633 results on '"Network-centric warfare"'
Search Results
52. Doing More of the Right High-End Effects-Based Things Without More: From Basics to Families of System of Systems Capabilities.
- Author
-
McKee, Susana V. and Tutty, Malcolm G.
- Subjects
SYSTEM of systems ,MILITARY engineering ,MILITARY readiness ,INFORMATION society - Abstract
The contemporary wisdom is that on the battlefields and spaces of the so-called "future," our soldiers, sailors, and airmen will be presented with ever-increasing voluminous and often conflicting data from multiple network-capable systems and sources in an increasingly small world and will face "cognition overload." In this article. we examine the need to shift to a Joint system of systems (SoS) test methodology in the U.S. Air Force, the broader U.S. Department of Defense (DoD), and the Five Eyes Coalition nations of Australia, Canada, New Zealand, the U.K., and the U.S. Further, we examine what these nations are broadly doing, to determine where it is best to spend efforts in a resource-constrained environment to ensure our Joint task forces can achieve the campaign objectives. We discuss the impacts on the test community at large, with emphasis on capability readiness in particular. Beginning with the fundamental requirements for testing, we present the realities of the impact of the Information Age on those requirements. The current progress in developing the capability management framework, acquisition business model, and technical capabilities to facilitate SoS test is reviewed. Surprisingly, there is no test and evaluation or experimentation standard for today's armament systems or SoS without considering tomorrow's network-enabled, complex, adaptive capabilities employing kinetic and non-kinetic effects in families of SoS (FoS). We then discuss what the Coalition Five Eyes nations are doing with distribution simulation in the test and training worlds and the way forward using a North Atlantic Treaty Organization (NATO) Joint fires application of armament in an integrated mission environment CODe of best practice for experimentation (JAIME CODEx) employing both kinetic and non-kinetic effects. A way ahead that will enable the Five Eyes nations to do more of the right high-end effects-based things by leveraging training and testing capabilities through integrated training, test, and experimentation opportunities is also proposed. [ABSTRACT FROM AUTHOR]
- Published
- 2012
53. Managing Electronic Warfare Air Force Units in Present-day Conditions.
- Author
-
Shubin, A. V.
- Subjects
- *
MILITARY electronics , *WEAPONS , *MILITARY airplanes , *COMBAT , *NETWORK-centric operations (Military science) , *MILITARY science - Abstract
The article discusses how the use of electronic warfare (EW) forces and weapons can reduce the losses of Air Force aircraft taking part in combat missions. Ensuring the safety of Air Force aircraft can reportedly be done by competently and opportunely employing EW units equipped with modern group protection weapons. The author discusses how they can be enhanced by improving the system of controlling them during air combat in network-centric warfare conditions.
- Published
- 2012
54. Asymmetric Response in Network-Centric Warfare.
- Author
-
Dulnev, P. A., Kovalyov, V. G., and Ilyin, L. N.
- Subjects
- *
NETWORK-centric operations (Military science) , *MILITARY science , *WAR , *COMBAT , *COMMANDO troops , *INFORMATION resources - Abstract
The article discusses the network-centric warfare whose principal objective is effects-based operations. It describes network-centric warfare as a war where the combat strength of a troop grouping is increased because of the creation of an information-communication network that links information sources, control bodies and means of destruction. It suggests the manual approach for control at the tactical level until parity with the enemy in terms of network-centric technologies is achieved.
- Published
- 2011
55. LOGIKAI HADVISELÉS - KRITIKUS PONTOK HARCA.
- Author
-
István, Kun, Gyula, Fáy, and István, Bukovics
- Subjects
NETWORK-centric operations (Military science) ,INFORMATION warfare ,MILITARY maneuvers ,MILITARY tactics ,COMPUTER software - Abstract
Copyright of Military Engineer / Hadmérnök is the property of National University of Public Service and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2011
56. Operational Testing: From Basics to System-of- Systems Capabilities.
- Author
-
Kometer, Michael W., Burkhart, Kent, McKee, Susana V., and Polk, Dwight W.
- Subjects
TESTING ,METHODOLOGY ,OPERATIONS research ,BUSINESS models - Abstract
This article examines the need to develop and implement a System of Systems (SoS) operational test methodology and supporting infrastructure in the US. Air Force (USAF). It discusses impacts on the acquisition and decision authority communities at large, with emphasis on operational testing in particular. Beginning with the fundamental requirements for testing, the article presents the realities of the effect of the Information Age on those requirements. The current progress in developing the acquisition business model and the technical capabilities to facilitate SoS test are reviewed. The authors then provide a plausible way ahead that will leverage training and testing capabilities through integrated venues. [ABSTRACT FROM AUTHOR]
- Published
- 2011
57. Articulation, antagonism, and intercalation in Western military imaginaries.
- Author
-
Lawson, Sean
- Subjects
- *
WAR , *ARTICULATION (Speech) , *MILITARY modernization (Equipment) , *MILITARY planning , *MILITARY administration - Abstract
This article provides a discursive grounding for understanding the construction of military imaginaries by adding the concepts of ‘antagonism’ and ‘intercalation’ to articulation theory. By examining the cases of industrial-mechanized warfare theory and network-centric warfare theory through the lens of this expanded articulation theory, it is argued that military imaginaries often serve to define and link conceptions of science, technology, society, economy, war, and military organization, thought, and practice into a unified image of the larger security environment — that is, the military imaginary. Military imaginaries often share a common narrative structure that privileges co-periodized change among the elements of the articulation, resulting in the phenomenon of ‘antagonism’ serving as a generic threat used to justify military modernization and even the use of force. [ABSTRACT FROM PUBLISHER]
- Published
- 2011
- Full Text
- View/download PDF
58. Network Foundation for Command and Control (C2) Systems: Literature Review
- Author
-
Daniel A. Eisenberg, Alexander A. Ganin, Maksim Kitsak, Igor Linkov, and David L. Alderson
- Subjects
Knowledge management ,General Computer Science ,command and control ,Process (engineering) ,Computer science ,Knowledge engineering ,0211 other engineering and technologies ,multilayer networks ,02 engineering and technology ,system architecture ,network science ,Command and control ,0501 psychology and cognitive sciences ,General Materials Science ,050107 human factors ,021103 operations research ,business.industry ,05 social sciences ,General Engineering ,Action (philosophy) ,Task analysis ,Systems design ,Network-centric warfare ,Agility ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,lcsh:TK1-9971 - Abstract
We review the command and control (C2) literature to develop a comprehensive understanding of C2 systems and identify network evaluation methods. C2 is the recursive process of sharing the intent of decision-makers across organizations, turning intent into action, monitoring success, and adjusting goals to meet changing needs. Although substantial C2 research exists, the literature remains isolated by application context, and advances are rarely integrated. Our review identifies research in military, emergency response, civilian infrastructure, and management literature that inform the analysis of C2 systems. We organize C2 research with theory from Network Centric Warfare and complex systems to integrate knowledge across broad disciplines and applications. The review organizes studies across four interrelated domains (i.e., physical, information, social, and cognitive), presents system design and evaluation constraints across sub-systems, and offers practical considerations for advancing C2 theory. The review also catalogues network evaluation methods used to study C2 agility, i.e., the ability to successfully effect, cope with, and/or exploit changes in circumstances. Together, this paper supports the organizing, integration, and advancement of knowledge for the influential, yet broad research subject of C2.
