• Title/Summary/Keyword: Modern Warfare

Search Result 92, Processing Time 0.029 seconds

Analyzing the Modern Warfare and Weapon Systems Supported by Improved GPS Informations

  • Ko, Kwang-Soob
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.21 no.3
    • /
    • pp.234-239
    • /
    • 2015
  • This paper focuses on analyzing the modern warfare and weapon systems supported by improved GPS informations. The GPS capability was investigated through the real experimental test for verifying the most recent GPS features under its modernization processing. And then it was verified that such capabilities, accuracy and availability, of a typical L1, C/A code GPS receiver are equivalent to the military receiver's ones. It was also sure that the influence of GPS improved informations on NCW(Network-Centric Warfare), PGM(Precision Guided Munition) and C4SIR(Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance) should be increased and the modern warfare may be strongly dependent on GNSS informations.

The Vision of ROK Army Training System using M&S Technology (전시작전권 전환 관련 미래 육군 M&S체계 발전방향)

  • Han, Bong-Kyu;Kim, Yeek-Hyun;Kang, Jae Kyoung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.5
    • /
    • pp.667-675
    • /
    • 2012
  • Modern warfare has developed into a network based simultaneous and integrated warfare where operations elements are interconnected. Following such change in modern warfare, ROK Army has been making an effort to transform personnel-based military structure into technology-based advanced structure. Considering technological innovations and changes in characteristics of officers and men, ROK Army is developing scientific education and training system to provide demand-focused customized education. To support such transformation in education and training, ROK Army is constantly developing Army training system using advanced M&S technology. This paper describes ROK Army's education and training policy, and elaborates the current status of M&S training system using advanced M&S technology. This paper further discusses the future directions of M&S training system.

A Study on the Analysis of NCW (Network Centric Warfare) Combat Effectiveness Using Cellular Automata Simulation (세포 자동차 시뮬레이션을 이용한 네트워크 중심전 전투효과도 평가 연구)

  • Chung Sung-jin;Cho Sung-jin;Hong Sung-Pil
    • Korean Management Science Review
    • /
    • v.22 no.2
    • /
    • pp.135-145
    • /
    • 2005
  • The recent notion of Network Centric Warfare (NCW) emphasizes the ability to distribute the right information at the right time to maximize the combat effectiveness. Accordingly, in the modern combat system, the importance of non-physical elements, such as a communication system, is increasing. However, an NCW-support communication network system is expensive. Therefore, it is essential to develop a proper combat system evaluation method to establish an efficient NCW-support combat system. Traditionally, combat system effectiveness is measured in terms of physical elements such as men and fire power, Obviously, such method is hardly applicable to a modern combat system. To overcome this difficulty, we propose an evaluation model based on CA (Cellular Automata) simulation. A set of preliminary combat simulations show that CA simulation may be promising in evaluating non-physical element of a modern combat system.

Development of a Digital Receiver for Detecting Radar Signals (레이더 신호 탐지용 디지털수신기 개발)

  • Cha, Minyeon;Choi, Hyeokjae;Kim, Sunghoon;Moon, Byungjin;Kim, Jaeyun;Lee, Jonghyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.3
    • /
    • pp.332-340
    • /
    • 2019
  • Electronic warfare systems are needed to be advantageous in the modern war. Many radar threat signals with various frequency spectrums and complicated techniques exist. For detecting the threats, a receiver with wide and narrow-band digital processing is needed. To process a wide-band searching mode, a polyphase filter bank has become the architecture of choice to efficiently detect threats. A polyphase N-path filter aligns the re-sampled time series in each path, and a discrete Fourier transform aligns phase and separates the sub-channel baseband aliases. Multiple threats and CW are detected or rejected when the signals are received in different sub-channels. And also, to process a narrow-band precision mode, a direct down converter is needed to reduce aliasing by using a decimation filter. These digital logics are designed in a FPGA. This paper shows how to design and develop a wide and narrow-band digital receiver that is capable to detect the threats.

Implementation of VGPO/VGPI Velocity Deception Jamming Technique using Phase Sampled DRFM (위상 샘플방식 DRFM을 이용한 VGPO/VGPI 속도기만 재밍기법 구현)

  • Kim, Yo-Han;Moon, Byung-Jin;Hong, Sang-Guen;Sung, Ki-Min;Jeon, Young-Il;Na, In-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.7
    • /
    • pp.955-961
    • /
    • 2021
  • In modern warfare, the importance of electronic warfare, which carries out a mission that using radio wave to find out enemy information or to protect ally information, has increased. Radar jamming technique is one of the most representative techniques of EA(Electronic Attack), it disturbs and deceives enemy radar system in order to secure ally location information. Velocity deception jamming technique, which is one of the radar jamming techniques, generally operate against pulse-doppler radar which use doppler effect in order to track target's velocity and location. Velocity Deception Jamming Technique can be implemented using DRFM(Digital Radio Frequency Memory) that performs Frequency Modulation. In this paper, I describe implementation method of VGPO/VGPI(Velocity Gate Pull-Off/Pull-In) velocity deception jamming technique using phase-sampled DRFM, and verify the operation of VGPO/VGPI velocity deception jamming technique with board test under signal injection condition.

