• 제목/요약/키워드: Enemy Forces

Search Result 61, Processing Time 0.023 seconds

Case study of detection and maneuvering performance of naval ships using engagement simulation of engineering level

  • Jeong, Dong-Hoon;Roh, Myung-Il;Ham, Seung-Ho
    • Ocean Systems Engineering
    • /
    • v.7 no.3
    • /
    • pp.247-273
    • /
    • 2017
  • Many different engagement situations require naval ships to achieve some level of effectiveness. The performance of the naval ships is very important for such effectiveness. There have been many studies that analyze the effectiveness and the performance. The former are largely related to engagement level simulations, while the latter are largely related to engineering level simulations. However, there have been few studies that consider both the engagement level and the engineering level at the same time. Therefore, this study presents three case studies using engagement simulation of the engineering level to check the performance of the related parameters. First, detection performance simulations are carried out by changing the specifications of the passive sonars of a submarine in different scenarios. Maneuvering performance simulations are carried out by changing the specification of the hydroplanes of a submarine in different scenarios. Lastly, in order to check whether or not our forces would succeed in attacking enemy forces, we perform an engagement simulation with various naval ship models that consist of several engineering level models, such as command systems, weapon systems, detection systems, and maneuver systems. As a result, the performance according to the specifications of the naval ships and weapons is evaluated.

Study of Estimation Model for Wartime Stockpile Requirement of Intelligent Ammunition against Enemy Armored Vehicles (장갑차량 공격용 지능형 포탄의 전시 소요량 산정 모형에 관한 연구)

  • Cho, Hong-Yong;Chung, Byeong-Hee
    • Journal of the military operations research society of Korea
    • /
    • v.34 no.2
    • /
    • pp.143-162
    • /
    • 2008
  • This paper aims to formulate the method of estimating the wartime stockpile requirement of 155mm self-propelled artillery including intelligent ammunition for armored vehicles, currently being developed. The usual method of utilizing war-game simulation results in considerable margins in expected occupancy ratio between ground forces and air forces for each weapon system for armored vehicles. Also, the method tends to produce excessive output greater than the minimal stockpile requirements; therefore, the study aims to overcome limitations like these by the allocation method for each weapon system according to targets. This allocation method is better than war-game simulation method.

Net Assessment-Based Study to Determine the Optimal Size of the ROK Military's Standing Force (총괄평가 개념의 한국군 적정 상비병력 산출 방안 연구)

  • Jeong-Hyuck Kim;Myoungjin Choi
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.4
    • /
    • pp.272-280
    • /
    • 2023
  • For the past 70 years, an intense rivalry has persisted on the Korean Peninsula, and North Korea's nuclear and missile threats are becoming increasingly imminent. Facing a shortage of military resources, South Korea has pursued a national defense reform, significantly reducing the number of units and troops while focusing on ground forces. However, North Korea's strategic objective of unifying South Korea through surprise attacks, prompt responses, and combined nuclear and missile assaults remains unchanged. The central issue in this context revolves around determining the appropriate size of the Korean military's standing forces. This study employs the concept of net assessment as a novel method to ascertain the optimal size of the Korean military. Threats, strategic objectives, doctrine, and unit rotations are simultaneously considered from the enemy's perspective. In anticipation of security risks on the Korean Peninsula, an acceptable troop size will be proposed using the net assessment approach to calculate the appropriate standing force size.

Opportunistic Data Relay Scheme for Narrowband Multihop Combat Radio Networks (협대역 다중홉 전투무선망에서 기회적 데이터 중계 기법)

  • Lee, Jongkwan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.1
    • /
    • pp.65-71
    • /
    • 2022
  • In this paper, we propose an opportunistic data relay scheme in narrowband multihop combat radio networks. Narrowband networks have physical restrictions on high-speed transmission. Furthermore, the topology changes dynamically due to the jamming of the enemy, signal interference between friendly forces, and movement of network entities. Therefore, the traditional relay scheme that collects topology information and calculates a relay path before transmission is unsuitable for such networks. Our proposed scheme does not collect topology information and transmits data opportunistically. The scheme can cause unnecessary data relaying that is not related to data delivery to the destination node. However, for small networks, the effect of increasing network throughput by not gathering topology information is much greater than the effect of reducing throughput by unnecessary data relays. We demonstrate the performance superiority of the proposed scheme through simulation in the worst case of network topology.

