• Title/Summary/Keyword: Weapon

Search Result 1,421, Processing Time 0.027 seconds

A Study on the Design of KVMF 2.0 Protocol for Ensuring Backward/Forward Compatibility between Different KVMF Message Standard Versions

  • Jeong-Min, Lee;Won-Gi, Lim;Won-Jun, Cho;Yong-Cheol, Kim;Jeung-Sub, Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.3
    • /
    • pp.45-58
    • /
    • 2023
  • KVMF(Korean Variable Message Format) 1.0 protocol is the Army's standard tactical datalink protocol that defines standard messages and communication methods to enable data communication between various weapon systems through bitwise variable message processing. The protocol has been applied to a variety of Army weapon systems over the past decade and has contributed to upgrade the Army's operational capabilities by enabling the implementation of Network Centric Warfare (NCW), the core of modern warfare. Since the KVMF 1.0 protocol was applied, new weapon systems with new technologies have been introduced over time, and new weapon systems have new messages based on the characteristics of the weapon system. As a result, compatibility problems arose due to different message versions with existing weapon systems, and it was expected that these problems would continue to emerge in the future, considering the need for continuous message revisions. Therefore, it became necessary to solve this problem, so this paper proposed a KVMF 2.0 protocol design that guarantees compatibility between forward and backward versions. In this paper, we implemented the design as SW, and confirmed that the design worked successfully by test between forward and backward versions on test environment. Therefore, when the KVMF 2.0 protocol design is applied to a weapon system, we can expect that the weapon system can be compatible with the forward and backward versions working with the existing weapon systems as well as with the future weapon systems.

LVC-Interoperation Development Framework for Acquiring High Reliable Cyber-Physical Weapon Systems (고신뢰 사이버-물리 무기체계 획득을 위한 LVC 연동 개발 프레임워크)

  • Kang, Sungjoo;Kim, Minjo;Park, Jungmin;Chun, Ingeol;Kim, Wontae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.12
    • /
    • pp.1228-1236
    • /
    • 2013
  • In this paper, we present a development framework for acquiring intelligent but complex cyber-physical weapon systems based on modeling and simulation development tools for cyber-physical systems, EcoSUITE. We introduce EcoPOD that models weapon systems and EcoSIM that provides constructive simulation environment for interoperating the weapon model to be developed with other weapon models. To develop cyber-physical weapon system based on LVC interoperation, an interoperation architecture and an interface technique for a live and a virtual system that is compliant with the interoperation architecture. By expanding EcoSuite, we provide LVC-based development framework for interoperating a real system, a human-interactive interface system, and simulation models and validate it with a case study.

Simulation Reconfiguration using Entity Plug-in approach for Weapon System Effectiveness Analysis (무기체계 효과도 분석을 위한 개체 플러그인 방식의 모의 재구성 연구)

  • Kim, Taeyoung
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.2
    • /
    • pp.49-59
    • /
    • 2018
  • The simulation-based weapon system effectiveness analysis is to support the decision making in the acquisition process of the defense domain. The effectiveness of the weapon system is a complexly influenced indicator from various factors such as environment, doctrine and so on. And the measurement of effectiveness can be defined differently in compliance with major issues in the weapon system. Because of this, the weapon system effectiveness analysis requires the comparative experiment of various alternatives based on the underlying assumption. This paper presents the efficient approach to reconfigure the simulation using the reflection technique. The proposed method contains the recoupling and resetting the simulation entity using DEVS(Discrete EVent System specification) formalism-based dynamic plug-in method. With the proposed method, this paper designs the effectiveness analysis environment that can efficiently handle the various alternatives of the weapon system.

