• Title/Summary/Keyword: air defense

Search Result 592, Processing Time 0.025 seconds

Software Development Process of Military Aircraft based on MIL-HDBK-516C (MIL-HDBK-516C 기반의 군용항공기 탑재 소프트웨어 개발 프로세스)

  • Heo, Jin-Gu;Moon, Yong-Ho
    • Journal of Aerospace System Engineering
    • /
    • v.15 no.3
    • /
    • pp.71-78
    • /
    • 2021
  • Since most functions of modern aircraft are controlled by software, software errors are directly related to aircraft safety. The criterion in Chapter 15 of the MIL-HDBK-516C addresses safe development and verification of military aircraft software. As the U.S. Air Force repeatedly experienced non-compliance with Chapter 15 criterion of the MIL-HDBK-516C, it published an Airworthiness Circular (AC-17-01) as a guide to meeting the criterion. In this paper, Chapter 15 of MIL-HDBK-516C, AC-17-01 and the SW Qualification Guideline (DO-178C) as applied by the Federal Aviation Administration are compared and analyzed. For the analysis, a matching ratio formula between the MIL-HDBK-516C criteria specified in AC-17-01 and the DO-178C specified in MIL-HDBK-516C criteria is defined. The sections that satisfy MIL-HDBK-516C criterion are derived when AC-17-01 or DO-178C matches. Based on the analysis results, the aircraft software development process is established and examples of application of Chapter 15 of MIL-HDBK-516C are addressed.

Research on the Necessity of Building the Second Space Rocket Launching Sites for Breakthrough Development of R.O.K National Space Power (도약적 국가 우주력 발전을 선도할 제2 우주센터 구축 필요성 연구)

  • Park, Ki-tae
    • Journal of Space Technology and Applications
    • /
    • v.2 no.2
    • /
    • pp.146-168
    • /
    • 2022
  • Witnessing current military conflicts in South China Sea and Eastern Europe, most defense analysts evaluate one of the most serious security threat toward the US is coming from the superpower competitions with Russia and China. The main means for such super power hegemonic competitions is military power and space power is a key enabler to maximize the efficiency and effectiveness of military employment. Reflecting above circumstances, the space hegemonic competition between the Unites States and China is spreading into all aspects of national powers. Under such an environment, R.O.K needs to significantly develop national space power to preserve life and assets of people in space. On the other hand, the R.O.K has a lot of limitations in launching space assets into orbits by land-based space rockets due to its geographic locations. The limitation of rocket launching direction, the failure to secure a significant area enough to secure safety and the limitation to secure open area enough to build associated facilities are among them. On this paper, I will suggest the need to build the 2nd space rocket launching site after analyzing a lot of short-falls the current 'Naro' space center face, compared to those of advanced space powers around the world.

Cost Education Effectiveness Analysis of Immersion-type and Simulator-type Virtual Reality Training Systems -Focusing on The ROK Army Virtual Reality Training System- (몰입형과 시뮬레이터형 가상현실 훈련체계 비용 대 교육효과 분석 -육군 가상현실 훈련체계를 중심으로-)

  • Kim, Do-heon;Min, Seung-hee;Kim, Yeek-hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.4
    • /
    • pp.345-352
    • /
    • 2021
  • The Republic of Korea Army (ROK Army) is trying to improve the effectiveness of education and training. On the other hand, there are many restrictions in actual training, limiting their practical education and training. Virtual reality technology is being used to overcome these limitations. Virtual reality technology is developing in various types, and the ROK Army needs to introduce a virtual reality training system for cost-effective education. The ROK Army mainly uses high-cost simulator-types that are similar to real equipment. Recently, a low-cost immersive-type virtual reality training system wearing an HMD is also being used. This study analyzed the cost education effectiveness of simulator-type and immersive-type virtual reality training systems in operation at the ROK Army air defense school. First, the research method used AHP to analyze the educational effects. Second, the cost was applied to the production cost of the virtual reality training system to analyze the cost-effectiveness of the education. The immersion-type was 3.4 times higher than the simulator-type in terms of cost effectiveness. These results can be used as basic data for analyzing the cost-effectiveness of a virtual reality training system.

