• Title/Summary/Keyword: Battlefield Simulation

Search Result 78, Processing Time 0.027 seconds

The Real-Time Constructive Simulation With the RM scheduling and Lock-free Shared Objects (RM 스케쥴링과 Lock-Free 공유개체에 의한 실시간 시뮬레이션)

  • 박현규
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.519-522
    • /
    • 1998
  • The Constructive Battle simulation Model is very important to the recent military training for the substitution of the field training. However, real battlefield systems operate under rea-time conditions, they are inherently distributed, concurrent and dynamic. In order to reflect these properties by the computer-based simulation systems which represent real world processes, we have been developing constructive simulation model for several years. The constructive simulation system is one of the famous real-time system software, nd the one common feature of all real-time systems is defined as the correctness of the system depend not only on the logical result of computation, but also on the time at which the results are produced. Conventionally, scheduling and resource allocation activities which have timing constraints are major problem of real-time computing systems. To overcome these constraints, we elaborated on these issues and developed the simulation system on commercially available hardware and operating system with lock-free resource allocation scheme and rae monotonic scheduling.

  • PDF

Study on Korean Variable Message Format Construction for Battlefield Visualization (전장가시화를 위한 한국형 지상전술데이터링크 구축 연구)

  • Kim, Seung-Chun;Lee, Hyung-Keun
    • Journal of IKEEE
    • /
    • v.15 no.1
    • /
    • pp.104-112
    • /
    • 2011
  • During the ground operation of Korean army, the voice message is mainly used for exchanging informations related to the surveillance and reconnaissance, command and control, and precision strike. However, in order to the battlefield visualization among fighting powers participating in the ground force operation, automatic situational awareness and variable message format (VMF) for command and control are required. For securing core technologies necessary for the battlefield visualization, message standard and message handler are established through several applied researches. Besides, the VMF for equipping a weapon system is in development. In this paper, a study on the Korean variable message format (KVMF), where interoperability of integrated battle management system (BMS) is guaranteed due to performing joint, ground, and combined operations so that the situation awareness and strike system can be automated in almost real time, is presented. From the modeling and simulation (M&S) results of the message processor, delay time is varied in accordance with the number of nodes in unit platoon network, message length, and generation interval of routine messages. Therefore, it is shown that the system performance can be optimized by establishing proper network protocol for each situation.

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.

Random Forest Method and Simulation-based Effect Analysis for Real-time Target Re-designation in Missile Flight (유도탄의 실시간 표적 재지정을 위한 랜덤 포레스트 기법과 시뮬레이션 기반 효과 분석)

  • Lee, Han-Kang;Jang, Jae-Yeon;Ahn, Jae-Min;Kim, Chang-Ouk
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.2
    • /
    • pp.35-48
    • /
    • 2018
  • The study of air defense against North Korean tactical ballistic missiles (TBM) should consider the rapidly changing battlefield environment. The study for target re-designation for intercept missiles enables effective operation of friendly defensive assets as well as responses to dynamic battlefield. The researches that have been conducted so far do not represent real-time dynamic battlefield situation because the hit probability for the TBM, which plays an important role in the decision making process, is fixed. Therefore, this study proposes a target re-designation algorithm that makes decision based on hit probability which considers real-time field environment. The proposed method contains a trajectory prediction model that predicts the expected trajectory of the TBM from the current position and velocity information by using random forest and moving window. The predicted hit probability can be calculated through the trajectory prediction model and the simulator of the intercept missile, and the calculated hit probability becomes the decision criterion of the target re-designation algorithm for the missile. In the experiment, the validity of the methodology used in the TBM trajectory prediction model was verified and the superiority of using the hit probability through the proposed model in the target re-designation decision making process was validated.

A Study on Simulation-Based Worm Damage Assessment on ATCIS (시뮬레이션 기반 육군전술지휘정보체계 웜 피해평가에 관한 연구)

  • Kim, Ki-Hwan;Kim, Wan-Ju;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.1
    • /
    • pp.43-50
    • /
    • 2008
  • The army developed the ATCIS(Army Tactical Command Information System) for the battlefield information system with share the command control information through the realtime. The using the public key and the encryption equipment in the ATCIS is enough to the confidentiality, integrity. But, it is vulnerable about the availability with the zero day attack. In this paper, we implement the worm propagation simulation on the ATCIS infrastructure through the modelling on the ATCIS operation environment. We propose the countermeasures based on the results from the simulation.

Combat Effectiveness Based Analysis Methodology for Optimal Requirement of Attack Helicopter Using Simulation (시뮬레이션을 이용한 전투효과기반 공격헬기 소요 분석방안)

  • Jung, Chi-Young;Lee, Jae-Yeong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.6
    • /
    • pp.1099-1105
    • /
    • 2010
  • The purpose of this paper is to propose a methodology that can estimate optimal requirement of attack helicopter Korea army will be operating in future. For estimating optimal requirement, attack helicopter's operation concept, performance, battlefield environment and enemy threat are considered. We use a wargame model, AAsim(Army Aviation simulation), as a analytic simulation model which is used to analyze DOTMLPF and operation in army aviation field. In this paper, we conduct battle experiment for anti armored corps operation which reflects attack helicopter's combat effectiveness very well. As a result of simulation, the destructive rate for enemy armored corps per each attack helicopter can be calculated. In this paper, we propose optimal requirement of attack helicopter using that destructive rate for enemy armored corps.

