• Title/Summary/Keyword: Command&Control

Search Result 1,396, Processing Time 0.026 seconds

Pedestrian Dead Reckoning based Position Estimation Scheme considering Pedestrian's Various Movement Type under Combat Environments (전장환경 하에서 보행자의 다양한 이동유형을 고려한 관성항법 기반의 위치인식 기법)

  • Park, SangHoon;Chae, Jongmok;Lee, Jang-Myung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.10
    • /
    • pp.609-617
    • /
    • 2016
  • In general, Personal Navigation Systems (PNSs) can be defined systems to acquire pedestrian positional information. GPS is an example of PNS. However, GPS can only be used where the GPS signal can be received. Pedestrian Dead Reckoning (PDR) can estimate the positional information of pedestrians using Inertial Measurement Unit (IMU). Therefore, PDR can be used for GPS-disabled areas. This paper proposes a PDR scheme considering various movement types over GPS-disabled areas as combat environments. We propose a movement distance estimation scheme and movement direction estimation scheme as pedestrian's various movement types such as walking, running and crawling using IMU. Also, we propose a fusion algorithm between GPS and PDR to mitigate the lack of accuracy of positional information at the entrance to the building. The proposed algorithm has been tested in a real test bed. In the experimental results, the proposed algorithms exhibited an average position error distance of 5.64m and position error rate in goal point of 3.41% as a pedestrian traveled 0.6km.

A Study on the Necessity of Verification about depot level maintenance plan through the Weapons System cases analysis (무기체계 사례 분석을 통한 창정비개발계획안 검증 필요성 연구)

  • Ahn, Jung-Jun;Kim, Su-Dong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.2
    • /
    • pp.76-82
    • /
    • 2019
  • This study has done to search for a solution to remove risk limitedly caused by separating weapon system acquisition from operation and maintenance at the view point of Logistic Commander who's responsible for stable operation and maintenance after acquiring weapon system. At the System development stage, unverified overhaul development plan may cause additional manpower and costs after the development, and furthermore it is likely to have risk to lower reliability of the military. Thus, research and development agency should write overhaul development plan at the System development stage, and it should be verified through evaluation and verification test. Secondly, during research and development, institutional supplementation is needed to calculate human and material resources writing overhaul development plan. Thirdly, it should be able to analyze proper operation & maintenance plan and cost for overhaul plan at the pre-investigation stage. Fourthly, the base which can develop overhaul concept and overhaul factors should be included in the need and need determination document. Lastly, for the weapon system which has small amount of high power figure, project management should be performed to be able to specify at the each acquisition level of weapon system to realize Article 28, clause 3 and 4 of Defense business law.

A Methodology of AI Learning Model Construction for Intelligent Coastal Surveillance (해안 경계 지능화를 위한 AI학습 모델 구축 방안)

  • Han, Changhee;Kim, Jong-Hwan;Cha, Jinho;Lee, Jongkwan;Jung, Yunyoung;Park, Jinseon;Kim, Youngtaek;Kim, Youngchan;Ha, Jeeseung;Lee, Kanguk;Kim, Yoonsung;Bang, Sungwan
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.77-86
    • /
    • 2022
  • The Republic of Korea is a country in which coastal surveillance is an imperative national task as it is surrounded by seas on three sides under the confrontation between South and North Korea. However, due to Defense Reform 2.0, the number of R/D (Radar) operating personnel has decreased, and the period of service has also been shortened. Moreover, there is always a possibility that a human error will occur. This paper presents specific guidelines for developing an AI learning model for the intelligent coastal surveillance system. We present a three-step strategy to realize the guidelines. The first stage is a typical stage of building an AI learning model, including data collection, storage, filtering, purification, and data transformation. In the second stage, R/D signal analysis is first performed. Subsequently, AI learning model development for classifying real and false images, coastal area analysis, and vulnerable area/time analysis are performed. In the final stage, validation, visualization, and demonstration of the AI learning model are performed. Through this research, the first achievement of making the existing weapon system intelligent by applying the application of AI technology was achieved.

