• Title/Summary/Keyword: Active Defense

Search Result 344, Processing Time 0.022 seconds

Review on improving measurement of cyber terror management system

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.6
    • /
    • pp.89-96
    • /
    • 2016
  • Damage and attack size of cyber terror is growing to the national size. Not only targeting at a certain companies or individuals but number of cyber terror targeting government bodies or unspecific people is increasing. This is because compared to traditional weapon, input cost is very cheap but ripple effect and shock are much stronger, affecting not only certain groups but also each individuals. 'Anti-terror measurement for protection of nation and public safety' passed last month is one of the renowned measurement passed regardless of objection from opposition party. The opposition party went against this through filibuster for 192 hours but this finally passed National Congress due to lack of oppositions. Korean government is taking post actions after passage of anti-terror measurement. Legislation of enforcement ordinance and regulations is due by 6th of next month. This regulation will be executed from June 4th after legislation. Whenever there is any security issues such as hacking of Korea Hydro and Nuclear Power and National Intelligence Service happens, lot of attention is made to those hackers. However, social recognition or management of those hackers need lot more improvement. Especially, as market of internet of things is increasing, there is an increased anxiety on information security. But as we only rely on security solutions, this problems are keep happening. Therefore, active investment on nurturing hackers who play the role of 'spear and shield' shall be made. Government should put more efforts to allow white hackers to show their abilities. We should have a policy for supporting high-quality programs such as BoB. To make information protection industry into future growth engine, it is necessary to nurture professionals for information protection and white hackers through special programs. Politicians should make related regulations as soon as possible to remove factors that prevent swift management of cyber attack due to lack of legislation. Government should pay lot more financial investment to nurturing professional manpower than now. Protecting life and asset of nation is responsibility and duty of our government. We all should recognize that controlling cyber attack is a part of national defense.

Software Development Effort Estimation Using Function Point (기능점수를 이용한 소프트웨어 개발노력 추정)

  • Lee, Sang-Un;Gang, Jeong-Ho;Park, Jung-Yang
    • The KIPS Transactions:PartD
    • /
    • v.9D no.4
    • /
    • pp.603-612
    • /
    • 2002
  • Area of software measurement in software engineering is active more than thirty years. There is a huge collection of researches but still no concrete software development effort and cost estimation model. If we want to measure the effort and cost of a software project, we need to estimate the size of the software. A number of software metrics are identified in the literature; the most frequently cited measures are LOC (line of code) and FPA (function point analysis). The FPA approach has features that overcome the major problems with using LOC as a measure of system size. This paper presents simple linear regression model that related software development effort to software size measured in FP. The model is derived from the plotting of the effort and FP relation. The experimental data are collected from 789 software development projects that were recently developed under the various development environments and development methods. Also, the model is compare with other regression analysis model. The presented model has the best estimation ability among the software effort estimation models.

Development of the System Controller for the Airborne Small SAR (KOMSAR) (항공기탑재 소형 영상레이더 (KOMSAR) 시스템 제어기 개발)

  • Hwang, Yong-Chul;Lee, Cheol-Hoon
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.33 no.3
    • /
    • pp.86-92
    • /
    • 2005
  • Synthetic Aperture Radar is an active sensor utilizing the microwaves in order to get the requested high resolution imageries day or night regardless of the weather conditions. In this paper, the architecture of a real-time system controller for the airborne small SAR system, KOrea Miniature SAR which was developed by Agency for Defense Development is proposed considering the embedded real-time environment. The main purpose of the system controller is to control the internal and the rest of subsystem within SAR system in real-time. The main characteristics of the proposed system controller were implemented using the real-time operating system and the distributed hardware architecture for the small, low weight and real-time operation. The system controller performance and real-time operation were verified and confirmed by the demo flight with the KT-1 airplane.

