• Title/Summary/Keyword: military decision making

Search Result 156, Processing Time 0.027 seconds

A Microeconomic Analysis on Terrorism and Anti-terror Policies (테러와 테러정책에 대한 미시경제학적 분석)

  • Choe, Hyo-Cheol
    • Journal of National Security and Military Science
    • /
    • s.2
    • /
    • pp.201-235
    • /
    • 2004
  • This paper provides a simple microeconomic model of terrorist attcks and anti-terrorism policies. The terrorists can be characterised as rational actors, choosing between legal activities and terrorist activities to promote their political goals. Since their resources are limited, one can think of anti-terrorist policies by examining how such policies affect the objectives and constraints of terrorists. Deterrence policy seeks to reduce terrorist attacks by raising the cost of undertaking terrorist acts. Proactive policy aims at preventing attacks by destroying terrorists' resources (fund, personnel, leadership). This paper suggests another type of anti-terrorist policy which is to reduce the benefits of (or in other words, raising the opportunity costs of) terrorist acts. Such a policy is based on decentralisation in political decision-making and economic power.

  • PDF

A Study on VV&A Application Method for Credibility Improvement of The DM&S for C4I Test and Evaluation (C4I체계 시험평가 국방M&S 신뢰도 향상을 위한 VV&A 적용방안 연구)

  • Kim, Kyung-Hee;Kang, Seok-Joong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.6
    • /
    • pp.1080-1090
    • /
    • 2010
  • A study for improvement of credibility on test & evaluation result of interoperability in battle management information system which focused in C4I systems is very essential in rapid change of battle field environment. Realization of effective operation process with integration of developed IT also core factor for reducing of operational response time such as information gathering from sensor to shooter, time for commander's decision making. Therefore, by required to meet of high technical T&E, meet of complex software's user requirement, long-term system development period, system integration ability's request by various linkage of systems, it is high a M&S dependency to optimal performance, interpoerability's guarantee. Especially credibility on test & evaluation using M&S is very important. This paper will propse a VV&A applied methods using other VV&A case to improve credibility of M&S on test & evaluation.

A Study on Defense Information Security Management Structure for Digital Information Warfare (디지털 정보전에 대비한 국방정보보호업무 관리구조에 관한 연구)

  • Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.57-63
    • /
    • 2008
  • The purpose of the research is to intended to help Korean military officers establish information system security structure. Information security is a critical issue for digital information warfare. Advanced countries such as U.S. and Japan have developed a new military security strategy for future information warfare. The readiness of Korean Army, however, is far behind those countries. This paper provides a systematic information security structure for Korean Army, which is a result of the research through a group decision making process.

  • PDF

A Research Survey and Prospect on the Medium-Range Production Planning Model (중기-생산계획 모형에 관한 연구현황 및 전망)

  • Kim Man-Su;Kim U-Yeol
    • Journal of the military operations research society of Korea
    • /
    • v.16 no.2
    • /
    • pp.151-167
    • /
    • 1990
  • Considerable research has concentrated on medium-range production planning model in that it can contain long and short-term decision making in contents. Since medium-range production planning deals in situations with setup time or/and costs, solution methodology is classified by (1) optimization method using a sort of integer programming approach and network formulation (2) heuristic method offering an computationally easy, approximate solution. But, solution methodology is different in type of demand generation, existence of capacity and dependant demand. Therefore this paper reviewed the medium range production planning according to above mentioned three factors, and suggested for further work direction.

  • PDF

A Study on Command and Control Through Cyber Protection Function Analysis (사이버 방호기능 분석을 통한 지휘통제에 관한 연구)

  • Choi, Seho;Oh, Haengrok;Yun, Joobeom
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.5
    • /
    • pp.537-544
    • /
    • 2021
  • Cyber threats can bypass existing cyber-protection systems and are rapidly developing by exploiting new technologies such as artificial intelligence. In order to respond to such cyber threats, it is important to improve the ability to detect unknown cyber threats by correlating heterogeneous cyber protection systems. In this paper, to enhance cyber-attack response capabilities, we proposed command and control that enables rapid decision-making and response before the attack objectives are achieved, using Lockheed Martin's cyber kill chain and MITRE ATT&CK to analyze the purpose and intention of the attacker.

The Design and Implementation of the Collision Avoidance Warning Function in the Air Traffic Control System (항공관제 시스템에서 항공기 공중충돌 경고기능의 설계 및 구현)

