• Title/Summary/Keyword: Future Combat Field

Search Result 35, Processing Time 0.036 seconds

Study on Combat Efficiency According to Change in Quantity of Small Reconnaissance Drones in the Infantry Company Responsibility Area (중대급 작전지역에서 소형 감시정찰 드론의 수량 변화에 따른 전투 효율 연구)

  • Kyongsoo, Kim;Yongchan, Bae
    • Journal of the Korea Society for Simulation
    • /
    • v.31 no.4
    • /
    • pp.23-31
    • /
    • 2022
  • The development of innovative technology through the 4th Industrial Revolution is actively used in the defense field. In particular, surveillance and reconnaissance capabilities using drones will be of great help to the development of military combat capabilities, such as preparing for future military personnel reductions and reinforcing alert capabilities. In this study, we analyze the combat efficiency of drones how helpful drones can be to the military operations through simulations. Drones and enemy move in the efficient shortest path within a two-dimensional space in which operational areas are mapped into number such as detection probability. Based on the detection probability of an enemy infiltrating along the path with the lowest detection probability, the detection probability change that occurs whenever a drone is additionally deployed is presented, and we analyze the combat efficiency according to the additional drone input. Simulation proves that the increase in combat efficiency decreases as more drones are added in small operational areas such as company-level operational areas. This study is expected to contribute to the efficient operation of a limited number of drones in company-level units and to help determine the most desirable quantity of drones for additional combat power improvement.

Evaluation of MANET Protocol Scheme for TICN System (TICN체계하 MANET 프로토콜 분석)

  • Son, Hye-Joung;Kwon, Tae-Wook
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.4
    • /
    • pp.469-475
    • /
    • 2009
  • TMMR(Tactical Multiband Multirole Radio) is one of the important equipments for TICN which is our next military tactical communication system and it supplies to the distribution of traffic of C2(Command & Control) and SA(Situation Awareness) for unit of Brigade and below. In this paper, we define the tactical needs of military communication, and evaluate MANET(Mobile Ad-hoc Network) protocol for the future digital battle-field through performance comparison with a network simulator.

A Study on the Identifying Emerging Defense Technology using S&T Text Mining (S&T Text Mining을 이용한 국방 유망기술 식별에 관한 연구)

  • Lee, Tae-Bong;Lee, Choon-Joo
    • Journal of the military operations research society of Korea
    • /
    • v.36 no.1
    • /
    • pp.39-49
    • /
    • 2010
  • This paper tries to identify emerging defense technology using S&T Text Mining. As a national agenda, there has been much effort to build S&T information systems including NTIS and DTiMS that enable researchers, policy makers, or field users to analyze technological changes and promote the best policy practices for efficient workflow, knowledge sharing, strategy development, or institutional competitiveness. In this paper, the S&T Text Mining application to unmanned combat technology using INSPEC DB is empirically illustrated and shows that it is a feasible approach to identify emerging defense technology as well as the structure of knowledge network of the future technology candidates.

A Concept Study on Efficient Domestic Development of 120mm Self-propelled Mortar System (120mm 자주박격포의 효율적인 국내 연구개발 개념)

  • Kim, Seok;Kim, Ki-Hoon;Kim, Seong-Young
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.2
    • /
    • pp.133-138
    • /
    • 2009
  • A mortar system is able to be fired more rapidly and concentratedly than other field gun systems. A mortar system can be easily manufactured because of its simple structure. It has also been supporting for the fire power of infantry because it can be carried conveniently. But a mortar system has demerits that are the limited firing range, poor accuracy and uncomfortable operability. Korean army plan to be operated rapidly and enlarge battle field in the near future. So weapon systems of Korean army must have longer firing range, automatic laying function and precision firing capability. This study suggests efficient developing concept of 120mm self-propelled mortar system through surveying the technical readiness level of current R&D and manufacturing ability.

Feasibility Study of Developing Ship Engineering Control System based on DDS Middle-ware (DDS 미들웨어 기반의 선박 통합기관감시제어체계 개발 가능성 연구)

  • Seongwon Oh
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.6
    • /
    • pp.653-658
    • /
    • 2023
  • In systems like the combat management system of a naval ship or smart city of civilians, where many sensors and actuators are connected, the middle-ware DDS (Data Distribution Service) is mainly used to transmit large amounts of data. It is scalable and can effectively respond to the increase in sensors or equipment connected to the system in the future. The engineering control system (ECS), which plays an important role similar to the combat management system of a naval ship, still uses Server-Client model with industrial protocols such as Modbus and CAN (Controller Area Network) bus, to transmit data, which is unfavorable in terms of scalability. However, as automation and unmanned systems advance, more sensors and actuators are expected to be added, necessitating substantial program modification. DDS can effectively address such situations. The purpose of this study is to confirm the development possibility of an integrated monitoring and control system of a ship by using OpenDDS, which follows the OMG (Object Management Group) standard among the middle-ware DDS used in the combat management system. To achieve this goal, field equipment simulators and an ECS server were configured to perform field equipment data input/output and simulation using DDS was performed. The ECS prototype successfully handled data transmission, confirming that DDS is capable of serving as the middle-ware for the ECS of a ship.

