• Title/Summary/Keyword: military superiority

Search Result 57, Processing Time 0.021 seconds

The Impact of Information-Centric Force Improvements on Deterrence of Invasion: A Game-Theoretic Analysis (정보중심 전력증강의 전쟁억제 효과: 게임이론적 분석)

  • Cho, Jea-Yeong;Kim, Seung-Kwon
    • Journal of the military operations research society of Korea
    • /
    • v.31 no.1
    • /
    • pp.1-13
    • /
    • 2005
  • Due to the rapid developments in information and computer technology, the warfare paradigm is being transformed into information-centric and knowledge-based warfare. This atmosphere may have significant impact on the ROK armed forces' Force Improvement Plans (FIP) which is documented in 'Defense White Paper 2004'. We focus here on the relationship of information-centric force and deterrence of invasion. Particularly, we are interested in understanding the level of information superiority that might be required to deter the invasion. In order to solve this problem, we employed two-sided, zero-sum strategic game to simulate the outcome with six hypothetical cases devised by varying the level of information superiority.

Recent U.S. Efforts on RMA/MTR and Suggestions for ROK Military Progress (미국의 군사혁명(RMA/MTR)추세와 우리군의 미래발전방향)

  • 권태영;정춘일
    • Journal of the military operations research society of Korea
    • /
    • v.22 no.2
    • /
    • pp.1-17
    • /
    • 1996
  • Sun Tzu once clarified that "One who knows the enemy and knows himself will not be endangered in a hundred engagements, " while Clausewitz explained that "A victory will be guaranteed for one who can overcome 'fog and friction' at a battlefield." Now the U.S. is striving hard to develop an American version of RMA (Revolution in Military Affairs)/MTR (Military Technical Revolution) by utilizing its rapidly emerging information technology in the information age. The U.S. firmly believes that its RMA/MTR with less defense expenditure can provide all combat players in the battlespace with "dominant battle awareness, " by which no nation will be able to challenge U.S. military superiority. In this paper, the recent efforts of the U.S. Armed Forces on RMA/MTR will be briefly introduced, some lessons and expertises from the U.S. RMA/MTR are extracted, and, in this regard, several suggestions are provided for the progress of the ROK Armed Forces.gress of the ROK Armed Forces.

  • PDF

Application of Genetic Algorithms to Optimize the Storage Location of Products in Military Logistics (군(軍) 물류창고 내(內) 물품 저장위치 최적화를 위한 유전알고리즘 적용 방안)

  • Ha, Won Yong;Cho, Ki-yang;Han, Chung Sik
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.1
    • /
    • pp.108-116
    • /
    • 2022
  • Supply in military operations has a significant impact on overall combat capability and efficiency. Therefore, modernization of military logistics is underway to ensure rapid and accurate distribution. And, effective warehouse management is paramount. This paper proposes a new product allocation model that uses a genetic algorithm. The model considers order frequency and mass of products because the military equipment is usually heavier than available products. A computer simulation shows that products are assigned to optimal locations and reduce the consumed energy for forklifts by more than 25 % with similar travel time. Also, we show the superiority of genetic algorithm by comparing them with other algorithms.

Korean Common Operating Environment Implementing Strategy (한국형 공통운영환경 구축방향)

  • 김윤국;이태공
    • Journal of the military operations research society of Korea
    • /
    • v.25 no.2
    • /
    • pp.130-143
    • /
    • 1999
  • Lesson learned from the Gulf War, Information systems should be interoperable and integrated for taking information superiority. But most of Information systems that have been developed and operated by military departments are stove-pipe systems that are built over and over again incompatible ways even when requirements are the same, or slightly difference between systems. As a results of this development way, those systems have poor interoperability and portability. But, If some common functions could be extracted, developed as a set of extensible building blocks, the software for common functions could be reusable. Therefore interoperability would be improved because common software is used across systems for common functions. This concept led the development of COE(Common Operating Environment). US and UK COE have been developed and being implemented for the purpose of achieving above goals. Recently Korean Military try to develop the architecture of COE, but it is not easy because of the lack of COE concept, COE development methodology as well as expert In this paper we suggest Korean Common Operating Environment Implementing Strategy based on analysis of US and UK COE that have being implemented to their military systems.

  • PDF

Comparison of North Korea's Military Strategy before and after Nuclear Arming (핵무장 전.후 북한의 대남 군사전략 비교)

  • Nam, Man-Kwon
    • Journal of National Security and Military Science
    • /
    • s.5
    • /
    • pp.173-202
    • /
    • 2007
  • After successful nuclear tests Pakistan launched a more severe surprise attack toward India than before. It is highly possible that North Korea will adopt this Pakistan military strategy if it is armed with nuclear weapons. The North Korean forces armed, with nuclear bombs could make double its war capability through strengthening aggressive force structure and come into effect on blocking reinforcement of the US forces at the initial phase of war time. Therefore we may regard that Pyongyang's nuclear arming is a major one of various factors which increase possibility of waging a conventional warfare or a nuclear war. North Korea's high self-confidence after nuclear arming will heighten tension on the Korean Peninsula via aggressive military threat or terror toward South Korea, and endeavor to accomplish its political purpose via low-intensity conflicts. For instance, nuclear arming of the Pyongyang regime enforces the North Korean forces to invade the Northern Limit Line(NLL), provoke naval battles at the West Sea, and occupy one or two among the Five Islands at the West Sea. In that case, the South Korean forces will be faced with a serious dilemma. In order to recapture the islands, Seoul should be ready for escalating a war. However it is hard to imagine that South Korea fights with North Korea armed with nuclear weapons. This paper concludes that the Pyongyang regime after nuclear arming strongly tends to occupy superiority of military strategy and wage military provocations on the Korean Peninsula.