The Design of Integrated Flying Vehicle Model for Engagement Analyses of Missiles

  • Ha, Sue Hyung
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.8
    • /
    • pp.930-939
    • /
    • 2019
  • High-Level Architecture(HLA)/Run-Time Infrastructure(RTI) are standards for distributed simulation systems and offer a technology to interconnect them and form one single simulation system. In defense domain, M&S is the only way to prove effectiveness of weapon systems except for Live Fire Testing (LFT). This paper focuses on guided missile simulations in weapon systems for engagement analyses and proposes the integrated flying vehicle model that is based on HLA/RTI. There are a lot of missiles in real world; therefore, we should develop each missile models in M&S in order to apply battlefield scenarios. To deal with the difficulties, in this paper, firstly, I classify these missiles into three models: ballastic, cruise, and surface-to-air missile models, and then I design each missile model and integrates them into a single model. This paper also offers a case study with my integrated flying vehicle model. At the conclusion, this paper presents contributions of this paper.

Unsupervised Learning-Based Threat Detection System Using Radio Frequency Signal Characteristic Data (무선 주파수 신호 특성 데이터를 사용한 비지도 학습 기반의 위협 탐지 시스템)

  • Dae-kyeong Park;Woo-jin Lee;Byeong-jin Kim;Jae-yeon Lee
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.147-155
    • /
    • 2024
  • Currently, the 4th Industrial Revolution, like other revolutions, is bringing great change and new life to humanity, and in particular, the demand for and use of drones, which can be applied by combining various technologies such as big data, artificial intelligence, and information and communications technology, is increasing. Recently, it has been widely used to carry out dangerous military operations and missions, such as the Russia-Ukraine war and North Korea's reconnaissance against South Korea, and as the demand for and use of drones increases, concerns about the safety and security of drones are growing. Currently, a variety of research is being conducted, such as detection of wireless communication abnormalities and sensor data abnormalities related to drones, but research on real-time detection of threats using radio frequency characteristic data is insufficient. Therefore, in this paper, we conduct a study to determine whether the characteristic data is normal or abnormal signal data by collecting radio frequency signal characteristic data generated while the drone communicates with the ground control system while performing a mission in a HITL(Hardware In The Loop) simulation environment similar to the real environment. proceeded. In addition, we propose an unsupervised learning-based threat detection system and optimal threshold that can detect threat signals in real time while a drone is performing a mission.

A Study on the Software Simulation Test of the Joint Tactical Data Link System Using the Linux Container Environment (LXC 환경을 이용한 한국형 합동 전술데이터링크체계의 소프트웨어 모의시험에 관한 연구)

  • Hyeong-Seok Ham;Young-Hoon Goo;Dae-Young Song
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1125-1132
    • /
    • 2023
  • The importance of networks is gradually expanding in the battlefield environment. As time goes by, the types of tactical data links used in the Korean JTDLS are increasing, and the military's weapon systems equipped with tactical data link systems are increasing. Thorough quality verification is required to provide stable software to the wider battlefield. This study examines how to prepare an environment in which various simulation tests to verify the stability of the Korean JTDLS project can be conducted as diverse as possible using minimal physical space and Hardware resources. Through this, it is possible to improve the completeness of the project and secure the stability of the program, and it is intended to contribute to securing higher stability and reliability by securing maximum test capabilities in a limited test environment even in Linux based system project of a similar environment.

A Study on Simulation of Future Ground System Effectiveness Analysis Model with Communication Effects (통신효과를 고려한 미래지상체계 효과분석 시뮬레이션에 대한 연구)

  • Shin, Sunwoo;Lee, Jaeyeong;Bae, Sungmin;Kim, Chongman
    • Journal of Applied Reliability
    • /
    • v.17 no.2
    • /
    • pp.168-180
    • /
    • 2017
  • Purpose: In this research, we develop an effectiveness analysis simulation model using Agent Based Modeling with Communication Effects for the development of a new weapon system. Methods: To describe the future battlefield that has more complexity, we develop Agent Based Modeling to describe communication Effects. We use the communication theory (Path-Loss Model) and the real map. Results: We have compared simulation model with real map and simulation model without real map. The Blue Survival Ratio of simulation model with real map is worse than one without real map since the performance of communication gets lower. Conclusion: There are many studies about the effectiveness analysis of a weapon system. Most of previous researches assumed no communication error. In the real world, however, it's not appropriate assumption. Therefore, this study considers the communication error and shows that it is important factor in the effectiveness analysis.