  • Song, Jin-Oh;Sim, Dong-Sub;Kim, Ki-Hyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.2
    • /
    • pp.213-221
    • /
    • 2009
  • An aircraft collision accident is a disaster that causes great losses of inventories and lives. Though a collision avoidance warning function is provided automatically to pilots in the aircrafts by the enhancement of the aircraft capability, achieving fast decision-making to escape a collision situation is a complex and dangerous work for pilots. If an in-flight collision situation is controlled by the air traffic control system which monitors all airplanes in the air, it would be more efficient to prevent in-flight collisions because it can handle the emergency before the pilot's action. In this paper, we develop the collision avoidance warning function in the air traffic control system. Specifically, we design and implement the five stages of the collision avoidance function, and propose a visualization method which could effectively provide the operators with the trajectories and altitudes of the aircrafts in a collision situation. By developing an in-flight collision warning function in the air traffic control system that visualizes flight patterns through the state transition data of in-flight aircrafts on the flight path lines, it can effectively prevent in-flight collisions with traffic alerts. The developed function allows operators to effectively select and control the aircraft in a collision situation by providing the operators with the expected collision time, the relative distance, and the relative altitude while assessing the level of alert, and visualizing the alert information which includes the Attention-Warning-Alert phase via embodying the TCAS standard. With the developed function the air traffic control system could sense an in-flight collision situation before the pilot's decision-making moment.

A Study on the Method for Judging the EMP Protection Plan and Required Level through Decision Making (의사결정론을 통한 EMP 방호대책 및 수준 판단방안 제시에 관한 연구)

  • Kim, Kuk-Joo;Park, Sang-Woo;Baek, Jang-Woon;Park, Young-Jun
    • Journal of the Korea Institute of Building Construction
    • /
    • v.19 no.2
    • /
    • pp.193-200
    • /
    • 2019
  • In the context of increasing threats of EMP by neighboring countries in the security situation on the Korean peninsula, EMP protection facilities are a very important means of ensuring military operational capability. These EMP protection facilities should be constructed by comprehensively judging various factors about operation units. However, Defense Military Facilities Criteria and National Technical Guideline for EMP protection require at least 80dB shielding effectiveness without considering other options. In this study, we use objective and statistical methods to refine the consideration of the required EMP protection level based on the opinions of the experts. To do this, the Delphi technique is used for this study, and the survey was conducted from 53 experts related to EMP protection standard in the military and civilian sectors. The first questionnaire investigated the appropriate level of EMP protection, and the second questionnaire analyzed the factors considered in establishing EMP protection level. As a result of the factor analysis on the opinions of the experts, it was concluded that the EMP protection requirement level should be determined by variables of METT + TC.

A Comparative Study of Image Recognition by Neural Network Classifier and Linear Tree Classifier (신경망 분류기와 선형트리 분류기에 의한 영상인식의 비교연구)

  • Young Tae Park
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.31B no.5
    • /
    • pp.141-148
    • /
    • 1994
  • Both the neural network classifier utilizing multi-layer perceptron and the linear tree classifier composed of hierarchically structured linear discriminating functions can form arbitrarily complex decision boundaries in the feature space and have very similar decision making processes. In this paper, a new method for automatically choosing the number of neurons in the hidden layers and for initalzing the connection weights between the layres and its supporting theory are presented by mapping the sequential structure of the linear tree classifier to the parallel structure of the neural networks having one or two hidden layers. Experimental results on the real data obtained from the military ship images show that this method is effective, and that three exists no siginificant difference in the classification acuracy of both classifiers.

  • PDF

An Integrated DEA-AHP Model for the Acquisition of a Weapon System: Selection of a Next-Generation Fighter System in Korea

  • Moon, Jaehun;Kang, Seokjoong
    • Journal of information and communication convergence engineering
    • /
    • v.13 no.2
    • /
    • pp.97-104
    • /
    • 2015
  • In this paper, we propose a data envelopment analysis (DEA) and analytic hierarchy process (AHP) integrated model to improve the selection process in the acquisition of a weapon system which is the key component to the success of the project. In particular, we applied DEA in the first stage to choose a frontier group among the candidates in the selection process of the next-generation fighter system (the 3rd FX) in Korea. Then, by using the Delphi technique, we surveyed military experts and applied AHP to determine the best choice among the candidates. The results of the study match the actual decision made by the Korean government in the weapon system acquisition. The results of the proposed DEA-AHP integrated method in the selection of the next-generation fighter systems in Korea demonstrate the usefulness of the method. In this paper, we also discuss the future implications of the proposed model.

A Study on Decision Support System for Change Detection

  • Kim Sun Soo;Yu Kiyun;Kim Yang Il
    • Proceedings of the KSRS Conference
    • /
    • 2004.10a
    • /
    • pp.64-67
    • /
    • 2004
  • Change detection using aerial and satellite images is one of the important research topics in photogrammetry and image interpretation. It is of particular importance especially in the fields of military, political and administrative affairs. When there is a need to detect changes in multi-temporal images, the most efficient methods for change detection and thresholds of change/no change area need to be chosen. Also, the images obtained from the various methods need to be analyzed. To do so, we need a system that can support our decision making process. Therefore, in this paper, we propose the Decision Support System for Change Detection. This system is composed of Data Base, Model Base and Graphic User Interface(GUI). Data base is a compilation of previous change detection results, and Model Base comprise of numerous operations. The data can be input and have the results of change detection analyzed by using GUI. In this paper, we will explain the entire operation of the system and demonstrate the level of its effectiveness.

  • PDF