• Title/Summary/Keyword: battlefield

Search Result 377, Processing Time 0.023 seconds

Developing an AR based Command Post eXercise(CPX) Simulator (증강현실 기반 지휘통제훈련 시뮬레이터 개발)

  • Park, Sangjun;Shin, Kyuyoung;Kim, Dongwook;Kim, Tai Hyo;Roh, Hyo Bin;Lee, Wonwoo
    • Convergence Security Journal
    • /
    • v.18 no.5_2
    • /
    • pp.53-60
    • /
    • 2018
  • As science and technology develops, it is expected that more precise and various weapons will be used in a much more complicate future battlefield environment. C4I is a system that provides the proper and necessary information to commanders and their staffs to recognize the battlefield situation by connecting and visualizing the complex battlefield environment and various weapon systems together. Commanders and staffs perform battle command training based on a computer or paper map to better utilize the C4I system and Command Post eXercise(CPX) is a process of the training. This is the way for them to improve command control and decision making skills. Analyzing of line of sight(LOS), identifying communication fringe area, deploying troop strength, and determining unit maneuver are highly restricted under the 2D based CPX. In recent years, however, three-dimensional (3D) CPX simulators have been developed to overcome these drawbacks. In response to this trend, this paper proposes a multi-user based CPX simulator using augmented reality (AR) glass, which can be used as a practical war game simulator.

  • PDF

Development of Autonomous Behavior Software based on BDI Architecture for UAV Autonomous Mission (무인기 자율임무를 위한 BDI 아키텍처 기반 자율행동 소프트웨어 개발)

  • Yang, Seung-Gu;Uhm, Taewon;Kim, Gyeong-Tae
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.5
    • /
    • pp.312-318
    • /
    • 2022
  • Currently, the Republic of Korea is facing the problem of a decrease in military service resources due to the demographic cliff, and is pursuing military restructuring and changes in the military force structure in order to respond to this. In this situation, the Army is pushing forward the deployment of a drone-bot combat system that will lead the future battlefield. The battlefield of the future will be changed into an integrated battlefield concept that combines command and control, surveillance and reconnaissance, and precision strike. According to these changes, unmanned combat system, including dronebots, will be widely applied to combat situations that are high risk and difficult for humans to perform in actual combat. In this paper, as one of the countermeasures to these changes, autonomous behavior software with a BDI architecture-based decision-making system was developed. The autonomous behavior software applied a framework structure to improve applicability to multiple models. Its function was verified in a PC-based environment by assuming that the target UAV is a battalion-level surveillance and reconnaissance UAV.

Modeling and Simulation of Optimal Path Considering Battlefield-situation in the War-game Simulation (워게임 시뮬레이션에서 전장상황을 고려한 최적경로 모델링 및 시뮬레이션)

  • Lee, Sung-Young;Jang, Sung-Ho;Lee, Jong-Sik
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.3
    • /
    • pp.27-35
    • /
    • 2010
  • War-games using C4I systems have been used to improve the command ability of commanders and the fighting power of combat forces. During a war-game simulation, a commander makes a plan for the movement of a combat force and issues orders to the combat force according to the plan. If it is possible to minimize damages from the artillery of enemy forces and take the advantage position where is effective for attack/defense, we can hold a dominant position of the battlefield. Therefore, this papers proposes a genetic algorithm-based optimal path searching method. The proposed method creates an optimal path of a combat force by taking into consideration dangerous conditions of the battlefield in which the combat force is. This paper also shows the process of creating an optimal path by using a discrete event specification modeling and simulation method.