- Published
- 2018
59. Military History and Fourth Generation Warfare.
- Author
-
Junio, TimothyJ.
- Subjects
- *
FOURTH generation warfare , *MILITARY history , *MILITARY policy , *MILITARY science , *HISTORICAL research methods , *HISTORIOGRAPHY - Abstract
This article examines 'Fourth Generation Warfare' (4GW), a theory of how warfare has evolved and is evolving, from the perspective of military history. The author makes three primary claims: 4GW advocates' boxing of history into 'generations' is logically and temporally inconsistent; 4GW authors misuse history by selectively choosing case studies and applying them out of context; and other arguments regarding the current and future character of warfare are more convincing. The author concludes that scholars and policymakers would be well served by considering elements of 4GW, particularly its analysis of insurgency, but that the concept should be subsumed by a broader US grand strategy that retains a strong focus on preparation for conventional warfare. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
60. ‘All hazards approach’ to disaster management: the role of information and knowledge management, Boyd's OODA Loop, and network-centricity.
- Author
-
von Lubitz, Dag K.J.E., Beakley, James E., and Patricelli, Frédéric
- Subjects
- *
NATURAL disasters , *KNOWLEDGE management , *INFORMATION technology , *DECISION making , *CRISIS management , *LEADERSHIP , *NETCENTRIC computing , *MANAGEMENT , *MANAGEMENT information systems - Abstract
The ever-increasing complexity of disasters demands utilisation of knowledge that exists outside domains traditionally drawn upon in disaster management. To be operationally useful, such knowledge must he extracted, combined with information generated by the disaster itself, and transformed into actionable knowledge. The process, though, is hampered by existing, business-oriented approaches to knowledge management, by technical issues related to access to relevant, multi-domain information/knowledge, and by executive decision-making processes based predominantly on historical knowledge. Consequently, as shown by many recent incidents, the management of large-scale (mega) disasters is often inefficient and exceedingly costly. This paper demonstrates that the integration of modified information and knowledge management into the concepts of network-centric operations and network-enabled capabilities, and the employment of Boyd's OODA (Observe, Orient, Decide, and Act) Loop-based decision-making in unpredictable and dynamically changing environments, may address some of these problems. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
61. P-8A "Poseidon" Collaborative Simulation and Stimulation for Electromagnetic Environmental Effects Test & Evaluation.
- Author
-
Achtellik, Paul
- Subjects
TECHNOLOGICAL innovations ,ELECTROMAGNETIC fields ,MILITARY aeronautics ,SYSTEMS engineering ,SIMULATION methods & models - Abstract
Over the past several decades, technological advances have provided the Naval Air Systems Command (NAVAIR) with exciting opportunities while creating significant challenges to those who design, test, and operate the complex mission systems found on today's war-fighting aircraft. The responses to these challenges are well underway and began with innovative planning and cost-wise construction of various next-generation facilities, conceptual planning of integrated and extensible network infrastructures, and the insistence on collaborative engineering across all phases of the acquisition life cycle. Today, the challenge continues and, in many aspects, has become even more difficult, stretching our fiscal, technological, and personnel resources to their limits. This article addresses one of the more difficult aspects of today's challenges: Conducting Ground-Based Full Spectrum Test & Evaluation on Next-Generation Systems. [ABSTRACT FROM AUTHOR]
- Published
- 2008
62. Security in Mobile Ad Hoc Networks.
- Author
-
Carvalho, M.
- Abstract
One of the most critical roles security researchers have is keeping up with new technologies and considering the security implications that go along with them-essentially, ensuring that security is "baked in" to new ideas from the earliest possible moment. Because of this, researchers have had significant interest in the field of mobile ad hoc networks (Manets). Such networks are frequently viewed as a key communications technology enabler for network-centric warfare and disaster relief operations, and as the technology matures, Manets are increasingly reaching many other applications in areas such as intelligent transportation systems and fault-tolerant mobile sensor grids. [ABSTRACT FROM PUBLISHER]
- Published
- 2008
- Full Text
- View/download PDF
63. A comparative investigation of acknowledgment mechanisms for data transport in space internet.
- Author
-
Ruhai Wang and Guizani, S.
- Abstract
As the Internet is changing the world dramatically, an initiative is being proposed within NASA and in the military to expand the Internet into space and for network-centric warfare using network protocols. An end-to-end effective data transport protocol is critical to the reliable transfer of information in space and for a battlefield environment. Consequently, a reliable and efficient acknowledgment mechanism is required to accommodate these unreliable communication conditions. In this article we conduct a comparative investigation of existing data transport acknowledgment mechanisms for possible adoption in the unreliable environment of space or a similarly stressed communication environment. We also introduce the selective negative acknowledgment (SNACK), which is designed as a reliable retransmission mechanism for space and stressed tactical communications, followed by a brief performance evaluation of the effectiveness of SNACK compared to the standard SACK mechanism. [ABSTRACT FROM PUBLISHER]
- Published
- 2008
- Full Text
- View/download PDF
64. Patch Models and Their Applications to Multivehicle Command and Control.
- Author
-
Rao, Venkatesh G. and D'Andrea, Raffaello
- Subjects
- *
COMMAND & control systems , *ARTIFICIAL intelligence , *MOTOR vehicle dynamics , *INFORMATION networks , *MILITARY communications - Abstract
We introduce patch models, a computational modeling formalism for multivehicle combat domains, based on spatiotemporal abstraction methods developed in the computer science community. The framework yields models that are expressive enough to accommodate nontrivial controlled vehicle dynamics while being within the representational capabilities of common artificial intelligence techniques used in the construction of autonomous systems. The framework allows several key design requirements of next-generation network-centric command and control systems, such as maintenance of shared situation awareness, to be achieved. Major features include support for multiple situation models at each decision node and rapid mission plan adaptation. We describe the formal specification of patch models and our prototype implementation, i.e., Patchworks. The capabilities of patch models are validated through a combat mission simulation in Patchworks, which involves two defending teams protecting a camp from an enemy attacking team. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
65. DEVELOPMENT FEATURES AND IMPROVED CLASSIFICATION OF SITUATIONAL SURVEILLANCE AND ATTACK SYSTEMS
- Subjects
lcsh:Industrial safety. Industrial accident prevention ,classification ,network-centric warfare ,lcsh:T55-55.3 ,situational surveillance and attack system - Abstract
The analysis of existing and future surveillance and attack systems (SAS) is carried out. An improved classification of SAS is proposed. The concept of situational SAS is introduced. The tendencies of development are highlighted and the problematic issues on creation of SAS are determined.
