• Title/Summary/Keyword: National Defense Data

Search Result 665, Processing Time 0.033 seconds

Improvement of ITSM IT Service Efficiency in Military Electronic Service

  • Woo, Hanchul;Jeong, Suk-Jae;Huh, Jun-Ho
    • Journal of Information Processing Systems
    • /
    • v.16 no.2
    • /
    • pp.246-260
    • /
    • 2020
  • IT Service Management (ITSM) achieves consolidated management for the IT services supporting the acquisition system, and no outside connections can be established with such ITSM. Issues pertaining to the D2B can be addressed to System Q&A or a Call Center for problem-solving. In other words, internal staff can take the necessary measures for problems by directly connecting with ITSM. Currently, diverse innovative technologies are being used in electronics and ubiquitous computing environments. This allows us to create a better world by providing the backbone for remarkable development in our human society in the fields of electronics, devices, computer science, and engineering. Following the expansion of IT services in the military acquisition sector such as Defense Electronic Procurement, military export/import support system, etc., customers' dependence on IT for conducting business with the military or related companies is increasing, including the military's dependence on the same technology for services to the public. Nonetheless, issues pertaining to the simplified/integrated management of complex IT service management systems, including slow system recovery, lack of integrated customer service window, and insufficient information sharing, have become the priority problems that IT managers are required to solve. Therefore, this study conducted research on the integrated management of IT services provided by Korea's national defense acquisition system, which was developed based on the existing system IT Infrastructure Library (ITIL) v2, and investigated the level of satisfaction with services with focus on ensuring that it can be used for understanding the necessity of the system and its advancement in the future.

Double-Input Singe-Output Architecture of LNA and Correction Method of Phase Variation for OTM Satellite Communication System (OTM(On-The-Move) 위성 통신 시스템을 위한 저잡음 증폭기 출력채널 단일화 구조 및 위상보정 방안)

  • Kwon, Kun-Sup;Ryu, Heung-Gyoon;Heo, Jong-Wan;Hwang, Ki-Min;Jang, Myung-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.1
    • /
    • pp.1-8
    • /
    • 2015
  • In this paper, a double-input single-output architecture of a LNA(Low Noise Amplifier) is presented to enable to be devised for light weight and small-sized OTM(On-The-Move) satellite communication system suitable to be mounted on vehicles. In spite of advantages of the double-input single-output architecture of a LNA such as reduction of the number of physical channels, it results in time-varying phase error between a fundamental mode path and a high-order mode path. This paper shows that the error can be corrected by adding pilot signals to the LNA and using signal processing, and also gives the measurement data to use the method mentioned above.

MLP Based Real-Time Gravity Disturbance Compensation in INS Embedded Computer (다층 레이어 퍼셉트론 기반 INS 내장형 컴퓨터에서의 실시간 중력교란 보상)

  • Hyun-seok Kim;Hyung-soo Kim;Yun-hyuk Choi;Yun-chul Cho;Chan-sik Park
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.5
    • /
    • pp.674-684
    • /
    • 2023
  • In this paper, a real-time prediction technique for gravity disturbances is proposed using a multi-layer perceptron (MLP) model. To select a suitable MLP model, 4 models with different network sizes were designed to compare the training accuracy and execution time. The MLP models were trained using the data of vehicle moving along the surface of the sea or land, including their positions and gravity disturbance. The gravity disturbances were calculated using the 2160th degree and order EGM2008 with SHM. Among the models, MLP4 demonstrated the highest training accuracy. After training, the weights and biases of the 4 models were stored in the embedded computer of the INS to implement the MLP network. MLP4 was found to have the shortest execution time among the 4 models. These research results are expected to contribute to improving the navigation accuracy of INS through gravity disturbance compensation in the future.

