• Title/Summary/Keyword: Defense Strategy

Search Result 403, Processing Time 0.021 seconds

Proposal of the development plan for the ROK military data strategy and shared data model through the US military case study (미군 사례 고찰을 통한 한국군 데이터 전략 및 공유 데이터 모델 개발방안 제안)

  • Lee, Hak-rae;Kim, Wan-ju;Lim, Jae-sung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.6
    • /
    • pp.757-765
    • /
    • 2021
  • To carry out multi-domain operations included in the U.S. Department of Defense's national security strategy in 2018, timely data sharing between C4I systems is critical. Several studies of the Korean military have also raised the problems of interface and standardization between C4I systems, and it is necessary to establish a new plan to solve this problem. In this study, a solution to the problem was derived through case analysis that the U.S. Department of Defense has been pursuing for about 20 years to implement the data strategy after establishing the data strategy in 2003. and by establishing a data strategy suitable for the ROK military C4I system operating environment, developing a data model, selecting a standard for data sharing, and proposing a shared data development procedure, we intend to improve the data sharing capability between ROK military C4I systems.

A Study on Operational Method of a HMS (HMS 운용방안에 관한 연구)

  • Shin, Seoung Chul;Lee, Chul Mok
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.5
    • /
    • pp.586-593
    • /
    • 2012
  • The Navy is in the process of developing a sonar-operation strategy to increase the effectiveness of underwater target searching capability. HMS is the basic strategy to detect underwater targets. The advantages of HMS is that, it has a short preparation time to operate and can be always used regardless of sea conditions and weather. However, it is difficult to effectively detect underwater targets due to the interaction between marine environments and sonar-operations. During the research, the effectiveness of the HMS system's underwater target searching capability was analyzed by integrating various search and defense patterns, and environment conditions into the simulation. In the simulation the ship search an evasive target within a set region. The simulation presented results for an effective searching and defense methods of underwater targets. These research results can be used as foundation for advancing and improving the sonar operational tactics.

Improvement of Strategy Algorithm for Soccer Robot (축구 로봇의 전략 알고리즘 개선)

  • 김재현;이대훈;이성민;최환도;김중완
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2001.04a
    • /
    • pp.177-181
    • /
    • 2001
  • This paper presents an strategy algorithm of a soccer robot. We simply classified strategy of soccer robot as attack and defense. We use DC-motor in our Soccer Robot. We use the vision system made by MIRO team of Kaist and Soty team for image processing. Host computer is made by Pentium III. The RF module is used for the communication between each robot and the host computer. Fuzzy logic is applied to the path planning of our robot. We improve strategy algorithm of soccer robot. Here we explain improvement of strategy algorithm and fault of the our soccer robot system.

  • PDF

Unsupervised Single Moving Object Detection Based on Coarse-to-Fine Segmentation

  • Zhu, Xiaozhou;Song, Xin;Chen, Xiaoqian;Lu, Huimin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2669-2688
    • /
    • 2016
  • An efficient and effective unsupervised single moving object detection framework is presented in this paper. Given the sparsely labelled trajectory points, we adopt a coarse-to-fine strategy to detect and segment the foreground from the background. The superpixel level coarse segmentation reduces the complexity of subsequent processing, and the pixel level refinement improves the segmentation accuracy. A distance measurement is devised in the coarse segmentation stage to measure the similarities between generated superpixels, which can then be used for clustering. Moreover, a Quadmap is introduced to facilitate the refinement in the fine segmentation stage. According to the experiments, our algorithm is effective and efficient, and favorable results can be achieved compared with state-of-the-art methods.

The Design Strategy for Implementing the Integrated Defense Information Management Center (국방통합정보관리센터 설계)

  • Suh, Ye-Young;Kim, Young-Do;Ahn, Byung-Oh
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2005.11a
    • /
    • pp.516-520
    • /
    • 2005
  • 최근 국내 ${\cdot}$ 외적으로 통합데이터센터의 출현으로 전산운영 환경이 변화하고 있다. 우리군도 정보기술 추세에 따라 국방통합정보관리샌터 구축을 추진 중이나, 예산 부족과 현실적 적용의 어려움을 겪고 있다. 국방통합정보관리센터는 군의 정보자원 통합으로 기동성 보장과 단순화 및 정보화의 인프라를 제공하며, 향후 전장에서 무기체계 효과를 십분 발휘하기 위한 필수적 요소라 할 수 있다. 본 고에서는 우리 군의 국방통합정보관리센터 구축을 위한 추진 방안을 제시하고 방안별 비교를 통한 방안의 적절성을 검증하였다.

