淡江大學覺生紀念圖書館 (TKU Library)
進階搜尋


下載電子全文限經由淡江IP使用) 
系統識別號 U0002-0306200500440100
中文論文名稱 資訊化戰士之研究
英文論文名稱 The research of information-based warrior
校院名稱 淡江大學
系所名稱(中) 資訊工程學系博士班
系所名稱(英) Department of Computer Science and Information Engineering
學年度 93
學期 2
出版年 94
研究生中文姓名 王貴民
研究生英文姓名 Kuei Min Wang
學號 890190043
學位類別 博士
語文別 英文
口試日期 2005-05-30
論文頁數 84頁
口試委員 指導教授-葛煥昭
共同指導教授-黃俊堯
委員-方鄒昭聰
委員-黃俊堯
委員-葛煥昭
委員-蔣定安
委員-施國琛
中文關鍵字 共通作戰圖像  系統集成  訊化戰士  指揮管制  即時  網絡為中心之作戰 
英文關鍵字 battlefield  C4ISR  future warrior  information based warrior  information superiority  network  Network Centric Warfare(NCW) 
學科別分類 學科別應用科學資訊工程
中文摘要 資訊戰士(Information-Based Warrior; IBW)在第三波戰爭中已成為先進概念。資訊戰士成為趨勢主流之主要原因如下: 商業化之成熟資訊環境、美伊戰爭點石成金之資訊化軍事應用、高戰力倍增係數(multiplier)之點穴作戰、高成本效益之軍事投資及戰爭速決之國際輿論呼聲。
資訊化戰士為第三波戰爭之先進概念,能造成未來趨勢之原因如下: 商業化之成熟資訊環境、美伊戰爭點石成金之資訊化軍事應用、高戰力倍增係數(multiplier)之點穴作戰、高成本效益之軍事投資及戰爭速決之國際輿論呼聲。
資訊化戰士於戰場上之預期效益,除了提昇第一線作戰人員之戰場存活率外,更注重戰場經營之效能。傳統戰士為「將在外軍命有所不授」自給自足型作戰,資訊含量極少;資訊化戰士除擁有本身之戰場知覺(situation awareness)系統外,整合性之大系統-前端偵測體系所偵得情資、後端智慧型情資分析融合及指揮管制(command and control)決策體系,加上即時可靠通信系統,更可以幾近即時(near real time)作業方式,將戰場資訊傳回,快速完成情資分類、融合等共通作戰圖像(Common Operation Picture; COP)製程,協助指揮官下達決心。
本篇論文主要包含以下四部份: 第一,回顧歷史上資訊對戰爭之衝擊程度,及未戰爭中指揮、管制、通信、資訊、情報、監視、偵察(Command, Control, Communication, Computer, Intelligence, Surveillance, Reconnaissance; C4ISR)之發展。第二,C4ISR與以網絡為中心作戰 (Network Centric Warfare; NCW)之概念以及兩者與資訊優勢之關係;並說明資訊化戰士所延伸之資訊優勢。 第三,發展可評估資訊化戰士效益之數學模式,並嚐試在敵對戰場環境中以數學方式檢視其有效性。第四,提出實驗,以「劇本」(scenario;又稱想定)漸進式程序運用靜態與動態方法進行量化,觀察不同裝備組合資訊化戰士於靜態下與敵對雙方互動情況下之效益。
英文摘要 Information-Based Warrior (IBW) is an advanced concept in the third wave war. The expected effectiveness for having the IBW would not only improve the warriors’ survivability but also focus on the battle management efficiency. Traditional warrior is the type of independent, self-sufficient worrier. While in the operations, because the lack of the battlefield information, the links between King in domestic and the warriors in the frontline was always not strong enough to do the command and control, the fog of war was always heavy that the impact was too much for the outcome.
IBW, in addition to the well-equipped local situation awareness system, the warrior can take advantage of the integrated systems, which are far away from the battlefield, to receive the near real time information that makes the battlefield more transparent than ever before. The integrated systems include the string of systems from the sensors to shooters such as collects targets or environment data from sensors network then those data or information send to the host that with the smart intelligence subsystem to do the data analysis/fusion helping the commander in his decision-aid system.
This dissertation includes four parts: first, review the war that would describe the information impact to the war in the history and focus on the C4ISR for future war. Second, describe the concept of C4ISR and Network Centric Warfare (NCW) and their connections with the information superiority. And make a brief IBW feature description. Third, the development of a mathematic model for calculating the effectiveness of the IBW in the hostile battlefield with some degree of potential threat strength and making some mathematic view to the model, the model would be a way to see the value of IBW. Fourth, develop an experiment that use of “scenario based analysis” and the methods of static/dynamic for the quantification in order to observe the effectiveness under the static and interactive situation.
論文目次 List of Figures V
List of Tables VII
1. Introduction 1
1.1. Trends of the war 1
1.2. Information impact on the war 4
1.3. The characteristics of the future war 5
1.4. Command and control 5
1.4.1. The development of C4ISR 6
1.4.2. The application of C4ISR system 8
1.5. What is C4ISR 10
1.5.1. Definition 11
1.5.2. Man machine system 12
1.5.3. Scope of C4ISR 13
1.5.4. Framework of C4ISR 18
2. C4ISR to NCW 25
2.1. Platform-centric warfare and network-centric warfare 25
2.2. Information Superiority 28
2.3. Decision Superiority 28
2.3.1. New Type of Information Advantage 29
2.3.2. Information Disadvantage 30
2.4. Fundamentals of Network Centric Warfare 32
2.4.1. The physical domain 33
2.4.2. The information domain 33
2.4.3. The Cognitive Domain 34
2.4.4. Sensor network 35
2.5. C4ISR , NCW and future warrior 37
2.5.1. The battlefield performance of C4ISR and NCW 37
2.5.2. NCW to future warrior 38
2.5.2.1. Operation concept of the future warrior 39
3. Mathematical model for the evaluation of the IBW combat power 40
3.1. View of C4ISR structure with future warrior 40
3.2. Conceptual interactions of both hostile sides in the battlefield 47
3.3. Main factors of the interaction 47
3.3.1. The factors on the attacking side 47
3.3.2. The factor on the counter attacking side 48
3.3.3. The evaluation of the IBW combat power 48
3.4. Mathematical model 48
3.5. Model verification analysis 50
3.5.1. The function of IBW 51
3.5.2. S – Survivability of enemy 51
3.5.3. Assumptions 52
3.5.4. Graphs and Examples 54
3.5.5. Different ks 57
3.5.6. Summary 68
4. Experiment of analytical methods 70
4.1. Experiment logic 70
4.2. The contrast combinations 71
4.3. Analytical methods 71
4.3.1. Static method 71
4.3.2. Dynamic method 72
4.4. Quantified IBW combat power 72
4.5. Essential Element Analysis (EEA) 74
4.6. Scenario 75
4.7. MOE analysis 75
4.8. Summary 77
5. Conclusion 78
5.1. Contribution 78
5.2. Future work 78
Bibliography 80
List of papers 84
List of Figures

