• Title/Summary/Keyword: Military simulation

Search Result 1,028, Processing Time 0.024 seconds

A Study on the Protective Capacity of Military Shelters in the Contact Areas (접적지역 대피소 방호수준 설정에 관한 연구)

  • Park, Young Jun;Park, Sangjin;Eom, Hong Seob;Son, Kiyoung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.4
    • /
    • pp.402-408
    • /
    • 2015
  • Protection against direct projectiles has been adapted just to the main command posts in the existing protective facility standards. However, protective capacity for the shelters against direct projectiles is also required because the initial survivability as well as the operation sustainment of the shelters is critical during a couple of days from outbreak of war. In this study, the Russian artillery is used to determine the existing and future threat of the North Korean Armed Forces indirectly. And then, required protective capacity of military shelters in the contact areas is calculated along with UFC 3-340-02 and it is verified using modeling and simulation. Based on the assessed capacity, actual inspect of military facilities with contact areas on spot is performed whether military shelters have enough protection capacity against determined threats. According to the field study, it is verified that proper earth bermed shelter has enough protection capacity. The results in this study could be used how to retrofit the current shelters in the contact areas.

The Welfare Effects of the Military Purveyance Program of Livestock Products (축산물 군납사업의 사회적 후생효과 분석)

  • Chang, Jae Bong;Kim, Yoon Hyung
    • Journal of Korean Society of Rural Planning
    • /
    • v.28 no.4
    • /
    • pp.31-39
    • /
    • 2022
  • This study empirically analyzed the welfare effect of the military purveyance program, which plays an important role in maintaining the sales channel and demand base in Korea's agricultural and livestock industry, as well as the stable supply of safe ingredients for military meals essential for the morale and combat power of soldiers. The military purveyance program causes additional demand for domestic livestock products, affecting the trading volumes and price levels in the market. This will change the welfare of producers and consumers, and affect the welfare of soldiers who are subject to military meals. The analysis results obtained through a simulation method based on the equilibrium displacement model are as follows. In the case of pork delivered for military service, producer surplus increased by KRW 55.3-62.2 billion and consumer surplus decreased by KRW 55.1~62.0 billion based on pork production in 2021. It wad analyzed that the consumer surplus in the military supply market, rather than the conventional market, increased by KRW 96.9 billion won, resulting in a total welfare gain of KRW 97.1 billion.

Standardization Trends and Military Communication Applications of Core Technologies of 5G NR (5G NR 핵심 기술의 표준동향 및 군 통신 적용 시나리오)

  • Seongjin Lee;Eunsoo Kim;Kihun Kim;Jongman Lee;Wan Choi
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.5
    • /
    • pp.611-618
    • /
    • 2024
  • 5G New Radio(NR) technology, with its focus on high speed, low latency, and connectivity, introduces crucial advancements like MIMO for enhanced reliability and transmission rates, edge computing for reduced latency, and IAB for extended coverage. However, military communication networks face challenges such as limited capacity, unpredictable mobility and communication dead zones. This paper delves into the trends of the above 5G NR technologies outlined by the 3GPP standard, exploring their potential applications within military infrastructure networks. Our aim is to underscore the benefits of harnessing these technologies in military settings. Additionally, through simulation, we forecast the advantages associated with integrating these core 5G NR technologies, thereby paving the way for enhanced military communication capabilities.

Operator Capacity Assessment Method for the Supervisory Control of Unmanned Military Vehicle (군사로봇의 감시제어에서 운용자 역량 평가 방법에 관한 연구)

  • Choi, Sang-Yeong;Yang, Ji-Hyeon
    • The Journal of Korea Robotics Society
    • /
    • v.12 no.1
    • /
    • pp.94-106
    • /
    • 2017
  • Unmanned military vehicles (UMVs) will be increasingly applied to the various military operations. These UMVs are most commonly characterized as dealing with "4D" task - dull, dirty, dangerous and difficult with automations. Although most of the UMVs are designed to a high degree of autonomy, the human operator will still intervene in the robots operation, and tele-operate them to achieve his or her mission. Thus, operator capacity, along with robot autonomy and user interface, is one of the important design factors in the research and development of the UMVs. In this paper, we propose the method to assess the operator capacity of the UMVs. The method is comprised of the 6 steps (problem, assumption, goal function identification, operator task analysis, task modeling & simulation, results and assessment), and herein colored Petri-nets are used for the modeling and simulation. Further, an illustrative example is described at the end of this paper.

Identifying Friendly and Foe Using a Watermarking Technique During Military Communication (군 통신상에서 워터마킹 기술을 이용한 피아식별 방법)

  • Lee, Jong-Kwan;Choi, Hyun-Joo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.9 no.4
    • /
    • pp.81-89
    • /
    • 2006
  • In this paper, a watermark technique for identifying friendly and foe is proposed during communication. The speech signal is processed in several stages. First, speech signal is partitioned into small time frames and the frames are transformed into frequency domain using DFT(Discrete Frequency Transform). The DFT coefficients are quantized and the watermark signal is embedded into the quantized DFT coefficients. At the destination channel quantization errors of received signal are regarded as the watermark signal. Identification of friendly and foe are done by correlating the detected watermark and the original watermark. As in most other watermark techniques, this method has a trade off between noise robustness and quality. However, this is solved by a partial quantization and a noise level dependent quantization step. Simulation results in the various noisy environments show that the proposed method is reliable for identification between friendly and foe.

