• Title/Summary/Keyword: battlefield

Search Result 383, Processing Time 0.031 seconds

EFFECTIVE USAGE OF FIXED AMOUNT OF SCATTERABLE MINES ON THE INFANTRY BATTLEFIELD

  • Lee, Jae-Yeong
    • Journal of the military operations research society of Korea
    • /
    • v.16 no.1
    • /
    • pp.94-112
    • /
    • 1990
  • The basic mathematical tools are developed to determine the optimum emplacement of limited numbers of scatterable mines on the infantry battlefield. A deterministic model is developed for heterogeneous infantry battalion level battle using APL version 7.0. The Helmbold-type combat equation is applied to claculate comparative casulties, and range dependency is also considered to establish the correlation between attrition rate coefficients and the distance of opposing forces, Based on this deterministic model the effective range for employment of scatterable mines is determined. Because mines are primarily effective when employed in conjunction with direct fire weapons, it is inferred that minefield are best employed when used within the maximum effective range of infantry weapons systems such as the M16Al rifle. The model developed verifies this fact.

  • PDF

A Study on Lanchester Type Combat Models for Heterogeneous Forces with Terrain Coefficient (지형계수를 고려한 Lanchester형 이질부대 전투모형연구)

  • 신희래;김충영
    • Journal of the military operations research society of Korea
    • /
    • v.26 no.1
    • /
    • pp.1-14
    • /
    • 2000
  • This research studies an attrition rate considering terrain feature in a battlefield. Lanchester-type combat models for heterogeneous forces and the Weapon Effectiveness Index are used in this study. The various environments of the battlefield can be explained by the terrain feature. Attrition rates of heterogeneous model are estimated by applying the battle of Baek-Sek mountain during the Korean War. Estimated attrition rates are checked by the paired samples T-Test. Specific cases are shown in this paper as an example. If we study out the relative influence of the terrain feature upon the performance of individual weapons, these will be a possible alternative to analyze the military operations.

  • PDF

A Study on Efficient Friendly Forces Location Data Sharing on Battalion and Below

  • Kim, Hyung-Seok;Shin, Sang-Heon;Kim, Yong-Cheol;Lee, Jeong-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.95-101
    • /
    • 2018
  • In this paper, we propose an efficient friendly forces location data sharing algorithm in a troops using a low bandwidth radio. The future battlefield is a 'Network Centric Warfare' with a concept of identifying the position and power of the enemy and friendly forces and leading the battlefield to victory through proper links at the time of our need. One of the basic elements in the 'Network Centric Warfare' is to share friendly forces location data. The bandwidth and transmission rates of radio used in battalion are low. Nevertheless, we should share our locations data almost in real time for effective fighting in a war situation. This paper describes the efficient method of friendly forces location data sharing based on low bandwidth radio. In particular, the concept of 'network-centered warfare' is reflected in the troop below the battalion to present an integrated and efficient way to shared location data of friendly forces.

Crossing the "Great Fire Wall": A Study with Grounded Theory Examining How China Uses Twitter as a New Battlefield for Public Diplomacy

  • Guo, Jing
    • Journal of Public Diplomacy
    • /
    • v.1 no.2
    • /
    • pp.49-74
    • /
    • 2021
  • In this paper, I applied grounded theory in exploring how Twitter became the battlefield for China's public diplomacy campaign. China's new move to global social media platforms, such as Twitter and Facebook, has been a controversial strategy in public diplomacy. This study analyzes Chinese Foreign Spokesperson Zhao Lijian's Twitter posts and comments. It models China's recent diplomatic move to Twitter as a "war of words" model, with features including "leadership," "polarization," and "aggression," while exerting possible effects as "resistance," "hatred," and "sarcasm" to the global community. Our findings show that by failing to gage public opinion and promote the country's positive image, China's current digital diplomacy strategy reflected by Zhao Lijian's tweets has instead constructed a polarized political public sphere, contradictory to the country's promoted "shared human destiny." The "war of words" model extends our understanding of China's new digital diplomacy move as a hybrid of state propaganda and self-performance. Such a strategy could spread hate speech and accelerate political polarization in cyberspace, despite improvements to China's homogenous network building on Twitter.

Research on Intelligent Combat Robot System as a Game-Changer in Future Warfare

  • Byung-Hyo Park;Sang-Hyuk Park
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.4
    • /
    • pp.328-332
    • /
    • 2023
  • The Army has presented eight game-changers for future warfare through 'Army Vision 2050,' including Intelligent Combat Robots, Super Soldiers, Energy Weapons, Hypersonic Weapons, Non-lethal Weapons, Autonomous Mobile Equipment, Intelligent Command and Control Systems, and Energy Supply Systems. This study focuses on Intelligent Combat Robots, considering them as the most crucial element among the mentioned innovations. How will Intelligent Combat Robots be utilized on the future battlefield? The future battlefield is expected to take the form of combined human-robot warfare, where advancements in science and technology allow intelligent robots to replace certain human roles. Especially, tasks known as Dirty, Difficult, Dangerous, and Dull (4D) in warfare are expected to be assigned to robots. This study suggests three forms of Intelligent Robots: humanoid robots, biomimetic robots, and swarm drones.

