• Title/Summary/Keyword: Battlefield

Search Result 384, Processing Time 0.022 seconds

Combat Entity Based Modeling Methodology to Enable Joint Analysis of Performance/Engagement Effectiveness - Part 1 : Conceptual Model Design (성능/교전 효과도의 상호 분석이 가능한 전투 개체 기반의 모델링 방법론 - 제1부 : 개념 모델 설계)

  • Seo, Kyung-Min;Kim, Tag Gon;Song, Hae-Sang;Kim, Jung Hoon;Chung, Suk Moon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.2
    • /
    • pp.223-234
    • /
    • 2014
  • This paper proposes a flexible and highly reusable modeling methodology for a next-generation combat entity which enables joint analysis of performance/engagement effectiveness. According to the scope of the proposed work, the paper is divided into two parts; Part 1 focuses on a conceptual model design, whereas Part 2 proposes detailed model specification and implementation. In Part 1, we, first, classify the combat entity model as combat logic and battlefield function sub-models for joint analysis. Based on the sub-models, we propose two dimensional model partition method, which creates six groups of a single combat entity model by two dimensions: three-activity and two-abstraction. This grouping enables us to reconfigure the combat entity model by sharing the same interface within the group, and the same interface becomes the fundamental basis of the flexible model composition. Furthermore, the proposed method provides a model structure that effectively reflects the real world and maximizes the multi-level reusability of a combat entity model. As a case study, we construct a model design for anti-surface ship warfare. The case study proves enhancement of model reusability in the process of scenario expansion from pattern running to wire guided torpedo operations.

Variation of Supersonic Aircraft Skin Temperature under Different Mach number and Structure (비행마하수와 형상에 따른 초음속 항공기 표면온도 변화)

  • Cha, Jong Hyun;Kim, Taehwan;Bae, Ji-Yeul;Kim, Taeil;Jung, Daeyoon;Cho, Hyung Hee
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.4
    • /
    • pp.463-470
    • /
    • 2014
  • Stealth technology of combat aircraft is most significant capability in recent air battlefield. As the detector of IR missiles is being developed, IR stealth capability which is evaluated by IR signature level become more important than it was in previous generation. Among IR signature of aircraft from various sources, aerodynamic heating dominates in long-wavelength IR spectrum of $8{\sim}12{\mu}m$. Skin temperature change by aerodynamic heating which is derived by effects of Mach number and structure. The 4th and 5th generation aircraft are selected for calculation of the skin temperature, and its height and velocity in numerical conditions are 10,000 m and Ma 0.9~1.9 respectively. Aircraft skin temperature is calculated by computing convection of fluid and conduction, convection and radiation of surface. As the aircraft accelerates to higher Mach number, maximum skin temperature increases more rapidly than average temperature and temperature distribution changes in more sharp, interactive ways. The 4th generation aircraft whose shape is more complex than that of the 5th generation aircraft have complicated temperature distribution. On the other hand, the 5th generation aircraft whose shape is relatively simple shows plain temperature distribution and lower skin temperature in terms of both average and maximum value.

A Study on Quality Assurance of Embedded Software Source Codes for Weapon Systems by Improving the Reliability Test Process (신뢰성 시험 프로세스 개선을 통한 무기체계 내장형 소프트웨어 소스코드 품질확보에 관한 연구)

  • Kwon, Kyeong Yong;Joo, Joon Seok;Kim, Tae Sik;Oh, Jin Woo;Baek, Ji Hyun
    • Journal of KIISE
    • /
    • v.42 no.7
    • /
    • pp.860-867
    • /
    • 2015
  • In the defense field, weapon systems are increasing in importance, as well as the weight of the weapon system embedded software development as an advanced technology. As the development of a network-centric warfare has become important to secure the reliability and quality of embedded software in modern weapons systems in battlefield situations. Also, embedded software problems are transferred to the production stage in the development phase and the problem gives rise to an enormous loss at the national level. Furthermore, development companies have not systematically constructed a software reliability test. This study suggests that approaches about a qualityverification- system establishment of embedded software, based on a variety of source code reliability test verification case analysis.

