• Title/Summary/Keyword: Military Information Systems

Search Result 543, Processing Time 0.022 seconds

A Study on The Assesment of Power Improvement Effectiveness of Corps Level C4I System Applied to Integrated Fire Operation (지상전술 C4I체계의 통합화력운용간 전투력 상승효과 평가에 관한 연구)

  • 박송기;이재영
    • Journal of the military operations research society of Korea
    • /
    • v.29 no.1
    • /
    • pp.8-27
    • /
    • 2003
  • This paper develops a methodology that can be used to quantify the assesment of power improvement effectiveness of corps level C4I system applied to integrated fire operation by adapting Schuzer's C2 theory. This paper first describes how C4I systers can enhance the battle outcome in three way. : (1) Enhanced unit probability of survival; (2) Enhanced unit's individual effectiveness; improved exchange ratios; (3) Improved task force allocations : increased percentage of assets that can be assigned to a given engagement These enhancements are then show to result from improved probability of detection through information sharing; improved survivability and lethality through battle force coordination; and enhanced force allocation and prepositioning through improved timeliness of information(more advanced warning). It demonstrates that well-designed C4I systems can be shown to represent a significant force multiplier on the outcome of the battle.

A study on the Application of Policy-Based Networking for QoS in The Defense Information System (국방정보체계의 서비스 품질(QoS) 보장을 위한 정책기반(Policy-Based)네트워킹 적용에 관한 연구)

  • 김광영;이승종
    • Journal of the military operations research society of Korea
    • /
    • v.29 no.1
    • /
    • pp.57-75
    • /
    • 2003
  • Policy-based networking offers a network manager the ability to manage the network in a holistic and dynamic fashion rather than force a network manager to manage the network by dealing with each device individually. Policy-based networking is focusing on users and applications instead of emphasizing devices and interfaces. An important part of the policy-based networking is to simplify the task of administration and management for different disciplines. The Defense Information System(DIS) of today are complex and heterogeneous systems. Operational needs are not a trivial task and Quality of Service(QoS) is not generally guaranteed. So, important data may be missed or congested by trivial data. Policy-based networking provide a way to support QoS and simplify the management of multiple devices deploying complex technologies. This paper suggest implementation of policy-based networking in DIS to improvement of performance, and implementation is progressed step by step. Especially this paper is focusing on the providing QoS with policy-based networking using Lightweight Directory Access Protocol(LDAP) Server.

HSR Traffic Reduction Algorithms for Real-time Mission-critical Military Applications

  • Nguyen, Xuan Tien;Rhee, Jong Myung
    • Information and Communications Magazine
    • /
    • v.32 no.10
    • /
    • pp.31-40
    • /
    • 2015
  • This paper investigates several existing techniques to reduce high-availability seamless redundancy (HSR) traffic. HSR is a redundancy protocol for Ethernet networks that provides duplicated frames for separate physical paths with zero recovery time. This feature makes it very useful for real-time and mission-critical applications, such as military applications and substation automation systems. However, the major drawback of HSR is that it generates too much unnecessary redundant traffic in HSR networks. This drawback degrades network performance and may cause congestion and delay. Several HSR traffic reduction techniques have been proposed to reduce the redundant traffic in HSR networks, resulting in the improvement of network performance. In this paper, we provide an overview of these HSR traffic reduction techniques in the literature. The operational principles, advantages, and disadvantages of these techniques are investigated and summarized. We also provide a traffic performance comparison of these HSR traffic reduction techniques.

A Study on Real Time Asynchronous Data Duplication Method for the Combat System (전투체계 시스템을 위한 실시간 환경에서의 비동기 이중화 기법 연구)

  • Lee, Jae-Sung;Ryu, Jon-Ha
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.10 no.2
    • /
    • pp.61-68
    • /
    • 2007
  • In a naval combat system, the information processing node is a key functional equipment and performs major combat management functions including control sensor and weapon systems. Therefore, a failure of one of the node causes fatal impacts on overall combat system capability. There were many methodologies to enhance system availability by reducing the impact of system failure like a fault tolerant method. This paper proposes a fault tolerant mechanism for information processing node using a replication algorithm with hardware duplication. The mechanism is designed as a generic algorithm and does not require any special hardware. Therefore all applications in combat system can use this functionality. The asynchronous characteristic of this mechanism provides the capability to adapt this algorithm to the module which has low performance hardware.

Analysis of Information Assurance Schemes for New Korean Information Assurance Scheme (새로운 한국형 정보보증 제도 개발을 위한 기존의 정보보증 제도의 분석)

  • Ha, Soo-Cheol;Lee, Gang-Soo
    • Journal of National Security and Military Science
    • /
    • s.9
    • /
    • pp.207-240
    • /
    • 2011
  • There are many information assurance schemes(i.e., evaluation criteria and methodology) for security assurance of information systems, since the security is one of the most important characteristics in the modem information systems. However, there are confusions among schemes and redundancies of assurance. In this paper, we survey and classify conventional information assurance schemes by view points of assurance targets, life-cycles and nations. We propose three new information assurance schemes as the result of survey. Those are as follows: the schemes of the assurance on the requirement itself which is evaluated and certificated after standardizing the security requirements about the organizations and the applications, on the developing information system, and on the accreditation and certification about new information system. This will be helpful to set up a security assurance of National Defense.

