• Title/Summary/Keyword: modern warfare

Search Result 103, Processing Time 0.027 seconds

Depth estimation of an underwater target using DIFAR sonobuoy (다이파 소노부이를 활용한 수중표적 심도 추정)

  • Lee, Young gu
    • The Journal of the Acoustical Society of Korea
    • /
    • v.38 no.3
    • /
    • pp.302-307
    • /
    • 2019
  • In modern Anti-Submarine Warfare, there are various ways to locate a submarine in a two-dimensional space. For more effective tracking and attack against a submarine the depth of the target is a critical factor. However, it has been difficult to find out the depth of a submarine until now. In this paper a possible solution to the depth estimation of submarines is proposed utilizing DIFAR (Directional Frequency Analysis and Recording) sonobuoy information such as contact bearings at or prior to CPA (Closest Point of Approach) and the target's Doppler signals. The relative depth of the target is determined by applying the Pythagorean theorem to the slant range and horizontal range between the target and the hydrophone of a DIFAR sonobuoy. The slant range is calculated using the Doppler shift and the target's velocity. the horizontal range can be obtained by applying a simple trigonometric function for two consecutive contact bearings and the travel distance of the target. The simulation results show that the algorithm is subject to an elevation angle, which is determined by the relative depth and horizontal distance between the sonobuoy and target, and that a precise measurement of the Doppler shift is crucial.

A Study on the Measuring of Combat Effectiveness for Naval Frigates Using Analytic Hierarchy Process (AHP를 이용한 해군 호위함 전투효과 측정에 관한 연구)

  • Kim, Kitae;Lim, Yojoon
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.1
    • /
    • pp.9-16
    • /
    • 2021
  • Modern combat has been extended to the concept of real-time response to a variety of threats simultaneously occurring in vast areas. In order to quick command determination and accurate engagement in these threats, the combat system has emerged in frigate. Frigates conduct anti-surface, anti-submarine, and anti-aircraft as the core forces of the fleet. In this study, the combat effectiveness measures naval frigates using AHP (analytic hierarchy process) method. A hierarchical structure for measuring the combat effectiveness was developed, and weights of criteria were calculated by expert surveys and pair-wise comparisons. In addition, the combat effectiveness of frigates was synthesized and compared. The weights for each attribute were calculated, and the weights for the three main attributes were in the order of act (0.594), evaluate (0.277), and see (0.129). As a result of calculating the weight, anti surface warfare (0.203) was the highest. The combat effectiveness of FFG Batch-III, which has advanced hardware and software and improved combat system capabilities, see (1.73 to 2.56 times), evaluate (1.68 to 2.08 times), and act (1.31 to 3.80 times) better than the comparative frigate. In summarizing the combat effects of the frigate, FFG Batch-III was 1.41~2.95 times superior to the comparative frigate. In particular, a group of experts evaluated the act importantly, resulting in better combat effectiveness.

Development of a Vulnerability Assessment Model for Naval Ships on a Theater Engagement Analysis (전구급 교전분석을 위한 함정 취약성 평가모델 개발)

  • Lee, Sungkyun;Go, Jinyong;Kim, Changhwan;You, Seungki
    • Journal of the Korea Society for Simulation
    • /
    • v.30 no.1
    • /
    • pp.1-9
    • /
    • 2021
  • In actual battlefield environment, the naval ships which have specific missions have to respond to the attack of hostile forces. Especially, in modern warfare, the importance of the survivability of naval ships are increasing due to the high lethality of armaments. Naval ship survivability is generally considered to encompass three constituents, susceptibility, vulnerability and recoverability. Recently, among these three constituents, many researches on vulnerability have been conducted. However, for the vulnerability of naval ships, most of researches are aimed towards the detailed design stages where implementing changes is heavily constrained or even impractical. In this paper, vulnerability assessment model for naval ships on a theater engagement is developed by using M&S technique. By using this model, the characteristics of platform and armaments are reflected on the damage of naval ship. The basic logic of damage assessment is also considered in detail. The damage status of the naval ship is quantified by defining a representative state index of onboard equipment for each system.