  • PDF

Background Subtraction for Moving Cameras based on trajectory-controlled segmentation and Label Inference

  • Yin, Xiaoqing;Wang, Bin;Li, Weili;Liu, Yu;Zhang, Maojun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4092-4107
    • /
    • 2015
  • We propose a background subtraction method for moving cameras based on trajectory classification, image segmentation and label inference. In the trajectory classification process, PCA-based outlier detection strategy is used to remove the outliers in the foreground trajectories. Combining optical flow trajectory with watershed algorithm, we propose a trajectory-controlled watershed segmentation algorithm which effectively improves the edge-preserving performance and prevents the over-smooth problem. Finally, label inference based on Markov Random field is conducted for labeling the unlabeled pixels. Experimental results on the motionseg database demonstrate the promising performance of the proposed approach compared with other competing methods.

Distributed Fusion Estimation for Sensor Network

  • Song, Il Young;Song, Jin Mo;Jeong, Woong Ji;Gong, Myoung Sool
    • Journal of Sensor Science and Technology
    • /
    • v.28 no.5
    • /
    • pp.277-283
    • /
    • 2019
  • In this paper, we propose a distributed fusion estimation for sensor networks using a receding horizon strategy. Communication channels were modelled as Markov jump systems, and a posterior probability distribution for communication channel characteristics was calculated and incorporated into the filter to allow distributed fusion estimation to handle path loss observation situations automatically. To implement distributed fusion estimation, a Kalman-Consensus filter was then used to obtain the average consensus, based on the estimates of sensors randomly distributed across sensor networks. The advantages of the proposed algorithms were then verified using a large-scale sensor network example.

A research on cyber kill chain and TTP by APT attack case study (APT 공격 사례 분석을 통한 사이버 킬체인과 TTP에 대한 연구)

  • Yoon, Youngin;Kim, Jonghwa;Lee, Jaeyeon;Yu, Sukdea;Lee, Sangjin
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.91-101
    • /
    • 2020
  • We analyzed APT attack cases that occurred overseas in the past using a cyber kill chain model and a TTP model. As a result of the analysis, we found that the cyber kill chain model is effective in figuring out the overall outline, but is not suitable for establishing a specific defense strategy, however, TTP model is suitable to have a practical defense system. Based on these analysis results, it is suggested that defense technology development which is based on TTP model to build defense-in-depth system for preparing cyber attacks.

Object Detection Accuracy Improvements of Mobility Equipments through Substitution Augmentation of Similar Objects (유사물체 치환증강을 통한 기동장비 물체 인식 성능 향상)

  • Heo, Jiseong;Park, Jihun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.3
    • /
    • pp.300-310
    • /
    • 2022
  • A vast amount of labeled data is required for deep neural network training. A typical strategy to improve the performance of a neural network given a training data set is to use data augmentation technique. The goal of this work is to offer a novel image augmentation method for improving object detection accuracy. An object in an image is removed, and a similar object from the training data set is placed in its area. An in-painting algorithm fills the space that is eliminated but not filled by a similar object. Our technique shows at most 2.32 percent improvements on mAP in our testing on a military vehicle dataset using the YOLOv4 object detector.

China's recent establishment of its ADIZ and its implications for regional security (중국의 방공식별구역(ADIZ) 선포와 역내 안보적 함의)

  • SHIN, Chang-Hoon
    • Strategy21
    • /
    • s.33
    • /
    • pp.148-177
    • /
    • 2014
  • The regional security and stability in Northeast Asia has become more complicated because of a sudden establishment of China's Air Defense Identification Zone (ADIZ) on 23 November 2013. One dimensional conflicts on the territorial sovereignty over the islands between the regional States has developed into the two dimensional conflicts like maritime delimitations among the States concerned since they have all ratified the 1982 United Nations Convention on the Law of the Sea which adopts the 200 nautical mile Exclusive Economic Zone regime. Moreover, due to the notion of the outer limit of the continental shelf, the conflicts have developed into three dimensional ones in order to acquire more natural resources even in the seabed. To make matters worse, such three dimensional conflicts have expanded to the airspace as well. The paper will analyze what implications the sudden declaration of China's ADIZ have for the regional security in Northeast Asia from the perspectives of public international law. To this end, the paper 1) starts with the debates on the legal nature of the ADIZ, 2) identifies the Chinese government's political motives for the establishment of the ADIZ over the East China Sea, 3) assesses the responses of the regional States and the USA to the China's establishment of the ADIZ, and then 4) discuss what implications the overlapped ADIZ of the three key States in the region have for the regional security and stability.