• Title/Summary/Keyword: Combat Simulation Model

Search Result 130, Processing Time 0.033 seconds

Analysis of Survivability for Combatants during Offensive Operations at the Tactical Level (전술제대 공격작전간 전투원 생존성에 관한 연구)

  • Kim, Jaeoh;Cho, HyungJun;Kim, GakGyu
    • The Korean Journal of Applied Statistics
    • /
    • v.28 no.5
    • /
    • pp.921-932
    • /
    • 2015
  • This study analyzed military personnel survivability in regards to offensive operations according to the scientific military training data of a reinforced infantry battalion. Scientific battle training was conducted at the Korea Combat Training Center (KCTC) training facility and utilized scientific military training equipment that included MILES and the main exercise control system. The training audience freely engaged an OPFOR who is an expert at tactics and weapon systems. It provides a statistical analysis of data in regards to state-of-the-art military training because the scientific battle training system saves and utilizes all training zone data for analysis and after action review as well as offers training control during the training period. The methodologies used the Cox PH modeling (which does not require parametric distribution assumptions) and decision tree modeling for survival data such as CART, GUIDE, and CTREE for richer and easier interpretation. The variables that violate the PH assumption were stratified and analyzed. Since the Cox PH model result was not easy to interpret the period of service, additional interpretation was attempted through univariate local regression. CART, GUIDE, and CTREE formed different tree models which allow for various interpretations.

A Study on VV&A Application for the Korean Wartime Resource Requirement Model (한국형 전시자원소요산정 모델에 대한 VV&A 적용방안 연구)

  • Kim, Min-Suk;Jung, Whan-Sik;Lee, Jae-Yeong
    • Journal of the military operations research society of Korea
    • /
    • v.35 no.2
    • /
    • pp.51-61
    • /
    • 2009
  • Recently, the necessity of VV&A and the importance of M&S are increasing in the national defense area. The purpose of VV&A is to assure a proper development of M&S and to provide users with sufficient information to determine if M&S could meet their demands. Therefore, VV&A process needs to be performed to guarantee the credibility of the M&S. However, the basic guidance and regulation of VV&A are not yet developed in Korea. This paper proposed the VV&A application process in the Korean Wartime Resource Requirement Model, focusing on the close combat situation of the model. The VV&A process provided in this paper can also be applied to other analytical models currently developing in Korea.

Integrated Scenario Authoring Method using Mission Impact Analysis Tool due to Cyber Attacks (사이버공격에 의한 임무영향 분석 도구를 이용한 통합시나리오 저작 방법)

  • Yonghyun Kim;Donghwa Kim;Donghwan Lee;Juyoub Kim;Myung Kil Ahn
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.107-117
    • /
    • 2023
  • It must be possible to assess how combat actions taking place in cyberspace affect the military's major mission systems and weapon systems. In order to analyze the mission impact caused by a cyber attack through cyber M&S, the target mission system and cyber warfare elements must be built as a model and a scenario for simulation must be authored. Many studies related to mission impact analysis due to cyber warfare have been conducted focusing on the United States, and existing studies have authored separate scenarios for physical battlefields and cyber battlefields. It is necessary to build a simulation environment that combines a physical battlefield model and a cyber battlefield model, and be able to integrate and author mission scenarios and cyber attack/defense scenarios. In addition, the physical battlefield and cyber battlefield are different work areas, so authoring two types of scenarios for simulation is very complicated and time-consuming. In this paper, we propose a method of using mission system information to prepare the data needed for scenario authoring in advance and using the pre-worked data to author an integrated scenario. The proposed method is being developed by reflecting it in the design of the scenario authoring tool, and an integrated scenario authoring in the field of counter-fire warfare is being performed to prove the proposed method. In the future, by using a scenario authoring tool that reflects the proposed method, it will be possible to easily author an integrated scenario for mission impact analysis in a short period of time.

