• 제목/요약/키워드: 전술통신체계

Search Result 109, Processing Time 0.031 seconds

On the Use of SysML Models in the Conceptual Design of Unmanned Aerial Vehicles (무인항공기체계의 개념설계에서 SysML 모델의 활용에 관한 연구)

  • Kim, Young-Min;Lee, Jae-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2C
    • /
    • pp.206-216
    • /
    • 2012
  • Today's war fields can be characterized by net-centric wars where a variety of independent weapon systems are operated in connection with each other via networks. As such, weapon systems become dramatically advanced in terms of complexity, functionality, precision and so on. It is then obvious that the defense R&D of those requires systematic and efficient development tools enabling the effective management of the complexity, budget/cost, development time, and risk all together. One viable approach is known to be the development methods based on systems engineering, which is already proved to successful in U.S. In this paper, a systems engineering approach is studied to be used in the conceptual design of advanced weapon systems. The approach is utilizing some graphical models in the design phase. As a target system, an unmanned aerial vehicle system is considered and the standard SysML is also used as a modeling language to create models. The generated models have several known merits such as ease of understanding and communication. The interrelationships between the models and the design artifacts are identified, which should be useful in the generation of some design documents that are required in the defense R&D. The result reported here could be utilized in the further study that can eventually lead to a full-scale model-based systems engineering method.

Design of Ubiquitous Multi-Static Sonobuoy System with Smart Phone Control Function (스마트 폰 제어기능을 갖는 유비쿼터스 다중상태 소노부이 시스템 설계)

  • Kim, Jong-In;Lee, Seok-Won;Han, Min-Seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.2
    • /
    • pp.140-148
    • /
    • 2021
  • In this paper, we intend to improve the availability by integrating Sonobuoy, the most essential detection system used in anti-submarine operations, with LTE communication of smart devices. Anti-submarine capability to respond to the threat of North Korean submarine forces is becoming increasingly important, and continuous research and development is required. This paper aims to enhance the ability of acoustic tactics by using a military-only LTE communication system installed on a ship, smart devices that can be linked to it, and a multi-static sonobuoy controlled by them. The proposed system can increase the visual effect by not only displaying coordinate values by receiving accurate coordinate information of each sonobuoy to a smart device, but also displaying a marker on a map.

Performance Evaluation of Non-Coherent Detection Based Cyclic Code-Shift Keying (비동기 검파 기반 순환 부호 편이 변조 방식의 성능 분석)

  • Baek, Seung-Min;Park, Su-Won;Chung, Young-Uk
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.6
    • /
    • pp.42-48
    • /
    • 2010
  • Joint Tactical Information Distribution System (JTIDS) uses cyclic code shift keying (CCSK) for baseband symbol modulation, in which 5-bit information is mapped to one of thirty two 32-chip sequences. It is a kind of direct sequence based spread spectrum communication. In this paper, the performance of non-coherent detection of CCSK using non-orthogonal 32-chip sequence is evaluated. And a 32-chip sequence with better performance is also proposed and compared with the conventional one.

Performance Analysis of Link-16 Waveform considering Frequency Remapping under PBNJ (부분대역 잡음 재밍 환경에서의 주파수 재할당을 고려한 Link-16 성능 분석)

  • Lee, Kyuman;Noh, Hongjun;Lee, Jongkwan;Lim, Jaesung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.11
    • /
    • pp.955-965
    • /
    • 2013
  • The joint tactical information distribution system (JTIDS) is used as the communication terminal of Link-16 by the United States armed forces, north atlantic treaty organization (NATO), and other allied forces. A portion of Link-16 frequencies may be shortly remapped to other systems owing to the growing demand for frequencies, especially in civil aviation, which is witnessing a constant increase in air traffic. This will affect the performance of Link-16. Therefore, in this paper, we analyze the effect of frequency band reduction on the performance of Link-16 waveform under partial-band noise jamming with Nakagami fading, via simulation and numerical analysis. The multi-net and anti-jamming performance of Link-16 with frequency remapping is compared with that of conventional Link-16 systems. The results show that the performance of Link-16 waveform is degraded with the reduction in frequencies. Nonetheless, Link-16 retains its jam resistance, and it can support multiple users in the same time slots.

A Study on the Defense Geospatial Intelligence Governance - Focusing on the Intelligence Community and LandWarNet (국방지리공간정보 거버넌스에 대한 연구 - 미(美) 정보공동체와 육군 랜드워넷을 중심으로)

  • Kim, Dong Hwan
    • Spatial Information Research
    • /
    • v.22 no.1
    • /
    • pp.19-26
    • /
    • 2014
  • Recently, ICT environments have been increasingly developed and the pattern of the war also has been changed to NCW. The development of communication and network technology, for example, C4I and TDL(Tactical Data Link), has been prosperous and rapid. But the geospatial intelligence field which is the basis of the network frames relatively has not been developed. The purpose of this paper is to foster the geospatial governance in terms of the defense perspective. In order to do that, this paper deals with the U.S. Intelligence Community(IC) and the U.S. Army Global Information Grid(GIG), LandWarNet and those could be good examples of roles and statuses of geospatial intelligence. IC has been produced essential intelligence which is required for policymakers and military leaders. IC has several stove-piped intelligence process systems which have been separately developed and competed. And so as to complete GIG, the U.S. Army adopted LandWarNet. The U.S. Corps of Engineers organized the Army Geospatial Center(AGC) on 1 October 2009 to support LandWarNet. In order to develop NCW, we should recognize geospatial intelligence as the basis of network framework and make a central leading organization of defense geospatial intelligence. The mission of Korea Defense Geospatial-Intelligence Agency should be changed from producing GEOINT to a strategic GEOINT agency. The Army should organize a laboratory of geospatial intelligence field. The mission of producing GEOINT should be transferred to a geospatial intelligence battalion which is newly organized.

