• Title/Summary/Keyword: Command&Control

Search Result 1,396, Processing Time 0.026 seconds

Proposal of Hostile Command Attack Method Using Audible Frequency Band for Smart Speaker (스마트 스피커 대상 가청 주파수 대역을 활용한 적대적 명령어 공격 방법 제안)

  • Park, Tae-jun;Moon, Jongsub
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.1-9
    • /
    • 2022
  • Recently, the functions of smart speakers have diversified, and the penetration rate of smart speakers is increasing. As it becomes more widespread, various techniques have been proposed to cause anomalous behavior against smart speakers. Dolphin Attack, which causes anomalous behavior against the Voice Controllable System (VCS) during various attacks, is a representative method. With this method, a third party controls VCS using ultrasonic band (f>20kHz) without the user's recognition. However, since the method uses the ultrasonic band, it is necessary to install an ultrasonic speaker or an ultrasonic dedicated device which is capable of outputting an ultrasonic signal. In this paper, a smart speaker is controlled by generating an audio signal modulated at a frequency (18 to 20) which is difficult for a person to hear although it is in the human audible frequency band without installing an additional device, that is, an ultrasonic device. As a result with the method proposed in this paper, while humans could not recognize voice commands even in the audible band, it was possible to control the smart speaker with a probability of 82 to 96%.

Development of Autonomous Behavior Software based on BDI Architecture for UAV Autonomous Mission (무인기 자율임무를 위한 BDI 아키텍처 기반 자율행동 소프트웨어 개발)

  • Yang, Seung-Gu;Uhm, Taewon;Kim, Gyeong-Tae
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.5
    • /
    • pp.312-318
    • /
    • 2022
  • Currently, the Republic of Korea is facing the problem of a decrease in military service resources due to the demographic cliff, and is pursuing military restructuring and changes in the military force structure in order to respond to this. In this situation, the Army is pushing forward the deployment of a drone-bot combat system that will lead the future battlefield. The battlefield of the future will be changed into an integrated battlefield concept that combines command and control, surveillance and reconnaissance, and precision strike. According to these changes, unmanned combat system, including dronebots, will be widely applied to combat situations that are high risk and difficult for humans to perform in actual combat. In this paper, as one of the countermeasures to these changes, autonomous behavior software with a BDI architecture-based decision-making system was developed. The autonomous behavior software applied a framework structure to improve applicability to multiple models. Its function was verified in a PC-based environment by assuming that the target UAV is a battalion-level surveillance and reconnaissance UAV.

Recommendation Model for Battlefield Analysis based on Siamese Network

  • Geewon, Suh;Yukyung, Shin;Soyeon, Jin;Woosin, Lee;Jongchul, Ahn;Changho, Suh
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.1
    • /
    • pp.1-8
    • /
    • 2023
  • In this paper, we propose a training method of a recommendation learning model that analyzes the battlefield situation and recommends a suitable hypothesis for the current situation. The proposed learning model uses the preference determined by comparing the two hypotheses as a label data to learn which hypothesis best analyzes the current battlefield situation. Our model is based on Siamese neural network architecture which uses the same weights on two different input vectors. The model takes two hypotheses as an input, and learns the priority between two hypotheses while sharing the same weights in the twin network. In addition, a score is given to each hypothesis through the proposed post-processing ranking algorithm, and hypotheses with a high score can be recommended to the commander in charge.

Efficient Visual Place Recognition by Adaptive CNN Landmark Matching

  • Chen, Yutian;Gan, Wenyan;Zhu, Yi;Tian, Hui;Wang, Cong;Ma, Wenfeng;Li, Yunbo;Wang, Dong;He, Jixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.4084-4104
    • /
    • 2021
  • Visual place recognition (VPR) is a fundamental yet challenging task of mobile robot navigation and localization. The existing VPR methods are usually based on some pairwise similarity of image descriptors, so they are sensitive to visual appearance change and also computationally expensive. This paper proposes a simple yet effective four-step method that achieves adaptive convolutional neural network (CNN) landmark matching for VPR. First, based on the features extracted from existing CNN models, the regions with higher significance scores are selected as landmarks. Then, according to the coordinate positions of potential landmarks, landmark matching is improved by removing mismatched landmark pairs. Finally, considering the significance scores obtained in the first step, robust image retrieval is performed based on adaptive landmark matching, and it gives more weight to the landmark matching pairs with higher significance scores. To verify the efficiency and robustness of the proposed method, evaluations are conducted on standard benchmark datasets. The experimental results indicate that the proposed method reduces the feature representation space of place images by more than 75% with negligible loss in recognition precision. Also, it achieves a fast matching speed in similarity calculation, satisfying the real-time requirement.

A Study on the Verification of Integrity of Message Structure in Naval Combat Management System

  • Jung, Yong-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.209-217
    • /
    • 2022
  • Naval CMS(Combat Management System) is linked to various sensors and weapon equipment and use DDS(Data Distribution Service) for efficient data communication between ICU(Interface Control Unit) Node and IPN(Information Processing Node). In order to use DDS, software in the system communicates in an PUB/SUB(Publication/Subscribe) based on DDS topic. If the DDS messages structure in this PUB/SUB method does not match, problems such as incorrect command processing and wrong information delivery occur in sending and receiving application software. To improve this, this paper proposes a DDS message structure integrity verification method. To improve this, this paper proposes a DDS message structure integrity verification method using a hash tree. To verify the applicability of the proposed method to Naval CMS, the message integrity verification rate of the proposed method was measured, and the integrity verification method was applied to CMS and the initialization time of the existing combat management system was compared and the hash tree generation time of the message structures was measured to understand the effect on the operation and development process of CMS. Through this test, It was confirmed that the message structure verification method for system stability proposed in this paper can be applied to the Naval CMS.

