• Title/Summary/Keyword: National Defense

Search Result 3,453, Processing Time 0.039 seconds

A Study of the National Defense Expense trend based on 30 OECD member states (OCED 회원국에 근거한 국방비 지출 추세 연구)

  • Ko, Jong-Hyub
    • Journal of the military operations research society of Korea
    • /
    • v.37 no.1
    • /
    • pp.129-145
    • /
    • 2011
  • The purpose of this paper is to first of all analyse the trend of international National Defense Expense of 30 OECD member states and compare it with that of Korea in order to predict an appropriate level of National Defence Expense. As a result of the research, Korea's National Defense Expense has been exploited at 'considerably low level', hence restore its increasing expense rate from 3.87% in 2009 and 5.8% in 2010 to somewhat higher rate, so as to maintain stable supply and demand of National Defense Expense. The reason to the increase of National Defense Expense is to most importantly ensure 'appropriate amount suitable for its national status' and also that National Defense Expense takes up crucial part for protection of not only life and assets of a people but also of national viability.

Conceptualization of Defense Industrial Security in Relation to National Security (국가 안보와 연계한 방위산업 보안 개념 정립)

  • Go, Hee-Jae;Lee, Yong-Joon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.265-270
    • /
    • 2019
  • In order to protect the advancement of defense technology that has a tremendous e?ect on both the national security and the economy, the Republic of Korea established the Defense Technology Security Act in 2015. As the new enactment brought changes to the landscape of the defense industry and defense industrial security, a new examination of the concept of the defense industrial security has now become necessary. Even after taking into consideration the undisclosed nature of defense industrial security research, and the fact that only the limited number of firms participates in the subject matter, scientific studies related to the topic have not been active. However, with the new enactment of the Defense Technology Security Act, it is necessary to expand the scope of security and to redefine the concept of defense industrial security. In this paper, we analyzed the research works on related technology protection policies and our environment of the defense industry in order to conceptualize defense industrial security. The established concepts are expected to provide a systematic way to protect the confidential and defense technology.

A Study of The ROK's Defense Exporting Strategies (한국의 방산수출 전략 연구)

  • Lee, Pil-Jung
    • Journal of National Security and Military Science
    • /
    • s.9
    • /
    • pp.141-190
    • /
    • 2011
  • Defense industry as 'a new dynamics of economic growth' policy implies driving policy of defense products' export. The purpose of this study is to suggest suitable strategies to meet with such policy in terms of region and individual nation. The strategies towards advanced region are joint sale strategy for the third countries, extension strategy of trade-off and development strategy of products to exploit niche markets. The strategies towards non-advanced regions are package strategy including exchange of economic development know-how, strengthening strategy of relationships to leading groups in national decision-making processes, exploit strategy of sales market through transfer discard and surplus equipments to other nations, government to government sale strategy towards countries holding low leveled equipment maintaining and management abilities. Finally, successive strategies require leaders' will, active sales diplomacy and active international cooperations of defense industry.

  • PDF

Robustness of RED in Mitigating LDoS Attack

  • Zhang, Jing;Hu, Huaping;Liu, Bo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.5
    • /
    • pp.1085-1100
    • /
    • 2011
  • The Random Early Detection algorithm is widely used in the queue management mechanism of the router. We find that the parameters of the RED algorithm have a significant influence on the defense performance of the random early detection algorithm and discuss the robust of the algorithm in mitigating Low-rate Denial-of-Service attack in details. Simulation results show that the defense performance can be effectively improved by adjusting the parameters of $Q_{min}$ and $Q_{max}$. Some suggestions are given for mitigating the LDoS attack at the end of this paper.

A Study on the Information Security Technical Architecture focusing on the Primary Defense Information Infrastructure (국방주요정보통신기반시설 중심의 정보보호기술구조 연구)

  • Choi, Ji-Na;Nam, Kil-Hyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.9 no.1 s.24
    • /
    • pp.80-88
    • /
    • 2006
  • The purpose of this thesis is to research and propose a practical Information Security Technical Architecture on Primary Defense Information Infrastructure with regard to requirement of information security. The scope of this research is limited to national defense information master plan & security rule, and U.S. DoD's IATF is used to plan a detailed structure. The result of this research can be used as a guide book for providing security for Army IT infrastructure now and in the future as well as to devise a plan for research and development in information protection technology.

Tag Value Measurement Algorithm for Personalized Recommendation (개인화 추천을 위한 태그 가치 측정 알고리즘)

  • Jeong, Kwang-Jae;Park, Gun-Woo;Lee, Sang-Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.1078-1081
    • /
    • 2010
  • 웹 2.0의 영향으로 인터넷 상에 범람하는 컨텐츠를 이용함에 있어 태깅 시스템은 매우 유연하고 효과적인 분류를 가능케 한다. 대부분의 웹 2.0 사이트에서는 검색된 정보에 해당하는 태그와 연관성이 있는 태그를 나타냄으로써 또 다른 관련 컨텐츠를 이용할 수 있는 서비스를 제공한다. 컨텐츠 사용자에 의해 생성되는 태그는 개인 성향에 따라 동일 컨텐츠에 다양하게 적용될 수 있으며 이로 인해 태그를 이용한 검색은 낮은 정확도를 나타낼 수 있다. 본 논문에서는 태그 선택에 있어 인간 상호작용의 특성을 파악하여 개인이 선호하고, 필요로 하는 컨텐츠에 대한 태그를 추천할 수 있는 태그 가치 측정 알고리즘을 제안한다. 컨텐츠 선택에 있어 의사결정에 영향을 미치는 요인을 식별하고 선호영화 추천 서비스인 MovieLens 사이트의 데이터 셋을 적용하여 태그 추천의 예측 정확도를 비교 평가함으로써 향상된 태그 가치 산정 결과를 제시한다.