Figure1- 1 The cost ratio of electronic information against the total cost in the late of 20th century 3
Figure1- 2. The trend of reaction time 5
Figure1- 3 Three Domains for C4ISR 12

Figure2- 1 C2 and Platform-Centric Shooters 26
Figure2- 2 Network-Centric Operations 27
Figure2- 3 New Type of Information Advantage 30
Figure2- 4 Domains of Warfare 33
Figure2- 6 Formation of a Composite Track Within a CEC Sensor Network 36
Figure2- 7 Increased Battlespace Awareness Generated by a Sensor Network 36
Figure2- 8 Platform-Centric Operation vs. Network-Centric Operation 37
Figure2- 9 NCW Value-Added Combat Power 38
Figure2- 10 The basic operation concept of the future warrior 39

Figure3- 1 The relationship of IBW, C4ISR and NCW 40
Figure3- 2 The structure’s integrated view 41
Figure3- 3 The depiction of digital battlefield 42
Figure3- 4 OV-2: Operational nodes connection figure 44
Figure3- 5 The graph of ƒ( m, i, e) with n = 1. 54
Figure3- 6 The graph of ƒ( m, i, e) with n = 2 55
Figure3- 7 The graph of cross section at e = 1, 5, 10, 15 and 20 56
Figure3- 8 The graph of ƒ( m, i, e) for ks = 0.5. 57
Figure3- 9 The cross sectional graph for case ks = 0.5 58
Figure3- 10 The cross sectional graphs for e=1 59
Figure3- 11 The cross sectional graphs for e=2 60
Figure3- 12 The cross sectional graphs for e=10 60
Figure3- 13 The cross sectional graphs for e=15 61
Figure3- 14 The cross sectional graphs for e=20 61
Figure3- 15 The cross sectional graph for case ks = 0 62
Figure3- 16 Add ks = 0 to Fig.3-6 63
Figure3- 17 Add ks = 0 to Fig.3-7 63
Figure3- 18 Add ks = 0 to Fig.3-8 64
Figure3- 19 Add ks = 0 to Fig.3-9 64
Figure3- 20 Add ks = 0 to Fig.3-10 65

