• Title/Summary/Keyword: National Defense Data

Search Result 665, Processing Time 0.027 seconds

A Study on Management of the Secret Data in Defense Information System (Focusing on Defense Ammunition Information System) (국방정보체계의 비밀데이터 관리 방안 연구 (국방탄약정보체계를 중심으로))

  • Yeo, Seong-Cheol;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1285-1292
    • /
    • 2014
  • Ministry of National Defense made has set a standard regulations and detail to classify the revision of the military security and the plan to adjust or use those secrets. Moreover, the confidential management system with online secret process is operated by it. However, the study for management plan of stored secret data in these systems should be urgently required because the current regulation of military headquarter is different from present military situation so that it is not applicable up to now. This paper is focused on the Defense Ammunition Information Systems to find the proper way to deal with the secret data of the Defense Information Systems. The purpose is to describe the management plan for the secret data consistent with the current situation of the Military by study for the secret classification and case study. Therefore limitations are considered and solutions are finally suggested in this paper.

An Exploratory Study for the Development Plan of the National Defense Experiment Project Conducted by the Navy (해군에서 수행하는 국방 실험사업 발전방안을 위한 탐색적 연구)

  • Woo, Dongsung;Lee, Boram;Ryu, Jaehak;Kim, Dongho
    • Journal of Information Technology Services
    • /
    • v.20 no.6
    • /
    • pp.151-162
    • /
    • 2021
  • Since 2012, the Navy has been conducting a defense experiment project to evaluate the possibility of military application by introducing new technologies related to excellent private informatization in the defense field. There are many projects that have spread because they are suitable for military use, but some have ended as experimental projects themselves because they do not meet the military's required performance. Continuous development is required as increasing the spread rate by successfully carrying out defense experiment projects is the basis for defense reform. This study analyzed the performance of major projects carried out by the Navy and presented considerations for the development of defense experiment projects to be carried out by the Navy in the future. The main achievements were derived in various ways in terms of project performance and system operation, and the considerations can be summarized in the field of raising business requirements, securing resources for system operation, determining the size of companies for project execution, and security measures. The research results can be used as data to determine the required defense experiment project and efficiently carry out the project.

An Exploratory Study on the Applicability of Tactics in Team Performance Evaluation

  • Jungsu MOON;Ilhyeok PARK;Nam-Su KIM
    • Journal of Sport and Applied Science
    • /
    • v.8 no.3
    • /
    • pp.21-33
    • /
    • 2024
  • Purpose: The purpose of this study is to explore, extract and categorize the team's tactical factors in soccer matches. Tactical factors are extracted on the basis of the phases consisting a football match (attack, defense, attacking transition, and defensive transition). Research design, data, and methodology: A semi-structural interviews were conducted with a group of experts of five football managers and coaches to explore tactical factors. Analysis of the content was done using a categorical aggregation or direct interpretation, and then was conducted factorial extraction and categorization. Results: In the attack phase, a direct attack and a step-by-step (occupation) attack form the type of attack, and in the attack transition phase, a long counter attack and a short counter attack form the type of attack. The type of defense in the defense phase was divided into regional defense and compression defense, and the type of defense in the defense transition phase was divided into defense for delaying counterattacks and defense for immediate pressure. Each tactics appeared differently depending on the situation of the game and the play of style. Conclusions: It may indicate the team's performance and has the potential for being used as a team performance factor. Further implications were discussed.

Multiple Target Angle-tracking Using Angular Innovations Extracted from Noise Subspace (잡음 부공간에서 추출된 방위 변위를 이용한 다중 표적 방위 추적)

  • Hwang Soo Bok;Kim Jin Seok;Kim Hyun Sik;Nam Ki Gon
    • The Journal of the Acoustical Society of Korea
    • /
    • v.24 no.1E
    • /
    • pp.34-37
    • /
    • 2005
  • Ryu et al. proposed a multiple target angle-tracking algorithm without a data association problem using angular innovations. This algorithm, however, needs the computational loads in proportion to the square number of sensors regardless of the number of targets, because it uses a nonlinear equation between the signal subspace and angular innovation. In this Paper, we proposed an efficient algorithm for the multiple target angle-tracking using angular innovations. The proposed algorithm extracts the angular innovations from noise subspace. Also, it is demonstrated by computer simulations dealing with the tracking of crossing targets. The simulation results show that the computational loads of the proposed algorithm are $80\%$ and $60\%$ of those of Ryu's algorithm for 3 targets and 6 targets without degrading the performance of the target tracking.