A Study on Operational Patterns for Drone Reconnaissance and Attack Missions (정찰 및 공격 임무 수행 드론의 운용양상에 관한 연구)

  • Jong su Park;Keon Young Yi
    • Journal of The Korean Institute of Defense Technology
    • /
    • v.5 no.3
    • /
    • pp.18-28
    • /
    • 2023
  • The threat of drones is widely occurring not only in the military field but also for important national facilities such as airports and nuclear power plants. Drones are very diverse in types and control methods, so it is not easy to have a uniform defense method and system, and with the development of drone technology, the war paradigm using drones as weapons is also changing. In particular, advances in drone technology are improving the efficiency and accuracy of reconnaissance and attack missions. Nevertheless, it is very difficult to secure research cases on military operation of drones due to difficulties in obtaining information on military operations. Therefore, in this study, we try to create basic data that can effectively establish a plan for performing reconnaissance and attack missions by deriving each operational aspect through analysis of operation cases of reconnaissance and attack drones.

  • PDF

A Study on Privacy Preserving Machine Learning (프라이버시 보존 머신러닝의 연구 동향)

  • Han, Woorim;Lee, Younghan;Jun, Sohee;Cho, Yungi;Paek, Yunheung
    • Annual Conference of KIPS
    • /
    • 2021.11a
    • /
    • pp.924-926
    • /
    • 2021
  • AI (Artificial Intelligence) is being utilized in various fields and services to give convenience to human life. Unfortunately, there are many security vulnerabilities in today's ML (Machine Learning) systems, causing various privacy concerns as some AI models need individuals' private data to train them. Such concerns lead to the interest in ML systems which can preserve the privacy of individuals' data. This paper introduces the latest research on various attacks that infringe data privacy and the corresponding defense techniques.

Storage Lifetime Prediction of Zr-Ni Delay System in Fuze K510 for High Explosive Shell (충격신관 K510용 Zr-Ni계 지연관의 저장수명 예측)

  • Park, Byung-Chan;Chang, Il-Ho;Back, Seung-Jun;Son, Young-Kap;Jung, Eun-Jin;Hwang, Taek-Sung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.6
    • /
    • pp.719-726
    • /
    • 2009
  • A delay system in fuze for high explosive shell is an important safety device, but failure in the delay system usually causes failure of the shell. Root-cause analysis of failure in the delay system is required since failure in over 10-years stored delay system recently occurs. In this paper, failure in the delay system was reproduced experimentally to examine aged characteristics of the delay system, and the failed delay system shows the same characteristics as ones of failed delay systems in field. Based on the reproduced experiments, accelerated life testings and the data analysis of failure times of delay systems were performed to predict the storage lifetime.

Classification of HTTP Automated Software Communication Behavior Using a NoSQL Database

  • Tran, Manh Cong;Nakamura, Yasuhiro
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.2
    • /
    • pp.94-99
    • /
    • 2016
  • Application layer attacks have for years posed an ever-serious threat to network security, since they always come after a technically legitimate connection has been established. In recent years, cyber criminals have turned to fully exploiting the web as a medium of communication to launch a variety of forbidden or illicit activities by spreading malicious automated software (auto-ware) such as adware, spyware, or bots. When this malicious auto-ware infects a network, it will act like a robot, mimic normal behavior of web access, and bypass the network firewall or intrusion detection system. Besides that, in a private and large network, with huge Hypertext Transfer Protocol (HTTP) traffic generated each day, communication behavior identification and classification of auto-ware is a challenge. In this paper, based on a previous study, analysis of auto-ware communication behavior, and with the addition of new features, a method for classification of HTTP auto-ware communication is proposed. For that, a Not Only Structured Query Language (NoSQL) database is applied to handle large volumes of unstructured HTTP requests captured every day. The method is tested with real HTTP traffic data collected through a proxy server of a private network, providing good results in the classification and detection of suspicious auto-ware web access.

