• Title/Summary/Keyword: Information warfare

Search Result 370, Processing Time 0.03 seconds

(The Design and Development of a Web Based Information System for Effective Military Material Supply Chains) (효율적인 국방물자 보급체인을 위한 웹 기반 정보체계의 설계 및 구현)

  • Woo, Hoon-Shik;Lee, Bong-Ho;Park, Jung-Kap
    • Journal of the military operations research society of Korea
    • /
    • v.35 no.1
    • /
    • pp.83-93
    • /
    • 2009
  • The future warfare is known as an effective centric paralysis warfare where military high technologies such as pinpoint strikes are applied. In this future warfare, for supporting military operation leadership and power of concentration in the combat, a new concept of logistic support is required and the focused logistic is proposed as an alternative. To implement this focused logistic, asset visibility should be assumed for every combat units in real time. However, current logistic information systems provide only limited information. In this study, a prototype information system for class 2 and 4 supplies is proposed for overcome limitations of current information system. The developed prototype zooms in on combat units providing business process integrations and logistic function synchronization. Also, asset visibility, the essential element of focused logistics, is presented and utilized to show the speedy and effective logistic support.

An Agent based Emergency Warning System for Dealing With Defensive Information Warfare in Strategic Simulation Exercises (전략시뮬레이션 훈련에서의 방어적 정보전을 위한 에이전트 기반 위기경보시스템의 개발)

  • Lee Yong-Han;Kumara Soundar R.T.
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.3
    • /
    • pp.11-26
    • /
    • 2004
  • Software for analyzing documents on the net to detect specific categories of occurrences is in great demand. In the current world where detecting terrorist threats is critical there is a great need for such systems. One of the critical application areas of such software is the automatic detection of a national infrastructure emergency. In this research an agent-based generic architecture for emergency warning systems is proposed and implemented. This system, called the National Infrastructure Emergency Warning System (NIEWS), is designed to analyze given documents, to detect threats, and to report possible threats with the necessary information to the appropriate users autonomously. In addition, a systematic analysis framework to detect emergencies on the subject of defensive information warfare is designated and implemented through a knowledge base. The developed system along with the knowledge base is implemented and successfully deployed to Strategic Crisis Exercise (SCE) at the United State Army War College (USAWC), saving a good amount of money by replacing human SMEs (subject matter experts) in the SCE.

  • PDF

A Literature Review of the Effectiveness Measurement for NCW (NCW 효과측정에 관한 문헌조사 연구)

  • Jung, Chi-Young;Lee, Jae-Yeong
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.37 no.2
    • /
    • pp.1-16
    • /
    • 2012
  • NCW(Network Centric Warfare) offers BSEs(Battelspace-Entities) the capabilities of sharing information through C4ISRCommand, Control, Communications, Computers and Intelligence, Surveillance and Reconnaissance) network and it also improves their combat powers based on information superiority with awareness of common situation in battlefield and self-synchronization. Although the concept of NCW was developed at the end of 1990 and there have been various studies for NCW from the development of its concept, the effort for measuring the synergistic effect of NCW is insufficient at the present time. Therefore, in this paper we reviewed literatures concerning the effectiveness measurement of NCW. The category of our survey is network effect, metrics, simulation, battlefield information, social network analysis and mathematical model. The main purpose of this study is to suggest future researchers a research direction by analyzing the aspects and limitations of existing studies about the quantitative measurement of NCW.

Algorithm for Threat Data Integration of Multiple Sensor and selection of CounterMeasures (이기종 다중센서 위협데이터 통합 및 대응책 선정 알고리즘)

  • Go, Eun-Kyoung;Woo, Sang-Min;Jeong, Un-Seob
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.3
    • /
    • pp.474-481
    • /
    • 2011
  • The Electronic Warfare Computer for the Aircraft Survivability Equipment will improve the ability for countermeasures by analysis about threat information. This paper suggests method that threat data integration of multiple sensors(Radar Warning Receiver, Laser Warning Receiver, Missile Warning Receiver). The algorithm of threat data integration is based on detected threat sequence and azimuth information. The threat sequence information is analyzed in advance and the azimuth data is received from sensors. The suggested method is evaluated through simulation under the environment like real helicopter.