A Study on the Moral Responsibility of Lethal Autonomous Weapon Systems (LAWS): Focused on Robert Sparrow's "Responsibility Gap" Theory (치명적 자율무기체계의 도덕적 책임 문제 연구 : 로버트 스패로우의 '책임간극' 이론에 대한 고찰)

  • Hyunyoung Moon;Sangsu Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.375-381
    • /
    • 2023
  • In an increasingly hyperconnected battlefield, the reliance on battlefield networks and AI-based autonomous weapons systems creates uncertainty and raises ethical concerns. This article explores the responsibility gap in operating autonomous weapons systems, using Robert Sparrow's theory. By analyzing Sparrow's arguments, we propose overcoming the responsibility gap in lethal autonomous weapon systems (LAWS). Our objective is to establish a framework of responsibility that aligns with the evolving battlefield, promoting the development and use of responsible weapon systems.

Study on the Vulnerabilities of Automatic Speech Recognition Models in Military Environments (군사적 환경에서 음성인식 모델의 취약성에 관한 연구)

  • Elim Won;Seongjung Na;Youngjin Ko
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.201-207
    • /
    • 2024
  • Voice is a critical element of human communication, and the development of speech recognition models is one of the significant achievements in artificial intelligence, which has recently been applied in various aspects of human life. The application of speech recognition models in the military field is also inevitable. However, before artificial intelligence models can be applied in the military, it is necessary to research their vulnerabilities. In this study, we evaluates the military applicability of the multilingual speech recognition model "Whisper" by examining its vulnerabilities to battlefield noise, white noise, and adversarial attacks. In experiments involving battlefield noise, Whisper showed significant performance degradation with an average Character Error Rate (CER) of 72.4%, indicating difficulties in military applications. In experiments with white noise, Whisper was robust to low-intensity noise but showed performance degradation under high-intensity noise. Adversarial attack experiments revealed vulnerabilities at specific epsilon values. Therefore, the Whisper model requires improvements through fine-tuning, adversarial training, and other methods.

Analysis of Organic Composition Principles and Operating System of Ancient Battle Formation in the Late Joseon Dynasty (조선후기 군사 전술의 진법(陣法) 구성과 운영체계 분석)

  • Kwon, Byung-Woong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.5
    • /
    • pp.200-210
    • /
    • 2017
  • This Research is focused on ancient battle formation basing on the layout drawing of Yijinchongbang (manuals of learning military formations) in a strategy book in the late Joseon dynasty. The research topic is the principles of organic composition of battle formation and battlefield operating system by reforming the basic model of ancient battle formation. The research method is comparative analysis by reforming the battlefield operating system of types of disposition such as Obangjindisposition(Bangnjin; battle formation, Jikjin; direct battle formation, Gokjin; bend battle formation, Wonjin; round battle formation, and Yejin; keen battle formation), and Hyunmoojindo; turtle battle formation, Paljindo; all-rounder battle formation, Yookhwajindo; six flowers battle formation, Gugunjindo; nine forms battle formation. From the study results, Standoff Bombing of the battle formation in the late Joseon Dynasty basically started out from magic battle formation, but was then transformed into square, rectangle, pentagon, and circle. Also, the battle array composition used a 5-linear structure and was composed of 5 systems of circulation such as rectangle, square, diagonal, curve, and circle. The research findings elucidate the battlefield of the Joseon dynasty by establishing the real battle formation, and thus have military and academic value in suggesting possible tactics that can be used by modern training of military.

Integrated Scenario Authoring Method using Mission Impact Analysis Tool due to Cyber Attacks (사이버공격에 의한 임무영향 분석 도구를 이용한 통합시나리오 저작 방법)

  • Yonghyun Kim;Donghwa Kim;Donghwan Lee;Juyoub Kim;Myung Kil Ahn
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.107-117
    • /
    • 2023
  • It must be possible to assess how combat actions taking place in cyberspace affect the military's major mission systems and weapon systems. In order to analyze the mission impact caused by a cyber attack through cyber M&S, the target mission system and cyber warfare elements must be built as a model and a scenario for simulation must be authored. Many studies related to mission impact analysis due to cyber warfare have been conducted focusing on the United States, and existing studies have authored separate scenarios for physical battlefields and cyber battlefields. It is necessary to build a simulation environment that combines a physical battlefield model and a cyber battlefield model, and be able to integrate and author mission scenarios and cyber attack/defense scenarios. In addition, the physical battlefield and cyber battlefield are different work areas, so authoring two types of scenarios for simulation is very complicated and time-consuming. In this paper, we propose a method of using mission system information to prepare the data needed for scenario authoring in advance and using the pre-worked data to author an integrated scenario. The proposed method is being developed by reflecting it in the design of the scenario authoring tool, and an integrated scenario authoring in the field of counter-fire warfare is being performed to prove the proposed method. In the future, by using a scenario authoring tool that reflects the proposed method, it will be possible to easily author an integrated scenario for mission impact analysis in a short period of time.

