• Title/Summary/Keyword: Command&Control

Search Result 1,396, Processing Time 0.04 seconds

Tactical Fire Direction Automation for Command and Control of Artilliary Battalion Unit (대대급 화력(포병 부대)의 지휘통제(C2)를 위한 전술적 사격지휘 자동화 절차)

  • Ahn, Myong-Hwan;Ji, Jae-Kyung;Cho, Hyun-Ho;Sin, Chul-Soo;Park, Young-Woo;Lee, Teuc-Soo;Kim, Tae-Yeong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.11B
    • /
    • pp.1738-1747
    • /
    • 2010
  • This report shows the analysis and design of tactical decision automation procedure and the result of core algorithm. Expecially scheme of analysis and design includes result of tactical decision supporting procedure analysis for target engagement to fire in refer to AFATDS. Tactical decision automation procedure has three phases like target analysis, target priority, fire unit decision, fire method and attack method. Target analysis creates base information to decide priorities and attack methods through target activity, size and protection status. Target priority and fire unit decision judge target priority and fire unit with unit status and operation mission basis of target priority. Fire unit and Attack method decide fire style according to the kind of fire and ammunition for effective firing achievement. Finally, we show the effective tactical decision automation procedure through making the algorithm of priority and air control.

The Representative Technology Field Analysis of Domestic Defense Companies in Communication-electronics based on Patent Information Data (특허 자료 정보 기반 국내 통신전자 방산업체 대표 기술 분야 분석)

  • Kim, Jang-Eun;Cho, Yu-Seup
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.446-458
    • /
    • 2017
  • In order to make a decision about the acquisition of command control communication weapon systems considering the client's technology level requirements, the improvement of the domestic technology level and security of core technology, the person in charge can perform technology evaluation/analysis based on command control communication weapon system patent data. As a method of collecting such patent data, we can collect the patent data of government-designated (Defense Acquisition Program Act Article 35) companies (11 Major defense companies/9 General defense companies) through the Korea Intellectual Property Rights Information System (KIPRIS) of the Korean Intellectual Property Office (KIPO) In this way, we collected 1,526 patents and 134 International Patent Classification (IPC) types through the KIPRIS of the KIPO. Based on these data, we performed three types of analysis, General information analysis, Principal Components Analysis (PCA) and Network analysis, and extracted 27, 19 and 13 IPC types from them, respectively. Based on the above three analysis results, we confirmed 8 IPC types (F41A, F41G, G06F, G01S, H04B, H04L, H04M and H04W) as the key technologies and representative technology fields of domestic communication-electronics defense companies.

Simulation-Based Analysis of C System in C3 System of Systems Via Machine-Learning Based Abstraction of C2 System (머신러닝 기반의 C2 시스템 추상화를 통한 C3 복합체계에서의 시뮬레이션 기반 통신 시스템 분석)

  • Kang, Bong Gu;Seo, Kyung Min;Kim, Byeong Soo;Kim, Tag Gon
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.1
    • /
    • pp.61-73
    • /
    • 2018
  • In the defense modeling and simulation, for the detailed analysis of the communication system, many studies have carried out the analysis under the C3 SoS(system of systems) which consists of C2(command and control) and C(communication). However, it requires time and space constraints of the C2 system. To solve this problem, this paper proposes a communication analysis method in the standalone system environment which is combined with the C system after abstracting the C2 system. In the abstraction process, we hypothesize the traffic model and mobility model for C system analysis and learn the parameters in the model based on machine learning. Through the proposed method, it is possible to construct traffic and mobility model with different output according to the battlefield. This case study shows how the process can be applied to the C3 SoS and the enhanced accuracy than the existing method. We expect that it is possible to carry out the efficient communication analysis against many experimental scenarios with various communication parameters.