- Published
- 2017
66. Fusion of disparate identity estimates for shared situation awareness in a network-centric environment
- Author
-
Oxenham, Martin, Challa, Subhash, and Morelande, Mark
- Subjects
- *
DEMPSTER-Shafer theory , *PROBABILITY theory , *ALGORITHMS , *BAYESIAN analysis - Abstract
Abstract: Network-centric warfare (NCW) and the interoperability of joint and coalition forces are among the future warfighting concepts identified by defence. To realise the goals of interoperability and shared situation awareness for NCW, it has long been acknowledged that data fusion is a key enabling technology. Typically, however, distributed data fusion, which is relevant to NCW, and the fusion of disparate types of uncertain data, which is relevant to interoperability, have been investigated separately. Ideally, for shared situation awareness, the system should be capable of performing both aspects of data fusion. In this paper, these facets of data fusion are considered in unison for the automatic target identification problem. In particular, novel Bayesian and generalised Bayesian algorithms are formulated for fusing estimates of target identity generated by local heterogeneous data fusion systems in a network, each of which expresses target identity estimates as either finite probability distributions or Dempster–Shafer belief functions. An example drawn from the literature is used to illustrate the algorithms and their relative performances are assessed in the context of the example to identify issues of possible relevance to distributed target identification in a more general setting. (© Commonwealth of Australia 2005.) [Copyright &y& Elsevier]
- Published
- 2006
- Full Text
- View/download PDF
67. The more you know, the less you understand: The problem with information warfare.
- Author
-
Betz, DavidJ.
- Subjects
- *
INFORMATION warfare , *REVOLUTIONS , *MILITARY science - Abstract
Since the 1991 Gulf War military analysts have talked of a Revolution in Military Affairs (RMA), the idea that just as the ‘Information Era’ has transformed how societies live and work it has also transformed the way that they fight. Advocates of the two derivative concepts of the RMA, Information Warfare (IW) and Network-Centric Warfare (NCW), are distinguished from each other in that the former sees information as a potential weapon in and of itself whereas the latter seeks to exploit data to make regular weapons more effective. But both make exaggerated and misleading claims because the experience of recent campaigns in Afghanistan and Iraq suggests that both IW and NCW are extremely tricky to implement in practice. Moreover, ‘information’ is a double-edged sword which benefits, strengthens, and enhances the operational effectiveness of non-conventional forces as much as or more than it does conventional forces. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
68. Revolution in Military Affairs and Outer Space
- Author
-
Jakub Fučík
- Subjects
Engineering ,Space technology ,business.industry ,media_common.quotation_subject ,Outer space ,Revolution in Military Affairs ,Context (language use) ,010402 general chemistry ,01 natural sciences ,0104 chemical sciences ,Military policy ,State (polity) ,Aeronautics ,Political economy ,Network-centric warfare ,China ,business ,media_common - Abstract
Concept of the Revolution in Military Affairs (RMA) analyses and describes processes of major changes in military-strategic dimension, which provide possibilities especially for states to enhance their military power and establish superiority over their opponents. Contemporary, development of new (weapon) technologies (e.g. precision-guided munitions, unmanned aerial vehicles) and doctrines (e.g. network centric warfare, system-of-systems) represents such opportunity. Outer space in this context represents relatively new dimension of warfare with increasing importance for strategical thinking of all main state actors (e.g. China, Russia, and the U.S.). This paper deals with relation between RMA and outer space. The aim of this paper is to analyses how outer space and space technologies influence contemporary/future RMA and vice versa.
- Published
- 2017
- Full Text
- View/download PDF
69. The Millenials’ war: dilemmas of network dependency in today’s military
- Author
-
Matthew Crosston
- Subjects
Guard (information security) ,National security ,Military science ,business.industry ,media_common.quotation_subject ,Geography, Planning and Development ,Doctrine ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Revolution in Military Affairs ,Security studies ,Computer security ,computer.software_genre ,Cyberwarfare ,Political science ,Political economy ,Political Science and International Relations ,Network-centric warfare ,business ,computer ,media_common - Abstract
This work is about how the United States military has become dependent on networked technology. As arguably the largest contributor to national security, it has become so dependent that its chief doctrine integrates networked technology into nearly every specialty, with particularly intense focus on Network Centric Warfare. As the military’s old guard is replaced by the highly technical Millenial Generation, there is cause to pause when assuming this techno-acuity brings nothing but advantage and success. Vulnerabilities stemming from such extensive dependence offer opportunities for exploitation that have not gone unnoticed. The first step to moving forward from this point is to fully understand the extent to which the military has become dependent on computer networks. It might be the Millenials’ war today, but it would be quite unwise for the United States military to think about it and fight it in a purely Millenial way.
- Published
- 2017
- Full Text
- View/download PDF
70. Research Report
- Author
-
Erz, Hendrik
- Subjects
Machine Learning ,Data Analysis ,Network-Centric Warfare ,Cybersecurity ,Artificial Intelligence - Published
- 2020
- Full Text
- View/download PDF
71. Militärische Cyber-Operationen: Nutzen, Limitierungen und Lehren für Deutschland
- Author
-
Schulze, Matthias, Stiftung Wissenschaft Und Politik, and Stiftung Wissenschaft und Politik -SWP- Deutsches Institut für Internationale Politik und Sicherheit
- Subjects
Verteidigungspolitik ,Politikwissenschaft ,Friedens- und Konfliktforschung, Sicherheitspolitik ,Informationstechnologie ,Peace and Conflict Research, International Conflicts, Security Policy ,Federal Republic of Germany ,Cyberspace ,Militärische Operationen ,Network-Centric Warfare ,Hybride Kriegführung ,Infomationskriegführung ,Kritische Infrastrukturen ,Verwundbarkeit von Zielen ,Bundesrepublik Deutschland ,Sicherheitspolitik ,communication technology ,security policy ,information technology ,Kriegsführung ,ddc:320 ,Kommunikationstechnologie ,warfare ,defense policy ,Political science - Abstract
Offensive Militärische Cyber-Operationen (OMCO) sind - anders als in populären Darstellungen oft behauptet - keine Allzweckwaffe. Sie unterliegen zahlreichen strategischen, operativen und taktischen Begrenzungen, die sie für bestimmte Einsatzszenarien ungeeignet erscheinen lassen. Deutschland sollte auch in Zukunft daran festhalten, keine strategischen OMCO zu planen und zu entwickeln. Der strategische Einsatz von OMCO ist operativ zu aufwendig, extrem risikobehaftet und zudem der globalen Sicherheit des Cyber- und Informationsraums unzuträglich. Sehr limitierte und überschaubare Cyber-Operationen zur sequenziellen Begleitung von Kampfeinsätzen können bei hochtechnisierten Gegnern sinnvoll sein. Der größte Nutzen von OMCO liegt in ihrer Spionagefunktion und weniger in disruptiven, zerstörerischen militärischen Effekten. Für das typische Einsatzprofil der Bundeswehr, nämlich Konfliktmanagement in wenig digitalisierten Regionen mit schwacher Staatlichkeit, dürften militärische Cyber-Operationen nur in wenigen Fällen einen militärischen Nutzen haben. Um effektiv zu sein, müssen OMCO auf Ziele exakt zugeschnitten sein. Bei einem OMCO-Einsatz zur Landesverteidigung müssen daher schon im Vorfeld und noch zu Friedenszeiten Zielinformationen beim potentiellen Gegner erhoben worden sein - mittels offensiver Cyber-Spionage in fremden Netzen. Diese Präemptionslogik erzeugt aber ein Sicherheitsdilemma bei potentiellen Gegnern und kann destabilisierend wirken. (Autorenreferat)