Unsupervised Learning-Based Threat Detection System Using Radio Frequency Signal Characteristic Data (무선 주파수 신호 특성 데이터를 사용한 비지도 학습 기반의 위협 탐지 시스템)

  • Dae-kyeong Park;Woo-jin Lee;Byeong-jin Kim;Jae-yeon Lee
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.147-155
    • /
    • 2024
  • Currently, the 4th Industrial Revolution, like other revolutions, is bringing great change and new life to humanity, and in particular, the demand for and use of drones, which can be applied by combining various technologies such as big data, artificial intelligence, and information and communications technology, is increasing. Recently, it has been widely used to carry out dangerous military operations and missions, such as the Russia-Ukraine war and North Korea's reconnaissance against South Korea, and as the demand for and use of drones increases, concerns about the safety and security of drones are growing. Currently, a variety of research is being conducted, such as detection of wireless communication abnormalities and sensor data abnormalities related to drones, but research on real-time detection of threats using radio frequency characteristic data is insufficient. Therefore, in this paper, we conduct a study to determine whether the characteristic data is normal or abnormal signal data by collecting radio frequency signal characteristic data generated while the drone communicates with the ground control system while performing a mission in a HITL(Hardware In The Loop) simulation environment similar to the real environment. proceeded. In addition, we propose an unsupervised learning-based threat detection system and optimal threshold that can detect threat signals in real time while a drone is performing a mission.

Experimental Application of Robot Operability Simulator (ROSim) to the Operability Assessment of Military Robots (로봇 운용성 시뮬레이터(ROSim)의 군사로봇 운용성 평가에 실험적 적용 연구)

  • Choi, Sangyeong;Park, Woosung
    • The Journal of Korea Robotics Society
    • /
    • v.13 no.3
    • /
    • pp.151-156
    • /
    • 2018
  • Military robots are expected to play an important role in the future battlefield, and will be actively engaged in dangerous, repetitive and difficult tasks. During the robots perform the tasks a human operator controls the robots in a supervisory way. The operator recognizes battlefield situations from remote robots through an interface of the operator control center, and controls them. In the meantime, operator workload, controller interface, robot automation level, and task complexity affect robot operability. In order to assess the robot operability, we have developed ROSim (Robot Operational Simulator) incorporating these operational factors. In this paper, we introduce the results of applying ROSim experimentally to the assessment of reconnaissance robot operability in a battle field. This experimental assessment shows three resulting measurements: operational control workload, operational control capability, mission success rate, and discuss its applicability to the defense robot research and development. It is expected that ROSim can contribute to the design of an operator control center and the design analysis of a human-robot team in the defense robot research and development.

A Study on Sharing Web Application between Battlefield Management System based on PKI Authentication (PKI 인증기반 전장관리체계 웹 연동에 관한 연구)

  • Kim, Young-Sung;Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the military operations research society of Korea
    • /
    • v.36 no.1
    • /
    • pp.123-140
    • /
    • 2010
  • Interworking Web Application to share the resource between Battlefield Management Systems(BMS) is critical issues for accomplishment of information superior. However, authentication system of BMS differ from each other because of having the independent plan for system build. This problem causes inefficiency such as the information insufficiency owing to not share web application and the need of additional laptops. To solve the problem, in this paper, we propose the improved certificate acquisition and verification algorithm for the user of different BMS. By testing the proposed algorithm appling to the real field, we verify the performance of proposed method.