• Title/Summary/Keyword: Military Information Systems

Search Result 539, Processing Time 0.024 seconds

A Measurement Study of User Behavior and File Pollution in DHT-based P2P Networks (DHT 기반의 P2P 네트워크에서 사용자 행동양식 및 파일 오염에 관한 측정 연구)

  • Shin, Kyu-Yong;Yoo, Jin-Cheol;Lee, Jong-Deog
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.3
    • /
    • pp.131-140
    • /
    • 2011
  • File pollution (i.e., sharing of corrupted files, or contaminating index information with bogus index records) is a de facto problem in many file sharing Peer-to-Peer (P2P) systems in use today. Since pollution squanders network resources and frustrates users with unprofitable downloads (due to corrupted files) and unproductive download trials (due to bogus index records), the viability of P2P systems (and similar distributed information-sharing applications) is questionable unless properly addressed. Thus, developing effective anti-pollution mechanisms is an immediate problem in this literature. This paper provides useful information and deep insight with future researchers who want to design an effective anti-pollution mechanism throughout an extensive measurement study of user behavior and file pollution in a representative DHT-based P2P system, the Kad network.

A Study on an Audit Model for the Defense Information System security using BS7799 (BS7799(정보보안관리 표준)를 적용한 국방정보체계 보안감사모델에 관한 연구)

  • 최장욱;남길현
    • Journal of the military operations research society of Korea
    • /
    • v.27 no.1
    • /
    • pp.89-100
    • /
    • 2001
  • Information technology has been made remarkable progress and most of computer systems are connected with internet over the world. We have not only advantages to access them easy, but also disadvantages to misuse information, abuse, crack, and damage privacy. We should have safeguards to preserve confidentiality, integrity and availability for our information system. Even tough the security is very important for the defense information system, we should not over limit users availability. BS7799, a British standard, is an evaluation criteria for information security management. In this paper we propose an audit model to manage and audit information security using control items of BS7799, which could be useful to mange the defence information system security. We standardize audit items, and classify them by levels, and degrees by using appropriate audit techniques / methods / processes.

  • PDF

The Study on the Construction of the Continuous Preventive Audit System for the Military Organization (군 조직의 상시 예방 감사시스템 구축방안 연구)

  • Hak-San No;Seung-Hyun Kim;Sang-Hyuk Park
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.1
    • /
    • pp.204-215
    • /
    • 2023
  • Purpose: In this study, it was proposed a plan to build the Continuous Preventive Audit System in the military Organization with the expectation that we will develop an efficient audit method under the rapidly changing audit and work environment in the future. Method: it was examined the realities and problems of the military self-audit, the cases of the Continuous Preventive Audit System currently being used by government departments and institutions and internal control inspection of the information system of the Foreign Audit Office. Result: Government departments, agencies, and foreign auditors have established a Continuous Preventive Audit System to overcome the problems and limitations of their own audits, ensuring accounting accident prevention and audit work efficiency and are focused on auditing internal controls of information systems. Conclusion: In the future, more specific studies on the design of detailed scenarios for each function of defense work and the research and analysis on the improvement of defense information system should be followed for the establishment and settlement of a more specific Continuous Preventive Audit System.

The Architecture Model for Defense Systems Test Works based on Systems Engineering (SE기반 무기체계 시험업무 아키텍처 모델 연구)

  • Taeheum Na;Dongeun Heo;Youngmin Kim;Jooyeoun Lee
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.2
    • /
    • pp.203-212
    • /
    • 2024
  • This paper describes the establishment of defense systems test works architecture model for the efficient operation of an expanded test organization and the provision of standardized test services after the integration of proving grounds in ADD. The system engineering vee model is applied to the defense system test works to define the project management model and the unit-test management model. In order to establish the defense systems test works architecture model, the process flow of test works, artifacts by life cycle, and interrelations between regulations and test works are explained, and Integrated Test Information System for implementation of architecture model is discussed. Through the defense systems test works architecture model presented in this study, it will contribute to quickly responding to the test requirements of complex and diverse defense systems, efficiently managing projects, and providing standardized test services.

A Study on a Model of Defense Information Resource Management Structure from the Viewpoint of System's Approach (시스템적 관점에서 본 국방정보관리 구조 모델에 관한 연구)

  • 권문택
    • Journal of the military operations research society of Korea
    • /
    • v.24 no.2
    • /
    • pp.17-29
    • /
    • 1998
  • This paper is to aimed to design a model of Korea defense information resource management structure from the viewpoint of system's approach, especially focusing on planning/programming procedures, organizational structure and business process re-engineering. The author analyzed current projects and plans on the field of Korea defense information systems, for finding what kinds of problems and why the problems occurred. The author concluded that many problems came from wrong approach of previous information resource management. Highlights of the proposed model are as follows: 1) Planning and programming structure must be considered as a major information resources and it must be managed as a key role through the whole system life cycle; 2) Organizational structure should be properly set up for managing and implementing information system projects; 3) Business process should also be analyzed thoroughly for re-engineering and innovating current inefficient organizational structure. These three additional viewpoints added to previous model for improving Korea defense information resource management.

