• Title/Summary/Keyword: Military operation

Search Result 807, Processing Time 0.026 seconds

Economic Feasibility and Technology Trends for UAV Development (무인항공기 개발의 경제성과 기술 발전 추세)

  • 김성배
    • Journal of the military operations research society of Korea
    • /
    • v.28 no.1
    • /
    • pp.136-149
    • /
    • 2002
  • The UAV(Unmanned Aerial Vehicle) offers numerous benefits to the military. The benefits it can provide are to perform an operation without loss of life and economic life cycle cost. This clearly showed us the benefits of using UAVs in the operation, especially in politically hostile and sensitive areas. While the American military first used UAVs, it is Israel that has used them best in real situations. In this paper, it is summarized the types and the OPCONs (Operational Concept) of UAVs and the values. Looking at the technology trends, and it is showed the benefits of UAV in the economic side feasibility, to emphasis on the future values of the UAVs as a newly emerging weapon systems.

A Study on the Priority of Users' Requirements for the Development of Military Vehicles by Analytic Hierarchy Process (AHP 기법을 통한 군용차량 개발시 운용자 요구사항 우선순위 설정 연구)

  • Lee, Bum-Koo;Shin, Yong-Cheol;Ryou, Hwang-Bin;Cho, Yong-Kun
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.36 no.2
    • /
    • pp.117-124
    • /
    • 2010
  • The military vehicles are an inevitable resource that is indispensible to successfully perform modern wars. Military vehicles used in the Korean Army are the copycats of American out-dated military vehicles, but limited to fulfill the specific requirements by the operators. Korean army are nowadays trying to launch a new developmental plan for military vehicles of new concepts by the Korean Army. This article, hence, extracts the necessary factors upon the advancement of military vehicles by the expertises with the operation of military vehicles as well as sufficient experiences about maintenance. Suggesting and setting up the priority, the result makes practical application for the decision of the development of military vehicles.

Priority Decision based on Users' Requirements for the Development of Military Vehicles (군용차량 개발시 고려요소 우선순위 설정 연구)

  • Lee, Bum-Koo;Cho, Yong-Kun
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.18 no.6
    • /
    • pp.122-129
    • /
    • 2010
  • The military vehicles are necessary to perform various war battle missions but in reality they are not as convenient as the civil vehicles. Thus, it is problematic regarding the satisfaction about convenience, operation, and performances of military vehicles. Since most of military vehicles used in Korea were made by bench-marking the models of United States developed in the latter half of 1970's. It is question whether the current military vehicles can provide the functions and expected performance fully or not if we do not study what the user friendly military vehicles are. This article report soldiers' user satisfaction survey on military vehicles and provide arguments on the priority decision based on users' requirements. Future direction for the development of military vehicles is discussed.

A Study on Safety Evaluation Method of Lithium Secondary Battery Module for Military Operation (리튬 2차전지 모듈의 전장운용을 위한 안전성 평가기법 연구)

  • Yoo, Eun Ji
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.3
    • /
    • pp.378-386
    • /
    • 2014
  • In this paper, safety evaluation method simulating battlefield environment was studied to verify military operability of commercial lithium secondary battery. Based on the MIL-STD-2105D and STANAG standards, safety tests of lithium secondary battery module were conducted, such as bullet impact, fragment impact, fast cook-off and slow cook-off. All results satisfied the safety evaluation criteria, founded on military standard. It suggests that the lithium secondary module has high potential to be applied in a military power source. The safety evaluation methods developed in this paper can be valuable to propose the new military standards for commercial lithium secondary batteries.

A Study on the Optimal Allocation of Maintenance Personnel in the Military Emergency Maintenance System Considering the Property of Impatience (Impatience 특성을 고려한 군 긴급정비시스템 정비인력 최적할당 연구)

  • Kim, Sungwoo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.4
    • /
    • pp.449-456
    • /
    • 2021
  • Impatience characteristics are an important factor to be considered in the defense field, which is sensitive to time, but there are not many cases applied. In addition, due to the difficulty of analysis that must consider various probabilistic factors (breakdown/maintenance distribution, impatience characteristics, etc.), military decision makers consider only simple data (number of occurrences per year, maintenance time, etc.) Therefore, in this study, a model capable of analyzing the performance of the emergency maintenance system for determining the appropriate size and organization of military and civilian maintenance personnel was presented in consideration of impatience characteristics and probabilistic factors. And through numerical analysis, the appropriate size of the military and civilian emergency maintenance teams was analyzed. This study is significant in that it can improve readiness of operational power and prevent waste of defense budget through efficient operation of the military's emergency maintenance system.

