• Title/Summary/Keyword: 지휘통제 모델

Search Result 30, Processing Time 0.022 seconds

Command and control modeling for computer assisted exercise (훈련시뮬레이션에서의 지휘통제 모델링)

  • Yun, Woo-Seop;Han, Bong-Gyu;Lee, Tae-Eog
    • Journal of the Korea Society for Simulation
    • /
    • v.25 no.4
    • /
    • pp.117-126
    • /
    • 2016
  • We suggest the C2 modeling method to develop a simulation model for training command groups which consist of commanders and staffs. By using C2 models in constructive simulation models, combat entities or units directly receive and execute orders from a command group without mediating human role players. We also compare combat results from suggested modeling method with the results of existing models by building and implementing a simulation model with C2 models. Our analysis by comparison demonstrates advantages of suggested method to model C2 for computer assisted exercises.

On the Development of the Generic CFCS for Engineering Level Simulation of the Surface Ship (공학수준 수상함 지휘무장통제체계 범용 모델 개발방안 연구)

  • Jung, Young-Ran;Han, Woong-Gie;Kim, Cheol-Ho;Kim, Jae-Ick
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.3
    • /
    • pp.380-387
    • /
    • 2011
  • In this paper, we considered the authoritative representation of Command and Fire Control System(CFCS) for the surface ship that was the engineering level model to develop system specifications and to analyze operational concepts on the concept design phase and to analyze military requirements, effectiveness and performance for the system. The engineering level model of CFCS can be used in simulation independently of the surface ship's type, and also it takes reuse, interoperability, and extension into consideration. The detailed sub-models, internal and external data interface, data flow among each sub-model, sensor and weapon models about the engineering level model of CFCS was defined. It was verified via engineering level simulations according to the V&V process.

Agent Based Modeling & Simulation for Command and Control (에이전트 기반 지휘통제 모의방법론)

  • Lee, Dong-Joon;Hong, Yoon-Gee
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.3
    • /
    • pp.39-48
    • /
    • 2007
  • This study suggests a method of command and control in modeling a combat situation. In particular, it presents the structure of an intelligent agent that may substitute for the current system of decision making in the military operation to lead a troop. Today the Korean military war game simulations emphasize on engagements, instead of command and control. This suggested principle will be a good foundation for the today and the future Korean warfare.

  • PDF

The Development Methodology of Korea Command and Control Information Exchange Model (한국 지휘통제 정보교환모델 개발 방법론 연구)

  • Park, Gyudong;Kim, Kunyoung;Kim, Jongmo;Jeon, Hocheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.9
    • /
    • pp.1412-1422
    • /
    • 2022
  • The importance of interoperability between weapon systems is continuously increasing. Usually it is implemented by data exchange. The existence of information heterogeneities between systems decreases the efficiency and quality of the implementations enterprise-widely. Many other developed countries increase the efficiency and quality of the implementations by using information exchange model commonly. However, Korean military is still not aware of the importance and necessity of the model. This study explains the necessity of development and adaptation of the Korea command and control information exchange model(KC2IEM), and presents the methodology for the development of the model, and verifies and improves it through a prototype model development. The completion of the information exchange model could not be possible by academic research, therefore this study contributes as a motivation and a stepping stone for the following developments.

A Study on the Establishment of Metaverse-based Police Education and Training Model (메타버스 기반 경찰 교육훈련모델 구축 방안에 관한 연구)

  • Oh, Seiyouen
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.3
    • /
    • pp.487-494
    • /
    • 2022
  • Purpose: This study proposes a Metaverse-based police education and training model that can efficiently improve the performance of various police activities according to changes in the environment of the times. Method: The structure of this system can generate Avatar Controller expressed using HMD and haptic technology, access the Network Interface, and educate and train individually or on a team basis through the command control module, education and training content module, and analysis module. Result: In the proposed model of this study, the command and control module was incorporated into individual or team-based education and training, enabling organic collaborative training among team members by monitoring the overall situation of terrorism or crime in real time. Conclusion: Metaverses-based individual or team-based police education and training can provide a more efficient and safe education and training environment based on immersion, interaction, and rapid judgment in various situations.

Development of the Data Communication based Future Air Base Defence Operation Model (데이터통신 기반 차세대 기지방어작전 모델 개발)

  • Pyo, Sang-Ho;Kim, Ki-Hyung;Lee, Tae-Gong
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.2
    • /
    • pp.157-173
    • /
    • 2014
  • As Air Base Defence, Anti-Aircraft Defence and Nuclear-Biological-Chemical Protection model considered as ground operation models in Republic of Korea Air Force are designed as the voice-centered system between participant nodes, there is a problem communicating accurately. In recent years, the military is developing a command and control capability using data communication technology to solve the problem. Therefore, this paper proposes new model to maximize efficiency of performance improvement through the Data Communication-based Future Air Base Defence Model. We refer to a research paper that is related existing and developed new model. and then we really experimented under WiBro Network that is constructed to Air Base for maintenance control. Based on the analysis and the test result of new Air Base Defence Model, we have concluded that the performance improvement effect is reached.

