• Title/Summary/Keyword: Military systems

Search Result 1,538, Processing Time 0.027 seconds

A Study on How to Extend The Inspection Period for The One-Shot System (One-Shot System에 대한 점검주기 연장 방안 연구)

  • Kim, Jong-jin;Song, Jeong-hun;Han, Jung-won;Lee, Chang-kyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.113-118
    • /
    • 2021
  • The guided weapon system should ensure economical operation and user safety. In particular, in the case of guided weapon systems developed in the form of a guaranteed bomb, the standards for maintaining reliability considering the long-term storage environment are presented during the development stage, and an optimized inspection cycle is required to maintain this. This study calculated the reliability through a trend test, fitness test, and distribution analysis using a mathematical model based on the maintenance status and shooting results during the inspection period for OO missiles currently in operation for a long time in the military. Through this, it was applied to the inspection period model (Martinez) set during the development stage to determine if the improved inspection period can be utilized. Finally, by synthesizing the data from these studies, a policy management plan was developed according to the extension of the inspection period. The One-Shot system was operated at the inspection period set when it was developed. The study analyzed the actual failure and maintenance data to reset the efficient inspection period.

Development and Research of SMT(Smart Monitor Target) Game Interface for Airsoft Gun Users (AirSoft Gun 사용자를 위한 SMT(Smart Monitor Target)게임 인터페이스 개발 연구)

  • Chung, Ju Youn;Kang, Yun Geuk
    • Journal of Information Technology Applications and Management
    • /
    • v.28 no.1
    • /
    • pp.83-93
    • /
    • 2021
  • The purpose of this study was to develop a personalized SMT (smart monitor target) game interface for game users who enjoy airsoft sports as individual purchases of SMT have increased since the advent of the untouched era. For this study, the UX (user experience) of the game interface was designed based on previous research. In particular, the personalized game service was reinforced by adding the CP (command post) of the SMT system that performs the home function of the console game, which was intended to help the user maintain immersed in the game in the personalized space of the SMT. Major design elements for the SMT game interface included layout, color, graphics, buttons, and text, and the interface design was proceeded based on them. After composing a grid with a layout in which the tab function was applied to the interface with a vertical three-segment structure and the outer margin value secured, the military camouflage pattern and texture were applied to the colored tone to perform graphics work. Targets and thumbnails were produced as illustrations using experts to ensure the consistency of the interface, and then function buttons and texts on each page were used concisely for intuitive information delivery. The design sources organized in this way were developed using the Unity engine. In the future, we hope that game user-centered personalized interfaces will continue to develop and provide differentiated services unique to SMT systems in the airsoft gun market.

Effect Analysis of MW Transmission System for Strategic Unit Using Adaptive Modulation (적응변조 적용 전략제대 MW전송시스템 효과 분석)

  • Lim, Young-Gab;Youn, Jong-Taek;Choi, Young-Min;Kim, Young-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.3
    • /
    • pp.412-419
    • /
    • 2020
  • The strategic unit communication infrastructure for military command, communications requires a dualized network structure of various communication methods, considering the direction of development, strategic unit and line characteristic. It has been pointed out that MicroWave, which is typical of wireless systems, is inefficient because it operates only with existing technologies. Therefore, it is necessary to analyze the structure, efficiency of the MW transmission system and its effects. It is difficult to transfer efficiently considering wireless environment due to a fixed type of access structure in the existing MW transmission system. Adaptive modulation allows improvement, but with traditional access structures and fixed bandwidth, there is a limit. Following the transmission performance improvement technique considering availability and link distance in the previous study, this paper presented improved packetized MW transmission system structure and variable bandwidth transmission in consideration of adaptive modulation based variable transmission waveform, bandwidth and distance, and performed the analysis in view of the strategic unit and command control circuit.