  • PDF

A Network QoS Model for Joint Integrated C4I Structure (합동지휘통제 통합망 구조 QoS 모델(안))

  • Park, Dongsuk;Oh, Donghan;Choi, Eunho;Lim, Jaesung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.2
    • /
    • pp.106-114
    • /
    • 2020
  • NCW which is shaping favorable conditions with obtaining initiative through superiority in C2 and information sharing is critical to the result of the war in a modern warfare. An important requirement to attain superiority through an effective networking in a war-environment is to apply QoS to ensure priority in supporting critical mission and services. In order to obtain an effective NCOE through JCS-led QoS support, standard doucments have been reviewed and analyzed to understand the current level of technology and development. In addition, QoS-related policy documents which is currently being applied by the ROK armed forces have been analyzed to substantiated the JCS-led QoS model and propose the directions of development and enhancement required in the realm of technology, policy and system.

An Application of Information Technology to the Revolution of Military Affairs (정보기술을 활용한 군사혁신 방안에 관한 연구)

  • 강신철;최성필
    • Journal of Information Technology Application
    • /
    • v.2 no.1
    • /
    • pp.83-111
    • /
    • 2000
  • To preserve competitiveness in rapidly changing world military market and to adapt themselves to newly-developed warfare, many developed counties have been readjusting their military organizations and technical procedures. In a private sector, business reengineering and other innovative efforts were made to respond to this change, using structural approaches. In the military sector, the United States is the one leading this move. She has been trying to reorganize her military structure to hold her hegemony in world politics for the coming 21st century. The purpose of this paper, is, (1) to analyze the information technology on the military revolution, (2) to deduce what to be changed, and (3) to infer how to change. The comparison between Korea and U.S. in terms of the real military situation was made to analyze these three research questions. The study was based on the structural contingency theory, one of the environmental analysis models, being introduced to explore the Revolution in Military Affairs(RMA) case in United States and Korea. The conclusion may be summarized as follows; First, information-based society which is characterized by the development of information technology and environmental, complexity and weakness in security affairs will affect the military factors such as the issue of holding information superiority, changing warfare in proportion to the military-scientific development and weakness in military security. This trend will be more deep-rooted and multiple in its influence on the military affairs.

  • PDF

Opportunistic Data Relay Scheme for Narrowband Multihop Combat Radio Networks (협대역 다중홉 전투무선망에서 기회적 데이터 중계 기법)

  • Lee, Jongkwan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.1
    • /
    • pp.65-71
    • /
    • 2022
  • In this paper, we propose an opportunistic data relay scheme in narrowband multihop combat radio networks. Narrowband networks have physical restrictions on high-speed transmission. Furthermore, the topology changes dynamically due to the jamming of the enemy, signal interference between friendly forces, and movement of network entities. Therefore, the traditional relay scheme that collects topology information and calculates a relay path before transmission is unsuitable for such networks. Our proposed scheme does not collect topology information and transmits data opportunistically. The scheme can cause unnecessary data relaying that is not related to data delivery to the destination node. However, for small networks, the effect of increasing network throughput by not gathering topology information is much greater than the effect of reducing throughput by unnecessary data relays. We demonstrate the performance superiority of the proposed scheme through simulation in the worst case of network topology.

An Analysis of the US 3rd Offset Strategy (미국의 제3차 국방과학기술 상쇄전략에 대한 분석)

  • Kim, Jong Ryul
    • Convergence Security Journal
    • /
    • v.16 no.3_1
    • /
    • pp.27-35
    • /
    • 2016
  • This thesis analyzes the backgrounds of the third offset strategy of the US Department of Defense. The key technology areas to be developed and the implications of the 3rd strategy are also examined. The potential great powers, China and Russia have catched up with US in the certain areas of military technologies. The technological superiority of US military is found to have been eroded. The US DOD needs a new defense policy called the 3rd offset strategy to meet this new challenge. The 5 basic technology areas were identified; learning machines, human-machine collaboration, machine-assisted human operations, human-machine combat teaming, and autonomous weapons. The 3rd offset strategy should be managed not to move to the new arms race with rivalries. The defense acquisition system also needs to be improved for the smooth flow of the advanced commercial technologies to the defense sector. Korea needs to figure out the possible technologies of co-research and development with US.

Scattering Analysis of Radar Target via Evolutionary Adaptive Wavelet Transform (진화적 적응 웨이브릿 변환에 의한 레이다 표적의 산란 해석)

  • Choi, In-Sik
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.10 no.3
    • /
    • pp.148-153
    • /
    • 2007
  • In this paper, the evolutionary adaptive wavelet transform(EAWT) is applied to the scattering analysis of radar target. EAWT algorithm uses evolutionary programming for the time-frequency parameter extraction instead of FFT and the bisection search method used in the conventional adaptive wavelet transform(AWT). Therefore, the EAWT has a better performance than the conventional AWT. In the simulation using wire target(Airbus-like), the comparisons with the conventional AWT are presented to show the superiority of the EAWT algorithm in the analysis of scattering phenomenology. The EAWT can be effectively applied to the radar target recognition.