• Title/Summary/Keyword: National defense information network

Search Result 232, Processing Time 0.032 seconds

Terrain Cover Classification Using Wavelet Features and Neural Networks (웨이브릿 특징과 신경망을 이용한 지형분류)

  • Sung, Gi-Yeul;Kwak, Dong-Min;Kim, Do-Jong;Lyou, Joon
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.853-854
    • /
    • 2008
  • The terrain perception technology using passive sensors plays a key role to enhance autonomous mobility for UGV. We present an effective method to classify terrain covers based on the color information. Considering a real-time implementation, neural network is applied for the terrain classifier and wavelet features extracted from the images are used. Test results show that the proposed algorithm has a promising classification performance.

  • PDF

Design and Evaluation of Information Broker Architecture for Network-Centric Operational Environment (네트워크 중심 작전 환경을 위한 정보 브로커 아키텍처 설계 및 평가)

  • Park, Jejun;Kang, Dongsu
    • Journal of KIISE
    • /
    • v.43 no.6
    • /
    • pp.668-677
    • /
    • 2016
  • The information superiority through effective networking is a core element that accelerates command decision for mission completion. Our military wants to acquire capabilities of effective information sharing with Network-Centric Operational Environment(NCOE) for Network-Centric Warfare (NCW). In this paper, we suggested an information broker for overcoming current limits and maximizing future expandability and possibility of information sharing capacities. The information broker, which is an intermediate layer between users and information providers, provides the functions for mediating and managing information and for ensuring security of the system. We evaluated the consistency of proposed architecture and the implementation of the operational architecture design concept using existing design frameworks.

Protection of Information Sovereignty as an Important Component of the Political Function of the State

  • Zadorozhnia, Halyna;Mykhtunenko, Viktoriia;Kovalenko, Hanna;Kuryliuk, Yurii;Yurchenko, Liubov;Maslennykova, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.151-154
    • /
    • 2021
  • State information policy is an important component of foreign and domestic policy of the country and covers all spheres of society. The rapid development of the information sphere is accompanied by the emergence of fundamentally new threats to the interests of the individual, society, state and its national security. The article considers the components of the state information policy to ensure information security of the country and identifies the main activities of public authorities in this area. Internal and external information threats to the national security of Ukraine and ways to guarantee the information security of the country are analyzed. Information security is seen as a component of national security, as well as a global problem of information protection, information space, information sovereignty of the country and information support of government decisions. Approaches to ensure the process of continuity of the information security system of the state in order to monitor new threats, identify risks and levels of their intensity are proposed.

A Study on the Implementation and Operation of an Architecture-Based M&S System for Ministry of National Defense (아키텍처 기반의 국방 Modeling & Simulation 체계 구축 및 운영에 관한 연구)

  • Kim, Hyoung Jin;Park, Chan Uk
    • Informatization Policy
    • /
    • v.18 no.1
    • /
    • pp.73-99
    • /
    • 2011
  • The Korean military has developed and operated computer, network, communication technologies as well as war game models to strengthen the national defense M&S continuously. In particular, lots of projects for developing models for drill/training, analyses, and acquired fields are being conducted in the military. However, it needs to look into the actual conditions and seek for strategies to develop the national defense M&S. First of all, in the field of war games, various national defense architectures have been built, including war and information environment architectures starting from the resource architecture in 2006. However, the function of drill and training is limited, so additional war game architectures are required to be built. To build joint war game architectures available as an effective verification tool to implement plans of the national defense and war architectures, this study examines the actual conditions of the current war game systems and suggested building joint war game architectures.