A Study on Converting the Data of Probability of Hit(Ph) for OneSAF Model (OneSAF 모델을 위한 명중률 데이터 변환 방법)

  • Kim, Gun In;Kang, Tae Ho;Seo, Woo Duck;Pyun, Jae Jung
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.3
    • /
    • pp.83-91
    • /
    • 2020
  • To use the OneSAF model for the analysis of Defence M&S, the most critical factor is the acquisition of input data. The model user is hard to determine the input data such as the probability of hit(Ph) and the probability of kill(Pk). These data can be obtained directly by live fire during the development test and the operational test. Therefore, this needs more time and resources to get the Ph and Pk. In this paper, we reviewed possible ways to obtain the Ph and Pk. We introduced several data producing methodologies. In particular, the error budget method was presented to convert the Ph(%) data of AWAM model to the error(mil) data of OneSAF model. Also, the conversion method which can get the adjusted results from the JMEM is introduced. The probability of a hit was calculated based on the error budget method in order to prove the usefulness of the given method. More accurate data were obtained when the error budget method and the projected area from the published photo were used simultaneously. The importance of the Ph calculation was demonstrated by sensitivity analysis of the Ph on combat effectiveness. This paper emphasizes the importance of determining the Ph data and improving the reliability of the M&S system though steady collection and analysis of the Ph data.

Interference Influence Analysis on the Interoperability in the Combined Military Communication Systems (통합 군 통신 시스템에서 상호운용으로 인한 간섭 영향 분석)

  • Kim, Tae-Woo;Kim, Jung;Kwag, Young-Kil
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.25 no.3
    • /
    • pp.365-371
    • /
    • 2014
  • It is essential for the combined military weapon system to be equipped with interoperability for the efficient combat operation in the modern warfare environment. Since most of modern military systems utilize the electromagnetic wave for the radio communication in the network-centric warfare system, they can be vulnerable to the mutual interference among the adjacent combined military systems. In this paper, the typical radio communication systems are modeled with the modulation types of both spread and non-spread spectrum system. The various interference signals were generated for the simulation of the mutual interference influence from the adjacent radar and communication systems. The simulation results show that the detection performance of the victim communication receiver is seriously affected by the various interferences such as the types of modulation and the ratio of the overlapping bandwidth of the adjacent interferers. This result will be useful for defining the criteria of the interference protection in the combined military system for the interoperability in the future.

Power-aware Relay Selection Algorithm for Cooperative Diversity in the Energy-constrained Wireless Sensor Networks (전력 제한된 무선 센서네트워크에서 협력 다이버시티를 위한 전력인지 릴레이 선택 알고리즘)

  • Xiang, Gao;Park, Hyung-Kun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.10A
    • /
    • pp.752-759
    • /
    • 2009
  • Cooperative diversity is an effective technique to combat multi-path fading. When this technique is applied to energy-constrained wireless sensor networks, it is a key issue to design appropriate relay selection and power allocation strategies. In this paper, we proposed a new multi-relay selection and power allocation algorithm to maximize network lifetime. The algorithm are composed of two relay selection stages, where the channel condition and residual power of each node were considered in multi-relay selection and the power is fairly allocated proportional to the residual power, satisfies the required SNR at destination and minimizes the total transmit power. In this paper, proposed algorithm is based on AF (amplify and forward) model. We evaluated the proposed algorithm by using extensive simulation and simulation results show that proposed algorithm obtains much longer network lifetime than the conventional algorithm.

The Design and implementation of LVC Integrated Architecture Technology building division-level L-V-C Interoperability Training System (사단급 L-V-C연동훈련체계 구축을 위한 LVC통합아키텍쳐기술 설계 및 구현)

  • Won, Kyoungchan;Koo, JaHwan;Lee, Hojun;Kim, Yong-Pil
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.5
    • /
    • pp.334-342
    • /
    • 2021
  • In Korea, the training is performed through independent environments without interoperability among L-V-C systems. In the L system, training for large units is limited due to civil complaints at the training grounds and road restrictions. The V system is insufficient in training related to tactical training, and the C system lacks practicality due to a lack of combat friction elements. To achieve synchronicity and integration training between upper and lower units, it is necessary to establish a system to ensure integrated training for each unit by interoperating the currently operating L, V, and C systems. The interoperability between the C-C system supports Korea-US Combined Exercise. On the other hand, the actual development of the training system through the interoperability of L, V, and C has not been made. Although efforts are being made to establish the L, V, and C system centering on the Army, the joint composite battlefield and LVC integrated architecture technology are not yet secured. Therefore, this paper proposes a new plan for the future training system by designing and implementing the LVC integrated architecture technology, which is the core technology that can build the L-V-C interoperability training system. In conclusion, a division-level L-V-C interoperability training system can be established in the future by securing the LVC integrated architecture technology.

