• Title/Summary/Keyword: Military command

Search Result 313, Processing Time 0.053 seconds

A Research on Adversarial Example-based Passive Air Defense Method against Object Detectable AI Drone (객체인식 AI적용 드론에 대응할 수 있는 적대적 예제 기반 소극방공 기법 연구)

  • Simun Yuk;Hweerang Park;Taisuk Suh;Youngho Cho
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.119-125
    • /
    • 2023
  • Through the Ukraine-Russia war, the military importance of drones is being reassessed, and North Korea has completed actual verification through a drone provocation towards South Korea at 2022. Furthermore, North Korea is actively integrating artificial intelligence (AI) technology into drones, highlighting the increasing threat posed by drones. In response, the Republic of Korea military has established Drone Operations Command(DOC) and implemented various drone defense systems. However, there is a concern that the efforts to enhance capabilities are disproportionately focused on striking systems, making it challenging to effectively counter swarm drone attacks. Particularly, Air Force bases located adjacent to urban areas face significant limitations in the use of traditional air defense weapons due to concerns about civilian casualties. Therefore, this study proposes a new passive air defense method that aims at disrupting the object detection capabilities of AI models to enhance the survivability of friendly aircraft against the threat posed by AI based swarm drones. Using laser-based adversarial examples, the study seeks to degrade the recognition accuracy of object recognition AI installed on enemy drones. Experimental results using synthetic images and precision-reduced models confirmed that the proposed method decreased the recognition accuracy of object recognition AI, which was initially approximately 95%, to around 0-15% after the application of the proposed method, thereby validating the effectiveness of the proposed method.

Acupotomy Treatment for Lumbar Disc Herniation

  • Xilin, Chen;Xinyi, Fu;Zhichao, Luo;Wenshan, Xin;Quangui, Wang;Mira, Lee;Changqing, Guo
    • Journal of Acupuncture Research
    • /
    • v.37 no.3
    • /
    • pp.177-180
    • /
    • 2020
  • Background: The aim of this study was to examine whether the effects of acupotomy therapy were beneficial for the treatment of protrusion of lumbar intervertebral disc. Methods: The number of patients (n = 80) were equally assigned into treatment group and control group. Treatment group was given acupotomy therapy twice a week, and control group was given acupuncture 3 times a week, for 4 weeks. The beneficial effect and changes in score of the Japan Orthopedic Association (JOA) for low back pain were observed. Results: Among 40 cases in the treatment group, there were 25 (62.5%) with an excellent effect, 13 (32.5%) with good effect, 1 (2.5%) with a medium effect and 1 (2.5%) with poor effect, with the total experiencing an excellent/good effect of 95.0%. Among 40 cases in the control group, there were 11 (27.5%) with an excellent effect, 17 (42.5%) with good effect, 10 (25.0%) with a medium effect, and 2 (5.0%) with poor effect, with an excellent/good rate of 70.0%. The result of the rank sum test showed Z = -4.923, p < 0.05 in the comparison, indicating a significantly better outcome following acupotomy compared with acupuncture. JOA scores increased in both groups after treatment (p < 0.05), which was more significant in the acupotomy treatment group (p < 0.05). Conclusion: Acupotomy therapy has a beneficial effect on protrusion of lumbar intervertebral disc.

Vulnerability Case Analysis of Wireless Moving Vehicle (무선이동체의 취약점 사례 분석)

  • Oh, Sangyun;Hong, Jinkeun
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.8
    • /
    • pp.41-46
    • /
    • 2018
  • As the industry related to drones has been activated, the public interest in drones has increased explosively, and many cases of drone-using are increasing. In the case of military drones, the security problem is the level of defense of the aircraft or cruise missiles, but commercial small and low cost drones are often released and utilized without security count-measure. This makes it possible for an attacker to easily gain access to the root of the drones, access internal files, or send fake packets. However, this droning problem can lead to another dangerous attack. In this regard, this paper has identified the vulnerabilities inherent in the commercial drones by analyzing the attack cases in the communication process of the specific drones. In this paper, we analyze and test the vulnerability in terms of scanning attack, meson attack, authentication revocation attack, packet stop command attack, packet retransmission attack, signal manipulation and de-compile attack. This study is useful for the analysis of drones attack and vulnerability.

