• Title/Summary/Keyword: Enemy Information

Search Result 172, Processing Time 0.022 seconds

An Implementation of Target Information Management and its Sharing Process among Ground Fighting Vehicles (지상전투차량에서 표적정보 처리 및 공유 방안 구현)

  • Choi, Il-Ho;No, Hae-Whan;Son, Won-Kee
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.1
    • /
    • pp.66-75
    • /
    • 2020
  • Enemy information has significant value when it comes to the process of military actions in battle field. Our Army now uses Battlefield Management Systems(BMSs) equipped in Ground Fighting Vehicles(GFVs) and we need to make research on what kind of role enemy information can play in such systems. Also, enemy information can be shared among GFVs and target information shall be extracted from it in view of KVMF scheme. Because KVMF becomes requisite standard in modern BMSs, we need to implement target information handling process in KVMF standard. In this article, we will focus on how target information and its sharing process can be managed efficiently without information conflicts. Also, situation map produced by it will be noted.

Source Information Estimation Using Enemy's Single-Ping and Underwater Geographic Information in Non-Cooperative Bistatic Sonar (비협동 양상태 소나에서 적함 송신기의 단일 능동 신호와 해저 지형 정보를 이용한 송신기 정보 추정)

  • Lee, Dong-Hwa;Nam, Jong-Geun;Jung, Tae-Jin;Lee, Kyun-Kyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.2
    • /
    • pp.196-203
    • /
    • 2010
  • The bistatic sonar operations using a spatially-separated source and receiver are classified into cooperative and non-cooperative operations. In the cooperative operation, an active signal of a friendly ship is used and the source information is known previously. In the non-cooperative operation, an active signal of the enemy is used and it is difficult to find out the source information. The source information consists of the range, speed, course and frequency of the source. It gives advantage to operating bistatic sonar. This paper suggests a method of estimating the source information with geographic information in the sea and the single-ping of the enemy. The source range is given using one geographic point. And the source speed, course and the frequency of the enemy's source signal are given using two geographic points. Finally, the validity of the scheme is confirmed through a simulation study.

Dynamics of Heterogeneous Warfare

  • Park, Kyung-Soo
    • Journal of the Korean Statistical Society
    • /
    • v.6 no.1
    • /
    • pp.65-76
    • /
    • 1977
  • The relative importance of single-shot kill probabilities, rates of fire, weapon allocation strategies, and the size of initial force in warfare between two force with heterogeneous multiple weapon systems are considered by examining their effect on a natural measure of effectiveness, the expected number of survivors. Attrition equations are derived via stochastic formulation to represent the mean course of battle having an underlying probability distribution. It is assumed that each side uses indirect area fires. Level of intelligence activities are reflected in the availability of spontaneous information on the current enemy status. Depending on the availability of the information on the current enemy status, each participatory unit may follow 1) a prescribed attack pattern (fraction of the available units assigned to various enemy targets) or 2) an adaptive attack pattern depending on the enemy status at that time. Conditions for possible stalemate are discussed.

  • PDF

Motion Based Serious Game Using Spatial Information of Game and Web-cam (웹캠과 공간정보를 이용한 체감형 기능성게임)

  • Lee, Young-Jae;Lee, Dae-Ho;Yi, Sang-Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.9
    • /
    • pp.1795-1802
    • /
    • 2009
  • Motion based serious game is a new style of game and exercise using hands, arms, head and whole body. At that time gamer's reachable movement space is an important game space and interaction happening place. We propose efficient game spatial division and analysis algorithm that gives special information for collision avoidance of game objects. We devide into 9 parts of game space and check the enemy position and upper, down, left and right side movement information of gamer and calculate optimal path for collide avoidance of the enemy. To evaluate the method, we implemented a motion base serious game that consists of a web cam, a player, an enemy, and we obtained some valid results of our method for the collision avoidance. The resole demonstrated that the proposed approach is robust. If movement information is in front of enemy, then the enemy waits and finds the place and runs to avoid collision. This algorithm can be used basic development of level control and effective interaction method for motion based serious game.

