• Title/Summary/Keyword: Battle Management System

Search Result 57, Processing Time 0.02 seconds

Study on Korean Variable Message Format Construction for Battlefield Visualization (전장가시화를 위한 한국형 지상전술데이터링크 구축 연구)

  • Kim, Seung-Chun;Lee, Hyung-Keun
    • Journal of IKEEE
    • /
    • v.15 no.1
    • /
    • pp.104-112
    • /
    • 2011
  • During the ground operation of Korean army, the voice message is mainly used for exchanging informations related to the surveillance and reconnaissance, command and control, and precision strike. However, in order to the battlefield visualization among fighting powers participating in the ground force operation, automatic situational awareness and variable message format (VMF) for command and control are required. For securing core technologies necessary for the battlefield visualization, message standard and message handler are established through several applied researches. Besides, the VMF for equipping a weapon system is in development. In this paper, a study on the Korean variable message format (KVMF), where interoperability of integrated battle management system (BMS) is guaranteed due to performing joint, ground, and combined operations so that the situation awareness and strike system can be automated in almost real time, is presented. From the modeling and simulation (M&S) results of the message processor, delay time is varied in accordance with the number of nodes in unit platoon network, message length, and generation interval of routine messages. Therefore, it is shown that the system performance can be optimized by establishing proper network protocol for each situation.

An Asset-Mission Dependency Model Adaptation and Optimized Implementation for Efficient Cyber Mission Impact Assessment (효율적인 임무 피해 평가를 위한 자산-임무 의존성 모델 적용 및 최적화된 구현)

  • Jeon, Youngbae;Jeong, Hyunsook;Han, In sung;Yoon, Jiwon
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.10
    • /
    • pp.579-587
    • /
    • 2017
  • Cyber Mission Impact Assessment is one of the essential tasks which many militaries and industrial major companies should perform to effectively achieve their mission. The unexpected damage to an organization's assets results in damage to the whole system's performance of the organizations. In order to minimize the damage, it is necessary to quantify the available capacity of the mission, which can be achieved only with the remaining assets, and to immediately prepare a new second best plan in a moment. We therefore need to estimate the exact cyber attack's impact to the mission when the unwanted damage occurs by modeling the relationship between the assets and the missions. In this paper, we propose a new model which deals with the dependencies between assets and missions for obtaining the exact impact of a cyber attack. The proposed model distinguishes task management from asset management for an efficient process, and it is implemented to be optimized using a vectorized operation for parallel processing and using a buffer to reduce the computation time.

A Study on Army NCO institutions for excellence manpower acquisition - Department College of NCO in connection with the acquisition workforce Revitalization - (우수 인력획득을 위한 육군 부사관 제도 연구 -인력획득과 연계한 전문대학의 부사관학과 활성화 중심으로-)

  • Kim, Young Joung
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.111-120
    • /
    • 2013
  • Army NCO roles and responsibilities in conjunction with the Defense Reform 2020 plan to perform a pivotal role in the bag the past tradition inherited bag and development, transition the mission commander helpers battle conductor, mainly functional experts, management experts from the bag to show PowerIt has a pivotal role as a transition. It embodies the director and the military organization of work within the scope of the statutes and rules, such as planning and implementation as the core of the Power which is most frontline officers, the NCO instructions and control through education and functional personnel to maintain the best Power will. Propose the measures that can be overcome by considering the importance of key personnel, operating personnel NCO in the military organization and analysis of the issues, the problem of the NCO system. The social awareness to be able to build a system to obtain a stable workforce through effective operations for changes in the revival, especially in the Department College of NCO activated mutual development challenges were present.

