• Title/Summary/Keyword: 지휘 및 통제

Search Result 130, Processing Time 0.028 seconds

A Study on the Analysis of U.S.A Navy and R.O.K Military C4I System and Future Development (미해군과 한국군 C4I 체계 분석 및 발전 방향에 관한 연구)

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Jo, Yong-Gun;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.59-66
    • /
    • 2011
  • The representative concept of the future war is NCW. The main point of NCW is that it is connected by networ ks and gathers the battlefield status in real time, managing and controlling it. This is most needed in the navy. Operations of the navy are carried out in wide areas, individually or together. During this process, sharing information between each warship should be essential. Furthermore in the case of the American navy, they see the entire world as the operation area so it is a representative example of NCW. The C4I system of the Korean army is separated a ccording to the difference of each army's tactics and weapon system, being developed and managed differently. The refore there is a problem of interoperability lacking in each system. This paper analyzes the developed C4I system of the American navy to analyze the problems of C4I system of the Korean army, and propose the future direction of its development.

A Study on Application of u-Learning System in Network Centric Warfare Environment (네트워크중심전 환경에서의 u-러닝 시스템 적용방안에 관한 연구)

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Ryou, Hwang-Bin;Jo, Yong-Gun
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.43-49
    • /
    • 2010
  • With the development of information and communications technology(ICT), the concept of ubiquitous that we can communicate regardless of time and place appears. Due to the development of the technology delivering information, current society is called intellectualization society developed from informatization society. The intellectualization society is based on knowledge accumulated by processing information. The education methods are also developed into a concept of u-Learning applying the concept of ubiquitous from the concept of e-Learning using a computer. The military also points out education as a key policy. The aspect of war is changing to NCW(Network Centric Warfare) from platform centric warfare. Therefore, collecting and managing the war situations in real time is a key to controlling command. To this end, it needs to maximize individuals and groups' ability to cultivate the military with cutting-edge knowledge. Therefore, this study aims to look into methods to apply u-learning system in training and military actions according to changes in war environments and ICT.

A Study on the Operation Concept of Cyber Warfare Execution Procedures (사이버전 수행절차 운영개념에 관한 연구)

  • Kim, Sung-Joong;Yoo, JiHoon;Oh, HaengRok;Shin, Dongil;Shin, DongKyoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.73-80
    • /
    • 2020
  • Due to the expansion of cyber space, war patterns are also changing from traditional warfare to cyber warfare. Cyber warfare is the use of computer technology to disrupt the activities of nations and organizations, especially in the defense sector. However, the defense against effective cyber threat environment is inadequate. To complement this, a new cyber warfare operation concept is needed. In this paper, we study the concepts of cyber intelligence surveillance reconnaissance, active defense and response, combat damage assessment, and command control in order to carry out cyber operations effectively. In addition, this paper proposes the concept of cyber warfare operation that can achieve a continuous strategic advantage in cyber battlefield.

A Development of the Operational Architecture of a Low Altitude Air Defense Automation System (저고도 방공자동화체계의 운용아키덱처 개발)

  • Son, Hyun-Sik;Kwon, Yong-Soo
    • Journal of the military operations research society of Korea
    • /
    • v.34 no.1
    • /
    • pp.31-45
    • /
    • 2008
  • This paper describes a development of the operational architecture of a low altitude air defense automation system using a systems engineering approach. The future battlefield is changing to new system of systems that command and control by the network based BM/C4I. Also, it is composed of various sensors and shooters in an single theater. Future threats may be characterized as unmanned mewing bodies that the strategic effect is great such as UAVs, cruise missiles or tactical ballistic missiles. New threats such as low altitude stealth cruise missiles may also appear. The implementation of a low altitude air defense against these future threats is required to complex and integrated approach based on systems engineering. In this view, this work established an operational scenario and derived operational requirements by identifying mission and future operational environments. It is presented the operational architecture of the low altitude air defense automation system by using the CORE 5.0.

The Analysis of Crypto Communication Relay Effect in the Security Framework Technique of Network Centric Warfare Environment (NCW환경의 보안 프레임워크 기술에서 암호통신 중계영향 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.4
    • /
    • pp.788-794
    • /
    • 2007
  • The policy of US DoD is moving towards implementation of Network Centric Warfare(NCW) concepts. NCW is commonly described as the integration and synchronization of four key interdependent elements such as command and control, sensor system, engagement systems and the network. Therefore the military policy of Korea military is needed to access and examine the policy of NCW communication environment and crypto communication, which is able to apply it. In this case study, We are reviewed the security framework of the concept of network centric warfare in the centering around the US. It is introduced the core technology in the network centric warfare, and it is reviewed the security framework such as, the requirements of security, the characteristics security of global information grid, joint tactical radion system, net centric enterprise services, transformational communication satellite, in the basis of core technology, and analysis the effect of crypto communication relay between command node and surbornate node in NCW environment. This report support the assistance, which is considered the elements of surrounding effects in the varied crypto communication research area of NCW.

