• Title/Summary/Keyword: Defense software

Search Result 476, Processing Time 0.025 seconds

Time-based Expert System Design for Coherent Integration Between M&S and AI (M&S와 AI간의 유기적 통합을 위한 시간기반 전문가 시스템 설계)

  • Shin, Suk-Hoon;Chi, Sung-Do
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.2
    • /
    • pp.59-65
    • /
    • 2017
  • Along with the development of M&S, modeling research utilizing AI technology is attracting attention because of the fact that the needs of fields including human decision making such as defense M&S are increased. Obviously AI is a way to solve complex problems. However, AI did not consider logical time such as input time and processing time required by M&S. Therefore, in this paper we proposed a "time-based expert system" which redesigned the representative AI technology rule-based expert system. It consists of a rule structure "IF-THEN-AFTER" and an inference engine, takes logical time into consideration. We also tried logical analysis using a simple example. As a result of the analysis, the proposal Time-based Expert System proved that the result changes according to the input time point and inference time.

Improved Image Matching Method Based on Affine Transformation Using Nadir and Oblique-Looking Drone Imagery

  • Jang, Hyo Seon;Kim, Sang Kyun;Lee, Ji Sang;Yoo, Su Hong;Hong, Seung Hwan;Kim, Mi Kyeong;Sohn, Hong Gyoo
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.38 no.5
    • /
    • pp.477-486
    • /
    • 2020
  • Drone has been widely used for many applications ranging from amateur and leisure to professionals to get fast and accurate 3-D information of the surface of the interest. Most of commercial softwares developed for this purpose are performing automatic matching based on SIFT (Scale Invariant Feature Transform) or SURF (Speeded-Up Robust Features) using nadir-looking stereo image sets. Since, there are some situations where not only nadir and nadir-looking matching, but also nadir and oblique-looking matching is needed, the existing software for the latter case could not get good results. In this study, a matching experiment was performed to utilize images with differences in geometry. Nadir and oblique-looking images were acquired through drone for a total of 2 times. SIFT, SURF, which are feature point-based, and IMAS (Image Matching by Affine Simulation) matching techniques based on affine transformation were applied. The experiment was classified according to the identity of the geometry, and the presence or absence of a building was considered. Images with the same geometry could be matched through three matching techniques. However, for image sets with different geometry, only the IMAS method was successful with and without building areas. It was found that when performing matching for use of images with different geometry, the affine transformation-based matching technique should be applied.

Efficient Load Balancing Technique Considering Data Generation Form and Server Response Time in SDN (SDN 환경에서의 데이터 생성 형태와 서버 응답시간을 고려한 효율적인 부하분산 기법)

  • Kim, Jong-Geon;Kwon, Tae-Wook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.4
    • /
    • pp.679-686
    • /
    • 2020
  • With global data totals expected to grow to 175 ZB by 2025, data processing capabilities in the network area are becoming more important. In particular, data centers are becoming more stubborn as data usage increases, and the load generated by incoming data should be appropriately distributed to reduce costs and efficiently operate. The SDN technology, which emerged to overcome the limitations of the existing network system, removes rigidity of the Legacy system by separating H/W and S/W from the network equipment, and can be effectively applied to load balancing in the data center using S/W-based flexibility. In this paper, we propose ways to increase efficiency by classifying data received from users by type by utilizing SDN technology, and transmitting and processing classified data in order of response speed of servers in the data center.

Design and Implementation of the Conversion Rule between XML and MTF Messages (MTF 메시지와 XML간 상호변환 규칙 설계 및 구현)

  • Park, In-Soo;Yoon, Hee-Byung
    • The KIPS Transactions:PartD
    • /
    • v.12D no.5 s.101
    • /
    • pp.781-788
    • /
    • 2005
  • MTF message is the normalized and standardized format which is used in the time when it tries to transmit data to other systems or exchanges needed information in defense message systems. XML can support variety of search functionality and is estimated to be the best way from the view of efficient presentation and exchange in internet based environment, based on advantage which is independent of hardware and software. US army brought in XML-MTF combining with XML based technology, but we do not contain such a MTF system, and necessity of MTF is increasing for combined operation between ROK and US as a lot of C4I system were transferred to Web based systems. In this paper, we make analysis of fundamental structure, organization of paragraph, witting regulation of MTF message. We present the rule of naming element and fundamental mapping rule for transformation of its XML based on it. Also, we prove that MTF message can be transformed to XML document by trying to transforming sample documents to XML document applying presented mapping rule, creating MTF message based on it and implement program which can automatically transform them to XML-MTF.

Design of Hybrid Communication Structure for Video Transmission in Drone Systems (드론 영상 전송용 하이브리드 통신 구조의 설계)

  • Kim, Won
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.11
    • /
    • pp.9-14
    • /
    • 2019
  • In modern society drones are actively utilized in the fields of security, defense, agriculture, communication and so on. Smart technology and artificial intelligence software have been developed with convergence, and the field of use is expected to expand further. On the point of the excellent performance of drones one of the essential technologies is the wireless communication that make the ground facility receive the video streaming obtained by the drones in the air. In the research the concept of communication region is proposed to cover the both the low altitude region for Wi-Fi communication and the high altitude region for LTE communication for the sake of video transmission. Also the hybrid communication structure is designed along the proposed concept and the proposed system is implemented as a communication system in the small size which can be mounted in a small size of drone. It is confirmed that the proposed system contains the effectiveness by showing the ability to successfully transmit HD video streaming in the range of 500 meters and the transfer time between two different communication systems is measured in 200msec by the experiments.