A Study of Threat Evaluation using Learning Bayesian Network on Air Defense (베이지안 네트워크 학습을 이용한 방공 무기 체계에서의 위협평가 기법연구)

  • Choi, Bomin;Han, Myung-Mook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.6
    • /
    • pp.715-721
    • /
    • 2012
  • A threat evaluation is the technique which decides order of priority about tracks engaging with enemy by recognizing battlefield situation and making it efficient decision making. That is, in battle situation of multiple target it makes expeditious decision making and then aims at minimizing asset's damage and maximizing attack to targets. Threat value computation used in threat evaluation is calculated by sensor data which generated in battle space. Because Battle situation is unpredictable and there are various possibilities generating potential events, the damage or loss of data can make confuse decision making. Therefore, in this paper we suggest that substantial threat value calculation using learning bayesian network which makes it adapt to the varying battle situation to gain reliable results under given incomplete data and then verify this system's performance.

A Reverse Simulation for Developing Defense Systems based on Simulation Models (시뮬레이션 모델기반 국방체계 설계를 위한 역방향 시뮬레이션)

  • Choi, Seon Han;Kim, Tag Gon;Jin, Ki Byung;Park, Kyung Tae;Shin, Dong Cho
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.3
    • /
    • pp.27-40
    • /
    • 2020
  • When analyzing the effectiveness of a defense system in a virtual battlefield with a simulation model is referred to as forward simulation, reverse simulation is required to design a good defense system with high effectiveness. That is, using the simulation model, it is necessary to find the engineering factors, measures of performance, and operational tactics that are demanded to achieve high effectiveness of the system. However, the efficiency of reverse simulation is still a concern since many replications of forward simulation are required for conducting reverse simulation. In this paper, we introduce various efficient algorithms to reduce the number of replications and a reverse simulation tool for utilizing these algorithms easily. The tool allows practitioners to easily and efficiently conduct reverse simulation for design a good defense system based on simulation models. This is demonstrated with the case studies on the design of warship's defense system and the design of military network system.

A study on the method acquiring NCOs according to the decrease in school age population - Activation of the department of navy noncommissioned officers - (학령 인구감소에 따른 부사관 획득 방법에 대한 연구 -해군 부사관학과 활성화를 중심으로-)

  • Jang, Kyoung Sun;Cheung, Yun Kyoung
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.159-168
    • /
    • 2021
  • The battlefield environment of the Korean peninsula is rapidly changing due to the advancement of the weapon system brought by the political situation of adjacent countries and the 4th industrial revolution. The reduction of population also caused a sharp drop in the recruitment of military personnel, making it unavoidable to reform the military structure. This meaningful study is timely with recent news reports on the shortage of recruitment by 10,000 persons in the last five years. Universities are also seeing a decrease in the number of new students due to the reduced school-age population, and affiliated universities are responding to this issue with great seriousness. With a reduction in manpower, requirement-handling military units need to step up their efforts to secure competent noncommissioned officers while affiliated universities must also train capable noncommissioned officers. As a solution to the matter at hand, this study aims to suggest a method that may vitalize both the navy and the navy-affiliated universities based on the results of literature research.

Heterogeneous Network Gateway Architecture and Simulation for Tactical MANET (전술 에드혹 환경에서 이종망 게이트웨이 구조 및 시뮬레이션 연구)

  • Roh, Bong Soo;Han, Myoung Hun;Kwon, Dae Hoon;Ham, Jae Hyun;Yun, Seon Hui;Ha, Jae Kyoung;Kim, Ki Il
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.2
    • /
    • pp.97-105
    • /
    • 2019
  • The tactical mobile ad-hoc network(MANET) consists of distributed autonomous networks between individual ground nodes, which is effective in terms of network survivability and flexibility. However, due to constraints such as limited power, terrain, and mobility, frequent link disconnection and shadow area may occur in communication. On the other hand, the satellite network has the advantage of providing a wide-area wireless link overcoming terrain and mobility, but has limited bandwidth and high-latency characteristic. In the future battlefield, an integrated network architecture for interworking multi-layer networks through a heterogeneous network gateway (HNG) is required to overcome the limitations of the existing individual networks and increase reliability and efficiency of communication. In this paper, we propose a new HNG architecture and detailed algorithm that integrates satellite network and the tactical MANET and enables reliable data transfer based on flow characteristics of traffic. The simulations validated the proposed architecture using Riverbed Modeler, a network-level simulator.

