• Title/Summary/Keyword: 보안부대

Search Result 53, Processing Time 0.018 seconds

A Study on the case of Application of Women's Personnel in the Australian Defence Force (호주군 여성인력의 활용과 우리군에 주는 시사점)

  • In-Chan Kim;Jong-Hoon Kim;Jun-Hak Sim;Kang-Hee Lee;Sang-Keun Cho;Sang-Hyuk Park;Myung-Sook Hong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.269-273
    • /
    • 2023
  • After participating in the Second Boer War in 1899, the Australian Army participated in world wars such as World War I, World War II, the Korean War, and the Vietnam War. To overcome the decline in the social recognition of soldiers and the continuous shortage of troops caused by the protracted war, the status and role of female personnel were expanded. The use of female manpower, which started as medical support during the Second Boer War, expanded to combat support missions such as communications, maintenance, driving, secret document management, and radar surveillance during World War II. After the Vietnam War, the Chiefs of Staff of the Australian Army, Navy and Air Force established a committee to expand women's participation in the military, improved service conditions for female personnel and supplemented regulations so that they were treated as soldiers, not women, and reached a turning point in expanding the role of female personnel in the Australian military. As a result, all combat positions, including special forces, were opened to women in 2014, and a plan was established to increase the proportion of women in each service by 2030. As a result, all combat positions, including special forces, were opened to women in 2014, and the Australian Armed Forces set a plan to increase the proportion of women by 2030. Like the Australian military, South Korea is also experiencing a demographic cliff and shortage of troops due to the continuing low birthrate problem. Through the history and current state of the use of female personnel in the Australian military, we would like to draw implications for the direction our military should go.

Adaptive Data Hiding Techniques for Secure Communication of Images (영상 보안통신을 위한 적응적인 데이터 은닉 기술)

  • 서영호;김수민;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.664-672
    • /
    • 2004
  • Widespread popularity of wireless data communication devices, coupled with the availability of higher bandwidths, has led to an increased user demand for content-rich media such as images and videos. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such communication. However, solutions that rely only on traditional compute-intensive security mechanisms are unsuitable for resource-constrained wireless and embedded devices. In this paper, we propose a selective partial image encryption scheme for image data hiding , which enables highly efficient secure communication of image data to and from resource constrained wireless devices. The encryption scheme is invoked during the image compression process, with the encryption being performed between the quantizer and the entropy coder stages. Three data selection schemes are proposed: subband selection, data bit selection and random selection. We show that these schemes make secure communication of images feasible for constrained embed-ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of data hiding achieved with the computation requirements imposed on the wireless devices. Experiments conducted on over 500 test images reveal that, by using our techniques, the fraction of data to be encrypted with our scheme varies between 0.0244% and 0.39% of the original image size. The peak signal to noise ratios (PSNR) of the encrypted image were observed to vary between about 9.5㏈ to 7.5㏈. In addition, visual test indicate that our schemes are capable of providing a high degree of data hiding with much lower computational costs.

A Research in Applying Big Data and Artificial Intelligence on Defense Metadata using Multi Repository Meta-Data Management (MRMM) (국방 빅데이터/인공지능 활성화를 위한 다중메타데이터 저장소 관리시스템(MRMM) 기술 연구)

  • Shin, Philip Wootaek;Lee, Jinhee;Kim, Jeongwoo;Shin, Dongsun;Lee, Youngsang;Hwang, Seung Ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.169-178
    • /
    • 2020
  • The reductions of troops/human resources, and improvement in combat power have made Korean Department of Defense actively adapt 4th Industrial Revolution technology (Artificial Intelligence, Big Data). The defense information system has been developed in various ways according to the task and the uniqueness of each military. In order to take full advantage of the 4th Industrial Revolution technology, it is necessary to improve the closed defense datamanagement system.However, the establishment and usage of data standards in all information systems for the utilization of defense big data and artificial intelligence has limitations due to security issues, business characteristics of each military, anddifficulty in standardizing large-scale systems. Based on the interworking requirements of each system, data sharing is limited through direct linkage through interoperability agreement between systems. In order to implement smart defense using the 4th Industrial Revolution technology, it is urgent to prepare a system that can share defense data and make good use of it. To technically support the defense, it is critical to develop Multi Repository Meta-Data Management (MRMM) that supports systematic standard management of defense data that manages enterprise standard and standard mapping for each system and promotes data interoperability through linkage between standards which obeys the Defense Interoperability Management Development Guidelines. We introduced MRMM, and implemented by using vocabulary similarity using machine learning and statistical approach. Based on MRMM, We expect to simplify the standardization integration of all military databases using artificial intelligence and bigdata. This will lead to huge reduction of defense budget while increasing combat power for implementing smart defense.