An Efficient Frequency Utilization Policy for UAS in Hyper-Connectivity Era (초연결 시대의 UAS 주파수의 효율적 활용방안)

  • Kang, Young-Heung
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.26 no.10
    • /
    • pp.914-923
    • /
    • 2015
  • UAS(Unmanned Aircraft System) has been used a lot in military applications but recently its usage is expanding to commercial applications due to its recent technical development and its market is expected to grow rapidly in the future. In hyper-connectivity society, especially UAS would play major role as an one of potential infrastructures for the architecture of the next 5G system. The ultimate goal is the successful integration of UAS in NAS(National Airspace System) relies heavily on ensuring reliable spectrum for the robust CNPC(Command and Non-Payload Communication) links as well as payload links for other various applications in the upcoming hyper-connectivity era. In this paper, we have focused on the analysis of the existing frequencies for UAS radio-control and the current issues for CNPC and payload frequencies, and proposed future efficient utilization policy for UAS in the hyper-connectivity society.

High Reliability Rx Power System Design for Military VoIP Phone (군용 VoIP 전화기를 위한 고신뢰성 Rx 전력 시스템 설계)

  • Park, Kyung-Hwa;Park, Hyun-Jeong;Kim, Hyeon-Sung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.5
    • /
    • pp.857-864
    • /
    • 2020
  • The multi-functional VoIP phone supports the Ethernet protocol in the TIPS(: Tactical IP Switch), which is one of the sub-systems of the tactical information and communication system (TICN). It provides secured voice / video calls in conjunction with VoIP exchanges and supports differential services such as multi-party calls and command functions. In this paper, improving methods have been proposed to reduce power supply defects in the field of multi-functional VoIP phones. The power supply part was improved by applying TVS of the output voltage inlet of the dedicated adapter of the multi-functional VoIP phone, TVS of the PoE module input, adding blocking diodes, and adding DC / DC converters behind the poly-switch. Also, functional and environmental tests were performed to verify the validity of the proposed methods.

An Efficient Public Trace and Revoke Scheme Using Augmented Broadcast Encryption Scheme (ABE 스킴을 활용한 효율적인 공모자 추적 및 제외 스킴)

  • Lee, MoonShik;Lee, Juhee;Hong, JeoungDae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.17-30
    • /
    • 2016
  • In this paper, we propose an efficient public key trace and revoke scheme. An trace and revoke scheme is a broadcast encryption scheme which has a tracing and revocation algorithm. It would maintain security of the scheme to revoke pirate keys which are colluded by malicious users. In addition, property of revocation can be applied to various circumstances because it can help cipher text delivered to certain users who are supposed to. In this paper, we would change the scheme[Augmented broadcast encryption scheme] based on the bilinear groups of the composite order into that of prime order and we can improve the size of public key, secret key, ciphertext considerably. Furthermore, we define property of revocation precisely, so we can obtain the result that the scheme with limited revocation can be expanded to have a full revocation. This paper can be easily applied to the organization such as government, military, which has a hierarchical structure.

System for Transmitting Army Hand Signals Using Motion Sensors (모션 센서를 이용한 군대 수신호 전송 시스템)

  • Shin, Geon;Jeon, Jaechol;Jeon, Minho;Choi, Sukwon;Kim, Iksu
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.10
    • /
    • pp.331-338
    • /
    • 2016
  • In this paper, we propose a system for transmitting army hand signals using motion sensors. The proposed system consists of a squad commander device, squad member devices, and a server. The squad command device and squad member device have been implemented using a micro arduino, an accelerometer sensor, and a gyroscope sensor, and the server has been implemented using a Rasberry Pi 3. Because the devices are made in the form of band, they are lightweight and portable. The proposed system can transmit the hand signals through vibration in conditions of poor visibility. We have designed and implemented the squad member device to be able to recognize four military hand signals. Through experiments, the proposed system have shown 88.82% of correct recognition. In conclusion, we expect to increase effectiveness of army operations and survival rate of soldiers.