The Trends of Domestic and Overseas Cyber Security Training (국내외 사이버보안 훈련 동향)

  • Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.6
    • /
    • pp.857-860
    • /
    • 2021
  • The 21st century society has entered the fourth industrial society of machine to machine from the information society of human to machine. Accordingly, countries around the world are always operating efficient crisis management systems that can quickly respond to disasters or crises. As cyber attacks such as cyber warfare are actually progressing, countries around the world are conducting defense training in response to cyber attacks, and reflecting the results of simulation attacks in improving or building security systems. In this paper, we would like to consider the future cyber training development guide by comparing and analyzing the trends of cyber training in domestic and foreign countries.

Analysis of Network Influence Factor considering Social Network Analysis and C2 Time (소셜 네트워크 분석과 지휘통제시간을 고려한 네트워크 영향력 요소 분석)

  • Jeon, Jin-Tae;Park, Gun-Woo;Lee, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.257-266
    • /
    • 2011
  • Over the society the trial for several systems to be connected with Network has been continued to share information and to make it various. In accordance with such a change, the concept of military warfare conduction has been changing form platform centric warfare in separate combat system based on network centric warfare in network based. We have continuously made an effort that we try to get the goal with efficient system which is linked up with network, but such a study on that one in military system analysis is still slower than the study out of military until now. So this study is searching network influence factor by using military network with application of social network analysis method which is used broadly in the society and the science as well. At this time we search co-relationships between social network and the thing that we can analyse C2 time by effectiveness measurement means. By this study it has value of network influence factor identification for the growing network composition.

Enhanced Pulse Amplitude Estimation Method for Electronic Warfare Support (전자전 지원을 위한 향상된 펄스 세기 추정 기법)

  • Lee, Yu-Ri;Kim, Dong-Gyu;Kwak, Hyungyu;Kim, Hyoung-Nam
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.3
    • /
    • pp.649-660
    • /
    • 2017
  • In electronic warfare, the pulse amplitude, one of information of a pulse signal emitted by an enemy, is used for estimating distance from the source and for deinterleaving mixed source signals. An estimate of pulse amplitude is conventionally determined as the maximum magnitude of a Fourier transformed signal within its pulse width which is estimated pre-step in an electronic warfare receiver. However, when frequency modulated signals are received, it is difficult to estimate their pulse amplitudes with this conventional method because the energy of signals is dispersed in frequency domain. In order to overcome this limitation, this paper proposes an enhanced pulse amplitude estimation method which calculates the average power of the received pulse signal in time domain and removes the noise power of the receiver. Simulation results show that even in case the frequency modulated signal is received, the proposed method has the same performance as estimating the pulse amplitude when unmodulated signal is received. In addition, the proposed method is shown to be more robust to an estimation error of pulse width, which affects the estimation performance of pulse amplitude, than the conventional method.

Design of Over-sampled Channelized DRFM Structure in order to Remove Interference and Prevent Spurious Signal (간섭 제거 및 스퓨리어스 방지를 위한 오버샘플링 된 채널화 DRFM 구조 설계)

  • Kim, Yo-Han;Hong, Sang-Guen;Seo, Seung-Hun;Jo, Jung-Hun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.8
    • /
    • pp.1213-1221
    • /
    • 2022
  • In Electronic Warfare, the need to develop a jamming system that protects our location information from enemy radar is constantly increasing. The jamming system normally uses wide-band DRFM(Digital Radio Frequency Memory) that processes the entire bandwidth at once. However, it is difficult to jam if there is a CW(Continuous Wave) interference signal in the band. Recently, instead of wide-band signal processing, a structure using a filter bank that divides the entire band into several sub-bands and processes each sub-band independently has been proposed. Although it is possible to handle interference signal through the filter bank structure, spurious signal occurs when the signal is received at a boundary frequency between sub-bands. Spurious signal makes a output power of jamming signal distributed, resulting in lower JSR(Jamming to Signal Ratio) and less jamming effect. This paper proposes an over-sampled channelized DRFM structure that enables interference response and prevents spurious signal for sub-band boundary frequency input.

