• Title/Summary/Keyword: Battlefield Information

Search Result 186, Processing Time 0.024 seconds

Context-aware Framework for Battlefield Surveillance Sensor Network System (전장감시 센서네트워크 시스템을 위한 상황인식 프레임워크)

  • Heo, Lyong;Jin, Byeong Woon;Park, Seong Seung;Jeon, Seo In;Shon, Ho Sun;Ryu, Keun Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.117-119
    • /
    • 2010
  • 미래 전쟁은 과거의 재래식 전쟁과는 판이하게 변화된 환경 속에서 새로운 전투 형태와 방법으로 전개될 것이다. 특히, 첨단 기술의 급속한 발전은 전장에서 싸우는 방법을 변화시키는 주요 요인이라고 할 수 있다. 전장에서 적을 먼저 발견하고 타격하기 위해서는 실시간 표적 획득 및 첩보 수집과 정확한 상황판단 및 적시적인 지휘가 요구되기 때문에 정보 수집 자산이 부족한 사 여단급 부대를 대상으로 감시 정찰 센서 네트워크 시스템을 구축하는 것이 필요하다. 그러나 평시 체계와 전시 체계의 운용 개념이 부족한 상태에서 실 세계에 적용하는 것은 유지비용의 증가, 감지 오류, 야전 환경과의 부적합 등을 야기한다. 따라서, 이러한 문제점의 해결 대안으로 이 논문에서는 지상군 작전에서 적의 조기 발견과 전장 가시화에 필요한 전장감시 센서 네트워크 시스템을 위한 상황 인식 프레임 워크를 제안하였다.

Preemptive Failure Detection using Contamination-Based Stacking Ensemble in Missiles

  • Seong-Mok Kim;Ye-Eun Jeong;Yong Soo Kim;Youn-Ho Lee;Seung Young Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.5
    • /
    • pp.1301-1316
    • /
    • 2024
  • In modern warfare, missiles play a pivotal role but typically spend the majority of their lifecycle in long-term storage or standby mode, making it difficult to detect failures. Preemptive detection of missiles that will fail is crucial to preventing severe consequences, including safety hazards and mission failures. This study proposes a contamination-based stacking ensemble model, employing the local outlier factor (LOF), to detect such missiles. The proposed model creates multiple base LOF models with different contamination values and combines their anomaly scores to achieve a robust anomaly detection. A comparative performance analysis was conducted between the proposed model and the traditional single LOF model, using production-related inspection data from missiles deployed in the military. The experimental results showed that, with the contamination parameter set to 0.1, the proposed model exhibited an increase of approximately 22 percentage points in accuracy and 71 percentage points in F1-score compared to the single LOF model. This approach enables the preemptive identification of potential failures, undetectable through traditional statistical quality control methods. Consequently, it contributes to lower missile failure rates in real battlefield scenarios, leading to significant time and cost savings in the military industry.

A Scalable Video Coding(SVC) and Balanced Selection Algorithm based P2P Streaming Technique for Efficient Military Video Information Transmission (효율적인 국방 영상정보 전송을 위한 확장비디오코딩(SVC) 및 균형선택 알고리즘 기반의 피투피(P2P) 비디오 스트리밍 기법 연구)

  • Shin, Kyuyong;Kim, Kyoung Min;Lee, Jongkwan
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.87-96
    • /
    • 2019
  • Recently, with the rapid development of video equipment and technology, tremendous video information is produced and utilized in military domain to acquire battlefield information or for effective command control. Note that the video playback devices currently used in the military domain ranges from low-performance tactical multi-functional terminals (TMFT) to high-performance video servers and the networks where the video information is transmitted also range from the low speed tactical information and communication network (TICN) to ultra-high speed defense broadband converged networks such as M-BcN. Therefore, there is a need for an efficient streaming technique that can efficiently transmit defense video information in heterogeneous communication equipment and network environments. To solve the problem, this paper proposes a Scalable Video Coding (SVC) and balanced selection algorithm based Peer-to-Peer (P2P) streaming technique and the feasibility of the proposed technique is verified by simulations. The simulation results based on our BitTorrent simulator show that the proposed balanced selection scheme outperforms the sequential or rarest selection algorithm.