A study on the cyber common operation picture for situational awareness in cyberspace (사이버공간 내 상황인식을 위한 사이버 공통 작전 상황도 연구)

  • Kim, Kook-jin;Youn, Jae-pil;Yoon, Suk-joon;Kang, Ji-won;Kim, Kyung-shin;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.87-101
    • /
    • 2022
  • Cyber-attacks occur in the blink of an eye in cyberspace, and the damage is increasing all over the world. Therefore, it is necessary to develop a cyber common operational picture that can grasp the various assets belonging to the 3rd layer of cyberspace from various perspectives. By applying the method for grasping battlefield information used by the military, it is possible to achieve optimal cyberspace situational awareness. Therefore, in this study, the visualization screens necessary for the cyber common operational picture are identified and the criteria (response speed, user interface, object symbol, object size) are investigated. After that, the framework is designed by applying the identified and investigated items, and the visualization screens are implemented accordingly. Finally, among the criteria investigated by the visualization screen, an experiment is conducted on the response speed that cannot be recognized by a photograph. As a result, all the implemented visualization screens met the standard for response speed. Such research helps commanders and security officers to build a cyber common operational picture to prepare for cyber-attacks.

A Study on Cyber Operational Elements Classification and COA Evaluation Method for Cyber Command & Control Decision Making Support (사이버 지휘통제 의사결정 지원을 위한 사이버 작전요소 분류 및 방책 평가 방안 연구)

  • Lee, Dong-hwan;Yoon, Suk-joon;Kim, Kook-jin;Oh, Haeng-rok;Han, In-sung;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.99-113
    • /
    • 2021
  • In these days, as cyberspace has been recognized as the fifth battlefield area following the land, sea, air, and space, attention has been focused on activities that view cyberspace as an operational and mission domain in earnest. Also, in the 21st century, cyber operations based on cyberspace are being developed as a 4th generation warfare method. In such an environment, the success of the operation is determined by the commander's decision. Therefore, in order to increase the rationality and objectivity of such decision-making, it is necessary to systematically establish and select a course of action (COA). In this study, COA is established by using the method of classifying operational elements necessary for cyber operation, and it is intended to suggest a direction for quantitative evaluation of COA. To this end, we propose a method of composing the COES (Cyber Operational Elements Set), which becomes the COA of operation, and classifying the cyber operational elements identified in the target development process based on the 5W1H Method. In addition, by applying the proposed classification method to the cyber operation elements used in the STUXNET attack case, the COES is formed to establish the attack COAs. Finally, after prioritizing the established COA, quantitative evaluation of the policy was performed to select the optimal COA.

A Technology on the Framework Design of Virtual based on the Synthetic Environment Test for Analyzing Effectiveness of the Weapon Systems of Underwater Engagement Model (수중대잠전 교전모델의 무기체계 효과도 분석을 위한 합성환경기반 가상시험 프레임워크 설계 기술)

  • Hong, Jung-Wan;Park, Yong-Min;Park, Sang-C.;Kwon, Yong-Jin(James)
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.291-299
    • /
    • 2010
  • As recent advances in science, technology and performance requirements of the weapons system are getting highly diversified and complex, the performance requirements also get stringent and strict. Moreover, the weapons system should be intimately connected with other systems such as watchdog system, command and control system, C4I system, etc. However, a tremendous amount of time, cost and risk being spent to acquire new weapons system, and not being diminished compared to the rapid pace of its development speed. Defense Modeling and Simulation(M&S) comes into the spotlight as an alternative to overcoming these difficulties as well as constraints. In this paper, we propose the development process of virtual test framework based on the synthetic environment as a tool to analyze the effectiveness of the weapons system of underwater engagement model. To prove the proposed concept, we develop the test-bed of virtual test using Delta3D simulation engine, which is open source S/W. We also design the High Level Architecture and Real-time Infrastructure(HLA/RTI) based Federation for the interoperation with heterogeneous simulators. The significance of the study entails (1)the rapid and easy development of simulation tools that are customized for the Korean Theater of War; (2)the federation of environmental entities and the moving equations of the combat entities to manifest a realistic simulation.

Study on Countermeasures Against Increasing New Drugs (신종 마약류 증가에 따른 대응방안)

  • Jaehun Shin
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.2
    • /
    • pp.270-279
    • /
    • 2023
  • Purpose: The purpose of this study is to examine the new drugs that recently have shown rapid increase and provide solutions to eradicate them. Method: This study used the relevant preceding studies, statistics, and overseas materials to identify the new drug problems and suggest solutions. Result: Compared to the past, the numbers of criminals detected for the administration, distribution, and production of drugs are rapidly increasing. According to the statistical data on drugs in 2021, the number of drug-related cases decreased compared to the previous year. However, there are concerns because the amount of detected drugs increased more than three times, and the age group of drugrelated criminals are getting younger. Such results are largely affected by the spread of new drugs. In particular, it is deemed to be affected by the spread of new drugs, such as fentanyl, yaba, khat, kratom, etc., as well as the new psychoactive drugs and hemp-related materials. Conclusion: In response to spread of new drugs, this study suggests simplifying the temporary classification of drugs, enforcing control of foreign drug users, strengthening the cooperation with relevant institutions, such as Korea Customs Service and the Ministry of Food and Drug Safety, and intensifying the punishment on the drug users in order to strengthen the countermeasure against the new drugs.