  • PDF

Methodology to Estimate the Cost of Network Facilities with ABC and its Application (ABC를 활용한 통신 설비 원가 산정 방법론 및 활용 방안)

  • Yoon, Bong-Kyoo;Yang, Won-Seok
    • IE interfaces
    • /
    • v.20 no.3
    • /
    • pp.395-406
    • /
    • 2007
  • In the telecommunication industry, estimation of the cost of network facilities is very important since depreciation cost of the facilities accounts for a large portion of the product cost. Moreover, cost estimation in the industry becomes more difficult because of increasing indirect cost upon digital convergence, expanding multi-purpose facilities, complexity of service product, etc. Nevertheless, not much seem to have been done in improving estimation methodology of the cost of network facilities. As a result, the quality of cost information on network facilities has deteriorated, and now even decision-makers in the industry dismiss the information. Recently, two major telecommunication companies adopted a new network cost estimation method to deal with the issue. In this paper, we study the concept of new cost estimation method and the procedure to develop and apply it. We also suggest the method to carry out the cost allocation using Matlab which is more efficient and time-saving than other commercial cost calculation packages.

A Combat Effectiveness Evaluation Algorithm Considering Technical and Human Factors in C4I System (NCW 환경에서 C4I 체계 전투력 상승효과 평가 알고리즘 : 기술 및 인적 요소 고려)

  • Jung, Whan-Sik;Park, Gun-Woo;Lee, Jae-Yeong;Lee, Sang-Hoon
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.2
    • /
    • pp.55-72
    • /
    • 2010
  • Recently, the battlefield environment has changed from platform-centric warfare(PCW) which focuses on maneuvering forces into network-centric warfare(NCW) which is based on the connectivity of each asset through the warfare information system as information technology increases. In particular, C4I(Command, Control, Communication, Computer and Intelligence) system can be an important factor in achieving NCW. It is generally used to provide direction across distributed forces and status feedback from thoseforces. It can provide the important information, more quickly and in the correct format to the friendly units. And it can achieve the information superiority through SA(Situational Awareness). Most of the advanced countries have been developed and already applied these systems in military operations. Therefore, ROK forces also have been developing C4I systems such as KJCCS(Korea Joint Command Control System). And, ours are increasing the budgets in the establishment of warfare information systems. However, it is difficult to evaluate the C4I effectiveness properly by deficiency of methods. We need to develop a new combat effectiveness evaluation method that is suitable for NCW. Existing evaluation methods lay disproportionate emphasis on technical factors with leaving something to be desired in human factors. Therefore, it is necessary to consider technical and human factors to evaluate combat effectiveness. In this study, we proposed a new Combat Effectiveness evaluation algorithm called E-TechMan(A Combat Effectiveness Evaluation Algorithm Considering Technical and Human Factors in C4I System). This algorithm uses the rule of Newton's second law($F=(m{\Delta}{\upsilon})/{\Delta}t{\Rightarrow}\frac{V{\upsilon}I}{T}{\times}C$). Five factors considered in combat effectiveness evaluation are network power(M), movement velocity(v), information accuracy(I), command and control time(T) and collaboration level(C). Previous researches did not consider the value of the node and arc in evaluating the network power after the C4I system has been established. In addition, collaboration level which could be a major factor in combat effectiveness was not considered. E-TechMan algorithm is applied to JFOS-K(Joint Fire Operating System-Korea) system that can connect KJCCS of Korea armed forces with JADOCS(Joint Automated Deep Operations Coordination System) of U.S. armed forces and achieve sensor to shooter system in real time in JCS(Joint Chiefs of Staff) level. We compared the result of evaluation of Combat Effectiveness by E-TechMan with those by other algorithms(e.g., C2 Theory, Newton's second Law). We can evaluate combat effectiveness more effectively and substantially by E-TechMan algorithm. This study is meaningful because we improved the description level of reality in calculation of combat effectiveness in C4I system. Part 2 will describe the changes of war paradigm and the previous combat effectiveness evaluation methods such as C2 theory while Part 3 will explain E-TechMan algorithm specifically. Part 4 will present the application to JFOS-K and analyze the result with other algorithms. Part 5 is the conclusions provided in the final part.

