• Title/Summary/Keyword: Defense Strategy

Search Result 413, Processing Time 0.027 seconds

A study on Strengthening Cyber Capabilities According to the Digital Transformation in the Defense Sector (국방 디지털 전환에 따른 사이버역량 강화 방안 연구)

  • InJung Kim;Soojin Lee
    • Convergence Security Journal
    • /
    • v.21 no.4
    • /
    • pp.3-13
    • /
    • 2021
  • As new technologies such as artificial intelligence (AI), cloud, Internet of Things (IoT), big data, and mobile become organically integrated, a new era of digital transformation is emerging. As a result of this digital transformation, cybersecurity issues have surfaced as a negative side effect. Cyberspace, unlike physical space, has no clear limits, which leads to additional side effects and hazards. While promoting digital transformation in defense, conventional customs and behavioral approaches make it difficult to alter the cybersecurity strategy, even if it is vital to comprehend and prepare the attributes associated with time and technology trends. As a result, in this study, we will look at the direction of technology application in the defense as a result of digital transformation and analyze how to correlate from the standpoint of cybersecurity.

Development of vision-based soccer robots for multi-agent cooperative systems (다개체 협력 시스템을 위한 비젼 기반 축구 로봇 시스템의 개발)

  • 심현식;정명진;최인환;김종환
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1997.10a
    • /
    • pp.608-611
    • /
    • 1997
  • The soccer robot system consists of multi agents, with highly coordinated operation and movements so as to fulfill specific objectives, even under adverse situation. The coordination of the multi-agents is associated with a lot of supplementary work in advance. The associated issues are the position correction, prevention of communication congestion, local information sensing in addition to the need for imitating the human-like decision making. A control structure for soccer robot is designed and several behaviors and actions for a soccer robot are proposed. Variable zone defense as a basic strategy and several special strategies for fouls are applied to SOTY2 team.

  • PDF

New Fictitious Play Procedure For Solving Blotto Games (Blotto 게임을 풀기위한 새로운 근사해법 절차)

  • Lee, Jea-Yeong;Lee, Moon-Gul
    • Journal of the military operations research society of Korea
    • /
    • v.31 no.1
    • /
    • pp.107-121
    • /
    • 2005
  • In this study, a new fictitious play (FP) procedure is presented to solve two-person zero-sum (TPZS) Blotto games. The FP solution procedure solves TPZS games by assuming that the two players take turns selecting optimal responses to the opponent's strategy observed so far. It is known that FP converges to an optimal solution, and it may be the only realistic approach to solve large games. The algorithm uses dynamic programming (DP) to solve FP subproblems. Efficiency is obtained by limiting the growth of the DP state space. Blotto games are frequently used to solve simple missile defense problems. While it may be unlikely that the models presented in this paper can be used directly to solve realistic offense and defense problems, it is hoped that they will provide insight into the basic structure of optimal and near-optimal solutions to these important, large games, and provide a foundation for solution of more realistic, and more complex, problem

Analysis of High-Voltage EME and Design for EMC in Hybrid Electric Vehicle (전기추진 차량의 고전압 전자파 환경(EME) 분석과 전자파 적합성(EMC) 설계)

  • Lim, Jong-Kwang;Lee, Hyunju
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.5
    • /
    • pp.569-576
    • /
    • 2014
  • There were overwhelming high-frequency electromagnetic noises in 200kW-class hybrid electric vehicle(HEV) although EMC control strategy had been applied to cope with the electromagnetic noises during the development of HEV. This paper investigates the characteristics of the conducted and radiated emission noises, the source and path of noises, and the effects of EMI on the electronics. Finally the design concept of noise control is proposed.

A Study on Defense Information Security Management Structure for Digital Information Warfare (디지털 정보전에 대비한 국방정보보호업무 관리구조에 관한 연구)

  • Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.57-63
    • /
    • 2008
  • The purpose of the research is to intended to help Korean military officers establish information system security structure. Information security is a critical issue for digital information warfare. Advanced countries such as U.S. and Japan have developed a new military security strategy for future information warfare. The readiness of Korean Army, however, is far behind those countries. This paper provides a systematic information security structure for Korean Army, which is a result of the research through a group decision making process.

  • PDF

Analysis of Routing Protocol for Tactical Backbone of TICN (TICN 전술백본망을 위한 라우팅 프로토콜 분석)

  • Jang, Dong-Ki;Kwon, Tae-Wook
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.4
    • /
    • pp.650-658
    • /
    • 2010
  • Recently Korea Army developed the TICN which is the next army tactical communication system. The TICN will support ability from under environment, strategy maneuver communication system of integrated army dimension overcome and NCW. If the IER(Information Exchange Requirement) phases 3 of the future application system, the analysis that a transmission ability of the TICN is the uncapable is govern. The TICN tactical backbone's ability is very important. Therefore, network efficiency index in application and analysis of the standard protocol for the data transmission guarantee are obliged. For the TICN tactical backbone, this paper analyzes of routing protocol efficiency index and compares to superiority of the OSPF(v2) and integrated IS-IS protocols in the tactical environment. Conclusively we proposed that integrated IS-IS protocol is more suitable for TICN backbone routing protocol.

