검색결과

검색조건
좁혀보기
검색필터
결과 내 재검색

간행물

    분야

      발행연도

      -

        검색결과 32

        1.
        2024.10 KCI 등재 구독 인증기관 무료, 개인회원 유료
        In this article, to solve the problems about obsolescence of parts and unable to driving turret when internal components are failure, the DC-DC boost converter in the gun/turret drive system of mobile weapon was improved. The power converting circuit in converter is changed by applying the latest components, and the control circuit is changed from analog to digital. Also, the power converting circuits were modularized in three parallel so that it could be driven even when some components failed. The improved DC-DC boost converter secured stability such as converting to voltage in a linear manner in the entire section from the start of boosting to the end. Also, through the modular configuration, turret driving system can operates when some components failed.
        4,000원
        2.
        2022.12 KCI 등재 구독 인증기관 무료, 개인회원 유료
        North Korea continues to upgrade and display its long-range rocket launchers to emphasize its military strength. Recently Republic of Korea kicked off the development of anti-artillery interception system similar to Israel’s “Iron Dome”, designed to protect against North Korea’s arsenal of long-range rockets. The system may not work smoothly without the function assigning interceptors to incoming various-caliber artillery rockets. We view the assignment task as a dynamic weapon target assignment (DWTA) problem. DWTA is a multistage decision process in which decision in a stage affects decision processes and its results in the subsequent stages. We represent the DWTA problem as a Markov decision process (MDP). Distance from Seoul to North Korea’s multiple rocket launchers positioned near the border, limits the processing time of the model solver within only a few second. It is impossible to compute the exact optimal solution within the allowed time interval due to the curse of dimensionality inherently in MDP model of practical DWTA problem. We apply two reinforcement-based algorithms to get the approximate solution of the MDP model within the time limit. To check the quality of the approximate solution, we adopt Shoot-Shoot-Look(SSL) policy as a baseline. Simulation results showed that both algorithms provide better solution than the solution from the baseline strategy.
        4,200원
        3.
        2022.10 구독 인증기관·개인회원 무료
        Recently, extreme terrorist attacks have frequently occurred around the world and are threatening the international community. It is no longer a safe zone for terrorism in our country. Therefore, domestic nuclear facilities as the highest level of national security facilities have established a physical protection system to protect facilities and lives against terrorist attacks. In addition, security search and access control are conducted for controlled items and unauthorized person. However, with the development of science and technology, disguised weapons or homemade explosives used in terrorism are becoming very sophisticated. Therefore, nuclear facilities need to strengthen security search of weapons or homemade explosives. Since these disguised weapons or homemade explosives are difficult to find only through security search, it is also necessary to actively identify unspecified people who possess disguised weapons or do abnormal behavior. For this reason, the “Abnormal Behavior Detection Method”, which is very effective in preemptive response to potential terrorist risks, has been introduced and operated in aviation security field. Korea Institute of Nuclear Nonproliferation and Control (KINAC) has established a “Practice Environment for Identifying Disguised Weapons” in 2020 for trainees to recognize the dangers of controlled items and to use for physical protection education. This Practice environment has not only the basic explanation of the controlled items of nuclear facilities, but also various actual disguised weapons were displayed. It also introduces actual terrorist incidents using homemade explosives such as attempted bombing of a cargo plane bound for Chicago and the Boston Marathon bombing. And then a model of the disguised explosives actually used is displayed and used for education. In addition, in 2022, the “Abnormal behavior detection method” education module was developed and used for physical protection education. In this module, the outline and introduction of the “Abnormal Behavior Detection Method” and “Behavior Detection Officer (BDOs)” are explained. In this way, the access control and security search system of nuclear facilities require the overall monitoring system, not only for dangerous goods but also for identification of persons possess and carrying them. This study describes the development of the Curriculum for “Disguised Weapon Identification” and “Abnormal Behavior Detection Method” to enhance the effectiveness of physical protection education.
        6.
