DOI QR코드

DOI QR Code

함정 피격성 향상을 위한 시스템엔지니어링 접근법 기반의 기만선박 개념 연구

A Study on Deception Ship for Ship Susceptibility Improvement based on System Engineering Approach

  • 강희진 (한국해양연구원 해양시스템안전연구소) ;
  • 신종계 (서울대학교 조선해양공학과) ;
  • 이동곤 (한국해양연구원 해양시스템안전연구소) ;
  • 최진 (한국해양연구원 해양시스템안전연구소)
  • Kang, Hee-Jin (Maritime & Ocean Engineering Research Institute, KORDI) ;
  • Shin, Jong-Gye (Dept. of Naval Architecture & Ocean Engineering, Seoul National University) ;
  • Lee, Dong-Kon (Maritime & Ocean Engineering Research Institute, KORDI) ;
  • Choi, Jin (Maritime & Ocean Engineering Research Institute, KORDI)
  • 발행 : 2009.06.20

초록

To project military power, the paradigm of the modern warship aquisition has evolved with more large platform and high-technology equipment. For example, the Aegis combat system equipped warship is one of the most advanced and capable defense systems currently in use. Concurrently, if the warship attacked and disabled, it may worse the asymmetry of the battle field and it also depress the morale of the fleet. For that reason, to keep and protect few number of the big and high technology equipped warship from enemy is very important. At the present, the performance of unit weapon has enhanced remarkably. A Korean-built SS-209 class submarine, Lee Chun-ham, participated in Naval Exercise Tandem Thrust conducted in 1999, sink the target ship ex-USS Oklahoma by a single torpedo. USS Stark was struck on May 17, 1987, by two Exocet anti ship missiles and disabled. For this reason, susceptibility should be prior to vulnerability and recoverability. In this paper, deception ship which is small and chief but has very similar signatures to large and high technology equiped warship has conceptually studied by using systems engineering approach. And it may be a effective way to enhance the susceptibility of the key fighting power.

키워드

참고문헌

  1. AP, March 15, 2007
  2. Col Gary, L.C., 2003, Effects Based Operations Briefing, Pentagon Briefing
  3. David, A.D., 2001, 'Effects-Based Operations: Change in the Nature of Warfare,' Aerospace Education Foundation
  4. Department of Defense(DoD), 2004, 'Military Critical Technologies List Section 18 Signature Control Technologies'
  5. Department of the Navy, 1996, 'OPNAVINST 9070.2 Signature Control Policy for Ships and Craft of the U.S. Navy'
  6. Eric, H., 2002, 'SECOE 01-03', INCOSE
  7. Grant, B., 2006, 'Warship Recoverability Modeling', ESW
  8. ISO/IEC, 2008, 'JTCI/SC7/WG7 presentation on ISO/IEC 15288'
  9. Kang, H.J., Lee, D.G. and Shin, J.G., 2008, 'Necessity of Visual Signature Reduction for Warship to Face Information Gathering from Satellites,' Proceedings of the Annual Spring meeting, SNAK, pp. 10-17
  10. Knott, E.F., Shaeffer, J.F. and Tuley, M.T., 1993, 'Radar Cross Section', Artech House, Boston
  11. Lynch, D., 2004, 'Introduction to RF STEALTH,' Scitech, NC
  12. Naval Air Systems Command, Naval Air Warfare Center, 1999, 'Electronic Warfare and Radar Systems Engineering Handbook,' NAWCWPNS TP 8347
  13. Newsweek, 2 November, 1987
  14. Office of Transformation, 2005, 'The Implementation of Network-Centric Warfare,' Department of Defence
  15. ROSS, D., 1976, 'Mechanics of Underwater Noise', Pergamon Press, New York
  16. Robert, E.B. and Chales, N.C., 1994, 'Establishing the Fundamentals of a Surface Ship Survivability Design Decipline,' Naval Engineers Journal, pp. 71-74
  17. Said, M.O., 1995, 'Theory and Practice of Total Ship Survivability for Ship Design,' Naval Engineers Journal, Vol. 107, No. 5, pp. 191-203 https://doi.org/10.1111/j.1559-3584.1995.tb03085.x