A Roots Method in GI/PH/1 Queueing Model and Its Application

  • Choi, Kyung Hwan;Yoon, Bong Kyoo
    • Industrial Engineering and Management Systems
    • /
    • v.12 no.3
    • /
    • pp.281-287
    • /
    • 2013
  • In this paper, we introduce a roots method that uses the roots inside the unit circle of the associated characteristics equation to evaluate the steady-state system-length distribution at three epochs (pre-arrival, arbitrary, and post-departure) and sojourn-time distribution in GI/PH/1 queueing model. It is very important for an air base to inspect airplane oil because low-quality oil leads to drop or breakdown of an airplane. Since airplane oil inspection is composed of several inspection steps, it sometimes causes train congestion and delay of inventory replenishments. We analyzed interarrival time and inspection (service) time of oil supply from the actual data which is given from one of the ROKAF's (Republic of Korea Air Force) bases. We found that interarrival time of oil follows a normal distribution with a small deviation, and the service time follows phase-type distribution, which was first introduced by Neuts to deal with the shortfalls of exponential distributions. Finally, we applied the GI/PH/1 queueing model to the oil train congestion problem and analyzed the distributions of the number of customers (oil trains) in the queue and their mean sojourn-time using the roots method suggested by Chaudhry for the model GI/C-MSP/1.

Optimum Allocation Model of Military Engineer Equipments for Artillery Position Development (포병진지 구축을 위한 공병장비 최적배정 모형)

  • Jang, Young Cho;Lee, Moon Gul
    • Korean Management Science Review
    • /
    • v.34 no.2
    • /
    • pp.103-113
    • /
    • 2017
  • The artillery is a key element of the ground forces operation during wartime, and the military engineers support the artillery position development operation to support the smooth operation of the artillery. In establishing the artillery position development operation plan, the commander requires more than his intuition to find the best option reflecting a number of elements of the battlefield situation which changes every minute. Moreover, the number of available equipment is smaller than the number of required position developments, and the effective equipment operation becomes essential element of this issue. This study quantified the capability of the available engineering equipment, organized a number of teams enabling equipment to put out the maximum capacity based on the quantified figures, and formed the model which allocates the team to the developing points to minimize the developing time. The goal programming method was applied to resolve the problem. The developed model was applied to compare the total mission duration following the number of teams, the variable for commander's decision, and the result of this study can be used as the quantitative data for commander's decision making process in establishing the artillery position development support operation through effective equipment management.

Study of Functional Verification to Abiotic Stress through Antioxidant Gene Transformation of Pyropia yezoensis (Bangiales, Rhodophyta) APX and MnSOD in Chlamydomonas

  • Lee, Hak-Jyung;Yang, Ho yeon;Choi, Jong-il
    • Journal of Microbiology and Biotechnology
    • /
    • v.28 no.7
    • /
    • pp.1217-1224
    • /
    • 2018
  • Seaweeds produce antioxidants to counteract environmental stresses, and these antioxidant genes are regarded as important defense strategies for marine algae. In this study, the expression of Pyropia yezoensis (Bangiales, Rhodophyta) ascorbate peroxidase (PyAPX) and manganese-superoxide dismutase (PyMnSOD) was examined by qRT-PCR in P. yezoensis blades under abiotic stress conditions. Furthermore, the functional relevance of these genes was explored by overexpressing them in Chlamydomonas. A comparison of the different expression levels of PyAPX and PyMnSOD after exposure to each stress revealed that both genes were induced by high salt and UVB exposure, being increased approximately 3-fold after 12 h. The expression of the PyAPX and PyMnSOD genes also increased following exposure to $H_2O_2$. When these two genes were overexpressed in Chlamydomonas, the cells had a higher growth rate than control cells under conditions of hydrogen peroxide-induced oxidative stress, increased salinity, and UV exposure. These data suggest that Chlamydomonas is a suitable model for studying the function of stress genes, and that PyAPX and PyMnSOD genes are involved in the adaptation and defense against stresses that alter metabolism.