US Navy's Current Status and Prospects in Trump's Era (트럼프 시대 미국 해군력 현황과 전망)

  • Lee, Choon-Keun
    • Strategy21
    • /
    • s.41
    • /
    • pp.5-29
    • /
    • 2017
  • The Mahan's seapower theory has been the basis of US Navy to date as it can enjoy the supremacy status in all of the seas of the world. His theory is very straightforward. A nation can be a great country in the world just through the use of maritime commerce that could be protected by a strong and powerful navy. Mahan's theory on seapower was substantiated in the Spanish-American War with respect to how important the naval power is. The best thing to make US a great nation was to make sure that flow of international trade is smooth, and the unhindered trade could be made possible only by the destruction of enemy's fleet that may obstruct the SLOCs. That's why Mahan insisted that a strong navy was needed and a decisive battle by the navy's fleet at sea should be encouraged as a way of ensuring the safety of the SLOCs. The newly-arrived Trump administration seems to be in line with the Mahan's theory seapower in its policy on naval forces structure. It is expected that US will continue to support the Pivot to Asia policy that has been adopted by the previous administration through an increase in its naval fleet forces. The number of US navy ships will be 355 in 2030, rendering it much more powerful navy than before. The catch phrase "3rd Fleet Forward" proposed by the president Trump indicates that two carrier strike groups will be present in the Asia Pacific region, being able to make the confrontation between US and China more tense than before. The presence of the US naval forces in the area may function as some sort of pressure against China that Trump insisted had been responsible for the closure of 60,000 factories and the loss of 3,000,000 jobs in the United States.

A Study on the countermeasures and drones's threats in Military security (군보안상 드론위협과 대응방안)

  • Kim, Doo-hwan;Lee, Youn-hwan
    • Journal of Digital Convergence
    • /
    • v.16 no.10
    • /
    • pp.223-233
    • /
    • 2018
  • The forces to protect people's life and property against the enemy attack is an organization which is regulated by the constitutional law. In terms of nature, its security is a significant factor to determine success or failure for the war. However, recently the 4th industrial revolution represents the rapid change in the advancement of civilization and technology. It can influence on the environment of military security which can make various changes. Unless taking proper action againsty these changes, it can inflict a vital harm for the organization of forces and its internal security. In this aspect, this study discuss new threats of the military security, above all, the most technical improvements and harms for the drones in terms of security. In addition, the advantages and disadvantages of drones which can influence on the ragions of military command and control, information operations, maneuvers, firepower, operation sustainment supports are analyzed. Moreover, this study set the purpose of developmental security measure for security threats in the aspects of military security.

Information Acquisition of Simulation Objects by Resolution in Multi-resolution Model based War Game (다중 해상도 모델 기반 워게임 체계에서 해상도별 모의 객체의 정보 획득)

  • Bae, Hyun Shik;Rhee, Eun joo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.147-154
    • /
    • 2018
  • In this paper, we propose methods to acquire enemy object information, which is frequently required in multi-resolution model based war game and affects the simulation performance. In the information request method, a multi-resolution model selects information of a specific resolution and provides them to external objects. In the information announcement method, a multi-resolution model announces all information, and external objects select information of a specific resolution. In the information sharing method, external objects obtains information of a specific resolution by inquiring all information of a multi-resolution model which are stored in a shared space. Simulation results show that the information sharing method is more efficient than the information request method and the information announcement method because the information acquisition is fast. In addition, the proposed methods will increase the efficiency of war game operation by shortening the time for acquiring enemy forces' information.