A Study on the Possibility of Securing Command of the Air in Local War (지상군의 국지제공권 확보 가능성 연구)

  • Lee, Chang In;Jung, Min Sup;Cho, Sang Keun;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.173-179
    • /
    • 2022
  • Through the 2014 Donbas conflict and the 2022 Ukraine-Russia war, we are experiencing that the command of the air is no longer only secured by the Air Force. Long-range surveillance reconnaissance and strikes carried out by the Air Force could be replaced by drones and missiles, and the enemy's aerial attacks could be controlled by air defense systems such as Panchir and portable anti-aircraft missiles, allowing ground forces to carry out maneuvers freely. In other words, it is much more advantageous for the air force and the navy to take control of the air through long-distance operations, and the ground forces should support them. Therefore, this study aims to consider the cost-effectiveness aspect of the delivery command of the air; it provides implications for quickly responding to enemy air attacks by developing the air defense weapon system, drones, missiles, precision-guided munitions, etc rather than focusing on expensive fighter jets.

A Proposal for Drone Entity Identification and Secure Information Provision Technology Using Quantum Entropy Chip-Based Cryptographic Module in WLAN Environment (무선랜 환경에서 양자 엔트로피 칩 기반 암호모듈을 적용한 드론 피아식별과 안전한 정보 제공 기술 제안)

  • Jung, Seowoo;Yun, Seunghwan;Yi, Okyeon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.891-898
    • /
    • 2022
  • Along with global interest, drones are expanding the base of utilization such as transportation of goods, forest protection, and safety management, and cluster flights are being applied in various fields such as military operations and environmental monitoring. Currently, specialized networks such as e-UM 5G for services in specific industries are being established in Korea. In this regard, drone systems are also moving to establish specialized networks to provide services that are fused with AI and autonomous flight. As drones converge with various services, various security threats in various environments are also subordinated, and in response, requirements and guidelines for drone security are being prepared in Korea. In this paper, we propose a technology method for peer identification and safe information provision between cluster flight drones by utilizing a cryptographic module equipped with wireless LAN and quantum entropy-based random number generator in a cluster flight system and a mobile communication network such as e-UM 5G.

Predicting defects of EBM-based additive manufacturing through XGBoost (XGBoost를 활용한 EBM 3D 프린터의 결함 예측)

  • Jeong, Jahoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.5
    • /
    • pp.641-648
    • /
    • 2022
  • This paper is a study to find out the factors affecting the defects that occur during the use of Electron Beam Melting (EBM), one of the 3D printer output methods, through data analysis. By referring to factors identified as major causes of defects in previous studies, log files occurring between processes were analyzed and related variables were extracted. In addition, focusing on the fact that the data is time series data, the concept of a window was introduced to compose variables including data from all three layers. The dependent variable is a binary classification problem with the presence or absence of defects, and due to the problem that the proportion of defect layers is low (about 4%), balanced training data were created through the SMOTE technique. For the analysis, I use XGBoost using Gridsearch CV, and evaluate the classification performance based on the confusion matrix. I conclude results of the stuy by analyzing the importance of variables through SHAP values.

Centralized Machine Learning Versus Federated Averaging: A Comparison using MNIST Dataset

  • Peng, Sony;Yang, Yixuan;Mao, Makara;Park, Doo-Soon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.742-756
    • /
    • 2022
  • A flood of information has occurred with the rise of the internet and digital devices in the fourth industrial revolution era. Every millisecond, massive amounts of structured and unstructured data are generated; smartphones, wearable devices, sensors, and self-driving cars are just a few examples of devices that currently generate massive amounts of data in our daily. Machine learning has been considered an approach to support and recognize patterns in data in many areas to provide a convenient way to other sectors, including the healthcare sector, government sector, banks, military sector, and more. However, the conventional machine learning model requires the data owner to upload their information to train the model in one central location to perform the model training. This classical model has caused data owners to worry about the risks of transferring private information because traditional machine learning is required to push their data to the cloud to process the model training. Furthermore, the training of machine learning and deep learning models requires massive computing resources. Thus, many researchers have jumped to a new model known as "Federated Learning". Federated learning is emerging to train Artificial Intelligence models over distributed clients, and it provides secure privacy information to the data owner. Hence, this paper implements Federated Averaging with a Deep Neural Network to classify the handwriting image and protect the sensitive data. Moreover, we compare the centralized machine learning model with federated averaging. The result shows the centralized machine learning model outperforms federated learning in terms of accuracy, but this classical model produces another risk, like privacy concern, due to the data being stored in the data center. The MNIST dataset was used in this experiment.

