• Title/Summary/Keyword: Weapon System Acquisition

Search Result 181, Processing Time 0.031 seconds

The study on the construction of IWSDB for National Defense CALS (국방 CALS를 위한 IWSDB 구축에 관한 연구)

  • 신선우;손해용;김철환
    • The Journal of Society for e-Business Studies
    • /
    • v.1 no.1
    • /
    • pp.93-116
    • /
    • 1996
  • This study aims to develop an approach to construct IWSDB for National Defense CALS. Along with the introduction of Korean version of CALS conception, it is essential to analyze the national defense system with a new information technology for the construction of IWSDB. A long-tenn goal of CALS is to construct fully Integrated Data Environment (IDE) and establish IWSDB for the application of CALS conception to the life cycle management of weapon system. IWSDB is a set of databases that contain digital data. It supports common interface of data objects and databases throughout the life cycle management of weapon system, including design, engineering, analysis, manufacturing, operation, and logistics. etc. The goal of this study is threefold. First, we propose a right direction for the establishment of Integrated Data Environment. For the integrated database technology, we use the five schema architecture and the distributed object oriented technology that will lead to the "share of data." Second, we present the most effective IWSDB architecture for defense CALS, which will provide the efficient data sharing by business process modeling. Third, we suggest that IWSDB should be constructed based on the process which is related to the acquisition and logistics of weapon system for the national defense, and at the same time it should be implemented with GITIS for government agencies and CITIS for the industries in order to obtain the efficient data sharing.

  • PDF

A Study on Constructing a RMF Optimized for Korean National Defense for Weapon System Development (무기체계 개발을 위한 한국형 국방 RMF 구축 방안 연구)

  • Jung keun Ahn;Kwangsoo Cho;Han-jin Jeong;Ji-hun Jeong;Seung-joo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.827-846
    • /
    • 2023
  • Recently, various information technologies such as network communication and sensors have begun to be integrated into weapon systems that were previously operated in stand-alone. This helps the operators of the weapon system to make quick and accurate decisions, thereby allowing for effective operation of the weapon system. However, as the involvement of the cyber domain in weapon systems increases, it is expected that the potential for damage from cyber attacks will also increase. To develop a secure weapon system, it is necessary to implement built-in security, which helps considering security from the requirement stage of the software development process. The U.S. Department of Defense is implementing the Risk Management Framework Assessment and Authorization (RMF A&A) process, along with the introduction of the concept of cybersecurity, for the evaluation and acquisition of weapon systems. Similarly, South Korea is also continuously making efforts to implement the Korea Risk Management Framework (K-RMF). However, so far, there are no cases where K-RMF has been applied from the development stage, and most of the data and documents related to the U.S. RMF A&A are not disclosed for confidentiality reasons. In this study, we propose the method for inferring the composition of the K-RMF based on systematic threat analysis method and the publicly released documents and data related to RMF. Furthermore, we demonstrate the effectiveness of our inferring method by applying it to the naval battleship system.

A Study on the Necessity of Verification about depot level maintenance plan through the Weapons System cases analysis (무기체계 사례 분석을 통한 창정비개발계획안 검증 필요성 연구)

  • Ahn, Jung-Jun;Kim, Su-Dong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.2
    • /
    • pp.76-82
    • /
    • 2019
  • This study has done to search for a solution to remove risk limitedly caused by separating weapon system acquisition from operation and maintenance at the view point of Logistic Commander who's responsible for stable operation and maintenance after acquiring weapon system. At the System development stage, unverified overhaul development plan may cause additional manpower and costs after the development, and furthermore it is likely to have risk to lower reliability of the military. Thus, research and development agency should write overhaul development plan at the System development stage, and it should be verified through evaluation and verification test. Secondly, during research and development, institutional supplementation is needed to calculate human and material resources writing overhaul development plan. Thirdly, it should be able to analyze proper operation & maintenance plan and cost for overhaul plan at the pre-investigation stage. Fourthly, the base which can develop overhaul concept and overhaul factors should be included in the need and need determination document. Lastly, for the weapon system which has small amount of high power figure, project management should be performed to be able to specify at the each acquisition level of weapon system to realize Article 28, clause 3 and 4 of Defense business law.

A Study on Improvement of LASR (군수지원분석 자료처리체계 발전방안 연구)

  • 최진호;최석철
    • Journal of the military operations research society of Korea
    • /
    • v.25 no.1
    • /
    • pp.179-198
    • /
    • 1999
  • This study concerns logistics support analysis record(LASR) which provides guaranteed support, and is needed in various weapon systems development and acquisition to develop the optimal factor for integrated logistics support(ILS) by reflecting the results of logistics support analysis(LSA). We observe and analyze the logistics management information(LMI) system used in the United States under the integrated data environment(IDE), and analyze the differences between logistics management information system and the LOADERS(logistic support analysis data entry and retrieval system) which is currently used in Korea. Based on the analyzed results, a improvement model that corresponds to reality and can be applied is presented.

  • PDF

Analysis and improvement of weapon system software development and management manual based on functional safety standards (기능 안전 표준 기반의 무기체계 소프트웨어 개발 및 관리 매뉴얼 분석 및 개선 방안 연구)

  • Kim, Taehyoun;Bak, Daun;Paek, Ockhyun
    • Journal of Software Engineering Society
    • /
    • v.29 no.1
    • /
    • pp.7-12
    • /
    • 2020
  • As interest in functional safety has recently increased, application of functional safety standards has been required in various industrial fields. A functional safety standard is a document that defines functional safety-related activities required to prevent system malfunctions. All activities defined in this standard are required differentially according to the classification results calculated through the risk analysis and assessment of the system. In the field of domestic weapon systems, there is a manual for the development and management of weapon system software issued by the Defense Acquisition Program Administration (DAPA ). This manual requires static and dynamic analysis of software for functional safety related activities. However, the manual does not specifically address the classification activity through risk analysis and assessment as required for the preceding activities. Therefore, in this study, we analyze the problems of the manual based on the representative functional safety standards, and propose improvement plans.