- Published
- 2020
72. FPGA Implementation of Real-Time Soldier Activity Detection based on Neural Network Classifier in Smart Military Suit
- Author
-
Varun Tiwari, Avinash G. Keskar, Nikhil B. Gaikwad, and N. C. Shivaprakash
- Subjects
Test design ,Artificial neural network ,Backup ,business.industry ,Computer science ,Default gateway ,Multilayer perceptron ,Embedded system ,Control unit ,Network-centric warfare ,Field-programmable gate array ,business - Abstract
The wearable technology carries sufficient potential to incorporate smartness into working of the military workforces like the Military Control Unit, Medical Responders, Backup Unit and War Strategist. The proposed work focuses on real-time soldier activity detection, which is essential for the operation of the smart military suit. The customized Artificial Neural Network (ANN) IP core is developed for the soldier activity classification, which is an integral component of suit gateway design. The multilayer perceptron (7-5-4) classification algorithm is implemented on the low-cost (99$) FPGA evaluation platform by using Xilinx vivado and system generator development tools. The training (70%) and testing (30%) of this ANN design is performed on the UCI human activity dataset. The LabVIEW GUI and IP test design completed the hardware testing of this IP. The presented ANN IP is able to achieve 98.5% classification accuracy by utilizing minimal FPGA (Artix-7 xc7a35t) resources. The implemented ANN design requires only 285 nanoseconds for a classification and consumes 103 milliwatts of dynamic power. The system’s accuracy at different development levels is also studied in this work.
- Published
- 2019
- Full Text
- View/download PDF
73. Replication Strategies of Mobile Agents for Autonomous Vulnerability Mitigation
- Author
-
Andreas Jacke and Thorsten Aurisch
- Subjects
Exploit ,business.industry ,Computer science ,Network security ,Wireless ad hoc network ,Vulnerability ,Mobile computing ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Computer security ,computer.software_genre ,Network management ,Network-centric warfare ,business ,computer ,Countermeasure (computer) - Abstract
Tactical ad hoc networks are an essential part of the military doctrine Network Centric Warfare (NCW). Automatically established networks of small mobile computers and devices provide soldiers with information necessary to accomplish their mission. Hostile forces may exploit software vulnerabilities in order to obstruct military missions or eavesdrop mission-specific information. A vulnerability scanner and management system is a pro-active countermeasure to prevent the exploitation of known software vulnerabilities. We propose the usage of Mobile Agents for the mitigation of single very critical vulnerabilities because tactical ad hoc networks may not have permanently existing paths to a network management centre. In our concept, the Mobile Agents autonomously determine the path for visiting a given list of nodes based on the connectivity in the ad hoc network. The speed of applying a vulnerability mitigation to all nodes of the network is an important factor for the network security. Therefore, we propose different replication strategies for Mobile Agents. By these different strategies it is possible to adjust speed and network overhead of applying a vulnerability mitigation in the network.
- Published
- 2019
- Full Text
- View/download PDF
74. Study of the experimentation methodology for the counter fire operations by using discrete event simulation
- Author
-
Youngho Kim, Hyokyung Kim, and H. J. Kim
- Subjects
System of systems ,Engineering ,business.industry ,Distributed computing ,Network-centric warfare ,Discrete event simulation ,business - Published
- 2016
- Full Text
- View/download PDF
75. Image operations: refracting control from virtual reality to the digital battlefield
- Author
-
Lenoir, Timothy, author and Caldwell, Luke, author
- Published
- 2016
- Full Text
- View/download PDF
76. Handling vulnerabilities with mobile agents in order to consider the delay and disruption tolerant characteristic of military networks
- Author
-
Thorsten Aurisch and Andreas Jacke
- Subjects
Computer science ,Network security ,business.industry ,Mobile computing ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,020206 networking & telecommunications ,020302 automobile design & engineering ,02 engineering and technology ,Vulnerability management ,Computer security ,computer.software_genre ,0203 mechanical engineering ,0202 electrical engineering, electronic engineering, information engineering ,Malware ,Network-centric warfare ,Mobile agent ,business ,computer ,Mobile device ,Countermeasure (computer) - Abstract
With the development of modern military warfare towards Network Centric Warfare (NCW), small mobile computers or devices that form tactical ad-hoc networks play an important role. These automatically established networks provide soldiers with information necessary to accomplish their mission. It has to be assumed that hostile forces manage to install malware on a mobile device by exploiting software vulnerabilities in order to spy out mission-specific information. Therefore, a vulnerability management in combination with a patch management is a pro-active countermeasure to improve network security. Most of the vulnerability and patch management systems use a Client-Server architecture. In this paper, we discuss the usage of Mobile Agents for this task. Through this approach, it is possible to consider the properties of military ad-hoc networks such as non-permanently existing end-to-end paths.
- Published
- 2018
- Full Text
- View/download PDF
77. Implications for Studying Team Cognition and Team Performance in Network-Centric Warfare Paradigms.
- Author
-
Krueger, Gerald P. and Banderet, Louis E.
- Abstract
A preface for the section on team cognition and cognitive metrics in the May 2007 issue of the periodical "Aviation, Space, and Environmental Medicine" is presented.
- Published
- 2007
78. Mission command in the information age
- Author
-
E.H. Kramer, Bart van Bezooijen, and Industrial Engineering and Innovation Sciences
- Subjects
Information Age ,Network-Centric Warfare ,Sociology and Political Science ,Mission Command ,business.industry ,media_common.quotation_subject ,Control (management) ,Information technology ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Military Innovation ,Mission Command (Auftragstaktik) ,Computer security ,computer.software_genre ,Military Transformation ,Interdependence ,Work (electrical) ,Political science ,Political Science and International Relations ,Command and control ,Network-centric warfare ,business ,computer ,media_common - Abstract
Theory on the use of information technology in military operations assumes that bringing together units in an information network helps units to work together. Decentralized command systems such as mission command have been proposed for these networks, so that units can adapt to changes in their turbulent working environments. Others have proposed centralized command systems that permit higher organizational levels to closely direct military operations. This article uses Perrow’s (1984, 1999) Normal Accidents Theory to propose that increasing interdependencies between units in information networks places incompatible demands on the design of networked military operations. It is concluded that networked military operations require decentralized command approaches, but only under the condition that interdependencies between modules of networked units are weak rather than tight. This precondition is essential for retaining control over networked military operations.
