• Title/Summary/Keyword: warfare information system

Search Result 205, Processing Time 0.023 seconds

Performance Analysis of Efficient Subchannelization Algorithm against Partial Band Jamming (부채널화를 통한 효율적인 부분대역 재밍 회피 알고리즘과 성능분석)

  • Song, Yu Chan;Hwang, Yu Min;Park, Ji Ho;Kim, Jin Young;Shin, Yoan
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.2
    • /
    • pp.14-18
    • /
    • 2015
  • Electronic warfare recently has became the core of modern warfare and the importance of communication survivability is being considerable day by day. In this paper, we propose an effective jamming avoidance algorithm aginst widely used jamming environment such as GPS jamming. In order to simulate to show our system performance, we consider IEEE 802.16 WiMAX protocol and partial band jamming envoriment. Proposed algorithm can improve channel capacity through subchannelization and we show channel capacity corresponding to subchannel parameter.

An Algorithm for De-Interleaving of Wobble and Sinusoidal PRIs for Unidentified Radar Signals (미상 레이더의 Wobble 및 Sinusoidal PRI 식별 알고리즘)

  • Lee, Yongsik;Lim, Joongsoo;Lim, Jaesung
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.26 no.12
    • /
    • pp.1100-1107
    • /
    • 2015
  • In this paper, we propose an algorithm to identify Wobble PRI and Sinusoidal PRI among Radar pulses. We applied not only the DTOA(Difference Time Of Arrival) concept of radar pulse signals incoming to antennas but also a rising and falling cub characteristic of those PRIs. After making a program by such algorithm, we input each 40 data to Wobble PRI's and Sinusoidal PRI's identification programs and in result, those programs fully processed the data the according to expectations. In the future, those programs can be applied to the ESM, ELINT system.

The Data Compression Method for increase of Efficiency in Tactical Data Communication over Legacy Radios (Legacy Radio 기반의 전술데이터 통신 효율성 향상 위한 데이터 압축 기법)

  • Sim, Dong-Sub;Shin, Ung-Hee;Kim, Ki-Hyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.4
    • /
    • pp.577-585
    • /
    • 2010
  • The Military Tactical Communication technology for effective network-centric warfare is developing. Targeting broadband wireless transmission, core technology for connection, and Transmission technology that secure survivability under High-speed Movement environment. On the one hand, Tactical data communication system that reflects military characteristic is developing on the base of Legacy communication equipment which is used in the field. Because almost every military units in the field have used voice to communicate which lower efficiency of operation, they have made effort to Substitute voice communication which delays military Operation Tempo to digital communication. The Communications environment of troops in Forward edge of battle field area is very poor. Especially in terms of limited frequency allocation and bandwidth. Therefore, improving the efficiency of frequency is essential for Military Tactical Communication. This paper is about The Data Compression Method for increase of Efficiency in Tactical Data Communication over Legacy Radios which are UHF, VHF, HF Radio. I proposed and proved the most efficient Data Compression Method that reflects military characteristic, after analyzing the experimentation, which simulate CAS(Close Air Support mission) data transmission between Pilot and TACP.

Electronic Attack Signal Transmission System using Multiple Antennas (다중 안테나를 이용한 전자 공격 신호 전송 시스템)

  • Chang, Jaewon;Ryu, Jeong Ho;Park, Joo Rae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.1
    • /
    • pp.41-49
    • /
    • 2021
  • In electronic warfare, beamforming using multiple antennas is applied for effective transmission of electronic attack signals. In order to perform an electronic attack against multiple threats using the same frequency resource, it is necessary to apply a multi-beam transmission algorithm that has been studied in wireless communication systems. For electronic attacks against multiple threats, this paper presents an MMSE(Minimum Mean-Squared Error) beam-forming technique based on the prior location information of threats and an optimization method for power allocation. In addition, the performance of the proposed method is evaluated and received signals of multiple threats are compared and analyzed.

An Architecture Design of Military Operation System Utilizing Cellular Networks (군작전 효율화를 위한 셀룰라망 연동구조 설계)

  • Kim, Jae-Cheol;Kim, In-Taek
    • Journal of National Security and Military Science
    • /
    • s.9
    • /
    • pp.257-282
    • /
    • 2011
  • In this paper, we propose an architecture design of military operation system utilizing cellular networks. The main contribution of this paper is to provide a cost-effective military operation solution for ground forces, which is based on IT(information technology). By employing the cellular phones of officers' and non-commissioned officers' as the tools of operational communication, the proposed system can be constructed in the minimum duration and be built on the four components: command and control system, gateway, security system, and terminal(cell phone). This system is most effective for the warfare of limited area, but the effectiveness does not decrease under the total war covering the whole land of Korea. For the environmental change of near future, expanded architecture is also provided to utilize the functionalities of smart phones.

