• Title/Summary/Keyword: Military command

Search Result 313, Processing Time 0.021 seconds

Application of Gaseous Ozone for Cleaning Biological Weapon Agent Contaminated Building (생물테러시 실내제독을 위한 효율적인 오존가스의 적용 방법)

  • Yoon, Je-Yong;Jeong, Woo-Dong;Mun, Sung-Min;Cho, Min
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.2
    • /
    • pp.101-108
    • /
    • 2008
  • This study attempted to develop the technology by gaseous ozone for decontaminating building affected by a model of biological weapon agent(Bacillus subtilis spores) instead of Bacillus anthracis spore. The use of ozone is attractive method from a practical point of view of decontamination procedure since it has strong oxidation power but no residue after application. We examined the disinfection efficiency of gaseous ozone to Bacillus subtilis spores which suspension was sprayed on different material surfaces and dried. Three different types of gaseous ozone was applied : dry ozone, dry ozone with humidified air, and water bubbled wet ozone. Dry ozone(1500ppm) failed to achieve any significant inactivation for 2hrs. However, six log reduction of B. subtilis spore was achieved within 30min by 1500ppm of water bubbled wet ozone. This result shows the noticeable inactivation efficiency by gaseous ozone compared with previous studies. Good performance by wet ozone was also found for military material surface.(i.e. : gas mask hood, protective garments, army peinted metal surface).

Airworthiness Standard Analysis about a Korea Fixed Wing Unmanned Aircraft (국내 고정익 무인항공기 감항인증 기술기준분석)

  • Lim, Joon-Wan;Roh, Jin-Chul;Ko, Joon Soo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.5
    • /
    • pp.654-661
    • /
    • 2016
  • An unmanned aircraft refers to an aircraft which carries no human pilot and is operated under remote control or in autonomous operational mode. An unmanned aircraft system consist of a one system which include UAV(s), UAV control station and data link, etc. As the UAVs can perform the dull, dangerous and difficult missions, various kinds of UAVs with different sizes and weights have been developed and operated for both civil and military areas. It is important to develop the airworthiness certification criteria of the UAVs to minimize the risks of fatal impacts on human life and environment and to achieve the equivalent level of safety to the manned aircraft. Analysis of the KAS Part 23 and STANAG 4671 can provide guidelines for the generation of the airworthiness certification criteria for the UAVs in civil application.

An Intrusion Detection Technique Suitable for TICN (전술정보통신체계(TICN)에 적합한 침입탐지 기법)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.6
    • /
    • pp.1097-1106
    • /
    • 2011
  • Tactical Information Communication Network(TICN), a concept-type integrated Military Communication system that enables precise command control and decision making, is designed to advance into high speed, large capacity, long distance wireless relay transmission. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. Ad-hoc network works properly only if the participating nodes cooperate in routing and packet forwarding. However, if selfish nodes not forwarding packets of other nodes and malicious nodes making the false accusation are in the network, it is faced to many threats. Therefore, detection and management of these misbehaving nodes is necessary to make confident in Ad-hoc networks. To solve this problem, we propose an efficient intrusion detection technique to detect and manage those two types of attacks. The simulation-based performance analysis shows that our approach is highly effective and can reliably detect a multitude of misbehaving node.

Development of Information Technology for Smart Defense (Smart Defense 를 위한 IT 기술 개발)

  • Chung, Kyo-Il;Lee, So Yeon;Park, Sangjoon;Park, Jonghyun;Han, Sang-Cheol
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.38 no.3
    • /
    • pp.323-328
    • /
    • 2014
  • Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication & Computer, Intelligence), ISR(Intelligence, Surveillance & Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

The Design and Implementation of the Collision Avoidance Warning Function in the Air Traffic Control System (항공관제 시스템에서 항공기 공중충돌 경고기능의 설계 및 구현)

  • Song, Jin-Oh;Sim, Dong-Sub;Kim, Ki-Hyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.2
    • /
    • pp.213-221
    • /
    • 2009
  • An aircraft collision accident is a disaster that causes great losses of inventories and lives. Though a collision avoidance warning function is provided automatically to pilots in the aircrafts by the enhancement of the aircraft capability, achieving fast decision-making to escape a collision situation is a complex and dangerous work for pilots. If an in-flight collision situation is controlled by the air traffic control system which monitors all airplanes in the air, it would be more efficient to prevent in-flight collisions because it can handle the emergency before the pilot's action. In this paper, we develop the collision avoidance warning function in the air traffic control system. Specifically, we design and implement the five stages of the collision avoidance function, and propose a visualization method which could effectively provide the operators with the trajectories and altitudes of the aircrafts in a collision situation. By developing an in-flight collision warning function in the air traffic control system that visualizes flight patterns through the state transition data of in-flight aircrafts on the flight path lines, it can effectively prevent in-flight collisions with traffic alerts. The developed function allows operators to effectively select and control the aircraft in a collision situation by providing the operators with the expected collision time, the relative distance, and the relative altitude while assessing the level of alert, and visualizing the alert information which includes the Attention-Warning-Alert phase via embodying the TCAS standard. With the developed function the air traffic control system could sense an in-flight collision situation before the pilot's decision-making moment.