Assessing Influence of Human Factors according to Topics for Enhancing Social Search (소셜 검색 향상을 위한 토픽별 인적속성의 영향력 산출)

  • Kwon, Oh-Sang;Park, Gun-Woo;Lee, Sang-Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.142-145
    • /
    • 2010
  • 정보의 양이 폭발적으로 증가함에 따라 방대한 정보 속에서 사용자의 검색 의도에 맞는 정보를 효과적으로 제공하기란 매우 어려워졌다. 따라서 웹 사용자들의 요구사항을 충족시키기 위한 연구들이 활발히 수행되고 있으며, 많은 방법론들이 제시되고 있다. 본 논문에서는 회귀분석이라는 통계학적 기법을 통해 검색 토픽에 대한 사용자의 인적속성들이 미치는 영향력을 산출하였다. 이는 인간이 가진 내재적 특성이 토픽별 검색 성향과 어떠한 연관관계가 있는지를 규명한 것이다. 또한 특정 토픽에 대해 영향력이 높은 인적속성의 일치 여부가 해당 토픽에 대한 사용자 검색성향의 유사정도와 매우 큰 상관관계가 있는 것을 증명하였다. 이와 같은 사실을 기반으로 사용자가 특정 토픽에 대해 검색 시 해당 토픽에 대해 영향력이 높은 인적속성을 확인하고, 이 속성이 일치하는 사람들의 검색 정보를 제공한다면, 사용자는 보다 만족된 검색결과를 얻을 수 있을 것이다.

A Model of Faults Classification in Component based Robots (컴포넌트 기반 로봇의 결점분류 모델)

  • Kim, Jaeyoung;Kim, Jongyoung;Yoon, Heebyung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1582-1585
    • /
    • 2010
  • 로봇은 인간의 생명과 밀접하게 관련되어 있기 때문에 높은 안전성과 신뢰성이 요구된다. 특히 최근에는 지능형 서비스 로봇의 등장과 더불어 증가되는 로봇 개발환경의 복잡성 문제와 로봇의 신속한 개발 및 유지보수 문제를 해결하기 위해 컴포넌트 기반의 로봇 플랫폼에 대한 연구가 증가하고 있으며, 특히 로봇 플랫폼을 구성하는 컴포넌트의 장애문제 해결이 중요한 이슈로 대두되고 있다. 따라서 본 논문에서는 컴포넌트 기반 로봇의 결점분류 절차를 제시하고 로봇의 결점타입과 로봇 플랫폼과의 상관관계를 분석하고 로봇 플랫폼에 결점타입을 매핑하여 최종적으로 컴포넌트 기반 로봇의 결점분류 모델을 제안한다.

Further Analyzing the Sybil Attack in Mitigating Peer-to-Peer Botnets

  • Wang, Tian-Zuo;Wang, Huai-Min;Liu, Bo;Ding, Bo;Zhang, Jing;Shi, Pei-Chang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.10
    • /
    • pp.2731-2749
    • /
    • 2012
  • Sybil attack has been proved effective in mitigating the P2P botnet, but the impacts of some important parameters were not studied, and no model to estimate the effectiveness was proposed. In this paper, taking Kademlia-based botnets as the example, the model which has the upper and lower bound to estimate the mitigating performance of the Sybil attack is proposed. Through simulation, how three important factors affect the performance of the Sybil attack is analyzed, which is proved consistent with the model. The simulation results not only confirm that for P2P botnets in large scale, the Sybil attack is an effective countermeasure, but also imply that the model can give suggestions for the deployment of Sybil nodes to get the ideal performance in mitigating the P2P botnet.

Neighbor Gradient-based Multicast Routing for Service-Oriented Applications

  • Wang, Hui;Mao, Jianbiao;Li, Tao;Sun, Zhigang;Gong, Zhenghu;Lv, Gaofeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2231-2252
    • /
    • 2012
  • With the prevalence of diverse services-oriented applications, such as IPTV systems and on-line games, the current underlying communication networks face more and more challenges on the aspects of flexibility and adaptability. Therefore, an effective and efficient multicast routing mechanism, which can fulfill different requirements of different personalized services, is critical and significant. In this paper, we first define the neighbor gradient, which is calculated based on the weighted sum of attributes such as residual link capacity, normalized hop count, etc. Then two distributed multicast routing algorithms which are neighbor Gradient-based Multicast Routing for Static multicast membership (GMR-S) and neighbor Gradient-based Multicast Routing for Dynamic multicast membership (GMR-D), are proposed. GMR-S is suitable for static membership situation, while GMR-D can be used for the dynamic membership network environment. Experimental results demonstrate the effectiveness and efficiency of our proposed methods.