• Title/Summary/Keyword: 국방적용

Search Result 931, Processing Time 0.029 seconds

Study for Analyzing Defense Industry Technology using Datamining technique: Patent Analysis Approach (데이터마이닝을 통한 방위산업기술 분석 연구: 특허분석을 중심으로)

  • Son, Changho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.10
    • /
    • pp.101-107
    • /
    • 2018
  • Recently, Korea's defense industry has advanced highly, and defense R&D budget is gradually increasing in defense budget. However, without objective analysis of defense industry technology, effective defense R&D activities are limited and defense budgets can be used inefficiently. Therefore, in addition to analyzing the defense industry technology quantitatively reflecting the opinions of the experts, this paper aims to analyze the defense industry technology objectively by quantitative methods, and to make efficient use of the defense budget. In addition, we propose a patent analysis method to grasp the characteristics of the defense industry technology and the vacant technology objectively and systematically by applying the big data analysis method, which is one of the keywords of the 4th industrial revolution, to the defense industry technology. The proposed method is applied to the technology of the firepower industry among several defense industrial technologies and the case analysis is conducted. In the process, the patents of 10 domestic companies related to firepower were collected through the Kipris in the defense industry companies' classification of the Korea Defense Industry Association(KDIA), and the data matrix was preprocessed to utilize IPC codes among them. And then, we Implemented association rule mining which can grasp the relation between each item in data mining technique using R program. The results of this study are suggested through interpretation of support, confidence lift index which were resulted from suggested approach. Therefore, this paper suggests that it can help the efficient use of massive national defense budget and enhance the competitiveness of defense industry technology.

The Validity Analysis of SDN/NFV Military application (SDN/NFV의 군 적용 타당성 분석)

  • Jang, Ji-Hee;Kwon, Tae-Uk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.4
    • /
    • pp.687-694
    • /
    • 2020
  • SDN and NFV are next-generation network technologies, and cloud, such as data centers, campuses, and large companies, has been established, or is actively applied by service-oriented communication companies. In particular, the Defense Integrated Data Center will be a prime example for military applications. In order for the Defense Integrated Data Center (DIDC) to become an intelligent center, it is accelerating the promotion of the "Smart Defense Integrated Data Center", which applied the latest information and communication technology (ICT). At the time of the establishment of DIDC, it plans to start building infrastructure such as cloud services at around 30% level, and expand D-Cloud to 75% through 'Cloud First'. In addition, the introduction of SDN/NFV will reduce the operation cost and manpower of DIDC, strengthen the ability to efficiently use information resources and cyber information protection systems, and increase flexibility and agility in using each system to improve efficiency in defense management in the future. Therefore, we will discuss the justification and expected effects of SDN/NFV introduction, focusing on DIDC.

The direction of application of the RMF-based risk management system considering interoperability (상호운용성을 고려한 RMF 기반의 위험관리체계 적용 방향)

  • Kwon, Hyuk-Jin;Kim, Sung-Tae;Joo, Ye-na
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.83-89
    • /
    • 2021
  • The RMF (Cyber Security Risk Management Framework) is a more strengthened U.S. defense cybersecurity framework that is currently used throughout the U.S. federal government beyond the defense sector. In the past decade, the proportion of cyber warfare in non-regular warfare encountered by the United States, especially cyberattacks caused by China and North Korea, has been increasing. In the end, the U.S. is newly establishing an RMF system to prepare a more strengthened cybersecurity policy at the pan-government level, and the U.S. Department of Defense aims to expand the U.S. defense RMF evaluation policy beyond the federal government level. The South Korean military has already applied RMF at the request of the U.S. that notified the policy to apply RMF when obtaining F-35A. The application of RMF by the Korean military is no longer inevitable. Now is the time for the Korean military to seriously think about what to prepare for the early establishment of a successful Korean RMF system.

Korean Security Risk Management Framework for the Application of Defense Acquisition System (국방획득체계 적용 한국형 보안위험관리 프레임워크)

  • Yang, Woo-sung;Cha, Sung-yong;Yoon, Jong-sung;Kwon, Hyeok-joo;Yoo, Jae-won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1183-1192
    • /
    • 2022
  • Information and Information processing systems must maintain a certain level of security during the total life cycle of Information. To maintain a certain level of security, security management processes are applied to software, automobile development, and the U.S. federal government information system over a life cycle, but theme of no similar security management process in Korea. This paper proposes a Korean-style security risk management framework to maintain a certain level of security in the total life cycle of information and information processing system in the defense sector. By applied to the defense field, we intend to present the direction of defense security work in the future and induce an shift in security paradigm.

Lofargram analysis and identification of ship noise based on Hough transform and convolutional neural network model (허프 변환과 convolutional neural network 모델 기반 선박 소음의 로파그램 분석 및 식별)

  • Junbeom Cho;Yonghoon Ha
    • The Journal of the Acoustical Society of Korea
    • /
    • v.43 no.1
    • /
    • pp.19-28
    • /
    • 2024
  • This paper proposes a method to improve the performance of ship identification through lofargram analysis of ship noise by applying the Hough Transform to a Convolutional Neural Network (CNN) model. When processing the signals received by a passive sonar, the time-frequency domain representation known as lofargram is generated. The machinery noise radiated by ships appears as tonal signals on the lofargram, and the class of the ship can be specified by analyzing it. However, analyzing lofargram is a specialized and time-consuming task performed by well-trained analysts. Additionally, the analysis for target identification is very challenging because the lofargram also displays various background noises due to the characteristics of the underwater environment. To address this issue, the Hough Transform is applied to the lofargram to add lines, thereby emphasizing the tonal signals. As a result of identification using CNN models on both the original lofargrams and the lofargrams with Hough transform, it is shown that the application of the Hough transform improves lofargram identification performance, as indicated by increased accuracy and macro F1 scores for three different CNN models.

A Study on the Identifying Emerging Defense Technology using S&T Text Mining (S&T Text Mining을 이용한 국방 유망기술 식별에 관한 연구)

  • Lee, Tae-Bong;Lee, Choon-Joo
    • Journal of the military operations research society of Korea
    • /
    • v.36 no.1
    • /
    • pp.39-49
    • /
    • 2010
  • This paper tries to identify emerging defense technology using S&T Text Mining. As a national agenda, there has been much effort to build S&T information systems including NTIS and DTiMS that enable researchers, policy makers, or field users to analyze technological changes and promote the best policy practices for efficient workflow, knowledge sharing, strategy development, or institutional competitiveness. In this paper, the S&T Text Mining application to unmanned combat technology using INSPEC DB is empirically illustrated and shows that it is a feasible approach to identify emerging defense technology as well as the structure of knowledge network of the future technology candidates.