A Study on the Possibility of Damage by Anti-aircraft Debris between the Response of Unmanned Aircraft (무인기 대응 간 대공무기 파편에 의한 피해 가능성 연구)

  • Kim, Sea Ill;Shin, Jin
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.3
    • /
    • pp.1-8
    • /
    • 2020
  • When enemy drones infiltrate large urban areas, various forms of great republics are deployed in large areas to respond. Due to the characteristics of a large number of government-run aircraft, the residual coal, other than the hit bullet, falls into various sizes of debris after its own explosion. The damage rate was analyzed by dividing the debris into anti-aircraft guns and guided weapons by deriving four factors: critical speed, fragmentation mass, initial speed of debris, and object collision speed, which can cause damage to human life as the debris falls to the ground. In the future, the North is expected to infiltrate the capital city of Seoul by operating unmanned aerial vehicles, which are asymmetric forces, and the damage could be minimized by setting up pre-fatal and fire-restricted zones to minimize casualties between responses.

A Study for Autonomous Intelligence of Computer-Generated Forces (가상군(Computer-Generated Forces)의 자율지능화 방안 연구)

  • Han, Chang-Hee;Cho, Jun-Ho;Lee, Sung-Ki
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.1
    • /
    • pp.69-77
    • /
    • 2011
  • Modeling and Simulation(M&S) technology gets an attention from various parts such as industry and military. Especially, military uses the technology to cope with a different situation from the one in the Cold War and maximize the effect of training against the cost in the new environment. In order for the training based on M&S technology to be effective, the situations of a battlefield and a combat must be more realistically simulated. For this, a technique development on Computer-Generated Forces(CGF) which represents a unit's simulation logic and a human's simulated behaviors is focused. The CGF simulating a human's behaviors can be used in representing an enemy force, experimenting behaviors in a future war, and developing a new combat idea. This paper describes a methodology to accomplish Computer-Generated Forces' autonomous intelligence. It explains the process of applying a task behavior list based on the METT+T element onto CGFs. On the other hand, in the domain knowledge of military field manual, fuzzy facts such as "fast" and "sufficient" whose real values should be decided by domain experts can be easily found. In order to efficiently implement military simulation logics involved with such subjectivity, using a fuzzy inference methodology can be effective. In this study, a fuzzy inference methodology is also applied.

The Korean Peninsula security and Military Strategy of USA and China (미.중의 군사전략과 한반도 안보)

  • Son, Do-Sim
    • Journal of National Security and Military Science
    • /
    • s.4
    • /
    • pp.289-350
    • /
    • 2006
  • The world has been rapidly restructured in an agenda of national security from center of military strength to that of economic strength since the post cold-war era China military leadership-division carried out RMA through learning of a lesson from Gulf war in 1990 -1991 and Iraq war in 2003, thus the leadership-division made an attempt to convert the military system to a technical intensive system. The principle based on RMA of China military is (National defense strategy) drafted by the central military committee 1985 and (Four modernization general principles) 1978. China has introduced Russian high-technological arms and equipment in order to build up the military arms greatly thanks to an economical development, and they take pragmatism line as chinese socialism with their strategy to make secure a position as military powers such as they successfully launched a manned spacecraft and are building an air-craft carrie and soon. USA has a theory of dichotomy whether a country is a cooperator for USA, or not. and also enemy or friend since 9.11terror, thus USA is different from their direction of police. This is because USA stands a position as the superpower of the supremacy hegemony of the world. We must be carefully aware that USA considers as important area for Middle east, West south Asia, Central Asia and Northwest Asia to meet the demands of 2lcentury. Accordingly, the focus of USA's military strategy will be probably concentrated at the above mentioned four areas. On the other hand, USA enjoys such a superpower position due to collapse of USSR which was the past main enemy since the post cold war era. We could give an conclusive example as fact that USA has recurred to unilateralism But USA carry on the military operations to the terror groups at global around by converting thje military strike strategy to pre-emptive strike strategy since9.11 terror, 2001. USA seeks for transformation to the mobile military forces with light-quantity oriented in order to carry on such the military operations and makes progress GPR, And the USA forces in Korea makes progress a military renovation as part of such a military strategy. On the other hand, USA promotes the measures of choose for the countries standing at the crossroads of strategy and carries forward a main scheme of provision for four priority aims that the leaders of a hostile country and mis-country shall be prohibited from use and obtainment of weapons of mass destruction. Accordingly, this treatise found out a significant meaning to have an effect on the national security in the korean peninsula.

  • PDF