• Title/Summary/Keyword: 지휘 및 통제

Search Result 130, Processing Time 0.025 seconds

Applications and Strategies on Defense Acquisition based CPS & IoT Technology (사이버물리시스템(CPS)과 사물인터넷(loT) 기술의 군사적 활용방안 및 추진전략)

  • Kye, J.E.;Park, P.J.;Kim, W.T.;Lim, C.D.
    • Electronics and Telecommunications Trends
    • /
    • v.30 no.4
    • /
    • pp.92-101
    • /
    • 2015
  • 미래 전장은 정보 지식 기반의 첨단 전력체계를 확충하기 위해 향후 전력구조를 통합, 지휘통제통신(C4I) 체계와 생존성과 통합성이 향상된 전장의 네트워크중심전(NCW) 수행능력을 향상시킬 것이다. 사이버물리시스템(Cyber-Physical Systems: CPS)은 함정전투체계에 적용되고 있는 DDS를 포함하여 국방 M&S의 근간인 Live, Virture, Constructive(L-V-C) 체계의 큰 축을 형성하고 있다. 사물인터넷(Internet of Things: IoT) 기술은 센서네트워크, 통신, Radio Frequency Identification(RFID), Ubiquitous Sensor Network(USN), Machine to Machine(M2M), D2D 기술 및 상황인지, 지능서비스를 위한 정보수집/가공/융합/분석/예측기술을 포괄적으로 포함한 기술로서 미래산업을 이끌어 갈 차세대 선도 기술이며, 특히 군사적으로도 감시정찰 센서네트워크(USN), 견마형로봇, 경전투로봇과 무인기 기술 및 전술정보통신망체계(TICN) 등 첨단 통신네트워크 기술의 전력화 추세는 IoT 기술의 적용영역을 넓혀주고 있다. 감시정찰체계(Sensor)에서는 감시정찰 분야 영상정보 처리, 표적탐지 등과 관련된 IoT 기술 소요와 지휘통제통신(C4I) 체계의 상호운용성, 데이터링크, 지능형 통신체계 등 C4I 관련 IoT 기술 소요 및 타격체계(Shooter)의 내장형 SW 등 유 무인 무기체계 관련 IoT 기술의 소요가 증대될 것으로 예상된다. 본고는 CPS 및 IoT 기술의 군사적 활용방안 및 획득전략에 대한 적용기술 및 발전방향을 살펴본다.

  • PDF

수상전투함의 발전추세

  • Kim, Deok-Su
    • Defense and Technology
    • /
    • no.1 s.275
    • /
    • pp.22-31
    • /
    • 2002
  • 한국의 해군력 건설 방향은 미래 해양 안보환경과 국가경제력에 상응함은 물론 주변국 해군에 대해 균형자적 역할을 담당할 수 있는 정예 해군력으로 건설해야 할 것이다. 이런 의미에서 수상 전투함은 높은 안정성, 고감도 탐지 장비와 함정 전투체계에 의한 성분작전 수행 능력 및 전역 탄도미사일 방어를 위한 탐지, 추적, 요격 및 실시간 지휘통제를 위한 함정 전투체계의 능력완비 등을 목표로 개발해 나가야 할 것이다.

  • PDF

합동감기 및 표적공격용 레이다 체계 (JSTARS)

  • Choe, In-Seok
    • Defense and Technology
    • /
    • no.8 s.174
    • /
    • pp.52-61
    • /
    • 1993
  • JSTARS는 일명 Joint STARS라고 하며 원거리에서 고정 및 이동 지상표적을 탐지, 추적하여 그 위치를 지상 지휘관과 공습항공기에 통보함으로써 적을 제압하는 미국 육.공군 합동 지휘통제 체계입니다 이 체계의 개발 동기는 서유럽에 대한 바르샤바군의 공격을 저지하기 위해, 원거리에서 나토(NATO)군이 재래식 무기를 사용하는데 표적 공격의 정확성이 필요하였기 때문입니다

  • PDF

The Development Methodology of Korea Command and Control Information Exchange Model (한국 지휘통제 정보교환모델 개발 방법론 연구)

  • Park, Gyudong;Kim, Kunyoung;Kim, Jongmo;Jeon, Hocheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.9
    • /
    • pp.1412-1422
    • /
    • 2022
  • The importance of interoperability between weapon systems is continuously increasing. Usually it is implemented by data exchange. The existence of information heterogeneities between systems decreases the efficiency and quality of the implementations enterprise-widely. Many other developed countries increase the efficiency and quality of the implementations by using information exchange model commonly. However, Korean military is still not aware of the importance and necessity of the model. This study explains the necessity of development and adaptation of the Korea command and control information exchange model(KC2IEM), and presents the methodology for the development of the model, and verifies and improves it through a prototype model development. The completion of the information exchange model could not be possible by academic research, therefore this study contributes as a motivation and a stepping stone for the following developments.