Human Cytomegalovirus Inhibition of Interferon Signal Transduction

  • Miller, Daniel M.;Cebulla, Colleen M.;Sedmak, Daniel D.
    • Journal of Microbiology
    • /
    • v.38 no.4
    • /
    • pp.203-208
    • /
    • 2000
  • Cytomegalovirus (CMV), a beta-herpesvirus with worldwide distribution, exhibits host persistence, a distinguishing characteristic of all herpesviruses. This persistence is dependent upon restricted gene expression in infected cells as well as the ability of productively infected cells to escape from normal cell-mediated anti-viral immunosurveillance. Type I (IFN-$\alpha$/$\beta$) and type II (IFN-γ) interferons are major components of the innate defense system against viral infection. They are potent inducers of MHC class I and II antigens and of antigen processing proteins. Additionally, IFNS mediate direct antiviral effects through induction effector molecules that block viral infection and replications such as 2', 5-oligoadenylate synthetase (2, 5-OAS). IFNS function through activation of well-defined signal transduction pathways that involve phosphorylation of constituent proteins and ultimate formation of active transcription factors. Recent studies have shown that a number of diverse viruses, including CMV, EBV, HPV mumps and Ebola, are capable of inhibiting IFN-mediated signal transduction through a variety of mechanisms. As an example, CMV infection inhibits the ability of infected cells Is transcribe HLA class I and II antigens as well as the antiviral effector molecules 2, 5-OAS and MxA I. EMSA studies have shown that IFN-$\alpha$ and IFN-γ are unable to induce complete signal transduction in the presence of CMV infection, phenomena that are associated with specific decreases in JAKl and p48. Viral inhibition of IFN signal transduction represents a new mechanistic paradigm for increased viral survival, a paradigm predicting widespread consequences in the case of signal transduction factors common to multiple cytokine pathways.

  • PDF

A Study on the Green Camp operation and improvement plan for the healing of army division-level maladjusted soldier (육군 사단급 복무 부적응 병사 치유를 위한 그린캠프 운영 개선방안)

  • Park, Ki-Yeon;Namgoong, Seung-pil;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.4
    • /
    • pp.61-65
    • /
    • 2019
  • This study analyzed the post-training satisfaction level and changes in their thinking of 202 maladjusted soldiers who participated in Green Camp from 2017 to 2018 through survey, and the operational status of Green Camp to 350 military officials. In addition, general matters of military official, matters concerning soldiers entering the Green Camp, matters concerning the use of the Green Camp, and matters related to the consultation of soldiers in their relevant units were analyzed through technical statistics. On March 17, 2019, the Department of Defense identified 6,118 98.4% of the 6,214 maladjusted soldiers with active duty failed to complete military service and discharged, among them, 66% or 4,014 reportedly experienced maladjustment. Therefore, it is necessary to earlier identify soldiers who are discharged due to maladjustment, to apply various methods such as education and career guide by civil expert, to conduct timely education through civil professional hospital so that they can complete their military service normally.

Analysis of the Flight Trajectory Characteristics of North Korea SLBM (북한 SLBM의 비행특성 해석)

  • Lee, Kyoung-Haing;Seo, Hyeong-Pil;Kwon, Yong-Soo;Kim, Jiwon
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.3
    • /
    • pp.9-16
    • /
    • 2015
  • This research focuses on analysis of the flight trajectory characteristics of SLBM (Submarine Launched Ballistic Missile) of North Korea. Recently, North Korea tested launching of SLBM which is threatening international security. Also it is known that North Korea had possessed the technologies about SLBM since they disassembled submarines out of commission of the former Soviet Union. If the development of the SLBM of North Korea is completed, it should be affected as asymmetric threat to South Korea. Therefore, for active respondence to these threat, it is essential to analyze the SLBM systematically. In this point of view, this work made a SLBM flight model and simulated. In addition, we controled flight trajectories according to adjusting loft angle and described their characteristics. The sea-based ballistic missile defense system is required for an effective response to the flight trajectory of the SLBM from mid-course to terminal phase.