Analysis of Improving Requirement on Military Security Regulations for Future Command Control System (미래 지휘통제체계를 위한 보안 규정 개선 요구사항 분석)

  • Kang, Jiwon;Moon, Jae Woong;Lee, Sang Hoon
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.69-75
    • /
    • 2020
  • The command control system, like the human brain and nervous system, is a linker that connects the Precision Guided Missile(PGR) in information surveillance and reconnaissance (ISR) and is the center of combat power. In establishing the future command and control system, the ROK military should consider not only technical but also institutional issues. The US Department of Defense establishes security policies, refines them, and organizes them into architectural documents prior to the development of the command and control system. This study examines the security architecture applied to the US military command control system and analyzes the current ROK military-related policies (regulations) to identify security requirements for the future control system. By grouping the identified security requirements, this study identifies and presents field-specific enhancements to existing security regulations.

A Study on the Robot Teleoperation for Mine Removal (지뢰제거를 위한 로봇 텔레오퍼레이션 기술 연구)

  • Lim, Soo-Chul;Yoo, Sam-Hyeon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.6
    • /
    • pp.156-163
    • /
    • 2008
  • Future Combat System(FCS), such as unmanned systems that reduce the danger faced by soldiers in the field, are likely to be studied and developed. Soldiers when finding and disposing of mines risk injury and death. Several methods of safe mine retrieval are investigated. In this paper, a mine removal method, which uses a remote controlled robot to get rid of mines using a 4 channel architecture teleoperation method is used. The robot, when in contact with soil and mines, is controlled by a remote control. The feasibility of using teleoperation controlled system to remove mines is demonstrated in this paper. The Matlab-Simulink was used as a tool to simulate mine removal with robots. The force and position of the robot{slave system of 4 channel architecture) and controller(master system of 4 channel architecture) are analyzed when users handle the controller with sinusoidal force.

An Empirical Study on Defense Future Technology in Artificial Intelligence (인공지능 분야 국방 미래기술에 관한 실증연구)

  • Ahn, Jin-Woo;Noh, Sang-Woo;Kim, Tae-Hwan;Yun, Il-Woong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.5
    • /
    • pp.409-416
    • /
    • 2020
  • Artificial intelligence, which is in the spotlight as the core driving force of the 4th industrial revolution, is expanding its scope to various industrial fields such as smart factories and autonomous driving with the development of high-performance hardware, big data, data processing technology, learning methods and algorithms. In the field of defense, as the security environment has changed due to decreasing defense budget, reducing military service resources, and universalizing unmanned combat systems, advanced countries are also conducting technical and policy research to incorporate artificial intelligence into their work by including recognition systems, decision support, simplification of the work processes, and efficient resource utilization. For this reason, the importance of technology-driven planning and investigation is also increasing to discover and research potential defense future technologies. In this study, based on the research data that was collected to derive future defense technologies, we analyzed the characteristic evaluation indicators for future technologies in the field of artificial intelligence and conducted empirical studies. The study results confirmed that in the future technologies of the defense AI field, the applicability of the weapon system and the economic ripple effect will show a significant relationship with the prospect.

Establishing a Thinking Process for Revolution in Military Affairs to Create Future Crucial Capabilities for the Republic of Korea Army (육군의 미래 핵심역량 창출을 위한 군사혁신 사고과정 정립)

  • Cho, Sang Keun;Lee, Gwang Woon;Min, Chulki;Yeoi, Byung Ik;Choi, Hyun Gyu;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.453-458
    • /
    • 2022
  • The Republic of Korea Army(ROKA) has carried out a deep change to prepare for the future war since 2017. For this, Korea Army Research Center for Future & Innovation(KARCFI) established in 2018 tried to spread out boom of innovation toward the whole ROKA. A number of ROKA members mentioned the necessity of research methodology creating future crucial capabilities, weapons, combat concepts, structures, etc. KARCFI researchers established a thinking process for revolution in military affairs(RMA) to rapidly respond field requests and optimized it through validity assessment of professionals and experiment in Army Innovation School. As a result, a thinking process for RMA provided creative ideas with the Army's vision and strategy, was included in its education system. Simultaneously, it became one of methodologies for the Army's research tasks and KCI journals. From now on, a thinking process for RMA will be able to signpost for RMA of the Army through diverse following studies.

Security Threats and Scenarios using Drones on the Battlefield (전장에서 드론을 활용한 보안 위협과 시나리오)

  • Park, Keun-Seog;Cheon, Sang-pil;Kim, Seong-Pyo;Eom, Jung-ho
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.73-79
    • /
    • 2018
  • Since 1910s, the drones were mainly used for military purposes for reconnaissance and attack targets, but they are now being used in various fields such as disaster prevention, exploration, broadcasting, and surveillance of risk areas. As drones are widely used from military to civilian field, hacking into the drones such as radio disturbance, GPS spoofing, hijacking, etc. targeting drones has begun to occur. Recently, the use of drones in hacking into wireless network has been reported. If the artificial intelligence technology is applied to the drones in the military, hacking into unmanned combat system using drones will occur. In addition, a drone with a hacking program may be able to relay a hacking program to the hacking drone located far away, just as a drone serves as a wireless communication station. And the drones will be equipped with a portable GPS jamming device, which will enable signal disturbance to unmanned combat systems. In this paper, we propose security threats and the anticipated hacking scenarios using the drones on the battlespace to know the seriousness of the security threats by hacking drones and prepare for future cyberspace.

  • PDF