Command-and-Control System Analysis and Delineation of Possible Areas for Machine Learning
DOI:
https://doi.org/10.3849/aimt.01948Keywords:
Command-and-control, Artificial intelligence, Machine Learning, Military system, Simulation, Neural NetworkAbstract
This paper explores AI and machine learning integration in military command-and-control (C2) systems, enhancing decision-making and operational efficiency. It examines AI applications across military levels, emphasizing predictive analytics, anomaly detection, and pattern recognition for improved situational awareness. Using the WASP simulation system, the study develops a neural network for scenario planning, highlighting simulators’ role in AI training. Results show AI’s potential to automate troop movement, command post deployment, and enemy maneuver recognition. The findings suggest AI-driven adaptability in dynamic battlefield environments. Future research will focus on advanced simulations and AI applications for military decision-making, reinforcing AI’s strategic role in modern warfare.a
References
MEDKOVÁ, D. Possibilities of Using Artificial Intelligence Tools over Ground Forces Battlefield Data. [Master Thesis]. 2019, University of Defence, Brno, Czech Republic.
BURITA, L. and M. HOPJAN. The Czech Army C2 and Simulation Systems and Decision-Making Support Architecture. In: 2004 Command and Control Research and Technology Symposium. San Diego: CCRTS, 2004.
HUBÁČEK, M., D. HAUSNER and V. VRÁB. The Use of Simulation Technologies in the Preparation for New Types of Operations. Czech Military Review, 2013, 22(1), pp. 149-159. https://doi.org/10.3849/2336-2995.22.2013.01.149-159.
LI, H., L. YU, J. ZHANG and M. LYU. Fusion Deep Learning and Machine Learning for Heterogeneous Military Entity Recognition. Wireless Communications and Mobile Computing, 2022, 2022, 103022. https://doi.org/10.1155/2022/1103022.
TURČANÍK, M. and J. BARÁTH. Intrusion Detection by Artificial Neural Networks. New Trends in Signal Processing (NTSP), 2022, 9920388. https://doi.org/10.23919/NTSP54843.2022.9920388.
LIANG, Y., X. WANG, T. YUE, S. XU, C. YAO, D. LIU and Q. LIU. Review of Live-Virtual-Constructive Simulation Technology. Journal of Physics: Conference Series, 2478(12), 122080. https://doi.org/10.1088/1742-6596/2478/12/122080.
STOREY, V.C., A.R. HEVNER and V.Y. YOON. The Design of Human-Artificial Intelligence Systems in Decision Sciences: A Look Back and Directions Forward. Decision Support Systems, 2024, 182, 114230. https://doi.org/10.1016/j.dss.2024.114230.
YOUN, J., K. KIM, D. KANG, J. LEE, M. PARK and D. SHIN. Research on Cyber ISR Visualization Method Based on BGP Archive Data through Hacking Case Analysis of North Korean Cyber-Attack Groups. Electronics, 2022, 11(24), 4142. https://doi.org/10.3390/electronics11244142.
GIACHOS, I., E. PAPAKITSOS, P. SAVVIDIS and N. LASKARIS. Inquiring Natural Language Processing Capabilities on Robotic Systems through Virtual Assistants: A Systemic Approach. Journal of Computer Science Research, 2023, 5(2), pp. 28-36. https://doi.org/10.30564/jcsr.v5i2.5537.
Annual Report 2023 – Military Intelligence [online]. 2023 [viewed 2024-03-18]. Available from: https://www.vzcr.cz/uploads/41-Vyrocni-zprava-2023.pdf
McKERNAN, B. and H. DAVIES. The Gospel: How Israel Uses AI to Select Bombing Targets. The Guardian [online]. 2023 [viewed 2024-06-24]. Available from: https://www.theguardian.com/world/2023/dec/01/the-gospel-how-israel-uses-ai-to-select-bombing-targets
C4ISTAR Ground Force Systems [online]. [viewed 2024-04-06]. Available from: https://www.iczgroup.com/en/products-and-services/defense/c4istar-ground-force-systems/
Company Brochure [online]. 2018 [viewed 2024-07-25]. Available from: https://www.vrg.cz/doc/company_brochure.pdf
MASA SWORD White Paper – Multi-Site Command Post Exercise [online]. 2024 [viewed 2024-07-11]. Available from: https://www.masasim.com/en/_files/ugd/8d4563_976b60c77bb64a068f7c722309f8a318.pdf
Downloads
Published
License
Copyright (c) 2025 Advances in Military Technology

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
Users can use, reuse and build upon the material published in the journal for any purpose, even commercially.


