• Title/Summary/Keyword: warfare information system

Search Result 202, Processing Time 0.024 seconds

Hardware configuration of High-Density HVPS and High Speed independent Control method Using FPGA for Phased Array Transmitters (위상 배열 고출력증폭기용 고밀도 고전압 전원공급기 하드웨어 구성 및 FPGA를 이용한 고속 독립 제어방식)

  • Kang, Chun-Ho;Lee, Sung-Wook;Lee, Hong-Hak;Lee, Chang-Hoon;Byun, Gi-Sig
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2758-2764
    • /
    • 2015
  • In the field of electronic warfare applications, high voltage power supply(HVPS) for high power phased array transmitters must necessarily have an independent operating characteristics for driving mini TWTs. TWT independent operational characteristics, in order to run without interrupting the electronic warfare mission by maintaining the partial transmission function even when one of the TWT has occurred a failure, is known to be very important. In this paper, we describe the research on high-speed independent control system using a high-density HVPS, including FE modulators, hardware configuration and the FPGA in order to independently operate mini TWTs. Also, we have simulated some possible faults in phased array transmitters, and presents the test results to control a faulted TWT independently.

A Study of Administration of Cyber Range (사이버 레인지 운용 방안 연구)

  • Kim, Daesik;Kim, Yonghyun
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.9-15
    • /
    • 2017
  • In the whole world the Attack Technologies of cyber warfare in modern society are growing faster and complicated. The frequency of the new attacks is shorter than before day by day. The defense technologies and experts against these attacks are very few. One of answers to solve these problems is the cyber range as a test-bed to prepare the cyber warfare considered by many countries. This paper examines the foreign cases and similar systems, collects and analyzes various attributes for cyber range. Finally it refines them through system engineering processes. In these processes missions and concepts for administration are set with architecture framework. The logical architecture is designed. Based on designed architecture two goals, defense technologies and procurement of experts, are established. And it shows effective and persistent administration of cyber range.

Prioritizing Maintenance of Naval Command and Control System Using Feature Selection

  • Choi, Junhyeong;Kang, Dongsu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.11
    • /
    • pp.219-228
    • /
    • 2019
  • Naval command and control system are very important for operation and their failures can be fatal for warfare. To prepare for these failures, we use feature selection method which is one of the data mining techniques. First, we analyzes failure data set of Navy from 2016 to 2018. And then We derive attributes that are associated with failure and to predict failure using feature selection method. We propose a method for prioritizing maintenance using the degree of association of attributes. This improves the efficiency and economics of command and control system maintenance.

A Proposal of Classification System on Cyber Attack for Damage Assessment of Cyber Warfare (사이버전 피해 평가를 위한 사이버 공격의 분류 체계 제시)

  • Park, Jinho;Kim, Yonghyun;Kim, Donghwa;Shin, Dongkyoo;Shin, Dongil
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.235-238
    • /
    • 2017
  • 최근에는 랜섬웨어의 일종인 '워너크라이' 등의 바이러스로 인한 피해도 기하급수적으로 증가하고, 그 수법도 사용자가 파일에 접근하면 감염되던 형태에서 인터넷에 접속되기만 하면 감염되는 형태로 진화하면서 사이버전에 사용되어질 수 있는 사이버 공격에 대응하는 방어 및 회복 방책에 대한 관심이 한층 더 증폭되고 있다. 하지만 일반적으로 방어, 회복 등의 대응 과정은 공격의 피해를 평가하여 결과로 산출된 피해 정도를 전제 조건으로 가지기 때문에 먼저 해킹 공격의 피해를 평가하여야 한다. 본 논문에서는 사이버전에서 사용되어질 수 있는 해킹 공격 및 위협의 피해를 공격의 종류별로 평가하기 위해, 피해 정도를 수치화할 수 있는지의 여부 등을 기준으로 하여 총 3가지 Interruption, Modification, Interception로 구성된 해킹 공격의 분류 체계를 제시한다.

Mathematical Algorithms for Two-Dimensional Positioning Based on GPS Pseudorange Technique

  • Ko, Kwang-Soob;Choi, Chang-Mook
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.5
    • /
    • pp.602-607
    • /
    • 2010
  • Recently, one has realized that the threedimensional positioning technique used in GPS can be effectively applied to the modern two-dimensional positioning. Such a technique might has applied to the twodimensional positioning in fields of the mobile communication, eLORAN and the GPS jamming/ electronic warfare system. In the paper, we have studied on algorithms for two-dimensional positioning based on GPS Pseudorange Technique. The main works and results are summarized below. First, the linearized state equation was mathematically derived based on GPS pseudorange technique. Second, the geometry model with respect to triangles formed using unit-vectors were proposed for investigation of land-based radio positioning. Finally, the corresponding mathematical formulations for DOP values and covariance matrix were designed for two-dimensional positioning.

