Pub Date : 2023-04-05DOI: 10.9766/kimst.2023.26.2.188
In the future battlefield centered on the concept of mosaic warfare, the need for an unmanned combat system will increase to value human life. It is necessary for Multiple/Heterogeneous Unmanned Combat Systems to have suitable mission planning method in order to perform various mission. In this paper, we propose the MTSR model for mission planning of the unmanned combat system, and introduce a method of identifying a task by a combination of services using a request operator and a method of allocating resources to perform a task using the requested service. In order to verify the performance of the proposed task-resource matchmaking algorithm, simulation using occupation scenarios is performed and the results are analyzed.
{"title":"Efficient Task-Resource Matchmaking Technique for Multiple/Heterogeneous Unmanned Combat Systems","authors":"","doi":"10.9766/kimst.2023.26.2.188","DOIUrl":"https://doi.org/10.9766/kimst.2023.26.2.188","url":null,"abstract":"In the future battlefield centered on the concept of mosaic warfare, the need for an unmanned combat system will increase to value human life. It is necessary for Multiple/Heterogeneous Unmanned Combat Systems to have suitable mission planning method in order to perform various mission. In this paper, we propose the MTSR model for mission planning of the unmanned combat system, and introduce a method of identifying a task by a combination of services using a request operator and a method of allocating resources to perform a task using the requested service. In order to verify the performance of the proposed task-resource matchmaking algorithm, simulation using occupation scenarios is performed and the results are analyzed.","PeriodicalId":17292,"journal":{"name":"Journal of the Korea Institute of Military Science and Technology","volume":"2011 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86346028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-05DOI: 10.9766/kimst.2023.26.2.197
Jin-Gyeong Lee, Seong-Min Kwon
The importance of each warfighting function for Army TIGER unit attack drones is measured using the AHP technique. As a result, the importance of attack drones is high in the order of maneuver, firepower, intelligence, command/control, protection, and operation sustainment, but the importance of maneuver, firepower, and intelligence are almost similar. In addition, it is analyzed that attack drones capable of carrying out day and night missions by being equipped with an EO/IR sensor and being commanded/controlled in conjunction with the C4I system to eliminate threats with small bombs or aircraft collisions is needed. Finally, based on the results of this study, a virtual battle scenario for attack drones is proposed.
{"title":"A Basic Study on the Selection of Required Operational Capability for Attack Drones of Army TIGER Units Using AHP Technique","authors":"Jin-Gyeong Lee, Seong-Min Kwon","doi":"10.9766/kimst.2023.26.2.197","DOIUrl":"https://doi.org/10.9766/kimst.2023.26.2.197","url":null,"abstract":"The importance of each warfighting function for Army TIGER unit attack drones is measured using the AHP technique. As a result, the importance of attack drones is high in the order of maneuver, firepower, intelligence, command/control, protection, and operation sustainment, but the importance of maneuver, firepower, and intelligence are almost similar. In addition, it is analyzed that attack drones capable of carrying out day and night missions by being equipped with an EO/IR sensor and being commanded/controlled in conjunction with the C4I system to eliminate threats with small bombs or aircraft collisions is needed. Finally, based on the results of this study, a virtual battle scenario for attack drones is proposed.","PeriodicalId":17292,"journal":{"name":"Journal of the Korea Institute of Military Science and Technology","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75877579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-05DOI: 10.9766/kimst.2023.26.2.139
Safety standards for long-range artillery ammunition test and training sites follow the US artillery shooting range safety zone standards. Although the South Korean geographical conditions of shooting ranges are different from those of the United States, there is no safety standard reflecting the South Korean topographical characteristics. Probable error associated with the shooting range, trajectory should be considered in establishing the safety standards. In this study, we present the safety standards for the ammunition testing site suitable for the Korean situation, with applying a concept of trajectory and probable error differed by ammunition type, which are currently confirmed by the South Korean Army's artillery shooting.
