• Title/Summary/Keyword: Battlefield Environment

Search Result 122, Processing Time 0.025 seconds

Optimization Routing Model for Installation of Clustered Engineering Obstacles with Precedence Constraint (선행제약을 고려한 권역단위 공병장애물 설치경로 최적화 모형)

  • Dongkeun Yoo;Suhwan Kim
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.47 no.2
    • /
    • pp.65-73
    • /
    • 2024
  • This paper presents a path planning optimization model for the engineering units to install obstacles in the shortest time during wartime. In a rapidly changing battlefield environment, engineering units operate various engineering obstacles to fix, bypass, and delay enemy maneuvers, and the success of the operation lies in efficiently planning the obstacle installation path in the shortest time. Existing studies have not reflected the existence of obstacle material storage that should be visited precedence before installing obstacles, and there is a problem that does not fit the reality of the operation in which the installation is continuously carried out on a regional basis. By presenting a Mixed Integrer Programming optimization model reflecting various constraints suitable for the battlefield environment, this study attempted to promote the efficient mission performance of the engineering unit during wartime.

The Impact of Climate Change on Future Ground Operations (기후변화에 따른 미래 지상 작전 영향)

  • Taejin Lee;Sanghwan Park;Suyeon Park;Minji Kim;Gyeongmin Kang;Jaedon Hwang;Sung Kim
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.26 no.5
    • /
    • pp.431-438
    • /
    • 2023
  • The information about battlefield environment changes and operational impacts on Korean Peninsula due to climate change is essential for national defense. In this study, the future impact of four ground operations was analyzed by using the national climate change standard scenario based on the IPCC 6th report. As a result, it was analyzed that the number of operational-limited days for ambush and airlift operations would decrease, making the operational environment favorable. However, the operational environment unfavorable as the number of operational-limited days for crossing and reconnaissance operations increase, but the number is not large so much.

Design of the homomorphic encryption system for secure data management in the future battlefield environment (미래 전장환경에서 안전한 데이터 관리를 위한 준동형 시스템 설계)

  • Cha, HyunJong;Kim, JinMook;Ryou, HwangBin
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.51-56
    • /
    • 2014
  • Be expressed in network-centric warfare, mainly battlefield environment of the future. The purpose of the system for the war of the future, is to recognize the enemy before the enemy, and rapid decision-making, to hit accurately. For this reason, it is during the construction of the integrated system of C4ISR+PGM. In such an integrated system, it is necessary to further enhance the security aspects of the information. In particular, strengthening of security leads to a decrease of efficiency. Therefore, security and efficiency should be considered together. In this study, we provide a homomorphic encryption system that can be safely managed information environment on the battlefield of the future. The proposed method uses encryption technology of homomorphic that can be the arithmetic operations on encrypted state. It has changed from the state of the encryption. Therefore, the attacker can not know a decent information.

A Study on the Military use of the New Future Battlefield Environment Metaverse (새로운 전장환경 메타버스의 군사적 활용방안 연구)

  • Jung, Min-Sub;Song, Jae Jung;Park, Sang-Hyuk;Moon, Jang-Kwon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.2
    • /
    • pp.179-185
    • /
    • 2022
  • Society is entering a new transition period due to the metaverse, where a new world is created by the fusion of the online virtual world and the real world with the development of information and communication technology. The realm of Metaverse, which was focused on entertainment, is gradually expanding into everyday areas such as fellowship activities, education, and commerce. Its application is also increasing in the field. Therefore, this study intends to discuss the concept, core type, development trend, and future application of the metaverse in the military field.

A Framework to Construct the Aviation Engagement Simulation Model based on the Synthetic Battlefield in the HLA/RTI System (HLA/RTI 시스템에서 합성전장환경 기반의 항공 교전 시뮬레이션 모델 구축 프레임워크)

  • Ham, Won K.;Yang, Karam;Choi, Jong-Yeob;Park, Sang C.
    • Journal of the Korea Society for Simulation
    • /
    • v.23 no.2
    • /
    • pp.57-64
    • /
    • 2014
  • This paper proposes a framework to construct the synthetic battlefield based aviation engagement simulation model for the distributed system. The proposed framework has the synthetic battlefield in the HLA (High Level Architecture)/RTI (Run-Time Infrastructure) based distributed system to reflect environmental effects into the aviation engagement simulation model. In an aviation engagement, the environment affects weapon systems such as detection and movement. Therefore, environmental effects are required to be reflected in the simulation. However, former researches are inadequate for complex operations of weapon systems that are requirements of the engagement simulation. Thus, the construction of the engagement simulation system of which reflects environmental effects based on environmental data is still difficult. The main objective of this paper is to propose a framework to solve the difficulty and constructs an example system based on the proposed framework.

