• Title/Summary/Keyword: Defense Information Technology

Search Result 962, Processing Time 0.036 seconds

A Tree Regularized Classifier-Exploiting Hierarchical Structure Information in Feature Vector for Human Action Recognition

  • Luo, Huiwu;Zhao, Fei;Chen, Shangfeng;Lu, Huanzhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1614-1632
    • /
    • 2017
  • Bag of visual words is a popular model in human action recognition, but usually suffers from loss of spatial and temporal configuration information of local features, and large quantization error in its feature coding procedure. In this paper, to overcome the two deficiencies, we combine sparse coding with spatio-temporal pyramid for human action recognition, and regard this method as the baseline. More importantly, which is also the focus of this paper, we find that there is a hierarchical structure in feature vector constructed by the baseline method. To exploit the hierarchical structure information for better recognition accuracy, we propose a tree regularized classifier to convey the hierarchical structure information. The main contributions of this paper can be summarized as: first, we introduce a tree regularized classifier to encode the hierarchical structure information in feature vector for human action recognition. Second, we present an optimization algorithm to learn the parameters of the proposed classifier. Third, the performance of the proposed classifier is evaluated on YouTube, Hollywood2, and UCF50 datasets, the experimental results show that the proposed tree regularized classifier obtains better performance than SVM and other popular classifiers, and achieves promising results on the three datasets.

Online Hop Timing Detection and Frequency Estimation of Multiple FH Signals

  • Sha, Zhi-Chao;Liu, Zhang-Meng;Huang, Zhi-Tao;Zhou, Yi-Yu
    • ETRI Journal
    • /
    • v.35 no.5
    • /
    • pp.748-756
    • /
    • 2013
  • This paper addresses the problem of online hop timing detection and frequency estimation of multiple frequency-hopping (FH) signals with antenna arrays. The problem is deemed as a dynamic one, as no information about the hop timing, pattern, or rate is known in advance, and the hop rate may change during the observation time. The technique of particle filtering is introduced to solve this dynamic problem, and real-time frequency and direction of arrival estimates of the FH signals can be obtained directly, while the hop timing is detected online according to the temporal autoregressive moving average process. The problem of network sorting is also addressed in this paper. Numerical examples are carried out to show the performance of the proposed method.

A Novel Electronic Voting Mechanism Based on Blockchain Technology

  • Chuan-Hao, Yang;Pin-Chang Su;Tai-Chang Su
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.10
    • /
    • pp.2862-2882
    • /
    • 2023
  • With the development of networking technology, it has become common to use various types of network services to replace physical ones. Among all such services, electronic voting is one example that tends to be popularized in many countries. However, due to certain concerns regarding information security, traditional paper voting mechanisms are still widely adopted in large-scale elections. This study utilizes blockchain technology to design a novel electronic voting mechanism. Relying on the transparency, decentralization, and verifiability of the blockchain, it becomes possible to remove the reliance on trusted third parties and also to enhance the level of trust of voters in the mechanism. Besides, the mechanism of blind signature with its complexity as difficult as solving an elliptic curve discrete logarithmic problem is adopted to strengthen the features related to the security of electronic voting. Last but not least, the mechanism of self-certification is incorporated to substitute the centralized certificate authority. Therefore, the voters can generate the public/private keys by themselves to mitigate the possible risks of impersonation by the certificate authority (i.e., a trusted third party). The BAN logic analysis and the investigation for several key security features are conducted to verify that such a design is sufficiently secure. Since it is expected to raise the level of trust of voters in electronic voting, extra costs for re-verifying the results due to distrust will therefore be reduced.

Application and Process Standardization of Terminology Dictionary for Defense Science and Technology (국방과학기술 전문용어 사전 구축을 위한 프로세스 표준화 및 활용 방안)

  • Choi, Jung-Hwoan;Choi, Suk-Doo;Kim, Lee-Kyum;Park, Young-Wook;Jeong, Jong-Hee;An, Hee-Jung;Jung, Han-Min;Kim, Pyung
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.8
    • /
    • pp.247-259
    • /
    • 2011
  • It is necessary to collect, manage and standardize defense and technology terminologies which are used by defense-related agencies in the field of national defense science and technology. The standardization of terminology dictionary can eliminate confusion about terminology and increase accessibility for the terminology by offline and online services. This study focuses on building national defense science and technology terminologies, publishing dictionary including them, and improving information analysis in defense area. as well as take advantage of offline and online services for easy accessibility for the terminology. Based on the results of this study, the terminology data will be used as follows; 1) Defence science and technology terminology databases and its publication. 2) Information analysis in military fields. 3) Multilingual information analysis translated terms in the thesauri. 4) Verification on the consistency of information processing. 5) Language resources for terminology extraction.

Stationary Distribution for the Mobilities in Catastrophe Rescue Scenario

  • Wang, Yong;Peng, Wei;Dou, Qiang;Gong, Zhenghu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.2
    • /
    • pp.308-326
    • /
    • 2013
  • Mobility Model has drawn more and more attentions since its critical role in Mobile Wireless Networks performance evaluation. This paper analyzes the mobility patterns in the catastrophe rescue scenario, and proposes the Random Waypoint with Base Point mobility model to model these characteristics. We mathematically analyze the speed and spatial stationary distributions of the nodes and derive explicit expressions for the one dimensional case. In order to keep the stationary distribution through the entire simulation procedure, we provide strategies to initialize the speed, location and destination of the nodes at the beginning of the simulation. The simulation results verify the derivations and the proposed methods in this paper. This work gives a deep understanding of the properties of the Random Waypoint with Base Point mobility model and such understanding is necessary to avoid misinterpretation of the simulation results. The conclusions are of practical value for performance analysis of mobile wireless networks, especially for the catastrophe rescue scenario.

