cycling. The numerical solution of the model was obtained using a computer program, AMBER. The four cases of tritium source-terms into the atmosphere were considered. The results showed that the tritium concentration in the surface soil water was higher than that in sea water or surface stream water. Also, it was shown that the tritium produced by the interaction between cosmic rays and the gases were the major source of tritium, and the tritium produced by nuclear weapon test decreased considerably.

Developing an AR based Command Post eXercise(CPX) Simulator (증강현실 기반 지휘통제훈련 시뮬레이터 개발)

  • Park, Sangjun;Shin, Kyuyoung;Kim, Dongwook;Kim, Tai Hyo;Roh, Hyo Bin;Lee, Wonwoo
    • Convergence Security Journal
    • /
    • v.18 no.5_2
    • /
    • pp.53-60
    • /
    • 2018
  • As science and technology develops, it is expected that more precise and various weapons will be used in a much more complicate future battlefield environment. C4I is a system that provides the proper and necessary information to commanders and their staffs to recognize the battlefield situation by connecting and visualizing the complex battlefield environment and various weapon systems together. Commanders and staffs perform battle command training based on a computer or paper map to better utilize the C4I system and Command Post eXercise(CPX) is a process of the training. This is the way for them to improve command control and decision making skills. Analyzing of line of sight(LOS), identifying communication fringe area, deploying troop strength, and determining unit maneuver are highly restricted under the 2D based CPX. In recent years, however, three-dimensional (3D) CPX simulators have been developed to overcome these drawbacks. In response to this trend, this paper proposes a multi-user based CPX simulator using augmented reality (AR) glass, which can be used as a practical war game simulator.

  • PDF

A study on the requirement of drone acquisition for the efficient dronebot combat system (효율적 드론봇 전투체계를 위한 드론 편제소요 도출에 관한 연구)

  • Cha, Dowan
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.3
    • /
    • pp.31-37
    • /
    • 2019
  • In this paper, we propose an approach to get the requirement of drone acquisition for the efficient dronebot combat system using brute force algorithm. We define parameters, such as width, depth, and important surveillance area for the surveillance mission in the Army battalion and company units based on real military operation environment and brute force algorithm with 4 steps including first, next, valid, output is applied to get the requirement of drone acquisition and each drone's path planning using computer simulation. As a result, we could get the requirement of drone acquisition and each drone's path planning, the Army could utilize our proposed approach in the Army dronebot combat system. In the future research, we will study on the reliability of our proposed approach to get the requirement of drone acquisition for the efficient dronebot combat system.

Study on Co-Simulation Method of Dynamics and Guidance Algorithms for Strap-Down Image Tracker Using Unity3D (Unity3D를 이용한 스트랩 다운 영상 추적기의 동역학 및 유도 법칙 알고리즘의 상호-시뮬레이션 방법에 관한 연구)

  • Marin, Mikael;Kim, Taeho;Bang, Hyochoong;Cho, Hanjin;Cho, Youngki;Choi, Yonghoon
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.46 no.11
    • /
    • pp.911-920
    • /
    • 2018
  • In this study, we performed a study to track the angle between the guided weapon and the target by using the strap-down image seeker, and constructed a test bed that can simulate it visually. This paper describes a method to maintain high-performance feature distribution in the implementation of sparse feature tracking algorithm such as Lucas Kanade's optical flow algorithm for target tracking using image information. We have extended the feature tracking problem to the concept of feature management. To realize this, we constructed visual environment using Unity3D engine and developed image processing simulation using OpenCV. For the co-simulation, dynamic system modeling was performed with Matlab Simulink, the visual environment using Unity3D was constructed, and computer vision work using OpenCV was performed.