  • PDF

Association between Object and Sonar Target for Post Analysis of Submarine Engaged Warfare Simulation (잠수함 교전 시뮬레이션의 사후분석을 위한 객체와 소나 표적간의 연관 기법)

  • Kim, Junhyeong;Bae, Keunsung
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.3
    • /
    • pp.65-72
    • /
    • 2017
  • We propose a method to generate the object-target identifier mapping information for system performance and effectiveness analysis of submarine engage system and verify the validity of the proposed method through experiments. In the submarine model of the engage simulator, the signal processing algorithm of the actual sonar system is installed. In the target information obtained through the sonar or signal processing process, the actual object information is not known, and the simulator does not provide such information. Therefore, in this study, we generated identifier mapping information for simulation post-analysis by using bearing, range, and speed of the target obtaind from sonar signal processing and the object collected.

A Study on the Net Centric Entity Interoperability Layer (NCEI레이어 모델에 관한연구)

  • Son, Hyun-Sik;Lee, Tae-Gong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4B
    • /
    • pp.269-277
    • /
    • 2012
  • The future battlefield environment has changed platform centric warfare into a network centric warfare. The NCO is a operational concept to improve combat power through information sharing, shared situational awareness, decision making and synchronized action based on powerful network grid. In addition, these operational environment is composed of physical, information, cognitive and social domains. The platform environment system is associated with the OSI 7 layer. However, OSI 7 layer is limited to express NCW environment including cognitive and social domains. Therefore, we requires a new model for expressing cognitive and social domains. After we developed a new model, this model applied to the NCW architecture taxonomy.

The Diagnosis and Prescription for Cybersecurity in Korea: Focusing on Policy and System

  • Park, Sangdon;Kim, Il Hwan;Kim, Jaehyoun;Lee, Kyung Lyul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.843-859
    • /
    • 2018
  • Cybersecurity has emerged as a serious problem in Korea and there have been relevant movements to improve domestic cybersecurity policy and system. However, discussions have yet to result in actual progress and the legislation for improvement of cybersecurity policy and system have been stagnant until now. As evidenced by the introduction of primary government legislation bill for national cybersecurity in 2017, the preparations for improvements to the policy and system are still in progress. However, we cannot be positive about the possibility of implementing these improvements during the process. Recognition of the importance of cybersecutiry has gradually risen and is more prevalent than in years past, however, in-depth discussions are not being made. In principle, misunderstandings about cybersecurity itself and insufficient understandings of the relevant legislation seem to cause such problems. Therefore, it is necessary to review key issues related to the improvement of cybersecurity policy and system and reconsider tasks for the future. Such issues include the relationship between cybersecurity and fundamental rights, establishing responsibility and capability of each of entities for cybersecurity, and the role of the military in cybersecurity. This type of in-depth discussion will be helpful for finding ways to improve upon cybersecurity policy and system. Moreover, this study aims to key issues with questionnaire survey and political and normative inquiry.

A Study on the Emergency Response System for Internet game event with simulation circumstance (시뮬레이션 환경하에서 인터넷 게임 사고 대응시스템모델 연구)

  • Shin, Seung-Jung;Choi, Woon-Ho
    • Journal of Korea Game Society
    • /
    • v.5 no.1
    • /
    • pp.41-44
    • /
    • 2005
  • This paper is model can be useful and capable of automatically collecting and classifying the various information about a wide range of security incidents such as hackings, worms, spyware, cyber-terror, network espionage and information warfare from firewall, IDS, VPN and so on. According to them Internet game and an automated/integrated computer emergency response system can perform an attack assessment and an early warning for any incidents based on Enterprise Security Management environment.

  • PDF

Interoperability Assessment Framework for Embedded Software of Weapon Systems (무기체계 내장형 소프트웨어 상호운용성 평가 프레임워크)

  • Oh, Haeng-Rok;Koo, Heung-Seo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.10 no.4
    • /
    • pp.116-124
    • /
    • 2007
  • As NCW has appeared, the importance of interoperability in modern warfare has been also increased. Korean Defense has constructed and used the Systems Interoperability Test & Evaluation System based on LISI, in order to increase interoperability between Defense Information Systems. However, its evaluating targets are limited to only the information systems, so that it is difficult to apply it to weapon systems. This paper proposes an integrated interoperability assessment framework for korean embedded software of weapon systems based on reviewing the limitations of SITES and the other interoperability assessment models.