• 제목/요약/키워드: combat effectiveness

검색결과 147건 처리시간 0.026초

KVID기반 KVMF메시지의 동적 메시지 처리 연구 (A Study on Dynamic Message Processing for KVMF Messages based on KVID)

  • 조철영;이준표;권철희;조한준
    • 한국통신학회논문지
    • /
    • 제37권2C호
    • /
    • pp.173-180
    • /
    • 2012
  • 무기체계간의 상호 운용성 증대를 위하여 한국형 가변 메시지 포맷 (Korean Variable Message Format; KVMF)을 적용 시 메시지 구조의 저장 위치와, 파서의 구조, 파서코드 생성기 설계 방법을 고려하여야 한다. 특히 기존 무기체계에 KVMF를 적용하는 경우를 위하여 성능 및 유지보수성 등을 분석하여 메시지 파서를 설계하는 것이 중요하다. 본 논문에서는 KVMF 통합 데이터베이스 (KVMF Integrated Database; KVID)를 기반으로 기존 도입된 장비와 차기 도입될 장비 모두에 적용할 수 있는 실시간 동적 KVMF메시지 파서 설계 방법을 제안하고 제안한 방법을 포병대대사격지휘체계에 적용하여 메시지 변환의 정확성을 확인하도록 한다.

공학수준 수상함 지휘무장통제체계 범용 모델 개발방안 연구 (On the Development of the Generic CFCS for Engineering Level Simulation of the Surface Ship)

  • 정영란;한웅기;김철호;김재익
    • 한국군사과학기술학회지
    • /
    • 제14권3호
    • /
    • pp.380-387
    • /
    • 2011
  • In this paper, we considered the authoritative representation of Command and Fire Control System(CFCS) for the surface ship that was the engineering level model to develop system specifications and to analyze operational concepts on the concept design phase and to analyze military requirements, effectiveness and performance for the system. The engineering level model of CFCS can be used in simulation independently of the surface ship's type, and also it takes reuse, interoperability, and extension into consideration. The detailed sub-models, internal and external data interface, data flow among each sub-model, sensor and weapon models about the engineering level model of CFCS was defined. It was verified via engineering level simulations according to the V&V process.

Transaction Mining for Fraud Detection in ERP Systems

  • Khan, Roheena;Corney, Malcolm;Clark, Andrew;Mohay, George
    • Industrial Engineering and Management Systems
    • /
    • 제9권2호
    • /
    • pp.141-156
    • /
    • 2010
  • Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour, and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.

A Systematic Review: Effectiveness of Interventions to De-escalate Workplace Violence against Nurses in Healthcare Settings

  • Somani, Rozina;Muntaner, Carles;Hillan, Edith;Velonis, Alisa J.;Smith, Peter
    • Safety and Health at Work
    • /
    • 제12권3호
    • /
    • pp.289-295
    • /
    • 2021
  • Workplace violence (WPV) is an increasing cause of concern around the globe, and healthcare organizations are no exception. Nurses may be subject to all kinds of workplace violence due to their frontline position in healthcare settings. The purpose of this systematic review is to identify and consider different interventions that aim to decrease the magnitude/prevalence of workplace violence against nurses. The standard method by Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA, 2009) has been used to collect data and assess methodological quality. Altogether, twenty-six studies are included in the review. The intervention procedures they report on can be grouped into three categories: stand-alone trainings designed to educate nurses; more structured education programs, which are broader in scope and often include opportunities to practice skills learned during the program; multicomponent interventions, which often include organizational changes, such as the introduction of workplace violence reporting systems, in addition to workplace violence training for nurses. By comparing the findings, a clear picture emerges; while standalone training and structured education programs can have a positive impact, the impact is unfortunately limited. In order to effectively combat workplace violence against nurses, healthcare organizations must implement multicomponent interventions, ideally involving all stakeholders.

군용 헬리콥터 조종사 스케줄링 모형 (A Model of Military Helicopter Pilot Scheduling)

  • 김주안;이문걸
    • 산업경영시스템학회지
    • /
    • 제43권4호
    • /
    • pp.150-160
    • /
    • 2020
  • In this paper, we introduce a pilot's scheduling model which is able to maintain and balance their capabilities for each relevant skill level in military helicopter squadron. Flight scheduler has to consider many factors related pilot's flight information and spends a lot of times and efforts for flight planning without scientific process depending on his/her own capability and experience. This model reflected overall characteristics that include pilot's progression by basis monthly and cumulative flight hours, operational recent flight data and quickly find out a pinpoint areas of concern with respect to their mission subjects etc. There also include essential several constraints, such as personnel qualifications, and Army helicopter training policy's constraints such as regulations and guidelines. We presented binary Integer Programming (IP) mathematical formulation for optimization and demonstrated its effectiveness by comparisons of real schedule versus model's solution to several cases experimental scenarios and greedy random simulation model. The model made the schedule in less than 30 minutes, including the data preprocessing process, and the results of the allocation were more equal than the actual one. This makes it possible to reduce the workload of the scheduler and effectively manages the pilot's skills. We expect to set up and improve better flight planning and combat readiness in Korea Army aviation.

해상전 워게임모델의 교전 피해평가 수준 및 산정방법론 - 함정 피해평가를 중심으로 - (Methodology of battle damage assessment in the naval wargame model - Forcusing on damage assessment of warship -)

  • 김봉석;최봉완;김종수
    • 시스템엔지니어링학술지
    • /
    • 제17권1호
    • /
    • pp.53-64
    • /
    • 2021
  • Wargame is a simulated military operation with certain rules, specifications, and procedures, in which soldiers can virtually and indirectly experience the war. The ROK Navy operates the Cheonghae model, a training wargame model for helping commanders and staff master the procedures for conducting the war. It is important for commanders, staff and analysts to know whether a warship can perform its missions and how long it can last during a war. In existing model, the Cheonghae, the probability of kill of a warship is calculated simply considering the number of tonnage without any stochastic elements, and the warship's mission availability is also determined based on predetermined values. With this model, it is difficult to get a value of the probability of kill that makes sense. In this dissertation, the author has developed a probabilistic model in which the warship vulnerability data of ROK-JMEM can be used. A conceptual model and methodology that can evaluate the mission performance of personnel, equipment, and supplies has been proposed. This can be expanded to a comprehensive assessment of wartime warship loss rates by integrating damage rates for personnel, equipment, and supplies in wartime.