A Study of Cyber Operation COP based on Multi-layered Visualization (멀티레이어드 시각화를 적용한 사이버작전 상황도 개발에 관한 연구)

  • Kwon, Koohyung;Kauh, Jang-hyuk;Kim, Sonyong;Kim, Jonghwa;Lee, Jaeyeon;Oh, Haengrok
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.143-151
    • /
    • 2020
  • The cyber battlefield called the fifth battlefield, is not based on geological information unlike the existing traditional battlefiels in the land, sea, air and space, and has a characteristics that all information has tightly coupled correlation to be anlayized. Because the cyber battlefield has created by the network connection of computers located on the physical battlefield, it is not completely seperated from the geolocational information but it has dependency on network topology and software's vulnerabilities. Therefore, the analysis for cyber battlefield should be provided in a form that can recognize information from multiple domains at a glance, rather than a single geographical or logical aspect. In this paper, we describe a study on the development of the cyber operation COP(Common Operational Picture), which is essential for command and control in the cyber warfare. In particular, we propose an architecure for cyber operation COP to intuitively display information based on visualization techniques applying the multi-layering concept from multiple domains that need to be correlated such as cyber assets, threats, and missions. With this proposed cyber operation COP with multi-layered visualization that helps to describe correlated information among cyber factors, we expect the commanders actually perfcrm cyber command and control in the very complex and unclear cyber battlefield.

Construction of an Audio Steganography Botnet Based on Telegram Messenger (텔레그램 메신저 기반의 오디오 스테가노그래피 봇넷 구축)

  • Jeon, Jin;Cho, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.127-134
    • /
    • 2022
  • Steganography is a hidden technique in which secret messages are hidden in various multimedia files, and it is widely exploited for cyber crime and attacks because it is very difficult for third parties other than senders and receivers to identify the presence of hidden information in communication messages. Botnet typically consists of botmasters, bots, and C&C (Command & Control) servers, and is a botmasters-controlled network with various structures such as centralized, distributed (P2P), and hybrid. Recently, in order to enhance the concealment of botnets, research on Stego Botnet, which uses SNS platforms instead of C&C servers and performs C&C communication by applying steganography techniques, has been actively conducted, but image or video media-oriented stego botnet techniques have been studied. On the other hand, audio files such as various sound sources and recording files are also actively shared on SNS, so research on stego botnet based on audio steganography is needed. Therefore, in this study, we present the results of comparative analysis on hidden capacity by file type and tool through experiments, using a stego botnet that performs C&C hidden communication using audio files as a cover medium in Telegram Messenger.

A Methodology for Making Military Surveillance System to be Intelligent Applied by AI Model (AI모델을 적용한 군 경계체계 지능화 방안)

  • Changhee Han;Halim Ku;Pokki Park
    • Journal of Internet Computing and Services
    • /
    • v.24 no.4
    • /
    • pp.57-64
    • /
    • 2023
  • The ROK military faces a significant challenge in its vigilance mission due to demographic problems, particularly the current aging population and population cliff. This study demonstrates the crucial role of the 4th industrial revolution and its core artificial intelligence algorithm in maximizing work efficiency within the Command&Control room by mechanizing simple tasks. To achieve a fully developed military surveillance system, we have chosen multi-object tracking (MOT) technology as an essential artificial intelligence component, aligning with our goal of an intelligent and automated surveillance system. Additionally, we have prioritized data visualization and user interface to ensure system accessibility and efficiency. These complementary elements come together to form a cohesive software application. The CCTV video data for this study was collected from the CCTV cameras installed at the 1st and 2nd main gates of the 00 unit, with the cooperation by Command&Control room. Experimental results indicate that an intelligent and automated surveillance system enables the delivery of more information to the operators in the room. However, it is important to acknowledge the limitations of the developed software system in this study. By highlighting these limitations, we can present the future direction for the development of military surveillance systems.

Extraction and Taxonomy of Ransomware Features for Proactive Detection and Prevention (사전 탐지와 예방을 위한 랜섬웨어 특성 추출 및 분류)

  • Yoon-Cheol Hwang
    • Journal of Industrial Convergence
    • /
    • v.21 no.9
    • /
    • pp.41-48
    • /
    • 2023
  • Recently, there has been a sharp increase in the damages caused by ransomware across various sectors of society, including individuals, businesses, and nations. Ransomware is a malicious software that infiltrates user computer systems, encrypts important files, and demands a ransom in exchange for restoring access to the files. Due to its diverse and sophisticated attack techniques, ransomware is more challenging to detect than other types of malware, and its impact is significant. Therefore, there is a critical need for accurate detection and mitigation methods. To achieve precise ransomware detection, an inference engine of a detection system must possess knowledge of ransomware features. In this paper, we propose a model to extract and classify the characteristics of ransomware for accurate detection of ransomware, calculate the similarity of the extracted characteristics, reduce the dimension of the characteristics, group the reduced characteristics, and classify the characteristics of ransomware into attack tools, inflow paths, installation files, command and control, executable files, acquisition rights, circumvention techniques, collected information, leakage techniques, and state changes of the target system. The classified characteristics were applied to the existing ransomware to prove the validity of the classification, and later, if the inference engine learned using this classification technique is installed in the detection system, most of the newly emerging and variant ransomware can be detected.