Proposal for the 『Army TIGER Cyber Defense System』 Installation capable of responding to future enemy cyber attack (미래 사이버위협에 대응 가능한 『Army TIGER 사이버방호체계』 구축을 위한 제언)

  • Byeong-jun Park;Cheol-jung Kim
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.157-166
    • /
    • 2024
  • The Army TIGER System, which is being deployed to implement a future combat system, is expected to bring innovative changes to the army's combat methods and comabt execution capability such as mobility, networking and intelligence. To this end, the Army will introduce various systems using drones, robots, unmanned vehicles, AI(Artificial Intelligence), etc. and utilize them in combat. The use of various unmanned vehicles and AI is expected to result in the introduction of equipment with new technologies into the army and an increase in various types of transmitted information, i.e. data. However, currently in the military, there is an acceleration in research and combat experimentations on warfigthing options using Army TIGER forces system for specific functions. On the other hand, the current reality is that research on cyber threats measures targeting information systems related to the increasing number of unmanned systems, data production, and transmission from unmanned systems, as well as the establishment of cloud centers and AI command and control center driven by the new force systems, is not being pursued. Accordingly this paper analyzes the structure and characteristics of the Army TIGER force integration system and makes suggestions for necessity of building, available cyber defense solutions and Army TIGER integrated cyber protections system that can respond to cyber threats in the future.

Trends and Prospects of N. Korea Military Provocations After the Sinking of ROKS Cheon-an (천안함 폭침 이후 북한의 군사도발 양상과 전망)

  • Kim, Sung-Man
    • Strategy21
    • /
    • s.34
    • /
    • pp.58-92
    • /
    • 2014
  • Even after S. Korea took 5.24 Measure(24 May 2014), N. Korea has not stopped raising provocations such as the shelling of Yeonpyeong Island, electronic and cyber attacks. To make matters worse, the communist country lunched long-range missiles(twice) and conducted 3rd nuclear test, escalating tensions which could possibly lead to an all-out war. Korean Government failed to respond properly. However, escalation into an all-out war was deterred by the CFC immediately carrying out its peacetime duty(CODA). The US made a rapid dispatch of its augmentation forces(Aircraft carrier, nuclear-powered submarine, strategic bomber, F-22) to the Korean Peninsula. In recognition of the importance of the Combined Forces Command, since May 2013 the Park Geun-Hye Administration has been pushing ahead with re-postponement of Wartime Operational Control Transfer(which initially meant the disassembling of the CFC as of 1 December 2015) More recently, there has been a series of unusual indicators from the North. Judging from its inventory of 20 nuclear weapons, 1,000 ballistic missiles and biochemical weapons, it is safe to say that N. Korea has gained at least war deterrence against S. Korea. Normally a nation with nuclear weapons shrink its size of conventional forces, but the North is pursuing the opposite, rather increasing them. In addition, there was a change of war plan by N. Korea in 2010, changing 'Conquering the Korean Peninsula' to 'Negotiation after the seizure of the Greater Seoul Metropolitan Area(GSMA)' and establishing detailed plans for wartime projects. The change reflects the chain reaction in which requests from pro-north groups within the South will lead to the proclamation of war. Kim, Jeong-Un, leader of N. Korean regime, sent threatening messages using words such as 'exercising a nuclear preemptive strike right' and 'burning of Seoul'. Nam, Jae-June, Director of National Intelligence Service, stated that Kim, Jung-Un is throwing big talks, saying communization of the entire Korean Peninsula will come within the time frame of 3 years. Kim, Gwan-Jin, Defense Minister, shared an alarming message that there is a high possibility that the North will raise local provocations or a full-fledged war whenever while putting much emphasis on defense posture. As for the response concept of the Korean Government, it has been decided that 'ROK·US Combined Local Provocation Counter-Measure' will be adopted to act against local provocations from the North. Major provocation types include ▲ violation of the Northern Limit Line(NLL) with mobilization of military ships ▲ artillery provocations on Northwestern Islands ▲ low altitude airborne intrusion ▲ rear infiltration of SOF ▲ local conflicts within the Military Demarcation Line(MDL) ▲ attacking friendly ships by submarines. Counter-measures currently established by the US involves the support from USFK and USFJ. In order to keep the sworn promise, the US is reinforcing both USFK and USFJ. An all-out war situation will be met by 'CFC OPLAN5027' and 'Tailored Expansion Deterrence Forces' with the CFC playing a central role. The US augmentation forces stands at 690,000 troops, some 160 ships, 2,000 aircraft and this comprise 50% of US total forces, which is estimated to be ninefold of Korean forces. The CFC needs to be in center in handling both local provocations and an all-out war situation. However, the combat power of S. Korean conventional forces is approximately around 80% of that of N. Korea, which has been confirmed from comments made by Kim, Gwan-Jin, Defense Minister, during an interpellation session at the National Assembly. This means that S. Korean forces are not much growing. In particular, asymmetric capabilities of the North is posing a serious threat to the South including WMD, cyber warfare forces, SOF, forces targeting 5 Northwestern Islands, sub-surface and amphibious assault forces. The presence of such threats urgently requires immediate complementary efforts. For complementary efforts, the Korean Government should consider ① reinforcement of Korean forces; putting a stoppage to shrinking military, acquisition of adequate defense budget, building a missile defense and military leadership structure validity review, ② implementation of military tasks against the North; disciplinary measures on the sinking of ROKS Cheon-an/shelling of Yeonpyeong Islands, arrangement of inter-Korean military agreements, drawing lessons from studies on the correlation between aid for N. Korea, execution of inter-Korean Summit and provocations from the North, and ③ bolstering the ROK·US alliance; disregarding wartime operational control transfer plan(disassembling of CFC) and creation of a combined division.