{"title":"A Study on Safety Standards for the Interior of an Artillery Firing Range Considering Probable Error","authors":"","doi":"10.9766/kimst.2023.26.2.139","DOIUrl":"https://doi.org/10.9766/kimst.2023.26.2.139","url":null,"abstract":"Safety standards for long-range artillery ammunition test and training sites follow the US artillery shooting range safety zone standards. Although the South Korean geographical conditions of shooting ranges are different from those of the United States, there is no safety standard reflecting the South Korean topographical characteristics. Probable error associated with the shooting range, trajectory should be considered in establishing the safety standards. In this study, we present the safety standards for the ammunition testing site suitable for the Korean situation, with applying a concept of trajectory and probable error differed by ammunition type, which are currently confirmed by the South Korean Army's artillery shooting.","PeriodicalId":17292,"journal":{"name":"Journal of the Korea Institute of Military Science and Technology","volume":"200 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79924404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-05DOI: 10.9766/kimst.2023.26.2.113
Yeon-Sik Kang, I. Yang, Eun-Ye Lee, H. Jin, D. Shim
High-precision lasers and anti-aircraft radars are the main equipment to protect the Korean Peninsula, and require preemptive maintenance before signs of failure. Of the key components in the drive sector, bearings do not have a fault alarm function. Therefore, the technology for diagnosing defects in bearings before the performance degradation of equipment occurs is becoming more important. In this paper, for the experimental analysis, we measured the acceleration of the four sets of the same lot using acceleration sensors. Through periodic measurements, the factors that changed until the bearing stopped rotating were analyzed. To determine the replacement time, the main factors and threshold values of the bearing signal were analyzed. The error of the theoretical and experimental analysis results of the defect frequency was within 2.8 %, and the validity of the theoretical analysis results could be confirmed. Based on the results, it is possible to remotely transmit trouble alerts to users through the system check function.
{"title":"A Study on the Detection of Fault Factor in Gear-Integrated Bearing","authors":"Yeon-Sik Kang, I. Yang, Eun-Ye Lee, H. Jin, D. Shim","doi":"10.9766/kimst.2023.26.2.113","DOIUrl":"https://doi.org/10.9766/kimst.2023.26.2.113","url":null,"abstract":"High-precision lasers and anti-aircraft radars are the main equipment to protect the Korean Peninsula, and require preemptive maintenance before signs of failure. Of the key components in the drive sector, bearings do not have a fault alarm function. Therefore, the technology for diagnosing defects in bearings before the performance degradation of equipment occurs is becoming more important. In this paper, for the experimental analysis, we measured the acceleration of the four sets of the same lot using acceleration sensors. Through periodic measurements, the factors that changed until the bearing stopped rotating were analyzed. To determine the replacement time, the main factors and threshold values of the bearing signal were analyzed. The error of the theoretical and experimental analysis results of the defect frequency was within 2.8 %, and the validity of the theoretical analysis results could be confirmed. Based on the results, it is possible to remotely transmit trouble alerts to users through the system check function.","PeriodicalId":17292,"journal":{"name":"Journal of the Korea Institute of Military Science and Technology","volume":"30 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79437819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-05DOI: 10.9766/kimst.2023.26.2.179
J. Ahn
APT cyber attacks have been a problem for over a past decade, but still remain a challenge today as attackers use more sophisticated techniques and the number of objects to be protected increases. ‘Cyberattack Tracing System’ allows analysts to find undetected attack codes that penetrated and hid in enterprises, and to investigate their lateral movement propagation activities. The enterprise is characterized by multiple networks and mass hosts (PCs/servers). This paper presents a data processing procedure that collects event data, generates a temporally and spatially extended provenance graph and cyberattack tracing paths. In each data process procedure phases, system design considerations are suggested. With reflecting the data processing procedure and the characteristics of enterprise environment, an operational architecture for CyberAttack Tracing System is presented. The operational architecture will be lead to the detailed design of the system.