A Case of Developing Performance Evaluation Model for Korean Defense Informatization (국방정보화 수준평가 모델 개발 사례)

  • Gyoo Gun Lim;Dae Chul Lee;Hyuk Jin Kwon;Sung Rim Cho
    • Information Systems Review
    • /
    • v.19 no.3
    • /
    • pp.23-45
    • /
    • 2017
  • The ROK military is making a great effort and investment in establishing network-centric warfare, a future battlefield concept, as a major step in the establishment of a basic plan for military innovation. In the military organization level, an advanced process is introduced to shorten the command control time of the military and the business process is improved to shorten the decision time. In the information system dimension, an efficient resource management is achieved by establishing an automated command control system and a resource management information system by using the battle management information system. However, despite these efforts, we must evaluate the present level of informatization in an objective manner and assess the current progress toward the future goal of the military by using objective indicators. In promoting informatization, we must systematically identify the correct areas of improvement and identify policy directions to supplement in the future. Therefore, by analyzing preliminary research, workshops, and expert discussions on the major informatization level evaluation models at home and abroad, this study develops an evaluation model and several indicators that systematically reflect the characteristics of military organizations. The developed informatization level evaluation model is verified by conducting a feasibility test for the troops of the operation class or higher. We expect that this model will be able to objectively diagnose the level of informatization of the ROK military by putting budget and resources into the right place at the right time and to rapidly improve the vulnerability of the information sector.

Performance Qualification Test of the CRDM for JRTR (요르단 연구용원자로 제어봉구동장치의 성능검증시험)

  • Choi, M.H.;Cho, Y.G.;Kim, J.H.;Lee, K.H.
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.25 no.12
    • /
    • pp.807-814
    • /
    • 2015
  • A control rod drive mechanism(CRDM) is a reactor regulating system, which inserts, withdraws or maintains a control rod containing a neutron absorbing material within a reactor core to control the reactivity of the core. The top-mounted CRDM for Jordan Research and Training Reactor(JRTR) with 5 MW power has been designed and fabricated based on the HANARO's experience through KAERI and DAEWOO consortium project. This paper describes the performance qualification test results to demonstrate the operability of a prototype and four production CRDMs during the reactor lifetime. The driving performance, the drop performance and the endurance tests for CRDM are carried out at a test rig simulating the actual reactor conditions. A vibration of internal components due to the coolant flow is also measured using a laser vibrometer. As a result, the CRDMs are driven having a good driving performance without a malfunction between command and output signals for the stepping motor. Also, the pure drop time and the impact acceleration are within 0.72 s and 4.2 g to meet the design requirements, and the vibrational displacement of control rod is measured as maximum $5.2{\mu}m$.

HIPI Controller of IPMSM Drive using ALM-FNN (ALM-FNN을 이용한 IPMSM 드라이브의 HIPI 제어기)

  • Ko, Jae-Sub;Choi, Jung-Sik;Chung, Dong-Hwa
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.23 no.8
    • /
    • pp.57-66
    • /
    • 2009
  • The conventional fixed gain PI controller is very sensitive to step change of command speed, parameter variation and load disturbances. The precise speed control of interior permanent magnet synchronous motor(IPMSM) drive becomes a complex issue due to nonlinear coupling among its winding currents and the rotor speed as well as the nonlinear electromagnetic developed torque. Therefore, there exists a need to tune the PI controller parameters on-line to ensure optimum drive performance over a wide range of operating conditions. This paper proposes hybrid intelligent-PI(HIPI) controller of IPMSM drive using adaptive learning mechanism(ALM) and fuzzy neural network(FNN). The proposed controller is developed to ensure accurate speed control of IPMSM drive under system disturbances and estimation of speed using artificial neural network(ANN) controller. The PI controller parameters are optimized by ALM-FNN at all possible operating condition in a closed loop vector control scheme, The validity of the proposed controller is verified by results at different dynamic operating conditions.