• Title/Summary/Keyword: Air defense systems

Search Result 160, Processing Time 0.026 seconds

Following the Cold War, both the United States' military operational concept and the Republic of Korea Army's developmental study (탈냉전기 미국의 군사작전 개념과 한국군 발전방향 연구-합동작전을 중심으로)

  • Lee, Se-Han
    • Journal of National Security and Military Science
    • /
    • s.2
    • /
    • pp.121-163
    • /
    • 2004
  • Science technique development expanded into, not only land, sea, and air operations but also those of airspace, and cyber battle spaces. It is generally accepted at this time that space centric operations currently cannot be effectively divided from air operations. However, science and technology advancements make it possible to integrate Army, Navy, Airforce, and Marine forces into effective operations as never before. The Republic of Korea Armed Forces needs to establish a more effective joint concept. The US military, considered by many experts as the most effective in the world, understands the necessity of joint operations and accordingly has highly developed its own concept of joint operations. The US joint operational concepts demonstrated their effectiveness during the Iraqi War by dominating the battlefield through effective use of all combat and non-combat power. Following the US Iraqi War experience, the US Department of Defense continued to enhance Joint Capability through the acceleration of US Military Transformation involving all components. The future national security of the Republic of Korea, faced with the peculiarity of communist threat in the form of North Korea, and the conflicting interest of four strong powers; the United States, China, Japan, and Russia, depends on small but strong armed forces employing all available combat power through effective National and Military Strategy, and considering domestic and international constraints. In order to succeed in future wars, military operations following joint operational concepts must effectively employ all available combat power in a timely manner. The Republic of Korea Armed Forces must establish a joint forces concept in order to integrate all available combat power during employment. Therefore we must establish military operations that develop the military structure and organization, doctrine, weapon systems, training and education of our armed forces based on the key concept of joint operations.

  • PDF

Combustion Characteristics Study using Hyper-mixer in Low-enthalpy Supersonic Flow (하이퍼 혼합기를 사용한 저엔탈피 초음속 유동장 내연소 특성 연구)

  • Kim, Chae-Hyoung;Jeung, In-Seuck
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.17 no.6
    • /
    • pp.75-80
    • /
    • 2013
  • In this study, a forced ignition method with a plasma jet torch is studied in Mach 2 laboratory scaled wind-tunnel. The hyper-mixer is used as a mixer. For two normal injection cases, the one is collided against a wedge plate of the hyper-mixer and the other is directly injected into the cold main flow. For the first case, the hyper-mixer disperses the injected fuel, leading to the mixing enhancement. Furthermore, the fuel-air mixture is provided into the plasma hot gas, which enhances the combustion performance. However, the direct injection into the main flow method spends amount of fuel without ignition in the cold supersonic flow. In the end, for the forced combustion, it is important to supply the fuel-air mixture into the heat source.

Radio transmission link design based on a test bed considering a multi-beam active phase array antenna (다중빔 능동위상배열 안테나를 고려한 테스트베드 기반 Radio 전송링크 설계)

  • Youn, Jong-Taek;Kim, Yongi;Park, Hongjun;Park, Juman
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.11
    • /
    • pp.1574-1580
    • /
    • 2021
  • This paper designs and presents the results of an air network simulation radio transmission link applied with a multi-beam active phase array antenna simulator in a testbed system for verifying an air network currently underway as a technology development task. Using the Ku band, the Radio transmission link was designed in consideration of the link budget to satisfy the requirements for the system being developed. Considering short-distance links and long-distance links, the required EIRP and G/T performance scales of multi-beam repeaters and mission planes were applied to confirm the minimum and maximum link margins based on Eb/No. In this Radio Transmission Link design, the application analysis results such as rainfall availability are used to effectively establish standards when selecting the operating radius of the multi-beam relay system and related system standards.