Malware Detection Using Deep Recurrent Neural Networks with no Random Initialization

  • Amir Namavar Jahromi;Sattar Hashemi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.177-189
    • /
    • 2023
  • Malware detection is an increasingly important operational focus in cyber security, particularly given the fast pace of such threats (e.g., new malware variants introduced every day). There has been great interest in exploring the use of machine learning techniques in automating and enhancing the effectiveness of malware detection and analysis. In this paper, we present a deep recurrent neural network solution as a stacked Long Short-Term Memory (LSTM) with a pre-training as a regularization method to avoid random network initialization. In our proposal, we use global and short dependencies of the inputs. With pre-training, we avoid random initialization and are able to improve the accuracy and robustness of malware threat hunting. The proposed method speeds up the convergence (in comparison to stacked LSTM) by reducing the length of malware OpCode or bytecode sequences. Hence, the complexity of our final method is reduced. This leads to better accuracy, higher Mattews Correlation Coefficients (MCC), and Area Under the Curve (AUC) in comparison to a standard LSTM with similar detection time. Our proposed method can be applied in real-time malware threat hunting, particularly for safety critical systems such as eHealth or Internet of Military of Things where poor convergence of the model could lead to catastrophic consequences. We evaluate the effectiveness of our proposed method on Windows, Ransomware, Internet of Things (IoT), and Android malware datasets using both static and dynamic analysis. For the IoT malware detection, we also present a comparative summary of the performance on an IoT-specific dataset of our proposed method and the standard stacked LSTM method. More specifically, of our proposed method achieves an accuracy of 99.1% in detecting IoT malware samples, with AUC of 0.985, and MCC of 0.95; thus, outperforming standard LSTM based methods in these key metrics.

Marine Incidents Management and Information Exchange Technologies in the Process of Safe Ship Operation

  • Oleksiy, Melnyk;Yana, Volianska;Oleg, Onishchenko;Svitlana, Onyshchenko;Alla, Bondar;Andrii, Golovan;Nataliia, Cheredarchuk;Iryna, Honcharuk;Tetyana, Obnyavko
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.64-70
    • /
    • 2023
  • Maritime transport is dominant in the overall volume of all international transportation. Existence and overcoming of problems, which cause pressure on shipping safety, remain actual and fully concern both maritime and inland transport. Increasing speed and cargo capacity of the ships along with the reduction of crew members lead to the automation of a growing number of work processes, which indicates the need to actively introduce appropriate measures in the security system of sea-going ships and commercial ports and to develop modern approaches to minimize negative events and incidents in the process of ship operation. Advantages in use of modern methods of monitoring the safety of ship operations, management of possible events and incidents, including investigation of accidents, first, aimed at prevention of negative occurrences and ways of prevention on this basis. Considering statistics on incidents increase, this work presents analysis of general ship accident rate, study of major accidental events growth annually, and investigation of causes of incidents, which most frequently occur in port waters and at open sea. A survey of current approaches to ensuring the safety of shipping by implementing effective tools, such as event and incident management, has been conducted.

A Study on Comparing the Veteran Affair System Between Korea and the Other Countries (우리나라와 세계 각국의 보훈제도 비교 연구)

  • Sang-Hyuk Park;Seung-Woo Wang;Jae-Geon Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.395-400
    • /
    • 2023
  • Korea has been in a truce state for about 70 years, not an end-of-war country. Even in a situation with this specificity, Korea's veterans' system is insufficient compared to other countries. In addition, Korea's veteran policy lacks an "honor of veterans" system compared to veterans' advanced countries (the United States, Canada, Australia, France, and Germany), and a representative example of it is the "support system for veterans and discharged soldiers." After analyzing the major veterans' policy systems in the veterans' developed countries (US, Canada, Australia, France, and Germany), this study suggests that we should expand the major anniversaries related to veterans and suggest a policy alternative as it is necessary to introduce public awareness education on the promotion of veterans. In the end, it is necessary to properly recognize the pain and agony of division to the generations before and after, laying the foundation for the advanced country-type veteran affair system.