• Title/Summary/Keyword: warfare information system

Search Result 205, Processing Time 0.022 seconds

A Study on the Expansion and Improvement of the Tactical Data Link Processing Structure for Link-22 SNC Interface (Link-22 SNC 연동을 위한 전술데이터링크 처리 구조 확장 개선 연구)

  • Jung, Suk-Ho;Hwang, Jung-Eun;Lee, Youn-Jeong;Park, Ji-Hyeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.6
    • /
    • pp.1045-1052
    • /
    • 2021
  • Modern Warfare is transforming into a Network Centric Warfare(NCW) where surveillance systems, command control systems and strike systems are interconnected with advanced IT technologies to share battlefield situations. The South Korean military is using the various tactical data links(TDL) such as Link-K, Link-16, Link-11 and KVMF depending on each military's battlefield situation. Joint Tactical Data Link System(JTDLS) is a system thar shares tactical information in near-real time between army/navy/air joint forces and additionally establishes Link-22 in Link-K, Link-16 and KVMF. In this paper, we propose the Link-22 system structure, Link-22 message analysis and the interface structure between the tactical data link processor and Link-22 to apply Link-22 to the JTDLS.

Wide Area Augmentation System Estimating C1P1 DCB (C1P1 DCB를 추정하는 광역보강항법 시스템)

  • Bu, Sung-Chun;So, Hyoung-Min;Kim, Kap-Jin;Lee, Chul-Soo;Kim, Do-Kyoung;Ko, Yo-Han
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.5
    • /
    • pp.400-408
    • /
    • 2018
  • Wide area augmentation system is a system that generates and transmits correction and Integrity information for use in wide area. Typical system is SBAS. In the United States, it operates under the name WAAS, EGNOS in Europe, MSAS in Japan, SDCM in Russia, GAGAN in India. it is developing Korean SBAS which named KASS by 2022 in Korea. SBAS is a standard System that is operated as civil aviation service base and set as international standards by ICAO. So the correction data can only is used for civil SPS receiver. In this paper, we discuss C1P1 DCB estimation which need to use SPS correction service for PPS receiver. Then we analyze C1P1 DCB correction effect under standalone Satellite Navigation and method to use PPS receiver under SPS DGPS. Finally we organize wide area augmentation system for PPS receiver and analysis performance.

An Identification Method of Radar Signals using Parallel Processor (병렬프로세서를 활용한 레이더 신호의 식별)

  • Kim, Gwan-Tae;Ju, Young-Kwan;Park, Sang-Hwan;Jeon, Joongnam
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.4
    • /
    • pp.75-80
    • /
    • 2017
  • ES (Electronic Warfare Support System) collects radar signals, and analyzes the signals about frequency, pulse width, PRI (Pulse Repetition Interval), and etc. and then ES compares analyzed result with known radar signals to identify them. But there are two disadvantage. One is that use of known radar signals is in comparing step only. The other is that calculating PRI needs many operations. In this paper proposes a parallel reference correlation algorithm that uses GPGPU (General Purpose Graphics Processing Units) and can identify what signals are in received radar signals without calculating PRI.

Artificial Intelligence based Threat Assessment Study of Uncertain Ground Targets (불확실 지상 표적의 인공지능 기반 위협도 평가 연구)

  • Jin, Seung-Hyeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.305-313
    • /
    • 2021
  • The upcoming warfare will be network-centric warfare with the acquiring and sharing of information on the battlefield through the connection of the entire weapon system. Therefore, the amount of information generated increases, but the technology of evaluating the information is insufficient. Threat assessment is a technology that supports a quick decision, but the information has many uncertainties and is difficult to apply to an advanced battlefield. This paper proposes a threat assessment based on artificial intelligence while removing the target uncertainty. The artificial intelligence system used was a fuzzy inference system and a multi-layer perceptron. The target was classified by inputting the unique characteristics of the target into the fuzzy inference system, and the classified target information was input into the multi-layer perceptron to calculate the appropriate threat value. The validity of the proposed technique was verified with the threat value calculated by inputting the uncertain target to the trained artificial neural network.

Transmission Modeling and Verification for the Inverse Estimation of Electronic Warfare Threats (전자전 위협체 역추적을 위한 송수신 모델링 및 검증)

  • Park, So Ryoung;Jeong, Hoe Chang;Kwon, Jae Wan;Noh, Sanguk
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.4
    • /
    • pp.112-123
    • /
    • 2017
  • Research for the inverse estimation of RF threats and the efficient electronic attack based on the parameters of the electronic information has been active in the electronic warfare (EW) situations. In this paper, an EW transmission simulator is constructed from the modeling of radar threats, EW receivers, and propagation environments with the collected electronic information in order to verify the performance of the inverse estimation algorithm in various and practical EW situations. In simulation results, we show that the range tracking error and angle tracking error are produced within ten meters and one degree, respectively. And also, we show that the changing relations between the angle tracking error and the parameters of the monopulse angle tracking radar such as the beamwidth and squint angle in simulation results correspond with those in the theoretical modeling. Accordingly, the constructed EW simulator can be used to observe the modifying characteristics of the electronic information in transmission environments, and then, to evaluate the performance of the inverse estimation system in various EW situations.