An Algorithm for evaluating Combat Power Effectiveness by considering the Influence of Human Factors (인적요소의 영향력을 고려한 전투효과 평가 알고리즘)

  • Kwon, Oh-Sang;Park, Gun-Woo;Lee, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.1
    • /
    • pp.201-210
    • /
    • 2011
  • Each area of society has changed because of the development of information technology. Especially, the advent of NCW based on the technology of network has become a new paradigm for executing warfare. Effectiveness of NCW can be maximized by building the C4I system which is a core system of NCW. However, if we don't consider the influence in term of human dimension, we can't expect the effect of C4I system, since the key factor in C4I is human. In this paper, we propose an algorithm for evaluating Combat Power Effectiveness by considering the Influence of Human Factors that wasn't reflected in the past. Based on experimental validation our algorithm is more substantial than baseline algorithms. In addition, we proved that the Influence of Human Factors(e.g. collaboration) is the most important in battlefield. Therefore, proposed algorithm can be used for enhancing not only mission effectiveness in terms of military field but also work performance by effective Human Resource Management in terms of an enterprise.

A Proposal on Cryptographic Synchronization for T4 Link Encryption (T4급 링크 암호에 적합한 암호 동기방식 제안)

  • Lee, HoonJae;Kim, KiHwan;Kang, YongJin;Lee, Sang-Gon;Ryu, Young-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.202-210
    • /
    • 2018
  • The modern battlefield is being developed as a network-centric warfare where priority is given to rapid status grasp and power deployment through scientification and modernization. Therefore, tactical data link has been continuously improving the network speed, and recently, security technology is required for wireless communication with the UAV and various devices for reconnaissance. In addition, the future information warfare will utilize advanced IT technology positively. Efforts are needed to integrate various systems and networks. However, these efforts are meaningful only when they can assume sufficient security in a newly changing information and communication environment. In this paper, we propose a new cryptographic synchronization for link encryption suitable for tactical data links. The proposed cryptographic synchronization is useful for T4 UAV link encryption, and it is also adaptable for lower BER, then we analyze the performances analysis of that.

UAV Path Planning for ISR Mission and Survivability (무인항공기의 생존성을 고려한 감시정찰 임무 경로 계획)

  • Bae, Min-Ji
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.7
    • /
    • pp.211-217
    • /
    • 2019
  • In an complicated battlefield environment, information from enemy's camp is an important factor in carrying out military operations. For obtaining this information, the number of UAVs that can be deployed to the mission without our forces' loss and at low cost is increasing. Because the mission environment has anti-aircraft weapons, mission space is needed for UAV to guarantee survivability without being killed. The concept of Configuration Space is used to define the mission space considering with range of weapons and detect range of UAV. UAV must visit whole given area to obtain the information and perform Coverage Path Planning for this. Based on threats to UAV and importance of information that will be obtained, area that UAV should visit first is defined. Grid Map is generated and mapping threat information to each grid for UAV path planning. On this study, coverage conditions and path planning procedures are presented based on the threat information on Grid Map, and mission space is expanded to improve detection efficiency. Finally, simulations are performed, and results are presented using the suggested UAV path planning method in this study.

Analysis of an Effective Network of Information Delivery for Supporting Kill Chain in the Joint Battlefield Environment (합동전장 환경에서 효과적인 Kill Chain 지원을 위한 표적정보전달 네트워크 분석)

  • Lee, Chul-Hwa;Lee, Jong-Kwan;Goo, Ja-Youl;Lim, Jea-Sung
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.1
    • /
    • pp.11-23
    • /
    • 2014
  • Kill Chain is getting attention due to North Korea's recent nuclear test and missile launches and has emerged the need for an early build up. In order to build a materialized kill chain, you should review the unique kill chain to support operations effectively using various sensors and striking weapon system. Especially, you need a suitable network to reduce a reaction time against the enemy attack under joint operations environment etc. Currently there are many communication ways(e.g. data link, voice, video and text message) used in operations through satellite, wired and wireless and so on. Now, this paper contains analysis on various means for target information exchange which are used in the kill chain. And appropriate network of the kill chain for target information transmission is addressed to confirm feasibility of its alternatives, which is developed using AHP(Analytic Hierarchy Process). Finally, this paper is suggesting network and means of its building up for target information transmission of kill chain which can be implemented under the situation of joint battle field.

