• Title/Summary/Keyword: Unmanned Combat System

Search Result 61, Processing Time 0.025 seconds

Performance Enhancement of Virtual War Field Simulator for Future Autonomous Unmanned System (미래 자율무인체계를 위한 가상 전장 환경 시뮬레이터 성능 개선)

  • Lee, Jun Pyo;Kim, Sang Hee;Park, Jin-Yang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.10
    • /
    • pp.109-119
    • /
    • 2013
  • An unmanned ground vehicle(UGV) today plays a significant role in both civilian and military areas. Predominantly these systems are used to replace humans in hazardous situations. To take unmanned ground vehicles systems to the next level and increase their capabilities and the range of missions they are able to perform in the combat field, new technologies are needed in the area of command and control. For this reason, we present war field simulator based on information fusion technology to efficiently control UGV. In this paper, we present the war field simulator which is made of critical components, that is, simulation controller, virtual image viewer, and remote control device to efficiently control UGV in the future combat fields. In our information fusion technology, improved methods of target detection, recognition, and location are proposed. In addition, time reduction method of target detection is also proposed. In the consequence of the operation test, we expect that our war field simulator based on information fusion technology plays an important role in the future military operation significantly.

A Path Planning to Maximize Survivability for Unmanned Aerial Vehicle by using $A^*PS$-PGA ($A^*PS$-PGA를 이용한 무인 항공기 생존성 극대화 경로계획)

  • Kim, Ki-Tae;Jeon, Geon-Wook
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.34 no.3
    • /
    • pp.24-34
    • /
    • 2011
  • An Unmanned Aerial Vehicle (UAV) is a powered pilotless aircraft, which is controlled remotely or autonomously. UAVs are an attractive alternative for many scientific and military organizations. UAVs can perform operations that are considered to be risky or uninhabitable for human. UA V s are currently employed in many military missions such as reconnaissance, surveillance, enemy radar jamming, decoying, suppression of enemy air defense (SEAD), fixed and moving target attack, and air-to-air combat. UAVs also are employed in a number of civilian applications such as monitoring ozone depletion, inclement weather, traffic congestion, and taking images of dangerous territory. For accomplishing the UAV's missions, guarantee of survivability should be preceded. The main objective of this study is to suggest a mathematical programming model and a $A^*PS$-PGA (A-star with Post Smoothing-Parallel Genetic Algorithm) for an UAV's path planning to maximize survivability. A mathematical programming model is composed by using MRPP (Most Reliable Path Problem) and TSP (Traveling Salesman Problem). A path planning algorithm for UAV is applied by transforming MRPP into SPP (Shortest Path Problem).

Agent-based Modeling and Analysis of Tactical Reconnaissance Behavior with Manned and Unmanned Vehicles (에이전트 기반 유·무인 수색정찰 전술행위 모델링 및 분석)

  • Kim, Ju Youn;Han, Sang Woo;Pyun, Jai Jeong
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.4
    • /
    • pp.47-60
    • /
    • 2018
  • Today's unmanned technology, which is being used in various industries, is expected to be able to make autonomous judgements as autonomous technology matures, in the long run aspects. In order to improve the usability of unmanned system in the military field, it is necessary to develop a technique for systematically and quantitatively analyzing the efficiency and effectiveness of the unmanned system by means of a substitute for the tasks performed by humans. In this paper, we propose the method of representing rule-based tactical behavior and modeling manned and unmanned reconnaissance agents that can effectively analyze the path alternatives which is required for the future armored cavalry to establish a reconnaissance mission plan. First, we model the unmanned ground vehicle, small tactical vehicle, and combatant as an agent concept. Next, we implement the proposed agent behavior rules, e.g., maneuver, detection, route determination, and combatant's dismount point selection, by NetLogo. Considering the conditions of maneuver, enemy threat elements, reconnaissance assets, appropriate routes are automatically selected on the operation area. It is expected that it will be useful in analyzing unmanned ground system effects by calculating reconnaissance conducted area, time, and combat contribution ratio on the route.

