• Title/Summary/Keyword: Military Modeling

Search Result 368, Processing Time 0.025 seconds

A Method of Interoperating Heterogeneous Simulation Middleware for L-V-C Combined Environment (L-V-C 통합 환경 실현을 위한 이기종 시뮬레이션 미들웨어 연동 방안)

  • Cho, Kunryun;No, Giseop;Jung, Sihyun;Keerativoranan, Nopphon;Kim, Chongkwon
    • Journal of KIISE
    • /
    • v.42 no.2
    • /
    • pp.213-219
    • /
    • 2015
  • Simulation is used these days to verify the hypothesis or the new technology. In particular, National Defense Modeling & Simulation (M&S) is used to predict wartime situation and conduct the military training. National Defense M&S can be divided into three parts, live simulation, virtual simulation, and constructive simulation. Live simulation is based on the real environment, which allows more realistic sumulation; however, it has decreased budget efficiency, but reduced depictions of reality. In contrast, virtual and constructive simulations which are based on the virtual environment, have increased budget efficiency, but reduced depictions of reality. Thus, if the three parts of the M&S are combined to make the L-V-C combined environment, the disadvantages of each simulation can be complemented to increases the quality of the simulation. In this paper, a method of interworking heterogeneous simulation middeware for L-V-C combined environment is proposed, and the test results of interworking between Data Distribution Service (DDS) and High Level Architecture (HLA) are shown.

Logical Modeling of Base System Model for Tank Engagement Simulation (전차 교전 시뮬레이션을 위한 기본체계모델의 논리 모델링 방법)

  • Lee, Sunju
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.2
    • /
    • pp.63-72
    • /
    • 2020
  • Tank, which is a representative ground weapon system, is one of the most important weapon systems in each country. For the cost-effective acquisition of a tank based on scientific analysis, the operational concept and effectiveness should be studied based on engagement simulation technology. Besides physical capabilities including maneuver and communication, logical models including decision-making of a tank commander should be developed systematically. This paper describes a method to model a tank for engagement simulation based on Base System Model(BSM), which is the standard architecture of the weapon system model in AddSIM, an integrated engagement simulation software. In particular, a method is proposed to develop logical models by hierarchical and modular approach based on human decision-making model. The proposed method applies a mathematical formalism called DEVS(Discrete EVent system Specification) formalism. It is expected that the proposed method is widely used to study the operational concept and analyze the effectiveness of tanks in the Korean military in the future.

A Semi-Automatic Building Modeling System Using a Single Satellite Image (단일 위성 영상 기반의 반자동 건물 모델링 시스템)

  • Oh, Seon-Ho;Jang, Kyung-Ho;Jung, Soon-Ki
    • The KIPS Transactions:PartB
    • /
    • v.16B no.6
    • /
    • pp.451-462
    • /
    • 2009
  • The spread of satellite image increases various services using it. Especially, 3D visualization services of the whole earth such as $Google\;Earth^{TM}$ and $Virtual\;Earth^{TM}$ or 3D GIS services for several cities provide realistic geometry information of buildings and terrain of wide areas. These service can be used in the various fields such as urban planning, improvement of roads, entertainment, military simulation and emergency response. The research about extracting the building and terrain information effectively from the high-resolution satellite image is required. In this paper, presents a system for effective extraction of the building model from a single high-resolution satellite image, after examine requirements for building model extraction. The proposed system utilizes geometric features of satellite image and the geometric relationship among the building, the shadow of the building, the positions of the sun and the satellite to minimize user interaction. Finally, after extracting the 3D building, the fact that effective extraction of the model from single high-resolution satellite will be show.

Cyber threat Detection and Response Time Modeling (사이버 위협 탐지대응시간 모델링)

  • Han, Choong-Hee;Han, ChangHee
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.53-58
    • /
    • 2021
  • There is little research on actual business activities in the field of security control. Therefore, in this paper, we intend to present a practical research methodology that can contribute to the calculation of the size of the appropriate input personnel through the modeling of the threat information detection response time of the security control and to analyze the effectiveness of the latest security solutions. The total threat information detection response time performed by the security control center is defined as TIDRT (Total Intelligence Detection & Response Time). The total threat information detection response time (TIDRT) is composed of the sum of the internal intelligence detection & response time (IIDRT) and the external intelligence detection & response time (EIDRT). The internal threat information detection response time (IIDRT) can be calculated as the sum of the five steps required. The ultimate goal of this study is to model the major business activities of the security control center with an equation to calculate the cyber threat information detection response time calculation formula of the security control center. In Chapter 2, previous studies are examined, and in Chapter 3, the calculation formula of the total threat information detection response time is modeled. Chapter 4 concludes with a conclusion.

