• Title/Summary/Keyword: tactical concept

Search Result 44, Processing Time 0.02 seconds

A Study of Building a Model for Tactical C4I System (전술 C4I체계 모델 구축에 관한 연구)

  • Kim, Ho-Jin;Lee, Sang-Kook;Kwon, Young-Sik
    • IE interfaces
    • /
    • v.12 no.2
    • /
    • pp.193-204
    • /
    • 1999
  • Development of high technology especially in telecommunication and precise weapon systems will impact the future battle field environment. So it is not difficult to anticipate the environment of military command and control system will be changed rapidly. Considering these future battle field environment, military needs automated C4I (Command, Control, Communication, Computer and Intelligence) system, namely real time decision support system which is combined high technologies. Most of advanced countries have been studied and developed these kinds of systems and already applied these systems in real military operations. In order to take a military initiative in Korea peninsula it is essential to catch up with this trend and procure C4I system. The purpose of this research is to present the method and the direction of optimal C4I system development model. First we survey the related theory about C4I systems. Second we present the conceptual framework for C4I system concept development. Third we model the system using Timed Petri-Net and perform simulation. Finally we analyze the through-put time and suggest alternatives. If we model using the real organization structure, operational tasks and various situations then optimal C4I system would be developed.

  • PDF

An Intrusion Detection Technique Suitable for TICN (전술정보통신체계(TICN)에 적합한 침입탐지 기법)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.6
    • /
    • pp.1097-1106
    • /
    • 2011
  • Tactical Information Communication Network(TICN), a concept-type integrated Military Communication system that enables precise command control and decision making, is designed to advance into high speed, large capacity, long distance wireless relay transmission. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. Ad-hoc network works properly only if the participating nodes cooperate in routing and packet forwarding. However, if selfish nodes not forwarding packets of other nodes and malicious nodes making the false accusation are in the network, it is faced to many threats. Therefore, detection and management of these misbehaving nodes is necessary to make confident in Ad-hoc networks. To solve this problem, we propose an efficient intrusion detection technique to detect and manage those two types of attacks. The simulation-based performance analysis shows that our approach is highly effective and can reliably detect a multitude of misbehaving node.

An Experimental Study on the Manoeuvrability of KCS with Different Scale Ratios by Free Running Model Test (자유항주모형시험을 이용한 KCS 선형의 축척비별 조종성능에 관한 연구)

  • Yun, Kunhang;Choi, Hujae;Kim, Dong Jin
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.58 no.6
    • /
    • pp.415-423
    • /
    • 2021
  • There have been many experimental studies on the manoeuvrability of KRISO Container Ship (KCS). However, the scale ratio of the model ship and the test procedure for each institute are slightly different, so direct comparison for the data is technically difficult to perform. This paper presents the manoeuvrability of the ship with different scale ratios: 1/65.8, 1/42.0, and 1/31.6 in model scale. KRISO conducted Free Running Model Tests (FRMT): 35° turning circle tests and 20/20(10/10) zigzag manoeuvring tests. The test results indicated that advance and tactical diameter in turning circle tests were similar, and overshoot angles in two zigzag manoeuvring tests increased as the model ship size increased. In addition, a basic concept for the FRMT method with an auxiliary X-thrust device was proposed so that the scale effect could be considered in model ship tests.

Conceptualizing a Strategic Facilities Management Decision Framework for Heritage Building Maintenance Management

  • Adegoriola, Mayowa I.;Yung, Esther H.K.;Lai, Joseph H.K.;Chan, Edwin H.W.
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.992-1000
    • /
    • 2022
  • Heritage buildings (HBs) as structures with historical and architectural relevance that form an integral part of contemporary society. HBs deserve to be protected for as long as possible to retain their significance. Therefore, prioritizing HB maintenance management (HBMM) is pertinent. However, the decision-making process of HBMM can be relatively daunting. The decision-making challenge may be attributed to the multiple 'stakeholders' expectation and requirement which needs to be met. To this end, professionals in the built environment have identified the need to apply the strategic concept of facilities management (FM) in decision making. However, studies exploring the application of FM in decision-making seem lacking. To bridge this gap, this study focuses on developing a framework for strategic decision-making HBMM, which helps achieve HBMM sustainability. At the study's inception, relevant works of literature in the domains of HBMM and FM were conducted. This review helped identify contemporary maintenance practices and their applicability to HBMM. Afterward, a conceptual framework to aid decision-making in HBMM was developed. This framework integrated the concept of FM scope (people, place, process, and technology) while ensuring that decisions and plans were made at strategic, tactical, and operational levels. The conceptual framework presents a holistic guide for professionals in HBMM to ensure that decision processes and outcomes are practical and efficient. It also contributes to the existing body of knowledge on the integration of FM in HBMM. Furthermore, it will help achieve HB sustainability through an effective decision-making process.

