• Title/Summary/Keyword: Battlefield Awareness

Search Result 31, Processing Time 0.036 seconds

A Study on Automatic Discovery and Summarization Method of Battlefield Situation Related Documents using Natural Language Processing and Collaborative Filtering (자연어 처리 및 협업 필터링 기반의 전장상황 관련 문서 자동탐색 및 요약 기법연구)

  • Kunyoung Kim;Jeongbin Lee;Mye Sohn
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.127-135
    • /
    • 2023
  • With the development of information and communication technology, the amount of information produced and shared in the battlefield and stored and managed in the system dramatically increased. This means that the amount of information which cansupport situational awareness and decision making of the commanders has increased, but on the other hand, it is also a factor that hinders rapid decision making by increasing the information overload on the commanders. To overcome this limitation, this study proposes a method to automatically search, select, and summarize documents that can help the commanders to understand the battlefield situation reports that he or she received. First, named entities are discovered from the battlefield situation report using a named entity recognition method. Second, the documents related to each named entity are discovered. Third, a language model and collaborative filtering are used to select the documents. At this time, the language model is used to calculate the similarity between the received report and the discovered documents, and collaborative filtering is used to reflect the commander's document reading history. Finally, sentences containing each named entity are selected from the documents and sorted. The experiment was carried out using academic papers since their characteristics are similar to military documents, and the validity of the proposed method was verified.

A Literature Review of the Effectiveness Measurement for NCW (NCW 효과측정에 관한 문헌조사 연구)

  • Jung, Chi-Young;Lee, Jae-Yeong
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.37 no.2
    • /
    • pp.1-16
    • /
    • 2012
  • NCW(Network Centric Warfare) offers BSEs(Battelspace-Entities) the capabilities of sharing information through C4ISRCommand, Control, Communications, Computers and Intelligence, Surveillance and Reconnaissance) network and it also improves their combat powers based on information superiority with awareness of common situation in battlefield and self-synchronization. Although the concept of NCW was developed at the end of 1990 and there have been various studies for NCW from the development of its concept, the effort for measuring the synergistic effect of NCW is insufficient at the present time. Therefore, in this paper we reviewed literatures concerning the effectiveness measurement of NCW. The category of our survey is network effect, metrics, simulation, battlefield information, social network analysis and mathematical model. The main purpose of this study is to suggest future researchers a research direction by analyzing the aspects and limitations of existing studies about the quantitative measurement of NCW.

A Improved Method of the Interoperability through the Improvement of Interoperation System when Operating KVMF-based Weapon System (KVMF 기반하 무기체계 운용시 연동방식 개선을 통한 상호운용성 향상)

  • Kwon, Dong-Ho;Lee, Sang-Ho;Kim, Seung-Chun
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.3
    • /
    • pp.305-313
    • /
    • 2013
  • Ground troops as part of the implementation of the real-time visualization of battlefield tactics to ensure the exchange of information sharing and situational awareness for the ground tactical data link system development is underway. However, with the existing inorganic KVMFbased weapon systems and tactics Quarterly problem occurs because the information has not been in development or in the development of future weapons systems based KVMF share battlefield information to enable interoperability building measures is presented.

A Study of Cyber Operation COP based on Multi-layered Visualization (멀티레이어드 시각화를 적용한 사이버작전 상황도 개발에 관한 연구)

  • Kwon, Koohyung;Kauh, Jang-hyuk;Kim, Sonyong;Kim, Jonghwa;Lee, Jaeyeon;Oh, Haengrok
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.143-151
    • /
    • 2020
  • The cyber battlefield called the fifth battlefield, is not based on geological information unlike the existing traditional battlefiels in the land, sea, air and space, and has a characteristics that all information has tightly coupled correlation to be anlayized. Because the cyber battlefield has created by the network connection of computers located on the physical battlefield, it is not completely seperated from the geolocational information but it has dependency on network topology and software's vulnerabilities. Therefore, the analysis for cyber battlefield should be provided in a form that can recognize information from multiple domains at a glance, rather than a single geographical or logical aspect. In this paper, we describe a study on the development of the cyber operation COP(Common Operational Picture), which is essential for command and control in the cyber warfare. In particular, we propose an architecure for cyber operation COP to intuitively display information based on visualization techniques applying the multi-layering concept from multiple domains that need to be correlated such as cyber assets, threats, and missions. With this proposed cyber operation COP with multi-layered visualization that helps to describe correlated information among cyber factors, we expect the commanders actually perfcrm cyber command and control in the very complex and unclear cyber battlefield.

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.