A Study on the Interoperability of ROK Air Force Virtual and Constructive Simulation (공군 전투기 시뮬레이터와 워게임 모델의 V-C 연동에 대한 연구)

  • Kim, Yong Hwan;Song, Yong Seung;Kim, Chang Ouk
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.2
    • /
    • pp.169-177
    • /
    • 2019
  • LVC(Live-Virtual-Constructive) training system is drawing attention due to changes in battlefield situation and the development of advanced information and communication technologies. The ROKAF(Republic of Korea Air Force) plans to construct LVC training system capable of scientific training. This paper analyzes the results of V-C interoperability test with three fighter simulators as virtual systems and a theater-level wargame model as a constructive system. The F-15K, KF-16, and FA-50 fighter simulators, which have different interoperable methods, were converted into a standard for simulation interoperability. Using the integrated field environment simulator, the fighter simulators established a mutually interoperable environment. In addition, the Changgong model, which is the representative training model of the Air Force, was converted to the standard for simulation interoperability, and the integrated model was implemented with optimized interoperability performance. Throughput experiments, It was confirmed that the fighter simulators and the war game model of the ROKAF could be interoperable with each other. The results of this study are expected to be a good reference for the future study of the ROKAF LVC training system.

The Engagement HILS Technology Research in the Laboratory for Simulated Warfare between Electronic Warfare Equipment and High-speed Maneuvering Weapon System (실험실에서 전자전 장비와 고속 기동 무기체계 간 실 교전 모의용 조우 HILS 기술 연구)

  • Shin, Dongcho;Choe, Wonseok;Kim, Soyeon;Lee, Chiho
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.2
    • /
    • pp.49-57
    • /
    • 2019
  • In this paper, we describe the implementation methods and algorithms for the various technologies and devices required for the construction of the engagement HILS(Hardware In the Loop Simulation) in the limited space to simulate the high-speed maneuvering encounter situation of the weapon system in 3-dimensional real world space. Through this research, we have been able to suggest ways to analyze the major design elements of future electronic warfare equipment through experiments simulating actual engagements between various high-speed maneuvering weapons systems and electronic warfare devices in the future battlefield. It was confirmed that the M&S technology could be used to eliminate technical risks, reduce development cost, and shorten development time in the future real system development. The results of this study can be a great assist not only for the field of electronic warfare system research and development, but also for the research & implementation on HILS of various engaging class weapons systems.

Security Threats and Scenarios using Drones on the Battlefield (전장에서 드론을 활용한 보안 위협과 시나리오)

  • Park, Keun-Seog;Cheon, Sang-pil;Kim, Seong-Pyo;Eom, Jung-ho
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.73-79
    • /
    • 2018
  • Since 1910s, the drones were mainly used for military purposes for reconnaissance and attack targets, but they are now being used in various fields such as disaster prevention, exploration, broadcasting, and surveillance of risk areas. As drones are widely used from military to civilian field, hacking into the drones such as radio disturbance, GPS spoofing, hijacking, etc. targeting drones has begun to occur. Recently, the use of drones in hacking into wireless network has been reported. If the artificial intelligence technology is applied to the drones in the military, hacking into unmanned combat system using drones will occur. In addition, a drone with a hacking program may be able to relay a hacking program to the hacking drone located far away, just as a drone serves as a wireless communication station. And the drones will be equipped with a portable GPS jamming device, which will enable signal disturbance to unmanned combat systems. In this paper, we propose security threats and the anticipated hacking scenarios using the drones on the battlespace to know the seriousness of the security threats by hacking drones and prepare for future cyberspace.

  • PDF