• Title/Summary/Keyword: Tactical Information

Search Result 342, Processing Time 0.023 seconds

Estimation of Probability Distribution of L-Band Interference Environment Based on Field Measurement Data (전파 측정 데이터 기반 L 대역 간섭 환경 확률분포 추정)

  • Oh, Janghoon;Kim, Jong-Sung;Yoon, Dongweon;Park, Namhyoung;Choi, Hyogi
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.3
    • /
    • pp.22-28
    • /
    • 2017
  • In modern electronic warfare, a variety of devices are being operated in the fields for the purposes of communication and surveillance. Therefore, if such devices work in the same band, interference may occur and affect each other. Regarding L-band in which various devices including radar systems are operating, interference from existing devices may affect new ones in the band. In this paper, we estimate a probability distribution of the interference environment in L-band from the selected measurement data, which is fundamental for the mathematical analysis. After selecting the candidates of probability distribution, we suggest the best one from the group. The results of this study are expected to be utilized as fundamental data for the mathematical approach to the L-band interference environment.

Analysis of scientific military training data using zero-inflated and Hurdle regression (영과잉 및 허들 회귀모형을 이용한 과학화 전투훈련 자료 분석)

  • Kim, Jaeoh;Bang, Sungwan;Kwon, Ojeong
    • Journal of the Korean Data and Information Science Society
    • /
    • v.28 no.6
    • /
    • pp.1511-1520
    • /
    • 2017
  • The purpose of this study is to analyze military combat training data to improve military operation and training methods and verify required military doctrine. We set the number of combat disabled enemies, which the individual combatants make using their weapons, as the response variable regarding offensive operations from scientific military training data of reinforced infantry battalion. Our response variable has more zero observations than would be allowed for by the traditional GLM such as Poisson regression. We used the zero-inflated regression and the hurdle regression for data analysis considering the over-dispersion and excessive zero observation problems. Our result can be utilized as an appropriate reference in order to verify a military doctrine for small units and analysis of various operational and tactical factors.

An Enhanced Data Communication Protocol based on HF Radios for supporting Naval Operations (해상작전 지원을 위한 HF 무전기 기반 개선된 데이터 통신 프로토콜)

  • Lee, Seung Gu;Kang, Seung Nam;Lee, Soon Bok;So, Eul-Deuk;Lim, Jae Sung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.10
    • /
    • pp.1990-1998
    • /
    • 2017
  • The success of naval operation prioritizes the implementation of a robust communication network that delivers accurate and prompt communications to one another. The satellite, which is the main communication network of the military, is required to construct a preliminary communication network because of the enemy radio disturbance and weak point of fixed antenna. The military operational communication network has been in transition from voice-centered wireless communication network to text message-based communication network. In this paper we suggest an enhanced communication method built on Roll Call, the main communication method of ROK Navy operating tactical data link called Link-11. Simulation results display that the proposed method reduces the transmission time per unit frame by 4.3 times compared to the Roll Call and 6.3 times compared with the Round Robin & Broadcasting; it is also proved that the higher the direct reception rate, the shorter the transmission time required by 1.6 times maximum.

An Enhanced MELP Vocoder in Noise Environments (MELP 보코더의 잡음성능 개선)

  • 전용억;전병민
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.1C
    • /
    • pp.81-89
    • /
    • 2003
  • For improving the performance of noise suppression in tactical communication environments, an enhanced MELP vocoder is suggested, in which an acoustic noise suppressor is integrated into the front end of the MELP algorithm, and an FEC code into the channel side of the MELP algorithm. The acoustic noise suppressor is the modified IS-127 EVRC noise suppressor which is adapted for the MELP vocoder. As for FEC, the turbo code, which consists of rate-113 encoding and BCJR-MAP decoding algorithm, is utilized. In acoustic noise environments, the lower the SNR becomes, the more the effects of noise suppression is increased. Moreover, The suggested system has greater noise suppression effects in stationary noise than in non-stationary noise, and shows its superiority by 0.24 in MOS test to the original MELP vocoder. When the interleave size is one MELP frame, BER 10-6 is accomplished at channel bit SNR 4.2 ㏈. The iteration of decoding at 3 times is suboptimal in its complexity vs. performance. Synthetic quality is realized as more than MOS 2.5 at channel bit SNR 2 ㏈ in subjective voice quality test, when the interleave size is one MELP frame and the iteration of decoding is more than 3 times.

A Novel Implementation of Fault-Tolerant Ethernet NIC (Network Interface Card) Using Single MAC (단일 MAC을 이용한 자동 고장 극복 Ethernet NIC (Network Interface Card) 장치 구현)

  • Kim, Se-Mog;Pham, Hoang-Anh;Lee, Dong-Ho;Rhee, Jong Myung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1162-1169
    • /
    • 2012
  • One of the important operational requirements for mission critical Ethernet networked system is having the fault tolerant capability. Such capability can be obtained by equipping multiport Network Interface Card (NIC) in each node in the system. Conventional NIC uses two or more Media Access Controls (MACs) and a co-processor for the MAC switching whenever an active port fails. Since firmware is needed for the co-processor, longer fail-over switching and degraded throughput can be generally expected. Furthermore the system upgrading requiring the firmware revision in each tactical node demands high cost. In this paper we propose a novel single MAC based NIC that does not use a co-processor, but just use general discrete building blocks such as MAC chip and switching chip, which results in better performances than conventional method. Experimental results validate our scheme.