A study on forecasting attendance rate of reserve forces training based on Data Mining (데이터마이닝에 기반한 예비군훈련 입소율 예측에 관한 연구)

  • Cho, Sangjoon;Ma, Jungmok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.261-267
    • /
    • 2021
  • The mission of the reserve forces unit is to prepare good training for reserve forces during peacetime. For good training, units require proper organization support agents, but they have difficulties due to a lack of unit members. For that reason, the units forecast the monthly attendance rate of reserve forces (using the x-1 year's result) to organize support agents and unit schedule. On the other hand, the existing planning method can have more errors compared to the actual result of the attendance rate. This problem has a negative effect on the training performance. Therefore, it requires more accurate forecast models to reduce attendance rate errors. This paper proposes an attendance rate forecast model using data mining. To verify the proposed data mining based model, the existing planning method was compared with the proposed model using real data. The results showed that the proposed model outperforms the existing planning method.

Xanthomonas oryzae pv. oryzae triggers complex transcriptomic defense network in rice

  • Nino, Marjohn;Nogoy, Franz M.;Song, Jae-Young;Kang, Kwon-Kyoo;Cho, Yong-Gu
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2017.06a
    • /
    • pp.164-164
    • /
    • 2017
  • High throughput transcriptome investigations of immunity in plants highlight the complexity of gene networks leading to incompatible interaction. To identify genes crucial to resistance against Xanthomonas oryzae pv oryzae, functional genetic analysis of selected differentially expressed genes from our microarray data set was carried out. A total of 13 overexpression vector constructs were made using 35S CaMV promoter which drive constitutive expression in rice. Most of the genes are developmentally expressed especially during maximum tillering stage and are commonly highly expressed in the leaves. When screened against Xoo strain K2, the transgenic plants displayed shorter lesion length compared with wild type Dongjin which indicates partial resistance. The levels of ROS continuously magnified after inoculation which indicates robust cellular sensing necessary to initiate cell death. Elevated transcripts levels of several defense-related genes at the downstream of defense signal network also corroborate the phenotype reaction of the transgenic plants. Moreover, expression assays revealed regulation of these genes by cross-communicating signal-transductions pathways mediated by salicylic and jasmonic acid. These collective findings revealed the key immune signaling conduits critical to mount full defense against Xoo.

  • PDF

Analysis of K-Defense Cloud Computing Service Availability Considering of Cloud Computing Traffic Growth (클라우드 컴퓨팅 트래픽 증가를 고려한 국방 클라우드 컴퓨팅 서비스 가용성 분석)

  • Lee, Sung-Tae;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.93-100
    • /
    • 2013
  • In 2012, According to 'Cisco Global Cloud Index 2011-2016', the Cisco company forecasted that global data center traffic will nearly quadruple and cloud traffic will nearly sextuple by 2016. Such a rapid growing of traffic is caused by traffic inside the data center and cloud computing workloads. In 2010, the Ministry of National Defense decided to build a Mega Center including the cloud computing technology by 2014, as part of the '2012 Information Service Plan', which is now underway. One of the factors to consider is cloud computing traffic to build a Mega Center. Since the K-defense cloud computing system is built, K-defense cloud computing traffic will increase steadily. This paper, analyzed the availability of K-defense cloud computing service with the K-defense cloud computing traffic increasing using K-Defense cloud computing test system and CloudAnalyst simulation tool. Created 3 scenarios and Simulated with these scenarios, the results are derived that the availability of K-defense cloud computing test system is fulfilled, even cloud workloads are increased as muh as forecasted cloud traffic growth from now until 2016.