        2021.12 KCI 등재 SCOPUS 구독 인증기관 무료, 개인회원 유료
        The present multidisciplinary study, which is a nexus of engineering and political science, investigates how the modernization of Non-Strategic Nuclear Weapons (NSNWs) affects the IAEA safeguards system based on the likelihood of the use of nuclear weapons. To this end, this study examines the characteristics of modernized NSNWs using Monte Carlo techniques. The results thus obtained show that 10 kt NSNWs with a Circular Error Probability (CEP) of 10 m can destroy the target as effectively as a 500 kt weapon with a CEP of 100 m. The IAEA safeguards system shows that the Significant Quantity (SQ) of 1 of plutonium is 8 kg, a parameter that was established when strategic nuclear weapons were dominant. However, the results of this study indicate that in recent years, low-yield nuclear weapons such as NSNWs have been more strategically interesting than strategic nuclear weapons as NSNWs require less plutonium than strategic nuclear weapons. Therefore, we would like to conclude that reducing the SQ of plutonium can result in more robust safeguards and non-proliferation strategies.
        4,500원
        7.
        2021.12 KCI 등재 구독 인증기관 무료, 개인회원 유료
        In the early 1960s, US Air Force lost missile launch bases during ICBM development by a defect in the missile design and operation plan. U.S. DoD realized the limitation of the existing accident prevention method. Therefore, the weapon development required system safety activity, and procurement projects of U.S. DoD applied MIL-STD-882(System Safety). Development projects of U.S. DoD more emphasized the importance of system safety after the space shuttle Challenger exploded in 1986. Currently, Airworthiness certification for military aircraft uses system safety to minimize accidents. The domestic defense aviation R&D projects also use the system safety for the airworthiness certification. However, non-aviation weapon R&D projects rarely applied system safety. This paper presents a system safety application method for domestic weapon R&D projects by studying the U.S. military standards/organizations and domestic defense aviation projects.
        4,000원
        8.
        2021.12 KCI 등재 구독 인증기관 무료, 개인회원 유료
        In weapon assignment studies to defend against threats such as ballistic missiles and long range artillery, threat assessment was partially lacking in analysis of various threat attributes, and considering the threat characteristics of warheads, which are difficult to judge in the early flight stages, it is very important to apply more reliable optimal solutions than approximate solution using LP model, Meta heuristics Genetic Algorithm, Tabu search and Particle swarm optimization etc. Our studies suggest Generic Rule based threat evaluation and weapon assignment algorithm in the basis of various attributes of threats. First job of studies analyzes information on Various attributes such as the type of target, Flight trajectory and flight time, range and intercept altitude of the intercept system, etc. Second job of studies propose Rule based threat evaluation and weapon assignment algorithm were applied to obtain a more reliable solution by reflection the importance of the interception system. It analyzes ballistic missiles and long-range artillery was assigned to multiple intercept system by real time threat assessment reflecting various threat information. The results of this study are provided reliable solution for Weapon Assignment problem as well as considered to be applicable to establishing a missile and long range artillery defense system.
        4,000원
        9.
        2021.12 KCI 등재 구독 인증기관·개인회원 무료
        점차 최근 들어 새로운 기술로 주목받고 있는 무인항공기 또는 드론을 이용한 테러공격의 개연성이 점차 심각한 위협으로 대두되고 있다. 테러 집단의 신기술에 대한 관심과 투자는 자신들의 테러 목적을 달성과 테러 활동을 지속을 위해 새로운 기술적 수단을 찾는 형태로 지속되고 있다. 이에 따라 오늘날 몇몇 테러집단들은 테러공격수단으로 상당한 수준의 드론을 확보하고 있는 상황이다. 이와 관련해 심각한 문제는 드론을 이 용한 공격이 전통적인 무기를 사용할 때 보다 더 많은 사상자를 발생시킬 수 있고, 대량살상무기들인 핵물질이나 화학물질과 함께 이용하면 그 살상력과 파괴력이 더욱 커진다는 점이다. 또한 드론은 값이 싸며, 조종 이나 이용이 간편하고 기존의 보안시스템을 회피할 수 있다는 장점이 있다. 더 나아가 앞으로 테러집단의 드론을 이용한 테러공격이 가속화되고 정교화 될 경우 하드타켓에 대한 테러의 접근이 용이해 질 것으로 보여져 그 피해가 더욱 클 것으로 우려된다. 이 같은 무인항공기 또는 드론을 이용한 테러집단의 테러전략과 전술의 변화를 국제사회는 매우 심각하게 받아들이고 대응할 필요가 있다. 테러세력은 언제나 새로운 공격방법, 진전된 공격무기와 수단을 찾는 다는 점을 인식하고 국가안보기관의 대응 역시 새로운 기술발전의 추이에 발맞추어야 할 것이다. 그러나 국제적으로 기존의 항공법 등과 관련한 다수의 기존법률이 안보기관들의 무인항공기/드론 테러에 대한 대응을 효과적으로 지원하지 못하는 문제점이 존재한다는 점이 지적되고 있다. 국내의 경우도 마찬가지로 이 같은 대응에 대해 아직까지 입법적 조치가 이루어지지 않은 상황이다. 따라서 이와 같은 관련 부문에 대한 필요에 따라 이 연구는 국내의 무인항공기 또는 드론의 법적 의미와 그 범위를 파악하고 국내의 무인항공기 관리와 그 문제점들에 대해 평가한다. 또한 미국의 안보기관의 드론 테러 대응 실험 및 연구, 테스트 등을 가능하게 하는 입법조치를 소개하면서 국내의 적용가능성에 대해 논의하였다.