- Published
- 2015
79. NETWORK-CENTRIC WARFARE AND NETWORK ENABLED CAPABILITY IMPLICATIONS OVER THE C4ISR TYPE INFORMATION NETWORKS IN THE ROMANIAN ARMED FORCES
- Author
-
Cristea DUMITRU
- Subjects
information networks ,lcsh:Military Science ,network enabled capability ,Romanian Armed Forces ,lcsh:U ,technology ,Network Centric Warfare ,C4ISR ,network-centric warfare ,Network Enabled Capabilities - Abstract
The last two decades have been marked by the evolution of mankind toward the Information Age, a new stage of societal development where the modem society is affected, among other factors, by the explosive technological changes. Within the context, technology represents the main driver for change. To be more specific, small innovations emerged in the information technology and communications are considered responsible for global transformations in the economy, politics or culture structure. This assertion also extends its validity over the military phenomenon, which is just another form of human behavior. The large-scale use of the information technology and communications led to a cybernetic battlefield and the change of the war waging philosophy, with the rise of new concepts that better describe the new reality: Network Centric Warfare, and Network Enabled Capabilities.
- Published
- 2015
80. Agent-Based Simulation and Its Application to Analyze Combat Effectiveness in Network-Centric Warfare Considering Communication Failure Environments
- Author
-
Chongman Kim, Sunwoo Shin, Jaeyeong Lee, and Moonsung Park
- Subjects
Article Subject ,Process (engineering) ,Computer science ,General Mathematics ,lcsh:Mathematics ,General Engineering ,020302 automobile design & engineering ,020206 networking & telecommunications ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,02 engineering and technology ,Modern warfare ,lcsh:QA1-939 ,Telecommunications network ,0203 mechanical engineering ,Risk analysis (engineering) ,Battlefield ,lcsh:TA1-2040 ,0202 electrical engineering, electronic engineering, information engineering ,Network-centric warfare ,lcsh:Engineering (General). Civil engineering (General) - Abstract
Many parts of platforms are expected to be replaced by unmanned systems in modern warfare. All the assets and supporting vehicles are linked to each other with a communication network, and it is called the network-centric warfare environment. Hence, it is critical when communication failure occurs during engagement in ground battlefield because this failure will directly affect overall combat effectiveness of one’s owned assets. However, research regarding communication failure issues is scarce. We herein propose a new agent-based modeling process to measure the overall combat effectiveness combined with communication success ratio, based on the terrain condition of the ground engagement. Additionally, we provide the effectiveness analysis result when a communication repeater is applied during communication failure as an alternative measure.
- Published
- 2018
81. Command and control in the context of digitization: a study based on computational modeling
- Author
-
Bertol, Frederico Licks and Cepik, Marco Aurelio Chaves
- Subjects
Digitization ,Tecnologia ,Computational modeling and simulation ,Network-centric warfare ,Military doctrines ,Guerra ,Política de defesa ,Command and control - Abstract
Este trabalho propõe uma discussão em torno dos impactos da digitalização sobre sistemas militares de comando e controle. A hipótese central é que o emprego intensivo de tecnologias digitais está associado a um maior risco de sobrecarga informacional nesses sistemas. Isso se aplica em especial às forças militares que adotaram doutrinas de viés tecnocrático, como a guerra centrada em redes. No primeiro capítulo, discutimos o contexto no qual nosso tema de pesquisa se insere, fazendo uma breve retrospectiva do processo de digitalização e também definindo alguns conceitos-chave. No segundo capítulo, em formato de artigo, apresentamos o modelo computacional que foi desenvolvido para simular o funcionamento de um sistema de comando e controle sob a condição de sobrecarga informacional. O artigo também reúne uma revisão crítica das abordagens sobre comando e controle, com ênfase na literatura sobre guerra centrada em redes. O terceiro e último capítulo traz algumas conclusões sobre o emprego da modelagem computacional como metodologia de pesquisa e o estado atual do debate sobre guerra centrada e redes. This work proposes a discussion on the impacts of digitization over military command and control systems. The central hypothesis is that the intensive deployment of digital technologies is associated to a greater risk of informational overload in those systems. This applies especially to military forces that have adopted doctrines with a technocratic bias, such as the network-centric warfare. In the first chapter, we discuss the context that encompass our research topic, making a brief retrospective of the process of digitization and defining some key concepts. In the second chapter, in form of article, we present the computational model developed for simulating the operation of a command and control system under the condition of informational overload. The article also contains a critical review on the command and control approaches, with emphasis on the literature about network-centric warfare. The third and last chapter brings out some conclusions regarding the use of computational modeling as a research method and the current state of the debate on network-centric warfare.
- Published
- 2018
82. Simulation-Based Optimization on the System-of-Systems Model via Model Transformation and Genetic Algorithm: A Case Study of Network-Centric Warfare
- Author
-
Seon Han Choi, Se Jung Kwon, Bong Gu Kang, Tag Gon Kim, and Jun Hee Lee
- Subjects
System of systems ,0209 industrial biotechnology ,Mathematical optimization ,Multidisciplinary ,Article Subject ,General Computer Science ,Artificial neural network ,Computer science ,Model transformation ,02 engineering and technology ,lcsh:QA75.5-76.95 ,020901 industrial engineering & automation ,Simulation-based optimization ,Transformation (function) ,Genetic algorithm ,0202 electrical engineering, electronic engineering, information engineering ,Network-centric warfare ,020201 artificial intelligence & image processing ,lcsh:Electronic computers. Computer science ,computer ,computer.programming_language ,Network model - Abstract
Simulation of a system-of-systems (SoS) model, which consists of a combat model and a network model, has been used to analyze the performance of network-centric warfare in detail. However, finding the combat model parameters satisfying the required combat power using simulation can take a long time for two reasons: (1) the prolonged execution time per simulation run and (2) the enormous number of simulation runs. This paper proposes a simulation-based optimization method for the SoS-based simulation model to overcome these problems. The method consists of two processes: (1) the transformation of the SoS-based model into an integrated model using the neural network to reduce the execution time and (2) the optimization of the integrated model using the genetic algorithm with ranking and selection to decrease the number of simulation runs. The experimental result reveals that the proposed method significantly reduced the time for finding the optimal combat parameters with an acceptable level of accuracy.