A Multiversion-Based Spatiotemporal Indexing Mechanism for the Efficient Location-based Services (효율적인 위치 기반 서비스를 위한 다중 버전 기반의 시공간 색인 기법)

  • 박현규;손진현;김명호
    • Journal of KIISE:Databases
    • /
    • v.30 no.1
    • /
    • pp.41-51
    • /
    • 2003
  • The spatiotemporal database concerns about the time-varying spatial attributes. One of the important research areas is related to the support of various location-based services in motile communication environments. It is known that database systems may be difficult to manage the accurate geometric locations of moving objects due to their continual changes of locations. However, this requirement is necessary in various spatiotemporal applications including mobile communications, traffic control and military command and control (C2) systems. In this paper we propose the $B^{st}$-tree that utilizes the concept of multi-version B-trees. It provides an indexing method (or the historical and future range query Processing on moving object's trajectories. Also we present a dynamic version management algorithm that determines the appropriate version evolution induced by the mobility patterns to keep the query performance. With experiments we .;hi)w that our indexing approach is a viable alternative in this area.

ROK's maritime security strategic concept and cooperation direction for the ROK Navy and Coast Guard (한국의 해양안보전략개념과 해군·해경 간 협력의 발전방향)

  • Chung, Samman
    • Strategy21
    • /
    • s.42
    • /
    • pp.258-292
    • /
    • 2017
  • This paper is designed to make a national strategic concept for the ROK's maritime security and to explore cooperation directions for the ROK Navy and Coast Guard in order to implement the newly-made maritime security strategic concept. As strategy is composed of three main categories(goals, ways, means), the goal of the ROK's maritime security strategy is 'Safe and Affluent Sea' and the way to realize the goal is the principle of cooperative leverage, and the means as tasks to implement the strategic concept are maritime safety, maritime security, and maritime stewardship. The concept of national fleet as used in the US is applied to promoting the cooperation between the ROK Navy and Coast Guard. Thus, under the newly-established maritime security strategic concept along with the national fleet model, followings are suggested as policy proposals for facilitating mutual cooperation between the ROK Navy and Coast Guard in dealing with not only traditional threats but also non-traditional treats at sea and from the sea as well. First, the ROK Navy and Coast Guard has been making efforts to enhance interoperability between the two sea services. However, the mutual cooperations have been focused mainly on areas on operational level rather than policy level. Therefore, the two sea services are recommended to enlarge exchanges and cooperation in policy areas. Second, there are still demands for further cooperation areas between the two sea services in command and communications. The interoperability in C2 between the two needs to be upgraded even to the areas of anti-terrorist activities ar sea, ASUW, ASW, maritime interdiction, etc. Third, mutual comparability between the two needs to be reflected in the maritime forces development to ensure the comparability in UNREP and other logistics areas. Fourth, the standardization of logistical materials and equipments is needed as a way of sustaining operational capability and logistical capacity for the ROK Navy and Coast Guard as well. Fifth, the ROK Navy and Coast Guard are recommended to participate more actively in international maritime cooperation activities such as PASSEX. Sixth, Complementary laws and regulations need further to be revised and to be newly made for collectively managing swiftly maritime accidents and natural disasters at sea.

Silencing of Rac3 Inhibits Proliferation and Induces Apoptosis of Human Lung Cancer Cells

  • Liu, Tie-Qin;Wang, Ge-Bang;Li, Zheng-Jun;Tong, Xiang-Dong;Liu, Hong-Xu
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.7
    • /
    • pp.3061-3065
    • /
    • 2015
  • Background: Rac3, a member of the Rac family of small guanosine triphosphatases (GTPases), regulates a variety of cell functions, including the organization of the cytoskeleton, cell migration, and invasion. Overexpression of Rac3 has been reported in several human cancers. However, the role of Rac3 in lung cancer (LC) has not been determined in detail. The purpose of this study was to investigate the effect of silencing of Rac3 expression in human LC cells and the consequences for cell survival. Materials and Methods: Lentivirus small hairpin RNA (shRNA) interference techniques were utilized to knock down the Rac3 gene. Gene and protein expression was quantified by quantitative real-time polymerase chain reaction (qRT-PCR) and Western blotting. LC cell apoptosis was examined by annexin V-APC /propidium iodide staining. Results: Efficient silencing of Rac3 strongly inhibited A549 cell proliferation and colony formation ability, and significantly decreased tumor growth. Moreover, flow cytometry analysis showed that knockdown of Rac3 led to G2/M phase cell cycle arrest as well as an excess accumulation of cells in the G1 and S phase. Conclusions: Thus, functional analysis using shRNAs revealed a critical role for Rac3 in the tumor growth of LC cells. shRNA silencing of Rac3 could provide an effective strategy to treat LC.