{"title":"Cyberattack Tracing System Operational Architecture","authors":"J. Ahn","doi":"10.9766/kimst.2023.26.2.179","DOIUrl":"https://doi.org/10.9766/kimst.2023.26.2.179","url":null,"abstract":"APT cyber attacks have been a problem for over a past decade, but still remain a challenge today as attackers use more sophisticated techniques and the number of objects to be protected increases. ‘Cyberattack Tracing System’ allows analysts to find undetected attack codes that penetrated and hid in enterprises, and to investigate their lateral movement propagation activities. The enterprise is characterized by multiple networks and mass hosts (PCs/servers). This paper presents a data processing procedure that collects event data, generates a temporally and spatially extended provenance graph and cyberattack tracing paths. In each data process procedure phases, system design considerations are suggested. With reflecting the data processing procedure and the characteristics of enterprise environment, an operational architecture for CyberAttack Tracing System is presented. The operational architecture will be lead to the detailed design of the system.","PeriodicalId":17292,"journal":{"name":"Journal of the Korea Institute of Military Science and Technology","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82902031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-05DOI: 10.9766/kimst.2023.26.2.159
Y. Heo, Taehyung Kim
In the present study, the dynamic behavior characteristics of an amphibious assault vehicle during water entry were analyzed using STAR-CCM+, a commercial computational fluid dynamics(CFD) code. All computations were performed using an overset mesh system and a RANS based flow-solver coupled with dynamic fluid-body interaction(DFBI) solver for simulating three degrees of freedom motion. For numerical validation of the solver, a water entry simulation of inclined circular cylinder was conducted and it was compared between an existing experiment data and CFD results. The pitch angle variation and the trajectory of the circular cylinder during water entry shows good agreement with previous experimental and numerical studies. For the water entry simulations of the amphibious assault vehicle, the analysis of dynamic behaviors of the amphibious assault vehicle with different slope angles, submerged depths and initial velocities were conducted. It is confirmed that the steep slope angle increases the submerged volume of the amphibious assault vehicle, so the buoyancy acting on the vehicle is increased and the moved distance for the re-flotation is decreased. It is also revealed that the submerged volume is increased, bow-up phenomenon occur earlier.
{"title":"Numerical Analysis on Dynamic Behavior Characteristics of an Amphibious Assault Vehicle during Water Entry","authors":"Y. Heo, Taehyung Kim","doi":"10.9766/kimst.2023.26.2.159","DOIUrl":"https://doi.org/10.9766/kimst.2023.26.2.159","url":null,"abstract":"In the present study, the dynamic behavior characteristics of an amphibious assault vehicle during water entry were analyzed using STAR-CCM+, a commercial computational fluid dynamics(CFD) code. All computations were performed using an overset mesh system and a RANS based flow-solver coupled with dynamic fluid-body interaction(DFBI) solver for simulating three degrees of freedom motion. For numerical validation of the solver, a water entry simulation of inclined circular cylinder was conducted and it was compared between an existing experiment data and CFD results. The pitch angle variation and the trajectory of the circular cylinder during water entry shows good agreement with previous experimental and numerical studies. For the water entry simulations of the amphibious assault vehicle, the analysis of dynamic behaviors of the amphibious assault vehicle with different slope angles, submerged depths and initial velocities were conducted. It is confirmed that the steep slope angle increases the submerged volume of the amphibious assault vehicle, so the buoyancy acting on the vehicle is increased and the moved distance for the re-flotation is decreased. It is also revealed that the submerged volume is increased, bow-up phenomenon occur earlier.","PeriodicalId":17292,"journal":{"name":"Journal of the Korea Institute of Military Science and Technology","volume":"05 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86166678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-05DOI: 10.9766/kimst.2023.26.2.129
Namwon An, Kyung-Mee Lim, So-Young Jeong
Acquiring precise coordinates of ground targets can be regarded as the key mission of the tactical-level military UAS(Unmanned Aerial System) operations. The coordinates deviations for the ground targets estimated from UAV (Unmanned Aerial Vehicle) images may depend on the sensor specifications and slant ranges between UAV and ground targets. It has an order of several tens to hundreds of meters for typical tactical UAV mission scenarios. In this paper, we propose a scheme that precisely acquires target coordinates from UAS by mapping image pixels to geographical coordinates based on GCP(Ground Control Points). This scheme was implemented and tested from ground control station for UAS. We took images of targets of which exact location is known and acquired the target coordinates using our proposed scheme. The experimental results showed that errors of the acquired coordinates remained within an order of several meters and the coordinates accuracy was significantly improved.
