• Title/Summary/Keyword: tactical concept

Search Result 44, Processing Time 0.018 seconds

Development of C2 Virtual Linked Simulator For Engineering and Engagement Level Battle Experimentation (공학-교전급 전투실험을 위한 C2 가상모의 연동 시뮬레이터 개발)

  • Lee, Sangtae;Lee, Seungyoung;Hwang, Kun-Chul;Kim, Saehwan;Lee, Kyuhyun
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.4
    • /
    • pp.11-19
    • /
    • 2013
  • The Korean naval weapon systems, combat experiments establish the concept of Battle operations, and create the future of the new weapons system. Doctrine development and training as well as ranging from experiments for evaluate the performance of mission operations for combat experiments are used. The battle lab is effectively support tool for the Korean Naval battle experiments. The battle lab is through a dedicated testing facility and to build efficient and effective simulation-based acquisition supporting environment. In this paper, the ship / submarines C2 operations virtual simulator was developed to support the concept of Battle operations of naval combat experiments in training and tactical development. The ship C2 operations virtual simulator makes the anti-ship and anti-aircraft the engagement scenario for performed experiments using the SADM. The submarines C2 operations virtual simulator makes the anti-submarine engagement scenario for performed experiments using EAS. EAS System was created before reuse. EAS system by modifying the additional interfaces HLA-RTI has been reused. Reflected in the tactics and training after analysis of the results through the battle experiment. Also increase training fidelity through operator involvement. The anti-ship and anti-aircraft system architecture (SADM) and anti-submarine system architecture (EAS) requires unique design of system framework since two separate architectures should be integrated into a system. An C2 virtual linked architecture was used to integrate different system architecture. A C2 virtual linked software framework, designed that have integrated protocol for battle experimental linkage and battlefield visualization environment.

Modern Paradigm of Organization of the Management Mechanism by Innovative Development in Higher Education Institutions

  • Kubitsky, Serhii;Domina, Viktoriia;Mykhalchenko, Nataliia;Terenko, Olena;Mironets, Liudmyla;Kanishevska, Lyubov;Marszałek, Lidia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.141-148
    • /
    • 2022
  • The development of the education system and the labor market today requires new conditions for unification and functioning, the introduction of an innovative culture in the field of Education. The construction of modern management of innovative development of a higher education institution requires consideration of the existing theoretical, methodological and practical planes on which its formation is based. The purpose of the article is to substantiate the modern paradigm of organizing the mechanism of managing the innovative development of higher education institutions. Innovation in education is represented not only by the final product of applying novelty in educational and managerial processes in order to qualitatively improve the subject and objects of management and obtain economic, social, scientific, technical, environmental and other effects, but also by the procedure for their constant updating. The classification of innovations in education is presented. Despite the positive developments in the development of Education, numerous problems remain in this area, which is discussed in the article. The concept of innovative development of higher education institutions is described, which defines the prerequisites, goals, principles, tasks and mechanisms of university development for a long-term period and should be based on the following principles: scientific, flexible, efficient and comprehensive. The role of the motivational component of the mechanism of innovative development of higher education institutions is clarified, which allows at the strategic level to create an innovative culture and motivation of innovative activity of each individual, to make a choice of rational directions for solving problems, at the tactical level - to form motives for innovative activity in the most effective directions, at the operational level - to monitor the formation of a system of motives and incentives, to adjust the directions of motivation. The necessity of the functional component of the mechanism, which consists in determining a set of steps and management decisions aimed at achieving certain goals of innovative development of higher education institutions, is proved. The monitoring component of the mechanism is aimed at developing a special system for collecting, processing, storing and distributing information about the stages of development of higher education institutions, prediction based on the objective data on the dynamics and main trends of its development, and elaboration of recommendations.

Comparison and Analysis of Techniques for Achieving Azimuth Resolution of Imaging Radar (영상레이다의 방위 해상도 구현기법 비교 분석)

  • Hong, In-Pyo;kim, Nam
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.8 no.2
    • /
    • pp.185-196
    • /
    • 1997
  • By considering the definition and application of resolution as well as the concept and theory of SAR, the essential contents of the SAR design and analysis are described. This paper is to compare and analyze the resolution performance capability of three techniques for achieving azimuth resolution such as the real aperture, the unfocused and the focused techniques, through the simulation. Simulation is performed to make the restricted conditions for the unfocused technique that can be implemented by the less commputing load of signal processingand the lower cost. Through the mission analysis, the use of SAR image can be applied for estimation of whole situation at the regional area in the field of military demands for tactical purpose as well as civilian demands for the damage of disaster. RPV and sall or medium aircraft are selected to carry the SAR for these purposes and the proper resolution turns ou 5~15 m. The trade-off study of variables through the simulations results in the proper conditions such that range is less 3, 000 m, Wavelength is 1~10 m, and the raw signals and results processed by three techniques for two point targets are exhibited undr such conditions. Therefore, at some points, the result of this paper si proposed for useful applications of unforcused technique in the restricted conditions except the identification of the small target at a long range re- quired for high resolution.

  • PDF

Detection Model of Malicious Nodes of Tactical Network for Korean-NCW Environment (한국형 NCW를 위한 전술네트워크에서의 악의적인 노드 검출 모델)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Ryou, Hwang-Bin;Jo, Yong-Gun
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.71-77
    • /
    • 2011
  • NCW(Network Centric- Warfare) encompasses the concept to use computer data processing and network linkage communications techniques, share information and furthermore, enhance the effectiveness of computer-operating systems. As IT(Information & Technology) have become developed in the recent years, the existing warfare system-centered conventional protocol is not use any longer. Instead, network-based NCW is being widely-available, today. Under this changing computer environment, it becomes important to establish algorithm and build the stable communication systems. Tools to identify malign node factors through Wireless Ad-hoc network cause a tremendous error to analyze and use paths of even benign node factors misreported to prove false without testing or indentifying such factors to an adequate level. These things can become an obstacle in the process of creating the optimum network distribution environment. In this regard, this thesis is designed to test and identify paths of benign node factors and then, present techniques to transmit data through the most significant open short path, with the tool of MP-SAR Protocol, security path search provider, in Ad-hoc NCW environment. Such techniques functions to identify and test unnecessary paths of node factors, and thus, such technique users can give an easy access to benign paths of node factors.