  • PDF

The North Korea's Foreign Policy Stance and Prospect (북한의 대외정책 기조와 전망)

  • Kim, Sung Woo
    • Convergence Security Journal
    • /
    • v.14 no.6_1
    • /
    • pp.57-63
    • /
    • 2014
  • Even though the historical changes of the Cold War, they does not release the Cold War structure in Korean peninsula. And continues North Korea's provocations against South Korea. A factor of instability in Northeast Asia is the causing catastrophic inter-Korean relations and North Korea's Yeonpyeong shelling and provocation of the Cheonan battleship sinking by an explosion. These behaviors have been committed by among the North Korea military. North Korea's provocations made by a complex decision-making system in the United States and North Korea and South Korea. North Korea's aggressive military actions are conducted under the North Korean political system of strategies unification of the Korean peninsula. It has a duality of continuity and change, depending on the situation of a foreign policy in North Korea. If North Korea want maintain structure of their country, they should change the national policy and strategy, tactics and the military action type. North Korea should be a member of international community. As one of the country in the world, North Korea create economic power, nuclear tensions break, and participate in the international community for the peace.

Green-Split Coordination Strategy in Oversaturated Signal System (과포화교통상태에서의 SPLIT COORDINATION신호제어전략)

  • 이광훈
    • Journal of Korean Society of Transportation
    • /
    • v.11 no.1
    • /
    • pp.87-103
    • /
    • 1993
  • The subject this paper is the signal control strategy under oversaturated conditions. The nature of traffic control for oversaturation is essentially different from the standard control modes. While under non-saturated situation traffic control is needed for the sake of safety and efficiency, the throughput is essential under oversaturated conditions. Therefore berth objective and strategies differ. For an oversaturated stream the cycle time and the signal offset are thought to be of rather secondary importance. For this case the green split may well be the most important control variable to serve the excessive demand. Up to now, however, most efforts have concentrated on the strategy with the concept which lies just on the extension of Webster's. "Green-split Coordination Strategy for Over-Saturated Networks", presents newly contrived three types of strategies named Forward-coordination, Backward-coordination and Network-coordination respectively and describes the algorithms with the evaluations. The forward coordination strategy treats the forward wave of flow between two signals. The aim is to prevent the outbreak of queue due to the accumulation of temporary excess of demand in near-saturation or saturation flow. The backward coordination strategy treats the backward rave of flow between two signals. The goal is to prevent the waste of green time caused by the exit block at the upstream signal. for this purpose a feedback regulation is provided of the upstream green-split so that the inflow-outflow balance is kept zero. The resultant surplus of green time is alloted to other signal stages. Also here the examination is made of the appropriate value of the feedback control parameter. The network coordination strategy is operated to maximize the network throughput in a specific direction applying a bang-bang control at the bottleneck intersection. This is a type of intervenient control for policy reasons. For this strategy the green-split coordinations, particuarly the backward coordination, are essential as the tactical elements. In order to evaluate the preposed strategies those are compared with the latest existing strategy called saturation-degree-ratio control by the simulation experiments in an assumed 4$\times$4 grid network. The results are satisfactory showing a 10-15% reduction in delays and a 15% increase in network capacity.

  • PDF

Resource Reservation Based Image Data Transmission Scheme for Surveillance Sensor Networks (감시정찰 센서 네트워크를 위한 자원예약 기반 이미지 데이터 전송 기법)

  • Song, Woon-Seop;Jung, Woo-Sung;Ko, Young-Bae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.11
    • /
    • pp.1104-1113
    • /
    • 2014
  • Future combat systems can be represented as the NCW (Network Centric Warefare), which is based on the concept of Sensor-to-Shooter. A wireless video sensor networking technology, one of the core components of NCW, has been actively applied for the purpose of tactical surveillance. In such a surveillance sensor network, multi-composite sensors, especially consisting of image sensors are utilized to improve reliability for intrusion detection and enemy tracing. However, these sensors may cause a problem of requiring very high network capacity and energy consumption. In order to alleviate this problem, this paper proposes an image data transmission scheme based on resource reservation. The proposed scheme can make it possible to have more reliable image data transmission by choosing proper multiple interfaces, while trying to control resolution and compression quality of image data based on network resource availability. By the performance analysis using NS-3 simulation, we have confirmed the transmission reliability as well as energy efficiency of the proposed scheme.

