• Title/Summary/Keyword: 전투 시스템

Search Result 256, Processing Time 0.029 seconds

A Study on Apparatus of Smart Wearable for Mine Detection (스마트 웨어러블 지뢰탐지 장치 연구)

  • Kim, Chi-Wook;Koo, Kyong-Wan;Cha, Jae-Sang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.263-267
    • /
    • 2015
  • current mine detector can't division the section if it is conducted and it needs too much labor force and time. in addition to, if the user don't move the head of sensor in regular speed or move it too fast, it is hard to detect a mine exactly. according to this, to improve the problem using one direction ultrasonic wave sensing signal, that is made up of human body antenna part, main micro processor unit part, smart glasses part, body equipped LCD monitor part, wireless data transmit part, belt type power supply part, black box type camera, Security Communication headset. the user can equip this at head, body, arm, waist and leg in removable type. so it is able to detect the powder in a 360-degree on(under) the ground whether it is metal or nonmetal and it can express the 2D or 3D film about distance, form and material of the mine. so the battle combats can avoid the mine and move fast. also, through the portable battery and twin self power supply system of the power supply part, combat troops can fight without extra recharge and we can monitoring the battle situation of distant place at the command center server on real-time. and then, it makes able to sharing the information of battle among battle combats one on one. as a result, the purpose of this study is researching a smart wearable mine detector which can establish a smart battle system as if the commander is in the site of the battle.

Development of Leader Selection Algorithm to Support Fault Tolerance of Integrated Management Systems in the Naval Combat System (함정 전투체계에서 통합 통제 시스템의 고장 감내를 지원하기 위한 리더 선정 알고리즘 개발)

  • Seo, Yongjin;Jo, Jun Young;Kim, Hyeon Soo;Go, Youngkeun;Kim, Chum-Soo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.3
    • /
    • pp.382-391
    • /
    • 2019
  • The naval combat system is a distributed system in which various subsystems are integrated and operated together. The integrated management system(IMS) is a software system for systematically and consistently managing the application software which control and operate various devices in such a combat system. Since the malfunction or failure of such an IMS can disable the entire combat system, the IMS is more important than other application software of the combat system. In this paper, we propose a method to guarantee the stable and correct operation of the combat system. To this end, we propose a redundancy scheme composed of one leader and several followers so as to tolerate the failure situation of the IMS. We also propose a leader selection algorithm to select a new leader when the leader fails and can no longer perform its role. To verify the validity of the study, we verify the fault tolerance behavior of the system and the accuracy of the leader selection algorithm.

A Development of Hit Probability-based Vulnerability Analysis System for Armored Fighting Vehicle using Fault Tree Analysis Technique (FTA 기법을 활용한 피격 확률 기반의 전차 취약성 분석 시스템 개발)

  • Hwang, Hun-Gyu;Yoo, Byeong-Gyu;Lee, Jae-Woong;Lee, Jang-Se
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.8
    • /
    • pp.1981-1989
    • /
    • 2015
  • Recently, the development of reliability analysis system for combat system is required, because, necessities of integrated reliability analysis research are emphasized. In this paper, we develop a system which analyzes vulnerabilities for tank(or armored vehicle) based on the fault tree analysis(FTA) technique. The FTA is representative technique of reliability analysis to find cause of fault and calculate probability of fault. To do this, we propose a method to apply FTA technique into domain of vulnerability analysis for tank. Also, we develop the vulnerability analysis system using the proposed method. The system analyzes hit probabilities of components of tank based on multiple shot-lines, and calculates kill probabilities. The analyzed and calculated data support vulnerability analysis of tank.

A Study on the Knowledge Base Development of Expert System for Naval Combat System (해군 전투체계 지원용 전문가시스템의 지식베이스 개발에 관한 연구(구축함 중심))

  • 김화수;이정훈
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2002.11a
    • /
    • pp.183-192
    • /
    • 2002
  • 본 논문에서는 구축함의 대공방어분야에 대한 업무를 IDEF0기능 모델링 방법을 통해 체계적으로 분석하였으며 미국방성의 산하기구인 DARPA에서 연구한 CPOF(Command Post Of Future) 의사결정 모델을 토대로 구축함의 대공방어분야에서 상황평가 단계에 대한 의사결정 과정을 심도 깊게 분석하였다. 또한 구축함의 대공방어분야에서 분석된 업무수행 절차를 토대로 상황평가 단계에서 의사결정과정에 따른 필요한 규칙집합을 식별하고 규칙집합 내부의 규칙들을 효과적으로 추출하기 위하여 규칙집합들에 대한 정의, 규칙에 입력되는 데이터, 규칙집합의 결과값, 규칙집합간의 상호관계를 분석하였다. 이러한 도메인 지식개발은 장차 해군 전투체계 지원용 전문가시스템을 개발하는데 중요한 기회기반이 될 것이다.