Historical Review on the Security Service for the Royal Household in the "Goryeo" Era (고려시대 왕실호위제도의 사적 고찰)

  • Lee, Sung-Jin;Kim, Eui-Young;Lee, Jong-Hwan
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.413-429
    • /
    • 2007
  • The Guard over the royal household in the "Goryeo" era was the same as if was over the President or Ruler of a nation today. In those days, a king represented a nation and any threat to the safety of a king could bring the destruction of a nation and the dispersion of the people. by reviewing the change of the 2-Gun 6-Wi system of the era, it can be, summed up as follow, Ther will be suggestions. The Guard might focus on a king's personal safety in the wake of the system of the Silla and Taebong dynasties until the establishment of the Goryeo Dynasty's unique political system. "Goryeo" rebuilt the royal palace in Gyeonyeong-gun to take the shape of unified country after its accomplishment of unification of the late three countries, Then it was afraid of the rebellion and uprising of local powerful clans, The country put them under control and organized the local army with them in the era of Kings, Seongjong, through the kings, Seongjong and Gwangjong. The army system of "Goryeo" consisted of 2-Gun and 6-Wi, and 2-Gun placed above the 6-Wi played the role of the Royal guards, and among the organizations a certain army under the specific name of "Gyeonyong-gun" guarded the kings in the nearest position. An aristocratic culture enjoyed its golden age in the period of stability of the aristocracy of "Goryeo", but afterward in the confusion of the aristocratic disruption and incompatible confrontation the country lost its control, and faced military rebellions by treating civil officials well and ill-treating military officials The safety of kings become unstable with the grasping political power by the military officials, and "Dobang" was established in the era of Choi's family to grasp political power. In the era of Choi Woo, he gathered his men and organized his familys army with them and managed the personnel administration with the civil officials of "Jeongbang and Seobang under his command. Such a fact shows the similarity to today's task of guarding. Considering the facts that "Sambyeolcho, the military ground of the military-men-rule, was at the center of the struggling against Mongolia and that even after the fall of the military regime, they rebelled and fought against Mongolia to the end, we came to know that the nationalism in the era of the military era was great. In the transition of external situations from "Myeong" to "Won"(Chinese dynasties), the conflict between the old "Won"-friendly power and the new "Myeong"-friendly power caused the weakness of the power to guard the royal household, and "Goryeo" at last gave way to the newly rising "Joseon" led by Lee, Seong Gye who won the people's confidence.

  • PDF