Optimal Weapon-Target Assignment Algorithm for Closed-In Weapon Systems Considering Variable Burst Time (가변 연속사격 시간을 고려한 근접 방어 시스템의 최적 무장 할당 알고리듬)

  • Kim, Bosoek;Lee, Chang-Hun;Tahk, Min-Jea;Kim, Da-Sol;Kim, Sang-Hyun;Lee, Hyun-Seok
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.5
    • /
    • pp.365-372
    • /
    • 2021
  • This paper deals with an optimal Weapon-Target Assignment (WTA) algorithm for Closed-In Weapon Systems (CIWS), considering variable burst time. In this study, the WTA problem for CIWS is formulated based on Mixed Integer Linear Programming (MILP). Unlike the previous study assuming that the burst time is fixed regardless of the engagement range, the proposed method utilizes the variable burst time based on the kill probability according to the engagement range. Thus, the proposed method can reflect a more realistic engagement situation and reduce the reaction time of CIWS against targets, compared to the existing method. In this paper, we first reformulate the existing MILP-based WTA problem to accommodate the variable burst Time. The proposed method is then validated through numerical simulations with the help of a commercial optimization tool.

A Study on Analysis Model for Weapon Acquisition Alternatives (국방 무기체계 획득방안 연구 방법론 제안)

  • Lee, Ji-Young
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.6
    • /
    • pp.91-96
    • /
    • 2019
  • Recently, it is expected for requirement for more scientific research of weapon systems acquisition alternatives with reliability and objectivity. For these needs, study on methodology of weapon systems acquisition alternatives is but on-going, but it is still in its early stages and is unprofessional. We compared general decision making methods, government development program decision making methods, methodologies of weapon systems acquisition alternatives research such as AHP, ANP, KAAM and proposed AHP as weapon acquisition analysis. This study guarantees objectivity and derives scientific research results reliability by analyzing and comparing comprehensive elements such as cost, effectiveness, deployment schedule, program management risk. Further study on AHP weight and other decision making methods is needed considering category of weapon systems and program characteristics.

A Study on Generating Meta-Model to Calculate Weapon Effectiveness Index for a Direct Fire Weapon System (직사화기 무기체계의 무기효과지수 계산을 위한 메타모델 생성방법 연구)

  • Rhie, Ye Lim;Lee, Sangjin;Oh, Hyun-Shik
    • Journal of the Korea Society for Simulation
    • /
    • v.30 no.2
    • /
    • pp.23-31
    • /
    • 2021
  • Defense M&S(Modeling & Simulation) requires weapon effectiveness index which indicates Ph(Probability of hit) and Pk(Probability of kill) values on various impact and environmental conditions. The index is usually produced by JMEM(Joint Munition Effectiveness Manual) development process, which calculates Pk based on the impact condition and circular error probable. This approach requires experts to manually adjust the index to consider the environmental factors such as terrain, atmosphere, and obstacles. To reduce expert's involvement, this paper proposes a meta-model based method to produce weapon effectiveness index. The method considers the effects of environmental factors during calculating a munition's trajectory by utilizing high-resolution weapon system models. Based on the result of Monte-Carlo simulation, logistic regression model and Gaussian Process Regression(GPR) model is respectively developed to predict Ph and Pk values of unobserved conditions. The suggested method will help M&S users to produce weapon effectiveness index more efficiently.

Measures for Improvement of RAM Target Value Setting Methods for Submarine Weapon Systems (잠수함 무기체계 RAM 목표 값 설정 방식의 개선방안)

  • Jung, Sun-uk;Shim, Hang-geun;Choi, Myoung-jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.4
    • /
    • pp.419-427
    • /
    • 2020
  • In the case of large combined weapon systems, such as submarines, the application, and verification of methods of setting the reliability, availability, and maintainability (RAM) target values for conventional weapon systems are limited. Submarines are complex weapon systems with the characteristics of the diversity of operation mode summary and mission profiles (OMS/MP) as well as equipment complexity because they are composed of multiple weapon systems, such as sonar systems and armed systems. Therefore, this study analyzed the development cases of existing weapon systems, i.e., the RAM target value-setting cases, and derived the problems and limitations of the cases to present measures to improve the setting and verification of the ram target values of submarines. In addition, submarines operate around the world and have different operating and maintenance conditions. Therefore, a submarine's ram target values should be set and verified centering on the mission essential equipment and mission critical equipment, instead of all components that constitute weapon systems. This study examined a method to verify the required performance RAM target-value setting, considering the characteristics of submarines as well as the physical performance requirements for the systems and equipment of submarines that must be considered when implementing national defense acquisition projects for submarines.