The extent of the role of internal control of Northern Borders University in maintaining the non-waste of public money

  • Oweis, Khaled Adnan
    • International Journal of Computer Science & Network Security
    • /
    • 제21권6호
    • /
    • pp.187-199
    • /
    • 2021
  • The research aims to measure the control procedures' effectiveness, followed by the University of Northern Borders employees. A questionnaire was developed and distributed to the target sample of financial and auditing affairs employees at the university, where the researcher followed the existing descriptive-analytical approach. The researcher relied on the field survey, and statistical analysis (spss) was used. The researcher has found that the control procedures used are highly efficient in reducing public money waste. The researcher has presented recommendations that may contribute to developing the work of oversight in combating waste of public money. These recommendations include: Increase the interaction between the General Oversight Office and the internal oversight departments at the University of Northern Borders, the incentives provided to the oversight and accounting staff for their efforts to combat public money waste. It encourages them to maintain public money and work to obliging employees to undertake training courses periodically to develop their skills and rehabilitate them in line with modern control procedures. Also, more studies and scientific research on the waste of public money and types of administrative and financial Corruption and the law in all state sectors and reach conclusions and recommendations will help decision-makers amend laws and regulations to serve the public benefit of the university and the state.

Using Ant Colony Optimization to Find the Best Precautionary Measures Framework for Controlling COVID-19 Pandemic in Saudi Arabia

  • Alshamrani, Raghad;Alharbi, Manal H.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권10호
    • /
    • pp.352-358
    • /
    • 2022
  • In this paper, we study the relationship between infection rates of covid 19 and the precautionary measures and strict protocols taken by Saudi Arabia to combat the spread of the coronavirus disease and minimize the number of infected people. Based on the infection rates and the timetable of precautionary measures, the best framework of precautionary measures was identified by applying the traveling salesman problem (TSP) that relies on ant colony optimization (ACO) algorithms. The proposed algorithm was applied to daily infected cases data in Saudi Arabia during three periods of precautionary measures: partial curfew, whole curfew, and gatherings penalties. The results showed the partial curfew and the whole curfew for some cities have the minimum total cases over other precautionary measures. The gatherings penalties had no real effect in reducing infected cases as the other two precautionary measures. Therefore, in future similar circumstances, we recommend first applying the partial curfew and the whole curfew for some cities, and not considering the gatherings penalties as an effective precautionary measure. We also recommend re-study the application of the grouping penalty, to identify the reasons behind the lack of its effectiveness in reducing the number of infected cases.

패턴사전과 비정형성을 통한 이상치 탐지방법 적용 (Anomaly Detection via Pattern Dictionary Method and Atypicality in Application)

  • 오세홍;박종성;윤영삼
    • 센서학회지
    • /
    • 제32권6호
    • /
    • pp.481-486
    • /
    • 2023
  • Anomaly detection holds paramount significance across diverse fields, encompassing fraud detection, risk mitigation, and sensor evaluation tests. Its pertinence extends notably to the military, particularly within the Warrior Platform, a comprehensive combat equipment system with wearable sensors. Hence, we propose a data-compression-based anomaly detection approach tailored to unlabeled time series and sequence data. This method entailed the construction of two distinctive features, typicality and atypicality, to discern anomalies effectively. The typicality of a test sequence was determined by evaluating the compression efficacy achieved through the pattern dictionary. This dictionary was established based on the frequency of all patterns identified in a training sequence generated for each sensor within Warrior Platform. The resulting typicality served as an anomaly score, facilitating the identification of anomalous data using a predetermined threshold. To improve the performance of the pattern dictionary method, we leveraged atypicality to discern sequences that could undergo compression independently without relying on the pattern dictionary. Consequently, our refined approach integrated both typicality and atypicality, augmenting the effectiveness of the pattern dictionary method. Our proposed method exhibited heightened capability in detecting a spectrum of unpredictable anomalies, fortifying the stability of wearable sensors prevalent in military equipment, including the Army TIGER 4.0 system.

드론 심리전의 사례 분석과 효과 및 한계 (An Analysis of Drone Psychological Warfare Cases: Examining the Effects and Limitations)

  • 김선웅;이경행;박상혁
    • 문화기술의 융합
    • /
    • 제10권4호
    • /
    • pp.431-435
    • /
    • 2024
  • 본 연구는 현대 전쟁에서 드론 심리전의 사례를 분석하고, 그 효과와 한계를 살펴보는 것을 목적으로 한다. 미국, 이스라엘, 우크라이나의 사례를 중심으로 드론을 활용한 감시와 공격, 선전 활동이 적군의 사기와 전투 의지에 미치는 영향을 분석하였다. 연구 결과, 드론 심리전은 적군에게 심리적 압박을 가하고 전투 의지를 약화시키는 데 상당한 효과가 있는 것으로 나타났다. 그러나 민간인 피해와 국제법 위반 논란 등 심각한 부작용도 수반하고 있어, 이에 대한 윤리적 검토가 필요함을 지적하였다. 본 연구는 드론 심리전의 실효성과 윤리성에 대한 심도 있는 논의의 토대를 제공한다는 점에서 의의를 갖는다.