Figure4- 1 The experiment design logic 70
Figure4- 2 Scenario with two sides interactions 75
Figure4- 3 Result of 4 warriors 76



參考文獻 [ADA03] Adam J, Hebert, “Compressing the kill chain”, March 2003, Vol, 86, No. 3, Air Force Magazine, journal of the Air Force Association.
[ADM01] ADM Dennis Blair, CINCPAC, Remarks during Keynote Address at WEST 2001, January 23rd, San Diego, CA.
[AFC93] AFCEA Study Team, Evolutionary Acquisition Study. Fairfax, VA: AFCEA, June 7, 1993.
[AFS98] Air Force Space Command/Space Warfare Center, Information Briefing on Capabilities of Space Warfare Center/Shield Program. Colorado Springs, CO, 1998.
[AHL99a] A.H. Levis, “Systems architectures,” Handbook of systems engineering and management, A.P. Sage and W.B. Rouse (Editors), Wiley, New York, 1999, pp. 427–456.
[AHL99b] A.H. Levis and L. W. Wagenhals, Architecting information systems, GMU/C3I-165-R, C3I Center, George Mason University, Fairfax, VA, 1999 (also at http://viking.gmu. edu/http/syst621/Syst621.htm).
[AHL00] A.H. Levis and L.W. Wagenhals, C4ISR architectures. I: Developing a process for C4ISR architecture design, Syst Eng 3, 225–247 (2000).
[ALB95] Alberts, David S. Operations Other Than War: The Technological Dimension. Washington, DC: National Defense University Press, 1995.
[ALL96] Allard, Kenneth. Command, Control, and the Common Defense, revised edition. Washington, DC: National Defense University Press, 1996.
[ALM01] Arthur L. Money, Report on Network Centric Warfare Sense of the Report, 2001.
[ASO93] A. Solvberg and D.C. Kung, Information systems engineering, Springer-Verlag, Berlin, 1993.
[BER80] Bernard Osgood Koopman, “Search and screening”, Pergamon Press Inc., 1980.
[BJO94] B. Jonsson, Composition specification and verification of distributed systems, ACM Trans Program Lang Syst 16(2) (March 1994), pp. 259–303.
[BON98] Bond, BG William L., USA. Army Digitization Overview. Briefing to Dr. Jacques Gansler, USD (A&T). Pentagon, Arlington, VA, May 20, 1998.
[CCH00] Clayton Christensen and Michael Overdorf, “Meeting the Challenge of Disruptive Change,” Harvard Business Review, March-April 2000, p. 66-76.
[CEB99] Cebrowski, VAdm Arthur K., USN. “Network Centric Warfare: An Emerging Military Response to the Information Age.” Presentation to the 1999 Command and Control Research and Technology Symposium, Naval War College, Newport, RI, June 29, 1999.
[CHR05] Christensen, et el., “After the Gold Rush: Patterns of Success and Failure on the Internet, ”www.innosight.com”, p. 22-24.
[CLE99] Clemins, Adm Archie R., USN. “Naval Simulation System (NSS): An Assessment of IT-21 Warfighting Value-Added.” Briefing, January 5, 1999.
[C4I97] C4ISR Architecture Framework Version 2.0, C4ISR Architecture Working Group, Department of Defense, Washington, DC, December 18, 1997.
[DAM87] D.A. Marca and C. L. McGowan, Structured analysis and design technique, McGraw-Hill, New York, 1987.
[DAN01] Daniel R. Gonzales, Louis R. Moore, Christopher G. Pernin, David M. Matonick, Paul Dreyer. “Assessing the Value of Information Superiority for Ground Forces: Proof of Concept.”, Document No: DB-339-OSD, Pages: xviii, 83 ISBN: 0833030485, 2001, RAND documents.
[DAV98] David S. Alberts, John J. Garstka, and Frederick P. Stein, Network Centric Warfare: Developing and Leveraging Information Superiority, 2nd Edition (Revised). Washington, D.C., CCRP Press, 1999.
[DGF93] D.G. Firesmith, Object-oriented requirements analysis and logical design, Wiley, New York, 1993.
[DOC93] Dockerty, John T. and A. E .R. Woodcock,. The Military Landscape: Mathematical Models of Combat. Cambridge, UK: Woodhead, 1993.
[DoD01] DoD, Network Centric Warfare: Department of Defense Report to Congress, 2001.
[ERE91] E. Rechtin, Systems architecting: Creating & building complex systems, Prentice Hall, Englewood Cliffs, NJ, 1991.
