• Title/Summary/Keyword: the command and control model

Search Result 290, Processing Time 0.159 seconds

A Methodology for Making Military Surveillance System to be Intelligent Applied by AI Model (AI모델을 적용한 군 경계체계 지능화 방안)

  • Changhee Han;Halim Ku;Pokki Park
    • Journal of Internet Computing and Services
    • /
    • v.24 no.4
    • /
    • pp.57-64
    • /
    • 2023
  • The ROK military faces a significant challenge in its vigilance mission due to demographic problems, particularly the current aging population and population cliff. This study demonstrates the crucial role of the 4th industrial revolution and its core artificial intelligence algorithm in maximizing work efficiency within the Command&Control room by mechanizing simple tasks. To achieve a fully developed military surveillance system, we have chosen multi-object tracking (MOT) technology as an essential artificial intelligence component, aligning with our goal of an intelligent and automated surveillance system. Additionally, we have prioritized data visualization and user interface to ensure system accessibility and efficiency. These complementary elements come together to form a cohesive software application. The CCTV video data for this study was collected from the CCTV cameras installed at the 1st and 2nd main gates of the 00 unit, with the cooperation by Command&Control room. Experimental results indicate that an intelligent and automated surveillance system enables the delivery of more information to the operators in the room. However, it is important to acknowledge the limitations of the developed software system in this study. By highlighting these limitations, we can present the future direction for the development of military surveillance systems.

Guidance Law for Agile Turn of Air-to-Air Missile During Boost Phase

  • Han, Seungyeop;Bai, Ji Hoon;Hong, Seong-Min;Roh, Heekun;Tahk, Min-Jea;Yun, Joongsup;Park, Sanghyuk
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.18 no.4
    • /
    • pp.709-718
    • /
    • 2017
  • This paper proposes the guidance laws for an agile turn of air-to-air missiles during the initial boost phase. Optimal solution for the agile turn is obtained based on the optimal control theory with a simplified missile dynamic model. Angle-of-attack command generating methods for completion of agile turn are then proposed from the optimal solution. Collision triangle condition for non-maneuvering target is reviewed and implemented for update of terminal condition for the agile turn. The performance of the proposed method is compared with an existing homing guidance law and the minimum-time optimal solution through simulations under various initial engagement scenarios. Simulation results verify that transition to homing phase after boost phase with the proposed method is more effective than direct usage of the homing guidance law.

RF Interference Analysis and Verification in the Synthetic Aperture Radar Satellite System (영상레이더 위성시스템 구조물의 RF 간섭특성 분석 및 검증)

  • Jang, Jae-Woong;Kim, Tae-Yoon;Lim, Seong-Bin
    • Aerospace Engineering and Technology
    • /
    • v.8 no.1
    • /
    • pp.187-196
    • /
    • 2009
  • Synthetic Aperture Radar(SAR) satellite system for broad-area imaging has RF systems including SAR radiating a high power, data link system transmitting the acquired image data from the SAR, TC&R(Telemetry, Command, and Ranging) to communicate with a ground segment to control a satellite. Each system transmits RF signal having various frequencies and radiates a high power, RS(Radiated Susceptibility) specification should be verified at an electronic unit mounted in satellite. RF interference can be happened because of non-linearity of a RF system. Therefore, we manufactured a structure model installed antennas which have a similar pattern with a real antenna, the effect by RF interference is analyzed and verified.

  • PDF

Modeling the Aviation Safety Risk Management (항공안전 위기관리 모형 구축에 관한 연구)

  • Hong, Seok-Jin;Kim, Yeon-Myeong
    • Journal of Korean Society of Transportation
    • /
    • v.24 no.1 s.87
    • /
    • pp.19-28
    • /
    • 2006
  • To develop a crisis management for aviation safety, this study has defined crisis management includes risk management which is eliminates or lowers risks prior to accidents and emergency response after the accidents. This study takes a look at different kinds of crisis managements, risk managements and statistical methods of other nations and fields in order to develop a risk management model. Through surveys which have 102 risk factors that include air traffic control, maintenance and airport sectors, the weight of each risk factor was calculated and the probability was divided to develop a model for risk management. The risk management model of this study is conducted using four steps (risk management plan, risk factor identification, weight and probability analysis, decision making) and 4 standards of weight along with 5 standards of probability This study takes a look at Predictions through a quantitative method using a risk index for the risk management model An effective risk management model should have a wide and continuous collection of data and adopt various methods using this model. The crisis management could not be very effective only using a pre-active risk management. So it should also be conducted by using a pro-active response system to protect additional damage and to prevent accidents of the same nature. From the results, the most important points were the establishment of command and control accountabilities, and cooperation of related organizations.