A study on the Improvement of the Defense R&D applying the CAIV Concept (CAIV개념을 적용한 국방연구개발 개선방안 연구)

  • 박재영;최석철
    • Journal of the military operations research society of Korea
    • /
    • v.27 no.2
    • /
    • pp.1-24
    • /
    • 2001
  • As the weapon systems of the 21st century are becoming more and more performance /technoloriven, it is only becoming more expensive to obtain the weapon systems. Therefore, it is absolutely vital for every nation to find a way to reduce cost objectives. As CAIV is a strategy that entails setting aggressive, yet realistic cost objectives when defining operational requirements and acquiring defense systems and managing achievement of these objectives, we believe that it is essential for us to find out what it is and how we can adopt it so that we can provide ourselves with highly capable systems that are affordable. Therefore, In this paper we will give a brief overview of CAIV that is one of the main acquisition strategies adopted by DoD of U.S. including some case studies of CAIV. Furthermore, the paper will analyze stated cost objectives in our country and suggest realistic opportunities for cost reduction.

  • PDF

Exploratory Study on Developmental Strategy of National Defense IT R&D (국방 IT R&D의 발전 전략에 관한 연구)

  • Oh, Tae Kon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.01a
    • /
    • pp.431-432
    • /
    • 2019
  • 국방분야에서의 연구개발을 통하여 무기체계 개발과 관련하여 얻어진 기술들은 국가의 안보유지에의 기여, 첨단기술의 시험무대로서의 기능, 민간부문 간의 기술이전을 통한 부가가치 창출 등의 차원에서 국방연구개발의 중요성이 증대되고 있다. 이에 무기체계개발에 있어서의 IT 국방연구개발의 활성화를 위한 발전전략을 제시하는데 연구의 목적을 두었다. 연구결과, 무기체계개발에 있어서의 IT 국방연구개발의 활성화를 위한 발전전략으로서 국방비 예산 중에서 국방 R&D 부문의 예산규모 확충, IT 중심의 무기체계 개발사업에 대해서 초기단계부터 IT관련 민간부문의 우수업체의 연구개발의 적극적인 참여를 통한 공동연구개발의 협력확대, 아직까지 효과가 미미한 신개념기술시범사업을 무기체계 연구개발에 보다 적극적인 차원에서 추진해야 할 것을 제시하였다.

  • PDF

Defending and Detecting Audio Adversarial Example using Frame Offsets

  • Gong, Yongkang;Yan, Diqun;Mao, Terui;Wang, Donghua;Wang, Rangding
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.4
    • /
    • pp.1538-1552
    • /
    • 2021
  • Machine learning models are vulnerable to adversarial examples generated by adding a deliberately designed perturbation to a benign sample. Particularly, for automatic speech recognition (ASR) system, a benign audio which sounds normal could be decoded as a harmful command due to potential adversarial attacks. In this paper, we focus on the countermeasures against audio adversarial examples. By analyzing the characteristics of ASR systems, we find that frame offsets with silence clip appended at the beginning of an audio can degenerate adversarial perturbations to normal noise. For various scenarios, we exploit frame offsets by different strategies such as defending, detecting and hybrid strategy. Compared with the previous methods, our proposed method can defense audio adversarial example in a simpler, more generic and efficient way. Evaluated on three state-of-the-arts adversarial attacks against different ASR systems respectively, the experimental results demonstrate that the proposed method can effectively improve the robustness of ASR systems.

2-Undecanone derived from Pseudomonas aeruginosa modulates the neutrophil activity

  • Jeong, Yu Sun;Huh, Sunghyun;Kim, Ji Cheol;Park, Ji Ye;Lee, ChaeEun;Kim, Min-Sik;Koo, JaeHyung;Bae, Yoe-Sik
    • BMB Reports
    • /
    • v.55 no.8
    • /
    • pp.395-400
    • /
    • 2022
  • Pseudomonas aeruginosa (P. aeruginosa) is a well-known Gramnegative opportunistic pathogen. Neutrophils play key roles in mediating host defense against P. aeruginosa infection. In this study, we identified a metabolite derived from P. aeruginosa that regulates neutrophil activities. Using gas chromatography-mass spectrometry, a markedly increased level of 2-undecanone was identified in the peritoneal fluid of P. aeruginosa-infected mice. 2-Undecanone elicited the activation of neutrophils in a Gαi-phospholipase C pathway. However, 2-undecanone strongly inhibited responses to lipopolysaccharide and bactericidal activity of neutrophils against P. aeruginosa by inducing apoptosis. Our results demonstrate that 2-undecanone from P. aeruginosa limits the innate defense activity of neutrophils, suggesting that the production of inhibitory metabolites is a strategy of P. aeruginosa for escaping the host immune system.