• Title/Summary/Keyword: Military strategy

Search Result 386, Processing Time 0.027 seconds

Analysis of the factors of the failure of the North Korean Army's Great Bypass Maneuver to Honam during the Korea War from an indirect approach strategy: Focusing on the Naval and Marine Corps' Tongyeong Amphibious Operation to Stop the "Dislocation" (간접접근전략으로 본 6·25전쟁기 북한군의 호남 방면 대우회기동 실패 요인 분석 -'교란'을 저지한 해군·해병대의 통영상륙작전을 중심으로-)

  • Choi, Ho-jae
    • Maritime Security
    • /
    • v.6 no.1
    • /
    • pp.109-135
    • /
    • 2023
  • The North Korean military's maneuver toward Honam was the fastest maneuver the North Korean army had demonstrated during the Korean War, and it was a threatening attack that forced the Korean and Allied forces to fully adjust the defenses of the Nakdong River. However, when this study analyzed the North Korean military's maneuver toward Honam in terms of indirect approach strategy, there were a number of factors that inevitably led to its failure. In terms of implementing the indirect approach strategy, the North Korean military cited a number of failure factors, including the dispersion of combat forces, the inflexibility of changing the line of operation, the maneuvering of ground forces, and the lack of psychological distaction. However, the North Koreans were preparing for a final "surprise attack," in which the 7th Division, which was following the North Korean 6th Division, took another diversion and attempted to attack in the direction of Tongyeong. With this, the North Koreans intended to break through the Nakdong River defenses and head for Pusan. However, the North Korean attack was ultimately thwarted by the Korean Navy and Marine Corps' Tongyeong Amphibious Operation. With a swift maneuver using the sea as a maneuvering space, the Navy and Marine Corps occupied key points first, creating an advantageous situation and fending off an attack by the North Korean 7th Division. The Navy and Marine Corps' Tongyeong Amphibious Operation finally thwarted the North Korean military's maneuver toward Honam, thus maintaining the Nakdong River defenses.

  • PDF

Object Detection Accuracy Improvements of Mobility Equipments through Substitution Augmentation of Similar Objects (유사물체 치환증강을 통한 기동장비 물체 인식 성능 향상)

  • Heo, Jiseong;Park, Jihun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.3
    • /
    • pp.300-310
    • /
    • 2022
  • A vast amount of labeled data is required for deep neural network training. A typical strategy to improve the performance of a neural network given a training data set is to use data augmentation technique. The goal of this work is to offer a novel image augmentation method for improving object detection accuracy. An object in an image is removed, and a similar object from the training data set is placed in its area. An in-painting algorithm fills the space that is eliminated but not filled by a similar object. Our technique shows at most 2.32 percent improvements on mAP in our testing on a military vehicle dataset using the YOLOv4 object detector.

Development and Application of Effect Measurement Tool for Victory Factors in Offensive Operations Using Big Data Analytics (빅데이터를 통한 공격작전 승리요인 효과측정도구 개발 및 분석 : KCTC 훈련사례를 중심으로)

  • Kim, Gak-Gyu;Kim, Dae-Sung
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.39 no.2
    • /
    • pp.111-130
    • /
    • 2014
  • For the key factors determining victory of combat, many works have been focusing on qualitative analyses in the past. As military training paradigm changes along with technology developments, demands for scientific analysis to prepare future military strength increase regarding military training results, and big data analysis has opened such possibility. We analyze the data from KCTC (Korea Combat Training Center) training to investigate the factors affected victory in offensive operations. In this context, we develop a way to measure the victory and the factors related to it from existing studies and military doctrines. We first identify Independent variables that affect offensive operations through variable selection and propose a mathematical model to explain combat victory by performing multiple regression analysis. We also verify our results with battalion-level live training data as well as previous studies on victory factors in the military doctrines.

An Evaluation Model Development of Technology Green Index(TGI) and It's Application to Defense R&D Projects (기술녹색도 평가모델 개발 및 적용사례)

  • Choi, Don-Oh;Lee, Hyo-Keun;Lim, Jong-Kwang;Lee, Hun-Gon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.3
    • /
    • pp.299-308
    • /
    • 2009
  • In this paper, we have developed an evaluation model of technology green index(TGI) which includes 3 evaluation factors and 13 indicators. Furthermore, as presenting the degree of relative importance among evaluation factors and indicators for all R&D evaluation stages and all green technology areas, and applying the proposed model to 5 defense projects, we have found applicability of the model to evaluation of defense R&D projects. The results of evaluation using this model can be used to monitor the performance of project life cycle and develop R&D investment strategy of green technology using portfolio analysis.