Analysis of Relative Combat Power with Expert System (전문가 시스템을 이용한 상대적 전투력 분석)

  • Han, Seung-Jo
    • Journal of Digital Convergence
    • /
    • v.14 no.6
    • /
    • pp.143-150
    • /
    • 2016
  • This paper's aim is to suggest the Expert System for analyzing relative combat power in ground operations. Since relative combat power analysis in terms of comparing combat power of friendly forces with one of the enemy can determine how the commander and staffs operate their unit afterwards, it requires fast and rational decision-making process. However, it has relied on manual method so far though Tactical Information Communications Network(TICN) into which numbers of applications can be loaded has been developed over a decade. 3 methods for analyzing relative combat power were expressed as mathematic rules to be used knowledge in the expert system after reviewing previous studies, and it studied how intangible power as well as tangible were reflected on total combat power. The expert system that will be built using EXSYS Corvid tool is expected to lessen error rate, provide faster decision-making, and reflect both intangible combat power and tangible one by using an appropriate weights in analyzing relative combat power. Next research filed includes how to build expert systems related with military personnel and intelligence areas for fast and rational decision-making processes.

An approach to define variable length messages using ASN.1 (ASN.1을 이용한 가변 길이 메시지 표현 방법)

  • Baek, Haeun;Kang, Sungwon;Kim, Jingyu;Kim, Jungmin;Kwon, Koohyung;Kim, Sangsoo
    • Journal of Software Engineering Society
    • /
    • v.25 no.2
    • /
    • pp.35-47
    • /
    • 2012
  • Variable Message Format(VMF) is a communications protocol that allows computers to exchange tactical military information over low-data-rate bearers. VMF is designed to define message length and structure variably in order to allow the user to transmit only the relevant information by using indicators. However, flexibility of messages makes it difficult to analyze messages structure and figure out meanings. Furthermore, whenever messages are added or modified, message processing software should be updated and distributed to systems. In this paper, we propose a systematic approach to defining VMF messages that uses the international standard notation ASN.1. By describing VMF messages in ASN.1, protocol architects can deal with VMF messages accurately and conveniently, and use various ASN.1 tool. This paper develops ASN.1 description templates for VMF message segments, and presents an approach to describing VMF messages in ASN.1 by combining the templates.

  • PDF

Analysis of an Effective Network of Information Delivery for Supporting Kill Chain in the Joint Battlefield Environment (합동전장 환경에서 효과적인 Kill Chain 지원을 위한 표적정보전달 네트워크 분석)

  • Lee, Chul-Hwa;Lee, Jong-Kwan;Goo, Ja-Youl;Lim, Jea-Sung
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.1
    • /
    • pp.11-23
    • /
    • 2014
  • Kill Chain is getting attention due to North Korea's recent nuclear test and missile launches and has emerged the need for an early build up. In order to build a materialized kill chain, you should review the unique kill chain to support operations effectively using various sensors and striking weapon system. Especially, you need a suitable network to reduce a reaction time against the enemy attack under joint operations environment etc. Currently there are many communication ways(e.g. data link, voice, video and text message) used in operations through satellite, wired and wireless and so on. Now, this paper contains analysis on various means for target information exchange which are used in the kill chain. And appropriate network of the kill chain for target information transmission is addressed to confirm feasibility of its alternatives, which is developed using AHP(Analytic Hierarchy Process). Finally, this paper is suggesting network and means of its building up for target information transmission of kill chain which can be implemented under the situation of joint battle field.

Detection Model of Malicious Nodes of Tactical Network for Korean-NCW Environment (한국형 NCW를 위한 전술네트워크에서의 악의적인 노드 검출 모델)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Ryou, Hwang-Bin;Jo, Yong-Gun
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.71-77
    • /
    • 2011
  • NCW(Network Centric- Warfare) encompasses the concept to use computer data processing and network linkage communications techniques, share information and furthermore, enhance the effectiveness of computer-operating systems. As IT(Information & Technology) have become developed in the recent years, the existing warfare system-centered conventional protocol is not use any longer. Instead, network-based NCW is being widely-available, today. Under this changing computer environment, it becomes important to establish algorithm and build the stable communication systems. Tools to identify malign node factors through Wireless Ad-hoc network cause a tremendous error to analyze and use paths of even benign node factors misreported to prove false without testing or indentifying such factors to an adequate level. These things can become an obstacle in the process of creating the optimum network distribution environment. In this regard, this thesis is designed to test and identify paths of benign node factors and then, present techniques to transmit data through the most significant open short path, with the tool of MP-SAR Protocol, security path search provider, in Ad-hoc NCW environment. Such techniques functions to identify and test unnecessary paths of node factors, and thus, such technique users can give an easy access to benign paths of node factors.