Resource Reservation Based Image Data Transmission Scheme for Surveillance Sensor Networks (감시정찰 센서 네트워크를 위한 자원예약 기반 이미지 데이터 전송 기법)

  • Song, Woon-Seop;Jung, Woo-Sung;Ko, Young-Bae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.11
    • /
    • pp.1104-1113
    • /
    • 2014
  • Future combat systems can be represented as the NCW (Network Centric Warefare), which is based on the concept of Sensor-to-Shooter. A wireless video sensor networking technology, one of the core components of NCW, has been actively applied for the purpose of tactical surveillance. In such a surveillance sensor network, multi-composite sensors, especially consisting of image sensors are utilized to improve reliability for intrusion detection and enemy tracing. However, these sensors may cause a problem of requiring very high network capacity and energy consumption. In order to alleviate this problem, this paper proposes an image data transmission scheme based on resource reservation. The proposed scheme can make it possible to have more reliable image data transmission by choosing proper multiple interfaces, while trying to control resolution and compression quality of image data based on network resource availability. By the performance analysis using NS-3 simulation, we have confirmed the transmission reliability as well as energy efficiency of the proposed scheme.

An Enhanced DAP-NAD Scheme for Multi-Hop Transmission in Combat Net Radio Networks (전투 무선망에서 다중 홉 전송을 위한 향상된 DAP-NAD 기법)

  • Jung, Jong-Kwan;Kim, Jong-Yon;Roh, Byeong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.977-985
    • /
    • 2012
  • Recently, many countries have been developing new protocols to improve the performance of tactical ad hoc networks for implementing NCW (Network Centric Warfare). Combat net radio (CNR) networks are the most important communication infra for the ground forces such as infantry of Army. U.S. Army had developed MIL-STD-188-220D that is the Interoperability Standard for DMTDs (Digital Messages Transfer Device Subsystems) for voice and data communication in CNR. MIL-STD-188-220D is a candidate for MAC protocol of TMMR which is next radio and has a few constraints to used in TMMR. NAD (Network Access Delay) defined in MIL-STD-188-220D needs time synchronization to avoid collision. However, it is difficult for time synchronization to fit in multi-hop environment. We suggest the enhanced DAP (Deterministic Adaptable Priority)-NAD to prevent conflicts and decrease delays in multi-hop CNR. Simulation results show that the proposed scheme improves the performance in multi-hop CNR networks.

k-hop Flooding-based Multicast Considering the Limited Mobility of Mobile Nodes and Intermittent Disconnection (노드의 제한적 이동성과 간헐적인 연결 단절을 고려한 k-홉 플러딩 기반 멀티캐스트)

  • Im, Kwang-Bin;Kang, Kyung-Ran;Cho, Young-Jong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6A
    • /
    • pp.600-610
    • /
    • 2010
  • In this paper, a multicast mechanism is proposed for intermittently disconnected networks where the nodes move forward in formation or within a limited area. The proposed scheme extends the well-known tree-based multicast routing mechanism called MAODV by modifying the tree construction and data delivery scheme. Especially, an algorithm is introduced which determines the flooding hop count k estimating the degree of the movement of children in the tree. The performance evaluation was done by the simulation and the proposed scheme was compared with MAODV and two multicast routing schemes for DTN (Disruption Tolerant Network) including the Epidemic routing and ST-multicast. The evaluation results show that our scheme improves the original MAODV from the aspect of tree reconstruction events and message delivery ratio. Compared with the Epidemic routing scheme, our scheme achieves 85% message delivery ratio with less than 50% message delivery overhead.

The Analysis of Crypto Communication Relay Effect in the Security Framework Technique of Network Centric Warfare Environment (NCW환경의 보안 프레임워크 기술에서 암호통신 중계영향 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.4
    • /
    • pp.788-794
    • /
    • 2007
  • The policy of US DoD is moving towards implementation of Network Centric Warfare(NCW) concepts. NCW is commonly described as the integration and synchronization of four key interdependent elements such as command and control, sensor system, engagement systems and the network. Therefore the military policy of Korea military is needed to access and examine the policy of NCW communication environment and crypto communication, which is able to apply it. In this case study, We are reviewed the security framework of the concept of network centric warfare in the centering around the US. It is introduced the core technology in the network centric warfare, and it is reviewed the security framework such as, the requirements of security, the characteristics security of global information grid, joint tactical radion system, net centric enterprise services, transformational communication satellite, in the basis of core technology, and analysis the effect of crypto communication relay between command node and surbornate node in NCW environment. This report support the assistance, which is considered the elements of surrounding effects in the varied crypto communication research area of NCW.

  • PDF

A Study on National Strategy For Countering the New Terrorism As Network War (네트워크 전쟁의 도래와 테러리즘의 새로운 흐름 - 국가대응전략을 중심으로 -)

  • Ahn, Hee-Nam;Jang, Ki-Boong
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.137-159
    • /
    • 2008
  • In the 21st century, the Information Revolution caused unpredictable kinds of complications. Human society conducts a tactical network war like Swarming. Network war simultaneously consists of merits such as global monitoring and anti-dictatorship campaign, and violent demerits like terrorism. It has been becoming a generalization of terrorism of the present time to build a brotherhood and ideology to commit terrorism. This is considered as new terrorism, a form of network war. Theses days, terror organizations including Al Qaeda establish a brotherly network to commit terrorism when and where they want. New terrorism is a novel form that harms unspecified individuals. In fact, many countries have been experiencing damage from new terrorism. It is becoming an urgent issue to every country to prepare a suitable plan that cope with new terrorism. This dissertation provides defense strategy in macro and micro aspect as a responding scheme to new terrorism.

  • PDF