The Extended-Military Multimedia Systems Based on Real-Time Scheduling Scheme (실시간 스케줄링을 적용한 Extended-Military Multimedia Systems)

  • Park, Sang-Hyuk;Kim, Jai-Hoon;Han, Chang-Hee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.1
    • /
    • pp.26-32
    • /
    • 2011
  • It is very important for more effective military operation to share information required in recognizing a situation by monitoring battlefield. The recognition of situations is offered visually though multi-media systems such as a COP(Common Operation Picture), UAV etc. The operating method has rapidly changed into Network-Centric Warfare (NCW). As a result, the data that these Multimedia systems should control is increasing. Improved performance of Multimedia systems is required to deal with them. In this paper, we propose Extended-Military Multimedia System(E-MMS) applying the most excellent scheduling method in terms of meet-ratio in real time when Multimedia systems carry out assigned information in real time for monitoring as the method of improved performance. As a result of utility about proposed system, it is verified that realtime EDF(Earliest Deadline First) scheduling method is more improved up to 20% compared to non-realtime FCFS(First Come First Service) in terms of the deadline meet ratio.

Adjacent Matrix-based Hole Coverage Discovery Technique for Sensor Networks

  • Wu, Mary
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.4
    • /
    • pp.169-176
    • /
    • 2019
  • Wireless sensor networks are used to monitor and control areas in a variety of military and civilian areas such as battlefield surveillance, intrusion detection, disaster recovery, biological detection, and environmental monitoring. Since the sensor nodes are randomly placed in the area of interest, separation of the sensor network area may occur due to environmental obstacles or a sensor may not exist in some areas. Also, in the situation where the sensor node is placed in a non-relocatable place, some node may exhaust energy or physical hole of the sensor node may cause coverage hole. Coverage holes can affect the performance of the entire sensor network, such as reducing data reliability, changing network topologies, disconnecting data links, and degrading transmission load. It is possible to solve the problem that occurs in the coverage hole by finding a coverage hole in the sensor network and further arranging a new sensor node in the detected coverage hole. The existing coverage hole detection technique is based on the location of the sensor node, but it is inefficient to mount the GPS on the sensor node having limited resources, and performing other location information processing causes a lot of message transmission overhead. In this paper, we propose an Adjacent Matrix-based Hole Coverage Discovery(AMHCD) scheme based on connectivity of neighboring nodes. The method searches for whether the connectivity of the neighboring nodes constitutes a closed shape based on the adjacent matrix, and determines whether the node is an internal node or a boundary node. Therefore, the message overhead for the location information strokes does not occur and can be applied irrespective of the position information error.

A Study on the Strategy for Improvement of Operational Test and Evaluation of Weapon System and the Determination of Priority (무기체계 운용시험평가 개선전략 도출 및 우선순위 결정)

  • Lee, Kang Kyong;Kim, Geum Ryul;Yoon, Sang Don;Seol, Hyeon Ju
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.177-189
    • /
    • 2021
  • Defense R&D is a key process for securing weapons systems determined by mid- and long-term needs to cope with changing future battlefield environments. In particular, the test and evaluation provides information necessary to determine whether or not to switch to mass production as the last gateway to research and development of weapons systems and plays an important role in ensuring performance linked to the life cycle of weapons systems. Meanwhile, if you look at the recent changes in the operational environment of the Korean Peninsula and the defense acquisition environment, you can see three main characteristics. First of all, continuous safety accidents occurred during the operation of the weapon system, which increased social interest in the safety of combatants, and the efficient execution of the limited defense budget is required as acquisition costs increase. In addition, strategic approaches are needed to respond to future battlefield environments such as robots, autonomous weapons systems (RAS), and cyber security test and evaluation. Therefore, in this study, we would like to present strategies for improving the testing and evaluation of weapons systems by considering the characteristics of the security environment that has changed recently. To this end, the improvement strategy was derived by analyzing the complementary elements of the current weapon system operational test and evaluation system in a multi-dimensional model and prioritized through the hierarchical analysis method (AHP).