Attack Capability Analysis for Securing Self-Survival of Air Defense Weapons (대공방어무기의 자기생존성 확보를 위한 공격능력분석)

  • Kim, Sea Ill;Shin, Jin
    • Journal of the Korea Society for Simulation
    • /
    • v.30 no.3
    • /
    • pp.11-17
    • /
    • 2021
  • The 30mm anti-aircraft gun has been developed with various types of weapon systems such as protective, protective complex, and wheel-type anti-aircraft artillery. The role of this anti-aircraft gun is an important anti-aircraft weapon in charge of air defense. Anti-aircraft weapons are tasked with defending the airspace from aircraft attacks. In particular, anti-aircraft weapons are organized in combination with mechanized units. And anti-aircraft weapons are prone to attack by enemies because they operate on the front lines of the battlefield. The enemy is expected to attack our troops by covering up or concealing as much as possible in order to increase their viability. Therefore, this study analyzed whether our 30mm anti-aircraft bullets could subdue the enemy in cover. This study analyzed the performance of 30mm anti-aircraft bullets using the M&S technique. For this study, live shooting and simulation method by M&S were used for the experiment. In this study, steel plate and plywood were used for the live shooting experiment. In addition, in the simulation process through M&S, this study used the PRODAS model, AUTODYN model, and Split-x model to analyze the trajectory, penetration, and fragmentation capability of 30mm anti-aircraft bullets. According to the experimental results, it has been proven that 30mm anti-aircraft bullets can destroy enemy armored vehicles. 30mm anti-aircraft bullets succeeded in quickly subduing enemies concealed in general buildings or forests. In this way, it was possible to minimize damage to allies in advance.

A research on cyber target importance ranking using PageRank algorithm (PageRank 알고리즘을 활용한 사이버표적 중요성 순위 선정 방안 연구)

  • Kim, Kook-jin;Oh, Seung-hwan;Lee, Dong-hwan;Oh, Haeng-rok;Lee, Jung-sik;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.115-127
    • /
    • 2021
  • With the development of science and technology around the world, the realm of cyberspace, following land, sea, air, and space, is also recognized as a battlefield area. Accordingly, it is necessary to design and establish various elements such as definitions, systems, procedures, and plans for not only physical operations in land, sea, air, and space but also cyber operations in cyberspace. In this research, the importance of cyber targets that can be considered when prioritizing the list of cyber targets selected through intermediate target development in the target development and prioritization stage of targeting processing of cyber operations was selected as a factor to be considered. We propose a method to calculate the score for the cyber target and use it as a part of the cyber target prioritization score. Accordingly, in the cyber target prioritization process, the cyber target importance category is set, and the cyber target importance concept and reference item are derived. We propose a TIR (Target Importance Rank) algorithm that synthesizes parameters such as Event Prioritization Framework based on PageRank algorithm for score calculation and synthesis for each derived standard item. And, by constructing the Stuxnet case-based network topology and scenario data, a cyber target importance score is derived with the proposed algorithm, and the cyber target is prioritized to verify the proposed algorithm.

The Establishment of Security Strategies for Introducing Cloud Computing

  • Yoon, Young Bae;Oh, Junseok;Lee, Bong Gyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.860-877
    • /
    • 2013
  • Cloud computing has become one of the most important technologies for reducing cost and increasing productivity by efficiently using IT resources in various companies. The cloud computing system has mainly been built for private enterprise, but public institutions, such as governments and national institutes, also plans to introduce the system in Korea. Various researches have pointed to security problems as a critical factor to impede the vitalization of cloud computing services, but they only focus on the security threats and their correspondents for addressing the problems. There are no studies that analyze major security issues with regard to introducing the cloud computing system. Accordingly, it is necessary to research the security factors in the cloud computing given to public institutions when adopting cloud computing. This research focuses on the priority of security solutions for the stepwise adoption of cloud computing services in enterprise environments. The cloud computing security area is classified into managerial, physical and technical area in the research, and then derives the detailed factors in each security area. The research derives the influence of security priorities in each area on the importance of security issues according to the identification of workers in private enterprise and public institutions. Ordered probit models are used to analyze the influences and marginal effects of awareness for security importance in each area on the scale of security priority. The results show workers in public institutions regard the technical security as the highest importance, while physical and managerial security are considered as the critical security factors in private enterprise. In addition, the results show workers in public institutions and private enterprise have remarkable differences of awareness for cloud computing security. This research compared the difference in recognition for the security priority in three areas between workers in private enterprise, which use cloud computing services, and workers in public institutions that have never used the services. It contributes to the establishment of strategies, with respect to security, by providing guidelines to enterprise or institutions that want to introduce cloud computing systems.