A Study of Influencing Factors Upon Using C4I Systems: The Perspective of Mediating Variables in a Structured Model (C4I 시스템 사용의 영향 요인에 관한 연구: 구조모형의 매개변수의 관점에서)

  • Kim, Chong-Man;Kim, In-Jai
    • Asia pacific journal of information systems
    • /
    • v.19 no.2
    • /
    • pp.73-94
    • /
    • 2009
  • The general aspects for the future warfare shows that the concept of firepower and maneuver centric warfare has been replacing with that of information and knowledge centric warfare. Thus, some developed countries are now trying to establish the information systems to perform intelligent warfare and innovate defense operations. The C4I(Command, Control, Communication, Computers and Intelligence for the Warrior) systems make it possible to do modern and systematic war operations. The basic idea of this study is to investigate how TAM(Technology Acceptance Model) can explain the acceptance behavior in military organizations. Because TAM is inadequate in explaining the acceptance processes forcomplex technologies and strict organizations, a revised research model based upon TAM was developed in order to assess the usage of the C4I system. The purpose of this study is to investigate factors affecting the usage of C4I in the Korean Army. The research model, based upon TAM, was extended through a belief construct such as self-efficacy as one of mediating variables. The self-efficacy has been used as a mediating variable for technology acceptance, and the variable was included in the research model. The external variables were selected on the basis of previous research. The external variables can be classified into following: 1) technological, 2) organizational, and 3) environmental factors on the basis of TOE(Technology-Organization-Environment) framework. The technological factor includes the information quality and the task-technology fitness. The organizational factor includes the influence of senior colleagues. The environmental factor includes the education/train data. The external variables are considered very important for explaining the behavior patterns of information technology or systems. A structured questionnaire was developed and administrated to those who were using the C4I system. Total 329 data were used for statistical data analyses. A confirmatory factor analysis and structured equation model were used as main statistical methods. Model fitness Indexes for measurement and structured models were verified before all 18 hypotheses were tested. This study shows that the perceived usefulness and the self-efficacy played their roles more than the perceived ease of use did in TAM. In military organizations, the perceived usefulness showed its mediating effects between external variables and dependent variable, but the perceived ease of use did not. These results imply that the perceived usefulness can explain the acceptance processes better than the perceived ease of use in the army. The self-efficacy was also used as one of the three mediating variables, and showed its mediating effects in explaining the acceptance processes. Such results also show that the self-efficacy can be selected as one possible belief construct in TAM. The perceived usefulness was influenced by such factors as senior colleagues, the information quality, and the task-technology fitness. The self-efficacy was affected by education/train and task-technology fitness. The actual usage of C4I was influenced not by the perceived ease of use but by the perceived usefulness and selfefficacy. This study suggests the followings: (1) An extended TAM can be applied to such strict organizations as the army; (2) Three mediation variables are included in the research model and tested at real situations; and (3) Several other implications are discussed.

Design and Evaluation of Information Broker Architecture for Network-Centric Operational Environment (네트워크 중심 작전 환경을 위한 정보 브로커 아키텍처 설계 및 평가)

  • Park, Jejun;Kang, Dongsu
    • Journal of KIISE
    • /
    • v.43 no.6
    • /
    • pp.668-677
    • /
    • 2016
  • The information superiority through effective networking is a core element that accelerates command decision for mission completion. Our military wants to acquire capabilities of effective information sharing with Network-Centric Operational Environment(NCOE) for Network-Centric Warfare (NCW). In this paper, we suggested an information broker for overcoming current limits and maximizing future expandability and possibility of information sharing capacities. The information broker, which is an intermediate layer between users and information providers, provides the functions for mediating and managing information and for ensuring security of the system. We evaluated the consistency of proposed architecture and the implementation of the operational architecture design concept using existing design frameworks.