• Title/Summary/Keyword: Military Modeling

Search Result 368, Processing Time 0.028 seconds

A Study on the Effective Method to Producing Data for The ROKA Live Fire Training Range Safety (한국군 실 사격 훈련간 효율적인 안전지대 데이터 구축 방안 연구)

  • Lee, June-Sik;Choi, Bong-Wan;Oh, Hyun-Seung
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.3
    • /
    • pp.64-77
    • /
    • 2015
  • An effective method for produce munitions effectiveness data is to calculate weapon effectiveness indices in the US military's Joint Munitions Effectiveness Manuals (JMEM) and take advantage of the damage evaluation model (GFSM) and weapon Effectiveness Evaluation Model (Matrix Evaluator). However, a study about the Range Safety that can be applied in the live firing exercises is very insufficient in the case of ROK military. The Range Safety program is an element of the US Army Safety Program, and is the program responsible for developing policies and guidance to ensure the safe operation of live-fire ranges. The methodology of Weapon Danger Zone (WDZ) program is based on a combination of weapon modeling/simulation data and actual impact data. Also, each WDZ incorporates a probability distribution function which provides the information necessary to perform a quantitative risk assessment to evaluate the relative risk of an identified profile. A study of method to establish for K-Range Safety data is to develop manuals (pamphlet) will be a standard to ensure the effective and safe fire training at the ROK military education and training and environmental conditions. For example, WDZs are generated with the WDZ tool as part of the RMTK (Range Managers Tool Kit) package. The WDZ tool is a Geographic Information System-based application that is available to operational planners and range safety manager of Army and Marine Corps in both desktop and web-based versions. K-Range Safety Program based on US data is reflected in the Korean terrain by operating environments and training doctrine etc, and the range safety data are made. Thus, verification process on modified variables data is required. K-Range Safety rather than being produced by a single program, is an package safety activities and measures through weapon danger zone tool, SRP (The Sustainable Range Program), manuals, doctrine, terrain, climate, military defence M&S, weapon system development/operational test evaluation and analysis to continuously improving range safety zone. Distribution of this K-range safety pamphlet is available to Army users in electronic media only and is intended for the standing army and army reserve. Also publication and distribution to authorized users for marine corps commands are indicated in the table of allowances for publications. Therefore, this study proposes an efficient K-Range Safety Manual producing to calculate the danger zones that can be applied to the ROK military's live fire training by introducing of US Army weapons danger zone program and Range Safety Manual

Military Telescope Mirror Aluminum Re-Coating Prediction Study by Simulation (시뮬레이션을 통한 군용 망원경 미러 알루미늄 코팅 주기 예측 연구)

  • Choi, Hyo-Jun;Park, Jun-Su;Lee, Jung-Hoon;Oh, Young-Il
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.1
    • /
    • pp.439-447
    • /
    • 2020
  • Re-coating of the mirror is one of the important things to maintain the performance of a telescope. The metal coated on the mirror reflects light, and if the reflectance decreases, then the telescope's performance decreases, so the mirror must be periodically recoated. It is important to predict re-coating cycles for military telescopes and to develop maintenance plans not only for performance, but also for the telescope's availability for missions and the maintenance costs for long-term use. However, most similar telescopes used for astronomy research determine recoating cycles based on experience and operating conditions, and not for prediction of recoating. Therefore, this study predicts the cleaning cycles and re-coating cycles of a military telescope's mirror by using simulation. First, this study analyzed similar cases of domestic and foreign astronomy research institutes and the study also reviewed the need for re-coating and predicting re-coating cycles. Second, this study developed simulation for predicting cleaning and re-coating cycles according to data analysis and modeling. Finally, the study predicts cleaning cycles and re-coating cycles according to varying reflectance reduction (5%, 10%, 15%, 20%) and cleaning conditions (per 3 months, 6 months, 1 year and 2 years). As a result, this study suggests reference criteria to develop the planning for military telescopes and their maintenance.

A Study on Exploring Factors Influencing Military Security Level (Based on the Theory of Planned Behavior, Deterrence and Protection Motivation) (군(軍) 보안수준에 미치는 영향요인 탐색에 관한 연구 (계획 행동이론, 억제이론, 보호 동기 이론을 중심으로))

  • Jong-Hyoun Kim;Sang-Jun Ahn
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.3-9
    • /
    • 2022
  • Recently, as the environment of the 4th industrial revolution has arrived, the opening, sharing and convergence of data are actively being achieved in any organization. However, the opening and sharing of data inevitably leads to security vulnerability and there is ambivalence that is a threat that can affect the existence of an organization operated in the 4th industrial revolution environment. Especially security issues in the organization of the military can be a threat to the state, not the military itself, so it is always necessary to maintain a high level of security discipline. In this paper, 14 variables were selected through structural equation model applying theory of planned behavior, deterrence and protection motivation to find out the security level development measures by extracting factors that can affect security level. As a result, the theory of planned behavior that the security knowledge embodied through the usual security regulation education and evaluation affects the behavior was adopted, and the theory of deterrence and protection motivation showed the significance of the rejection level. In addition, it was confirmed that the variables that have the greatest impact on the military security level through the measured values of the three-year security audit were commanders and mental security. In conclusion, in order to improve the security level, it is suggested that security education, definite reward and punishment, and security system upgrading should be firmly established and mental security posture should be secured.