Optimization Routing Model for Installation of Clustered Engineering Obstacles with Precedence Constraint (선행제약을 고려한 권역단위 공병장애물 설치경로 최적화 모형)

  • Dongkeun Yoo;Suhwan Kim
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.47 no.2
    • /
    • pp.65-73
    • /
    • 2024
  • This paper presents a path planning optimization model for the engineering units to install obstacles in the shortest time during wartime. In a rapidly changing battlefield environment, engineering units operate various engineering obstacles to fix, bypass, and delay enemy maneuvers, and the success of the operation lies in efficiently planning the obstacle installation path in the shortest time. Existing studies have not reflected the existence of obstacle material storage that should be visited precedence before installing obstacles, and there is a problem that does not fit the reality of the operation in which the installation is continuously carried out on a regional basis. By presenting a Mixed Integrer Programming optimization model reflecting various constraints suitable for the battlefield environment, this study attempted to promote the efficient mission performance of the engineering unit during wartime.

Study on Korean Variable Message Format Construction for Battlefield Visualization (전장가시화를 위한 한국형 지상전술데이터링크 구축 연구)

  • Kim, Seung-Chun;Lee, Hyung-Keun
    • Journal of IKEEE
    • /
    • v.15 no.1
    • /
    • pp.104-112
    • /
    • 2011
  • During the ground operation of Korean army, the voice message is mainly used for exchanging informations related to the surveillance and reconnaissance, command and control, and precision strike. However, in order to the battlefield visualization among fighting powers participating in the ground force operation, automatic situational awareness and variable message format (VMF) for command and control are required. For securing core technologies necessary for the battlefield visualization, message standard and message handler are established through several applied researches. Besides, the VMF for equipping a weapon system is in development. In this paper, a study on the Korean variable message format (KVMF), where interoperability of integrated battle management system (BMS) is guaranteed due to performing joint, ground, and combined operations so that the situation awareness and strike system can be automated in almost real time, is presented. From the modeling and simulation (M&S) results of the message processor, delay time is varied in accordance with the number of nodes in unit platoon network, message length, and generation interval of routine messages. Therefore, it is shown that the system performance can be optimized by establishing proper network protocol for each situation.

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.

Recovering Network Joining State for Normal/Abnormal Termination of Battlefield Management System (전장관리시스템의 정상/비정상 종료 시 망 가입상태 복원)

  • Choi, YoonChang;Kwon, DongHo
    • Journal of KIISE
    • /
    • v.44 no.8
    • /
    • pp.749-759
    • /
    • 2017
  • The weapon system based on voice call can cause delay, error or damage to the message during the exchange of information. Furthermore, since the weapon system has a unique message format, it has limited data distribution. Therefore, a Korea Variable Message Format(KVMF) has been developed in this study to utilize a standard sized data format to guarantee the transmission quality and minimize the transmission amount. The ground tactical data link system quickly and accurately shares tactical information by incorporating a field management system that utilizes the KVMF standard message in the mobile weapon system. In this study, we examine the possibility of performing the mission immediately by recovering the state of network joining when a normal/abnormal termination situation of the battlefield management system occurs.

A Study on Agent based Simulation System Architecture for the Engagement of Ground Weapon Systems (지상무기체계 교전 모의를 위한 에이전트 기반 시뮬레이션 시스템 아키텍처 설계 연구)

  • Hwam, Won K.;Chung, Yongho;Na, Jaeho;Park, Sang C.
    • Journal of the Korea Society for Simulation
    • /
    • v.21 no.4
    • /
    • pp.81-90
    • /
    • 2012
  • Presented in this paper is a study for construction of a simulation system for the engagement of ground weapon systems. This paper proposes architecture for the simulation system based on agent simulation design methodology. Every entity of the proposed architecture is developed by assembling modularized agent components, and it enhances the reusability and composability of the entity. Consequently, time, costs, and efforts that are required to develop a new simulation system is able to be reduced by the enhancement. In the case of ground engagement simulation, it is very important to reflect environmental effects. Synthetic battlefield of the proposed architecture has environmental data of the battlefield and interacts with entities in the simulation system. The proposed architecture based simulation system can build swiftly various simulation models by the objectives and derive reasonable results from behaviors of entities that include environmental effects. This paper contains the construction of an example system based on the proposed architecture to verify the advantages of the architecture.