A Study on the Military Secret Management System Development Plan using RFID (RFID를 이용한 국방 비밀관리시스템 발전방안에 관한 연구)

  • Chung, Young-Ho;Jang, Worl-Su;Park, Mok-Min;Park, Jin-Woo
    • Journal of the military operations research society of Korea
    • /
    • v.33 no.2
    • /
    • pp.151-168
    • /
    • 2007
  • The secret management of the Korea Military is one of the most significant operation. But the present method of the Korea Military requires much manpower and time, also the range of an object of administration become wider. In this study, We look into an instance of KIDA's 'The Secret Management System Construction Project' which was the first case to incorporate RFID in secret management system. From this instance, We analyze the effect of RFID on security operation in terms of the efficiency, accuracy and usability of security administration. We also present expected problems and possible solutions when it is extended to the field unit.

A Study in Considering the Acceptance of Private Military Companies (민간군사기업의 도입방향에 관한 연구)

  • Choi, Eung-Ryul;Song, Hye-Jin;Oh, Sei-Youen
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.337-360
    • /
    • 2008
  • Since the Cold war, many countries in the world have reduced the number of their military personnel. However, it is also factual that regional conflicts have been incessantly occurring around the world. In turn, specific governmental policies are also needed in certain countries. Recently, a resolution growingly accepted in the advanced countries is the outsourcing of the resources and services of private military companies, which benefits for governments to manage their military force efficaciously. The utilization of private military force, however, may potentially generate ethical and practical issues because of the non-specified international codes to regulate private military companies, the political misuse of private personnel without concerning the loss of public military employees in danger zones, the safety of private personnel in the field, and the possibility of genocide. Prior to accept a private military companies which may be adequate in the environment of the Korean military, it is necessary to review previous cases of foreign countries. In addition, it is also needed to determine the plausible boundaries of the operation of private military companies with taking into consideration of the situations of the Korean military and private business. Finally, the systemic governmental support is requested in order to foster the business of private military.

  • PDF

A Study on the Operation Status and Development Strategies of Korean Military Libraries: Focused on the e-Book Services (전자책 서비스 중심의 병영도서관 활성화 방안)

  • Jeon, Kyungsun;Lee, Jisu
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.3
    • /
    • pp.295-324
    • /
    • 2022
  • This study analyzed the operation status of the military library and e-book service in order to improve the soldiers' access to the reading environment and to suggest a plan to revitalize the military library. As a result of the survey, it was found that it is necessary to improve the environment such as the IT environment, devices, and time allowed for access to activate the use of e-books. According to the interview results, problems such as low usage rate and awareness of the digital library, the use of different e-book viewers and management systems for each distributor when distributing e-books, and the dissemination of e-books for the management and accessibility of the Armed Services Editions in library were raised. In order to activate the e-book service of the library in the military, diversify e-book service promotion and education programs, activations such as establish standards for the e-book operating system for each county, use platforms and devices to promote e-book operation and use, and construction of e-book service using Armed Services Editions were derived.

Development of Optimization Method for Anti-Submarine Searching Pattern Using Genetic Algorithm (유전자 알고리즘을 이용한 대잠 탐색패턴 최적화 기법 개발)

  • Kim, Moon-Hwan;Sur, Joo-No;Park, Pyung-Jong;Lim, Se-Han
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.1
    • /
    • pp.18-23
    • /
    • 2009
  • It is hard to find an operation case using anti-submarine searching pattern(ASSP) developed by Korean navy since Korean navy has begun submarine searching operation. This paper proposes the method to develop hull mount sonar(HMS) based optimal submarine searching pattern by using genetic algorithm. Developing the efficient ASSP based on theory in near sea environment has been demanded for a long time. Submarine searching operation can be executed by using ma ulti-step and multi-layed method. however, In this paper, we propose only HMS based ASSP generation method considering the ocean environment and submarine searching tactics as a step of first research. The genetic algorithm, known as a global opination method, optimizes the parameters affecting efficiency of submarine searching operation. Finally, we confirm the performance of the proposed ASSP by simulation.

Development of a heuristic algorithm for the effective design of military information networks (국방 전산망의 효율적인 설계를 위한 휴리스틱 알고리듬 개발)

  • U, Hun-Sik;Yoon, Dong-Won
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.345-360
    • /
    • 2003
  • To build an information oriented armed forces, the Korean military telecommunication networks adopt TCP/IP standard communication infrastructures based on ATM packet switched networks. Utilizing this network infrastructure, the Korean armed forces also applies to the areas of battleship management for efficient operation command controls and resource management for efficient resource allocations. In this military communication networks, it is essential to determine the least cost network topology under equal performance and reliability constraints. Basically, this type of communication network design problem is known in the literature as an NP Hard problem. As the number of network node increases, it is very hard to obtain an optimal solution in polynomial time. Therefore, it is reasonable to use a heuristic algorithm which provides a good solution with minimal computational efforts. In this study, we developed a simulated annealing based heuristic algorithm which can be utilized for the design of military communication networks. The developed algorithm provides a good packet switched network topology which satisfies a given set of performance and reliability constraints with reasonable computation times.

  • PDF