Framework and Tools for Rapid M&S Component Development and Reusability (M&S 컴포넌트의 신속 개발과 재사용을 위한 프레임워크 및 도구 개발)

  • Lee, Yong Heon;Cho, Kyu Tae;Lee, Seung Young;Hwang, Keun Chul;Kim, Sae Hwan
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.4
    • /
    • pp.29-38
    • /
    • 2013
  • Modeling and simulation technology is being used in various fields. Especially in the field of military, Simulation-Based Acquisition (SBA) is recognized as a essential policy. To effectively carry out SBA, modeling and simulation techniques should be applied in the whole life-cycle for the weapon system development, and the framework and tools which can help the rapid component development and reusability are needed. In this research, we use the simulation framework based on modeling formalism for enhancement of reusability and a GUI-based modeling environment for rapid M&S component development. The Proposed framework can act as plug-in components on the basis of XML-based object model, so that the flexible design is possible for the change of the model and simulation structure. In addition, our methods are effective to implement the functions for supporting simulation such as the model data logging and communication with external systems. In this paper, we describe an architecture and functions for the framework and tools.

Case Studies on Planning and Learning for Large-Scale CGFs with POMDPs through Counterfire and Mechanized Infantry Scenarios (대화력전 및 기계화 보병 시나리오를 통한 대규모 가상군의 POMDP 행동계획 및 학습 사례연구)

  • Lee, Jongmin;Hong, Jungpyo;Park, Jaeyoung;Lee, Kanghoon;Kim, Kee-Eung;Moon, Il-Chul;Park, Jae-Hyun
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.6
    • /
    • pp.343-349
    • /
    • 2017
  • Combat modeling and simulation (M&S) of large-scale computer generated forces (CGFs) enables the development of even the most sophisticated strategy of combat warfare and the efficient facilitation of a comprehensive simulation of the upcoming battle. The DEVS-POMDP framework is proposed where the DEVS framework describing the explicit behavior rules in military doctrines, and POMDP model describing the autonomous behavior of the CGFs are hierarchically combined to capture the complexity of realistic world combat modeling and simulation. However, it has previously been well documented that computing the optimal policy of a POMDP model is computationally demanding. In this paper, we show that not only can the performance of CGFs be improved by an efficient POMDP tree search algorithm but CGFs are also able to conveniently learn the behavior model of the enemy through case studies in the scenario of counterfire warfare and the scenario of a mechanized infantry brigade's offensive operations.

MDP(Markov Decision Process) Model for Prediction of Survivor Behavior based on Topographic Information (지형정보 기반 조난자 행동예측을 위한 마코프 의사결정과정 모형)

  • Jinho Son;Suhwan Kim
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.2
    • /
    • pp.101-114
    • /
    • 2023
  • In the wartime, aircraft carrying out a mission to strike the enemy deep in the depth are exposed to the risk of being shoot down. As a key combat force in mordern warfare, it takes a lot of time, effot and national budget to train military flight personnel who operate high-tech weapon systems. Therefore, this study studied the path problem of predicting the route of emergency escape from enemy territory to the target point to avoid obstacles, and through this, the possibility of safe recovery of emergency escape military flight personnel was increased. based problem, transforming the problem into a TSP, VRP, and Dijkstra algorithm, and approaching it with an optimization technique. However, if this problem is approached in a network problem, it is difficult to reflect the dynamic factors and uncertainties of the battlefield environment that military flight personnel in distress will face. So, MDP suitable for modeling dynamic environments was applied and studied. In addition, GIS was used to obtain topographic information data, and in the process of designing the reward structure of MDP, topographic information was reflected in more detail so that the model could be more realistic than previous studies. In this study, value iteration algorithms and deterministic methods were used to derive a path that allows the military flight personnel in distress to move to the shortest distance while making the most of the topographical advantages. In addition, it was intended to add the reality of the model by adding actual topographic information and obstacles that the military flight personnel in distress can meet in the process of escape and escape. Through this, it was possible to predict through which route the military flight personnel would escape and escape in the actual situation. The model presented in this study can be applied to various operational situations through redesign of the reward structure. In actual situations, decision support based on scientific techniques that reflect various factors in predicting the escape route of the military flight personnel in distress and conducting combat search and rescue operations will be possible.