Information Security Model in the Smart Military Environment (스마트 밀리터리 환경의 정보보안 모델에 관한 연구)

  • Jung, Seunghoon;An, Jae-Choon;Kim, Jae-Hong;Hwang, Seong-Weon;Shin, Yongtae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.2
    • /
    • pp.199-208
    • /
    • 2017
  • IoT, Cloud, Bigdata, Mobile, AI, and 3D print, which are called as the main axis of the 4th Industrial Revolution, can be predicted to be changed when the technology is applied to the military. Especially, when I think about the purpose of battle, I think that IoT, Cloud, Bigdata, Mobile, and AI will play many role. Therefore, in this paper, Smart Military is defined as the future military that incorporates these five technologies, and the architecture is established and the appropriate information security model is studied. For this purpose, we studied the existing literature related to IoT, Cloud, Bigdata, Mobile, and AI and found common elements and presented the architecture accordingly. The proposed architecture is divided into strategic information security and tactical information security in the Smart Military environment. In the case of vulnerability, the information security is divided into strategic information security and tactical information security. If a protection system is established, it is expected that the optimum information protection can be constructed within an effective budget range.

The Conflict over the Separation of Prescribing and Dispensing Practice (SPDP) in Korea: A Bargaining Perspective (의약분업을 둘러싼 갈등 : 협상론의 관점에서)

  • Lee, Kyung-Won;Kim, Joung-Hwa;T. K. Ahn
    • Health Policy and Management
    • /
    • v.12 no.4
    • /
    • pp.91-113
    • /
    • 2002
  • We report and analyze the Korean physicians' recent general strike over the implementation of the Separation of Prescribing and Dispensing Practice (SPDP) in which more than 18,000 private clinics and 280 hospitals participated. Utilizing game-theoretic models of bargaining we explain why the Korean physicians were so successful in organizing intense collective action against the government and securing very favorable policy outcomes. In particular, we highlight the role of distributional conflict among social actors in shaping the details of institutional reform. The introduction of the SPDP was a necessary first step in the overall reform of health care system in Korea. However, the SPDP was perceived to be a serious threat to the economic viability of their profession by the vast majority of Korean physicians who had long been relied on the profits from selling medicines to compensate for the loss of income due to the low service fee under the previous health care system. The strong political coalition among heterogeneous physicians enabled them to organize an intense form of collective action, the general strike. Thus, physicians were successful not only in dragging the government to a bargaining table, but also winning in the bargaining and securing an outcome vastly favorable to them. On the other hand, the lack of an overall reform plan in the health care policy area, especially the finance of the National Health Insurance and the need for maintaining an image as a successful reform initiator, motivated the government to reach a quick resolution with the striking physicians.

Exact Algorithm for the Weapon Target Assignment and Fire Scheduling Problem (표적 할당 및 사격순서결정문제를 위한 최적해 알고리즘 연구)

  • Cha, Young-Ho;Jeong, BongJoo
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.42 no.1
    • /
    • pp.143-150
    • /
    • 2019
  • We focus on the weapon target assignment and fire scheduling problem (WTAFSP) with the objective of minimizing the makespan, i.e., the latest completion time of a given set of firing operations. In this study, we assume that there are m available weapons to fire at n targets (> m). The artillery attack operation consists of two steps of sequential procedure : assignment of weapons to the targets; and scheduling firing operations against the targets that are assigned to each weapon. This problem is a combination of weapon target assignment problem (WTAP) and fire scheduling problem (FSP). To solve this problem, we define the problem with a mixed integer programming model. Then, we develop exact algorithms based on a dynamic programming technique. Also, we suggest how to find lower bounds and upper bounds to a given problem. To evaluate the performance of developed exact algorithms, computational experiments are performed on randomly generated problems. From the results, we can see suggested exact algorithm solves problems of a medium size within a reasonable amount of computation time. Also, the results show that the computation time required for suggested exact algorithm can be seen to increase rapidly as the problem size grows. We report the result with analysis and give directions for future research for this study. This study is meaningful in that it suggests an exact algorithm for a more realistic problem than existing researches. Also, this study can provide a basis for developing algorithms that can solve larger size problems.

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.