• Title/Summary/Keyword: 작전효과도

Search Result 133, Processing Time 0.023 seconds

A study on Convergence Weapon Systems of Self propelled Mobile Mines and Supercavitating Rocket Torpedoes (자항 기뢰와 초공동 어뢰의 융복합 무기체계 연구)

  • Lee, Eunsu;Shin, Jin
    • Maritime Security
    • /
    • v.7 no.1
    • /
    • pp.31-60
    • /
    • 2023
  • This study proposes a new convergence weapon system that combines the covert placement and detection abilities of a self-propelled mobile mine with the rapid tracking and attack abilities of supercavitating rocket torpedoes. This innovative system has been designed to counter North Korea's new underwater weapon, 'Haeil'. The concept behind this convergence weapon system is to maximize the strengths and minimize the weaknesses of each weapon type. Self-propelled mobile mines, typically placed discreetly on the seabed or in the water, are designed to explode when a vessel or submarine passes near them. They are generally used to defend or control specific areas, like traditional sea mines, and can effectively limit enemy movement and guide them in a desired direction. The advantage that self-propelled mines have over traditional sea mines is their ability to move independently, ensuring the survivability of the platform responsible for placing the sea mines. This allows the mines to be discreetly placed even deeper into enemy lines, significantly reducing the time and cost of mine placement while ensuring the safety of the deployed platforms. However, to cause substantial damage to a target, the mine needs to detonate when the target is very close - typically within a few yards. This makes the timing of the explosion crucial. On the other hand, supercavitating rocket torpedoes are capable of traveling at groundbreaking speeds, many times faster than conventional torpedoes. This rapid movement leaves little room for the target to evade, a significant advantage. However, this comes with notable drawbacks - short range, high noise levels, and guidance issues. The high noise levels and short range is a serious disadvantage that can expose the platform that launched the torpedo. This research proposes the use of a convergence weapon system that leverages the strengths of both weapons while compensating for their weaknesses. This strategy can overcome the limitations of traditional underwater kill-chains, offering swift and precise responses. By adapting the weapon acquisition criteria from the Defense force development Service Order, the effectiveness of the proposed system was independently analyzed and proven in terms of underwater defense sustainability, survivability, and cost-efficiency. Furthermore, the utility of this system was demonstrated through simulated scenarios, revealing its potential to play a critical role in future underwater kill-chain scenarios. However, realizing this system presents significant technical challenges and requires further research.

  • PDF

Development of C2 Virtual Linked Simulator For Engineering and Engagement Level Battle Experimentation (공학-교전급 전투실험을 위한 C2 가상모의 연동 시뮬레이터 개발)

  • Lee, Sangtae;Lee, Seungyoung;Hwang, Kun-Chul;Kim, Saehwan;Lee, Kyuhyun
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.4
    • /
    • pp.11-19
    • /
    • 2013
  • The Korean naval weapon systems, combat experiments establish the concept of Battle operations, and create the future of the new weapons system. Doctrine development and training as well as ranging from experiments for evaluate the performance of mission operations for combat experiments are used. The battle lab is effectively support tool for the Korean Naval battle experiments. The battle lab is through a dedicated testing facility and to build efficient and effective simulation-based acquisition supporting environment. In this paper, the ship / submarines C2 operations virtual simulator was developed to support the concept of Battle operations of naval combat experiments in training and tactical development. The ship C2 operations virtual simulator makes the anti-ship and anti-aircraft the engagement scenario for performed experiments using the SADM. The submarines C2 operations virtual simulator makes the anti-submarine engagement scenario for performed experiments using EAS. EAS System was created before reuse. EAS system by modifying the additional interfaces HLA-RTI has been reused. Reflected in the tactics and training after analysis of the results through the battle experiment. Also increase training fidelity through operator involvement. The anti-ship and anti-aircraft system architecture (SADM) and anti-submarine system architecture (EAS) requires unique design of system framework since two separate architectures should be integrated into a system. An C2 virtual linked architecture was used to integrate different system architecture. A C2 virtual linked software framework, designed that have integrated protocol for battle experimental linkage and battlefield visualization environment.

Policy Suggestions to Improve PSS(Presidential Security Service) Education Programs for Industry-Academy-Governmental Cooperations (${\cdot}$${\cdot}$관 협력강화를 위한 대통령경호실 교육프로그램 확대 방안)

  • Cho, Kwang-Rae
    • Korean Security Journal
    • /
    • no.11
    • /
    • pp.227-243
    • /
    • 2006
  • In modern society, private securities have developed their capabilities continuously. However, despite the fact that not only security industries have been considerably expanded in quantity, but also plenty of scholars published diverse papers relating to security problems, qualitative growths of private securities have not accomplished fully. Especially, securing the President would not be guaranteed only by PSS(Presidential Security Service). In order to secure the President successfully, it is necessary for all the social parts to strive to protect the President. In this respect, improving private securities, including academic fields, might be critical so as to succeed in securing the President. Without the supports from private securities, there might be lots of security problems in national context. Therefore, this study proposes several policy suggestions for the cooperation among PSS, private security industries and academic fields: (1) Providing a lot of practical knowledge from PSS to college students, (2) Personnel exchange between academic parts and PSS to promote the efficiency of securing the President, (3) Furnishing diverse information and knowledge about security to private securities, (4) Formulating security-searching standards, (5) Expanding educational institutions under PSS.