A Study on the Informatization and Intelligent Strategy of Education and Training based on 4th Industrial Revolution Technology (4 산업혁명 기술 기반 교육훈련 정보화 및 지능화 전략)

  • Lee, Hee Nam
    • Journal of Information Technology Services
    • /
    • v.20 no.1
    • /
    • pp.67-79
    • /
    • 2021
  • The advent of the 4th Industrial Revolution is also causing many changes in defense operations. Defense reform and the fourth industrial revolution promoted smart defense innovation, and attempts are being made to incorporate cutting-edge science and technology into various fields such as weapons systems and defense operations. Education and training is one of the areas in which information and intelligence are urgently needed in the spirit of defense operations. Due to the nature of defense education and training, which aims to fight against the enemy, there is no emphasis on psychological training in the field rather than informatization, but in developed countries with various experiences of modern warfare, investment and vitalization of education and training are vital. Through this, efforts are being made to foster soldiers with problem-solving skills in uncertain battlefields. The informatization and intelligence of defense education and training is no longer a matter that can be delayed, and the innovation of education and training using cutting-edge science and technology can be said to be an age-old task to improve the results of education and training in the fourth industrial revolution. The purpose of this is because the application of related technologies is not the goal itself as the 4th Industrial Revolution arrives, but it has been made possible through the rapid advancement of science and technology that has made it difficult to realize education and training, even though it has long been desired. Ultimately, education and training data will be integrated and artificial intelligence-based intelligent learning systems will maximize the performance of education and training, thereby improving the combat readiness.

Resupply Behavior Modeling in Small-unit Combat Simulation using Decision Trees (소부대 전투 모의를 위한 의사결정트리 기반 재보급 행위 모델링)

  • Seil An;Sang Woo Han
    • Journal of the Korea Society for Simulation
    • /
    • v.32 no.3
    • /
    • pp.9-21
    • /
    • 2023
  • The recent conflict between Russia and Ukraine underscores the significant of military logistics support in modern warfare. Military logistics support is intricate and specialized, and traditionally centered on the mission-level operational analysis and functional models. Nevertheless, there is currently increasing demand for military logistics support even at the engagement level, especially for resupply using unmanned transport assets. In response to the demand, this study proposes a task model of the military logistics support for engagement-level analysis that relies on the logic of ammunition resupply below the battalion level. The model employs a decisions tree to establish the priority of resupply based on variables such as the enemy's level of threat and the remaining ammunition of the supported unit. The model's feasibility is demonstrated through a combat simulation using OneSAF.

A Study on the Water-Faring Community and Architectural Forms of the 'Tanka People' in Macau from the Ming and Qing Dynasties to the Modern Period (명청-근대시기 마카오 "수상인(水上人)"의 취락 및 건축유형 연구)

  • Hong, Shu-Ying;Han, Dong-Soo
    • Journal of architectural history
    • /
    • v.32 no.3
    • /
    • pp.7-20
    • /
    • 2023
  • The compositions of ethnic groups in Macau vary with time. Prior to the opening of the port, the majority of the residents in Macau were Chinese people, including those living on land and at sea. After the port was opened, with the increase of Portugal businessmen and missionaries, the population was divided into Chinese people and foreigners (so-called 'Yiren' or 夷人 in Chinese). Chinese people living on land were mainly of Hakka, Fujian, and Cantonese descent. Those living at sea were referred to as 'Tanka People' (named 'Danmin' or 蜑民in Chinese). They lived on floating boats for their entire lives and were similar to the 'drifters' in Japan. Since modern times, many refugees from mainland China and Southeast Asia flooded into Macau due to warfare. The development of industrialization required a larger number of laborers, and some 'coolies' entered Macau in legal or illegal ways, making it a multi-ethnic city. However, the Tanka people were not considered a minority ethnic group under the national ethnic policy of 56 ethnic groups since they did not have an exclusive language and shared dialects in different regions. As the ports inhabited by Tanka people gradually restored foreign trade, the boats and stilt houses used by Tanka people were dismantled to expand the infrastructure area of the ports. Many Tanka people began to live on land and marry people on land, leading to the disappearance of the Tanka group in Macau. The fishing boats and stilt houses used by Tanka people have also disappeared, with only a few remaining in areas such as Pearl River Delta and Hong Kong. This paper examines the natural and social environment of Tanka people in Macau from the Ming and Qing dynasties to the Republic of China, as well as the adaptive changes they adopted for the aforementioned environment in terms of living space and architectural type, on the basis of summarizing the historical activities of Tanka people. Finally, this study provides a layout plan and interior structure of the most commonly used boat for Tanka people from the Ming and Qing dynasties to the Republic of China, with the use of CAD and other technical software, along with reference to written historical documentation, and provides a case study for further research on the architectural history of Macau's inner harbor cities, from anthropological and folklore perspectives.