A Study on the Labor Director System of Public Institutions in the Degital Age

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.11
    • /
    • pp.231-239
    • /
    • 2022
  • The labor director system to be introduced into the company law, the labor director must be explained in the Korean company law and the inevitability of its introduction must be persuaded. Conflicts with shareholders' right to appoint institutions are also a task that must be resolved. Management has absolute meaning for shareholders who receive dividends from operating profit. On the other hand, for workers who are guaranteed the right to collective action and are paid for their labor according to the contract law and the labor law, the management must be considered as a partner in labor-management cooperation, so the labor director system may cause confusion. There are growing calls to create a system that can form a 'relationship of understanding, participation, and cooperation', away from the existing 'control and command'-centered manpower management that causes labor-management confrontation and the system can also serve as an opportunity to reduce harmful effects of high-handed personnel administration in public institutions.

An Analysis of the Operational Effectiveness of Target Acquisition Radar (포병 표적탐지 레이더 운용의 계량적 효과 분석)

  • Kang, Shin-Sung;Lee, Jae-Yeong
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.2
    • /
    • pp.63-72
    • /
    • 2010
  • In the future warfare, the importance of the counter-fire operation is increasing. The counter-fire operation is divided into offensive counter-fire operation and defensive counter-fire operation. Reviewing the researches done so far, the detection asset of offensive counter-fire operation called UAV(Unmanned Aerial Vehicle) and its operational effectiveness analysis is continually progressing. However, the analysis of the detection asset of defensive counterfire called Target Acquisition Radar(TAR) and its quantitative operational effectiveness are not studied yet. Therefore, in this paper, we studied operational effectiveness of TAR using C2 Theory & MANA Simulation model, and showed clear quantitative analysis results by comparing both cases of using TAR and not using TAR.

A Study on the Improvement of Steering Command System through Accident Analysis of Azimuth thruster using STAMP Method

  • HyunDong Kim;SangHoon Lee;JeongMin Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.9
    • /
    • pp.149-158
    • /
    • 2023
  • With the global paradigm shift towards climate change, the shipbuilding industry is also considering propulsion systems that utilize eco-friendly fuels various propulsion systems are gaining attention as a result. In conventional propulsion systems, typically consisting of propellers and rudders, have evolved into a diverse range of systems due to the development of a special propulsion system known as the azimuth thruster. While azimuth thrusters were previously commonly installed on tugboats, they are now extensively used on offshore plant operation ships equipped with dynamic positioning systems. However, these azimuth thrusters require different steering methods compared to conventional propulsion systems, leading to a significant learning curve for the crew members boarding such vessels. Furthermore the availability of education related to these special propulsion systems is limited. This study aims to analyze accidents caused by inadequate control of vessels equipped with azimuth thrusters using the STAMP technique. And it proposes the necessity of standard steering commands for the safe operation of vessels equipped with special propellers.

Unity Engine-based Underwater Robot 3D Positioning Program Implementation (Unity Engine 기반 수중 로봇 3차원 포지셔닝 프로그램 구현)

  • Choi, Chul-Ho;Kim, Jong-Hun;Kim, Jun-Yeong;Park, Jun;Park, Sung-Wook;Jung, Se-Hoon;Sim, Chun-Bo
    • Smart Media Journal
    • /
    • v.11 no.9
    • /
    • pp.64-74
    • /
    • 2022
  • A number of studies related to underwater robots are being conducted to utilize marine resources. However, unlike ordinary drones, underwater robots have a problem that it is not easy to locate because the medium is water, not air. The monitoring and positioning program of underwater robots, an existing study for identifying underwater locations, has difficulty in locating and monitoring in small spaces because it aims to be utilized in large spaces. Therefore, in this paper, we propose a three-dimensional positioning program for continuous monitoring and command delivery in small spaces. The proposed program consists of a multi-dimensional positioning monitoring function and a ability to control the path of travel through a three-dimensional screen so that the depth of the underwater robot can be identified. Through the performance evaluation, a robot underwater could be monitored and verified from various angles with a 3D screen, and an error within the assumed range was verified as the difference between the set path and the actual position is within 6.44 m on average.

Research on BGP dataset analysis and CyCOP visualization methods (BGP 데이터셋 분석 및 CyCOP 가시화 방안 연구)

  • Jae-yeong Jeong;Kook-jin Kim;Han-sol Park;Ji-soo Jang;Dong-il Shin;Dong-kyoo Shin
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.177-188
    • /
    • 2024
  • As technology evolves, Internet usage continues to grow, resulting in a geometric increase in network traffic and communication volumes. The network path selection process, which is one of the core elements of the Internet, is becoming more complex and advanced as a result, and it is important to effectively manage and analyze it, and there is a need for a representation and visualization method that can be intuitively understood. To this end, this study designs a framework that analyzes network data using BGP, a network path selection method, and applies it to the cyber common operating picture for situational awareness. After that, we analyze the visualization elements required to visualize the information and conduct an experiment to implement a simple visualization. Based on the data collected and preprocessed in the experiment, the visualization screens implemented help commanders or security personnel to effectively understand the network situation and take command and control.