  • PDF

A Robot System of Military Application Method (로봇 시스템의 군사적 적용 방안)

  • Cho, Jung-Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.691-692
    • /
    • 2019
  • 미래 전장은 IT기술 및 생명공학, 무인화, 인공지능 분야의 민간기술 발전이 군사기술 발전과 전투수행 방법을 선도하고, 인공지능 및 인지기술 등 무인화기술의 발전으로 정보수집, 표적식별, 지뢰제거 및 오염제독 등 지원임무는 물론 교전임무를 수행할 수 있는 무인장비가 개발됨으로써 무인전투개념이 가시화되고 있다. 그러므로 이번 논고에서는 무인장비 중 군사용 로봇에 대해 살펴보고 활용 방안을 제시해보고자 한다.

Command and control modeling for computer assisted exercise (훈련시뮬레이션에서의 지휘통제 모델링)

  • Yun, Woo-Seop;Han, Bong-Gyu;Lee, Tae-Eog
    • Journal of the Korea Society for Simulation
    • /
    • v.25 no.4
    • /
    • pp.117-126
    • /
    • 2016
  • We suggest the C2 modeling method to develop a simulation model for training command groups which consist of commanders and staffs. By using C2 models in constructive simulation models, combat entities or units directly receive and execute orders from a command group without mediating human role players. We also compare combat results from suggested modeling method with the results of existing models by building and implementing a simulation model with C2 models. Our analysis by comparison demonstrates advantages of suggested method to model C2 for computer assisted exercises.

Development of Future Soldier Battle Jacket Design Based on the Measurement by Moir$\acute{e}$ Photographing (동작에 따른 체표변화 측정결과를 이용한 미래 병사 전투복 설계안 개발 -Moir$\acute{e}$ 계측 방법을 중심으로)

  • Yang, Jin-Hui;Park, Seon-Hyeong;Jeong, Gi-Sam;Chae, Jae-Uk;Kim, Hyeon-Jun;Choe, Ui-Jung;Lee, Ju-Hyeon
    • Proceedings of the Korean Society for Emotion and Sensibility Conference
    • /
    • 2009.11a
    • /
    • pp.49-53
    • /
    • 2009
  • 미래병사를 위한 전투지원 시스템은 여러 가지 디지털 디바이스로 구성되며, 이러한 디바이스들을 적절한 위치에 분산시킴으로써 병사의 전투력을 향상시킬 수 있도록 설계하는 것이 중요하다. 분산 디자인을 위해서는 동작에 따른 인체의 변화를 측정하는 것이 중요하며, 특히 센서를 탑재하기 위해서는 인체 표면의 변화가 세밀히 분석되어야 할 것이다. 본 연구는 Moir$\acute{e}$ 계측방법을 이용하여 동작에 따른 체표변화를 측정함으로써 각종 디지털 디바이스를 탑재할 적절한 신체 부위를 알아내어 기기를 배치함으로써 미래 전장에 적합한 스마트 전투복 디자인을 개발하는 것을 목표로 한다.

  • PDF

Research on System Architecture and Methodology based on MITRE ATT&CK for Experiment Analysis on Cyber Warfare Simulation

  • Ahn, Myung Kil;Lee, Jung-Ryun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.31-37
    • /
    • 2020
  • In this paper, we propose a system architecture and methodology based on cyber kill chain and MITRE ATT&CK for experiment analysis on cyber warfare simulation. Threat analysis is possible by applying various attacks that have actually occurred with continuous updates to reflect newly emerging attacks. In terms of cyber attack and defense, the current system(AS-IS) and the new system(TO-BE) are analyzed for effectiveness and quantitative results are presented. It can be used to establish proactive cyber COA(Course of Action) strategy, and also for strategic decision making. Through a case study, we presented the usability of the system architecture and methodology proposed in this paper. The proposed method will contribute to strengthening cyber warfare capabilities by increasing the level of technology for cyber warfare experiments.