Multi-dimensional Security Threats and Holistic Security - Understanding of fusion-phenomenon of national security and criminal justice in post-modern society - (다차원 안보위협과 융합 안보)

  • Yun, Min-Woo;Kim, Eun-Young
    • Korean Security Journal
    • /
    • no.31
    • /
    • pp.157-185
    • /
    • 2012
  • Today, the emergence of cyberspace and advancement of globalization caused not only the transformation of our productive and conventional life but also the revolutionary transition of use of destructive violence such as crime and warfare. This transition of environmental condition connects various security threats which separatedly existed in individual, local, national, and global levels in the past, and transformed the mechanical sum of all levels of security threats into the organic sum of multi-dimensional security threats. This article proposes that the sum of multi-dimensional security threats is caused by the interconnectivity of various different levels of security threats and the integrated interdisciplinary perspective is essential to properly understand the fundamental existence of today's security problem and the reality of fear that we face today. The holistic security, the concept proposed here, is to suggest the mode of networked response to multi-dimensional security threats. The holistic security is suggested to overcome the conventional divisional approach based on the principle of "division of labor" and bureaucratic principles, which means more concretely that national security and criminal justice are divided and intelligence, military, police, prosecution, fire-fighting, private security, and etc. are strictly separated into its own expertise and turf. Also, this article introduces integrated security approaches tried by international organization and major countries overseas with the respect of the holistic security. The author have spent some substantial experience of participant observation, meetings, seminar, conference, and expert interviews regarding the issues discussed in the article in various countries including the United States, Russia, Austria, Germany, Canada, Mexico, Israel, and Uzbekistan for the last ten years. Intelligence and information on various levels of security threats and security approaches introduced in this paper is obtained from such opportunities.

  • PDF

"Critical Application of Witness Commentaries: The Case of Guerrilla Warfare in the Korean War" ("증언자료의 비판적 활용 - 6.25전쟁 시기 유격대의 경우")

  • Cho, Sung Hun
    • The Korean Journal of Archival Studies
    • /
    • no.12
    • /
    • pp.137-178
    • /
    • 2005
  • The anticommunist guerrillas' activities that aretheconcern of this article took place largely in North Korea or behind the enemy-held lines. Verifying their history is accordingly difficult and requires careful attention, but despite their active operations the military as well as the scholarly community have been lax in studying them. The Korean War came to be perceived as a traditional, limited war with regular battles, so that the studies addressed mostly the regular operations, and guerrilla warfare is remembered as an almost 'exclusive property' of the communist invaders; a small wonder that the anticommunist guerrillas have not been studied much and the collection of materials neglected. Therefore, in contrast with the witness accounts concerning regular battles, witness resources were of a small volume about these "patriots without the service numbers." For the above reasons the guerrilla participants and their later-organized fellowships took to the task of leaving records and compiling the histories of their units. They became active preservers of history in order to inform later generations of their works and also to secure deserved benefits from the government, in a world where none recognized their achievements. For instance, 4th Donkey Unit published witness accounts in addition to a unit history, and left video-recordings of guerrilla witnesses before any institute systematized the oral history of the guerrillas. In the case of Kyulsa ("Resolved to Die") Guerrilla Unit, the unit history was 10 times revised and expanded upon for publication, contributing substantially to the recovery of anticommunist guerrilla history which had almost totally lacked documented resources. Now because the guerrilla-related witness accounts were produced through fellowship societies and not individually, it often took the form of 'collective memory.' As a result, though thousands of former guerrillas remain surviving, the scarcity of numerous versions of, or perspectives upon, an event renders difficult an objective approach to the historical truth. Even requests to verify the service of a guerrilla member or to apply for decoration or government benefits for those killed in action, the process is taken care of not at the hands of the first party but the veteran society, so that a variety of opinions are not available for consideration. Moreover, some accounts were taken by American military personnel, and since some historians, unaware of official documents or evaluation of achievements, tended to center the records around their own units and especially to exaggerate the units' performances, they often featured factual errors. Thefollowing is the means to utilize positively the aforementioned type of witness accounts in military history research. It involves the active use of military historical detachments (MHD). As in the examples of those dispatched by the American forces during the Korean War, experts should be dispatched during, and not just after, wartimes. By considering and investigating the differences among various perspectives on the same historical event, even without extra documented resources it is possibleto arrive at theerrors or questionable points of the oral accounts, supplementing the additional accounts. Therefore any time lapses between witness accounts must be kept in consideration. Moreover when the oral accounts come from a group such as participants in the same guerrilla unit or operation, a standardized list of items ought to be put to use. Education in oral history is necessary not just for the training of experts. In America wherethefield sees much activity, it is used not only in college or graduate programs but also in elementary and lifetime educational processes. In comparison in our nation, and especially in historical disciplines, methodological insistence upon documented evidences prevails in the main, and in the fields of nationalist movement or modern history, oral accounts do not receive adequate attention. Like ancient documents and monuments, oral history also needs to be made a regular part of diverse resource materials at our academic institutes for history. Courses in memory and history, such as those in American colleges, are available possibilities.

