• Title/Summary/Keyword: warfare information system

Search Result 205, Processing Time 0.021 seconds

On Software Reliability Engineering Process for Weapon Systems (무기체계를 위한 소프트웨어의 신뢰성 공학 프로세스)

  • Kim, Ghi-Back;Lee, Jae-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.4B
    • /
    • pp.332-345
    • /
    • 2011
  • As weapon systems are evolving into more advanced and complex ones, the role of the software is becoming heavily significant in their developments. Particularly in the war field of today as represented by the network centric warfare(NCW), the reliability of weapon systems is definitely crucial. In this context, it is inevitable to develop software reliably enough to make the weapon systems operate robustly in the combat field. The reliability engineering activities performed to develop software in the domestic area seem to be limited to the software reliability estimations for some projects. To ensure that the target reliability of software be maintained through the system's development period, a more systematic approach to performing software reliability engineering activities are necessary from the beginning of the development period. In this paper, we consider the software reliability in terms of the development of a weapon system as a whole. Thus, from the systems engineering point of view, we analyze the models and methods that are related to software reliability and a variety of associated activities. As a result, a process is developed, which can be called the software reliability engineering process for weapon systems (SREP-WS), The developed SREP-WS can be used in the development of a weapon system to meet a target reliability throughout its life-cycle. Based on the SREP-WS, the software reliability could also be managed quantitatively.

Structure of Data Fusion and Nonlinear Statistical Track Data Fusion in Cooperative Engagement Capability (협동교전능력을 위한 자료융합 구조와 비선형 통계적 트랙 융합 기법)

  • Jung, Hyoyoung;Byun, Jaeuk;Lee, Saewoom;Kim, Gi-Sung;Kim, Kiseon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.1
    • /
    • pp.17-27
    • /
    • 2014
  • As the importance of Cooperative Engagement Capability and network-centric warfare has been dramatically increasing, it is necessary to develop distributed tracking systems. Under the development of distributed tracking systems, it requires tracking filters and data fusion theory for nonlinear systems. Therefore, in this paper, the problem of nonlinear track fusion, which is suitable for distributed networks, is formulated, four algorithms to solve the problem of nonlinear track fusion are introduced, and performance of introduced algorithms are analyzed. It is a main problem of nonlinear track fusion that cross-covarinaces among multiple platforms are unknown. Thus, in order to solve the problem, two techniques are introduced; a simplification technique and a approximation technique. The simplification technique that help to ignore cross-covariances includes two algorithms, i.e. the sample mean algorithm and the Millman formula algorithm, and the approximation technique to obtain approximated cross-covariances utilizes two approaches, by using analytical linearization and statistical linearization based on the sigma point approach. In simulations, BCS fusion is the most efficient scheme because it reduces RMSE by approximating cross-covariances with low complexity.

The Plans for Core Personnel Management to Prevent Industrial Technology Leakage (산업기술 유출방지를 위한 핵심인력 관리방안에 관한 연구)

  • Kim, Soon-Seok;Shin, Jae-Chul
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.109-130
    • /
    • 2010
  • As many countries in the world including the Republic of Korea have used all their national resources in the accelerating economic information warfare, illegal leakage of industrial technologies and information has increased rapidly. The costs required for damage prevention from 2007 to 2008 are estimated at approximately KRW 180 trillion which is expected to increase gradually in future. Because the tricks of leaking key technologies are also getting increasingly systematized, sophisticated and bigger, e.g., simple theft at the individual level or the conspiracy of all the staff taking part in the research activities, we should pay special attention to technology security in addition to technology development. While there are several factors affecting such the brain drain, they usually include personal, social, political and cultural factors, for instance, very heavy educational expenditure of children compared to relatively low pay, the speedy labor market circulation for experienced personnel, or political restrictions on researches. In this context, as part of efforts made to prevent the outflow of core personnel, individual companies and research institutes should establish systematically appropriate core personnel management systems for their own organizational or business goals and principles which are intented to ensure to give better treatment and benefit to core personnel and to exercise closer supervision over them. Furthermore, the conventional personnel management system should be radically and flexibly improved in the manner of encouraging the core personnel returning to the organization to combine their external experiences with practices, instead of penalizing them. At the same time, it is necessary to train and educate core personnel through mutual collaboration and in-house training facilities as well as external academic programs operated jointly at the level of the industry. Finally, as the issues concerning the outflow of core personnel are not just problems of relevant companies and other advanced countries have devoted their best efforts to secure their own key technologies at the national level, it is urgent for the industry and the competent authorities to cooperate closely.