  • PDF

A Priority Based Multipath Routing Mechanism in the Tactical Backbone Network (전술 백본망에서 우선순위를 고려한 다중 경로 라우팅 방안)

  • Kim, Yongsin;Shin, Sang-heon;Kim, Younghan
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.1057-1064
    • /
    • 2015
  • The tactical network is system based on wireless networking technologies that ties together surveillance reconnaissance systems, precision strike systems and command and control systems. Several alternative paths exist in the network because it is connected as a grid to improve its survivability. In addition, the network topology changes frequently as forces and combatants change their network access points while conducting operations. However, most Internet routing standards have been designed for use in stable backbone networks. Therefore, tactical networks may exhibit a deterioration in performance when these standards are implemented. In this paper, we propose Priority based Multi-Path routing with Local Optimization(PMPLO) for a tactical backbone network. The PMPLO separately manages the global and local metrics. The global metric propagates to other routers through the use of a routing protocol, and it is used for a multi-path configuration that is guaranteed to be loop free. The local metric reflects the link utilization that is used to find an alternate path when congestion occurs, and it is managed internally only within each router. It also produces traffic that has a high priority privilege when choosing the optimal path. Finally, we conducted a simulation to verify that the PMPLO can effectively distribute the user traffic among available routers.

The Future of Countermobility Capability with a Literature Analysis from FASCAM to Terrain Shaping Obstacle(TSO) (미래 대기동 작전 능력의 발전방안 연구 -살포식지뢰(FASCAM)로부터 지형 조성 장애물(TSO) 전력을 중심으로-)

  • Park, Byoung-Ho;Sim, Jaeseong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.291-298
    • /
    • 2021
  • In this study, the future of countermobility capability is presented by analyzing the status of the countermobility obstacles focusing on the history of landmines and munitions. The conventional landmine was forbidden globally by the CCW and Ottawa Treaty because it caused civilian damage after the war. Because the inhumanity of those mines had been acknowledged, shatterable mines with a self-destruct (SD) function and M93 "HORNET" anti-tank munition with enhanced sensors have been fielded. In 2016, the Obama administration announced a policy that banned all antipersonnel landmines, leaving a considerable gap in the countermobility capability. To deal with these problems, the developments of "SAVO" and the SLEP program of Volcano mines were conducted. In the sense of a long-term approach, the countermobility obstacles, including mines, were chosen as fundamental forces for Multi-Domain Operations and were improved to Terrain Shaping Obstacles (TSO). TSO has improved sensors and mobility kill capabilities and features an enhanced remote control over each munition on the battlefield through a network established with satellite communication. The combined arms countermobility might be fully capable until 2050 if the TSO program can be completed successfully.

Building plan research of Smart Ammunition Logistics System based on the 4th industrial technology (4차산업혁명기술 기반 스마트 탄약물류체계 구축 방안 연구)

  • Choi, Jong-Geun;Kim, Byung-Kyoo;Chang, Yoon Seok
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.135-145
    • /
    • 2022
  • This paper presented a method to build a predictable smart ammunition logistics system using the 4th industrial technology for ammunition logistics, which is the core functions in the field of defense and logistics. We have analyzed the current level of ammunition logistics with various perspectives such as domestic and overseas logistics policies, technology trends, ammunition logistics characteristics, the smart logistics certification measures by Ministry of Land, Infrastructure and Transport. As a result it is considered that the current ammunition logistics needs needs improvement. To improve this, we presented a direction based on the implications derived after analyzing various ongoing programs such as wired/wireless-based automation, smart ammunition depots, and logistics innovation of the army, navy, and air force that can be applied to the ammunition logistics. In order to implement a data-based smart ammunition logistics management system that can achieve innovation and efficiency of total life cycle while meeting changes in the battlefield environment, we presented 4 objectives such as "automation and modernization of field work", "3D-based storage management & improvement of issuing at war," and "data management for prediction-oriented ammunition management". it is expected that there will be benefits such as improvement of operational continuity, guarantee of ammunition reliability, budget reduction, improvement of inefficiencies such as delay, waiting, and double work, and reduction of accidents.