Development of Quality Improvement Process based on the Maintenance Data of Weapon Systems (무기체계 정비 데이터를 활용한 품질 개선 프로세스 개발)

  • Kim, HunGil;Kwon, SeMin;Cho, KyoungHo;Sung, Si-Il
    • Journal of Korean Society for Quality Management
    • /
    • v.43 no.4
    • /
    • pp.499-510
    • /
    • 2015
  • Purpose: This paper treats the improvement of the quality and reliability of military weapon systems based on the maintenance data. Methods: The proposed method of the data integration and refinement are used to obtain the component reliability information and to find the frequently failed components based on the Pareto analysis. Based on the reliability information and the number of failed component frequencies, the target components of quality improvement are determined and improved by multiple methods such as engineering changes, special meetings, additional training and revising maintenance manuals. Results: Based on the proposed process, we find some components which need to be improved in order to enhance the quality and reliability. Conclusion: A process is developed for improving the quality and reliability of weapon systems. This process will be adopted by various weapon systems to enhance the quality and reliability, as well as reduce military spending.

Assessing Resilience of Inter-Domain Routing System under Regional Failures

  • Liu, Yujing;Peng, Wei;Su, Jinshu;Wang, Zhilin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1630-1642
    • /
    • 2016
  • Inter-domain routing is the most critical function of the Internet. The routing system is a logical network relying on the physical infrastructure with geographical characteristics. Nature disasters or disruptive accidents such as earthquakes, cable cuts and power outages could cause regional failures which fail down geographically co-located network nodes and links, therefore, affect the resilience of inter-domain routing system. This paper presents a model for regional failures in inter-domain routing system called REFER for the first time. Based on REFER, the resilience of the inter-domain routing system could be evaluated on a finer level of the Internet, considering different routing policies of intra-domain and inter-domain routing systems. Under this model, we perform simulations on an empirical topology of the Internet with geographical characteristics to simulate a regional failure locating at a city with important IXP (Internet eXchange Point). Results indicate that the Internet is robust under a city-level regional failure. The reachability is almost the same after the failure, and the reroutings occur at the edge of the Internet, hardly affecting the core of inter-domain routing system.

A Study on Forecasting the Diffusion of Certified Testing Service Institutions and Direction of Policy Making in Defense Industry (방산분야 공인시험기관의 수요확산 예측 및 정책 방향 연구)

  • Lee, Yong-Hak;Cho, Hyun-Ki;Kim, Woo-Je;Kang, Cho-Rong
    • IE interfaces
    • /
    • v.25 no.2
    • /
    • pp.255-263
    • /
    • 2012
  • In order to ensure the reliability and specialty of weapon system test results, a policy of extending certified testing service institutions has been driven by applying accreditation system of the ones in defense industry. Bass and Logistic models are used to apply the policy effectively and forecast the diffusion pattern of certified testing service institutions. The parameters for diffusion forecast are estimated using the diffusion pattern of certified testing service institutions in non-defense industry, and these are applied to forecast the diffusion of certified ones in defense industry. Coefficients of innovation and imitation of Bass model are analyzed to derive the factors influencing the early adoption and diffusion patterns. The more increasing the coefficients, the earlier adoption occurred. Diffusion pattern due to coefficient of imitation, internal factor, has larger effect on sensitivity of diffusion pattern. This means that the self recognition of necessity is more effectively worked than the policy or regulations driven by government.

A Study on the Explainability of Inception Network-Derived Image Classification AI Using National Defense Data (국방 데이터를 활용한 인셉션 네트워크 파생 이미지 분류 AI의 설명 가능성 연구)

  • Kangun Cho
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.2
    • /
    • pp.256-264
    • /
    • 2024
  • In the last 10 years, AI has made rapid progress, and image classification, in particular, are showing excellent performance based on deep learning. Nevertheless, due to the nature of deep learning represented by a black box, it is difficult to actually use it in critical decision-making situations such as national defense, autonomous driving, medical care, and finance due to the lack of explainability of judgement results. In order to overcome these limitations, in this study, a model description algorithm capable of local interpretation was applied to the inception network-derived AI to analyze what grounds they made when classifying national defense data. Specifically, we conduct a comparative analysis of explainability based on confidence values by performing LIME analysis from the Inception v2_resnet model and verify the similarity between human interpretations and LIME explanations. Furthermore, by comparing the LIME explanation results through the Top1 output results for Inception v3, Inception v2_resnet, and Xception models, we confirm the feasibility of comparing the efficiency and availability of deep learning networks using XAI.

Analysis Results in Technological Trends of Military Small Giant Venture Tech-Fi Net via Social Network Analysis (사회연결망 분석을 이용한 국방 강소벤처 Tech-Fi Net 기술동향 분석)

  • Park, Jae Woo;Lee, Il Ro;Kwon, Jae Wook;Byun, Kisik;Cho, Sung-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.444-455
    • /
    • 2019
  • The purpose of this research was to analyze technological trends of 「Military Small Giant Venture Tech-Fi Net」 from Defense Technology Information Service via social network analysis. 「Military Small Giant Venture Tech-Fi Net」, which was constituted for their fine technology for application to the military field, registered 847 technologies of 388 companies. In this research, we analyzed 847 technologies for the relations between "Military System" and "Military Technology Category" via centrality measurement, one of the social network analysis methods. The results indicate that the major technologies of domestic military small giant venture companies were "Sensor" and "ICT" for "C4I System" and "Surveillance and Reconnaissance System" and "Platform/Structure" for "Land System", "Aeronautical System" and "Naval Sea System". In contrast, we recognized inadequate technologies, such as "Propellant" and "Material" for "Missile and Ammunition system" and "Sensor" and "ICT" for "Defense System", We hope that our results and method will be conducive to the technological development of Small Giant Venture companies.