The Analysis of Crypto Communication Relay Effect in the Security Framework Technique of Network Centric Warfare Environment (NCW환경의 보안 프레임워크 기술에서 암호통신 중계영향 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.4
    • /
    • pp.788-794
    • /
    • 2007
  • The policy of US DoD is moving towards implementation of Network Centric Warfare(NCW) concepts. NCW is commonly described as the integration and synchronization of four key interdependent elements such as command and control, sensor system, engagement systems and the network. Therefore the military policy of Korea military is needed to access and examine the policy of NCW communication environment and crypto communication, which is able to apply it. In this case study, We are reviewed the security framework of the concept of network centric warfare in the centering around the US. It is introduced the core technology in the network centric warfare, and it is reviewed the security framework such as, the requirements of security, the characteristics security of global information grid, joint tactical radion system, net centric enterprise services, transformational communication satellite, in the basis of core technology, and analysis the effect of crypto communication relay between command node and surbornate node in NCW environment. This report support the assistance, which is considered the elements of surrounding effects in the varied crypto communication research area of NCW.

  • PDF

Relaying of 4G Signal over 5G Suitable for Disaster Management following 3GPP Release 18 Standard

  • Jayanta Kumar Ray;Ardhendu Shekhar Biswas;Arpita Sarkar;Rabindranath Bera;Sanjib Sil;Monojit Mitra
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.369-390
    • /
    • 2023
  • Technologies for disaster management are highly sought areas for research and commercial deployment. Landslides, Flood, cyclones, earthquakes, forest fires and road/train accidents are some causes of disasters. Capturing video and accessing data in real time from the disaster site can help first responders make split second decisions which may save human lives and valuable resource destructions. In this context the communication technologies performing the task should have high bandwidth and low latency which only 5G can deliver. But unfortunately in India, deployment of the 5G mobile communication systems is yet to give a shape and again in remote areas unavailability of 4G signals is still severe. In this situation the authors have proposed, simulated and experimented a 4G-5G communication scheme where from the disaster site the signals will be transmitted by a 5G terminal to a nearby 4G-5G gateway installed in a mobile vehicle. The received 5G signal will be further relayed by the 4G-5G gateway to the fixed 4G base station for onward transmission towards the disaster management station for decision making, deployment and relief monitoring. The 4G-5G gateway acts as a relay and converter of 5G signal to 4G signal and vice versa. This relayed system can be further mounted on a vehicle mounted relay (VMR) as proposed by 3GPP in Release 18. The scheme is also in the same line of context with Verizon's, "Tactical Humanitarian Operations Response" (THOR) vehicle concept. The performance of the link is studied in different channel conditions, the throughput achieved is superb. The authors have implemented the above mentioned system towards smart campus networking and monitoring landslides activities which are common in their regions.

The Role of Smart Technologies in Training Future Specialists

  • Oksana, Popovych;Rostislav, Motsyk;Iryna, Mozul;Karina, Fedchenko;Andrii, Zhbanchyk;Olena, Terenko;Oleksandr, Kuchai
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.153-159
    • /
    • 2022
  • The article discusses the use of smart technologies in the training of future specialists. Today, learning using smart technologies is becoming a new educational standard, where information is presented in a logical sequence, computer training systems have powerful functions for the educational process. The functions of smart technologies are highlighted. It is noted that smart technologies are successfully used in the field of education and professional training. The concept of "smart education" is characterized. Smart education is an educational paradigm that underlies a new type of education system. The implementation of the smart education paradigm is aimed at the process of obtaining competencies and competencies for flexible and adapted interaction with the social, economic and technological environment. Smart education should ensure that the benefits of the global information society can be used to meet educational needs and interests. A special place is occupied by computer-based educational multimedia systems that allow you to deepen your knowledge, reduce the duration of training, and increase the number of students per teacher. The main principles of smart education are highlighted. Improving the efficiency of training in a modern higher education institution is impossible without the introduction of smart technologies in the organization of the educational process.