A Study on the Near-Field Simulation Method for AESA RADAR using a Single Beam-Focusing LUT (단일 빔 집속 LUT를 이용한 AESA 레이다의 근전계 시뮬레이션 기법)

  • Ju, Hye Sun
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.2
    • /
    • pp.81-88
    • /
    • 2019
  • Since the AESA radar scans and tracks a distant targets or ground, it requires a test field which meets far-field condition before flight test. In order to test beam foaming, targeting, and availability from cluttering and jamming, it is general to build a outdoor roof-lab test site at tens of meters high. However, the site is affected by surrounding terrain, weather, and noise wave and is also requires time, space, and a lot of costs. In order to solve this problem, theoretical near-field beam foaming method has proposed. However, it requires modification of associated hardware in order to construct near-field test configuration. In this paper, we propose near-field beam foaming method which use single LUT in order to calibrate the variation of TRM(transmit-receive module) which consists AESA radar without modification of associated hardware and software. It requires less costs than far-field test and multiple LUT based near-field test, nevertheless it can derives similar experimental results.

Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures

  • Bahrami, Pooneh Nikkhah;Dehghantanha, Ali;Dargahi, Tooska;Parizi, Reza M.;Choo, Kim-Kwang Raymond;Javadi, Hamid H.S.
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.865-889
    • /
    • 2019
  • The need for cyber resilience is increasingly important in our technology-dependent society where computing devices and data have been, and will continue to be, the target of cyber-attackers, particularly advanced persistent threat (APT) and nation-state/sponsored actors. APT and nation-state/sponsored actors tend to be more sophisticated, having access to significantly more resources and time to facilitate their attacks, which in most cases are not financially driven (unlike typical cyber-criminals). For example, such threat actors often utilize a broad range of attack vectors, cyber and/or physical, and constantly evolve their attack tactics. Thus, having up-to-date and detailed information of APT's tactics, techniques, and procedures (TTPs) facilitates the design of effective defense strategies as the focus of this paper. Specifically, we posit the importance of taxonomies in categorizing cyber-attacks. Note, however, that existing information about APT attack campaigns is fragmented across practitioner, government (including intelligence/classified), and academic publications, and existing taxonomies generally have a narrow scope (e.g., to a limited number of APT campaigns). Therefore, in this paper, we leverage the Cyber Kill Chain (CKC) model to "decompose" any complex attack and identify the relevant characteristics of such attacks. We then comprehensively analyze more than 40 APT campaigns disclosed before 2018 to build our taxonomy. Such taxonomy can facilitate incident response and cyber threat hunting by aiding in understanding of the potential attacks to organizations as well as which attacks may surface. In addition, the taxonomy can allow national security and intelligence agencies and businesses to share their analysis of ongoing, sensitive APT campaigns without the need to disclose detailed information about the campaigns. It can also notify future security policies and mitigation strategy formulation.

Optimization of Voice Coil Motors for a Small Guided Missile Fin Actuator (소형 유도무기 날개 작동기용 보이스 코일 모터의 최적 설계)

  • Lee, Choong Hee;Kim, Gwang Tae;Lee, Byung Ho;Cho, Young Ki
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.47 no.1
    • /
    • pp.59-65
    • /
    • 2019
  • In this study, optimal design of direct-drive VCMs (Voice Coil Motor) for a missile fin actuator is carried out. The torque performance and the characteristics of the VCM are predicted by commercial electromagnetic analysis software, ANSYS Maxwell. The optimal design is obtained at the minimum and maximum actuating angles where the aerodynamic load acting on the fin is the largest in the operating range. The critical variables of the actuator is designed and the RSM (Response Surface Method) is used for the optimization. The response surface model consists of second-order functions and its experimental points are selected by a central composite design. This design is widely used for fitting a second-order response surface. The adjustment regression coefficients is computed for adequacy checking of the response surface model. Finally, the torque values obtained by the RSM and the ANSYS Maxwell are shown in good agreement.

The Model to Implement the Cyber Security Policy and Strategy for Azerbaijan Information System (아제르바이잔 정보시스템에 대한 사이버보안 정책과 전략의 실행모델 구축)

  • Aliyeva, Leyla Mehdi;Hwang, Gee-Hyun
    • Journal of Digital Convergence
    • /
    • v.17 no.5
    • /
    • pp.23-31
    • /
    • 2019
  • This study aims to build an AHP model that evaluates the priority of cyber security policies for the Azerbaijan information system. For this, 4 factors were constructed from components of ITU National Interest Model, whereas 5 alternatives were based on the best practices of the eight developed countries leading the cyber security field. Using the questionnaire, 24 security experts evaluated the strategic priority of such factors or alternatives. The analysis results using the AHP software showed that homeland defense and economic well-being were the dominant aspects of cyber security policy, whereas capacity building and infrastructure were the main concern of cyber security elements for Azerbaijan. This study presents the strategic priority of cyber security policies that can be adopted by Azerbaijan government. This study can contribute to developing the national cyber security guide of Azerbaijan.

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.