Comparative Analysis and Implications of Command and Control(C2)-related Information Exchange Models (지휘통제 관련 정보교환모델 비교분석 및 시사점)

  • Kim, Kunyoung;Park, Gyudong;Sohn, Mye
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.59-69
    • /
    • 2022
  • For effective battlefield situation awareness and command resolution, information exchange without seams between systems is essential. However, since each system was developed independently for its own purposes, it is necessary to ensure interoperability between systems in order to effectively exchange information. In the case of our military, semantic interoperability is guaranteed by utilizing the common message format for data exchange. However, simply standardizing the data exchange format cannot sufficiently guarantee interoperability between systems. Currently, the U.S. and NATO are developing and utilizing information exchange models to achieve semantic interoperability further than guaranteeing a data exchange format. The information exchange models are the common vocabulary or reference model,which are used to ensure the exchange of information between systems at the content-meaning level. The information exchange models developed and utilized in the United States initially focused on exchanging information directly related to the battlefield situation, but it has developed into the universal form that can be used by whole government departments and related organizations. On the other hand, NATO focused on strictly expressing the concepts necessary to carry out joint military operations among the countries, and the scope of the models was also limited to the concepts related to command and control. In this paper, the background, purpose, and characteristics of the information exchange models developed and used in the United States and NATO were identified, and comparative analysis was performed. Through this, we intend to present implications when developing a Korean information exchange model in the future.

Method for Analysis of C3 System of Systems Using Transformation of Federation Based on an Extended DEVS Formalism (확장된 DEVS 형식론 기반 페더레이션의 변환을 통한 C3 복합 체계의 분석 방법)

  • Kang, Bong Gu;Kim, Tag Gon
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.3
    • /
    • pp.13-21
    • /
    • 2018
  • The system of systems (SoS) based analysis method for the C3 system consisting of the communication system and the command and control (C2) system has the advantage that detailed analysis is possible, but it requires long execution time per one trial, which makes the analysis of various scenarios difficult. To solve this problem, this paper proposes a method for analysis of C3 SoS using a transformation of a federation into an integrated simulation. This transformation technique reduces the execution time while maintaining accuracy by abstracting the system other than the one to be analyzed, consisting of model hypothesis and function identification. The former can construct an abstracted model for the simulation through the proposed extended Discrete Event Systems Specification (DEVS) formalism and the latter can express the characteristics of the model influenced by other systems. From the case study on C and C2 analysis, the experimental results show that this method shortened the time considerably while maintaining the accuracy within an acceptable error range and we expect that this method will enable the exploratory analysis of the complex systems other than C3.

Simulation-based Worm Damage Assessment on ATCIS (시뮬레이션 기반 육군전술지휘정보체계에 대한 웜 피해평가)

  • Kim, Gi-Hwan;Kim, Wan-Joo;Lee, Soo-Jin
    • Journal of the military operations research society of Korea
    • /
    • v.33 no.2
    • /
    • pp.115-127
    • /
    • 2007
  • The army developed the ATCIS(Army Tactical Command Information System) for the battlefield information system with share the command control information through the realtime. The using the public key and the encryption equipment in the ATCIS is enough to the confidentiality, integrity. but, it is vulnerable about the availability with the zero day attack. In this paper, we implement the worm propagation simulation on the ATCIS infrastructure through the modelling on the ATCIS operation environment. We propose the countermeasures based on the results from the simulation.

A Study on Defense and Attack Model for Cyber Command Control System based Cyber Kill Chain (사이버 킬체인 기반 사이버 지휘통제체계 방어 및 공격 모델 연구)

  • Lee, Jung-Sik;Cho, Sung-Young;Oh, Heang-Rok;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.41-50
    • /
    • 2021
  • Cyber Kill Chain is derived from Kill chain of traditional military terms. Kill chain means "a continuous and cyclical process from detection to destruction of military targets requiring destruction, or dividing it into several distinct actions." The kill chain has evolved the existing operational procedures to effectively deal with time-limited emergency targets that require immediate response due to changes in location and increased risk, such as nuclear weapons and missiles. It began with the military concept of incapacitating the attacker's intended purpose by preventing it from functioning at any one stage of the process of reaching it. Thus the basic concept of the cyber kill chain is that the attack performed by a cyber attacker consists of each stage, and the cyber attacker can achieve the attack goal only when each stage is successfully performed, and from a defense point of view, each stage is detailed. It is believed that if a response procedure is prepared and responded, the chain of attacks is broken, and the attack of the attacker can be neutralized or delayed. Also, from the point of view of an attack, if a specific response procedure is prepared at each stage, the chain of attacks can be successful and the target of the attack can be neutralized. The cyber command and control system is a system that is applied to both defense and attack, and should present defensive countermeasures and offensive countermeasures to neutralize the enemy's kill chain during defense, and each step-by-step procedure to neutralize the enemy when attacking. Therefore, thist paper proposed a cyber kill chain model from the perspective of defense and attack of the cyber command and control system, and also researched and presented the threat classification/analysis/prediction framework of the cyber command and control system from the defense aspect