获取地面目标的精确坐标是战术级军事无人机作战的关键任务。从UAV(无人驾驶飞行器)图像估计的地面目标的坐标偏差可能取决于传感器规格和UAV和地面目标之间的倾斜距离。对于典型的战术无人机任务场景,它有几十到几百米的订单。本文提出了一种基于地面控制点(Ground Control Points, GCP),通过将图像像素映射到地理坐标,精确获取无人机目标坐标的方案。该方案在无人机地面控制站进行了实施和测试。我们利用所提出的方案对已知精确位置的目标进行图像采集,并获取目标坐标。实验结果表明,所获得的坐标误差保持在几米数量级,坐标精度得到了显著提高。
{"title":"Acquiring Precise Coordinates of Ground Targets through GCP Geometric Correction of Captured Images in UAS","authors":"Namwon An, Kyung-Mee Lim, So-Young Jeong","doi":"10.9766/kimst.2023.26.2.129","DOIUrl":"https://doi.org/10.9766/kimst.2023.26.2.129","url":null,"abstract":"Acquiring precise coordinates of ground targets can be regarded as the key mission of the tactical-level military UAS(Unmanned Aerial System) operations. The coordinates deviations for the ground targets estimated from UAV (Unmanned Aerial Vehicle) images may depend on the sensor specifications and slant ranges between UAV and ground targets. It has an order of several tens to hundreds of meters for typical tactical UAV mission scenarios. In this paper, we propose a scheme that precisely acquires target coordinates from UAS by mapping image pixels to geographical coordinates based on GCP(Ground Control Points). This scheme was implemented and tested from ground control station for UAS. We took images of targets of which exact location is known and acquired the target coordinates using our proposed scheme. The experimental results showed that errors of the acquired coordinates remained within an order of several meters and the coordinates accuracy was significantly improved.","PeriodicalId":17292,"journal":{"name":"Journal of the Korea Institute of Military Science and Technology","volume":"52 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74465476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-05DOI: 10.9766/kimst.2023.26.2.122
Hyeongyu Park, D. Woo, Jaesik Kim
The target must be located within the main-lobe of the antenna in order to measure the direction of the target by using sum-delta monopulse technique. The most common way if the target is located within the main-lobe is to compare the amplitude of the sum channel received signal with the delta channel received signal. However, in the case of the single-ring circular array antenna, it is difficult to apply the conventional method due to its structural limitation where antenna elements do not exist in the center of the array. In this paper, we proposed a novel method to identify whether a target is located within the main-lobe by appropriately adjusting the feeding amplitude of each element constituting the single-ring circular array antenna through the particle swarm optimization method. Simulation results showed that the proposed method can determine whether the target is located within the main-lobe of the single-ring circular array antenna.
{"title":"Main-Lobe Recognition for Sum-Delta Monopulse of Single-Ring Circular Array Antenna","authors":"Hyeongyu Park, D. Woo, Jaesik Kim","doi":"10.9766/kimst.2023.26.2.122","DOIUrl":"https://doi.org/10.9766/kimst.2023.26.2.122","url":null,"abstract":"The target must be located within the main-lobe of the antenna in order to measure the direction of the target by using sum-delta monopulse technique. The most common way if the target is located within the main-lobe is to compare the amplitude of the sum channel received signal with the delta channel received signal. However, in the case of the single-ring circular array antenna, it is difficult to apply the conventional method due to its structural limitation where antenna elements do not exist in the center of the array. In this paper, we proposed a novel method to identify whether a target is located within the main-lobe by appropriately adjusting the feeding amplitude of each element constituting the single-ring circular array antenna through the particle swarm optimization method. Simulation results showed that the proposed method can determine whether the target is located within the main-lobe of the single-ring circular array antenna.","PeriodicalId":17292,"journal":{"name":"Journal of the Korea Institute of Military Science and Technology","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72709230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-05DOI: 10.9766/kimst.2023.26.2.171
Daeyeon Kim, Jaemin Kim, Kwang-Ryul Koh, Sang-Bum Lee
PCM data is result of air-vehicle flight test, this data is distributed for each engineers to analyze its condition. Since line-of-sight between the air-vehicle and the ground receiver cannot always be secured, remote PCM data recording system was claimed to be required. In this paper multi-function PCM data recorder has been described. This PCM data recorder was intended to place on inside of flight object. It can record about two hours in 32 GB SD card with maximum 7 Mbps data rate. RS-422/485 and RJ-45 interface enhanced accessibility for users. 5 V and 1 A power consumption and 19.5 mm × 152.5 mm × 102.3 mm allow to connect with mobile PCM devices. It acquired more than 190-minutes data in 12-times flight test. Also, it achieved military standard environmental test MIL-STD-810G to prove its stability and solidness.