A Study on the assessment of force improvement effectiveness of KNTDS (KNTDS의 전투력 상승효과 측정에 관한 연구)

  • 이수열;이재영
    • Journal of the military operations research society of Korea
    • /
    • v.27 no.2
    • /
    • pp.56-75
    • /
    • 2001
  • Most O4I Systems are considered as one of the major system in future Information Warfare. However, it is difficult to measure the effectiveness of force improvement when C4I System is used with other weapon systems, quantitatively. In this Paper, we propose a quantitative method to evaluate the force improvement effectiveness of KNTDS(Korea Naval Tactical Data System). This method utilized the Lanchester's equations and its applications. We also showed a numerical example based on a given scenario in a sea battle and the ASP(Analytic Hierarchy Process) Method is applied to verify its results.

  • PDF

The direction of application of the RMF-based risk management system considering interoperability (상호운용성을 고려한 RMF 기반의 위험관리체계 적용 방향)

  • Kwon, Hyuk-Jin;Kim, Sung-Tae;Joo, Ye-na
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.83-89
    • /
    • 2021
  • The RMF (Cyber Security Risk Management Framework) is a more strengthened U.S. defense cybersecurity framework that is currently used throughout the U.S. federal government beyond the defense sector. In the past decade, the proportion of cyber warfare in non-regular warfare encountered by the United States, especially cyberattacks caused by China and North Korea, has been increasing. In the end, the U.S. is newly establishing an RMF system to prepare a more strengthened cybersecurity policy at the pan-government level, and the U.S. Department of Defense aims to expand the U.S. defense RMF evaluation policy beyond the federal government level. The South Korean military has already applied RMF at the request of the U.S. that notified the policy to apply RMF when obtaining F-35A. The application of RMF by the Korean military is no longer inevitable. Now is the time for the Korean military to seriously think about what to prepare for the early establishment of a successful Korean RMF system.

Development Direction of Manned and Unmanned Complex Combat System to Respond to the Future Battlefield: Focusing on ICT (미래 전장 대응을 위한 유무인 복합전투체계 발전방향: ICT를 중심으로)

  • Bal Jeong;Kyungsook Lee;Bonjin Koo
    • Journal of Information Technology Applications and Management
    • /
    • v.31 no.4
    • /
    • pp.47-61
    • /
    • 2024
  • A manned and unmanned complex combat system refers to a combat system that performs various missions by operating manned and unmanned aircraft together. The combat system is rapidly becoming more advanced due to recent remarkable developments in information and communication technologies(ICT), including AI and 5G, and major countries are actively using it in actual battlefields. Furthermore, the importance of this combat system is increasing and it is emerging as the core of future warfare. Accordingly, this study analyzed the concept of the manned and unmanned complex combat system and the current status of its integration with ICT, presented an operational concept utilizing it, and then analyzed the actual current status of related combat systems at home and abroad. Lastly, five suggestions were presented for the development of domestic manned and unmanned complex combat systems.

Modeling of Received Radar Signals for Scan Pattern Analysis (스캔패턴 분석을 위한 레이더 수신신호 모델링)

  • Kim, Yong-Hee;Kim, Wan-Jin;Song, Kyu-Ha;Lee, Dong-Won;Kim, Hyoung-Nam
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.4
    • /
    • pp.73-85
    • /
    • 2010
  • In dense electronic warfare signal environments, the conventional radar identification methods based on the basic parameters such as frequency, pulse width, and pulse repetition interval are confronted by the problem of identification ambiguity. To overcome this critical problem, a new approach introducing scan pattern of radars has been presented. Researches on new identification methods, however, suffer from a practical problem that it is not easy to secure the many radar signals including various scan pattern information and operation parameters. This paper presents a modeling method of radar signals with which we can generate radar signals including various scan pattern types according to the parameters determining the variation pattern of received signal strength. In addition, with the radar signals generated by the proposed model we analyze their characteristics according to the location of an electronic warfare support (ES) system.

A De-interleaving Method of Frequency Agility Radar Signals in Comparison with PRI's of radars (PRI 비교를 통한 주파수 급속변경 레이더 신호분리)

  • Lim, Joong-Soo;Hong, Kyung-Ho;Lee, Du-Kyung;Shin, Dong-Hoon;Kim, Yong-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1832-1838
    • /
    • 2009
  • In this paper, we present new signal de-interleaving method for the frequency agility radar in which the carrier frequency is changed irregularly. Generally radar use a fixed carrier frequency, and it is easy for electronic warfare system to de-interleave the radar signal with respect to the frequency, pulse width(PW), and direction of signal arriving(DOA). In frequency agility radar, it is difficult to de-interleave the radar signals according to the carrier frequency because the frequency is changed irregularly. We suggest a good de-interleaving method to identify the frequency agility radar signals in comparison with PRI's of radars. First we calculate pulse repeat Interval(PRI) of radar in linked-list and queue structure and de-interleave the radar signals with PRI, PW, and DOA, then identify the frequency agility radar. When we use the proposed algorism to the frequency agility radar, we have a good de-interleaving results with electronic warfare systems.