• Title/Summary/Keyword: Military Training System

Search Result 193, Processing Time 0.026 seconds

A Study on the Improvement of Child Care System for a woman soldier (여군간부 자녀 보육제도 개선방안에 관한 연구)

  • Lee, Dong-Ho;Yoon, Yeo-Yeon;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.2
    • /
    • pp.53-57
    • /
    • 2019
  • This Female soldiers today have a child-rearing problem, dealing with the environment and numerous hardships arising from their professional family composition such as working overtime and moving directors due to their characteristics during military service. Also, female soldiers are deepening with the unique duties of the military and frequent training sessions and night shifts, and the hardships of the status quo are continuing, for this reason the heavy responsibilities and stresses of the female military in charge of child care are reaching an extreme. Therefore, this study needs to study institutional measures to ensure the service conditions of female soldiers during the period of child care and to improve child care.

Vulnerability Mitigation System Construction Method Based on ATT&CK in M ilitary Internal Network Environment (국방 네트워크 환경에서 ATT&CK 기반 취약점 완화 체계 구축 방안)

  • Ahn, Gwang Hyun;Lee, Hanhee;Park, Won Hyung;Kang, Ji Won
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.135-141
    • /
    • 2020
  • The Ministry of National Defense is strengthening the power and capacity of cyber operations as cyber protection training is conducted. However, considering the level of enemy cyber attack capability, the level of cyber defense capability of the ministry of national defense is significantly low and the protection measures and response system for responding to cyber threats to military networks are not clearly designed, falling short of the level of cyber security capabilities of the public and private sectors. Therefore, this paper is to investigate and verify the establishment of a military internal network vulnerability mitigation system that applies the intention of attackers, tactics, techniques and procedures information (ATT&CK Framework), identified military internal network main threat information, and military information system security requirements with military specificity as factors that can establish a defense network vulnerability mitigation system by referring to the domestic and foreign cyber security framework It has the advantage of having.

Virtual Reality Content-Based Training for Spray Painting Tasks in the Shipbuilding Industry

  • Lee, Gun-A.;Yang, Ung-Yeon;Son, Wook-Ho;Kim, Yong-Wan;Jo, Dong-Sik;Kim, Ki-Hong;Choi, Jin-Sung
    • ETRI Journal
    • /
    • v.32 no.5
    • /
    • pp.695-703
    • /
    • 2010
  • Training is one of the representative application fields of virtual reality technology where users can have virtual experience in a training task and working environment. Widely used in the medical and military fields, virtual-reality-based training systems are also useful in industrial fields, such as the aerospace industry, since they show superiority over real training environments in terms of accessibility, safety, and cost. The shipbuilding industry is known as a labor-intensive industry that demands a lot of skilled workers. In particular, painting jobs in the shipbuilding industry require a continuous supplement of human resources since many workers leave due to the poor working environment. In this paper, the authors present a virtual-reality-based training system for spray painting tasks in the shipbuilding industry. The design issues and implementation details of the training system are described, and also its advantages and shortcomings are discussed based on use cases in actual work fields.

A Study of Effectiveness on Military Training of Army Anti-aircraft Weapon using Virtual Reality (가상현실을 이용한 육군 대공무기 교육효과에 관한 연구)

  • Kim, Do-heon;Min, Seung-hee;Kim, Yeek-hyun
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.5
    • /
    • pp.499-507
    • /
    • 2021
  • This study compares the educational effect using real equipment, virtual reality, and video to improve the educational and training effect of the army and verifies which method of education is excellent. The Army has made a lot of efforts to realize the actual training environment, however, it is increasingly difficult to provide the actual training environment because of 1) restrictions on securing training sites and urbanization, 2) deepening conflicts with the people, and 3) difficulties in acquiring defense budget. To resolve these issues, the use of virtual reality(VR) has the advantage to experience actual battlefield indirectly and could save budget by training in a virtual battlefield environment. In particular, in the case of dangerous or expensive weapons systems, is further required. Hence this paper studies how effective virtual reality is compared to the actual weapons system. virtual reality(VR) education is less effective than actual equipment education, but it is higher than video education. Based on this research result, it will be used as a basic data for the analysis of educational effects based in virtual reality(VR).

Extraction of Military Ontology Using Six-Step Bottom-up Approach (6단계 상향식 방법에 의한 국방 온톨로지 추출)

  • Ra, Min-Young;Yang, Kyung-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.6
    • /
    • pp.17-26
    • /
    • 2009
  • In national defense, established information systems are mainly based on simple information processing, such as mass data query. They have thus lacked intelligent ability of information and knowledge representation ability. We therefore need the research about the construction of military ontology which is the main topic for knowledge construction. Military ontology can help us develop the intelligent national defense information system which can search and manage information efficiently. In this paper, we present the six-step bottom-up approach for military ontology extraction, then we apply this approach to one of military domain, called national defense educational training, and finally implement it using $Prot\acute{e}g\acute{e}$ which is one of the most useful ontology development tool.

