• 제목/요약/키워드: Military operation

검색결과 814건 처리시간 0.027초

임무장비를 고려한 직렬형 하이브리드 차량의 추진시스템 최적화 연구 (A Study on Optimization of Propulsion Systems for Series Hybrid Electric Vehicles Considering Mission Equipments)

  • 장명언;김상만;한규홍;여승태
    • 한국군사과학기술학회지
    • /
    • 제16권2호
    • /
    • pp.225-232
    • /
    • 2013
  • In this paper, the study was conducted on the subject of the hybrid electric vehicles used by the military, and optimized the propulsion system for fuel economy considering energy supply to the mission equipments. For the analysis of the vehicles, a method based on the geometry and some assumptions was applied with basic vehicle dynamics. The sources of energy supply in the military hybrid electric vehicles are an engine, a battery and an ultra-capacitor. The optimal operation point among an engine, a battery and an ultra-capacitor can be found by minimizing energy consumption of driving power train and mission equipments. In the study, it was possible to find the optimal propulsion system by comparing fuel efficiency of the vehicles during the driving cycle.

태양동기-지상반복 궤도를 활용한 군 정찰용 초소형 위성군 설계 (Space Mission Design For Reconnaissance Micro-Satellite Constellation Using Sun Synchronous-Ground Repeating Orbit)

  • 조성민;조남석
    • 한국군사과학기술학회지
    • /
    • 제23권2호
    • /
    • pp.125-138
    • /
    • 2020
  • One of the most important steps to consider in utilizing micro-satellites for surveillance or reconnaissance operations is the design of the satellite constellation. The Walker-Delta constellation which is commonly used in designing satellite constellations is not ideal for this operation in which military satellites are required to monitor specific regions continuously in a stable manner. This study aims to discuss the methodology for designing a satellite constellation that is capable of monitoring the fixed region at the fixed time each day by using the Sun synchronous Orbit. The BB(Beach Ball) constellation that we propose outperforms the Walker-Delta constellation in terms of robustness and it holds the merit of being simple in its design, thereby making future expansions more convenient. We expect the BB constellation will have a high applicability as the operational concept of military surveillance satellites is established in the near future.

Development of Distributed Interactive Stochastic Combat Simulation (DISCSIM) Model

  • Hong, Yoon-Gee;Kwon, Soon-Jong
    • 한국국방경영분석학회지
    • /
    • 제25권2호
    • /
    • pp.15-30
    • /
    • 1999
  • A number of combat simulation models are scattered and the analytic solution approaches have experienced very difficult computational efforts. Today´s computer communication technology let people to do many unrealistic things possible and the use of those technologies is becoming increasingly prevalent throughout the military operation. Both DIS and ADS are welled defined computer aided military simulations. This study discusses a simulation of stochastic combat network modeling through Internet space. We have developed two separate simulation models, one for clients and another for server, and validated for conducting studies with these models. The object-oriented design was necessary to define the system entities and their relationship, to partition functionality into system entities, and to transform functional metrics into realizations derived from system component behaviors. Heterogeneous forces for each side are assumed at any battle node. The time trajectories for mean number of survivors and combat history at each node, some important combat measures, and relative difference computations between models were made. We observe and may conclude that the differences exit and some of these are significant based on a limited number of experiments.

  • PDF

국방분야 빅데이터 분석의 활용가능성에 대한 고찰 (A Study on a Way to Utilize Big Data Analytics in the Defense Area)

  • 김성우;김각규;윤봉규
    • 한국경영과학회지
    • /
    • 제39권2호
    • /
    • pp.1-19
    • /
    • 2014
  • Recently, one of the core keywords in information technology (IT) as well as areas such as business management is big data. Big data is a term that includes technology, personnel, and organization required to gather/manage/analyze collection of data sets so large and complex that it becomes difficult to manage and analyze using traditional tools. The military has been accumulating data for a long period due to the organization's characteristic in placing emphasis on reporting and records. Considering such characteristic of the military, this study verifies the possibility of improving the performance of the military organization through use of big data and furthermore, create scientific development of operation, strategy, and support environment. For this purpose, the study organizes general status and case studies related to big data, traces back examples of data utilization by Korean's national defense sector through US military data collection and case studies, and proposes the possibility of using and applying big data in the national defense sector.

군용 무인항공기의 TM/TC 데이터 프로토콜 분석 (Analysis of TM/TC data protocol of Military Unmanned Aerial Vehicles)

  • 홍수운;김영길
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2017년도 춘계학술대회
    • /
    • pp.391-393
    • /
    • 2017
  • 다양한 목적으로 군에서 운용되고 있는 무인항공기는 목적에 따라 수집된 정보를 무선통신을 이용하여 지상의 통제장비로 전송하고 비행체의 운용제어 및 상태정보를 송수신 할 수 있도록 설계되어 있다. 현재 국내에서 운용 중인 군용 무인항공기 체계는 각 체계별 고유 통신방식과 프로토콜, 메시지 구조 등을 이용하고 있다. 따라서 본 논문에서는 현재 체계개발 중에 있는 두 기종의 군용 무인항공기 체계의 TM/TC 데이터 프로토콜을 분석하고 무선 통신환경에서 더 효율적인 TM/TC 메시지 설계방안에 대해 제시한다. 또한 향후 다수의 무인기 간 또는 새로 도입되는 무인기 체계와의 상호운용성 보장을 위한 기술 표준화를 위해 고려해야할 사항 등에 대해 논하고자 한다.

