• Title/Summary/Keyword: Military security

Search Result 905, Processing Time 0.021 seconds

Analysis of methods for the model extraction without training data (학습 데이터가 없는 모델 탈취 방법에 대한 분석)

  • Hyun Kwon;Yonggi Kim;Jun Lee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.57-64
    • /
    • 2023
  • In this study, we analyzed how to steal the target model without training data. Input data is generated using the generative model, and a similar model is created by defining a loss function so that the predicted values of the target model and the similar model are close to each other. At this time, the target model has a process of learning so that the similar model is similar to it by gradient descent using the logit (logic) value of each class for the input data. The tensorflow machine learning library was used as an experimental environment, and CIFAR10 and SVHN were used as datasets. A similar model was created using the ResNet model as a target model. As a result of the experiment, it was found that the model stealing method generated a similar model with an accuracy of 86.18% for CIFAR10 and 96.02% for SVHN, producing similar predicted values to the target model. In addition, considerations on the model stealing method, military use, and limitations were also analyzed.

The Effect of Veterans' Positive Psychological Capital on the Will to Re-employment (제대군인의 긍정심리자본이 재취업 의지에 미치는 영향 -정보보안관련업체 취업희망자를 중심으로-)

  • Kim Bo Ram;Hahn Jae Phil
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.101-108
    • /
    • 2023
  • Military organizations have stricter ranks than other organizations, and the age of retirement is lower than that of civil servants in other fields. In a rapidly changing society with a high unemployment rate, it is very important to prepare psychological resources for self-management by improving individual positive strengths throughout life, including job search activities. Various studies are being attempted on positive psychological capital, employment, and productivity that emphasize the strength of positive resources and, from this point of view, contribute to productivity improvement. In this study, the effect of the positive psychological capital of discharged soldiers on their will to re-employment was investigated through questionnaires targeting actual veterans. As a result, it is found that hope, self-efficacy, resilience, and optimism influenced the will to re-employment in the order.

A Study on the Establishment of Comparison System between the Statement of Military Reports and Related Laws (군(軍) 보고서 등장 문장과 관련 법령 간 비교 시스템 구축 방안 연구)

  • Jung, Jiin;Kim, Mintae;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.109-125
    • /
    • 2020
  • The Ministry of National Defense is pushing for the Defense Acquisition Program to build strong defense capabilities, and it spends more than 10 trillion won annually on defense improvement. As the Defense Acquisition Program is directly related to the security of the nation as well as the lives and property of the people, it must be carried out very transparently and efficiently by experts. However, the excessive diversification of laws and regulations related to the Defense Acquisition Program has made it challenging for many working-level officials to carry out the Defense Acquisition Program smoothly. It is even known that many people realize that there are related regulations that they were unaware of until they push ahead with their work. In addition, the statutory statements related to the Defense Acquisition Program have the tendency to cause serious issues even if only a single expression is wrong within the sentence. Despite this, efforts to establish a sentence comparison system to correct this issue in real time have been minimal. Therefore, this paper tries to propose a "Comparison System between the Statement of Military Reports and Related Laws" implementation plan that uses the Siamese Network-based artificial neural network, a model in the field of natural language processing (NLP), to observe the similarity between sentences that are likely to appear in the Defense Acquisition Program related documents and those from related statutory provisions to determine and classify the risk of illegality and to make users aware of the consequences. Various artificial neural network models (Bi-LSTM, Self-Attention, D_Bi-LSTM) were studied using 3,442 pairs of "Original Sentence"(described in actual statutes) and "Edited Sentence"(edited sentences derived from "Original Sentence"). Among many Defense Acquisition Program related statutes, DEFENSE ACQUISITION PROGRAM ACT, ENFORCEMENT RULE OF THE DEFENSE ACQUISITION PROGRAM ACT, and ENFORCEMENT DECREE OF THE DEFENSE ACQUISITION PROGRAM ACT were selected. Furthermore, "Original Sentence" has the 83 provisions that actually appear in the Act. "Original Sentence" has the main 83 clauses most accessible to working-level officials in their work. "Edited Sentence" is comprised of 30 to 50 similar sentences that are likely to appear modified in the county report for each clause("Original Sentence"). During the creation of the edited sentences, the original sentences were modified using 12 certain rules, and these sentences were produced in proportion to the number of such rules, as it was the case for the original sentences. After conducting 1 : 1 sentence similarity performance evaluation experiments, it was possible to classify each "Edited Sentence" as legal or illegal with considerable accuracy. In addition, the "Edited Sentence" dataset used to train the neural network models contains a variety of actual statutory statements("Original Sentence"), which are characterized by the 12 rules. On the other hand, the models are not able to effectively classify other sentences, which appear in actual military reports, when only the "Original Sentence" and "Edited Sentence" dataset have been fed to them. The dataset is not ample enough for the model to recognize other incoming new sentences. Hence, the performance of the model was reassessed by writing an additional 120 new sentences that have better resemblance to those in the actual military report and still have association with the original sentences. Thereafter, we were able to check that the models' performances surpassed a certain level even when they were trained merely with "Original Sentence" and "Edited Sentence" data. If sufficient model learning is achieved through the improvement and expansion of the full set of learning data with the addition of the actual report appearance sentences, the models will be able to better classify other sentences coming from military reports as legal or illegal. Based on the experimental results, this study confirms the possibility and value of building "Real-Time Automated Comparison System Between Military Documents and Related Laws". The research conducted in this experiment can verify which specific clause, of several that appear in related law clause is most similar to the sentence that appears in the Defense Acquisition Program-related military reports. This helps determine whether the contents in the military report sentences are at the risk of illegality when they are compared with those in the law clauses.