An Analysis of the Tactical Information Exchange between Unmanned Air Vehicles and Ground Fighting Vehicles (무인기 체계와 지상전투차량 간 전술정보 연동 검토)

  • Choi, Il-Ho;Lim, Kyung-Mee;Baek, In-Cheol
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.6
    • /
    • pp.794-802
    • /
    • 2017
  • Unmanned Aerial Vehicles (UAVs) have been considered as valuable aerial reconnaissance systems and our army wants capability-enhanced UAVs installed in our territory, hoping that the UAVs will provide enemy information in detail. The enemy information acqcuired by UAVs would be shared by our army's legacy systems. In this article, we made a research on the interoperability between UAVs and Ground Fighting Vehicles (GFVs), laying emphasis on what kinds of tactical information could be exchanged by two different weapon systems. Also, it needs to be addressed that their upper-level commanding systems play a significant role in such operation.

A Secure Monitoring Mechanism for Short Distance Wireless Communication (근거리 무선 통신의 안전한 보안 모니터링 기법)

  • Seo, Dae-Hee;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.10C no.3
    • /
    • pp.335-344
    • /
    • 2003
  • In accordance with the changes in the wireless communication environment, there has been a great need to satisfy the demand for diverse modes of information exchange. Various types of short-distance wireless communication technology have been developed and studied to meet this demand. Among them, Bluetooth and WLAN which has recently been acclaimed as the standard for short-distance wireless communication, has been the focus of many such studies. However, Bluetooth and WLAN has weaknesses in its security features when its in real services are applied to m-commerce. The purpose of this study is to propose techniques that affinity considers to item that is non-security enemy who is although there is no public secure division direct connection in peculiar environment of radio environment as well as limitation security enemy of short distance radio communication. Propose secure monitoring techniques for straggling device to user center also applying proposed way to Bluetooth and WLAN that are short distance communication representative technology based on item that is security enemy and item that is rain suity enemy.

Hybrid Feature Selection Method Based on a Naïve Bayes Algorithm that Enhances the Learning Speed while Maintaining a Similar Error Rate in Cyber ISR

  • Shin, GyeongIl;Yooun, Hosang;Shin, DongIl;Shin, DongKyoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5685-5700
    • /
    • 2018
  • Cyber intelligence, surveillance, and reconnaissance (ISR) has become more important than traditional military ISR. An agent used in cyber ISR resides in an enemy's networks and continually collects valuable information. Thus, this agent should be able to determine what is, and is not, useful in a short amount of time. Moreover, the agent should maintain a classification rate that is high enough to select useful data from the enemy's network. Traditional feature selection algorithms cannot comply with these requirements. Consequently, in this paper, we propose an effective hybrid feature selection method derived from the filter and wrapper methods. We illustrate the design of the proposed model and the experimental results of the performance comparison between the proposed model and the existing model.

Development of RAM in Millimeter Wave Range for RF Stealth (RF 스텔스 효과를 위한 밀리미터 RAM 개발)

  • Choi, Chang-Mook;Lim, Bong-Taeck;Ko, Kwang-Soob
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.6
    • /
    • pp.1241-1246
    • /
    • 2009
  • In this paper, stealth technology, which minimizes detection from the enemy, was analyzed and it was confirmed that Most RCS reduction comes from shaping and in specific parts, by applying RAM. Therefore, we designed and manufactured RAM that absorbs 98% of electromagnetic wave at 94 GHz with 17dB of radar absorption property to minimize RCS at milimeter wave range. As a result, we had 62% reduction in the detection range from the enemy by using developed RAM.

Development of RAM in Millimeter Wave Range for RF Stealth (RF 스텔스를 위한 밀리미터 RAM 개발)

  • Choi, Chang-Mook;Lim, Bong-Taeck;Ko, Kwang-Soob
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.555-558
    • /
    • 2009
  • In this paper, stealth technology is investigated with RCS(Radar Cross Section) reduction to minimize detection range of retroreflective echoes from enemy. Most RCS reduction comes from shaping. RAM(Radar Absorbing Materials) are applied only in areas where there are special problems. Therefore, we designed and fabricated a RAM that has absorption ability higher than 17 dB at 94 GHz for RF stealth in millimeter wave range. As a result, detection range of enemy can be reduced in the 62 percent range by using a developed RAM.

  • PDF

On the non-linear combination of the Linear Fedback Shift Register (선형 귀환 쉬프트 레지스터의 비선형적 결합에 관한 연구)

  • Kim, Chul
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.2
    • /
    • pp.3-12
    • /
    • 1999
  • We introduce feedback registers and definitions of complexity of a register or a sequence generated by it. In the view point of cryptography the linear complexity of an ultimately periodic sequence is important because large one gives an enemy infeasible jobs. We state some results about the linear complexity of sum and product of two LFSRs.