• Title/Summary/Keyword: 가상전장환경

Search Result 44, Processing Time 0.019 seconds

Many-to-Many Warship Combat Tactics Generation Methodology Using the Evolutionary Simulation (진화론적 시뮬레이션을 이용한 다대다 함정교전 전술 생성 방법론)

  • Jung, Chan-Ho;Ryu, Han-Eul;You, Yong-Jun;Chi, Sung-Do;Kim, Jae-Ick
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.3
    • /
    • pp.79-88
    • /
    • 2011
  • In most existing warships combat simulation system, the tactics of a warship is manipulated by human operators. For this reason, the simulation results are restricted due to the stereotype of human operators. To deal with this, we have employed the genetic algorithm for supporting the evolutionary simulation environment. In which, the tactical decision by human operators is replaced by the human model with a rule-based chromosome for representing tactics so that the population of simulations are created and hundreds of simulation runs are continued on the basis of the genetic algorithm without any human intervention until to find emergent tactics which shows the best performance throughout the simulation. This paper proposes an evolutionary tactics generation methodology for the emergent tactics in many-to-many warship combat simulation. To do this, 3:3 warship combat simulation tests are performed.

AR based Field Training System Algorithm for Small Units (증강현실 기반의 소부대 야외 전술훈련체계 알고리즘)

  • Park, Sangjun;Kim, Jee Won;Kim, Kyoung Min;Kim, Hoedong
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.81-87
    • /
    • 2018
  • Military training is being carried out to win the combats through the quick and accurate response exercise for changeable engagement situations on battle fields. However, practically, it is really difficult to do actual fight training. Even though ROK Army is doing effort for practical training in KCTC(Korea army advanced Combat Training Center) supplying such as MILES equipments but a single platoon is able to use KCTC facilities or MILES equipments only 10 days a year. In order to find solution on this problem many researches suggesting AR or VR technology are still on the way. Nevertheless these are not fully covered the training done in the real field. In this regard, this paper proposes how the AR technology algorithm to apply on small units during field training exercise.

  • PDF

Case study of military education and training using AR (Augmented Reality)/VR (Virtual Reality) (AR(증강현실)/VR(가상현실) 활용한 군 교육훈련 사례 연구)

  • Seol, Hyeonju;Jeon, Kiseok
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.107-113
    • /
    • 2022
  • The AR/VR-based education and training system is expected to contribute greatly to accident prevention and budget reduction as well as practical training effects similar to the battlefield environment. Research to use AR/VR for learning is ongoing, and technology can be improved without experiencing failures that can occur in the real world. Major advanced countries in defense recognized the advantages of AR/VR technology early on, and developed and utilized systems using them in various fields, from mastery of individual weapon system operation to comprehensive combat training systems, war history education, and post-traumatic stress treatment. Therefore, the purpose of this study is to examine the cases of AR/VR application education and training in advanced defense countries and to draw implications for the South Korean military.

Study on High-speed Cyber Penetration Attack Analysis Technology based on Static Feature Base Applicable to Endpoints (Endpoint에 적용 가능한 정적 feature 기반 고속의 사이버 침투공격 분석기술 연구)

  • Hwang, Jun-ho;Hwang, Seon-bin;Kim, Su-jeong;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.21-31
    • /
    • 2018
  • Cyber penetration attacks can not only damage cyber space but can attack entire infrastructure such as electricity, gas, water, and nuclear power, which can cause enormous damage to the lives of the people. Also, cyber space has already been defined as the fifth battlefield, and strategic responses are very important. Most of recent cyber attacks are caused by malicious code, and since the number is more than 1.6 million per day, automated analysis technology to cope with a large amount of malicious code is very important. However, it is difficult to deal with malicious code encryption, obfuscation and packing, and the dynamic analysis technique is not limited to the performance requirements of dynamic analysis but also to the virtual There is a limit in coping with environment avoiding technology. In this paper, we propose a machine learning based malicious code analysis technique which improve the weakness of the detection performance of existing analysis technology while maintaining the light and high-speed analysis performance applicable to commercial endpoints. The results of this study show that 99.13% accuracy, 99.26% precision and 99.09% recall analysis performance of 71,000 normal file and malicious code in commercial environment and analysis time in PC environment can be analyzed more than 5 per second, and it can be operated independently in the endpoint environment and it is considered that it works in complementary form in operation in conjunction with existing antivirus technology and static and dynamic analysis technology. It is also expected to be used as a core element of EDR technology and malware variant analysis.