A Development of the Operational Architecture of a Low Altitude Air Defense Automation System (저고도 방공자동화체계의 운용아키덱처 개발)

  • Son, Hyun-Sik;Kwon, Yong-Soo
    • Journal of the military operations research society of Korea
    • /
    • v.34 no.1
    • /
    • pp.31-45
    • /
    • 2008
  • This paper describes a development of the operational architecture of a low altitude air defense automation system using a systems engineering approach. The future battlefield is changing to new system of systems that command and control by the network based BM/C4I. Also, it is composed of various sensors and shooters in an single theater. Future threats may be characterized as unmanned mewing bodies that the strategic effect is great such as UAVs, cruise missiles or tactical ballistic missiles. New threats such as low altitude stealth cruise missiles may also appear. The implementation of a low altitude air defense against these future threats is required to complex and integrated approach based on systems engineering. In this view, this work established an operational scenario and derived operational requirements by identifying mission and future operational environments. It is presented the operational architecture of the low altitude air defense automation system by using the CORE 5.0.

The Analysis of Crypto Communication Relay Effect in the Security Framework Technique of Network Centric Warfare Environment (NCW환경의 보안 프레임워크 기술에서 암호통신 중계영향 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.4
    • /
    • pp.788-794
    • /
    • 2007
  • The policy of US DoD is moving towards implementation of Network Centric Warfare(NCW) concepts. NCW is commonly described as the integration and synchronization of four key interdependent elements such as command and control, sensor system, engagement systems and the network. Therefore the military policy of Korea military is needed to access and examine the policy of NCW communication environment and crypto communication, which is able to apply it. In this case study, We are reviewed the security framework of the concept of network centric warfare in the centering around the US. It is introduced the core technology in the network centric warfare, and it is reviewed the security framework such as, the requirements of security, the characteristics security of global information grid, joint tactical radion system, net centric enterprise services, transformational communication satellite, in the basis of core technology, and analysis the effect of crypto communication relay between command node and surbornate node in NCW environment. This report support the assistance, which is considered the elements of surrounding effects in the varied crypto communication research area of NCW.

  • PDF

Numerical Study about Initial Behavior of an Ejecting Projectile for Varying Flight Conditions (비행 조건 변화에 따른 사출 운동체의 초기 거동에 관한 수치적 연구)

  • Jo, Sung Min;Kwon, Oh Joon;Kwon, Hyuck-Hoon;Kang, Dong Gi
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.4
    • /
    • pp.517-526
    • /
    • 2019
  • In the present study, unsteady flows around a projectile ejected from an aircraft platform have been numerically investigated by using a three dimensional compressible RANS flow solver based on unstructured meshes. The relative motion between the platform and projectile was described by six degrees of freedom(6DOF) equations of motion with Euler angles and a chimera technique. Initial behavior of the projectile for varying conditions, such as roll and pitch-yaw command on the control surface of the projectile, flight Mach number, and platform pitch angle, was investigated. The ejection stability of the projectile was degraded as Mach number increases. In the transonic condition, the initial behavior of the projectile was found to be unstable as increase of platform pitch angle. By applying the command to control surfaces of the projectile, initial stability was highly enhanced. It was concluded that the proposed simulation data are useful for estimating the ejection behavior of a projectile in design phase.

Analysis of Network Influence Factor considering Social Network Analysis and C2 Time (소셜 네트워크 분석과 지휘통제시간을 고려한 네트워크 영향력 요소 분석)

  • Jeon, Jin-Tae;Park, Gun-Woo;Lee, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.257-266
    • /
    • 2011
  • Over the society the trial for several systems to be connected with Network has been continued to share information and to make it various. In accordance with such a change, the concept of military warfare conduction has been changing form platform centric warfare in separate combat system based on network centric warfare in network based. We have continuously made an effort that we try to get the goal with efficient system which is linked up with network, but such a study on that one in military system analysis is still slower than the study out of military until now. So this study is searching network influence factor by using military network with application of social network analysis method which is used broadly in the society and the science as well. At this time we search co-relationships between social network and the thing that we can analyse C2 time by effectiveness measurement means. By this study it has value of network influence factor identification for the growing network composition.

A Study on Defense and Attack Model for Cyber Command Control System based Cyber Kill Chain (사이버 킬체인 기반 사이버 지휘통제체계 방어 및 공격 모델 연구)

  • Lee, Jung-Sik;Cho, Sung-Young;Oh, Heang-Rok;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.41-50
    • /
    • 2021
  • Cyber Kill Chain is derived from Kill chain of traditional military terms. Kill chain means "a continuous and cyclical process from detection to destruction of military targets requiring destruction, or dividing it into several distinct actions." The kill chain has evolved the existing operational procedures to effectively deal with time-limited emergency targets that require immediate response due to changes in location and increased risk, such as nuclear weapons and missiles. It began with the military concept of incapacitating the attacker's intended purpose by preventing it from functioning at any one stage of the process of reaching it. Thus the basic concept of the cyber kill chain is that the attack performed by a cyber attacker consists of each stage, and the cyber attacker can achieve the attack goal only when each stage is successfully performed, and from a defense point of view, each stage is detailed. It is believed that if a response procedure is prepared and responded, the chain of attacks is broken, and the attack of the attacker can be neutralized or delayed. Also, from the point of view of an attack, if a specific response procedure is prepared at each stage, the chain of attacks can be successful and the target of the attack can be neutralized. The cyber command and control system is a system that is applied to both defense and attack, and should present defensive countermeasures and offensive countermeasures to neutralize the enemy's kill chain during defense, and each step-by-step procedure to neutralize the enemy when attacking. Therefore, thist paper proposed a cyber kill chain model from the perspective of defense and attack of the cyber command and control system, and also researched and presented the threat classification/analysis/prediction framework of the cyber command and control system from the defense aspect