The Application of Distributed Synthetic Environment Data to a Military Simulation (분포형 합성환경자료의 군사시뮬레이션 적용)

  • Cho, Nae-Hyun;Park, Jong-Chul;Kim, Man-Kyu
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.235-247
    • /
    • 2010
  • An environmental factor is very important in a war game model supporting military training. Most war game models in Korean armed forces apply the same weather conditions to all operation areas. As a result, it fails to derive a high-fidelity simulation result. For this reason this study attempts to develop factor techniques for a high-fidelity war game that can apply distributed synthetic atmospheric environment modeling data to a military simulation. The major developed factor technology of this study applies regional distributed precipitation data to the 2D-GIS based Simplified Detection Probability Model(SDPM) that was developed for this study. By doing this, this study shows that diversely distributed local weather conditions can be applied to a military simulation depending on the model resolution from theater level to engineering level, on the use from training model to analytical model, and on the description level from corps level to battalion level.

The Development of Fuzzy-based Expert System for Analyzing Occupational Stress

  • Jung, Hwa-Shik;Kim, Woo-Youl
    • Journal of the military operations research society of Korea
    • /
    • v.23 no.2
    • /
    • pp.120-134
    • /
    • 1997
  • This paper illustrates the process of developing and configuring the prototype computer-assisted analysis system named as Work-Expert for analyzing occupational stress. A Work-Expert was developed to allow the nonexperts or line manager to utilize the existing knowledge in the area of occupational stress estimation, and to provide intelligent and computer-aided problem solving. The purpose of the system development is for future prediction and problem solving. Creating preventive measures, such as early detection of stress, proper placement and promotion of employees, job enlargement, employee identification, employee involvement, communication, and training of managers will be possible by using this system effectively.

  • PDF

Conceptual Design of the Artificial Intelligence based Tactical Command Decision Support System using the Functional Analysis Method (기능분석법을 이용한 인공지능 기반 전술제대 지휘결심지원체계의 개념설계)

  • Choi, Keun Ha
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.6
    • /
    • pp.650-658
    • /
    • 2020
  • The research of the AI-based command decision support system was insufficient both quantitatively and qualitatively. In particular, in Korea, there was no research on concrete concept design at the current concept research level. This paper proposed the conceptual design of a tactical echelon command decision support system based on artificial intelligence(AI) according to the current army's doctrine of the operation process. The suggested conceptual design clarified the problem and proposed an appropriate process for design, and applied the function analysis method among rational techniques that enable conceptual design systematically.

Current Issues for ROK Defense Modeling & Simulation Scheme under the Transition of New HLA Simulation Architecture (HLA 모의구조전환에 따른 한국군 DM&S 발전방안)

  • 이상헌
    • Journal of the military operations research society of Korea
    • /
    • v.26 no.2
    • /
    • pp.101-119
    • /
    • 2000
  • US DoD designated the High LEvel Architecture (HLA) as the standard technical architecture for all military simulation since 1996. HLA will supercede the current Distributed Interactive Simulation(DIS) and Aggregated LEvel Simulation Protocol(ALSP) methods by no funds for developing/modifying non-HLA compliant simulations. The new architecture specifies Rules which define relationships among federation components, an Objects Model Template which species the form which simulation elements are described, and an Interface Specification which describes the way simulations interact during operations. HLA is named as standard architecture in NATO, Australia and many other militaries. Also, it will be IEEE standard in the near future. It goes without saying that ROK military whose simulation models are almost from US must be prepared in areas such as ROK-US combined exercise, training, weapon system acquisition, interface models with C4I system, OPLAN analysis, operations, and os on. In this paper, we propose several effective alternatives and issues for ROK Defense Modeling and Simulation under the transition of new HLA architecture. Those include secure the kernel of new simulation technology and develop our own conceptual model, RTI software, prototype federation for each service and aggregated one. In order to challenge the new simulation architecture effectively, we should innovate our current defense modeling and simulation infrastructure such s manpower, organization, budget, research environment, relationships among academia and industry, and many others.

  • PDF

Anomaly Detection via Pattern Dictionary Method and Atypicality in Application (패턴사전과 비정형성을 통한 이상치 탐지방법 적용)

  • Sehong Oh;Jongsung Park;Youngsam Yoon
    • Journal of Sensor Science and Technology
    • /
    • v.32 no.6
    • /
    • pp.481-486
    • /
    • 2023
  • Anomaly detection holds paramount significance across diverse fields, encompassing fraud detection, risk mitigation, and sensor evaluation tests. Its pertinence extends notably to the military, particularly within the Warrior Platform, a comprehensive combat equipment system with wearable sensors. Hence, we propose a data-compression-based anomaly detection approach tailored to unlabeled time series and sequence data. This method entailed the construction of two distinctive features, typicality and atypicality, to discern anomalies effectively. The typicality of a test sequence was determined by evaluating the compression efficacy achieved through the pattern dictionary. This dictionary was established based on the frequency of all patterns identified in a training sequence generated for each sensor within Warrior Platform. The resulting typicality served as an anomaly score, facilitating the identification of anomalous data using a predetermined threshold. To improve the performance of the pattern dictionary method, we leveraged atypicality to discern sequences that could undergo compression independently without relying on the pattern dictionary. Consequently, our refined approach integrated both typicality and atypicality, augmenting the effectiveness of the pattern dictionary method. Our proposed method exhibited heightened capability in detecting a spectrum of unpredictable anomalies, fortifying the stability of wearable sensors prevalent in military equipment, including the Army TIGER 4.0 system.