Numerical Simulation of Spatiotemporal Distribution of Chaff Clouds for Warship Defense using CFD-DEM Coupling (CFD-DEM 연동을 통한 함정용 채프운의 시공간 분포 해석)

  • Uk Jin Jung;Moonhong Kim;Dongwoo Sohn
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.36 no.2
    • /
    • pp.93-103
    • /
    • 2023
  • Warships widely spread numerous chaffs using a blast, which form chaff clouds that create false radar cross-sections to deceive enemy radars. In this study, we established a numerical framework based on a one-way coupling of computational fluid dynamics and discrete element method to simulate the spatiotemporal distribution of chaff clouds for warships in the air. Using the framework, we investigated the effects of wind, initial chaff cartridge angle, and blast pressure on the distribution of chaff clouds. We observed three phases for the chaff cloud diffusion: radial diffusion by the explosion, omnidirectional diffusion by turbulence and collision, and gravity-induced diffusion by the difference in the fall speed. The wind moved the average position of the chaff clouds, and the diffusion due to drag force did not occur. The direction of radial diffusion by the explosion depended on the initial angle of the cartridge, and a more vertical angle led to a wider distribution of the chaffs. As the blast pressure increased, the chaff clouds spread out more widely, but the distribution difference in the direction of gravity was not significant.

A Study on the Analysis and the Direction of Improvement of the Korean Military C4I System for the Application of the 4th Industrial Revolution Technology (4차 산업혁명 기술 적용을 위한 한국군 C4I 체계 분석 및 성능개선 방향에 관한 연구)

  • Sangjun Park;Jee-won Kim;Jungho Kang
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.131-141
    • /
    • 2022
  • Future battlefield domains are expanding to ground, sea, air, space, and cyber, so future military operations are expected to be carried out simultaneously and complexly in various battlefield domains. In addition, the application of convergence technologies that create innovations in all fields of economy, society, and defense, such as artificial intelligence, IoT, and big data, is being promoted. However, since the current Korean military C4I system manages warfighting function DBs in one DB server, the efficiency of combat performance is reduced utilization and distribution speed of data and operation response time. To solve this problem, research is needed on how to apply the 4th industrial revolution technologies such as AI, IoT, 5G, big data, and cloud to the Korean military C4I system, but research on this is insufficient. Therefore, this paper analyzes the problems of the current Korean military C4I system and proposes to apply the 4th industrial revolution technology in terms of operational mission, network and data link, computing environment, cyber operation, interoperability and interlocking capabilities.

Analysis on Study Cases of Safety Assessment and Cases for Spent Nuclear Fuel Pool Accident (사용후핵연료 습식저장시설 사고 안전성 평가 연구 현황 및 사고 사례 분석)

  • Shin Dong Lee;Hyeok Jae Kim;Geon Woo Son;Kwang Pyo Kim
    • Journal of Radiation Industry
    • /
    • v.17 no.3
    • /
    • pp.283-292
    • /
    • 2023
  • Spent nuclear fuel corresponds to high-level radioactive waste that has high decay heat and radioactivity. Accordingly, Spent nuclear fuel withdrawn from the reactor core is primarily stored and managed in a spent nuclear fuel pool in the nuclear power plant to reduce decay heat and radioactivity. In Korea, most nuclear power plant store all spent nuclear fuel in a spent nuclear fuel pool. For wet storage, there are no defense in depth different with reactor core. The study related to spent nuclear fuel pool accident should be carried out to ensure safety. Therefore, it is necessary to analyze previous study cases related to safety of spent nuclear fuel pool and accident cases to build foundational knowledge. The Objective of this study is to analyze study cases of safety assessment and cases for spent nuclear fuel pool accident. For analyzing study cases of safety assessment, possible phenomena when spent nuclear fuel pool accident occurring identified, Subsequently, study cases for safety assessment about each phenomena were investigated, and materials & methods and results for each study are analyzed. For analyzing cases for spent nuclear fuel pool accident, we analyzed accident cases caused by loss of cooling and loss of coolant in spent nuclear fuel pool. Subsequently, causes and change of water level and temperature by each accident case are analyzed. As a result of the analysis on study cases of spent nuclear fuel pool accident, the results of the study conducted by each research institute were vary depending on the computer code, materials & methods of experiment and major assumptions used in the study. As a result of analyzing cases for spent nuclear fuel pool accident, it was found that accident cases for loss of cooling is more than cases for loss of coolant accident. Even though the types of accident in spent nuclear fuel pool were similar, the specific causes were different by each accident case. All the accident cases analyzed did not lead to severe accidents, such as nuclear fuel being exposed to the air. The result of this study will be used as fundamental data for study on spent nuclear fuel pool accident that will be conducted in the future.