A Study on the Utilization of Naval Personnel According to Characteristics of New Generations: Discussion from the Perspective of Generation Z, a Newly Emerging Generation (신세대의 특성에 따른 해군 인력 활용의 과제 - 또 다른 신세대, Z세대 관점에서의 고찰)

  • Min, Seung-Un;Kim, Seong-Yeol
    • Maritime Security
    • /
    • v.4 no.1
    • /
    • pp.57-82
    • /
    • 2022
  • The objective of this treatise is to explore the limitations of the current navy manpower utilization system and the ways to improve it from the perspective of Generation Z. As Generation Z, following Millennials, has finally come of age, this new group is constituting a gradually greater proportion of military personnel. Due to the typical characteristics of naval operations, the harmony between Millennials and Generation Z, which is differentiated from Generation X in view of dispositions and traits, is one of the essential issues to be discussed. Generally, in a naval vessel, there are numerous pieces of equipment necessary to carry out a wide range of missions and a large number of crew members who operate them with consistent levels of fighting power. This is all while members are living together within the narrow space throughout the 24 hours of each day. Under such particular circumstances, any inter-generational conflicts may have a disruptive effect on the successful accomplishment of naval missions. Currently, new generations of military personnel are facing social difficulties in different aspects compared with the previous generations, and also have different viewpoints on the military. In this regard, in order to foster true harmony between generations, it is considered necessary to take a closer look at the inter-generational differences from their respective standpoints and to examine whether the military organization has taken adequate steps to respond to such changes. Accordingly, Chapters 1 and 2 cover the environments in which Millennials and Generation Z were raised during their childhood to young adulthood, which are distinct from those of older generations, their viewpoints formed based on such backgrounds, and the need to resolve various conflicts between generations. In Chapter 3, the current actions taken by overseas military powers to enhance the coexistence with Generation MZ are analyzed to find the significant implications they had. Chapter 4 examines the operation environments specific to the navy; identifies the potential barriers to achieving harmony between generations by assessing the current status of personnel utilization in the Korean navy in terms of the seaman, petty officer, and the officer, as well as policy; and outlines the solutions to drive harmony. Finally, Chapter 5 emphasizes the need to establish a genuine empathy between generations based on the understanding of unique inter-generational characteristics. This section also discusses the importance of addressing difficulties in utilizing technology-centered naval manpower, and forecasts a scenario of a naval organization that resolves the problem of utilizing naval personnel and the inter-generational conflicts in the future.

