• Title/Summary/Keyword: Military command

Search Result 313, Processing Time 0.032 seconds

Real-time Processing for Target of Opportunity Positioning of Counter-fire with Scan-line Algorithm (스캔라인 알고리즘을 이용한 대화력전 임기표적의 실시간 영역 결정)

  • Jeon, Gi-Yoon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.10 no.2
    • /
    • pp.148-151
    • /
    • 2007
  • The CF(Counter-fire) is neutralizing enemy's all command control systems and fire support elements. It will weaken a battle continuous ability and an intension to fight. At the beginning of the CF is obtaining locations of targets using various detection assets. CF command center processes acquired target information and send it to attacking equipments. The targets are classified into two classes, preplanned target and target of opportunity The target of opportunity is potential threaten, so it needs to take a immediate and exact process for determining location of target of opportunity. This paper proposes the real-time processing algorithm for offensive weapons to strike target of opportunity, and presents the result of its performance.

Pitch Command Generation Method for Consistent Initial Trajectory of Thrust-Vector-Controlled Vehicle (추력벡터제어 비행체의 일관된 탄도 성형을 위한 피치각명령 산출 방법)

  • Lee, Yong-In;Choe, Dong-Gyun;Hwang, Tae-Won
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.6
    • /
    • pp.739-744
    • /
    • 2013
  • In this paper, we propose a method of generating pitch commands for consistent initial trajectories irrelevant to flight conditions in the initial boosting phase of a thrust-vector-controlled vehicle. After shape assumption of the pitch command profile, parameters of the profile are determined in real time in order for the summit height of the trajectory to be a desired value by deriving the summit height considering thrust performance, gravity, and other flight conditions. Computer simulation results demonstrate good performance of the proposed method.

A Study on Command and Control Through Cyber Protection Function Analysis (사이버 방호기능 분석을 통한 지휘통제에 관한 연구)

  • Choi, Seho;Oh, Haengrok;Yun, Joobeom
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.5
    • /
    • pp.537-544
    • /
    • 2021
  • Cyber threats can bypass existing cyber-protection systems and are rapidly developing by exploiting new technologies such as artificial intelligence. In order to respond to such cyber threats, it is important to improve the ability to detect unknown cyber threats by correlating heterogeneous cyber protection systems. In this paper, to enhance cyber-attack response capabilities, we proposed command and control that enables rapid decision-making and response before the attack objectives are achieved, using Lockheed Martin's cyber kill chain and MITRE ATT&CK to analyze the purpose and intention of the attacker.

A Study on Presidential Security Activities of Military Intelligence Investigation Agency - Since the Korean War, from 1950 to the present - (군(軍) 정보수사기관의 대통령 경호활동 고찰: 1950년 한국전쟁 이후부터 현재까지)

  • Choi, Jong-Young;Jung, Ju-Ho
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.63-79
    • /
    • 2017
  • Defence Security Command is the only military intelligence and investigation agency which is in charge of safeguarding military information and investigating specific crimes such as subversion and disloyalty in military. While the presidential security provided by Defence Security Command, along with Presidential Security Service(PSS) and the police, forms one of three pillars sustaining presidential security, its works and activities have been rarely known to the public due to the military confidentiality. This study looks into some data specialized into the presidential security among works of Defense Security Command by using various resources such as biographies of key people, media reports, and public materials. It reviews the presidential security works in a historical sense that the works have developed and changed in accordance with the historical changes of Defense Security Command, which was rooted in Counter-Intelligence Corps (Teukmubudae in Korean) in 1948 and leads to the present. The study findings are as follows. First, when the Korean War broke out in 1950 and since then the South Korea was under the threat of the North Korean armed forces and left wing forces, Counter-Intelligence Corps(Bangcheopdudae in Korean) took the lead in presidential security more than the police who was in charge of it. Secondly, even after the Presidential Security Office has founded in 1963, the role of the military on presidential security has been extended by changing its titles from Counter-Intelligence Corps to Army Security corps to Armed Forces Security Command. It has developed their provision of presidential security based on the experience at the president Rhee regime when they could successfully guard the president Rhee and the important government members. Third, since the re-establishment into Defence Security Command in 1990, it has added more security services and strengthened its legal basis. With the excellent expertise, it played a pivotal role in the G20 and other state-level events. After the establishment of the Moon Jaeinin government, its function has been reduced or abolished by the National Defense Reform Act. However, the presidential security field has been strengthening by improving security capabilities through reinforcing the organization. This strengthening of the security capacity is not only effective in coping with the current confrontation situation with the hostile North Korean regime, but also is important and necessary in conducting constant monitoring of the military movement and security-threat factors within military during the national security events.