Comparative Analysis and Implications of Command and Control(C2)-related Information Exchange Models (지휘통제 관련 정보교환모델 비교분석 및 시사점)

  • Kim, Kunyoung;Park, Gyudong;Sohn, Mye
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.59-69
    • /
    • 2022
  • For effective battlefield situation awareness and command resolution, information exchange without seams between systems is essential. However, since each system was developed independently for its own purposes, it is necessary to ensure interoperability between systems in order to effectively exchange information. In the case of our military, semantic interoperability is guaranteed by utilizing the common message format for data exchange. However, simply standardizing the data exchange format cannot sufficiently guarantee interoperability between systems. Currently, the U.S. and NATO are developing and utilizing information exchange models to achieve semantic interoperability further than guaranteeing a data exchange format. The information exchange models are the common vocabulary or reference model,which are used to ensure the exchange of information between systems at the content-meaning level. The information exchange models developed and utilized in the United States initially focused on exchanging information directly related to the battlefield situation, but it has developed into the universal form that can be used by whole government departments and related organizations. On the other hand, NATO focused on strictly expressing the concepts necessary to carry out joint military operations among the countries, and the scope of the models was also limited to the concepts related to command and control. In this paper, the background, purpose, and characteristics of the information exchange models developed and used in the United States and NATO were identified, and comparative analysis was performed. Through this, we intend to present implications when developing a Korean information exchange model in the future.

일본 육상자위대의 고기능 전투복과 개인장구

  • Lee, Su-Sik
    • Defense and Technology
    • /
    • no.4 s.242
    • /
    • pp.82-87
    • /
    • 1999
  • 전투원(전투병사) 개인방호체계는 각개병사와 병사들이 전술적 환경에서 사용하기 위해 착용, 소모, 휴대하는 모든것을 포함하는 방호체계들의 시스템이다. 이러한 전투원 개인방호체계의 현대화 노력은 "위력", "지휘 및 통제", "생존성", "유지능력", "기능성"을 극대화하고 전투원 체계들을 디지털 전장에서 통합함으로써 전투상승효과를 달성할 수 있다

  • PDF

Simulation-based Worm Damage Assessment on ATCIS (시뮬레이션 기반 육군전술지휘정보체계에 대한 웜 피해평가)

  • Kim, Gi-Hwan;Kim, Wan-Joo;Lee, Soo-Jin
    • Journal of the military operations research society of Korea
    • /
    • v.33 no.2
    • /
    • pp.115-127
    • /
    • 2007
  • The army developed the ATCIS(Army Tactical Command Information System) for the battlefield information system with share the command control information through the realtime. The using the public key and the encryption equipment in the ATCIS is enough to the confidentiality, integrity. but, it is vulnerable about the availability with the zero day attack. In this paper, we implement the worm propagation simulation on the ATCIS infrastructure through the modelling on the ATCIS operation environment. We propose the countermeasures based on the results from the simulation.

A Study on Construction Method of AI based Situation Analysis Dataset for Battlefield Awareness

  • Yukyung Shin;Soyeon Jin;Jongchul Ahn
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.10
    • /
    • pp.37-53
    • /
    • 2023
  • The AI based intelligent command and control system can automatically analyzes the properties of intricate battlefield information and tactical data. In addition, commanders can receive situation analysis results and battlefield awareness through the system to support decision-making. It is necessary to build a battlefield situation analysis dataset similar to the actual battlefield situation for learning AI in order to provide decision-making support to commanders. In this paper, we explain the next step of the dataset construction method of the existing previous research, 'A Virtual Battlefield Situation Dataset Generation for Battlefield Analysis based on Artificial Intelligence'. We proposed a method to build the dataset required for the final battlefield situation analysis results to support the commander's decision-making and recognize the future battlefield. We developed 'Dataset Generator SW', a software tool to build a learning dataset for battlefield situation analysis, and used the SW tool to perform data labeling. The constructed dataset was input into the Siamese Network model. Then, the output results were inferred to verify the dataset construction method using a post-processing ranking algorithm.

Analysis of Network Influence Factor considering Social Network Analysis and C2 Time (소셜 네트워크 분석과 지휘통제시간을 고려한 네트워크 영향력 요소 분석)

  • Jeon, Jin-Tae;Park, Gun-Woo;Lee, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.257-266
    • /
    • 2011
  • Over the society the trial for several systems to be connected with Network has been continued to share information and to make it various. In accordance with such a change, the concept of military warfare conduction has been changing form platform centric warfare in separate combat system based on network centric warfare in network based. We have continuously made an effort that we try to get the goal with efficient system which is linked up with network, but such a study on that one in military system analysis is still slower than the study out of military until now. So this study is searching network influence factor by using military network with application of social network analysis method which is used broadly in the society and the science as well. At this time we search co-relationships between social network and the thing that we can analyse C2 time by effectiveness measurement means. By this study it has value of network influence factor identification for the growing network composition.

ICAN, I3A Design Criteria for Military Defense Command & Control Facilities (국방 지휘·통제 시설을 위한 ICAN, I3A 설계기준)

  • Jo, Yun-Jeong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.4
    • /
    • pp.806-815
    • /
    • 2017
  • Korean Ministry of National Defense has criteria for military facilities but most were made with the focus on design criteria of facilities and especially in the case of information and communication, only overall criteria with the level of conceptual design are suggested without details. By comparing the design standards of ICAN and I3A that are applied in US Department of Defense, this study will suggest the desirable design standard of Korean military on command/control facilities and general/administrative facilities.