Strategic Operation Method of Military Robot System for Future Warfare (미래 전투를 위한 군사 로봇 시스템의 전략적 운용 방법)

  • Lee, Jun-Pyo;Cho, Han-Jun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2012.01a
    • /
    • pp.169-170
    • /
    • 2012
  • 현대전에서는 인명 손실을 최소화하는 동시에 타 전투체계와의 연계를 통해 부여된 임무를 성공적으로 이끌어 내기 위해 무인로봇을 활발하게 이용하고 있다. 본 논문에서는 미래 전장에서 중심 역할을 수행할 것으로 기대되는 무인로봇과 통제장치의 기능을 제안한다. 통제장치는 디지털 지도를 기반으로 무인로봇의 위치를 전시하는 동시에 특정 위치로의 자율 이동 명령을 내리게 하는 인터페이스이다. 통제장치에서 무인로봇의 실시간 이동 간에 디지털 지도 기반 가시선(line of sight) 분석을 수행함으로써 통신 가능지역 식별 및 중계기를 통한 통신 가능 영역 식별을 용이하게 한다. 제안한 무인로봇과 통제장치를 통해 전장 환경에서 부여된 작전을 성공적으로 이끄는데 주된 역할을 수행할 것으로 기대한다.

  • PDF

Study of the Enhancement of Military Operation Supporting System (비상시 정부의 효율적인 군사작전 지원방안 연구)

  • Choi, Jae-Kyung
    • Journal of National Security and Military Science
    • /
    • s.5
    • /
    • pp.87-130
    • /
    • 2007
  • ROK and the United States finally reached accord on the controversial transition of Wartime Operational Control on February, 2007, and ROK Government needs to strengthen the role of supporting for the comprehensive threats of futuristic warfare. The crucial point of the supporting for Military Operation depends on the nation's mobilization capabilities. For the effective mobilization the following facets can be improved further. First of all, the organizational integrity of the mobilization network within the government can be bolstered along the vertical command chain. The process of mobilization must be improved and it is import to utilize the information system. On the other side the government plan to distribute timely the mobilized resources must be made up for the weak points and developed continuously. We can expect these points to be improved steadily with the execution of the National Defence Reform 2020.

  • PDF

Dynamic TDMA Protocol for Transmission of Tactical Information in Wireless Network (무선통신망에서 전술정보 전송을 위한 동적 시분할 다중접속프로토콜)

  • Park, Chang-Un;Kim, Tae-Kon;Lim, Man-Yeob;Lee, Youn-Jeong;Kim, Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.11B
    • /
    • pp.1640-1650
    • /
    • 2010
  • To prepare for the network centric warfare, Korea Joint Tactical Data Link System(KJTDLS) has been developed by the South Korean military recently and its development is divided into two phases: basic and complete ones. Due to the limited bandwidth and low transmission efficiency of the developing KJTDLS (basic), lots of problems could be occurred when the TDMA protocol in Link-16 is applied. In this paper, a new dynamic TDMA frame structure for KJTDLS(basic) is proposed and the performance of the proposed is evaluated through the implementation of simulation.

Construction Cost Estimation on the Initial Design Stage of Naval Ships based on a Product Configuration Model (Product Configuration Model 개념 기반의 함정 건조공수 추정 연구)

  • Oh, Dae-Kyun;Jeong, Yeon-Hwan;Shin, Jong-Gye;Choi, Yang-Ryul
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.46 no.3
    • /
    • pp.351-361
    • /
    • 2009
  • Many manufacturers define the system of a new product flexibility, and take advantage of previous-product information using the product configuration concept. Product configuration is an approach that defines the system of a new product centered on the product structure by referring to the previous-product information. In this paper, it is established how to apply the concept of a product configuration utilizing previous-ships information in construction cost estimation process systematically and effectively. For this, we define the advanced-construction cost estimation process based on a naval ship product model, and design construction cost estimating model. It is validated that this process and model have the applicability through the case study of the construction cost estimating of the mine-warfare ship.

Research on System Architecture and Simulation Environment for Cyber Warrior Training (사이버전사의 훈련을 위한 시스템 구축 방안 연구)

  • Ahn, Myung Kil;Kim, Yong Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.533-540
    • /
    • 2016
  • It is important to establish the environment for cyber warrior training, testing support and effectiveness analysis in order to cope with sharply increasing cyber threat. However, those practices cannot be easily performed in real world and are followed with many constraints. In this paper, we propose a live/virtual M&S-based system for training/testing and constructive M&S-based system for effectiveness analysis to provide an environment similar to real world. These can be utilized to strengthen the capability to carry out cyber war and analyze the impact of cyber threat under the large-scale networks.