A Statistical Detection Method to Detect Abnormal Cluster Head Election Attacks in Clustered Wireless Sensor Networks (클러스터 기반 WSN에서 비정상적인 클러스터 헤드 선출 공격에 대한 통계적 탐지 기법)

  • Kim, Sumin;Cho, Youngho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1165-1170
    • /
    • 2022
  • In WSNs, a clustering algorithm groups sensor nodes on a unit called cluster and periodically selects a cluster head (CH) that acts as a communication relay on behalf of nodes in each cluster for the purpose of energy conservation and relay efficiency. Meanwhile, attack techniques also have emerged to intervene in the CH election process through compromised nodes (inside attackers) and have a fatal impact on network operation. However, existing countermeasures such as encryption key-based methods against outside attackers have a limitation to defend against such inside attackers. Therefore, we propose a statistical detection method that detects abnormal CH election behaviors occurs in a WSN cluster. We design two attack methods (Selfish and Greedy attacks) and our proposed defense method in WSNs with two clustering algorithms and conduct experiments to validate our proposed defense method works well against those attacks.

Classifying Midair Collision Risk in Airspace Using ADS-B and Mode-S Open-source Data (ADS-B와 Mode-S 오픈소스 데이터를 활용한 공중충돌 위험 양상 분류)

  • Jongboo Kim;Dooyoul Lee
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.5
    • /
    • pp.552-560
    • /
    • 2023
  • Aircraft midair collisions are dangerous events that can cause massive casualties. To prevent this, civil aviation has mandated the installation of TCAS (ACAS), which is becoming more sophisticated with the help of new technologies. However, there are institutional problems in collecting data for TCAS research in Korea, limiting the ability to obtain data for personal research. ADS-B and Mode-S automatic broadcast various information about the flight status of the aircraft. This data also contains information about TCAS RA, which can be used by anyone to find examples of TCAS RA operation. We used the databases of ADS-B Exchange and Opensky-Network to acquire data and visually represent three TCAS RA cases through Python coding. We also identified domestic TCAS cases in the first half of 2023 and analyzed their characteristics to confirm the usefulness of the data.

Aspects Of Architectural Design Using BIM Technologies

  • Tikhonova, Oleksandra;Selikhova, Yana;Donenko, Vasyl;Kulik, Mykhailo;Frolov, Denys;Iasechko, Maksym
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.85-92
    • /
    • 2022
  • In this article, we look at the application of BIM (Building Information Modeling) in sustainable infrastructures. In response to global warming, energy shortages, and environmental degradation, people are trying to build eco-friendly, low-carbon cities and promote eco-friendly homes. A "green" building is the entire life cycle of a building that includes maximizing the conservation of resources (energy, water, land, and materials), protecting the environment, reducing pollution, providing people with healthy, comfortable, and efficient use of space, and establishing harmony between nature and architecture. In the field of ecological and sustainable buildings, BIM modeling can be integrated into buildings with analog energy, air flow analysis, and solar building ecosystems. Using BIM technologies, you can reduce the amount of waste and improve the quality of construction. These technologies create "visualization" of digital building models through multidimensional digital design solutions that provide" modeling and analysis "of Scientific Collaboration Platforms for designers, architects, utility engineers, developers, and even end users. Moreover, BIM helps them use three-dimensional digital models in project design and construction and operational management.

HRKT: A Hierarchical Route Key Tree based Group Key Management for Wireless Sensor Networks

  • Jiang, Rong;Luo, Jun;Wang, Xiaoping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.8
    • /
    • pp.2042-2060
    • /
    • 2013
  • In wireless sensor networks (WSNs), energy efficiency is one of the most essential design considerations, since sensor nodes are resource constrained. Group communication can reduce WSNs communication overhead by sending a message to multiple nodes in one packet. In this paper, in order to simultaneously resolve the transmission security and scalability in WSNs group communications, we propose a hierarchical cluster-based secure and scalable group key management scheme, called HRKT, based on logic key tree and route key tree structure. The HRKT scheme divides the group key into cluster head key and cluster key. The cluster head generates a route key tree according to the route topology of the cluster. This hierarchical key structure facilitates local secure communications taking advantage of the fact that the nodes at a contiguous place usually communicate with each other more frequently. In HRKT scheme, the key updates are confined in a cluster, so the cost of the key updates is reduced efficiently, especially in the case of massive membership changes. The security analysis shows that the HRKT scheme meets the requirements of group communication. In addition, performance simulation results also demonstrate its efficiency in terms of low storage and flexibility when membership changes massively.