Developing an AR based Command Post eXercise(CPX) Simulator (증강현실 기반 지휘통제훈련 시뮬레이터 개발)

  • Park, Sangjun;Shin, Kyuyoung;Kim, Dongwook;Kim, Tai Hyo;Roh, Hyo Bin;Lee, Wonwoo
    • Convergence Security Journal
    • /
    • v.18 no.5_2
    • /
    • pp.53-60
    • /
    • 2018
  • As science and technology develops, it is expected that more precise and various weapons will be used in a much more complicate future battlefield environment. C4I is a system that provides the proper and necessary information to commanders and their staffs to recognize the battlefield situation by connecting and visualizing the complex battlefield environment and various weapon systems together. Commanders and staffs perform battle command training based on a computer or paper map to better utilize the C4I system and Command Post eXercise(CPX) is a process of the training. This is the way for them to improve command control and decision making skills. Analyzing of line of sight(LOS), identifying communication fringe area, deploying troop strength, and determining unit maneuver are highly restricted under the 2D based CPX. In recent years, however, three-dimensional (3D) CPX simulators have been developed to overcome these drawbacks. In response to this trend, this paper proposes a multi-user based CPX simulator using augmented reality (AR) glass, which can be used as a practical war game simulator.

  • PDF

A Study on the Software Simulation Test of the Joint Tactical Data Link System Using the Linux Container Environment (LXC 환경을 이용한 한국형 합동 전술데이터링크체계의 소프트웨어 모의시험에 관한 연구)

  • Hyeong-Seok Ham;Young-Hoon Goo;Dae-Young Song
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1125-1132
    • /
    • 2023
  • The importance of networks is gradually expanding in the battlefield environment. As time goes by, the types of tactical data links used in the Korean JTDLS are increasing, and the military's weapon systems equipped with tactical data link systems are increasing. Thorough quality verification is required to provide stable software to the wider battlefield. This study examines how to prepare an environment in which various simulation tests to verify the stability of the Korean JTDLS project can be conducted as diverse as possible using minimal physical space and Hardware resources. Through this, it is possible to improve the completeness of the project and secure the stability of the program, and it is intended to contribute to securing higher stability and reliability by securing maximum test capabilities in a limited test environment even in Linux based system project of a similar environment.

Unsupervised Learning-Based Threat Detection System Using Radio Frequency Signal Characteristic Data (무선 주파수 신호 특성 데이터를 사용한 비지도 학습 기반의 위협 탐지 시스템)

  • Dae-kyeong Park;Woo-jin Lee;Byeong-jin Kim;Jae-yeon Lee
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.147-155
    • /
    • 2024
  • Currently, the 4th Industrial Revolution, like other revolutions, is bringing great change and new life to humanity, and in particular, the demand for and use of drones, which can be applied by combining various technologies such as big data, artificial intelligence, and information and communications technology, is increasing. Recently, it has been widely used to carry out dangerous military operations and missions, such as the Russia-Ukraine war and North Korea's reconnaissance against South Korea, and as the demand for and use of drones increases, concerns about the safety and security of drones are growing. Currently, a variety of research is being conducted, such as detection of wireless communication abnormalities and sensor data abnormalities related to drones, but research on real-time detection of threats using radio frequency characteristic data is insufficient. Therefore, in this paper, we conduct a study to determine whether the characteristic data is normal or abnormal signal data by collecting radio frequency signal characteristic data generated while the drone communicates with the ground control system while performing a mission in a HITL(Hardware In The Loop) simulation environment similar to the real environment. proceeded. In addition, we propose an unsupervised learning-based threat detection system and optimal threshold that can detect threat signals in real time while a drone is performing a mission.

Generation of the Battlefield in Distributed Simulation System Based on Synthetic Environment Representation and Interchange Standard (SEDRIS) (분산 시뮬레이션 시스템에서 합성 환경 표현 및 교환 표준(SEDRIS) 기반의 전장 환경 구축)

  • Hwam, Won Kyoung;Kim, Jung-Hoon;Na, Young-Nam;Cheon, Sang Uk;Park, Sang C.
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.3
    • /
    • pp.253-263
    • /
    • 2012
  • Presented in the paper is a methodology for the distributed simulation of underwater warfare based on standard synthetic environment. In the case of underwater warfare simulation, it is very important to reflect environmental data, such as salinity and temperature. For the reusability and interoperability of environmental data, this paper adopts Synthetic Environmental Data Representation and Interchange Specification (SEDRIS(ISO standard for environmental data)). Although SEDRIS provides various merits as an international standard, applying of SEDRIS has been hindered by its broadness and heaviness. To relieve the difficulties, this paper proposes an efficient procedure to utilize SEDRIS technology for the atmosphere and underwater environment. This paper identifies SEDRIS structure for the atmosphere/underwater structured dimensional grid-based and implements the proposed procedure on the High Level Architecture (HLA) / Run-Time Infrastructure (RTI) to explain the generation of the battlefield in a distributed simulation system.

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.