A Study on Space Insurance of Foreign nation's Law (외국의 우주보험 관련법 연구)

  • Cho, Hong-Je
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.26 no.1
    • /
    • pp.271-297
    • /
    • 2011
  • Recently, risk of space accident possibility increased in according to commercial space activity and space debris. It failed launch satellite second times in South Korea. Therefore was discussed on liability and insurance issue. Generally, discuss of space insurance be divided two type. Firstly, space insurance relevant to launching satellite and in-orbit. Satellite Launch Insurance and In-Orbit Insurance by the Satellite Operator Secondly, space insurance relevant to Third Party Liability. The former is to protect owner of satellite and operator. The latter is to liable and indemnify owner of satellite and operator's liability. US, UK, France, Russia, South Korea forced to buy space insurance following to domestic law. This is a brief overview of risk allocation and insurance practices in the commercial space transportation industry today. We begin with traditional space transportation, i.e., commercial satellite launches. This is a mature industry with known players. Industry practices have developed and legislation has been adopted in the U.S. and other countries over the past decades to address liability and insurance issues. The primary focus here is on U.S. law, but the discussion of industry practice applies more generally. We then move on to a more exotic form of space transportation: Commercial human space flight. Several private companies are now signing up space tourists for commercial suborbital human space flight, advertised to become available in the near future. The United States amended its launch legislation in 2004 to promote commercial human space flight. But questions remain as to how this new industry will respond to the risk allocation regime established by the U.S. legislation, which leaves both the space flight operator and space tourist exposed to risk and potential liability. As a general proposition, state statutes and contractual waivers alone cannot be relied upon to provide adequate liability protection, and insurance will be required. Federally mandated contractual waivers by space flight participants or liability caps would be helpful to complement insurance solutions. Eventually, as the industry matures, such practices could be extended to an international legal regime. For all the issues mentioned above, I have studied the existing international treaties and several country's domestic law to the space by referring U.S's Commercial Space Launch Amendment Act of 2004 and concluded that uniform legal regime to govern these insurance issues should be established domestically and internationally in the future.

  • PDF

Space Development and Law in Asia (아시아의 우주개발과 우주법)

  • Cho, Hong-Je
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.28 no.2
    • /
    • pp.349-384
    • /
    • 2013
  • The Sputnik 1 launching in 1957 made the world recognize the necessity of international regulations on space development and activities in outer space. The United Nations established COPUOS the very next year, and adopted the mandate to examine legal issues concerning the peaceful uses of outer space. At the time, the military sector of the U.S.A. and the Soviet Union were in charge of the space development and they were not welcomed to discuss the prohibition of the military uses of outer space at the legal section in the COPUOS. Although both countries had common interests in securing the freedom of military uses in outer space. As the social and economic benefits derived from space activities have become more apparent, civil expenditures on space activities have continued to increase in several countries. Virtually all new spacefaring states explicitly place a priority on space-based applications to support social and economic development. Such space applications as satellite navigation and Earth imaging are core elements of almost every existing civil space program. Likewise, Moon exploration continues to be a priority for such established spacefaring states as China, Russia, India, and Japan. Recently, Companies that manufacture satellites and ground equipment have also seen significant growth. On 25 February 2012 China successfully launched the eleventh satellite for its indigenous global navigation and positioning satellite system, Beidou. Civil space activities began to grow in China when they were allocated to the China Great Wall Industry Corporation in 1986. China Aerospace Corporation was established in 1993, followed by the development of the China National Space Administration. In Japan civil space was initially coordinated by the National Space Activities Council formed in 1960. Most of the work was performed by the Institute of Space and Aeronautical Science of the University of Tokyo, the National Aerospace Laboratory, and, most importantly, the National Space Development Agency. In 2003 all this work was assumed by the Japanese Aerospace Exploration Agency(JAXA). Japan eases restrictions on military space development. On 20 June 2012 Japan passed the Partial Revision of the Cabinet Establishment Act, which restructured the authority to regulate Japanese space policy and budget, including the governance of the JAXA. Under this legislation, the Space Activities Commission of the Ministry of Education, Culture, Sports, Science, and Technology, which was responsible for the development of Japanese space program, will be abolished. Regulation of space policy and budget will be handed over to the Space Strategy Headquarter formed under the Prime Minister's Cabinet. Space Strategy will be supported by a Consultative Policy Commission as an academics and independent observers. By revoking Article 4 (Objectives of the Agency) of a law that previously governed JAXA and mandated the development of space programs for "peaceful purposes only," the new legislation demonstrates consistency with Article 2 of the 2008 Basic Space Law. In conformity with the principles laid down in the 1967 Outer Space Treaty JAXA is now free to pursue the non-aggressive military use of space. New legislation is the culmination of a decade-long process that sought ways to "leverage Japan's space development programs and technologies for security purposes, to bolster the nation's defenses in the face of increased tensions in East Asia." In this connection it would also be very important and necessary to create an Asian Space Agency(ASA) for strengthening cooperation within the Asian space community towards joint undertakings.