  • PDF

Content Analysis of Male Hospital Nurses' Experiences (남자 임상간호사의 경험에 관한 내용분석)

  • Ahn, Kyeong-Ha;Seo, Ji-Min;Hwang, Sun-Kyung
    • Korean Journal of Adult Nursing
    • /
    • v.21 no.6
    • /
    • pp.652-665
    • /
    • 2009
  • Purpose: This study was conducted to identify job experiences of male hospital nurses. Methods: Data were collected from 20 male nurses working at general hospitals, through semi-structured in-depth interviews. The interviews were recorded and subsequently transcribed verbatim. Using content analysis, data were coded and categorized. Results: The analyzed domains were motivations for choosing nursing, occupational experiences (3 subdomains), and attitudes toward the future. A total of 85 significant statements were selected from the data and classified into 32 categories. The nurses' motivations for choosing nursing were advantages of employment, their aptitude, scarcity value of men, professionalism and job security, good promotion, stable income, and family influence. In occupational experiences, they were assigned to special fields and dissatisfied with vertical relationship, promotion system, their salary, and gaps in military service time; they had difficulties in adapting to female-dominated groups and encountered gender role stereotype and preconception; they were satisfied with their distinguished performance, but had damaged self-esteem, and were stressed and disappointed in their work. In their attitudes toward the future, they considered their career changes, but tried to make professional and personal advancement. Conclusion: These findings have implications for recruiting and retaining male nurses in clinical settings.

  • PDF

A Study on the Establish and Operating Plan of Reserve Components Emergency Response Forces (재난상황 시 예비군 긴급대응부대 창설 및 운용방안에 관한 연구)

  • Seo, SeungBae
    • Journal of the Society of Disaster Information
    • /
    • v.14 no.1
    • /
    • pp.9-16
    • /
    • 2018
  • In the event of a disaster, we need people who specialize in rapid regional disaster recovery. However, in the present disaster response system, disaster relief is carried out at the level of public support, volunteer service, etc. There are various problems such as initial response due to lack of expertise, delays in disaster recovery, and inadequate response to disasters. Therefore, it is necessary to establish a unit with early ability to respond to local governments in the event of a disaster and expertise to enable rapid disaster recovery. Therefore, this study limited the preparation of the reserve forces emergency response units for the direction of local security, disaster relief and disaster relief through emergency disaster recovery under the disaster situation.

Anti-interference Methods using Vector-based GPS Receiver Mode

  • Viet, Hoan Nguyen;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.5
    • /
    • pp.545-557
    • /
    • 2018
  • The Global Positioning System (GPS) has become popular and widely used in many fields from military to civilian applications. However, GPS signals are suffered from interference due to its weak signal over wireless channel. There are many types of interference, such as jamming, blocking multipath, and spoofing, which can mislead the operation of GPS receiver. In this paper, vector-based tracking loop model with integrity check is proposed to detect and mitigate the harmful effect of interference on GPS receiver operation. The suggested methods are implemented in the tracking loop of GPS receiver. As a first method, integrity check with carrier-to-noise ratio (C/No) monitoring technique is applied to detect the presence of interference and prevent contaminated channels out of tracking channels to calculate position. As a second method, a vector-based tracking loop using Extended Kalman Filter with adaptive noise covariance according to C/No monitoring results. The proposed methods have been implemented on simulated dataset. The results demonstrates that the suggested methods significantly mitigate interference of Additive White Gaussian Noise (AWGN) and improve position calculation by 44%.