  • PDF

Development of Quality Improvement Process based on the Maintenance Data of Weapon Systems (무기체계 정비 데이터를 활용한 품질 개선 프로세스 개발)

  • Kim, HunGil;Kwon, SeMin;Cho, KyoungHo;Sung, Si-Il
    • Journal of Korean Society for Quality Management
    • /
    • v.43 no.4
    • /
    • pp.499-510
    • /
    • 2015
  • Purpose: This paper treats the improvement of the quality and reliability of military weapon systems based on the maintenance data. Methods: The proposed method of the data integration and refinement are used to obtain the component reliability information and to find the frequently failed components based on the Pareto analysis. Based on the reliability information and the number of failed component frequencies, the target components of quality improvement are determined and improved by multiple methods such as engineering changes, special meetings, additional training and revising maintenance manuals. Results: Based on the proposed process, we find some components which need to be improved in order to enhance the quality and reliability. Conclusion: A process is developed for improving the quality and reliability of weapon systems. This process will be adopted by various weapon systems to enhance the quality and reliability, as well as reduce military spending.

Radio Link Modem System Architecture Design for Korean Tactical Data Link System Implementation (한국형 전술데이터링크 시스템 구현을 위한 무선모뎀 시스템 설계)

  • Choi, Hyo-Ki;Jang, Ho-Joon;Song, Young-Hwan;Jang, Dhong-Woon;Joo, Jae-Woo;Seo, Nan-Sol
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.6
    • /
    • pp.789-796
    • /
    • 2013
  • Next Generation Weapon system from the center of the platform to share information in real-time Network Centric Warfare(NCW: Network Centric Warfare) has been changed. Data link system is defined as a network. That is, all in real-time battlefield information is to enable sharing. Data link system is classified as a precision strike, Monitoring/control, control of a Patriot missile battery systems. These systems are most effective in a Joint warfare and precision strike. Data Link Systems(Data Communications) implementation is accomplished by using the KDLM(Korean Data Link Modem) and Radio Transceiver. KDLM is operated in conjunction with the legacy Radios(re-using fielded HF/VHF/UHF radio systems). In this paper, we describe in terms of KDLM system design. In this paper, the proposed design structure is how to effectively interact with legacy various radio. First, The results provide an analysis of that Dynamic TDMA system and apply modem structure. Radio characteristics data are necessary for an effective TDMA system design. This article analyzes the test results and describes the structure to improve the receive performance.

Preemptive Failure Detection using Contamination-Based Stacking Ensemble in Missiles

  • Seong-Mok Kim;Ye-Eun Jeong;Yong Soo Kim;Youn-Ho Lee;Seung Young Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.5
    • /
    • pp.1301-1316
    • /
    • 2024
  • In modern warfare, missiles play a pivotal role but typically spend the majority of their lifecycle in long-term storage or standby mode, making it difficult to detect failures. Preemptive detection of missiles that will fail is crucial to preventing severe consequences, including safety hazards and mission failures. This study proposes a contamination-based stacking ensemble model, employing the local outlier factor (LOF), to detect such missiles. The proposed model creates multiple base LOF models with different contamination values and combines their anomaly scores to achieve a robust anomaly detection. A comparative performance analysis was conducted between the proposed model and the traditional single LOF model, using production-related inspection data from missiles deployed in the military. The experimental results showed that, with the contamination parameter set to 0.1, the proposed model exhibited an increase of approximately 22 percentage points in accuracy and 71 percentage points in F1-score compared to the single LOF model. This approach enables the preemptive identification of potential failures, undetectable through traditional statistical quality control methods. Consequently, it contributes to lower missile failure rates in real battlefield scenarios, leading to significant time and cost savings in the military industry.

The Study of Automatic TOD Synchronization for Air-Ground Radio Performance Improving in Legacy Aircraft (항공기 공지통신 무전기 성능개량을 위한 자동 TOD 연동방안 연구)

  • Jang, Jinwook;Ahn, Seungbeom;Choi, Myoungseok
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.3
    • /
    • pp.292-299
    • /
    • 2022
  • In this paper, we proposed an automatic TOD synchronization and verification method for improving the performance of air-to-ground radio(hereafter SATURN) of legacy aircraft. In order to automatically synchronize TOD with SATURN radio, it is proposed to modify the GPS antenna installed in the existing aircraft according to the minimum operating performance standard. In addition, test methods and results are presented to verify the TOD information generation capability before and after the GPS antenna modifying. It is expected that the automatic TOD synchronization method proposed in this paper can be applied to the SATURN performance improvement design.

A Study on the Defense Key Interface Profiles Process for Improving Interoperability (상호운용성 향상을 위한 국방 KIP 프로세스에 관한 연구)

  • Park, H.K.;Jeong, C.K.
    • Journal of the military operations research society of Korea
    • /
    • v.35 no.3
    • /
    • pp.61-79
    • /
    • 2009
  • It is recognized that guaranteeing the interoperability of defense complex systems(SoS: System of Systems, FoS: Family of Systems) provides an information advantage, which is one of the essential factors for determining an warfighting advantage. This study presents the defense KIP(Key Interface Profile) process for improving interoperability of defense complex systems. The KIP process is to develop key interface profiles based on the key interfaces which are identified through the analysis of architecture. The KIP developed can be leveraged to manage the interfaces of complex systems. We verify the effectiveness of the proposed KIP process through a case study based on the systems of counter-fire operation.