  • PDF

A Study Consequence Management System of the Terrorism (테러리즘의 대응관리체제에 관한 고찰 - "9. 11 테러"를 중심으로 -)

  • Kim, Yi-Soo;Ahn, Byung-Soo;Han, Nam-Soo
    • Korean Security Journal
    • /
    • no.7
    • /
    • pp.95-124
    • /
    • 2004
  • It can be said that 'the September 11th Terrorist Attacks' in 2001 were not only the indiscriminate attacks on innocent people but also the whole - political, economical and military - attacks on human life. Also, 'the September 11th Terrorist Attacks' can be regarded as the significant events in the history of world, which were on the peak of the super-terrorism or new-terrorism that had emerged from the 1980s. However, if one would have analysed the developments of terrorism from the 1970s, they could have been foreknown without difficulty. The finding from this study can be summarized as the followings, First, in spite that the USA responsive system against terrorism had been assessed as perfect before 'the September 11th Terrorist Attacks', the fragilities were found in the aspects of the response on the new-terrorism or super-terrorism. The previous responsive system before 'the September 11th Terrorist Attacks' had the following defects as the followings: (1) it was impossible to establish the integrated strategy, because the organizations related to the response against terrorism had not integrated; (2) there were some weakness to collect and diffuse the informations related to terrorism; (3) the security system for the domestic airline service in USA and the responsive system of air defense against terrors on aircraft were very fragile. For these reasons, USA government established the 'Department of Homeland Security' of which the President is the head so that the many organizations related to terrorism were integrated into a single management system. And, it legislated a new act to protect security from terrors, which legalized of the wiretapping in spite of the risk of encroachment upon personal rights, increased the jail terms upon terrorists, froze the bank related to terrorist organization, and could censor e-mails. Second, it seem that Korean responsive system against terrors more fragile than that of USA. One of the reasons is that people have some perception that Korea is a safe zone from terrors, because there were little attacks from international terrorists in Korea. This can be found from the fact that the legal arrangement against terrorism is only the President's instruction No. 47. Under this responsive system against terrorism dependent on only the President's instruction, it is expected that there would be a poor response against terrors due to the lack of unified and integrated responsive agency as like the case of USA before 'the September 11th Terrorist Attacks'. And, where there is no legal countermeasure, it is impossible to expect the binding force on the outside of administrative agencies and the performances to prevent and hinder the terrorist actions can not but be limited. That is to say, the current responsive system can not counteract effectively against the new-terrorism and super-terrorism. Third, although there were some changes in Korean government's policies against terrorism. there still are problems. One of the most important problems is that the new responsive system against terrorism in Korea, different from that of USA, is not a permanent agency but a meeting body that is organized by a commission. This commission is controled by the Prime Minister and the substantial tasks are under the National Intelligence Service. Under this configuration, there can be the lack of strong leadership and control. Additionally, because there is no statute to response against terrorism, it is impossible to prevent and counteract effectively against terrorism. The above summarized suggests that, because the contemporary super-terrorism or new-terrorism makes numerous casualties of unspecified persons and enormous nationwide damages, the thorough prevention against terrorism is the most important challenge, and that the full range of legal and institutional arrangements for the ex post counteraction should be established. In order to do so, it is necessary for the government to make legal and institutional arrangements such as the permanent agency for protection from terrorism in which the related departments cooperates with together and the development of efficient anti-terror programs, and to show its willingness and ability that it can counteract upon any type of domestic and foreign terrorism so that obtain the active supports and confidence from citizens.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF