• Title/Summary/Keyword: 작전효과도

Search Result 133, Processing Time 0.026 seconds

Agent-based Modeling and Analysis of Tactical Reconnaissance Behavior with Manned and Unmanned Vehicles (에이전트 기반 유·무인 수색정찰 전술행위 모델링 및 분석)

  • Kim, Ju Youn;Han, Sang Woo;Pyun, Jai Jeong
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.4
    • /
    • pp.47-60
    • /
    • 2018
  • Today's unmanned technology, which is being used in various industries, is expected to be able to make autonomous judgements as autonomous technology matures, in the long run aspects. In order to improve the usability of unmanned system in the military field, it is necessary to develop a technique for systematically and quantitatively analyzing the efficiency and effectiveness of the unmanned system by means of a substitute for the tasks performed by humans. In this paper, we propose the method of representing rule-based tactical behavior and modeling manned and unmanned reconnaissance agents that can effectively analyze the path alternatives which is required for the future armored cavalry to establish a reconnaissance mission plan. First, we model the unmanned ground vehicle, small tactical vehicle, and combatant as an agent concept. Next, we implement the proposed agent behavior rules, e.g., maneuver, detection, route determination, and combatant's dismount point selection, by NetLogo. Considering the conditions of maneuver, enemy threat elements, reconnaissance assets, appropriate routes are automatically selected on the operation area. It is expected that it will be useful in analyzing unmanned ground system effects by calculating reconnaissance conducted area, time, and combat contribution ratio on the route.

Analysis of an Effective Network of Information Delivery for Supporting Kill Chain in the Joint Battlefield Environment (합동전장 환경에서 효과적인 Kill Chain 지원을 위한 표적정보전달 네트워크 분석)

  • Lee, Chul-Hwa;Lee, Jong-Kwan;Goo, Ja-Youl;Lim, Jea-Sung
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.1
    • /
    • pp.11-23
    • /
    • 2014
  • Kill Chain is getting attention due to North Korea's recent nuclear test and missile launches and has emerged the need for an early build up. In order to build a materialized kill chain, you should review the unique kill chain to support operations effectively using various sensors and striking weapon system. Especially, you need a suitable network to reduce a reaction time against the enemy attack under joint operations environment etc. Currently there are many communication ways(e.g. data link, voice, video and text message) used in operations through satellite, wired and wireless and so on. Now, this paper contains analysis on various means for target information exchange which are used in the kill chain. And appropriate network of the kill chain for target information transmission is addressed to confirm feasibility of its alternatives, which is developed using AHP(Analytic Hierarchy Process). Finally, this paper is suggesting network and means of its building up for target information transmission of kill chain which can be implemented under the situation of joint battle field.

A Study on the Operation Concept of Cyber Warfare Execution Procedures (사이버전 수행절차 운영개념에 관한 연구)

  • Kim, Sung-Joong;Yoo, JiHoon;Oh, HaengRok;Shin, Dongil;Shin, DongKyoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.73-80
    • /
    • 2020
  • Due to the expansion of cyber space, war patterns are also changing from traditional warfare to cyber warfare. Cyber warfare is the use of computer technology to disrupt the activities of nations and organizations, especially in the defense sector. However, the defense against effective cyber threat environment is inadequate. To complement this, a new cyber warfare operation concept is needed. In this paper, we study the concepts of cyber intelligence surveillance reconnaissance, active defense and response, combat damage assessment, and command control in order to carry out cyber operations effectively. In addition, this paper proposes the concept of cyber warfare operation that can achieve a continuous strategic advantage in cyber battlefield.

Development of Air to Air Mission Tactics for Manned-Unmanned Aerial Vehicles Teaming (공대공 교전을 위한 유무인항공기 협업 전술 개발)

  • Hwang, Seong-In;Yang, Kwang-Jin;Oh, Jihyun;Seol, Hyeonju
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.50 no.1
    • /
    • pp.47-57
    • /
    • 2022
  • UAVs have been deployed various missions such as deception, reconnaissance and attack since they have been applied in battlefield and achieved missions successfully instead of man. In the past, it is impossible for UAVs to conduct autonomous missions or cooperative mission between manned aircraft due to the limitation of the technology. However, theses missions are possible owing to the advance in communication and AI Technology. In this research, we identified the possible cooperative missions between manned and unmanned team based on air-to-air mission. We studied cooperative manned and unmanned tactics about fighter sweep mission which is the core and basic operation among various air-to-air missions. We also developed cooperative tactics of manned and unmanned team by classifying nonstealth and stealth confrontational tactics. Hereafter, we verified the validity of the suggested tactics using computer simulations.

Blockchain applied Military Electronic Secret Document Management Scheme (focused on C4i) (블록체인을 적용한 군(軍) 전자적 비밀관리 개선방안 (전장관리정보체계 중심으로))

  • Hong Yoon;Yeong Gyun Cha;Jong Beom Park
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.181-187
    • /
    • 2023
  • Recently, military operations have been aimed at winning using various information, analysis, weapons, and operation systems. These systems should consist of integrated composition and the function of analyzing and sharing data. Accordingly, military C4I collects and analyzes a lot of data and produces and shares secrets to perform effective operations. However, C4I cannot operate in electronic form from secret production to disposal. And as it is managed based on the output, problems such as difficulty in management and loss/leakage arise. Therefore, in this paper, we propose an ESDMB(Electronic Secret Document Management whit Bloockchain) plan based on blockchain technology to manage all secrets in electronic document format and provide integrity and denial prevention. In particular, the blockchain-based proposal method will be suitable as a protection measure against manipulation and leakage, from secret production to destruction.