[ERE92] E. Rechtin, The art of systems architecting, IEEE Spectrum (October 1992), pp. 66–69.
[ERE96] E. Rechtin and M. Maier, The art of systems architecting, CRC Press, Boca Raton, FL, 1996.
[ESG98] Executive Summary of Global ’98 Wargame,. Report of wargame conducted at Naval War College, Newport, RI, July 13–31, 1998.
[EYO75] E. Yourdon and L. Constantine, Structured design, Yourdon Press, New York, 1975.
[EYO89] E. Yourdon, Modern structured analysis, Yourdon Press, Englewood Cliffs, NJ, 1989.
[FIP83] FIPS 183, Federal Information Processing Standard # 183: Integration definition for function modeling, National Institute for Standards and Technology, Gaithersburg, MD.
[FIP84] FIPS 184, Federal Information Processing Standard # 184: Integration definition for information modeling, National Institute for Standards and Technology, Gaithersburg, MD.
[GBO91] G. Booch, Object oriented design with applications, Benjamin/ Cummings, Redwood City, CA, 1991.
[GBO99] G. Booch, J. Rumbaugh, and I. Jacobson, The Unified Modeling Language user guide, Addison Wesley, Reading, Massachusetts, 1999.
[ISU00] Information Superiority: Making the Joint Vision Happen, Office of the Assistant Secretary of Defense (Command, Control, Communications, & Intelligence), Pentagon, Washington, D.C., November, 2000.
[JAM96] James F. Dunnigan, Digital of high-tech Weaponry and tomorrow’s brave new battlefield,1996.
[JCA00] JCAPS, Joint C4ISR Architecture Planning/Analysis System, Status and Future Directions briefing, OASD(C3I), April 2000.
[JOH00] John J. Garstka, “Network Centric Warfare: An Overview of Emerging Theory,” PHALANX, December, 2000.
[JSC02] John S. Carlson II, “Model verification and validation”, Proceedings of the 2002 Winter Simulation Condrence.
[JTC02] John T. Correll, “From Sensor to Shooter”, Vol. 85, No. 02, Air Force Association, February 2002.
[KJE92] K. Jensen, Coloured Petri nets, Springer-Verlag, Berlin, 1992.
[LWW00] L.W. Wagenhals, I. Shin, D. Kim, and A.H. Levis, C4ISR architectures. II: A Structured Analysis approach to architecture design, Syst Eng 3, 248–287 (2000).
[MAR02] Marc Cerasini, The Future of War: The Face of 21st Century Warfare,2002.
[MPB00] M.P. Bienvenu, I. Shin, and A.H. Levis, C4ISR architectures.III: An Object-Oriented approach to architecture design,Syst Eng 3, 288–312 (2000).
[MPB96] M.P. Bienvenu and C.H. Daniel, BMD-NA BM/C3 Information Architecture Executable Representation, Proc 1996.
[MTE05] Measuring the Effects of Network-Centric Warfare, Office of the Secretary of Defense (Net Assessment), Pentagon, Washington, D.C.
[NAL87] N.A. Lynch and M.R. Tuttle, Hierarchical correctness proofs for distributed algorithms, Proc Sixth Annu ACM Symp Principles Distributed Comput, 1987, Vancouver, Canada, pp. 137–151.
[NKJ97] N.K. Jaiswal, “Military operations research: Quantitative Decision Making”, Kluwer Academic Publishers,1997.
[PEO05] People Net,
at http://www.people.com.cn/GB/junshi/8221/41587/41590/3035809.html
[RMJ94] R. McLeod, Jr., Systems analysis and design, Dryden, Fort Worth, TX, 1994.
[TDM79] T. DeMarco, Structured analysis and systems specification, Prentice Hall, Englewood Cliffs, NJ, 1979.
[VAD98] VADM Arthur K. Cebrowski, USN, and John J. Garstka. “Network Centric Warfare: Its Origin and Future,” Proceedings of the Naval Institute 124:1 (January, 1998), p. 28-35.
[VAK99] Vadm Arthur K. Cebrowki, USN, Written testimony to hearing on Defense Information Superiority and Information Assurance – Entering the 21st Century, held by the House Armed Services Committee, Subcommittee on Military Procurement. February 23, 1999.
論文使用權限
  • 同意紙本無償授權給館內讀者為學術之目的重製使用,於2005-06-14公開。
  • 同意授權瀏覽/列印電子全文服務,於2005-06-14起公開。


  • 若您有任何疑問,請與我們聯絡!
    圖書館: 請來電 (02)2621-5656 轉 2281 或 來信