• Title/Summary/Keyword: Tactical Information

Search Result 341, Processing Time 0.023 seconds

The Wireless Controller using PCB mounted PIC MICOM Control Method for Tactical Training (PIC MICOM 전술훈련용 무선 센서 컨트롤러)

  • Kim, Sam-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.51-56
    • /
    • 2012
  • Nowadays, For that reason, the tactical training system that were applied to recruit training center and police training, a real-life survivor game place is a drill using conventional training methods that there is no special training system at open terrain and field, there is no training accomplishment in conformity with battlefield situation portrayal. Therefore, this paper developed the tactical training evaluation system and real-time monitoring system that is compensated the defect and controlled sensing, interlock with PC as wireless a way of GUI using PCB mounted MICOM. This system evaluate drill that regulate sensor control module, tactical training system remotely according to what they should do, is installed to fit the occasion as to be reflected or transmission choosingly and is a 24V H/W drive module.

QoS Support in the Air Defense Alternative System (방공작전 예비체계의 QoS 지원)

  • Sim, Dong-Sub;Lee, Young-Ran;Kim, Ki-Hyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.5
    • /
    • pp.903-909
    • /
    • 2010
  • ADAS is the air defense control system performing air surveillance and identification of ROK and near air. This system is self-developed by Air Force, currently operated successfully as the alternative system of MCRC. ADAS processes converting and combining transferred the real time radar data detected by radars. additionally, it displays significant radar data as producing in tracks. Then, it uses the message queue for IPC(Inter Process Communication). the various tactical data processed in the server is ultimately send to the network management process through the message queue for transmitting to the weapon director console. the weapon director receives this transmitted tactical data through the console to execute air defense operations. However, there is a problem that data packet is delayed or lost since the weapon Director does not receive as the amount of tactical data from the server overflowed with air tracks and missions increased. This paper improved the algorism to display and transmit the various tactical data processed from ADAS server to numbers of the weapon director console in the real time without any delay or lost. Improved the algorism, established at exercise, the development server in the real operation network and the weapon director console, is proved by comparing the number of sending tactical data packets in the server and receiving packets in the weapon director.

Future Tactical Communication System Development Plan (미래 전술통신체계의 발전 방안)

  • Kim, Junseob;Park, Sangjun;Cha, Jinho;Kim, Yongchul
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.6
    • /
    • pp.14-23
    • /
    • 2021
  • The Army is making efforts to increase combat power by incorporating technologies related to the Fourth Industrial Revolution into the field of defense. In order to utilize these technologies, it is necessary to develop a military tactical communication system that enables transmission and reception of data between command and control system and weapon systems. Therefore, in this paper, we analyze the tactical communication systems of the other countries, derive the limitations of the tactical communication system currently operating in the military. And, a multi-layered integrated operation structure centered on satellites and plans to provide communication on the move to small units are reviewed. Then, we present the necessity of a large-capacity transmission speed by predicting the amount of data that will be generated from weapon systems of the future, and a plan to efficiently manage the network using intelligent network technology.

A Study on Simulation-Based Worm Damage Assessment on ATCIS (시뮬레이션 기반 육군전술지휘정보체계 웜 피해평가에 관한 연구)

  • Kim, Ki-Hwan;Kim, Wan-Ju;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.1
    • /
    • pp.43-50
    • /
    • 2008
  • The army developed the ATCIS(Army Tactical Command Information System) for the battlefield information system with share the command control information through the realtime. The using the public key and the encryption equipment in the ATCIS is enough to the confidentiality, integrity. But, it is vulnerable about the availability with the zero day attack. In this paper, we implement the worm propagation simulation on the ATCIS infrastructure through the modelling on the ATCIS operation environment. We propose the countermeasures based on the results from the simulation.

