• Title/Summary/Keyword: warfare information system

Search Result 205, Processing Time 0.027 seconds

Emitter Geolocation Based on TDOA/FDOA Measurements and Its Analysis (TDOA/FDOA 융합 기반 신호원의 위치추정 및 성능 분석)

  • Kim, Dong-Gyu;Kim, Yong-Hee;Han, Jin-Woo;Song, Kyu-Ha;Kim, Hyoung-Nam
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.9
    • /
    • pp.746-756
    • /
    • 2013
  • The emitter geolocation method using the time difference of arrival (TDOA) and the frequency difference of arrival (FDOA) has more accurate performance comparing to the single TDOA or FDOA based method. The estimation performance varies with the sensor paring strategies, the deployment and velocities of the sensors. Therefore, to establish effective strategy on the electronic warfare system, it is required to analyze the relation between the estimation accuracy and the operational condition of sensors. However, in the conventional non-iterative method, the restriction of the deployment of sensors and the reference sensor exists. Therefore, we derive the emitter geolocation method based on a Gauss-Newton method which is available to apply to any various sensor pairs and the deployment and velocities of the sensors. In addition, simulation results are included to compare the performance of geolocation method according to the used measurements: the combined TDOA/FDOA, TDOA, and FDOA. Also, we present that the combined TDOA/FDOA method outperforms over single TDOA or FDOA on the estimation accuracy with the CEP plane.

An Identify of Two Step Stagger Signals Using the Second Deviation of Pulse Train (펄스열의 2차 차분을 이용한 2단 stagger 신호 식별)

  • Lim, Joong-Soo;Hong, Kyung-Ho;Lee, Duk-Yung;Shin, Dong-Hoon;Kim, Yong-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.7
    • /
    • pp.1536-1541
    • /
    • 2009
  • In this paper, we present a novel pulse train identification method for two step stagger pulse train. Generally radar uses a fixed pulse train, and it is easy for electronic warfare system to measure the pulse repeat interval(PRI) and identify the radar. But it is very difficult to measure the PRI of stagger pulse radar because the pulse interval is periodically changed. We suggest a novel method to measure the PRI and identify the radars using the second deviation of pulse train. This method is faster comparing with Histogram method. We have a good PRI measurement results for 2 step stagger signals.

Hardware configuration of High-Density HVPS and High Speed independent Control method Using FPGA for Phased Array Transmitters (위상 배열 고출력증폭기용 고밀도 고전압 전원공급기 하드웨어 구성 및 FPGA를 이용한 고속 독립 제어방식)

  • Kang, Chun-Ho;Lee, Sung-Wook;Lee, Hong-Hak;Lee, Chang-Hoon;Byun, Gi-Sig
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2758-2764
    • /
    • 2015
  • In the field of electronic warfare applications, high voltage power supply(HVPS) for high power phased array transmitters must necessarily have an independent operating characteristics for driving mini TWTs. TWT independent operational characteristics, in order to run without interrupting the electronic warfare mission by maintaining the partial transmission function even when one of the TWT has occurred a failure, is known to be very important. In this paper, we describe the research on high-speed independent control system using a high-density HVPS, including FE modulators, hardware configuration and the FPGA in order to independently operate mini TWTs. Also, we have simulated some possible faults in phased array transmitters, and presents the test results to control a faulted TWT independently.

A Study of Administration of Cyber Range (사이버 레인지 운용 방안 연구)

  • Kim, Daesik;Kim, Yonghyun
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.9-15
    • /
    • 2017
  • In the whole world the Attack Technologies of cyber warfare in modern society are growing faster and complicated. The frequency of the new attacks is shorter than before day by day. The defense technologies and experts against these attacks are very few. One of answers to solve these problems is the cyber range as a test-bed to prepare the cyber warfare considered by many countries. This paper examines the foreign cases and similar systems, collects and analyzes various attributes for cyber range. Finally it refines them through system engineering processes. In these processes missions and concepts for administration are set with architecture framework. The logical architecture is designed. Based on designed architecture two goals, defense technologies and procurement of experts, are established. And it shows effective and persistent administration of cyber range.

Prioritizing Maintenance of Naval Command and Control System Using Feature Selection

  • Choi, Junhyeong;Kang, Dongsu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.11
    • /
    • pp.219-228
    • /
    • 2019
  • Naval command and control system are very important for operation and their failures can be fatal for warfare. To prepare for these failures, we use feature selection method which is one of the data mining techniques. First, we analyzes failure data set of Navy from 2016 to 2018. And then We derive attributes that are associated with failure and to predict failure using feature selection method. We propose a method for prioritizing maintenance using the degree of association of attributes. This improves the efficiency and economics of command and control system maintenance.