The Effect of Centralities of Alliance Network on Innovation Performace in Korean Defense Industry (한국 방위산업 제휴네트워크 중심성이 혁신성과에 미치는 영향)

  • Ahn, Hoil;Kim, Changone;Lee, Heesang
    • Journal of Korea Technology Innovation Society
    • /
    • v.18 no.2
    • /
    • pp.292-317
    • /
    • 2015
  • As modern science and technology and warfare become to be advanced and precise, the weapon systems becomes more complex based on state-of-the-art technology. Therefore, firms in the defense industry continue to accelerate research and development for up-to-date weapon systems with high complexity which urge the firms to collaborate with the external organizations to obtain the knowledge required and eventually to reduce costs and risk. This study tries an empirical study about the effect of collaboration on the innovation performances from the network analysis perspective. By surveying collaboration relationships among 530 firms in the Korean defense industry, we analyzed the alliance network of the defense industry. Network centrality including degree, closeness, and betweenness centralities is investigated and then the relationship among the network centrality property, internal R&D capabilities and innovation is analysed. The results show that firms with high internal R&D capabilities place the firm at center of the network. On the other hand, except for the firms with highly connected centrality, no relationship was found between the internal R&D capabilities and its performance and in turn. these capabilities had both direct and indirect effects on innovation performances through mediated collaboration among firms. This study implied that Korean firms with a high internal R&D capabilities in the defense industry which utilize knowledge, information and resources within the network more frequently show more innovative performance. This result claims the policy makers to participate more firms in fostering open innovation for the defense industry.

A Study on the Techniques of Path Planning and Measure of Effectiveness for the SEAD Mission of an UAV (무인기의 SEAD 임무 수행을 위한 임무 경로 생성 및 효과도 산출 기법 연구)

  • Woo, Ji Won;Park, Sang Yun;Nam, Gyeong Rae;Go, Jeong Hwan;Kim, Jae Kyung
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.5
    • /
    • pp.304-311
    • /
    • 2022
  • Although the SEAD(suppression to enemy air defenses) mission is a strategically important task in modern warfare, the high risk of direct exposure to enemy air defense assets forces to use of unmanned aerial vehicles. this paper proposes a path planning algorithm for SEAD mission for an unmanned aerial vehicle and a method for calculating the mission effectiveness on the planned path. Based on the RRT-based path planning algorithm, a low-altitude ingress/egress flight path that can consider the enemy's short-range air defense threat was generated. The Dubins path-based Intercept path planning technique was used to generate a path that is the shortest path while avoiding the enemy's short-range anti-aircraft threat as much as possible. The ingress/intercept/egress paths were connected in order. In addition, mission effectiveness consisting of fuel consumption, the survival probability, the time required to perform the mission, and the target destruction probability was calculated based on the generated path. The proposed techniques were verified through a scenario.