  • PDF

Gemcitabine for the Treatment of Patients with Osteosarcoma

  • Wei, Mei-Yang;Zhuang, Yan-Feng;Wang, Wan-Ming
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.17
    • /
    • pp.7159-7162
    • /
    • 2014
  • Background: Patients with recurrent or refractory osteosarcoma are considered to have a very poor prognosis, and new regimens are needed to improve the prognosis in this setting. Gemcitabine, a nucleoside antimetabolite, is an analog of deoxycytidine which mainly inhibits DNA synthesis through interfering with DNA chain elongation and depleting deoxynucleotide stores, resulting in gemcitabine-induced cell death. Here we performed a systemic analysis to evaluate gemcitabine based chemotherapy as salvage treatment for patients with recurrent or refractory osteosarcoma. Methods: Clinical studies evaluating the impact of gemcitabine based regimens on response and safety for patients with osteosarcoma were identified by using a predefined search strategy. Pooled response rates (RRs) of treatment were calculated. Results: In gemcitabine based regimens, 4 clinical studies which included 66 patients with recurrent or refractory osteosarcoma were considered eligible for inclusion. Systemic analysis suggested that, in all patients, pooled RR was 12.1% (8/66) in gemcitabine based regimens. Major adverse effects were hematologic toxicity, including grade 3 or 4 anemia, leucopenia and thrombocytopenia in gemcitabine based treatment. No treatment related death occurred in gemcitabine based treatment. Conclusion: This systemic analysis suggests that gemcitabine based regimens are associated with mild activity with good tolerability in treating patients with recurrent or refractory osteosarcoma.

On the Development of the Generic CFCS for Engineering Level Simulation of the Surface Ship (공학수준 수상함 지휘무장통제체계 범용 모델 개발방안 연구)

  • Jung, Young-Ran;Han, Woong-Gie;Kim, Cheol-Ho;Kim, Jae-Ick
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.3
    • /
    • pp.380-387
    • /
    • 2011
  • In this paper, we considered the authoritative representation of Command and Fire Control System(CFCS) for the surface ship that was the engineering level model to develop system specifications and to analyze operational concepts on the concept design phase and to analyze military requirements, effectiveness and performance for the system. The engineering level model of CFCS can be used in simulation independently of the surface ship's type, and also it takes reuse, interoperability, and extension into consideration. The detailed sub-models, internal and external data interface, data flow among each sub-model, sensor and weapon models about the engineering level model of CFCS was defined. It was verified via engineering level simulations according to the V&V process.

A Study on the Understanding of the Analysis of the Future Operational Environment for Smart Defense Innovation and the Application of the ROK MND (스마트 국방혁신을 위한 미래 작전환경 분석의 이해와 군 적용방안에 대한 고찰)