Trajectory Generation, Guidance, and Navigation for Terrain Following of Unmanned Combat Aerial Vehicles (무인전투기 근접 지형추종을 위한 궤적생성 및 유도 항법)

  • Oh, Gyeong-Taek;Seo, Joong-Bo;Kim, Hyoung-Seok;Kim, Youdan;Kim, Byungsoo
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.40 no.11
    • /
    • pp.979-987
    • /
    • 2012
  • This paper implements and integrates algorithms for terrain following of UCAVs (Unmanned Combat Aerial Vehicles): trajectory generation, guidance, and navigation. Terrain following is very important for UCAVs because they perform very dangerous missions such as Suppression of Enemy Air Defences while the terrain following can improve the survivability of UCAVs against from the air defence systems of the enemy. To deal with the GPS jamming, terrain referenced navigation based on nonlinear filter is chosen. For the trajectory generation, Voronoi diagram is adopted to generate horizontal plane path to avoid the air defense system. Cubic spline method is used to generate vertical plane path to prevent collisions with ground while flying sufficiently close to surface. Follow-the-Carrot and pure pursuit tracking methods, which are look-ahead point based guidance algorithms, are applied for the guidance. Numerical simulation is performed to verify the performance of the integrated terrain following algorithm.

Security Threats and Scenarios using Drones on the Battlefield (전장에서 드론을 활용한 보안 위협과 시나리오)

  • Park, Keun-Seog;Cheon, Sang-pil;Kim, Seong-Pyo;Eom, Jung-ho
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.73-79
    • /
    • 2018
  • Since 1910s, the drones were mainly used for military purposes for reconnaissance and attack targets, but they are now being used in various fields such as disaster prevention, exploration, broadcasting, and surveillance of risk areas. As drones are widely used from military to civilian field, hacking into the drones such as radio disturbance, GPS spoofing, hijacking, etc. targeting drones has begun to occur. Recently, the use of drones in hacking into wireless network has been reported. If the artificial intelligence technology is applied to the drones in the military, hacking into unmanned combat system using drones will occur. In addition, a drone with a hacking program may be able to relay a hacking program to the hacking drone located far away, just as a drone serves as a wireless communication station. And the drones will be equipped with a portable GPS jamming device, which will enable signal disturbance to unmanned combat systems. In this paper, we propose security threats and the anticipated hacking scenarios using the drones on the battlespace to know the seriousness of the security threats by hacking drones and prepare for future cyberspace.

  • PDF

Hacking attack and vulnerability analysis for unmanned reconnaissance Tankrobot (무인정찰 탱크로봇에 대한 해킹 공격 및 취약점 분석에 관한 연구)

  • Kim, Seung-woo;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.9
    • /
    • pp.1187-1192
    • /
    • 2020
  • The dronebot combat system is a representative model of the future battlefield in the 4th industrial revolution. In dronebot, unmanned reconnaissance tankrobot can minimize human damage and reduce cost with higher combat power than humans. However, since the battlefield environment is very complex such as obstacles and enemy situations, it is also necessary for the pilot to control the tankrobot. Tankrobot are robots with new ICT technology, capable of hacking attacks, and if there is an abnormality in control, it can pose a threat to manipulation and control. A Bluetooth sniffing attack was performed on the communication section of the tankrobot and the controller to introduce a vulnerability to Bluetooth, and a countermeasure using MAC address exposure prevention and communication section encryption was proposed as a security measure. This paper first presented the vulnerability of tankrobot to be operated in future military operations, and will be the basic data that can be used for defense dronebot units.