An Underwater Simulator Using X3D and a Motion Chair in a Multi-channel Display Room (다채널 디스플레이에서 X3D와 모션체어를 이용한 수중운동체 시뮬레이터)

  • Hur, Pil-Won;Yang, Jeong-Sam;Han, Soon-Hung
    • Korean Journal of Computational Design and Engineering
    • /
    • v.13 no.1
    • /
    • pp.45-57
    • /
    • 2008
  • A submarine good military weapon because of its confidentiality and intimidating power. Therefore, training warfighters how to maneuver submarine is very important. Because submarine is very expensive and has regional and temporal limitations, M&S(Modeling and Simulation) can be a good alternative. However, as the existing M&S systems of submarine generally use expensive commercial software and dedicated hardware, which cause the warfighters to take troubles to visit the secured places, and then to train themselves during limited time slots. Also, many M&S systems have only one-channel display system which reduces the sense of immersiveness. Another problem is that many heterogeneous simulators can hardly be used as an integrated system. To solve these problems, X3D, a platform-independent and open standard graphic file format, is used with the general-purpose PCs. To increase immersiveness, multi-channel display system and a motion chair are used. Finally, HLA/RTI is used to integrate individual components of the simulator. All of these are verified through experiments.

Modeling and Analysis for Efficient Joint Combat Fire Operation of Army Artillery and Army Aviation (효율적인 육군항공과 포병자산의 통합화력 운용방안 판단을 위한 모델링 방법론 및 분석)

  • Lim, Jong-Won;Kwon, Hyog-Lae;Lee, Tae-Eog
    • Journal of the Korea Society for Simulation
    • /
    • v.23 no.2
    • /
    • pp.47-55
    • /
    • 2014
  • Most combat simulation models, including Korean Army's combat models for simulation analysis, have too much limitations to be used for analysis of complex combats like joint combat fires. We analyze requirements for modeling and simulation of Fire-Eagle, which is a joint combat fire model of ground combat fires and army aviation. We then propose a simulation model for Fire Eagle and derive operational strategies for improving the joint combat fire. To do these, we analyze effectiveness of specific operational plans and scenarios by using the simulation model. We demonstrate ways of developing efficient and effective operational plans from the simulation experimental results.

Service Prediction-Based Job Scheduling Model for Computational Grid (계산 그리드를 위한 서비스 예측 기반의 작업 스케줄링 모델)

  • Jang Sung-Ho;Lee Jong-Sik
    • Journal of the Korea Society for Simulation
    • /
    • v.14 no.3
    • /
    • pp.91-100
    • /
    • 2005
  • Grid computing is widely applicable to various fields of industry including process control and manufacturing, military command and control, transportation management, and so on. In a viewpoint of application area, grid computing can be classified to three aspects that are computational grid, data grid and access grid. This paper focuses on computational grid which handles complex and large-scale computing problems. Computational grid is characterized by system dynamics which handles a variety of processors and jobs on continuous time. To solve problems of system complexity and reliability due to complex system dynamics, computational grid needs scheduling policies that allocate various jobs to proper processors and decide processing orders of allocated jobs. This paper proposes a service prediction-based job scheduling model and present its scheduling algorithm that is applicable for computational grid. The service prediction-based job scheduling model can minimize overall system execution time since the model predicts the next processing time of each processing component and distributes a job to a processing component with minimum processing time. This paper implements the job scheduling model on the DEVS modeling and simulation environment and evaluates its efficiency and reliability. Empirical results, which are compared to conventional scheduling policies, show the usefulness of service prediction-based job scheduling.

  • PDF

Service Prediction-Based Job Scheduling Model for Computational Grid (계산 그리드를 위한 서비스 예측 기반의 작업 스케쥴링 모델)

  • Jang Sung-Ho;Lee Jong-Sik
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2005.05a
    • /
    • pp.29-33
    • /
    • 2005
  • Grid computing is widely applicable to various fields of industry including process control and manufacturing, military command and control, transportation management, and so on. In a viewpoint of application area, grid computing can be classified to three aspects that are computational grid, data grid and access grid. This paper focuses on computational grid which handles complex and large-scale computing problems. Computational grid is characterized by system dynamics which handles a variety of processors and jobs on continuous time. To solve problems of system complexity and reliability due to complex system dynamics, computational grid needs scheduling policies that allocate various jobs to proper processors and decide processing orders of allocated jobs. This paper proposes the service prediction-based job scheduling model and present its algorithm that is applicable for computational grid. The service prediction-based job scheduling model can minimize overall system execution time since the model predicts a processing time of each processing component and distributes a job to processing component with minimum processing time. This paper implements the job scheduling model on the DEVSJAVA modeling and simulation environment and simulates with a case study to evaluate its efficiency and reliability Empirical results, which are compared to the conventional scheduling policies such as the random scheduling and the round-robin scheduling, show the usefulness of service prediction-based job scheduling.

  • PDF