A Proposal of Classification System on Cyber Attack for Damage Assessment of Cyber Warfare (사이버전 피해 평가를 위한 사이버 공격의 분류 체계 제시)

  • Park, Jinho;Kim, Yonghyun;Kim, Donghwa;Shin, Dongkyoo;Shin, Dongil
    • Annual Conference of KIPS
    • /
    • 2017.11a
    • /
    • pp.235-238
    • /
    • 2017
  • 최근에는 랜섬웨어의 일종인 '워너크라이' 등의 바이러스로 인한 피해도 기하급수적으로 증가하고, 그 수법도 사용자가 파일에 접근하면 감염되던 형태에서 인터넷에 접속되기만 하면 감염되는 형태로 진화하면서 사이버전에 사용되어질 수 있는 사이버 공격에 대응하는 방어 및 회복 방책에 대한 관심이 한층 더 증폭되고 있다. 하지만 일반적으로 방어, 회복 등의 대응 과정은 공격의 피해를 평가하여 결과로 산출된 피해 정도를 전제 조건으로 가지기 때문에 먼저 해킹 공격의 피해를 평가하여야 한다. 본 논문에서는 사이버전에서 사용되어질 수 있는 해킹 공격 및 위협의 피해를 공격의 종류별로 평가하기 위해, 피해 정도를 수치화할 수 있는지의 여부 등을 기준으로 하여 총 3가지 Interruption, Modification, Interception로 구성된 해킹 공격의 분류 체계를 제시한다.

Mathematical Algorithms for Two-Dimensional Positioning Based on GPS Pseudorange Technique

  • Ko, Kwang-Soob;Choi, Chang-Mook
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.5
    • /
    • pp.602-607
    • /
    • 2010
  • Recently, one has realized that the threedimensional positioning technique used in GPS can be effectively applied to the modern two-dimensional positioning. Such a technique might has applied to the twodimensional positioning in fields of the mobile communication, eLORAN and the GPS jamming/ electronic warfare system. In the paper, we have studied on algorithms for two-dimensional positioning based on GPS Pseudorange Technique. The main works and results are summarized below. First, the linearized state equation was mathematically derived based on GPS pseudorange technique. Second, the geometry model with respect to triangles formed using unit-vectors were proposed for investigation of land-based radio positioning. Finally, the corresponding mathematical formulations for DOP values and covariance matrix were designed for two-dimensional positioning.

Strategic Operation Method of Military Robot System for Future Warfare (미래 전투를 위한 군사 로봇 시스템의 전략적 운용 방법)

  • Lee, Jun-Pyo;Cho, Han-Jun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2012.01a
    • /
    • pp.169-170
    • /
    • 2012
  • 현대전에서는 인명 손실을 최소화하는 동시에 타 전투체계와의 연계를 통해 부여된 임무를 성공적으로 이끌어 내기 위해 무인로봇을 활발하게 이용하고 있다. 본 논문에서는 미래 전장에서 중심 역할을 수행할 것으로 기대되는 무인로봇과 통제장치의 기능을 제안한다. 통제장치는 디지털 지도를 기반으로 무인로봇의 위치를 전시하는 동시에 특정 위치로의 자율 이동 명령을 내리게 하는 인터페이스이다. 통제장치에서 무인로봇의 실시간 이동 간에 디지털 지도 기반 가시선(line of sight) 분석을 수행함으로써 통신 가능지역 식별 및 중계기를 통한 통신 가능 영역 식별을 용이하게 한다. 제안한 무인로봇과 통제장치를 통해 전장 환경에서 부여된 작전을 성공적으로 이끄는데 주된 역할을 수행할 것으로 기대한다.

  • PDF

Study of the Enhancement of Military Operation Supporting System (비상시 정부의 효율적인 군사작전 지원방안 연구)

  • Choi, Jae-Kyung
    • Journal of National Security and Military Science
    • /
    • s.5
    • /
    • pp.87-130
    • /
    • 2007
  • ROK and the United States finally reached accord on the controversial transition of Wartime Operational Control on February, 2007, and ROK Government needs to strengthen the role of supporting for the comprehensive threats of futuristic warfare. The crucial point of the supporting for Military Operation depends on the nation's mobilization capabilities. For the effective mobilization the following facets can be improved further. First of all, the organizational integrity of the mobilization network within the government can be bolstered along the vertical command chain. The process of mobilization must be improved and it is import to utilize the information system. On the other side the government plan to distribute timely the mobilized resources must be made up for the weak points and developed continuously. We can expect these points to be improved steadily with the execution of the National Defence Reform 2020.

  • PDF

Dynamic TDMA Protocol for Transmission of Tactical Information in Wireless Network (무선통신망에서 전술정보 전송을 위한 동적 시분할 다중접속프로토콜)

  • Park, Chang-Un;Kim, Tae-Kon;Lim, Man-Yeob;Lee, Youn-Jeong;Kim, Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.11B
    • /
    • pp.1640-1650
    • /
    • 2010
  • To prepare for the network centric warfare, Korea Joint Tactical Data Link System(KJTDLS) has been developed by the South Korean military recently and its development is divided into two phases: basic and complete ones. Due to the limited bandwidth and low transmission efficiency of the developing KJTDLS (basic), lots of problems could be occurred when the TDMA protocol in Link-16 is applied. In this paper, a new dynamic TDMA frame structure for KJTDLS(basic) is proposed and the performance of the proposed is evaluated through the implementation of simulation.