Exploring trends in U.N. Peacekeeping Activities in Korea through Topic Modeling and Social Network Analysis (토픽모델링과 사회연결망 분석을 통한 우리나라 유엔 평화유지활동 동향 탐색)

  • Donghyeon Jung;Chansong Kim;Kangmin Lee;Soeun Bae;Yeon Seo;Hyeonju Seol
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.4
    • /
    • pp.246-262
    • /
    • 2023
  • The purpose of this study is to identify the major peacekeeping activities that the Korean armed forces has performed from the past to the present. To do this, we collected 692 press releases from the National Defense Daily over the past 20 years and performed topic modeling and social network analysis. As a result of topic modeling analysis, 112 major keywords and 8 topics were derived, and as a result of examining the Korean armed forces's peacekeeping activities based on the topics, 6 major activities and 2 related matters were identified. The six major activities were 'Northeast Asian defense cooperation', 'multinational force activities', 'civil operations', 'defense diplomacy', 'ceasefire monitoring group', and 'pro-Korean activities', and 'general troop deployment' related to troop deployment in general. Next, social network analysis was performed to examine the relationship between keywords and major keywords related to topic decision, and the keywords 'overseas', 'dispatch', and 'high level' were derived as key words in the network. This study is meaningful in that it first examined the topic of the Korean armed forces's peacekeeping activities over the past 20 years by applying big data techniques based on the National Defense Daily, an unstructured document. In addition, it is expected that the derived topics can be used as a basis for exploring the direction of development of Korea's peacekeeping activities in the future.

Comparison of Storage Lifetimes by Variance Assumption using Accelerated Degradation Test Data (파괴적 가속열화시험 데이터의 분산가정에 따른 수명비교)

  • Kim, Jonggyu;Back, Seungjun;Son, Youngkap;Park, Sanghyun;Lee, Moonho;Kang, Insik
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.2
    • /
    • pp.173-179
    • /
    • 2018
  • Estimating reliability of a non-repairable system using the degradation data, variance assumption such as homogeneity (constant) or heteroscedasticity (time-variant) could affect accuracy of reliability estimation. This paper showed reliability estimation and comparison results under normal conditions using accelerated degradation data obtained from destructive measurements, according to variance assumption of the data at each measurement time. Degradation data from three accelerated conditions with stress factors of temperature and humidity were used to estimate reliability. The $B_{10}$ lifetime was estimated as 1243.8 years by constant variance assumption, and 18.9 years by time-variant variance. And variance assumption provided different analysis results of important stresses to reliability. Thus, accurate assumption of variance at each measurement time is required when estimating reliability using degradation data of a non-repairable system.

Frequency-Code Domain Contention in Multi-antenna Multicarrier Wireless Networks

  • Lv, Shaohe;Zhang, Yiwei;Li, Wen;Lu, Yong;Dong, Xuan;Wang, Xiaodong;Zhou, Xingming
    • Journal of Communications and Networks
    • /
    • v.18 no.2
    • /
    • pp.218-226
    • /
    • 2016
  • Coordination among users is an inevitable but time-consuming operation in wireless networks. It severely limit the system performance when the data rate is high. We present FC-MAC, a novel MAC protocol that can complete a contention within one contention slot over a joint frequency-code domain. When a node takes part in the contention, it generates randomly a contention vector (CV), which is a binary sequence of length equal to the number of available orthogonal frequency division multiplexing (OFDM) subcarriers. In FC-MAC, different user is assigned with a distinct signature (i.e., PN sequence). A node sends the signature at specific subcarriers and uses the sequence of the ON/OFF states of all subcarriers to indicate the chosen CV. Meanwhile, every node uses the redundant antennas to detect the CVs of other nodes. The node with the minimum CV becomes the winner. The experimental results show that, the collision probability of FC-MAC is as low as 0.05% when the network has 100 nodes. In comparison with IEEE 802.11, contention time is reduced by 50-80% and the throughput gain is up to 200%.