Browse > Article
http://dx.doi.org/10.9766/KIMST.2021.24.2.187

Study of the Bomb Hit Indication of Moving Target Using Weapon Data Link Message  

Baek, Inhye (The 1st Research and Development Institute, Agency for Defense Development)
Woo, Sang Hyo (The 1st Research and Development Institute, Agency for Defense Development)
Kim, Ki Bum (The 1st Research and Development Institute, Agency for Defense Development)
Publication Information
Journal of the Korea Institute of Military Science and Technology / v.24, no.2, 2021 , pp. 187-196 More about this Journal
Abstract
The Network-Centric warfare over weapon data link networks has been developed for the recent decade. Since the US navy had begun to develop tactical digital information chain, it has gradually transformed into weapon data link technology. As data link network system and its protocol have been advanced into high-technology, focusing and targeting on moving targets become possible in net-enabled environments. However, it is difficult to identify the primary information from numerous battlefields and understanding approaches to damage a target in a timely manner. In this paper, to better understand the targeting assessment, we suggest a specific solution: Bomb Hit Indication(BHI) using information in weapon data link messages. In order to prove our suggestion, we implement the BHI solution and apply it into the weapon data link integrating system.
Keywords
Network Centric Warfare; Network Enable Weapon; Target Location Error; Weapon Data Link; Bomb Hit Indication;
Citations & Related Records
연도 인용수 순위
  • Reference
1 P. Piersion, Link 16/JTIDS/MIDS Training, 2017.
2 W. S. Lee, S. H. Wi, K. J. Kwon, "The Study of Concept about the Weapon Data Link for Precision Engagement Coping with the Time Sensitive Target," KIMST Annual Conference Proceedings, pp. 1629-1630, 2018.
3 B. F. Koudelka, Jr., "Network-Enabled Precision Guided Munitions," Air University, pp. 77-100. 2005.
4 United States General Accounting Office, "Recent Campaigns Benefited from Improved Communications and Technology, but Barriers to Continued Progress Remain," GAO Report 04-547, Washington D.C., Accounting Office, 2004.
5 S. R. Frame, "Real-Time Targeting for Network Enabled Weapons," Journal of the International Test and Evaluation Association, Vol. 31, pp. 316-320, 2010.
6 S. H. Woo, I. H. Baek, K. J. Kwon, K. B. Kim, "Research of Considerations for Effective Operation of Weapons Data Link," Journal of the Korea Institute of Military Science and Technology, Vol. 21, No. 6, pp. 886-893, 2018.   DOI
7 R. W. Merritt, "Methodology for Probability of Kill Against a Moving Target in Air to Ground Gunnery," Georgia Institute of Technology, pp. 5-43, 1978.
8 C. D. Yang, et. al., "A Study on the Anti-Air-Artillery Threat Envelop Analysis," The Korean Institute of Information Scientists and Engineers, Vol. 38, No. 1, pp. 9-12, 2011.
9 Committee on Network-Centric Naval Forces Naval Studies Board, "Network-Centric Naval Forces: A Tradition Strategy for Enhancing Operational Capabilities," National Academies Press, Washington D.C., pp. 11-87, 2000.
10 K. B. Kim, I. H. Baek, K. J. Kwon, "A Study on Target Selection from Seeker Image of Aerial Vehicle in Sea Environment," Journal of the Korea Institute of Military Science and Technology, Vol. 20, No. 5, pp. 708-716, 2017.   DOI
11 K. T, "Development of the Joint Stand Off Weapon (JSOW) Moving Target Capability : AGM-154 Block Three Program", Masters Theses, University of Tennessee, Knoxville, 2006.
12 DoD, "Tactical Data Link(TDL) 16 Message Standard," MIL-STD-6016F, January 2017.
13 National Research Council, "Network-Centric Naval Forces: A Transition Strategy for Enhancing Operation Capabilities," U.S., pp. 426-428, 2000.
14 J. S. Przenmieniecki, "Mathematical Methods in Defense Analyses," AIAA Education Series, pp. 56-64, 2000.
15 H. K. Choi, C. B. Yoon, S. J. Hong, "Design of Airborne Terminal System for Joint Tactical Data Link System Compleat Data Link," Journal of Positioning, Navigation, and Timing, Vol. 9, No. 2, pp. 139-147, 2020.   DOI
16 S. T. Kim, J. Y. Shim, W. S. Lee, S. H. Wi, K. B, Kim, "A Design of the Structure of Net-Enabled Weapon Model for Scalability of Weapon Model and Modifiability of the Protocol in The Weapon Data Link Simulation," Korea Information Processing Society, pp. 697-700, 2019.
17 "Jane's Strategic Weapons," Jane's Publishing, U.K., p. 119, 1999.