Sliding Mode Controller Design Considering Weight (가중치를 고려한 슬라이딩 모드 제어기 설계)

  • 임동균;서병설
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.4 no.3
    • /
    • pp.223-230
    • /
    • 1999
  • A conventional sliding mode control approach is often impractical or difficult when it is applied to high order process b because the number of tuning parameters in the sliding mode controller increases with the order of the plant. C Camacho(l996) proposed a design method of a fixed structure sliding mode controller based on a first order plus dead t time approximation to the higher-order process. But, his method has such problems as chattering, over‘shoot, and c command following due to the Taylor the approximation en‘ors for the time delay term of the first order model. In this p paper, a new design technique for a sliding mode controller based on the modified Taylor approximation considered a w weight is developed to improve the Camacho's problems.

  • PDF

A Study of Influencing Factors Upon Using C4I Systems: The Perspective of Mediating Variables in a Structured Model (C4I 시스템 사용의 영향 요인에 관한 연구: 구조모형의 매개변수의 관점에서)

  • Kim, Chong-Man;Kim, In-Jai
    • Asia pacific journal of information systems
    • /
    • v.19 no.2
    • /
    • pp.73-94
    • /
    • 2009
  • The general aspects for the future warfare shows that the concept of firepower and maneuver centric warfare has been replacing with that of information and knowledge centric warfare. Thus, some developed countries are now trying to establish the information systems to perform intelligent warfare and innovate defense operations. The C4I(Command, Control, Communication, Computers and Intelligence for the Warrior) systems make it possible to do modern and systematic war operations. The basic idea of this study is to investigate how TAM(Technology Acceptance Model) can explain the acceptance behavior in military organizations. Because TAM is inadequate in explaining the acceptance processes forcomplex technologies and strict organizations, a revised research model based upon TAM was developed in order to assess the usage of the C4I system. The purpose of this study is to investigate factors affecting the usage of C4I in the Korean Army. The research model, based upon TAM, was extended through a belief construct such as self-efficacy as one of mediating variables. The self-efficacy has been used as a mediating variable for technology acceptance, and the variable was included in the research model. The external variables were selected on the basis of previous research. The external variables can be classified into following: 1) technological, 2) organizational, and 3) environmental factors on the basis of TOE(Technology-Organization-Environment) framework. The technological factor includes the information quality and the task-technology fitness. The organizational factor includes the influence of senior colleagues. The environmental factor includes the education/train data. The external variables are considered very important for explaining the behavior patterns of information technology or systems. A structured questionnaire was developed and administrated to those who were using the C4I system. Total 329 data were used for statistical data analyses. A confirmatory factor analysis and structured equation model were used as main statistical methods. Model fitness Indexes for measurement and structured models were verified before all 18 hypotheses were tested. This study shows that the perceived usefulness and the self-efficacy played their roles more than the perceived ease of use did in TAM. In military organizations, the perceived usefulness showed its mediating effects between external variables and dependent variable, but the perceived ease of use did not. These results imply that the perceived usefulness can explain the acceptance processes better than the perceived ease of use in the army. The self-efficacy was also used as one of the three mediating variables, and showed its mediating effects in explaining the acceptance processes. Such results also show that the self-efficacy can be selected as one possible belief construct in TAM. The perceived usefulness was influenced by such factors as senior colleagues, the information quality, and the task-technology fitness. The self-efficacy was affected by education/train and task-technology fitness. The actual usage of C4I was influenced not by the perceived ease of use but by the perceived usefulness and selfefficacy. This study suggests the followings: (1) An extended TAM can be applied to such strict organizations as the army; (2) Three mediation variables are included in the research model and tested at real situations; and (3) Several other implications are discussed.