Comparative Analysis and Implications of Command and Control(C2)-related Information Exchange Models (지휘통제 관련 정보교환모델 비교분석 및 시사점)

  • Kim, Kunyoung;Park, Gyudong;Sohn, Mye
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.59-69
    • /
    • 2022
  • For effective battlefield situation awareness and command resolution, information exchange without seams between systems is essential. However, since each system was developed independently for its own purposes, it is necessary to ensure interoperability between systems in order to effectively exchange information. In the case of our military, semantic interoperability is guaranteed by utilizing the common message format for data exchange. However, simply standardizing the data exchange format cannot sufficiently guarantee interoperability between systems. Currently, the U.S. and NATO are developing and utilizing information exchange models to achieve semantic interoperability further than guaranteeing a data exchange format. The information exchange models are the common vocabulary or reference model,which are used to ensure the exchange of information between systems at the content-meaning level. The information exchange models developed and utilized in the United States initially focused on exchanging information directly related to the battlefield situation, but it has developed into the universal form that can be used by whole government departments and related organizations. On the other hand, NATO focused on strictly expressing the concepts necessary to carry out joint military operations among the countries, and the scope of the models was also limited to the concepts related to command and control. In this paper, the background, purpose, and characteristics of the information exchange models developed and used in the United States and NATO were identified, and comparative analysis was performed. Through this, we intend to present implications when developing a Korean information exchange model in the future.

Analysis of the Chinese Navy's Offensive Strategy for the West Sea and the Development Direction of the Korean Navy's Response Strategy (중국해군의 공세적 서해(西海) 진출 전략 분석과 한국해군의 대응전략 발전방향)

  • Kim, Nam-su
    • Maritime Security
    • /
    • v.6 no.1
    • /
    • pp.1-35
    • /
    • 2023
  • The purpose of this study is to present the direction of development of our navy's response strategy through analysis at the ends, ways, and means level of the Chinese navy's offensive strategy for the West Sea. As a result of the analysis, at the ends level, the Chinese Navy's offensive strategy for the West Sea strategy is being linked to a grand strategy to protect maritime rights and achieve maritime power between the U.S. and China competition, at the ways level, the Chinese Navy is expected to create a foundation for the international community to recognize the West Sea as China's inland sea through "routine entry" and "exercise authority", and in case of emergency, it will try to secure sea control in the West Sea in a short period of time by blocking Korea's maritime transportation route based on the overwhelming preemptive attack capability of aircraft carriers. At the means level, it is accelerating the construction of aircraft carrier warfare units and improving its ability to engage long-range missiles. As a direction of development of the Korean Navy's response strategy in response to this, first, Establishment and Development of National Maritime Security Strategy in conjunction with the Korean Indo-Pacific Strategy. Second, it proposes the development of the concept of effective security operations for the east sea area of the West Sea intermediate line, and third, the development of the concept of combat performance and capacity building to strengthen survival and lethality.

  • PDF

A Study on the Prediction Method of Information Exchange Requirement in the Tactical Network (전술네트워크의 정보교환요구량 예측 방법에 관한 연구)

  • Pokki Park;Sangjun Park;Sunghwan Cho;Junseob Kim;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.95-105
    • /
    • 2022
  • The Army, Navy, and Air Force are making various efforts to develop a weapon system that incorporates the 4th industrial revolution technology so that it can be used in multi-domain operations. In order to effectively demonstrate the integrated combat power through the weapon system to which the new technology is applied, it is necessary to establish a network environment in which each weapon system can transmit and receive information smoothly. For this, it is essential to analyze the Information Exchange Requirement(IER) of each weapon system, but many IER analysis studies did not sufficiently reflect the various considerations of the actual tactical network. Therefore, this study closely analyzes the research methods and results of the existing information exchange requirements analysis studies. In IER analysis, the size of the message itself, the size of the network protocol header, the transmission/reception structure of the tactical network, the information distribution process, and the message occurrence frequency. In order to be able to use it for future IER prediction, we present a technique for calculating the information exchange requirement as a probability distribution using the Poisson distribution and the probability generating function. In order to prove the validity of this technique, the results of the probability distribution calculation using the message list and network topology samples are compared with the simulation results using Network Simulator 2.

Application Strategies of Superintelligent AI in the Defense Sector: Emphasizing the Exploration of New Domains and Centralizing Combat Scenario Modeling (초거대 인공지능의 국방 분야 적용방안: 새로운 영역 발굴 및 전투시나리오 모델링을 중심으로)

  • PARK GUNWOO
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.19-24
    • /
    • 2024
  • The future military combat environment is rapidly expanding the role and importance of artificial intelligence (AI) in defense, aligning with the current trends of declining military populations and evolving dynamics. Particularly, in the civilian sector, AI development has surged into new domains based on foundation models, such as OpenAI's Chat-GPT, categorized as Super-Giant AI or Hyperscale AI. The U.S. Department of Defense has organized Task Force Lima under the Chief Digital and AI Office (CDAO) to conduct research on the application of Large Language Models (LLM) and generative AI. Advanced military nations like China and Israel are also actively researching the integration of Super-Giant AI into their military capabilities. Consequently, there is a growing need for research within our military regarding the potential applications and fields of application for Super-Giant AI in weapon systems. In this paper, we compare the characteristics and pros and cons of specialized AI and Super-Giant AI (Foundation Models) and explore new application areas for Super-Giant AI in weapon systems. Anticipating future application areas and potential challenges, this research aims to provide insights into effectively integrating Super-Giant Artificial Intelligence into defense operations. It is expected to contribute to the development of military capabilities, policy formulation, and international security strategies in the era of advanced artificial intelligence.