  • Kim, Se Yong;Kim, Yeek Hyun
    • Journal of Information Technology Services
    • /
    • v.20 no.1
    • /
    • pp.55-65
    • /
    • 2021
  • For smart defense innovation, the key is to apply state-of-the-art technologies of the Fourth Industrial Revolution to national defense. In order to apply state-of-the-art technology to the defense sector, we need to apply and develop technologies to analyze and respond to uncertain future operational environments. To this end, our military is investing a lot of time and effort. To understand future operational environment analysis and to apply and develop our military, we explored the perspectives of operational environment analysis in major countries and studied specific cases of U.S. troops with systematic analysis functions. The U.S. Army has established a cooperative system to analyze future operational environment under the leadership of the Education Command and operates the organization organically. It also utilizes the collective intelligence of expert groups in various fields by utilizing the MSC, and it is time for the Korean military to take the lead in keeping with the era of transformation. To that end, the organization of the U.S. Education Command should be benchmarked and the Korean Future Operation Environment Analysis Organization should be established and operated. Through this study, we have developed an understanding of the future operational environment analysis system of the U.S. Army and presented a plan to apply the ROK MND.

Study on the Recruitment of Seafarers to Improve Military Sealift Capability in Korea (해상운송안보를 위한 선원 확보에 관한 연구)

  • Kim, Sungkuk;Kim, Yeaujung
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.24 no.1
    • /
    • pp.18-28
    • /
    • 2018
  • As the Korean navy's capabilities increase, it becomes increasingly necessary to develop sufficient navigational capabilities and train proficient seafarers. However, in terms of securing personnel resources, seafarers will need to be utilized more effectively due to the population decline of recent years. This paper reviews the use of civilian maritime personnel to research potential resources and uses the U.S. military sealift command as a benchmark. As a result, it has been found that it is possible to increase naval combat capability through the establishment of like a military sealift command organization to operate defense civilian support vessels. In addition, it is possible to train civilian seafarers by utilizing the current national education system through existing maritime universities. Furthermore, taking these actions will allow the ROK navy to operate its onboard ship reserve service and designated international ship system more efficiently.

Technical Trends of AI Military Staff to Support Decision-Making of Commanders (지휘관들의 의사결정지원을 위한 AI 군참모 기술동향)

  • Lee, C.E.;Son, J.H.;Park, H.S.;Lee, S.Y.;Park, S.J.;Lee, Y.T.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.1
    • /
    • pp.89-98
    • /
    • 2021
  • The Ministry of National Defense aims to create an environment in which transparent and reasonable defense policies can be implemented in real time by establishing the vision of smart defense innovation based on the Fourth Industrial Revolution and promoting innovation in technology-based defense operation systems. Artificial intelligence (AI) based defense technology is at the level of basic research worldwide, includes no domestic tasks, and involves classified military operation data and command control/decision information. Further, it is needed to secure independent technologies specialized for our military. In the army, military power continues to decline due to aging and declining population. In addition, it is expected that there will be more than 500,000 units should be managed simultaneously, to recognize the battle situation in real time on the future battlefields. Such a complex battlefield, command decisions will be limited by the experience and expertise of individual commanders. Accordingly, the study of AI core technologies supporting real-time combat command is actively pursued at home and abroad. It is necessary to strengthen future defense capabilities by identifying potential threats that commanders are likely to miss, improving the viability of the combat system, ensuring smart commanders always win conflicts and providing reasonable AI digital staff based on data science. This paper describes the recent research trends in AI military staff technology supporting commander decision-making, broken down into five key areas.

Improving Flexibility of External Data Exchange in Count-fire Operation System by Adapting Dynamic Parser Software (동적 구문처리기 소프트웨어 적용을 통한 대화력전 수행체계 연동의 유연성 향상 방안)

  • Hong, Won-Eui
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.1
    • /
    • pp.51-56
    • /
    • 2008
  • The counter-fire operation system performs its mission exchanging information with other related systems such as command & control systems and military information systems. In the process of exchanging information, the counter-fire operation system uses a type of data message which contains exchange data information in the format of KMTF. The requirement of data exchange of count-fire operation will continue to evolve. But the EDX(External Data eXchange) configuration item of the current counter-fire operation system can not effectively cope with the variation of data exchange requirements due to its fixed software structure. In the paper, a solution for improving flexibility of external data exchange in counter-fire operation system is proposed.