A Probabilistic Prediction of Weapon Systems Evaluation Test Execution Ratio and Management Scheme (무기체계 평가시험 수행율의 확률적 예측 및 관리기법)

  • Jang, Young-sik;Han, Sung-hee;Han, Hyun-goo;Mun, Chang-min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.468-474
    • /
    • 2017
  • A test service for the weapon systems evaluation is one of the most important processes during the weapon systems acquisition or development life cycle. Before completion of weapon systems development, the appropriate evaluation test can reduce risk and expense which might be expected during weapon systems development procedure. In this paper, it is suggested that a probabilistic prediction method based on Monte Carlo simulation for how much the annual weapon systems evaluation test excution ratio can be reached compared to the yearly initial planned test quantity. And then a weapon systems evaluation test quantitative management scheme is suggested to assist decision making for the test schedule manager who can arrange monthly test schedule based on the prediction result of annual test excution ratio. And the proposed method is applied for the weapon systems evaluation firing test data of the 8th directorate, Agency for Defense Development(ADD). And also the application result is examined.

A Study on Pk(Probability of Kill) Calculation Method of the Direct Fire Weapon System using Simulation (시뮬레이션 기반 직사화기 무기체계의 살상확률 산정 방법에 관한 연구)

  • Choi, Yun Ho;Lee, Ki Teak;Pyun, Jai Jeong;Jang, Young Cheon
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.3
    • /
    • pp.115-123
    • /
    • 2017
  • Dispite the fact that our military has outwardly made notable accomplishments such as the development of weapon systems like tanks, self-propelled artillery, and missiles, there has been a lack of attention to producing weapon effectiveness data that suggests a standard as to what effects the developed weapons will demonstrate on the battlefield. For such reasons, most of the weapon effectiveness data utilizes JMEM data introduced by the United States and as for the rest of the data that cannot be acquired, respective branches create and utilize their own data through research. This research aims to develop a reliable methodology that can meet the requirements of the requesting branches in a short span of time and at a low cost by studying the existing weapon effectiveness data production methodologies such as that of JMEM. As a result I have developed a method that calculates the vulnerable area and the probability of kill of the weapon system that one wants to calculate by applying statistical technique and simulation technique based on weapon effectiveness data of similar weapon systems in JMEM and live test data.

A Study on the Framework for Analyzing the Effectiveness of Cyber Weapon Systems Associated with Cyberspace and Physical Space (사이버 공간과 물리 공간이 연계된 사이버 무기체계의 효과성 분석 프레임워크 연구)

  • Jang, Ji-su;Kim, Kook-jin;Yoon, Suk-joon;Park, Min-seo;Ahn, Myung-Kil;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.111-126
    • /
    • 2022
  • As operations that were only conducted in physical space in the past change to operations that include cyberspace, it is necessary to analyze how cyber attacks affect weapon systems using cyber systems. For this purpose, it would be meaningful to analyze a tool that analyzes the effects of physical weapon systems in connection with cyber. The ROK military has secured and is operating the US JMEM, which contains the results of analyzing the effects of physical weapon systems. JMEM is applied only to conventional weapon systems, so it is impossible to analyze the impact of cyber weapon systems. In this study, based on the previously conducted cyber attack damage assessment framework, a framework for analyzing the impact of cyber attacks on physical missions was presented. To this end, based on the MOE and MOP of physical warfare, a cyber index for the analysis of cyber weapon system effectiveness was calculated. In addition, in conjunction with JMEM, which is used as a weapon system effect manual in physical operations, a framework was designed and tested to determine the mission impact by comparing and analyzing the results of the battle in cyberspace with the effects of physical operations. In order to prove the proposed framework, we analyzed and designed operational scenarios through domestic and foreign military manuals and previous studies, defined assets, and conducted experiments. As a result of the experiment, the larger the decrease in the cyber mission effect value, the greater the effect on physical operations. It can be used to predict the impact of physical operations caused by cyber attacks in various operations, and it will help the battlefield commander to make quick decisions.