- Published
- 2018
83. Target Path Detection Algorithm Using Activation Time Lag of PDR Sensors Based on USN
- Author
-
Chong Hyun Lee, Jinho Bae, and Jaeil Lee
- Subjects
Unattended ground sensor ,Computer science ,Pulse-Doppler radar ,Sensor node ,Path (graph theory) ,Key (cryptography) ,Network-centric warfare ,Error detection and correction ,Algorithm ,Wireless sensor network - Abstract
This paper proposes the target path detection algorithm using statistical characteristics of an activated time lag along a moving path of target from a neighboring sensor in PDR(Pulse Doppler Radar) sensor node environment based on USN(Ubiquitous Sensor Network) with a limitation detecting only an existence of moving target. In the proposed algorithm, detection and non-detection time lag obtained from the experimental data are used. The experimental data are through repetitive action of each 500 times about three path scenarios such as passing in between two sensors, moving parallel to two sensors, and turning through two sensors. From this experiments, error detection percentages of three path scenarios are 5.67%, 5.83%, and 7.17%, respectively. They show that the proposed algorithm can exactly detect a target path using the limited PDR sensor nodes. Key Words : Pulse Doppler Radar, Path Detection Algorithm, Unattended Ground Sensor, USN, NCW Ⅰ. 서 론 현대전은 네트워크 중심전(NCW: Network Centric Warfare) 체계로 발전하고 있다. 탐지, 지휘, 타격 체계 등 여러 전투 요소를 통신 체계로 연계하여 정보의 우월성 확보로 지휘속도 향상, 신속한 작전 전개, 치명적 타격, 생존성 향상 등 전투력을 극대화 시키는 작전수행 개념이다.
- Published
- 2015
- Full Text
- View/download PDF
84. Designing dynamical systems for security and defence network knowledge management. A case of study: Airport bird control falconers organizations
- Author
-
Jose-Luis Roca-Gonzalez
- Subjects
Knowledge management ,business.industry ,Process (engineering) ,Computer science ,Applied Mathematics ,media_common.quotation_subject ,Best practice ,Network management ,Order (exchange) ,Discrete Mathematics and Combinatorics ,Network-centric warfare ,Relevance (information retrieval) ,Strategic communication ,business ,Function (engineering) ,Analysis ,media_common - Abstract
The main purpose of this paper is to show and highlight through an example, the relevance of designing a properly strategic communication model (SCM) in order to improve organizations efficiency standards when a sharing knowledge network is used. This example shows as well that even if this configuration upgrades the competitor s standards it will give as an answer the ontological foundations for the knowledge to be shared that guarantee the best practice involved in the framework of the Knowledge Management (KM process).   The case of study takes advantage of some lesson from Network Centric Warfare (NCW) and the Network Enable Capability (NEC) systems to developed a Strategic Communication Model that looks for increasing the falcon breeding efficiency which it is a direct function of the falcons flight efficiency which creates a free wild-life area in the most sensitive airport locations and which is a priority concern of nowadays falconer's organizations.
- Published
- 2015
- Full Text
- View/download PDF
85. OODA loop in command & control systems
- Author
-
Miroslav Liska and Martin Revay
- Subjects
Loop (topology) ,Computer science ,Control system ,Command and control systems ,OODA loop ,Control (management) ,Process control ,Network-centric warfare ,Control engineering ,Network-enabled capability - Abstract
This paper describes Network Enabled Capability (NEC) within Command & Control (C2) systems. In the first part we present the need to transform military operations of Industrial Age to Information Age military operations and the related NCW (Network Centric Warfare). In the next part of the paper we discuss OODA (Observe, Orient, Decide, Act) Loop as a means of optimizing NEC within Command & Control (C2) systems. The aim of the paper is to introduce the issues of the behavior of systems mutually influencing one another.
- Published
- 2017
- Full Text
- View/download PDF
86. Security Infrastructure for Service Oriented Architectures at the Tactical Edge
- Author
-
Stephen D. Wolthusen and Vasileios Gkioulos
- Subjects
Set (abstract data type) ,Security service ,computer.internet_protocol ,Computer science ,Distributed computing ,Node (networking) ,Network-centric warfare ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Service-oriented architecture ,Enhanced Data Rates for GSM Evolution ,computer ,Domain (software engineering) - Abstract
The requirement for enabling network centric warfare through the accommodation of network-enabled capabilities, promoted the use of service oriented architectures (SOA) within military networks. The initial response of the academic and industrial communities was to utilize standard enterprise SOA. The developed solutions were well adjusted to the strategic domain, where node and network constraints were minimal. Yet, experience gained from the battlefields of the last decade, has proven that the tactical domain imposes a set of unique constraints, that render such solutions inefficient for the tactical edge.
- Published
- 2017
- Full Text
- View/download PDF
87. A computational framework for modeling targets as complex adaptive systems
- Author
-
Eugene Santos, John Korah, Suresh Subramanian, Vairavan Murugappan, and Eunice E. Santos
- Subjects
business.industry ,Computer science ,Probabilistic logic ,Complex system ,02 engineering and technology ,computer.software_genre ,Data science ,Knowledge base ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,Network-centric warfare ,020201 artificial intelligence & image processing ,Data mining ,Dynamism ,business ,Complex adaptive system ,computer - Abstract
Modeling large military targets is a challenge as they can be complex systems encompassing myriad combinations of human, technological, and social elements that interact, leading to complex behaviors. Moreover, such targets have multiple components and structures, extending across multiple spatial and temporal scales, and are in a state of change, either in response to events in the environment or changes within the system. Complex adaptive system (CAS) theory can help in capturing the dynamism, interactions, and more importantly various emergent behaviors, displayed by the targets. However, a key stumbling block is incorporating information from various intelligence, surveillance and reconnaissance (ISR) sources, while dealing with the inherent uncertainty, incompleteness and time criticality of real world information. To overcome these challenges, we present a probabilistic reasoning network based framework called complex adaptive Bayesian Knowledge Base (caBKB). caBKB is a rigorous, overarching and axiomatic framework that models two key processes, namely information aggregation and information composition. While information aggregation deals with the union, merger and concatenation of information and takes into account issues such as source reliability and information inconsistencies, information composition focuses on combining information components where such components may have well defined operations. Since caBKBs can explicitly model the relationships between information pieces at various scales, it provides unique capabilities such as the ability to de-aggregate and de-compose information for detailed analysis. Using a scenario from the Network Centric Operations (NCO) domain, we will describe how our framework can be used for modeling targets with a focus on methodologies for quantifying NCO performance metrics.
- Published
- 2017
- Full Text
- View/download PDF
88. Research on the Effect of Information Sharing on Command Decision-Making in Network-Centric Warfare
- Author
-
Hao-guang Chen, Kangming Zhang, Ying Shao, and Qing-xin Tang
- Subjects
Battlefield ,ComputingMethodologies_SIMULATIONANDMODELING ,Computer science ,Information sharing ,Network-centric warfare ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,State (computer science) ,Computer security ,computer.software_genre ,computer - Abstract
In network centric warfare, battlefield information sharing can provide more accurate and timely battlefield situation for combat decision making. This paper analyzes the influence of different levels of battlefield information sharing on combat decision making. Bayesian criterion is used to quantify the state change of decision-making conditions on battlefield situation information, and the results are expressed in the form of information entropy. This method can be used to evaluate the influence of battlefield information sharing on combat decision making conditions.