  • PDF

A Converting Method to Simulate DEVS Models on AddSIM (컴포넌트기반 체계모의환경(AddSIM)에서 실행하기 위한 DEVS 모델 변환 방법)

  • Kim, Dohyung;Oh, Hyunshik;Park, Juhye;Park, Samjoon
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.7
    • /
    • pp.488-493
    • /
    • 2015
  • An AddSIM(Adaptive distributed and parallel Simulation environment for Interoperable and reusable Models) is an integrated engagement simulation environment with high-resolution weapon system models for estimation and analysis of their performance and effectiveness. AddSIM can simultaneously handle the continuous dynamical system models based on continuous time, and command, control(C2) and network system models based on a discrete event. To accommodate legacies based on DEVS(Discrete Event System Specification) modeling, DEVS legacies must first be converted into AddSIM models. This paper describes how to implement DEVS models on AddSIM. In this study a method of mapping from hierarchical DEVS models to AddSIM players was developed: The hierarchical DEVS model should be flattened into a one layered model and four DEVS functions of the model, external transition, internal transition, output and time advance, should be mapped into functions of the AddSIM player.

A Study on the Analysis Method of Technology Trend on Tactical Data Link Using Intellectual Property Information (지식재산 정보를 이용한 전술데이터링크 기술동향 분석방법 연구)

  • Noh, Giseop
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.539-544
    • /
    • 2021
  • The tactical data link is a military data network to improve the ability to recognize battlefield situations. The ROK military is promoting the tactical data link performance improvement programs. Tactical data link is essential to combine and integrate various platforms, sensor data, and command and control (C2) systems. Therefore, the research on related technical fields is required. However, the tactical data link has not disclosed detailed technical information due to the characteristics of military operation. In this paper, we propose a data-based automated analysis methodology using intellectual property information to understand the technology trend of tactical data link. In this paper, data related to intellectual property is automatically collected and pre-processed, and analyzed in terms of time series. In addition, the current status of each institution of patent technology information was generated, and the process of identifying key-researchers through network analysis was presented with providing results of our approach in this paper.

A Study on the Expansion and Improvement of the Tactical Data Link Processing Structure for Link-22 SNC Interface (Link-22 SNC 연동을 위한 전술데이터링크 처리 구조 확장 개선 연구)

  • Jung, Suk-Ho;Hwang, Jung-Eun;Lee, Youn-Jeong;Park, Ji-Hyeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.6
    • /
    • pp.1045-1052
    • /
    • 2021
  • Modern Warfare is transforming into a Network Centric Warfare(NCW) where surveillance systems, command control systems and strike systems are interconnected with advanced IT technologies to share battlefield situations. The South Korean military is using the various tactical data links(TDL) such as Link-K, Link-16, Link-11 and KVMF depending on each military's battlefield situation. Joint Tactical Data Link System(JTDLS) is a system thar shares tactical information in near-real time between army/navy/air joint forces and additionally establishes Link-22 in Link-K, Link-16 and KVMF. In this paper, we propose the Link-22 system structure, Link-22 message analysis and the interface structure between the tactical data link processor and Link-22 to apply Link-22 to the JTDLS.

Development of Autonomous Behavior Software based on BDI Architecture for UAV Autonomous Mission (무인기 자율임무를 위한 BDI 아키텍처 기반 자율행동 소프트웨어 개발)

  • Yang, Seung-Gu;Uhm, Taewon;Kim, Gyeong-Tae
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.5
    • /
    • pp.312-318
    • /
    • 2022
  • Currently, the Republic of Korea is facing the problem of a decrease in military service resources due to the demographic cliff, and is pursuing military restructuring and changes in the military force structure in order to respond to this. In this situation, the Army is pushing forward the deployment of a drone-bot combat system that will lead the future battlefield. The battlefield of the future will be changed into an integrated battlefield concept that combines command and control, surveillance and reconnaissance, and precision strike. According to these changes, unmanned combat system, including dronebots, will be widely applied to combat situations that are high risk and difficult for humans to perform in actual combat. In this paper, as one of the countermeasures to these changes, autonomous behavior software with a BDI architecture-based decision-making system was developed. The autonomous behavior software applied a framework structure to improve applicability to multiple models. Its function was verified in a PC-based environment by assuming that the target UAV is a battalion-level surveillance and reconnaissance UAV.

Recommendation Model for Battlefield Analysis based on Siamese Network

  • Geewon, Suh;Yukyung, Shin;Soyeon, Jin;Woosin, Lee;Jongchul, Ahn;Changho, Suh
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.1
    • /
    • pp.1-8
    • /
    • 2023
  • In this paper, we propose a training method of a recommendation learning model that analyzes the battlefield situation and recommends a suitable hypothesis for the current situation. The proposed learning model uses the preference determined by comparing the two hypotheses as a label data to learn which hypothesis best analyzes the current battlefield situation. Our model is based on Siamese neural network architecture which uses the same weights on two different input vectors. The model takes two hypotheses as an input, and learns the priority between two hypotheses while sharing the same weights in the twin network. In addition, a score is given to each hypothesis through the proposed post-processing ranking algorithm, and hypotheses with a high score can be recommended to the commander in charge.