Understanding Modern Warfare-A focus on the most recent wars led by the United States (현대전쟁에 대한 이해-최근 미국이 주도한 전쟁을 중심으로)

  • Jo, Jeong
    • Journal of National Security and Military Science
    • /
    • s.2
    • /
    • pp.165-200
    • /
    • 2004
  • A look back at the history of war reveals that leaders/nations which were able to recognize beforehand the change in weaponary or the concept of implementing war achieved victory in war(battle) while those that were not able to do so lost. Along with the development of civilization, so too did the characteristics of war : from the first wave of war (ancient, Napoleon's war)$\rightarrow$ the second wave of war (The first and second World War) $\rightarrow$ to the third wave of war (The Gulf War, and the War in Iraq). Especially notable was the American led victory earned in the Afghanistan and Iraq wars which applied the Rapid Decisive Operations(RDO) concept according to the Effects Based Operations(EBO) following the Gulf War and 9.11. This is the time when methods of warfare is changing through development in military science technology and military innovation and when the change of the defense paradigm including those of the Korea - U.S. alliance is required. We should therefore prepare for the future by delving into the analysis of American Modern warfare and learn from it.

  • PDF

A Study on the Analysis of NCW(Network Centric Warfare) Combat Effectiveness Using Cellular Automata Simulation (세포 자동차(Cellular Automata) 시뮬레이션을 이용한 네트워크 중심전 전투효과도 평가 연구)

  • Jeong, Seong-Jin;Jo, Seong-Jin;Hong, Seong-Pil
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2005.10a
    • /
    • pp.3-9
    • /
    • 2005
  • The recent notion of Network Centric Warfare (NCW) emphasizes the ability to distribute right information at the right time to maximize the combat effectiveness. Accordingly, in the modern combat system the importance of non-physical element, such as communication system is increasing. However, an NCW-support communication network system is expensive. Therefore, it is essential to develop a proper combat system evaluation method to establish an efficient NCW-support combat system. Traditionally, combat system effectiveness is measured in terms of physical elements such as men and fire power. Obviously, such method is hardly applicable to a modern combat system To overcome this difficulty, we propose an evaluation model based on CA (Cellular Automata) simulation. A set of preliminary combat simulations show that CA simulation may be promising in evaluating non-physical element of a modem combat system.

  • PDF

The Multi-GNSS Issue and Military Application

  • Ko, Kwangsoob
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2012.10a
    • /
    • pp.128-130
    • /
    • 2012
  • One of the hot issues on GNSS might be that China declared to broadcast the signal of the new Global Navigation Satellite System called Beidou-Compass in December 2011. The multi-GNSS systems with the existing GPS and GLONASS consist of more than 100 GNSS satellites and transmit their signals in near future. Many benefits are expected in accuracy, availability, integrity and increasing anti-jam performance. In this presentation, we have mainly investigated the latest issue for multi- GNSS and discussed spectrum analysis as well as the accuracy improvement issue. The use of the modern weapon system based on satellite navigation information was also briefly investigated in warfare.

  • PDF

Naval Warfare and the Development of the Weapon System in History (역사속 해전과 무기체계 발달양상)

  • Kim, Jeong-hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.144-150
    • /
    • 2013
  • From ancient times to the present day, naval warfare in history is deeply connected with the rise and fall of countries. This study examines which countries won wars by tracing naval warfare that they had carried out. Seven Cases are traced for the analysis including the battle of Salamis and the Poeni War in the ancient period, the battle of Calais in the medieval and modern periods, the Russo-Japanese War in the modern period, and the Falklands War in the present age. The results show three fundamental characteristics. First, countries that won naval warfare were armed with the state-of-the-art weapon systems and conducted joint operations effectively. Second, countries that fought in the usual ways were defeated by challengers. Third, countries such as Athens, Rome, Britain and the United States ascended to the hegemony by winning major naval warfare and then commanding or controlling the sea at their own free will. Countries defeated in these naval warfare, however, descended to the weak powers. In general, countries that won warfare have a tendency to make light of defeated countries, not to introduce new weapon systems from abroad, and to stick to their traditional ways of fighting. These lessons indicate that the ROK military needs to continue the development of new weapon systems at peacetime. In addition, they show that it needs to focus more on the articulation of military doctrines and training systems so that warriors on the battlefield can fight better.

  • PDF

A Simulation Model for the Response of Information-Warfare based on Computer Forensics (정보전대응을 위한 컴퓨터 포렌식스 기반 모의실험1))

  • Choe, Yong-Rak;Ko, Byong-Su;Park, Meong-Chan
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.391-421
    • /
    • 2003
  • While the social activities using Internet become generalized, the side effect of the information security violation is increasing steadily and threaten the countries which is not ready to prevent from offensive penetration such as the Information-fighter or Cyber-military. In this paper, we define the concept and characteristics of the modern Information-Warfare and analyze various kinds of threatened elements and also examine the recent trend in other countries. And introducing Computer Forensics raised recently for the confrontation against the security violation in the future, we will show the developing strategies and the necessity in order to response cyber attacks. These developing strategies can be used to ensure and re-trace the technical evidence for the security violation and to achieve the disaster relief effectively. So we hope that can apply them to the actual preparation through developing cyber trial test of the defense and attack for the Information-Warfare.

  • PDF