        10.
        2019.05 구독 인증기관 무료, 개인회원 유료
        It is difficult to apply the ram target value setting methods of the conventional weapon system to a large combined weapon system such as a submarine. The current study presents the case of weapon system development and suggests a new way to improve the setting and verification methods of ram target value of the submarine through critical review of the case. The submarine, unlike other weapon system, has an operating environment, which reaches all over the world, and its operating and maintenance conditions are different from others. Therefore, the ram target value of the submarine should be set and verified on the basis of mission essential equipment and mission critical equipment, not of all the constituent components.
        4,000원
        11.
        2019.03 KCI 등재 구독 인증기관 무료, 개인회원 유료
        We focus on the weapon target assignment and fire scheduling problem (WTAFSP) with the objective of minimizing the makespan, i.e., the latest completion time of a given set of firing operations. In this study, we assume that there are m available weapons to fire at n targets (> m). The artillery attack operation consists of two steps of sequential procedure : assignment of weapons to the targets; and scheduling firing operations against the targets that are assigned to each weapon. This problem is a combination of weapon target assignment problem (WTAP) and fire scheduling problem (FSP). To solve this problem, we define the problem with a mixed integer programming model. Then, we develop exact algorithms based on a dynamic programming technique. Also, we suggest how to find lower bounds and upper bounds to a given problem. To evaluate the performance of developed exact algorithms, computational experiments are performed on randomly generated problems. From the results, we can see suggested exact algorithm solves problems of a medium size within a reasonable amount of computation time. Also, the results show that the computation time required for suggested exact algorithm can be seen to increase rapidly as the problem size grows. We report the result with analysis and give directions for future research for this study. This study is meaningful in that it suggests an exact algorithm for a more realistic problem than existing researches. Also, this study can provide a basis for developing algorithms that can solve larger size problems.
        4,000원
        12.
        2018.12 KCI 등재 구독 인증기관 무료, 개인회원 유료
        The private sector is currently reviewing the feasibility of the project or deciding economic policies by analyzing the economic ripple effects. However, the arms acquisition project focuses on the need for the national defense weapons system by analyzing the costs and the effectiveness of the analysis and reviewing the necessity and feasibility of the project. In order to analyze the economic ripple effects, KB (the Bank of Korea) prepares and publishes an analysis table of industrial associations in a given unit. IAAR (the industrial association analysis report) is difficult to apply directly to the defense weapons system. Therefore, research on the economic ripple effects applicable to the defense arms procurement project was needed. In this study, we propose the generic methodology for estimating economical and technical ripple effects resulted in acquiring new weapon systems. Based on the analysis of inter-industrial relations, economical ripple effects are estimated with production inducing effects, value-induced effects, employment-induced effects and export-induced effects. Also, the technological ripple effects are estimated with technological intensity represented by investment cost in research and development. To show the validity of proposed methodology, a case study of acquiring new weapon systems such as GR (guided rocket), destroyer, and helicopter is accomplished. From the case study, it is concluded that these economical & technological ripple effects can be used as a reference to decision making in the course of acquiring major future defense weapons systems.
        4,300원
        13.