Development of Simulation Architecture Framework for Simulation Based Acquisition (모의기반획득을 위한 시뮬레이션 아키텍처 프레임워크 개발)

  • Cho, Kyu-Tae;Shim, Jun-Yong;Lee, Yong-Heon;Lee, Seung-Young;Kim, Sae-Hwan
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.3
    • /
    • pp.81-89
    • /
    • 2010
  • Recent modeling and simulation technology is being used in various fields. Especially in the field of military, Simulation-Based Acquisition (SBA) is recognized as a essential policy. To effectively carry out SBA, modeling and simulation techniques should be applied in the whole life-cycle for the weapon system development, and simulation architecture framework which provides easily reusable and interoperability is needed. Through reusability and interoperability, the costs of constructing the integrated collaborate environment for simulation based acquisition can be minimized. In this study, we define requirements, issues for enhancing reusability and interoperability, and propose simulation framework as a solution of the problem including structural design. Proposing simulation framework provides common functions for producing simulator as reusable units and easily changeable structure on user's purpose. In addition, we provide the result for applying simulation framework to our project.

A study on security requirements for Telecommuting in defense industry (방산업체 비대면(재택) 근무를 위한 보안 요구사항 연구)

  • Hwang Gue Sub;Yeon Seung Ryu
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.209-221
    • /
    • 2023
  • Due to the rapid spread of the COVID-19 virus in December 2019, the working environment was rapidly converted to telecommuting. However, since the defense industry is an organization that handles technology related to the military, the network separation policy is applied, so there are many restrictions on the application of telecommuting. Telecommuting is a global change and an urgent task considering the rapidly changing environment in the future. Currently, in order for defense companies to implement telecommuting, VPN, VDI, and network interlocking systems must be applied as essential elements. Eventually, some contact points will inevitably occur, which will increase security vulnerabilities, and strong security management is important. Therefore, in this paper, attack types are selected and threats are analyzed based on the attack tactics of the MITER ATT&CK Framework, which is periodically announced by MITER in the US to systematically detect and respond to cyber attacks. Then, by applying STRIDE threat modeling, security threats are classified and specific security requirements are presented.

Features of the Costumes of Officials in the King Jeongjo Period Seojangdaeyajodo (정조대 <서장대야조도(西將臺夜操圖)>의 관직자 복식 고증)

  • LEE, Eunjoo;KIM, Youngsun;LEE, Kyunghee
    • Korean Journal of Heritage: History & Science
    • /
    • v.54 no.2
    • /
    • pp.78-97
    • /
    • 2021
  • Seojangdaeyajodo is a drawing of military night training on February 12th (lunar leap month), 1795. Focusing on the Seojangdaeyajodo, the characteristics and of the costumes worn by various types of officials were examined. There were 34 officials located near King Jeongjo in and around Seojangdae, with 27 Dangsanggwan and 7 Danghagwan. They wore three types of costumes, including armor, yungbok, and military uniforms. All of the twelve armor wearers and the five officials wearing yungbok were dangsanggwan, and the military uniform wearers included eleven dangsanggwan and six danghagwan. For the shape of the armor, the armor relics of General Yeoban, suitable for riding horses, and the armor painting of Muyedobotongji were referenced, and the composition of the armor was based on practicality. The armor consists of a helmet, a suit of armor, a neck guard, armpit guards, arm guards, and a crotch guard. The color of the armor was red and green, which are the most frequently used colors in Seojangdaeyajodo. The composition of yungbok was jurip, navy cheollik, red gwangdahoe, socks made of leather, and suhwaja. The composition of the military uniform was a lined jeolrip, dongdari, jeonbok, yodae, jeondae, and suhwaja. There were differences in the fabrics used in dangsanggwan and danghagwan military uniforms. Dangsanggwan used fabric with depictions of clouds and jewels, and danghagwan used unpatterned fabric. Moreover, jade, gold, and silver were used for detailed ornamental materials in dangsanggwan. The weapons included bows and a bow case, a sword, a rattan stick, wrist straps, and a ggakji. In the records of the King Jeongjo period, various colored heopsu were mentioned; the colors of the dongdari and jeonbok of dangsanggwan and danghagwan were referenced in various colors. It was presented as an illustration of costumes that could be used to produce objects accurately reflecting the above historical results. The basic principle of the illustration was to present the modeling standards for 3D content production. Samples of form, color, and material of the corresponding times and statuses were presented. The front, the side, and the back of each costume and its accessories were presented, and the colors were presented in RGB and CMYK.