Verification Methods of ATE for TICN System (전술정보통신체계 ATE 유효성 검증 방안)

  • Bak, HyeonJeong;Kim, JinSung
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.25 no.4
    • /
    • pp.17-27
    • /
    • 2020
  • In this paper, we proposed verification methods to prove the effectiveness of automatic test equipment (ATE) for weapon systems. Since the test results from the unproven ATE is not reliable and its use is limited as objective data, it is essential to verify the test equipment in order to guarantee the quality level of the unit under test (UUT). Through the suggested methods, it is applied to the ATE of the tactical information communications network (TICN) system to confirm the verification results and to describe the validation results.

Methodology of Interoperating Link-K Track Number in Multi TDLs (다중 전술데이터링크 간 Link-K 트랙 번호 상호운용 기술)

  • Lee, Youn-Jeong;Kim, Sang-Jun;Lim, Man-Yeob
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.12
    • /
    • pp.1186-1195
    • /
    • 2013
  • In modern warfare, the main factor of triumph is superior situation awareness which leads rapid command decision and precisely guided munition, and TDL(Tactical Data Link) is the main communicational enabler. ROK forces currently operate Link-16 with allied forces and are also developing Korean national data link, Link-K which is also planned to be cooperated with Link-16. Assigning participant and track numbers needs agreement between ROK and allied forces, but ROK forces have exclusive authority in assigning numbers in Link-K. This paper proposes the effective method of exchange participant and track numbers between Link-16 and Link-K, and applicability verification in operational test and evaluation will be also presented.

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.

A Study on the Improvement of Transmission Speed of Data Link Processor (전술데이터링크 처리기의 전송 속도 개선에 대한 연구)

  • Lee, Kang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1069-1076
    • /
    • 2019
  • With the development of information and communication technology, the military's battle environment is changing greatly to network centric warfare in where weapon system is connected in a network and carries out mission by exchanging the real-time data. The core of the network centric warfare is Tactical Data Link(TDL) system, and subscribers of TDL exchange tactical information in real time through wireline, wireless and satellite network to share the battlefield situation. The amount of data sent and received through TDL inevitably increase as military's weapon systems equipped with TDL systems increase over time and the performance of communications equipment improves. This study proposes ways to improve the transmission speed and processing capacity of the TDL system by improving the Data Link Processor.

Dynamic QoS Mechanism for supporting VoIP Service in Tactical Communication Environment (전술환경에서의 VoIP 서비스를 위한 Dynamic QoS 기법 연구)

  • Shin, Dong-Yun;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.2078-2083
    • /
    • 2012
  • Tactical communication environment evolving for the purpose of providing services such as voice, video and text based on ALL-IP. Therefore, To be able to guarantee QoS level which meets the required level of subscriber for these services in the constrained tactical communication infrastructure, it is required to take the characteristics such as wireless transmission link, mobility of troops or personal into service quality scheme. In this paper, to support differentiated QoS for each individual or mission in the tactical communication environment, we presents a technique that can provide same QoS level which was served originally regardless of the situation to user's move through dynamically determining the QoS level to be provided at the time of the service request on VoIP-Switch.

Improvement and Verification of TMFT Power Circuit Design (전술다기능단말기(TMFT)의 전원회로 설계 개선 및 검증)

  • Kim, Jin-Sung;Kim, Byung-Jun;Kim, Byung-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.2
    • /
    • pp.357-362
    • /
    • 2020
  • The TMFT, a sub-system of TINC, provides voice calls, data transmission and reception, and multimedia services to individual users. At the time of development in 2011, the power circuit of the TMFT was designed to electrical power supply to each device via a charger IC. However, the newly improved power supply circuit allows power to be supplied to each device through the PMIC without configuring the charger IC separately. In this paper, the power circuit design structure of TMFT applied in the development stage and the improved power circuit design structure were compared. And we verified through experiments whether the improved power circuit can be applied to TMFT. The experimental method was verified by directly comparing the current consumption test, charge time comparison test, and rising temperature test during charging each of before and after improvement terminals.