Recent U.S. Efforts on RMA/MTR and Suggestions for ROK Military Progress (미국의 군사혁명(RMA/MTR)추세와 우리군의 미래발전방향)

  • 권태영;정춘일
    • Journal of the military operations research society of Korea
    • /
    • v.22 no.2
    • /
    • pp.1-17
    • /
    • 1996
  • Sun Tzu once clarified that "One who knows the enemy and knows himself will not be endangered in a hundred engagements, " while Clausewitz explained that "A victory will be guaranteed for one who can overcome 'fog and friction' at a battlefield." Now the U.S. is striving hard to develop an American version of RMA (Revolution in Military Affairs)/MTR (Military Technical Revolution) by utilizing its rapidly emerging information technology in the information age. The U.S. firmly believes that its RMA/MTR with less defense expenditure can provide all combat players in the battlespace with "dominant battle awareness, " by which no nation will be able to challenge U.S. military superiority. In this paper, the recent efforts of the U.S. Armed Forces on RMA/MTR will be briefly introduced, some lessons and expertises from the U.S. RMA/MTR are extracted, and, in this regard, several suggestions are provided for the progress of the ROK Armed Forces.gress of the ROK Armed Forces.

  • PDF

Echelons Scale Identification Scheme of Surveillance and Reconnaissance Sensor Network (감시정찰 센서네트워크에서 제대규모 식별 기법)

  • Choi, Ji-Hye;Kwon, Tae-Wook
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.3
    • /
    • pp.438-444
    • /
    • 2010
  • Surveillance and reconnaissance sensor network system is an application system based on ubiquitous sensor network technology. This technique is to avoid accidental close combat, to minimize the consumption of limited military resources and personnel, and to provide battlefield situational awareness information for the unit's future combat missions. In this paper, we have proposed a echelons scale identification scheme based on information obtained from surveillance and reconnaissance sensor network system.

Reconnaissance-Strike-Logistics Complex Systems for Future Warfare in the 21st Century (21세기 미래전의 정찰.타격.군수 복합체계)

  • 권태영;이재영
    • Journal of the military operations research society of Korea
    • /
    • v.27 no.1
    • /
    • pp.1-9
    • /
    • 2001
  • In this paper, "a conceptual model of Reconnaissance-Strike-Logistics Complex(RSLC) in future warfare" is proposed. Basic idea of the RSLC model is to combine logistics and the pre-existing Reconnaissance-Strike Complex(RSC) through a C4 network system. That is, the RSLC model consists of reconnaissance, strike, logistics, and C4 network systems. The C4 network system creates new combat power by integrating all the other systems. The RSLC model generates three conceptual complex circles; the RSC, the SLC(Strke-Logistics Complex), and the RSLC circles. The RSC circles describes direct combat behaviors in the battlefield. On the other hand, the SLC circle indicates combat sustainment capabilities. The RSLC circle including the RSC and the SLC circles, can present a more complete combat process. There are two key advantages of the RSLC model. First of all, logistics is considered one of key combat components to form IDA(Information-Decision-Action) cycle for combat decision-making process more completely. Secondly, the capabilities of battlefield awareness which reconnaissance and war-net systems provide, can be applied not only to the strike system in the RSC circle, but also to the logistics system in the SLC circle. Thus, the RSLC model can maximize combat synergy effects by integrating the RSC and the SLC. With a similar logic, this paper develops "A Revised System of Systems with Logistics (RSSL)" which combines "A New system of Systems" and logistics. These tow models proposed here help explain several issues such as logistics environment in future warfare, MOE(Measure of Effectiveness( on logistics performance, and COA(Course of Actions) for decreasing mass and increasing velocity. In particular, velocity in logistics is emphasized.

  • PDF

Study on Multiple & Complex threat situation emulation for ASE System (생존체계 위협조우 상황인지를 위한 복합/다중 위협 상황 Emulation 연구)

  • Lee, Moon-Seok;Lee, Jung-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.516-520
    • /
    • 2010
  • As the substantial increase in battlefield density, multiple and complex weapon system, Ensuring the Survivability of the platform has been emphasized. Most of platforms have equipped with ASE (Aircraft Survivability Equipment) system in order to take action against at modernized hostile weapon under current battlefield. ASE system enhance the survivability of the platform through providing accurate situation awareness information by detecting and countermeasuring hostile threats. One of Key factor of the AE system performance is handling multiple and complex threats. Multiple and complex threat emulation is an effective means of ASE system verification In this study, It discuss system verification method before installation by dealing with complex threat situation consists of individual threat.

  • PDF

A Study on Complex Threat Emulation for Situation Awareness of ASE System (생존체계 위협조우 상황인지를 위한 복합/다중 위협상황 Emulation 연구)

  • Lee, Moon-Seok;Lee, Jung-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.10
    • /
    • pp.2180-2186
    • /
    • 2010
  • As the substantial increase in battlefield density, multiple and complex weapon systems, Ensuring the Survivability of the platform has been emphasized. Most of platforms have equipped with ASE (Aircraft Survivability Equipment) system in order to protect the platform and operator against at modernized hostile weapon. ASE system enhance the survivability of the platform through providing accurate situation awareness information by detecting and countermeasuring hostile threats. One of Key factor of the AE system performance is handling multiple and complex threats. In this study, it describes the fact that the performance of ASE system with proposed threat integration algorithm is verified in the developed threat emulation system and also, suggests system verification method before deployment by dealing with complex threat situation.