• Title/Summary/Keyword: 항공 작전

Search Result 75, Processing Time 0.022 seconds

Exploratory Research on the Obstacle Factors of Aircraft Operations (항공작전의 장애요인에 관한 탐색적 연구)

  • Song, Young-Il;Kim, Hae-Sung
    • Journal of the military operations research society of Korea
    • /
    • v.33 no.2
    • /
    • pp.1-15
    • /
    • 2007
  • Aircraft operation doesn't consider the fact which can became obstacles. Forecasting, Preparing and Planning can make effective aircraft operation. This study is the find out the method of the effective Aircraft military power management. The force try to analysis the obstancles, aircraft operation ability and prepared military power. This study was analysis by ARENA 10.0. The obstacles consider to four category; weather, CBR warfare. aircraft accident and battle damage. And This study conduct the sensibility which can influence the aircraft operation.

전술 항공정찰 체계 발전 방향 (4)

  • Go, Jae-Il
    • Defense and Technology
    • /
    • no.2 s.240
    • /
    • pp.58-67
    • /
    • 1999
  • 성공적 군사작전 지원을 위한 전술항공정찰 임무 수행 능력 구비를 위해서는 각 정보 수집 체계별 보유 기술 수준과 가용예산, 획득 우선 순위 등을 고려하여 현 작전수행 개념에 의거 운용 체제를 구축해야 할 것이다. 특히 전술항공정찰을 통한 영상정보의 수집은 항공작전 수행시 성공적인 임무수행의 보장과 통합 임무명령을 작성하기 위해 기초자료를 제공하는 핵심 활동의 하나이므로 전술항공 정찰 체계도 전투기 확보와 같은 비중과 종합적인 운용개념을 가지고 검토되고 확보되어야 할 것이다

  • PDF

Proposal of a framework for evaluating the operational impact of cyber attacks on aviation weapons systems(EOICA) (항공무기체계 사이버공격에 대한 작전영향성평가 프레임워크 제안)

  • Hong, Byoung-jin;Kim, Wan-ju;Lee, Soo-jin;Lim, Jae-sung
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.35-45
    • /
    • 2020
  • Cyber attacks on the aviation weapon system, a state-of-the-art asset, have become a reality and are approaching as a constant threat. However, due to the characteristics of embedded software of the current aviation weapon system, it is managed and operated without connection to the network in peacetime, so the response management to cyber attacks is relatively weak. Therefore, when a cyber attack becomes a reality, it is urgent to prepare and evaluate measures for the adverse effects that such attack will have on the execution of the Air Tasking Order(ATO). In this paper, we propose a framework for operational impact assessment in order to avoid confusion in ATO execution and systematic response to cyber attacks on aviation weapons systems. The proposed framework is designed to minimize the negative impact on operations against cyber attacks that may occur under no warning by analyzing the impact on air operations for each aviation weapon system and standardizing countermeasures for this. In addition, it supports the operational commander to make a quick decision to command for the execution of the operation even in a situation where a cyber attack occurs.

Analysis of SEAD Mission Procedures for Manned-Unmanned Aerial Vehicles Teaming (유무인기 협업 기반의 SEAD 임무 수행절차 분석)

  • Kim, Jeong-Hun;Seo, Wonik;Choi, Keeyoung;Ryoo, Chang-Kyung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.47 no.9
    • /
    • pp.678-685
    • /
    • 2019
  • Due to the changes in future war environment and the technological development of the aviation weapon system, it is required to carry out on the analysis of the Manned-Unmanned aerial vehicles Teaming(MUM-T). Conventional manned-unmanned aerial vehicles operate according to the air strategy missions and vehicles' performance. In this paper, we analyze conventional aerial vehicle's mission to derive various kinds of missions of MUM-T after analyzing the unmanned aircraft systems roadmap issued by US DoD and the air strategy of US Air Force. Next, we identify the basic operations of the vehicles to carry out the missions, select the MUM-T based Suppression of Enemy Air Defense missions(SEAD), and analyze the procedure for performing the missions step by step. In this paper, we propose a procedure of the mission in the context of physical space and timeline for the realization of the concept of MUM-T.

전술·전략 정찰기를 알아본다

  • Seo, Byeong-Hong
    • Aerospace Industry
    • /
    • v.43
    • /
    • pp.38-49
    • /
    • 1996
  • 적정의 탐지와 감시가 작전을 승리로 이끄는 요건임은 동서고금을 통하여 불변의 전제이다. 지구상에 전쟁이라는 대량파괴와 살육이 계속되면서 적정 정찰을 위해 많은 노력이 경주되었다. 근대에와서 항공기의 개발과 진보가 눈부시게 가속되는데 따라 전쟁에서 정찰의 임무는 항공정찰이 주가 되었다. 그리하여 전략, 전술 양면의 정찰은 이제 첨단기술의 도입으로 더욱 경쟁이 치열해지고 있다. 그런점에서 정찰기의 여러측면을 알아보는 것을 이달의 기획으로 삼았다.

  • PDF

미 유군 항공과 Objective Force-달라진 육군과 코만치 헬기의 필수적 역할

  • Heo, Gyeong
    • Defense and Technology
    • /
    • no.1 s.287
    • /
    • pp.86-93
    • /
    • 2003
  • Objective Force의 모든 측면에서 볼 때, 육군항공은 절대 필요한 구성요소이다. 통합개념팀(Intergrated Concept Team)은 현재 Alabama주 Fort Rucker에서 미래 항공력에 대한 작전적 및 조직적(O & O : Operational and Organizational) 개념을 개발하고 있는 중이다. 이러한 노력은 무인항공기, 공중기동수송기, Loitering Attack Munition – Aviation, 새로운 군수 및 공중수송서비스 등과 같은 최근에 생겨난 개념과 시스템들을 획득하는데 목적이 있다.

  • PDF

세계의 UAV 시장

  • 한국항공우주산업진흥협회
    • Aerospace Industry
    • /
    • v.83
    • /
    • pp.38-41
    • /
    • 2004
  • 영국 공군(RAF)의 미래 공세적 공중시스템(FOAS)은 토네이도 공격기와 영국 해군의 토마호크 지상공격 순항미사일을 2018년경부터 퇴역시키는 대신 무인전투항공기(UCAV)를 필요에 맞게 배치시키는 것이다. 영국 공군 무인전투항공기는 기본적인 영역인 적방공망제압(SEAD) 작전도 가능할 것이다. (중략)

  • PDF

Research on Cyber Kill Chain Models for Offensive Cyber Operations (공세적 사이버 작전을 위한 사이버 킬체인 모델 연구)

  • Seong Bae Jo;Wan Ju Kim;Jae Sung Lim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.71-80
    • /
    • 2023
  • Cyberspace has emerged as the fifth domain of warfare, alongside land, sea, air, and space. It has become a crucial focus for offensive and defensive military operations. Governments worldwide have demonstrated their intent to engage in offensive cyber operations within this domain. This paper proposes an innovative offensive cyber kill chain model that integrates the existing defensive strategy, the cyber kill chain model, with the joint air tasking order (ATO) mission execution cycle and joint target processing procedure. By combining physical and cyber operations within a joint framework, this model aims to enhance national cyber operations capabilities at a strategic level. The integration of these elements seeks to address the evolving challenges in cyberspace and contribute to more effective jointness in conducting cyber operations.