• Title/Summary/Keyword: defense information system

Search Result 1,135, Processing Time 0.027 seconds

Tag Value Measurement Algorithm for Personalized Recommendation (개인화 추천을 위한 태그 가치 측정 알고리즘)

  • Jeong, Kwang-Jae;Park, Gun-Woo;Lee, Sang-Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.1078-1081
    • /
    • 2010
  • 웹 2.0의 영향으로 인터넷 상에 범람하는 컨텐츠를 이용함에 있어 태깅 시스템은 매우 유연하고 효과적인 분류를 가능케 한다. 대부분의 웹 2.0 사이트에서는 검색된 정보에 해당하는 태그와 연관성이 있는 태그를 나타냄으로써 또 다른 관련 컨텐츠를 이용할 수 있는 서비스를 제공한다. 컨텐츠 사용자에 의해 생성되는 태그는 개인 성향에 따라 동일 컨텐츠에 다양하게 적용될 수 있으며 이로 인해 태그를 이용한 검색은 낮은 정확도를 나타낼 수 있다. 본 논문에서는 태그 선택에 있어 인간 상호작용의 특성을 파악하여 개인이 선호하고, 필요로 하는 컨텐츠에 대한 태그를 추천할 수 있는 태그 가치 측정 알고리즘을 제안한다. 컨텐츠 선택에 있어 의사결정에 영향을 미치는 요인을 식별하고 선호영화 추천 서비스인 MovieLens 사이트의 데이터 셋을 적용하여 태그 추천의 예측 정확도를 비교 평가함으로써 향상된 태그 가치 산정 결과를 제시한다.

Assessing Influence of Human Factors according to Topics for Enhancing Social Search (소셜 검색 향상을 위한 토픽별 인적속성의 영향력 산출)

  • Kwon, Oh-Sang;Park, Gun-Woo;Lee, Sang-Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.142-145
    • /
    • 2010
  • 정보의 양이 폭발적으로 증가함에 따라 방대한 정보 속에서 사용자의 검색 의도에 맞는 정보를 효과적으로 제공하기란 매우 어려워졌다. 따라서 웹 사용자들의 요구사항을 충족시키기 위한 연구들이 활발히 수행되고 있으며, 많은 방법론들이 제시되고 있다. 본 논문에서는 회귀분석이라는 통계학적 기법을 통해 검색 토픽에 대한 사용자의 인적속성들이 미치는 영향력을 산출하였다. 이는 인간이 가진 내재적 특성이 토픽별 검색 성향과 어떠한 연관관계가 있는지를 규명한 것이다. 또한 특정 토픽에 대해 영향력이 높은 인적속성의 일치 여부가 해당 토픽에 대한 사용자 검색성향의 유사정도와 매우 큰 상관관계가 있는 것을 증명하였다. 이와 같은 사실을 기반으로 사용자가 특정 토픽에 대해 검색 시 해당 토픽에 대해 영향력이 높은 인적속성을 확인하고, 이 속성이 일치하는 사람들의 검색 정보를 제공한다면, 사용자는 보다 만족된 검색결과를 얻을 수 있을 것이다.

A Model of Faults Classification in Component based Robots (컴포넌트 기반 로봇의 결점분류 모델)

  • Kim, Jaeyoung;Kim, Jongyoung;Yoon, Heebyung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1582-1585
    • /
    • 2010
  • 로봇은 인간의 생명과 밀접하게 관련되어 있기 때문에 높은 안전성과 신뢰성이 요구된다. 특히 최근에는 지능형 서비스 로봇의 등장과 더불어 증가되는 로봇 개발환경의 복잡성 문제와 로봇의 신속한 개발 및 유지보수 문제를 해결하기 위해 컴포넌트 기반의 로봇 플랫폼에 대한 연구가 증가하고 있으며, 특히 로봇 플랫폼을 구성하는 컴포넌트의 장애문제 해결이 중요한 이슈로 대두되고 있다. 따라서 본 논문에서는 컴포넌트 기반 로봇의 결점분류 절차를 제시하고 로봇의 결점타입과 로봇 플랫폼과의 상관관계를 분석하고 로봇 플랫폼에 결점타입을 매핑하여 최종적으로 컴포넌트 기반 로봇의 결점분류 모델을 제안한다.

A Multi-view Super-Resolution Method with Joint-optimization of Image Fusion and Blind Deblurring

  • Fan, Jun;Wu, Yue;Zeng, Xiangrong;Huangpeng, Qizi;Liu, Yan;Long, Xin;Zhou, Jinglun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.2366-2395
    • /
    • 2018
  • Multi-view super-resolution (MVSR) refers to the process of reconstructing a high-resolution (HR) image from a set of low-resolution (LR) images captured from different viewpoints typically by different cameras. These multi-view images are usually obtained by a camera array. In our previous work [1], we super-resolved multi-view LR images via image fusion (IF) and blind deblurring (BD). In this paper, we present a new MVSR method that jointly realizes IF and BD based on an integrated energy function optimization. First, we reformulate the MVSR problem into a multi-channel blind deblurring (MCBD) problem which is easier to be solved than the former. Then the depth map of the desired HR image is calculated. Finally, we solve the MCBD problem, in which the optimization problems with respect to the desired HR image and with respect to the unknown blur are efficiently addressed by the alternating direction method of multipliers (ADMM). Experiments on the Multi-view Image Database of the University of Tsukuba and images captured by our own camera array system demonstrate the effectiveness of the proposed method.