PCM数据是飞行器飞行试验的结果,这些数据分发给各个工程师分析飞行器的状态。由于飞行器和地面接收器之间的视线不能总是得到保证,因此据称需要远程PCM数据记录系统。本文介绍了一种多功能PCM数据记录仪。这个PCM数据记录仪打算放在飞行物体的内部。它可以在32gb的SD卡上记录大约两个小时,最大数据速率为7mbps。RS-422/485和RJ-45接口增强了用户的可访问性。5v, 1a功耗,19.5 mm × 152.5 mm × 102.3 mm,可接移动PCM设备。在12次飞行试验中获得了190多分钟的数据。并通过了军用标准MIL-STD-810G环境试验,证明了其稳定性和坚固性。
{"title":"Developement of Multifunction PCM Recorder for Telemetry System","authors":"Daeyeon Kim, Jaemin Kim, Kwang-Ryul Koh, Sang-Bum Lee","doi":"10.9766/kimst.2023.26.2.171","DOIUrl":"https://doi.org/10.9766/kimst.2023.26.2.171","url":null,"abstract":"PCM data is result of air-vehicle flight test, this data is distributed for each engineers to analyze its condition. Since line-of-sight between the air-vehicle and the ground receiver cannot always be secured, remote PCM data recording system was claimed to be required. In this paper multi-function PCM data recorder has been described. This PCM data recorder was intended to place on inside of flight object. It can record about two hours in 32 GB SD card with maximum 7 Mbps data rate. RS-422/485 and RJ-45 interface enhanced accessibility for users. 5 V and 1 A power consumption and 19.5 mm × 152.5 mm × 102.3 mm allow to connect with mobile PCM devices. It acquired more than 190-minutes data in 12-times flight test. Also, it achieved military standard environmental test MIL-STD-810G to prove its stability and solidness.","PeriodicalId":17292,"journal":{"name":"Journal of the Korea Institute of Military Science and Technology","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84819892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-05DOI: 10.9766/kimst.2023.26.1.091
Kilseok Cho, Ohkyun Jeong, Moonhyung Yoon
Modeling and Simulation(M&S) technology has been widely used to solve constraints such as time, space, safety, and cost when we implement the same development and test environments as real warfare environments to develop, test, and evaluate weapon systems for the last several decades. The integration and test environments employed for development and test & evaluation are required to provide Live Virtual Construction(LVC) simulation environments for carrying out requirement analysis, design, integration, test and verification. Additionally, they are needed to provide computing environments which are possible to reconfigure computing resources and software components easily according to test configuration changes, and to run legacy software components independently on specific hardware and software environments. In this paper, an Integration Test and Simulation for Engagement Control(ITSEC) bed using a bare-metal virtualization mechanism is proposed to meet the above test and simulation requirements, and it is applied and implemented for an air missile defense system. The engagement simulation experiment results conducted on air and missile defense environments demonstrate that the proposed bed is a sufficiently cost-effective and feasible solution to reconfigure and expand application software and computing resources in accordance with various integration and test environments.
{"title":"A Reconfigurable Integration Test and Simulation Bed for Engagement Control Using Virtualization","authors":"Kilseok Cho, Ohkyun Jeong, Moonhyung Yoon","doi":"10.9766/kimst.2023.26.1.091","DOIUrl":"https://doi.org/10.9766/kimst.2023.26.1.091","url":null,"abstract":"Modeling and Simulation(M&S) technology has been widely used to solve constraints such as time, space, safety, and cost when we implement the same development and test environments as real warfare environments to develop, test, and evaluate weapon systems for the last several decades. The integration and test environments employed for development and test & evaluation are required to provide Live Virtual Construction(LVC) simulation environments for carrying out requirement analysis, design, integration, test and verification. Additionally, they are needed to provide computing environments which are possible to reconfigure computing resources and software components easily according to test configuration changes, and to run legacy software components independently on specific hardware and software environments. In this paper, an Integration Test and Simulation for Engagement Control(ITSEC) bed using a bare-metal virtualization mechanism is proposed to meet the above test and simulation requirements, and it is applied and implemented for an air missile defense system. The engagement simulation experiment results conducted on air and missile defense environments demonstrate that the proposed bed is a sufficiently cost-effective and feasible solution to reconfigure and expand application software and computing resources in accordance with various integration and test environments.","PeriodicalId":17292,"journal":{"name":"Journal of the Korea Institute of Military Science and Technology","volume":"36 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75322879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}