• Title/Summary/Keyword: Tactical computer

Search Result 107, Processing Time 0.023 seconds

A Study on Construction Method of AI based Situation Analysis Dataset for Battlefield Awareness

  • Yukyung Shin;Soyeon Jin;Jongchul Ahn
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.10
    • /
    • pp.37-53
    • /
    • 2023
  • The AI based intelligent command and control system can automatically analyzes the properties of intricate battlefield information and tactical data. In addition, commanders can receive situation analysis results and battlefield awareness through the system to support decision-making. It is necessary to build a battlefield situation analysis dataset similar to the actual battlefield situation for learning AI in order to provide decision-making support to commanders. In this paper, we explain the next step of the dataset construction method of the existing previous research, 'A Virtual Battlefield Situation Dataset Generation for Battlefield Analysis based on Artificial Intelligence'. We proposed a method to build the dataset required for the final battlefield situation analysis results to support the commander's decision-making and recognize the future battlefield. We developed 'Dataset Generator SW', a software tool to build a learning dataset for battlefield situation analysis, and used the SW tool to perform data labeling. The constructed dataset was input into the Siamese Network model. Then, the output results were inferred to verify the dataset construction method using a post-processing ranking algorithm.

A Study on Standardization of IISS Software for Combat Interface Information Analysis of Naval Combat Management System

  • Cheol-Hoon Kim;Dong-Han Jung;Young-San Kim;Hyo-Jo Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.2
    • /
    • pp.119-126
    • /
    • 2024
  • The IISS(Integrated Interface Storage System) software performs the function of transmitting tactical domain messages of Combat Management System for interface analysis of Naval Combat System. The source code is relatively large because the IISS software handles most messages. The modifications of source code of the IISS software occur frequently due to changes in interconnected equipment and messages. Therefore, additional effort and cost are required during the development process. In this paper, we studied standardization of the IISS software to improve reusability. Through the feature model, the components of the IISS software were divided by function and modification elements were separated. And the structure of the IISS software was improved by applying design patterns. As a result, it was possible to minimize modifications of the IISS software by changes in interconnected equipment and messages and a reduction in development costs could be expected.

Realtime Strategy Generation System using Case-based Reasoning (사례기반 추론을 이용한 실시간 전술 생성 시스템 설계)

  • Park, Jong-An;Hong, Chul-Eui;Kim, Won-Il
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.5
    • /
    • pp.49-54
    • /
    • 2011
  • Case-based reasoning is an efficient method to find solutions for new problems by using past cases after appropriate changes. It is widely used in everyday life because it resembles the way human acts. In this paper, we propose a military system that generates the most appropriate tactics for CGF (Computer Generated Forces) by utilizing past practices. It indeed applies case-based reasoning at the process of armed conflict. When the CGF squad on a mission, they will be given an action plan to reach the final goal. In the process of executing, tactics for specific action should be organized such as attacks, ambushes, and tactical moves. By using the proposed method, tactics were generated by case-based reasoning. The proposed system successfully receives input through each command and control agent, measures the degree of similarity with the case in case DB, selects the most similar case, modifies, uses, and then stores it for next time.

Detection Model of Malicious Nodes of Tactical Network for Korean-NCW Environment (한국형 NCW를 위한 전술네트워크에서의 악의적인 노드 검출 모델)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Ryou, Hwang-Bin;Jo, Yong-Gun
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.71-77
    • /
    • 2011
  • NCW(Network Centric- Warfare) encompasses the concept to use computer data processing and network linkage communications techniques, share information and furthermore, enhance the effectiveness of computer-operating systems. As IT(Information & Technology) have become developed in the recent years, the existing warfare system-centered conventional protocol is not use any longer. Instead, network-based NCW is being widely-available, today. Under this changing computer environment, it becomes important to establish algorithm and build the stable communication systems. Tools to identify malign node factors through Wireless Ad-hoc network cause a tremendous error to analyze and use paths of even benign node factors misreported to prove false without testing or indentifying such factors to an adequate level. These things can become an obstacle in the process of creating the optimum network distribution environment. In this regard, this thesis is designed to test and identify paths of benign node factors and then, present techniques to transmit data through the most significant open short path, with the tool of MP-SAR Protocol, security path search provider, in Ad-hoc NCW environment. Such techniques functions to identify and test unnecessary paths of node factors, and thus, such technique users can give an easy access to benign paths of node factors.

Modern Paradigm of Organization of the Management Mechanism by Innovative Development in Higher Education Institutions

  • Kubitsky, Serhii;Domina, Viktoriia;Mykhalchenko, Nataliia;Terenko, Olena;Mironets, Liudmyla;Kanishevska, Lyubov;Marszałek, Lidia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.141-148
    • /
    • 2022
  • The development of the education system and the labor market today requires new conditions for unification and functioning, the introduction of an innovative culture in the field of Education. The construction of modern management of innovative development of a higher education institution requires consideration of the existing theoretical, methodological and practical planes on which its formation is based. The purpose of the article is to substantiate the modern paradigm of organizing the mechanism of managing the innovative development of higher education institutions. Innovation in education is represented not only by the final product of applying novelty in educational and managerial processes in order to qualitatively improve the subject and objects of management and obtain economic, social, scientific, technical, environmental and other effects, but also by the procedure for their constant updating. The classification of innovations in education is presented. Despite the positive developments in the development of Education, numerous problems remain in this area, which is discussed in the article. The concept of innovative development of higher education institutions is described, which defines the prerequisites, goals, principles, tasks and mechanisms of university development for a long-term period and should be based on the following principles: scientific, flexible, efficient and comprehensive. The role of the motivational component of the mechanism of innovative development of higher education institutions is clarified, which allows at the strategic level to create an innovative culture and motivation of innovative activity of each individual, to make a choice of rational directions for solving problems, at the tactical level - to form motives for innovative activity in the most effective directions, at the operational level - to monitor the formation of a system of motives and incentives, to adjust the directions of motivation. The necessity of the functional component of the mechanism, which consists in determining a set of steps and management decisions aimed at achieving certain goals of innovative development of higher education institutions, is proved. The monitoring component of the mechanism is aimed at developing a special system for collecting, processing, storing and distributing information about the stages of development of higher education institutions, prediction based on the objective data on the dynamics and main trends of its development, and elaboration of recommendations.