Ultra Wideband (UWB) - Introduction and Signal Modeling

  • Manandhar, Dinesh;Shibasaki, Ryosuke
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.1421-1423
    • /
    • 2003
  • Ultra Wideband is a new technology from commercial or civilian application viewpoint. It uses already allocated radio spectrum without causing significant interference to other users. It uses very low power, which is below the thermal noise of the receiver and is inherently difficult to detect by un-intentional users. Since, FCC approved the regulation for the commercial use of UWB in February 2002, the development of UWB technology is drastically gaining momentum. However, the technology itself is not new. It has already been used in military applications. UWB has three basic areas of applications, which are communication, positioning and imaging (UWB Microwave). The main commercial application will be for communication since it has very high data transfer rate for short distance. It can also be used for both indoor and outdoor 3-D positioning. Another important application is imaging like microwave remote sensing. An UWB sensor can pass through doors and walls and hence detect the objects inside the room. In this paper, we will introduce about UWB technology along with it’s various possible applications. We will also present some models to generate UWB signal and it’s analysis using signal-processing tools.

  • PDF

Submarine Behavior Simulation based on 4-DOF Motion Platform and Stereoscopic Multi-Channel Visualization (4자유도 모션 플랫폼을 이용한 잠수함의 운동감 재현과 스테레오 다채널 가시화)

  • Xu, Zhenshun;Han, Soon-Hung
    • Korean Journal of Computational Design and Engineering
    • /
    • v.17 no.5
    • /
    • pp.333-341
    • /
    • 2012
  • Modeling and simulation is important for military training. People can feel perspective when stereoscope images are created using multi-channel visualizations. A submarine oscillates when the submarine is just below the surface of the sea, so that the reconnaissance becomes difficult. Also, the operator should read the information of the target within 6 seconds using the periscope. The operator must have experience. To solve these problems, stereoscopic multi-channel visualization has been tested. The iCAVE system of KAIST provides a large-scale screen, 7 PCs, and 14 projectors to create the stereoscope images. To simulate the motion of a submarine just below the ocean surface, a 4-DOF motion platform is used. The motion data is transmitted to the visual system and the motion platform through the UDP protocol. Variety of weather conditions are created using the Vega Prime software. The stereoscopic multi-channel visualization and the motion platform system created a realistic simulation system.

The Ancient Construction Materials and Methods: The Great Wall of China in Jinshanling as a Case Study

  • Yang, Jin;Tan, Fabian Hadipriono;Tan, Adrian
    • Journal of Construction Engineering and Project Management
    • /
    • v.7 no.1
    • /
    • pp.37-49
    • /
    • 2017
  • The Jinshanling section of the Great Wall of China is a series of fortifications in northern China that was constructed for strategic military defenses. This section was first built in the beginning of the Ming Dynasty in AD 1368 and then underwent major construction, reconstruction and renovation during the late Ming Dynasty, approximately in AD 1569. The Jinshanling section is 10.5 km long, a very short section compared with the entire 21,200 km wall. The wall section is located in Luanping County, Hebei province, China. This research paper focuses on the construction methods and materials of the wall and the towers in the area. The research methodology includes site visits, knowledge acquisition of experts and 3D graphic modeling. This study reveals that the materials selected for the structure include rubbles and rammed earth, bricks, stones, timber, and mortar. The erection sequence of the wall and the towers was a bottom-up fashion using various ancient construction techniques, such as the fire-setting rock blasting techniques and the surveying techniques from the Sea Island Mathematical Manual.