Adaptation of the parameters of the physical layer of data transmission in self-organizing networks based on unmanned aerial vehicles

  • Surzhik, Dmitry I.;Kuzichkin, Oleg R.;Vasilyev, Gleb S.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.23-28
    • /
    • 2021
  • The article discusses the features of adaptation of the parameters of the physical layer of data transmission in self-organizing networks based on unmanned aerial vehicles operating in the conditions of "smart cities". The concept of cities of this type is defined, the historical path of formation, the current state and prospects for further development in the aspect of transition to "smart cities" of the third generation are shown. Cities of this type are aimed at providing more comfortable and safe living conditions for citizens and autonomous automated work of all components of the urban economy. The perspective of the development of urban mobile automated technical means of infocommunications is shown, one of the leading directions of which is the creation and active use of wireless self-organizing networks based on unmanned aerial vehicles. The advantages of using small-sized unmanned aerial vehicles for organizing networks of this type are considered, as well as the range of tasks to be solved in the conditions of modern "smart cities". It is shown that for the transition to self-organizing networks in the conditions of "smart cities" of the third generation, it is necessary to ensure the adaptation of various levels of OSI network models to dynamically changing operating conditions, which is especially important for the physical layer. To maintain an acceptable level of the value of the bit error probability when transmitting command and telemetry data, it is proposed to adaptively change the coding rate depending on the signal-to-noise ratio at the receiver input (or on the number of channel decoder errors), and when transmitting payload data, it is also proposed to adaptively change the coding rate together with the choice of modulation methods that differ in energy and spectral efficiency. As options for the practical implementation of these solutions, it is proposed to use an approach based on the principles of neuro-fuzzy control, for which examples of determining the boundaries of theoretically achievable efficiency are given.

A Study on Reliability Analysis and Development of Fault Tolerant Digital Governor (내고장성 디지털 조속기의 신뢰도 평가 및 개발에 관한 연구)

  • 신명철;전일영;안병원;이성근;김윤식;진강규
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.467-474
    • /
    • 1999
  • In this paper, Fault tolerant digital governor, using duplex I/O module and triplex CPU module and also 2 out of 3 voting algorithm and adding self diagnostic ability, is designed to realize ceaseless controlling and to improve the reliability of control system. The processor module of the system(SIDG-3000) is developed based on MC68EC040 32 Bit of Motorola, which guaranteed high quality of the module ,and SRAM for data also SRAM for command are separated. The process module also includes inter process communication function and power back up function (SRAM for back-up). System reliability is estimated by using the model of Markov process. The reliability of triplex system in mission time can be improved about 1.8 times in reliability 86%. 2.8 times in 95 %, 6 times in 99 % compared with a single control system. Designed digital governor system is applied after modelling of the steam turbine generator system of Buk-Cheju Thermal Power Plant. Simulation is carried out to prove the effectiveness of the designed digital governor system

  • PDF

A Method to Establish NCOE of Separated Theater by Architecting (아키텍팅 기법을 활용한 분리된 전구의 NCOE 구축방안)

  • Jang, Dong-Mo;Lee, Chul-Hwa;Lee, Tae-Gong;Lim, Jae-Sung
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.2
    • /
    • pp.143-154
    • /
    • 2012
  • With the realization of the importance of the NWI, iterated by the Cheonan Ship sink and the YP-Do shelling, this thesis separates the NWI from the peninsula, regarding it separate from the Korea Theater of Operations, and suggests the method to establish NCOE with consideration to the characteristics of separated theater as well as the current situation. Although the NWI holds strategic value, systematical NCOE of surveillance and reconnaissance system, command and control system, and precision strike system is not yet established. Pertaining to this issue, Architecting was utilized to identify improvement measures and of the identified improvement measures, improvement on the "strike on nK hardened artillery sites with K-9 Self-Propelled Artillery in correlations with theater ISR" shows greatly improved strike effects when conducting simulations based on the Operation-Plan Analysis Model. Such a method of NCOE establishment will serve as a standard model for military force building and operation execution system for separated theater operations such as the NWI.

Implementation of Real-time Vowel Recognition Mouse based on Smartphone (스마트폰 기반의 실시간 모음 인식 마우스 구현)

  • Jang, Taeung;Kim, Hyeonyong;Kim, Byeongman;Chung, Hae
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.8
    • /
    • pp.531-536
    • /
    • 2015
  • The speech recognition is an active research area in the human computer interface (HCI). The objective of this study is to control digital devices with voices. In addition, the mouse is used as a computer peripheral tool which is widely used and provided in graphical user interface (GUI) computing environments. In this paper, we propose a method of controlling the mouse with the real-time speech recognition function of a smartphone. The processing steps include extracting the core voice signal after receiving a proper length voice input with real time, to perform the quantization by using the learned code book after feature extracting with mel frequency cepstral coefficient (MFCC), and to finally recognize the corresponding vowel using hidden markov model (HMM). In addition a virtual mouse is operated by mapping each vowel to the mouse command. Finally, we show the various mouse operations on the desktop PC display with the implemented smartphone application.