Technology Trends of Aeronautical Radio Navigation System and Raising Plan for Relevant Domestic Businesses (국내외 항공용 전파항법시스템 기술동향 및 국내 관련 산업 육성 방안)

  • Shin, Jae Chun;Lee, Eunsung;Leem, Choon Seong
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.6
    • /
    • pp.561-571
    • /
    • 2017
  • Radio navigation systems are already used as important national infrastructures in various fields such as air traffic, land transportation, geodetic survey, broadcasting communication and national defense, and are used in various industries. Since these systems are fusion of various technologies, it takes much time and cost in the development stage. In the early stages of development of the system, developed countries are establishing a national mid-term plan that meets international compatibility and standards. Korea did not develop the system due to the lack of national mid- and long-term plan, and it is not contributing effectively to industries. This paper analyzes the technical principles and technology trend of radio navigation system in the aviation sector to establish mid - and long - term plan. Based on the analyzed technology trends, the future prospect of technological development of the domestic navigation system and the development of related industries will be presented.

A Study of Threat Evaluation using Learning Bayesian Network on Air Defense (베이지안 네트워크 학습을 이용한 방공 무기 체계에서의 위협평가 기법연구)

  • Choi, Bomin;Han, Myung-Mook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.6
    • /
    • pp.715-721
    • /
    • 2012
  • A threat evaluation is the technique which decides order of priority about tracks engaging with enemy by recognizing battlefield situation and making it efficient decision making. That is, in battle situation of multiple target it makes expeditious decision making and then aims at minimizing asset's damage and maximizing attack to targets. Threat value computation used in threat evaluation is calculated by sensor data which generated in battle space. Because Battle situation is unpredictable and there are various possibilities generating potential events, the damage or loss of data can make confuse decision making. Therefore, in this paper we suggest that substantial threat value calculation using learning bayesian network which makes it adapt to the varying battle situation to gain reliable results under given incomplete data and then verify this system's performance.

Design of Hybrid Communication Structure for Video Transmission in Drone Systems (드론 영상 전송용 하이브리드 통신 구조의 설계)

  • Kim, Won
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.11
    • /
    • pp.9-14
    • /
    • 2019
  • In modern society drones are actively utilized in the fields of security, defense, agriculture, communication and so on. Smart technology and artificial intelligence software have been developed with convergence, and the field of use is expected to expand further. On the point of the excellent performance of drones one of the essential technologies is the wireless communication that make the ground facility receive the video streaming obtained by the drones in the air. In the research the concept of communication region is proposed to cover the both the low altitude region for Wi-Fi communication and the high altitude region for LTE communication for the sake of video transmission. Also the hybrid communication structure is designed along the proposed concept and the proposed system is implemented as a communication system in the small size which can be mounted in a small size of drone. It is confirmed that the proposed system contains the effectiveness by showing the ability to successfully transmit HD video streaming in the range of 500 meters and the transfer time between two different communication systems is measured in 200msec by the experiments.

Proximal Policy Optimization Reinforcement Learning based Optimal Path Planning Study of Surion Agent against Enemy Air Defense Threats (근접 정책 최적화 기반의 적 대공 방어 위협하 수리온 에이전트의 최적 기동경로 도출 연구)

  • Jae-Hwan Kim;Jong-Hwan Kim
    • Journal of the Korea Society for Simulation
    • /
    • v.33 no.2
    • /
    • pp.37-44
    • /
    • 2024
  • The Korean Helicopter Development Program has successfully introduced the Surion helicopter, a versatile multi-domain operational aircraft that replaces the aging UH-1 and 500MD helicopters. Specifically designed for maneuverability, the Surion plays a crucial role in low-altitude tactical maneuvers for personnel transportation and specific missions, emphasizing the helicopter's survivability. Despite the significance of its low-altitude tactical maneuver capability, there is a notable gap in research focusing on multi-mission tactical maneuvers that consider the risk factors associated with deploying the Surion in the presence of enemy air defenses. This study addresses this gap by exploring a method to enhance the Surion's low-altitude maneuvering paths, incorporating information about enemy air defenses. Leveraging the Proximal Policy Optimization (PPO) algorithm, a reinforcement learning-based approach, the research aims to optimize the helicopter's path planning. Visualized experiments were conducted using a Surion model implemented in the Unity environment and ML-Agents library. The proposed method resulted in a rapid and stable policy convergence for generating optimal maneuvering paths for the Surion. The experiments, based on two key criteria, "operation time" and "minimum damage," revealed distinct optimal paths. This divergence suggests the potential for effective tactical maneuvers in low-altitude situations, considering the risk factors associated with enemy air defenses. Importantly, the Surion's capability for remote control in all directions enhances its adaptability in complex operational environments.