Study on Beamforming of Conformal Array Antenna Using Support Vector Regression (Support Vector Regression을 이용한 컨포멀 배열 안테나의 빔 형성 연구)

  • Lee, Kang-In;Jung, Sang-Hoon;Ryu, Hong-Kyun;Yoon, Young-Joong;Nam, Sang-Wook;Chung, Young-Seek
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.29 no.11
    • /
    • pp.868-877
    • /
    • 2018
  • In this paper, we propose a new beamforming algorithm for a conformal array antenna based on support vector regression(SVR). While the conventional least squares method(LSM) considers all sample errors, SVR considers errors beyond the given error bound to obtain the optimum weight vector, which has a sparse solution and the advantage of the minimization of the overfitting problem. To verify the performance of the proposed algorithm, we apply SVR to the experimentally measured active element patterns of the conformal array antenna and obtain the weights for beamforming. In addition, we compare the beamforming results of SVR and LSM.

An Efficient Hand Gesture Recognition Method using Two-Stream 3D Convolutional Neural Network Structure (이중흐름 3차원 합성곱 신경망 구조를 이용한 효율적인 손 제스처 인식 방법)

  • Choi, Hyeon-Jong;Noh, Dae-Cheol;Kim, Tae-Young
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.14 no.6
    • /
    • pp.66-74
    • /
    • 2018
  • Recently, there has been active studies on hand gesture recognition to increase immersion and provide user-friendly interaction in a virtual reality environment. However, most studies require specialized sensors or equipment, or show low recognition rates. This paper proposes a hand gesture recognition method using Deep Learning technology without separate sensors or equipment other than camera to recognize static and dynamic hand gestures. First, a series of hand gesture input images are converted into high-frequency images, then each of the hand gestures RGB images and their high-frequency images is learned through the DenseNet three-dimensional Convolutional Neural Network. Experimental results on 6 static hand gestures and 9 dynamic hand gestures showed an average of 92.6% recognition rate and increased 4.6% compared to previous DenseNet. The 3D defense game was implemented to verify the results of our study, and an average speed of 30 ms of gesture recognition was found to be available as a real-time user interface for virtual reality applications.

Detection Performance Analysis of Underwater Vehicles by Long-Range Underwater Acoustic Communication Signals (장거리 수중 음향 통신 신호에 의한 수중 운동체 피탐지 성능 분석)

  • Hyung-Moon, Kim;Jong-min, Ahn;In-Soo, Kim;Wan-Jin, Kim
    • Journal of the Korea Society for Simulation
    • /
    • v.31 no.4
    • /
    • pp.11-22
    • /
    • 2022
  • Unlike a short-range, a long-range underwater acoustic communication(UWAC) uses low frequency signal and deep sound channel to minimize propagation loss. In this case, even though communication signals are modulated using a covert transmission technique such as spread spectrum, it is hard to conceal the existence of the signals. The unconcealed communication signal can be utilized as active sonar signal by enemy and presence of underwater vehicles may be exposed to the interceptor. Since it is very important to maintain stealthiness for underwater vehicles, the detection probability of friendly underwater vehicles should be considered when interceptor utilizes our long-range UWAC signal. In this paper, we modeled a long-range UWAC environment for analyzing the detection performance of underwater vehicles and proposed the region of interest(ROI) setup method and the measurement of detection performance. By computer simulations, we yielded parameters, analyzed the detection probability and the detection performance in ROI. The analysis results showed that the proposed detection performance analysis method for underwater vehicles could play an important role in the operation of long-range UWAC equipment.

A study on the datalink Interface between fighter jet RADAR and BVR AA guided missile (전투기 레이다의 시계 외 중거리 공대공 유도탄 데이터링크 연동방안 연구)

  • Yong-min Kim
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.4
    • /
    • pp.453-456
    • /
    • 2023
  • Fighter jets employ guided missiles equipped with seekers to counter enemy air threats. Short range guided missiles(SRM) usually carry infrared(IR) seekers and are used to engage targets within visual range. On the other hand, medium range guided missiles(MRM) often utilize radio frequency(RF) seekers to engage targets beyond visual range. Medium range guided missiles do not activate their seekers until they reach the detection range of the seeker, and the aircraft's radar guides them for a certain distance. This guidance method is called Missile Data Link(MDL), and it can be implemented in either one-way or two-way communication modes, depending on the missile's communication system. In this paper, we discuss MDL based on these two communication modes, along with the integration of RADAR, mission computers, and guided missiles.