- Published
- 2017
- Full Text
- View/download PDF
89. A Survey Study of the Combat Effectiveness Analysis Models and Future Research Areas
- Author
-
Jai-Jeong Pyun, Sung-Min Bae, Chongman Kim, Keon-Young Park, Jun-Soo Kim, and Jae-Yeong Lee
- Subjects
Weapon system ,Engineering ,Battlefield ,business.industry ,Management science ,Research areas ,Research methodology ,Network-centric warfare ,Survey research ,Analysis models ,business ,Field (computer science) - Abstract
Received 24 September 2014; received in revised form 21 October 2014; accepted 21 October 2014ABSTRACTIt is important to predict and measure the combat effectiveness (CE) of weapons system in bat-tlefield for acquiring efficient weapon system. Moreover, quantitative calculation of weaponeffectiveness under complicated and uncertain battlefield environment is also difficult based onthe future network centric warfare. Many papers used the term of combat effectiveness and triedto study a lot of related issues about it. However, there is no paper dealing with the classifica-tion of study issue about CE and what will happen in this study field. In this paper, we pro-posed how to classify the study issue about CE and forecast future direction of this study field.Conceptually, CE is nothing but the assessment results to measure the ability of a militaryweapon system to accomplish its objective. We believe that it is an appropriate time to reviewthe literature extensively on CE analysis because the research interests and the papers of CE arerapidly growing in these days. This paper reviewed many CE analysis papers, classified themaccording to their research content and the research methodology applied. Additionally, a com-prehensive list of future research areas is also given.Key Words: Combat effectiveness analysis, Measures of effectiveness
- Published
- 2014
- Full Text
- View/download PDF
90. Establishment of Equipment Support Model and Command Flow of Equipment Support Based on Network Centric Warfare
- Author
-
Qian Yu, Li Gong, and Peng Fei Peng
- Subjects
Structure (mathematical logic) ,Engineering ,ComputingMethodologies_SIMULATIONANDMODELING ,business.industry ,Network-centric warfare ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,General Medicine ,Informatization ,Computer security ,computer.software_genre ,business ,computer - Abstract
Network centric warfare is the main development trend of informatization warfare in the future, while the present of network centric warfare has raised higher requirements for the future equipment support. In this paper, the new thoughts and structure of network centric warfare are put forward by comparing network centric warfare with traditional warfare. And the command flow of equipment support is analyzed specifically combined with the instantiation. The establishment of the equipment support model can promote the development of network centric warfare and has guiding significance and applied value for the establishment of the future equipment support model.
- Published
- 2014
- Full Text
- View/download PDF
91. A Study on the Design of an Underwater Distributed Sensor Network for the Shallow Water by An Effectiveness Analysis
- Author
-
Wan-Jin Kim, Ho Seuk Bae, Woo Shik Kim, Sang Kug Lee, and Sang Moon Choi
- Subjects
Engineering ,Waves and shallow water ,business.industry ,Real-time computing ,Network-centric warfare ,Underwater ,business ,Wireless sensor network ,Simulation - Abstract
In this paper, we have described the characteristics of the Underwater Distributed Sensor Network (UDSN) and proposed the conceptual design guideline by an effectiveness analysis. To perform the effectiveness analysis, we defined an battlefield environment, and then analyzed principal components which compose the UDSN to find out simulation parameters and system constraints. We have chosen a measure of effectiveness based on a target trajectory, which could enhance intuitive understanding about current status, and performed various simulations to reveal critical design parameters in terms of sensor node types, arrangement, cost and combination of detection information.Key Words : Underwater Distributed Sensor Network(수중분산 센서망), Effectiveness Analysis(효과도 분석), Network Centric Warfare(네트워크 중심전), Surveillance System(감시 체계) 1. 서 론 천해지역에서 잠수함과 같은 위협 세력에 효율적으로 대응하기 위해서는 상시 감시가 가능한 경계 체계 구축이 요구되나, 초계기, 초계함 및 잠수함과 같은 전통적인 유인 플랫폼만으로는 소기의 목적을 달성하기가 쉽지 않다. 이에 미국에서는 수중에 설치된 음향/비 * Corresponding author, E-mail: belfre@add.re.krCopyright
- Published
- 2014
- Full Text
- View/download PDF
92. Western European Armed Forces and the Modernisation Agenda: Following or Falling Behind?
- Author
-
David J. Galbreath
- Subjects
Effects Based Operations ,History ,Force transformation ,media_common.quotation_subject ,Context (language use) ,Effects-based operations ,Public administration ,Modernization theory ,Politics ,Germany ,medicine ,UK ,Sociology ,Militaries ,media_common ,US ,Revolution in Military Affairs ,Europe ,modernisation ,Falling (accident) ,Political economy ,Political Science and International Relations ,Network Centric Warfare ,Network-centric warfare ,France ,Bureaucracy ,medicine.symptom - Abstract
This article looks at the changing nature of European militaries specifically within the context of the United States’s transformation agenda. The article looks at the key drivers of transformation in European militaries and asks the question to what degree has the American agenda impacted on the way Europe does defence. The article looks at three aspects of transformation across three case studies. The aspects are network enabledness, expeditionary forces and effects based operations. The anal- ysis is applied to the United Kingdom, France and Germany. The findings suggest that local political and bureaucratic conditions have the potential to trump a larger process of force transformation led by the United States.