Indicator-based Behavior Ontology for Detecting Insider Threats in Network Systems

  • Kauh, Janghyuk;Lim, Wongi;Kwon, Koohyung;Lee, Jong-Eon;Kim, Jung-Jae;Ryu, Minwoo;Cha, Si-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.5062-5079
    • /
    • 2017
  • Malicious insider threats have increased recently, and methods of the threats are diversifying every day. These insider threats are becoming a significant problem in corporations and governments today. From a technology standpoint, detecting potential insider threats is difficult in early stage because it is unpredictable. In order to prevent insider threats in early stage, it is necessary to collect all of insiders' data which flow in network systems, and then analyze whether the data are potential threat or not. However, analyzing all of data makes us spend too much time and cost. In addition, we need a large repository in order to collect and manage these data. To resolve this problem, we develop an indicator-based behavior ontology (IB2O) that allows us to understand and interpret insiders' data packets, and then to detect potential threats in early stage in network systems including social networks and company networks. To show feasibility of the behavior ontology, we developed a prototype platform called Insider Threat Detecting Extractor (ITDE) for detecting potential insider threats in early stage based on the behavior ontology. Finally, we showed how the behavior ontology would help detect potential inside threats in network system. We expect that the behavior ontology will be able to contribute to detecting malicious insider threats in early stage.

A Market Status of Message Chair and Technical Analysis of Future IT Convergence (안마의자 시장 현황 및 IT를 융합한 미래 기술 분석)

  • Kim, Ki-Bong
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.3
    • /
    • pp.29-36
    • /
    • 2015
  • In order to have market competitiveness in the area of massage chair in domestic, it is necessary to establish a tactical promotion plan in terms of developing new technology and rethinking competitiveness. So, this research addresses four things, The first is to report an analysis that is for external environment changes and competitors the current situation through surveying the market trends of massage chair. The second is current technology of massage chair through surveying current technical trends of massage chair. In the basis of the surveying, the third is to establish alternative future technology for the chair. Finally, the last is to establish a counter-plan by analysing internal status and competitive power of each enterprise. On the basis of four things above, the future promote strategy and subject are proposed in this paper by producing the four strategic subjects.

A Study on Yard Operation in Container Terminal (컨테이너 터미널에서의 장치장 운용 계획에 관한 연구)

  • Kim Kap-Hwan;Kim Jae-Joong;Ryu Kwang-Ryel;Park Nam-Kyu;Choi Hyung-Rim;Jeon Su-Min
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.1
    • /
    • pp.125-137
    • /
    • 2006
  • One of the important tactical problems for the efficient operation of container terminals is to determine the usage of storage space There are two different strategies for stacking containers; mixing strategy, in which outbound containers and inbound containers are mixed in the same block, and segregating strategy, in which outbound containers and inbound containers are stacked in blocks different from each other The performance of space allocation strategies also depends on the types of handling equipment in the yard and the number of handling equipment allocated to each block. A simulation model is developed considering various handling characteristics of yard cranes. Performances of various space and equipment allocation strategies are evaluated by using the simulation model.

  • PDF

A Bit-rate Converter for Selective Coding (선택적부호화를 위한 비트율 변환기)

  • Lee, Jongbae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.9
    • /
    • pp.229-237
    • /
    • 2014
  • This paper presents a video bitrate converter for baseline profile in H.264/AVC standards to control a selective coding scheme for several applications such as tactical scenes or multimedia area. Transmission channels have various capacities according to the application area, and the bitstream stored in computer should be converted in order not to exceed the capacities of a transmission channel. So the problem is how to convert compressed bitsreams of a given bit-rate into compressed bitsreams of other bit-rates. Such a specific transcoding problem in this paper is referred to as bit-rate conversion. Several researches have been done on bit-rate conversion for the bitstreams compressed by MPEG or H.264/AVC. But the existing schemes are not suitable for selective coding scheme because it needs to recover interest regions better image quality than background. So we propose a new bit-rate converter which considers the importance between interest regions and background.

Estimation of Probability Distribution of L-Band Interference Environment Based on Field Measurement Data (전파 측정 데이터 기반 L 대역 간섭 환경 확률분포 추정)

  • Oh, Janghoon;Kim, Jong-Sung;Yoon, Dongweon;Park, Namhyoung;Choi, Hyogi
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.3
    • /
    • pp.22-28
    • /
    • 2017
  • In modern electronic warfare, a variety of devices are being operated in the fields for the purposes of communication and surveillance. Therefore, if such devices work in the same band, interference may occur and affect each other. Regarding L-band in which various devices including radar systems are operating, interference from existing devices may affect new ones in the band. In this paper, we estimate a probability distribution of the interference environment in L-band from the selected measurement data, which is fundamental for the mathematical analysis. After selecting the candidates of probability distribution, we suggest the best one from the group. The results of this study are expected to be utilized as fundamental data for the mathematical approach to the L-band interference environment.