  • PDF

Modeling and Analysis of Cooperative Engagements with Manned-Unmanned Ground Combat Systems (무인 지상 전투 체계의 협동 교전 모델링 및 분석)

  • Han, Sang Woo;Pyun, Jai Jeong
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.2
    • /
    • pp.105-117
    • /
    • 2020
  • Analysis of combat effectiveness is required to consider the concept of tactical cooperative engagement between manned-unmanned weapon systems, in order to predict the required operational capabilities of future weapon systems that meets the concept of 'effect-based synchronized operations.' However, analytical methods such as mathematical and statistical models make it difficult to analyze the effects of complex systems under nonlinear warfare. In this paper, we propose a combat simulation model that can simulate the concept of cooperative engagement between manned-unmanned combat entities based on wireless communications. First, we model unmanned combat entities, e.g., unmanned ground vehicles and drones, and manned combat entities, e.g., combatants and artillery, considering the capabilities required by the future ground system. We also simulate tactical behavior in which all entities perform their mission while sharing battlefield situation information through wireless communications. Finally we explore the feasibility of the proposed model by analyzing combat effectiveness such as target acquisition rate, remote control success rate, reconnaissance lead time, survival rate, and enemy's loss rate under a small-unit armor reconnaissance scenario. The proposed model is expected to be used in war-game combat experiments as well as analysis of the effects of manned-unmanned ground weapons.

MDP(Markov Decision Process) Model for Prediction of Survivor Behavior based on Topographic Information (지형정보 기반 조난자 행동예측을 위한 마코프 의사결정과정 모형)

  • Jinho Son;Suhwan Kim
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.2
    • /
    • pp.101-114
    • /
    • 2023
  • In the wartime, aircraft carrying out a mission to strike the enemy deep in the depth are exposed to the risk of being shoot down. As a key combat force in mordern warfare, it takes a lot of time, effot and national budget to train military flight personnel who operate high-tech weapon systems. Therefore, this study studied the path problem of predicting the route of emergency escape from enemy territory to the target point to avoid obstacles, and through this, the possibility of safe recovery of emergency escape military flight personnel was increased. based problem, transforming the problem into a TSP, VRP, and Dijkstra algorithm, and approaching it with an optimization technique. However, if this problem is approached in a network problem, it is difficult to reflect the dynamic factors and uncertainties of the battlefield environment that military flight personnel in distress will face. So, MDP suitable for modeling dynamic environments was applied and studied. In addition, GIS was used to obtain topographic information data, and in the process of designing the reward structure of MDP, topographic information was reflected in more detail so that the model could be more realistic than previous studies. In this study, value iteration algorithms and deterministic methods were used to derive a path that allows the military flight personnel in distress to move to the shortest distance while making the most of the topographical advantages. In addition, it was intended to add the reality of the model by adding actual topographic information and obstacles that the military flight personnel in distress can meet in the process of escape and escape. Through this, it was possible to predict through which route the military flight personnel would escape and escape in the actual situation. The model presented in this study can be applied to various operational situations through redesign of the reward structure. In actual situations, decision support based on scientific techniques that reflect various factors in predicting the escape route of the military flight personnel in distress and conducting combat search and rescue operations will be possible.