Republic of Korea Navy's Long-Term Development Plan to Acquire Operational Capabilities at Distant Ocean - Focused on Introduction of Aircraft Carrier and Nuclear-powered Submarine - (원양 작전 능력 확보를 위한 한국 해군의 장기(長期) 발전 방안 - 항공모함 및 원자력 잠수함 도입제안을 중심으로 -)

  • Kim, Jae-Yeop
    • Strategy21
    • /
    • s.34
    • /
    • pp.149-177
    • /
    • 2014
  • Today distant oceans around the world are regarded as a major 'global commons' for international trade and transportation. Korea is not an exception, because Korea hugely depends on sea lines of communication (SLOC) for supplying vital commodities such as food and energy resource. As a result, assuring a free and safe use of distant ocean beyond territory is also an important agenda for Korea's maritime security. However there are a number of challenges for Korea to enjoy a free and safe use of distant ocean; dangers of regional maritime conflict in East Asia, naval arms race of China and Japan, and concerns on possible decline of U.S naval presence and power projection capabilities. These factors provide a reasonable basis for Republic of Korea Navy (ROKN) to pursue capabilities for major naval operations at distant ocean in a long-term perspective toward the year 2030. The introduction of aircraft carrier and nuclear-powered submarine is a key requirement for achieving this goal. ROKN needs to acquire a 'multi-role strategic landing platform' type of light aircraft carrier, which takes a role to escort naval task force by providing air superiority at distant ocean. Additionally nuclear-powered submarine will offer ROKN a formidable power to carry out offensive missions effectively at distant ocean.

Design and Implementation of Office Security and Automation System Using RFID (RFID를 이용한 오피스 보안 및 자동화 시스템의 설계 및 구현)

  • Lee, Seung-Cheol;Ko, Myeong-Cheol;Kim, Jung-Hwan;Han, Deok-Soo;Yang, Kwon-Woo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.560-565
    • /
    • 2006
  • 최근 보안에 대한 사회적인 관심이 높아지면서 RFID는 기존의 스마트카드와 바코드 시스템이 갖는 여러 기능적인 한계점들을 극복함으로써 향 후 이를 대체할 보안 신기술로서 인식되고 있다. 현재 사무실 출입의 보안을 위해 대표적으로 사용되고 있는 출입문 인증시스템은 일단 출입문을 통과한 사용자들에 대해서는 사무실 내부의 모든 요소들이 무방비 상태로 노출되어 보안상의 허점이 발생한다. 또한 사무실 내 개개의 PC에 단말기를 설치하여 사용하는 스마트카드 인증시스템 역시도 빈번한 자리 이동에 따른 카드 인증 절차의 번거로움으로 인해 근거리 이동시 PC를 잠그지 않는 경우가 빈번하게 발생함으로써 사용자 PC에 저장된 보안이 필요한 데이터들에 대한 침해 우려가 발생한다. 본 논문에서는 다중사용자 환경에서 각각의 사용자가 소지한 RFID 태그를 이용하여 기존 카드시스템과 같이 복잡한 인증절차가 필요 없고 빈번한 자리 이동이 발생하더라도 추가적인 인증작업이 없이 매번 자동으로 컴퓨터 시스템을 잠금 및 해제시킴으로써 인증과정에 따른 사용자의 부담을 줄일 수 있는 보안시스템을 제시한다. 또한 사용자가 출근과 동시에 매일 일상적으로 반복되는 사무실에서의 컴퓨터 작업에 대한 효율을 높이기 위한 사무 자동화 시스템을 구현한다.

  • PDF

Design and Evaluation of Information Broker Architecture for Network-Centric Operational Environment (네트워크 중심 작전 환경을 위한 정보 브로커 아키텍처 설계 및 평가)

  • Park, Jejun;Kang, Dongsu
    • Journal of KIISE
    • /
    • v.43 no.6
    • /
    • pp.668-677
    • /
    • 2016
  • The information superiority through effective networking is a core element that accelerates command decision for mission completion. Our military wants to acquire capabilities of effective information sharing with Network-Centric Operational Environment(NCOE) for Network-Centric Warfare (NCW). In this paper, we suggested an information broker for overcoming current limits and maximizing future expandability and possibility of information sharing capacities. The information broker, which is an intermediate layer between users and information providers, provides the functions for mediating and managing information and for ensuring security of the system. We evaluated the consistency of proposed architecture and the implementation of the operational architecture design concept using existing design frameworks.