  • PDF

A Study on Item Systems of Shinjung Tongguk Yoji Sungnam and Cheyong (신증동국여지승람의 항목체재와 '제영'에 대한 고찰)

  • Jung Uee-Sung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.31 no.4
    • /
    • pp.19-33
    • /
    • 1997
  • The content systems of Shinjung Tongguk Yoji Sungnam(신증동국여지승람, A Korean Geography Published in Chosen Dynasty) consist of 26 items and the main subject comprises administration, military and geography, This book does not suggest a simple geography but a comprehensive bibliography as an administrative guide book of a nation or a military operation manual. In particular, this book is made much of as a more valuable material in elevating the quality of the geographic book since it contained a 'Cheyong(제영)' item and reinforced the fields of humanities which could not be found out in other geography. The verses of Cheyong are recorded in the documents in the Chungchong, Kyungsang and Chulla Provinces, and these recorded verses In the tree provinces are more than half of the whole country's. The objects of recitation in the these verses are related to such natural phenomena and historic relics as the mountains, the livers, the wails and the royal tombs.

  • PDF

Study on Frequency Selection Method Using Case-Based Reasoning for Cognitive Radio (사례기반 추론 기법을 이용한 인지 라디오 주파수 선택 방법 연구)

  • Park, Jae-Hoon;Choi, Jeung Won;Um, Soo-Bin;Lee, Won-Cheol
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.1
    • /
    • pp.58-71
    • /
    • 2019
  • This paper proposes architecture of a cognitive radio engine platform and the allowable frequency channel reasoning method that enables acquisition of the allowable channels for the military tactical network environment. The current military tactical wireless communication system is increasing need to secure a supplementary radio frequency to ensure that multiple wireless networks for different military wireless devices coexist, so that tactical wireless communication between the same or different systems can be operated effectively. This paper presents the allowable frequency channel reasoning method based on cognitive radio engine for realizing DSA(Dynamic Spectrum Access) as an optimal available frequency channel. To this end, a case-based allowable frequency channel reasoning method for cognitive radio devices is proposed through modeling of primary user's traffic status and calculation of channel occupancy probability. Also through the simulation of the performance analysis, changing rate of collision probability between the primary users' occupancy channel and the available channel acquisition information that can be used by the cognitive radio device was analysed.

The direction of application of the RMF-based risk management system considering interoperability (상호운용성을 고려한 RMF 기반의 위험관리체계 적용 방향)

  • Kwon, Hyuk-Jin;Kim, Sung-Tae;Joo, Ye-na
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.83-89
    • /
    • 2021
  • The RMF (Cyber Security Risk Management Framework) is a more strengthened U.S. defense cybersecurity framework that is currently used throughout the U.S. federal government beyond the defense sector. In the past decade, the proportion of cyber warfare in non-regular warfare encountered by the United States, especially cyberattacks caused by China and North Korea, has been increasing. In the end, the U.S. is newly establishing an RMF system to prepare a more strengthened cybersecurity policy at the pan-government level, and the U.S. Department of Defense aims to expand the U.S. defense RMF evaluation policy beyond the federal government level. The South Korean military has already applied RMF at the request of the U.S. that notified the policy to apply RMF when obtaining F-35A. The application of RMF by the Korean military is no longer inevitable. Now is the time for the Korean military to seriously think about what to prepare for the early establishment of a successful Korean RMF system.

A Study on Utilization of Drone for Public Sector by Analysis of Drone Industry (국내외 드론산업 동향 분석을 통한 공공분야에서의 드론 활용방안에 대한 연구)

  • Sim, Seungbae;Kwon, Hunyeong;Jung, Hosang
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.25-39
    • /
    • 2016
  • The drone is an unmanned aerial vehicle which has no human pilot. Drones can be classified into military drones, commercial drones, and personal drones by usage. Also, drones can be classified from large-sized to nano-sized drone by size and autonomous, remote controlled drone by control type. Especially, military drones can be classified into low-altitude drones, medium-altitude, and high-altitude drones by altitude. Recently, the drone industry is one of the fast growing industries in the world. As drone technologies have become more advanced and cost-effective, Korean government has set its goal to become a top-level country in drone business. However, the government's strict regulation for drone operations is one of the biggest hurdles for the development of the related technologies in Korea and other countries. For example, critical problems for drone delivery can be classified into technical issues and institutional issues. Technical issues include durability, conditional awareness, grasp and release mechanisms, collision avoidance systems, drone operating system. Institutional issues include pilot and operator licensing, privacy rules, noise guidelines, security rules, education for drone police. This study analyzes the trends of the drone industry from the viewpoint of technology and regulation. Also, we define the business areas of drone utilization. Especially, the drone business types or models for public sector are proposed. Drone services or functions promoting public interests need to be aligned with the business reference model of Korean government. To define ten types of drone uses for public sector, we combine the business types of government with the future uses of drones that are proposed by futurists and business analysts. Future uses of drones can be divided into three sectors or services. First, drone services for public or military sectors include early warning systems, emergency services, news reporting, police drones, library drones, healthcare drones, travel drones. Second, drone services for commercial or industrial services include parcel delivery drones, gaming drones, sporting drones, farming and agriculture drones, ranching drones, robotic arm drones. Third, drone services for household sector include smart home drones.

A Study on Information Management Systems for Discontinuity of Industrial and Military Components (산업용 및 군수산업 부품단종 정보체계에 관한 연구)

  • Paik, Won-Chul;Shin, Seung-Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.3
    • /
    • pp.201-206
    • /
    • 2019
  • The purpose of this study is to identify and manage the problem of components discontinuity in the future based on the implementation of information systems to solve the problem of discontinuance of militaries parts, so as to solve the problem of discontinuance of components in the operation of the weapon systems and reduce excessive expenditure due to aging of the weapon system. The purpose is to prevent the discontinuance of components in the future by up-dating the production phenomena of parts manufactures periodically. Defense industries and R&D perood can expand users convenience by supporting selection of more efficient parts in weapon systems development and information of vast components information systems.