- Published
- 2014
- Full Text
- View/download PDF
93. M&S Case Study for Information Sharing Enabled Combat Entities
- Author
-
Byungyoun Lim, Sangchul Park, Yongjin (James) Kwon, and Younghoon Kho
- Subjects
Engineering ,business.industry ,Information sharing ,Frame (networking) ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Computer security ,computer.software_genre ,Outcome (game theory) ,Modeling and simulation ,Battlefield ,Network-centric warfare ,Technological advance ,business ,computer - Abstract
Recent technological advancement has a profound effect on the ways that the war is being conducted and fought. The advanced communications, information, computing and sensor technologies enable the combat units to be integrated in the battlefield management network. By exchanging and sharing real-time battlefield information that is critical for the successful outcome of military engagement, the legacy forces are becoming much more effective and lethal than ever before, The bigger picture of such phenomena can be summarized as the concept of Network Centric Warfare(NCW). The main purpose of this study is to compare the outcome of regional combat engagement between the legacy forces and the future combat systems(FCS). The FCS capitalizes on the advanced technologies within the frame of NCW. This study uses the modeling and simulation methodology to assess the effectiveness of two different combat forces. The simulation results show that the FCS is more effective, hence vindicating the superiority of technologically advanced combat units.Key Words : Future Combat System(미래 전투 체계), Modeling and Simulation(모델링&시뮬레이션), NCW(네트워크 중심전), Combat Effectiveness(전투 효과)
- Published
- 2014
- Full Text
- View/download PDF
94. A P2P Based Tactical Information Sharing System for Mobile Nodes
- Author
-
Hyun Jeong Lee
- Subjects
Engineering ,Exploit ,business.industry ,Wireless network ,Testbed ,Peer-to-peer ,computer.software_genre ,Scheduling (computing) ,Wireless ,Network-centric warfare ,Information sharing system ,business ,computer ,Computer network - Abstract
In NCW(Network Centric Warfare) environment, mobile nodes communicate through wireless link. But wireless link provides limited networking performance due to signal interferences or mobility of nodes. So it is quite challenge to acquire enough networking resources and use the resources efficiently. In this paper, we have proposed a P2P based tactical information sharing system which provides satisfactory visual information playout for mobile nodes(i.e., military personnel, vehicle,..) in NCW environment. Our proposed system consists of two components. One is caching-enabled switch which stores tactical information segments at its internal storage and then transports them to mobile nodes when require. Another is centralized scheduling algorithm which exploits networking resources more efficiently. To validate performance of proposed system, we performed series of experiments in wireless network testbed. Results show improved performance in terms of segment-missing ratio, networking resources usage, sharing time, and number of simultaneous playout mobile nodes with acceptable playout continuity(i.e., over 95%).Key Words : Peer-to-peer(피어-투-피어), Centralized Scheduling(중앙형 스케쥴링), Mobile Node(모바일 노드), Network Centric Warfare(네트워크 중심전), Caching-enabled Switch(캐싱 지원 스위치)
- Published
- 2014
- Full Text
- View/download PDF
95. North Korean Cyber Warfare Threat and South Korean Action
- Author
-
Doo-Hyun Kim
- Subjects
National security ,business.industry ,Computer science ,Internet privacy ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Computer security ,computer.software_genre ,Cyber Space ,Information warfare ,Cyberwarfare ,Action (philosophy) ,Network-centric warfare ,Cyber-attack ,The Internet ,business ,computer ,ComputingMilieux_MISCELLANEOUS - Abstract
In this study, I analyzed the increased threat of cyber warfare and the threat of reality about what is happening around the currently. And to prepare for it, I proposed the fact how main developed countries deal with cyber warfare. Also, I presented North Korea`s cyber warfare threat which is equipped with world`s top 3 cyber warfare performance and the way how their strategy influence to South Korea`s national security. Moreever, I studied the existing North Korea`s cyber warfare threat and the way how, how South Korea deal with it and prepare to against expected threat of cyber warfare in future.
- Published
- 2014
- Full Text
- View/download PDF
96. Network-based Metric for Measuring Combat Effectiveness
- Author
-
Youngwoo Lee and Taesik Lee
- Subjects
Engineering ,Operations research ,business.industry ,Mechanical Engineering ,General Chemical Engineering ,Theoretical definition ,Biomedical Engineering ,General Physics and Astronomy ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Context (language use) ,Adversary ,Computer Science Applications ,Task (project management) ,Network-centric warfare ,Metric (unit) ,Electrical and Electronic Engineering ,business ,Representation (mathematics) ,Network model - Abstract
A conceptual definition of combat effectiveness is the overall capability of a force to produce a desiredoutcome from combat against an enemy force. An ability to measure combat effectiveness is critical to strategic andtactical decision making; however, it is a challenging task to develop an operational metric for combat effectivenessdue to the large complexity presented by the rich context of a combat environment. The present paper contendsthat, under a direct fire engagement, combat effectiveness can be reasonably assessed by the prevalence of attack opportunities a given force creates in a combat environment. The paper proposes a method to quantitatively measurecombat effectiveness of a military force in a direct fire engagement environment. The proposed metric is basedon a meta-network representation that captures various aspects of a combat environment. Using a meta-networkrepresentation, two types of basic unit structures of attack opportunity – isolated and networked – are identified,which are then used as a basic element for measuring combat effectiveness. Prevalence of network motifs in anetworked combat environment and availability of attack opportunities are computed as a measure of a militaryforce’s combat effectiveness. Defence Science Journal, 2014, 64(2), pp. 115-122. DOI: http://dx.doi.org/10.14429/dsj.64.5534
- Published
- 2014
- Full Text
- View/download PDF
97. Development of Stream Cipher using the AES
- Author
-
Gyeong-Yeon Cho, Sung-Gi Kim, and Gil-Ho Kim
- Subjects
Wireless network ,Computer science ,business.industry ,Reliability (computer networking) ,Computer security ,computer.software_genre ,Information and Communications Technology ,Key (cryptography) ,Network-centric warfare ,Confidentiality ,business ,computer ,Stream cipher ,Situation analysis ,Computer network - Abstract
Future aspects of the has turned into a network centric warfare(NCW). Organically combined wired and wireless networks in a variety of cross-of-the-art combat power factor utilization of information and communication technology is a key element of NCW implementation. At used various information in the NCW must be the confidentiality and integrity excellent then quick situation assessment through reliability the real-time processing, which is the core of winning the war. In this paper, NCW is one of the key technologies of the implementation of 128-bit output stream cipher algorithm is proposed. AES-based stream cipher developed by applying modified OFB mode the confidentiality and integrity as well as hardware implementation to the security and real-time processing is superior.
- Published
- 2013
- Full Text
- View/download PDF
98. Cloud Computing-Core Platform to Build Future Networking Data Links
- Author
-
Juan Yang, Jian Lu Luo, Cong Yang, and Fang Cheng
- Subjects
Tactical Data Link ,Engineering ,business.industry ,Distributed computing ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Cloud computing ,General Medicine ,Data link ,Core (game theory) ,System service ,Key (cryptography) ,Network-centric warfare ,Joint (building) ,business ,Computer network - Abstract
In this paper,we analyzed the problems and challenges that US Army tactical data link system encountered when meeting the needs of network-centric warfare. On the basis of this, we put forward a new battlefield-oriented, demand-based, real-time serviced networking data link system---the joint data link system based on cloud computing, and discussed the key techniques in constructing the system. Simulation results show that the use of cloud technology in Joined Data Links can improve the system service level markedly.
- Published
- 2013
- Full Text
- View/download PDF
99. Research on Modeling and Simulation of Networked Air & Missile Defense
- Author
-
Yong Lin Lei, Ning Zhu, Qun Li, and Zhi Zhu
- Subjects
Engineering ,business.industry ,Simulation modeling ,General Engineering ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Missile defense ,Scenario simulation ,Computer security ,computer.software_genre ,Domain (software engineering) ,Modeling and simulation ,Fire control ,Systems engineering ,Network-centric warfare ,Architecture ,business ,computer - Abstract
As a Network Centric Warfare (NCW) case applied in Air & Missile Defense domain, Networked Air & Missile Defense (NAMD) represents the superior development of the Air & Missile Defense warfare in future. Based on the ideology of Integrated Fire Control, architecture and characteristics of NAMD are depicted, and simulation models based on above depictions are designed. Finally, operational capabilities of NAMD are generally evaluated, and the rationalities of decision-making script and model framework are validated by concentrating on results of an operational scenario simulation.
- Published
- 2013
- Full Text
- View/download PDF
100. Russian Military Reform in the 21st Century: Preparation for the Network-Centric Warfare(NCW)
- Author
-
Hongsub Lee
- Subjects
Law ,Political science ,Network-centric warfare ,Computer security ,computer.software_genre ,computer - Published
- 2013
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.