Network Simulation and Design Guideline for VoIPv6 Network of U-Army (U-Army의 VoIPv6 망 성능 시뮬레이션을 이용한 망 설계 방안)

  • Lee, Hyun-Duck;Min, Sang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.10B
    • /
    • pp.904-910
    • /
    • 2008
  • In this paper, we consider the military requirement, study the military network services and their related traffic parameters, evaluate the performance the experimental army network and then suggest the design guideline of applying VoIP to the whole military. We evaluate the performance of the delay and loss in the viewpoint of packet and call levels for the several scenarios. First, the performances of separate network service were considered and the satisfaction of the requirement was obtained. Secondly, the delays and losses of the integrated network services were calculated as the amount of the background traffic increases. Finally, based on the simulation results, we presented the design guideline which classified network configurations for applying VoIP equipment and helped estimate the number of VoIP terminals in the existing link.

Active Network Performance Improvement for Security Application (보안 응용을 위한 능동 네트워크 성능 향상 방안)

  • 채철주;이명선;김상국;임정목;이성현;이재광
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.416-419
    • /
    • 2004
  • Computer simulation has used to a area of military training in recent years. Computer simulation endow a military nan with field raining such as combat experience without operating combat strength or capabilities. To samely construct simulation environment against actual combat environment is to well construct ㏈ to operate war game model, associate among federates on network. we construct virtual combat environment enabling to efficiently manage network traffic among federates(or active nodes) on active network that construct virtual military training spare such as urgent combat field needed to rapidly transfer combat information including image and video.

  • PDF

M&S Case Study for Information Sharing Enabled Combat Entities (전투 개체간의 정보 공유가 가능한 모델링 및 시뮬레이션 사례 분석)

  • Kho, Younghoon;Lim, Byungyoun;Park, Sangchul;Kwon, Yongjin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.4
    • /
    • pp.395-403
    • /
    • 2014
  • Recent technological advancement has a profound effect on the ways that the war is being conducted and fought. The advanced communications, information, computing and sensor technologies enable the combat units to be integrated in the battlefield management network. By exchanging and sharing real-time battlefield information that is critical for the successful outcome of military engagement, the legacy forces are becoming much more effective and lethal than ever before, The bigger picture of such phenomena can be summarized as the concept of Network Centric Warfare(NCW). The main purpose of this study is to compare the outcome of regional combat engagement between the legacy forces and the future combat systems(FCS). The FCS capitalizes on the advanced technologies within the frame of NCW. This study uses the modeling and simulation methodology to assess the effectiveness of two different combat forces. The simulation results show that the FCS is more effective, hence vindicating the superiority of technologically advanced combat units.

Study on Modeling and Simulation for Fire Localization Using Bayesian Estimation (화원 위치 추정을 위한 베이시안 추정 기반의 모델링 및 시뮬레이션 연구)

  • Kim, Taewan;Kim, Soo Chan;Kim, Jong-Hwan
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.58 no.6
    • /
    • pp.424-430
    • /
    • 2021
  • Fire localization is a key mission that must be preceded for an autonomous fire suppression system. Although studies using a variety of sensors for the localization are actively being conducted, the fire localization is still unfinished due to the high cost and low performance. This paper presents the modeling and simulation of the fire localization estimation using Bayesian estimation to determine the probabilistic location of the fire. To minimize the risk of fire accidents as well as the time and cost of preparing and executing live fire tests, a 40m × 40m-virtual space is created, where two ultraviolet sensors are simulated to rotate horizontally to collect ultraviolet signals. In addition, Bayesian estimation is executed to compute the probability of the fire location by considering both sensor errors and uncertainty under fire environments. For the validation of the proposed method, sixteen fires were simulated in different locations and evaluated by calculating the difference in distance between simulated and estimated fire locations. As a result, the proposed method demonstrates reliable outputs, showing that the error distribution tendency widens as the radial distance between the sensor and the fire increases.

Study on the Computational Simulation of Large Scale Gap Test (Large Scale Gap 시험의 전산모사연구)

  • Lee, Jin-Sung;Park, Jung-Su;Lee, Young-Shin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.5
    • /
    • pp.932-940
    • /
    • 2011
  • This study describes computational simulation results in 2-dimensional and 3-dimensional space concerning large scale gap test(LSGT) by using commercial hydrocode such as AUTODYN and LS-DYNA to analyze the detonation phenomenons of high explosives. To consider the possibilities of LSGT simulation, we used Lee - Tarver reaction rate model of PBX-9404 and Comp-B which were implemented AUTODYN's material library. Also we have tried the diverse numerical schemes such as Lagrangian, Eulerian and ALE(Arbitary Lagrangian Eulerian), SPH(Smoothed Particle Hydrodynamics) in LSGT simulations. After LSGT simulations, we compared the simulation results with published results to verify the LSGT simulations. According to the LSGT simulations, we have concluded as follows. In 2-dimensional and 3-dimensional space, Lagrangian solver provided the most reliable results based on analysis time and accuracy. When using two hydrocodes in 2-dimensional space, the simulation results are almost same except one explosive model. We have verified the modeling method and simulation results of the LSGT by using the commenrcial hydrocode in this study.