Methods for Solving the Game against Nature with Vector Payoffs (벡터이득 대자연게임의 해법)

  • Kim Yeo-Geun
    • Journal of the military operations research society of Korea
    • /
    • v.9 no.2
    • /
    • pp.61-68
    • /
    • 1983
  • The traditional theories of games are based on an assumption that the payoffs have a single dimension. In reality, any alternative is likely to imply more than one payoff. This paper deals with the game against nature with vector payoffs. The purpose of this paper is to develop methods for finding the practical optimal strategy in the game against nature with vector payoffs. Under the assumption that a prior probability over the stats of nature is given, this paper shows that a practical optimal strategy in this game can be obtained by applying a entropy method in order to assess the payoff weight and by employing the concept of compromise solutions in order to reduce the non-dominated solutions. When subjective payoff weights are unknown as well as known, these methods can be used. A numerical example is given.

  • PDF

A Study on Operational Method of a HMS (HMS 운용방안에 관한 연구)

  • Shin, Seoung Chul;Lee, Chul Mok
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.5
    • /
    • pp.586-593
    • /
    • 2012
  • The Navy is in the process of developing a sonar-operation strategy to increase the effectiveness of underwater target searching capability. HMS is the basic strategy to detect underwater targets. The advantages of HMS is that, it has a short preparation time to operate and can be always used regardless of sea conditions and weather. However, it is difficult to effectively detect underwater targets due to the interaction between marine environments and sonar-operations. During the research, the effectiveness of the HMS system's underwater target searching capability was analyzed by integrating various search and defense patterns, and environment conditions into the simulation. In the simulation the ship search an evasive target within a set region. The simulation presented results for an effective searching and defense methods of underwater targets. These research results can be used as foundation for advancing and improving the sonar operational tactics.

The Security Policy for Big data of US Government (미정부의 빅데이터를 위한 보안정책)

  • Hong, Jinkeun
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.403-409
    • /
    • 2013
  • This paper review about big data policy and security issue of US government. It is introduced Big data R&D initiative strategy and plan, NITRD program, and big data strategy of government. It is presented operation environment of big data in US government, big data information for military operation, major research organization and topic, security guideline and so on.

Design Strategy of Low-Power Node by Analyzing the Hardware Modules in Surveillance and Reconnaissance Sensor Networks (감시정찰 센서네트워크에서 하드웨어 모듈의 소모전력 분석을 통한 저전력 노드 설계 전략)

  • Kim, Yong-Hyun;Yeo, Myung-Ho;Chung, Kwangsue
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.6
    • /
    • pp.761-769
    • /
    • 2012
  • In this paper, we propose a low-power design strategy to minimize energy-consumption for surveillance and reconnaissance sensor networks. The sensor network consists of many different nodes with various operations such as target detection, packet relay, video monitoring, changing protocols, and etc. Each sensor node consists of sensing, computing, communication, and power components. These components are integrated on a single or multiple boards. Therefore, the power consumption of each component can be different on various operation types. First, we identified the list of components and measured power consumption for them from the first prototype nodes. Next, we focus on which components are the main sources of energy consumption. We propose many energy-efficient approaches to reduce energy consumption for each operation type.

A Detailed Method for Establishing Organizational Software Test Policy and Strategy (조직의 소프트웨어 테스트 정책 및 전략 수립 구체화 방안)

  • Jung, Jae-Yong;Kim, Hyeon Soo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.6
    • /
    • pp.784-796
    • /
    • 2019
  • As the size and complexity of software increases, it is important to ensure the quality of software through testing. Many organizations refer to international standards or test process models to improve the quality of software through establishing a systematic test process. However, these standards and process models provide general processes that do not reflect the characteristics of the domain or the organization's test policies and strategies. To establish a test process that reflects the characteristics of the organization, test policies and strategies based on the organization's quality objectives and the organizational and domain characteristics should be reflected. This study proposes specific methods for eliciting activities and information to establish organizational software test policies and strategies that are essential to establishing a test process that reflects the characteristics of the organization and the system.

《삼략(三略)》에서의 초연적(超然的) 숭고(崇高) 의식(意識) 고찰(考察)

  • Lee, Jeong-Mi
    • 중국학논총
    • /
    • no.66
    • /
    • pp.227-264
    • /
    • 2020
  • In Sanyue, the identity of the state and the individual is discussed in terms of the class, ideology, system, moral ethics, tactical strategy, national view, Talent image, etc. and It pursues a historical approach in the world history and an attempt to self-realize in the history of mankind. This literature expresses the strength of military theory and discusses the main core points of the country as a military political and tactical strategy as follows: "Shangyue, zhongyue, and Xiayue. In the Shangyue in Sanyue, it describes how to distinguish the heroes who have been appointed through the ceremony, and it shows the accomplishment of the reason. In zhongyue, we discuss how to distinguish the contingency plan the meaning of change. In Xiayue, we discuss practical thinking of moral ethics and explain the possibility of All the officials and sages angry by considering the safety of the country."