  • PDF

군 작전환경에 따른 전투화 보급 필요성 진단에 관한 연구 (A Study on the Diagnosis of Combat Boots Supply Necessity Depending on Military Operation Environment)

  • 심재현;남궁승필;박상혁
    • 문화기술의 융합
    • /
    • 제4권1호
    • /
    • pp.237-240
    • /
    • 2018
  • 최근 군수품의 발달과 더불어 군복과 전투화 등 많은 부분이 기능성으로 바뀌였으나 전투화의 경우 밑창의 갈라짐, 전투화 불량같은 기능성임에도 불구하고 여러 가지 애로사항을 통해 개선되고 있다는 점에서 연구동기가 되어 연구를 하게 되었다. 군 전투화의 만족도에 대한 연구는 전무한 실정이며 연구내용들도 전투화 압력, 전투화 끈에 대한 자살자 연구 등 본인이 관심을 가지고 연구하는 분야가 없어서 더욱 더 관심을 가지게 되고 연구를 진행하게 되었다.

통합 필터 변별도와 그래프 컬러링을 이용한 전술통신망 백본 무선 링크의 주파수 지정 방법 (Frequency Assignment Method using NFD and Graph Coloring for Backbone Wireless Links of Tactical Communications Network)

  • 함재현;박휘성;이은형;최증원
    • 한국군사과학기술학회지
    • /
    • 제18권4호
    • /
    • pp.441-450
    • /
    • 2015
  • The tactical communications network has to be deployed rapidly at military operation area and support the communications between the military command systems and the weapon systems. For that, the frequency assignment is required for backbone wireless links of tactical communications network without frequency interferences. In this paper, we propose a frequency assignment method using net filter discrimination (NFD) and graph coloring to avoid frequency interferences. The proposed method presents frequency assignment problem of tactical communications network as vertex graph coloring problem of a weighted graph. And it makes frequency assignment sequences and assigns center frequencies to communication links according to the priority of communication links and graph coloring. The evaluation shows that this method can assign center frequencies to backbone communication links without frequency interferences. It also shows that the method can improve the frequency utilization in comparison with HTZ-warfare that is currently used by Korean Army.

군사로봇의 감시제어에서 운용자 역량 평가 방법에 관한 연구 (Operator Capacity Assessment Method for the Supervisory Control of Unmanned Military Vehicle)

  • 최상영;양지현
    • 로봇학회논문지
    • /
    • 제12권1호
    • /
    • pp.94-106
    • /
    • 2017
  • Unmanned military vehicles (UMVs) will be increasingly applied to the various military operations. These UMVs are most commonly characterized as dealing with "4D" task - dull, dirty, dangerous and difficult with automations. Although most of the UMVs are designed to a high degree of autonomy, the human operator will still intervene in the robots operation, and tele-operate them to achieve his or her mission. Thus, operator capacity, along with robot autonomy and user interface, is one of the important design factors in the research and development of the UMVs. In this paper, we propose the method to assess the operator capacity of the UMVs. The method is comprised of the 6 steps (problem, assumption, goal function identification, operator task analysis, task modeling & simulation, results and assessment), and herein colored Petri-nets are used for the modeling and simulation. Further, an illustrative example is described at the end of this paper.

차세대 군용전원용 500W급 마이크로 터빈 발전기 시스템 설계 (Design of a 500W Class Micro Turbine Generator System as a Next Generation Military Power Source)

  • 최상규;최범석;한용식;우병철;송인혁;민성기;임진식
    • 한국군사과학기술학회지
    • /
    • 제14권6호
    • /
    • pp.1192-1197
    • /
    • 2011
  • Recent developments of small-size unmanned or manned mobile systems such as autonomous robots, exoskeleton or armored suits, micro air vehicles, and unmanned armored vehicles require long-lasting independent power sources of high energy and power density to support the systems' operation for up to 72 hours in the fields. Chemical batteries such as Ni-MH, Li-Ion, the current primary power sources for mobile devices, however, are not capable of providing enough power and energy density for the next generation high power mobile machines. For this reason, KIMM along with KERI and KIMS has been carrying out a 500W MTG development project under the DAPA's "Next generation military power source R&D program" since 2009. In this paper, a design process for a 500W MTG system currently being developed at KIMM is briefly described and the technical issues related to its development are addressed.

Enhancing Internet of Things Security with Random Forest-Based Anomaly Detection

  • Ahmed Al Shihimi;Muhammad R Ahmed;Thirein Myo;Badar Al Baroomi
    • International Journal of Computer Science & Network Security
    • /
    • 제24권6호
    • /
    • pp.67-76
    • /
    • 2024
  • The Internet of Things (IoT) has revolutionized communication and device operation, but it has also brought significant security challenges. IoT networks are structured into four levels: devices, networks, applications, and services, each with specific security considerations. Personal Area Networks (PANs), Local Area Networks (LANs), and Wide Area Networks (WANs) are the three types of IoT networks, each with unique security requirements. Communication protocols such as Wi-Fi and Bluetooth, commonly used in IoT networks, are susceptible to vulnerabilities and require additional security measures. Apart from physical security, authentication, encryption, software vulnerabilities, DoS attacks, data privacy, and supply chain security pose significant challenges. Ensuring the security of IoT devices and the data they exchange is crucial. This paper utilizes the Random Forest Algorithm from machine learning to detect anomalous data in IoT devices. The dataset consists of environmental data (temperature and humidity) collected from IoT sensors in Oman. The Random Forest Algorithm is implemented and trained using Python, and the accuracy and results of the model are discussed, demonstrating the effectiveness of Random Forest for detecting IoT device data anomalies.