Feasibility Study of Developing Ship Engineering Control System based on DDS Middle-ware (DDS 미들웨어 기반의 선박 통합기관감시제어체계 개발 가능성 연구)

  • Seongwon Oh
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.6
    • /
    • pp.653-658
    • /
    • 2023
  • In systems like the combat management system of a naval ship or smart city of civilians, where many sensors and actuators are connected, the middle-ware DDS (Data Distribution Service) is mainly used to transmit large amounts of data. It is scalable and can effectively respond to the increase in sensors or equipment connected to the system in the future. The engineering control system (ECS), which plays an important role similar to the combat management system of a naval ship, still uses Server-Client model with industrial protocols such as Modbus and CAN (Controller Area Network) bus, to transmit data, which is unfavorable in terms of scalability. However, as automation and unmanned systems advance, more sensors and actuators are expected to be added, necessitating substantial program modification. DDS can effectively address such situations. The purpose of this study is to confirm the development possibility of an integrated monitoring and control system of a ship by using OpenDDS, which follows the OMG (Object Management Group) standard among the middle-ware DDS used in the combat management system. To achieve this goal, field equipment simulators and an ECS server were configured to perform field equipment data input/output and simulation using DDS was performed. The ECS prototype successfully handled data transmission, confirming that DDS is capable of serving as the middle-ware for the ECS of a ship.

A Study on the Robot Teleoperation for Mine Removal (지뢰제거를 위한 로봇 텔레오퍼레이션 기술 연구)

  • Lim, Soo-Chul;Yoo, Sam-Hyeon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.6
    • /
    • pp.156-163
    • /
    • 2008
  • Future Combat System(FCS), such as unmanned systems that reduce the danger faced by soldiers in the field, are likely to be studied and developed. Soldiers when finding and disposing of mines risk injury and death. Several methods of safe mine retrieval are investigated. In this paper, a mine removal method, which uses a remote controlled robot to get rid of mines using a 4 channel architecture teleoperation method is used. The robot, when in contact with soil and mines, is controlled by a remote control. The feasibility of using teleoperation controlled system to remove mines is demonstrated in this paper. The Matlab-Simulink was used as a tool to simulate mine removal with robots. The force and position of the robot{slave system of 4 channel architecture) and controller(master system of 4 channel architecture) are analyzed when users handle the controller with sinusoidal force.

A DLRF(Diode Laser Range Finder) Using the Cumulative Binary Detection Algorithm (레이저 다이오드를 이용한 이진 신호누적 방식의 거리측정기 기술)

  • Yang, Dong-Won
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.10 no.4
    • /
    • pp.152-159
    • /
    • 2007
  • In this paper, a new design technique on the LRF which is useful for low power laser and a CBDA(Cummulative Binary Detection Algorithm) is proposed. The LD(Laser Diode) and Si-APD(Silicon Avalanche Photo Diode) are used for saving a power. In order to prove the detection range, the Si-APD binary data are accumulated before the range computation and the range finding algorithm. A prototype of the proposed DLRF(Diode Laser Range Finder) system was made and tested. An experimental result shows that the DLRF system have the same detection range using a less power(almost 1/32) than an usual military LRF. The proposed DLRF can be applied to the Unmanned Vehicles, Robot and Future Combat System of a tiny size and a low power LRF.

Unmanned Aircraft Platform Based Real-time LiDAR Data Processing Architecture for Real-time Detection Information (실시간 탐지정보 제공을 위한 무인기 플랫폼 기반 실시간 LiDAR 데이터 처리구조)

  • Eum, Junho;Berhanu, Eyassu;Oh, Sangyoon
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.12
    • /
    • pp.745-750
    • /
    • 2015
  • LiDAR(Light Detection and Ranging) technology provides realistic 3-dimension image information, and it has been widely utilized in various fields. However, the utilization of this technology in the military domain requires prompt responses to dynamically changing tactical environment and is therefore limited since LiDAR technology requires complex processing in order for extensive amounts of LiDAR data to be utilized. In this paper, we introduce an Unmanned Aircraft Platform Based Real-time LiDAR Data Processing Architecture that can provide real-time detection information by parallel processing and off-loading between the UAV processing and high-performance data processing areas. We also conducted experiments to verify the feasibility of our proposed architecture. Processing with ARM cluster similar to the UAV platform processing area results in similar or better performance when compared to the current method. We determined that our proposed architecture can be utilized in the military domain for tactical and combat purposes such as unmanned monitoring system.