Design and Evaluation of Information Broker Architecture for Network-Centric Operational Environment (네트워크 중심 작전 환경을 위한 정보 브로커 아키텍처 설계 및 평가)

  • Park, Jejun;Kang, Dongsu
    • Journal of KIISE
    • /
    • v.43 no.6
    • /
    • pp.668-677
    • /
    • 2016
  • The information superiority through effective networking is a core element that accelerates command decision for mission completion. Our military wants to acquire capabilities of effective information sharing with Network-Centric Operational Environment(NCOE) for Network-Centric Warfare (NCW). In this paper, we suggested an information broker for overcoming current limits and maximizing future expandability and possibility of information sharing capacities. The information broker, which is an intermediate layer between users and information providers, provides the functions for mediating and managing information and for ensuring security of the system. We evaluated the consistency of proposed architecture and the implementation of the operational architecture design concept using existing design frameworks.

Modeling and Analysis for Efficient Joint Combat Fire Operation of Army Artillery and Army Aviation (효율적인 육군항공과 포병자산의 통합화력 운용방안 판단을 위한 모델링 방법론 및 분석)

  • Lim, Jong-Won;Kwon, Hyog-Lae;Lee, Tae-Eog
    • Journal of the Korea Society for Simulation
    • /
    • v.23 no.2
    • /
    • pp.47-55
    • /
    • 2014
  • Most combat simulation models, including Korean Army's combat models for simulation analysis, have too much limitations to be used for analysis of complex combats like joint combat fires. We analyze requirements for modeling and simulation of Fire-Eagle, which is a joint combat fire model of ground combat fires and army aviation. We then propose a simulation model for Fire Eagle and derive operational strategies for improving the joint combat fire. To do these, we analyze effectiveness of specific operational plans and scenarios by using the simulation model. We demonstrate ways of developing efficient and effective operational plans from the simulation experimental results.

A Study on Effective Discussion Based Training Applying to Army War-game Process in 『Disaster Response Safety Korea Training』 (『재난대응 안전한국훈련』시 군(軍)의 '워-게임(War-Game)' 과정을 적용한 효과적인 '토론기반훈련' 에 관한 연구)

  • Yoon, Woo-Sup;Seo, Jeong-Cheon
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.3
    • /
    • pp.347-357
    • /
    • 2019
  • Purpose: The purpose of this paper is to present a method for effectively conducting discussion-based training in disaster response safety training. Method: To this end, we analyzed the disaster response training of developed countries and suggested the training scenarios by applying the war-game process that is currently applied in the operation planning of our military. Result: In one disaster situation, several contingencies could be identified, and supplementary requirements for the manual could be derived. Conclusion: Therefore, in conclusion, if the military war-game process is applied to the discussion-based training in disaster response safety training, effective training can be carried out.

On an Improved Method for System Readiness Assesment to Meet Required Operational Capability in Weapon Systems Development (무기체계개발에서 작전운용성능을 만족시키기 위한 개선된 시스템성숙도 평가방법)

  • Kwon, Il-Ho;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.8
    • /
    • pp.3602-3610
    • /
    • 2013
  • The risk of failure in the development of modern weapon systems has been increasing as the demand on the capability and the resulting complexity of the weapons on the war fields are increasing drastically. The analysis of failure has indicated that the main causes can be the following: one is attributed to the unsatisfaction of the system operation concept; and the other is the use of premature technology. As such, DAPA in Korea is urging that the weapons systems development should meet the required operational capability (ROC) as a critical performance requirement. On the other hand, an approach to risk management is to use the technology readiness level (TRL) assessed for each individual technology alone. However, the method of TRL cannot assess the effect of integration between technologies and cannot be performed at system level, which is crucial to systems development. In order to improve the shortfalls, a concept of system readiness level (SRL) has been studied by introducing the technologies integration and also some forms of analysis of advanced degree of difficulty studied separately, but no model considering both of two reported yet. In this paper, under the framework of meeting the ROC, an improved SRL assessment model is presented, which is also considering the advanced degree of difficulty simultaneously. The application of the improved assessment method is discussed in connection with the life cycle of the weapon systems development in conformance with the ROC of DAPA.

A Quantitative Study on How the Cheonghae Anti-piracy Unit influences the Occurrence of Maritime Piracy near Somalia (청해부대 파병(다국적 해군의 대(對)해적 작전)이 소말리아 인근 해적사건 발생에 미치는 영향에 관한 정량적연구)

  • Han, Jong-Hwan
    • Strategy21
    • /
    • s.46
    • /
    • pp.123-157
    • /
    • 2020
  • This research focuses on one important type of non-traditional threat, maritime piracy, and tries to supplement previous research from the perspective of military power, especially naval power. When considering the elements of military power, naval power is a core independent variable to explain piracy incidents. Indeed, naval power can play a key role in solving piracy problems, since naval power is the only legitimate force to respond to piracy in the sea. It is natural that well equipped and trained naval power in the sea increases the probability of capturing pirates, which leads to increasing the costs of piracy and decreasing its occurrences. In addition, since naval combatant ships have more impressive weapons than those of pirate boats, just the presence of naval combatant ships could serve to deter piracy incidents in the sea. The main purpose of this research is finding the effectiveness of large multinational naval efforts to deter piracy incidents in Africa. With this research purpose, I analyze 771 piracy incidents that occurred in African states from 2009 to 2014. Furthermore, I include all 33 coastal states in Africa regardless of the experiences of piracy incidents in order to avoid selection bias, which is very common in quantitative-based piracy incidents research. The dependent variable of this research is frequency of maritime piracy incidents for a country-year and the independent variable is the number of multi-national naval warships that operate near Somalia. With this analysis, I find the large number of multi-state naval combatant ships are negatively related to piracy incidents. In other words, as a main means to counteract piracy incidents, multi-state naval combatant ships are conducive to reduce piracy incidents near Somalia, since it increases costs (being captured) of conducting piracy.