        2017.12 KCI 등재 구독 인증기관 무료, 개인회원 유료
        Quantum-inspired Genetic Algorithm (QGA) is a probabilistic search optimization method combined quantum computation and genetic algorithm. In QGA, the chromosomes are encoded by qubits and are updated by quantum rotation gates, which can achieve a genetic search. Asset-based weapon target assignment (WTA) problem can be described as an optimization problem in which the defenders assign the weapons to hostile targets in order to maximize the value of a group of surviving assets threatened by the targets. It has already been proven that the WTA problem is NP-complete. In this study, we propose a QGA and a hybrid-QGA to solve an asset-based WTA problem. In the proposed QGA, a set of probabilistic superposition of qubits are coded and collapsed into a target number. Q-gate updating strategy is also used for search guidance. The hybrid-QGA is generated by incorporating both the random search capability of QGA and the evolution capability of genetic algorithm (GA). To observe the performance of each algorithm, we construct three synthetic WTA problems and check how each algorithm works on them. Simulation results show that all of the algorithm have good quality of solutions. Since the difference among mean resulting value is within 2%, we run the nonparametric pairwise Wilcoxon rank sum test for testing the equality of the means among the results. The Wilcoxon test reveals that GA has better quality than the others. In contrast, the simulation results indicate that hybrid-QGA and QGA is much faster than GA for the production of the same number of generations.
        4,000원
        14.
        2016.12 구독 인증기관 무료, 개인회원 유료
        과학기술의 발달과 함께 무기체계도 과거 공상 과학영화나 만화에서 볼 수 있었던 것들이 현실로 나타나고 있다. 그중에서도 자율무기체계의 발전은 인류에게 또 다른 재앙이 될 것이라는 견해가 있는가 하면 무기의 정확성과 인간보다 우월한 물리적, 감정적 능력을 통해 무력충돌로 인한 인명과 재산의 손실을 줄일 수 있어 인간에 대한 인권과 생명보호에 더욱 중요한 역할을 할 것이라고 보는 견해가 대립하고 있다. 자율무기체계란 무엇인지, 어느 범위까지 자율 무기체계로 볼 수 있으며, 국제법상 자율무기체계 에 대해 확립된 개별조약이나 국가 사이의 관행이 없는 상황에서 인간의 통제가 작동하지 않는 자율 무기체계의 개발에 대해 기존 국제법으로 이를 규율할 수 있는지를 먼저 살펴본다. 기존 국제법이 적용 가능하다고 할 경우 자율 무기의 기본적인 특성과 자율무기 사용에 대한 찬반론의 견해 대립을 확인한 후에 자율무기의 사용이 국제인도법상의 비례성의 원칙, 구별의 원칙, 기사도의 원칙에 위배되지 않는지 구체적으로 검토한다. 또한 국제인도법에 위반되는 행위가 발생 한 경우 사용을 지시한 지휘관의 책임이나 손해배상 책임에 대해 살펴본다. 마지막으로 자율무기체계가 가장 발달한 미국의 인공지능을 이용한 자율무기체계의 개발현황 과 법령의 규정을 확인하고 유럽, 러시아, 중국, 일본, 북한 등의 국가에서 개발 중인 자율무기체 계를 살펴본 후 우리나라의 자율무기체계와 비교 함으로써 장래 과학기술 및 경제발전과 인구감소 로 인한 병력의 부족문제를 해결할 수 있는 자율 무기체계 개발 필요성에 대해 살펴본다.
        5,100원
        15.
        2016.09 KCI 등재 구독 인증기관 무료, 개인회원 유료
        The recent development of modern weapon system by SOS (System of System) has required users to have more exact decision making. It is possible to achieve the control of complex weapon system more efficiently and effectively by increasing usability. Accordingly, many studies on graphical display have been conducted for several years in the field of HCI (Human Computer Interaction) and GUI (Graphic User Interface), starting from its design stage. Therefore, this paper focuses on evaluating the system GUI usability and analyzing several important points based on performance model, which is a tool for the evaluation and the improvement of service quality. Performance Model, the main focus of this study, reflects user expectations (which is defined as user importance in this paper). The study consists of four steps. First, 34 checklists are drawn from the existing studies related to GUI usability evaluation by using a heuristic method, and then the checklists are matched with 11 weapon system design factors. Next, the study evaluates the importance of GUI element and the usability of weapon system “A” with the checklists twice respectively. Third, the performance of user importance (Pi) and the performance of usability (Pu) are calculated by modifying a numerical formula for normalization in this step. Finally, the study compares the approach it takes and the existing usability evaluation method, demonstrating that there is a significant difference between the two methods as a result. In addition, 4 improvement factors are suggested for weapon system “A” as “Shortcut” and “Description of Abbreviation,” and so on. Although it is necessary to conduct more studies for higher reliability and validity of the results, this study is meaningful considering it takes a new point of view.