(A Study on the Evaluation Method of Source Selection in Case of Weapon System Purchase Project) (무기체계 구매사업시 기종결정 평가방법에 관한 연구)

  • Choi, Jin-Seok;Lyu, Kyu-Yeol
    • Journal of the military operations research society of Korea
    • /
    • v.35 no.1
    • /
    • pp.63-82
    • /
    • 2009
  • The purpose of this study is to analyze the problems of current rules and regulations on the source selection for weapon system in defense acquisition project and suggest several techniques to ensure objectivity and fairness. As an application example, Helicopter source selection was presented. It was analyzed and compared through technique application and strength and weakness analysis of AHP, PROMETHEE and Attribute Transformation. The decision making techniques which make all conditions satisfactory in all situations are nonexistent. Thus, it is estimated that we can maintain the objectivity in the source selection of weapon systems by applying suitable decision making techniques in accordance with the patterns of evaluation item.

A Study on The Standard Process of Battle Experiment of the Maritime Weapon Systems Based on the M&S (모의실험 기반의 해양무기체계 전투실험 프로세스 표준화 방안연구)

  • Baek, Sang-Hoon;Hur, Jung-Haeng;Lee, Dong-Hoon;Choi, Bong-Wan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.5
    • /
    • pp.577-585
    • /
    • 2012
  • Modeling & simulation-based battle experiments(BEx) is being used extensively as an efficient, scientific and rational verification methodology for maritime weapon system acquisition. However, research of definition and concept of BEx and standardized rules and process for the BEx are insufficient in recent military field of BEx. In this study, we discussed the definition and process of BEx based on the role of MND(including JCS), Navy and ADD and proposed the standardized process of BEx for maritime weapon system. Secondly suggested a evaluation methods of modeling and simulation-based BEx with MOP, MOF, MOE in linkage of engineering, engagement, mission and constructive model. Finally presented validate result that applied to the Torpedo using standardized process based on our proposed methodology.

A Study on Improvement Method of Assessment Model of Interoperability based on LISI in Weapon Systems (LISI 기반의 무기체계 상호운용성 평가모델 개선방안 연구)

  • Yu, Chul-Hi;Lee, Tae-Gong;Lim, Jae-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.11B
    • /
    • pp.1715-1724
    • /
    • 2010
  • This paper analyzes the limitations and provides alternative options for Korean Military LISI model, which is based on interoperability assessment model, LISI(Level of Information System Interoperability), developed for US defense information systems and reformed to suit the Korean Military environment by ADD. Korean Military's LIST model is applied to all systems(information system, weapon systems, non-weapon systems)' interoperability assessment defined in acquisition regulations by Joint Interoperability Test Center, a subordinate unit of Defense Command and Control Forces and the only assessment agency of defense interoperability. LISI was basically developed as an assessment model for information system's interoperability, but due to it's shortfall in assessing complex systems including information systems, weapon and non-weapon systems required from New environment SOSI(System of Systems Interoperability) has recently been researched and developed. On the other hand, it is inevitable that Korean Military's LISI model face fundamental limitations as an interoperability assessment tool for Defense Information System as well as for weapon and non-weapon systems, since it was benchmarked and reformed from the US LISI model. In order to overcome such limitations, MND and associated agencies are providing improvement methods through studies. This paper will provide LISI capability model's assessment criteria on Application(P), Infrastructure(I), Data(D), restraints of on comparison assessment process of unit systems evaluated and politic alternatives to overcome the restraints.

Case Study and Performance Analysis of IT Convergence Business Models for Defense Sector (국방 IT융합 비즈니스 모델 사례와 성과 분석)

  • Sim, Seungbae;Yoo, Cheonsoo;Hong, Sumin
    • Journal of Information Technology Services
    • /
    • v.14 no.2
    • /
    • pp.275-287
    • /
    • 2015
  • Information technology (IT) convergence have been recognized one of the key drivers in the industry perspective. Especially, IT convergence have been one of the most important innovative way for defense sector. Korea government established IT convergence policy in 2008 and have been applying it to the core industry such as automotive, shipbuilding and defense industries. Recently, the creative vitamin project has been launched. Vitamin 'D' means the way to create the value of defense industry. This research analyzes and evaluates various IT convergence business models based on an operation of defense IT convergence center from 2011 to 2014, which is the industry IT convergence centers. Defense IT convergence business models can be classified into four types of mission area as follows : weapon acquisition and management, military intelligence, military power construction, and resources management. We define the concept of defense IT convergence and describe the framework and processes for applying IT to the defense sector. We analyzes and evaluates various business models designed through defense IT convergence framework and processes.

A study on the requirement of drone acquisition for the efficient dronebot combat system (효율적 드론봇 전투체계를 위한 드론 편제소요 도출에 관한 연구)

  • Cha, Dowan
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.3
    • /
    • pp.31-37
    • /
    • 2019
  • In this paper, we propose an approach to get the requirement of drone acquisition for the efficient dronebot combat system using brute force algorithm. We define parameters, such as width, depth, and important surveillance area for the surveillance mission in the Army battalion and company units based on real military operation environment and brute force algorithm with 4 steps including first, next, valid, output is applied to get the requirement of drone acquisition and each drone's path planning using computer simulation. As a result, we could get the requirement of drone acquisition and each drone's path planning, the Army could utilize our proposed approach in the Army dronebot combat system. In the future research, we will study on the reliability of our proposed approach to get the requirement of drone acquisition for the efficient dronebot combat system.