A study on Deep Operations Effect Analysis for Realization of Simultaneous Offense-Defence Integrated Operations (공방동시통합작전 구현을 위한 종심작전 효과분석 연구)

  • Cho, Jung Keun;Yoo, Byung Joo;Han, Do Heon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.116-126
    • /
    • 2021
  • Ground Component Command (GCC) has been developing operational planning and execution systems to implement "Decisive Integrated Operations", which is the concept of ground operations execution, and achieved remarkable results. In particular, "Simultaneous Offense-Defense Integrated Operations" is developed mainly to neutralize enemies in deep areas and develop favorable conditions for the allies early by simultaneously attacking and defending from the beginning of the war. On the other hand, it is limited to providing scientific and reasonable support for the commander's decision-making process because analyzing the effects of the deep operation with existing M&S systems is impossible. This study developed a model for analyzing the effects of deep operations that can be used in the KJCCS. Previous research was conducted on the effects of surveillance, physical strike, and non-physical strike, which are components of deep operations to find the characteristics and limitations and suggest a research direction. A methodology for analyzing the effects of deep operations reflecting the interactions of components using data was then developed by the GCC, and input data for each field was calculated through combat experiments and a literature review. Finally, the Deep operations Effect CAlculating Model(DECAM) was developed and distributed to the GCC and Corps battle staff during the ROK-US Combined Exercise. Through this study, the effectiveness of the methodology and the developed model were confirmed and contribute to the development of the GCC and Corps' abilities to perform deep operations.

Virtual Target Overlay Technique by Matching 3D Satellite Image and Sensor Image (3차원 위성영상과 센서영상의 정합에 의한 가상표적 Overlay 기법)

  • Cha, Jeong-Hee;Jang, Hyo-Jong;Park, Yong-Woon;Kim, Gye-Young;Choi, Hyung-Il
    • The KIPS Transactions:PartD
    • /
    • v.11D no.6
    • /
    • pp.1259-1268
    • /
    • 2004
  • To organize training in limited training area for an actuai combat, realistic training simulation plugged in by various battle conditions is essential. In this paper, we propose a virtual target overlay technique which does not use a virtual image, but Projects a virtual target on ground-based CCD image by appointed scenario for a realistic training simulation. In the proposed method, we create a realistic 3D model (for an instructor) by using high resolution Geographic Tag Image File Format(GeoTIFF) satellite image and Digital Terrain Elevation Data (DTED), and extract the road area from a given CCD image (for both an instructor and a trainee). Satellite images and ground-based sensor images have many differences in observation position, resolution, and scale, thus yielding many difficulties in feature-based matching. Hence, we propose a moving synchronization technique that projects the target on the sensor image according to the marked moving path on 3D satellite image by applying Thin-Plate Spline(TPS) interpolation function, which is an image warping function, on the two given sets of corresponding control point pair. To show the experimental result of the proposed method, we employed two Pentium4 1.8MHz personal computer systems equipped with 512MBs of RAM, and the satellite and sensor images of Daejoen area are also been utilized. The experimental result revealed the effective-ness of proposed algorithm.

Agent-based Modeling and Analysis of Tactical Reconnaissance Behavior with Manned and Unmanned Vehicles (에이전트 기반 유·무인 수색정찰 전술행위 모델링 및 분석)

  • Kim, Ju Youn;Han, Sang Woo;Pyun, Jai Jeong
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.4
    • /
    • pp.47-60
    • /
    • 2018
  • Today's unmanned technology, which is being used in various industries, is expected to be able to make autonomous judgements as autonomous technology matures, in the long run aspects. In order to improve the usability of unmanned system in the military field, it is necessary to develop a technique for systematically and quantitatively analyzing the efficiency and effectiveness of the unmanned system by means of a substitute for the tasks performed by humans. In this paper, we propose the method of representing rule-based tactical behavior and modeling manned and unmanned reconnaissance agents that can effectively analyze the path alternatives which is required for the future armored cavalry to establish a reconnaissance mission plan. First, we model the unmanned ground vehicle, small tactical vehicle, and combatant as an agent concept. Next, we implement the proposed agent behavior rules, e.g., maneuver, detection, route determination, and combatant's dismount point selection, by NetLogo. Considering the conditions of maneuver, enemy threat elements, reconnaissance assets, appropriate routes are automatically selected on the operation area. It is expected that it will be useful in analyzing unmanned ground system effects by calculating reconnaissance conducted area, time, and combat contribution ratio on the route.