        4,000원
        16.
        2015.10 구독 인증기관 무료, 개인회원 유료
        When offense launches missiles at valuable assets of the defense, the defense must assign its weapons to these missiles so as to maximize the total value of surviving assets threatened by them. Recently, a new asset-based linear approximation model was proposed for weapon target assignment problem with shootlook- shoot engagement policy and fixed set-up time between each anti-missile launch from each defense unit. In this paper, we apply the proposed to several ballistic missile defense examples and we show their weapon target assignment results specified with launch order time.
        4,000원
        17.
        2015.09 KCI 등재 구독 인증기관 무료, 개인회원 유료
        A missile defense system is composed of radars detecting incoming missiles aiming at defense assets, command control units making the decisions on weapon target assignment, and artillery batteries firing of defensive weapons to the incoming missiles. Although, the technology behind the development of radars and weapons is very important, effective assignment of the weapons against missile threats is much more crucial. When incoming missile targets toward valuable assets in the defense area are detected, the asset-based weapon target assignment model addresses the issue of weapon assignment to these missiles so as to maximize the total value of surviving assets threatened by them. In this paper, we present a model for an asset-based weapon assignment problem with shoot-look-shoot engagement policy and fixed set-up time between each anti-missile launch from each defense unit. Then, we show detailed linear approximation process for nonlinear portions of the model and propose final linear approximation model. After that, the proposed model is applied to several ballistic missile defense scenarios. In each defense scenario, the number of incoming missiles, the speed and the position of each missile, the number of defense artillery battery, the number of anti-missile in each artillery battery, single shot kill probability of each weapon to each target, value of assets, the air defense coverage are given. After running lpSolveAPI package of R language with the given data in each scenario in a personal computer, we summarize its weapon target assignment results specified with launch order time for each artillery battery. We also show computer processing time to get the result for each scenario.
        4,000원
        18.
        2015.06 KCI 등재 구독 인증기관 무료, 개인회원 유료
        This paper focuses on analyzing the modern warfare and weapon systems supported by improved GPS informations. The GPS capability was investigated through the real experimental test for verifying the most recent GPS features under its modernization processing. And then it was verified that such capabilities, accuracy and availability, of a typical L1, C/A code GPS receiver are equivalent to the military receiver's ones. It was also sure that the influence of GPS improved informations on NCW(Network-Centric Warfare), PGM(Precision Guided Munition) and C4SIR(Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance) should be increased and the modern warfare may be strongly dependent on GNSS informations.
        4,000원
        19.
        2015.06 KCI 등재 구독 인증기관 무료, 개인회원 유료
        The weapon systems development has some distinct characteristics in that a big size of government budget (derived from national tax) has been expended frequently and the completion of the development projects seems to take long. Thus, the impact of the potential changes in the required operational capability on the development activities can induce some type of project risks. As such, proper management of project risk has been one of crucial subjects in the weapon systems development. Although a variety of methods can be considered, an approach based on the test and evaluation (T&E) process has been selected in this paper in order to appropriately handle those potential risks. In the study of the underlying T&E process, the safety consideration (for instance, explosiveness) of weapon systems is also included. To achieve the objective of the paper, a step-by-step procedure is first presented in the analysis of the T&E process. Then, to pursue some enhancement on the process, a set of necessary and useful activities are added in terms of risk and safety management. The resultant process is further analyzed and tailored based on a design structure matrix method. The case study of a tank development is also discusse
        4,000원
        20.
        2015.04 KCI 등재 구독 인증기관 무료, 개인회원 유료
        본고에서는 요동반도 남단에서 출토된 무기형 석기를 대상으로 자료를 집성 및 정리하였으며, 주변 지역에서 출토된 자료와 비교 분석을 통해 석모와 석촉으로 대표되는 무기형 석기가 청동기시대 유적 에서 출토된 유물 중에서 높은 비율로 출토되고 있음을 확인하였다. 이러한 현상은 청동기시대 요동 반도 남단에서 4단계로 나누어지는 고고학 문화 전반에 공통적으로 나타나는 현상이며, 엄밀하게는 청동기시대 중국 동북지역 내에서 요동반도 남단만의 문화 특징에 해당한다. 이러한 문화 특징은 압 록강과 두만강 유역 및 한반도와 일본 열도 등의 고고학 문화와 관련성이 있는 것으로 판단된다.
        5,500원
        1 2