A Study on Maturity Model for the Assessment of Cyber Resilience Level in the Defence Information System (국방정보시스템 사이버복원력 수준 평가를 위한 성숙도모델에 관한 연구)

  • Choi, Jae-hyeok;Kim, Wan-ju;Lim, Jae-sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1153-1165
    • /
    • 2019
  • Recently, threats of hacking have been increasing on the national intelligence service network and key infrastructure, including the defense field. The defense information system responds to threats from the outside through the network separation, but if the defense information system is hacked, it has a serious impact on the operations of wartime or peacetime military forces. Today, cyberattacks and threats are rising to unpredictable levels and making it practically impossible to completely block and prevent hacking threats completly. So, in this study proposed a maturity model to assess the level of cyber-resilience, which is the ability to ensure the system's viability and maintain continuity through rapid response and recovery if signs of cyberattacks by the defense information system are expected or occurred. The proposed maturity model is expected to contribute to improving the cyber security level of the defense information system by assessing the level of cyber resilience of the defense information system and identifying and supplementing fields that are lacking.

Development Status of Arrow Missile Defense System (Arrow 미사일 방어체계 개발 현황)

  • Park, Tae-yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.283-284
    • /
    • 2018
  • The Arrow system, an Israeli missile defense system, was developed through a strategic partnership between the United States and Israel. Israel's cooperation with the Strategic Defense Initiative(SDI) research of the Reagan administration in the United States began in 1986 with the development of a tactical ballistic missile defense system and two increasingly improvements to Arrow 3. It could be a moral lessen to developing Korean Ballistic Missile Defense System because Israel's Geopolitical environment is similar to Korean peninsula.

  • PDF

A depth-based Multi-view Super-Resolution Method Using Image Fusion and Blind Deblurring

  • Fan, Jun;Zeng, Xiangrong;Huangpeng, Qizi;Liu, Yan;Long, Xin;Feng, Jing;Zhou, Jinglun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.5129-5152
    • /
    • 2016
  • Multi-view super-resolution (MVSR) aims to estimate a high-resolution (HR) image from a set of low-resolution (LR) images that are captured from different viewpoints (typically by different cameras). MVSR is usually applied in camera array imaging. Given that MVSR is an ill-posed problem and is typically computationally costly, we super-resolve multi-view LR images of the original scene via image fusion (IF) and blind deblurring (BD). First, we reformulate the MVSR problem into two easier problems: an IF problem and a BD problem. We further solve the IF problem on the premise of calculating the depth map of the desired image ahead, and then solve the BD problem, in which the optimization problems with respect to the desired image and with respect to the unknown blur are efficiently addressed by the alternating direction method of multipliers (ADMM). Our approach bridges the gap between MVSR and BD, taking advantages of existing BD methods to address MVSR. Thus, this approach is appropriate for camera array imaging because the blur kernel is typically unknown in practice. Corresponding experimental results using real and synthetic images demonstrate the effectiveness of the proposed method.

Study on Improving the Data Efficiency in National Defense Financial Information (국방통합재정정보 데이터 효율성 향상 방안 연구)

  • Moon, Jaehun;Kang, Seokjoong;Kim, Dokyoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1764-1776
    • /
    • 2014
  • This study is the context about an introduction of a bookkeeping by double entry & accrual base accounting which is the turning point of National Accounting and defense integrated financial management which is delivered following system Digital Budget Accounting system, in other words about something to do with the improvement of efficiency of financial information data. National defense Integration Financial Information system (NDIFIS) facilitates Project program management and makes the whole process of Defense financial Business manageable in one system. Also, there is a purpose to increase the credibility and transparency of National defense finances by providing internal and external information users with credible financial statements and cost materials. By using data envelopment analysis (DEA) which is a useful method to measuring the efficiency of organization, this study aims to improve the financial information data efficiency by comparing the efficiency of the same type troops and when it comes to the inefficient troops, by offering the certain objective of efficiency.

Korean Security Risk Management Framework for the Application of Defense Acquisition System (국방획득체계 적용 한국형 보안위험관리 프레임워크)

  • Yang, Woo-sung;Cha, Sung-yong;Yoon, Jong-sung;Kwon, Hyeok-joo;Yoo, Jae-won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1183-1192
    • /
    • 2022
  • Information and Information processing systems must maintain a certain level of security during the total life cycle of Information. To maintain a certain level of security, security management processes are applied to software, automobile development, and the U.S. federal government information system over a life cycle, but theme of no similar security management process in Korea. This paper proposes a Korean-style security risk management framework to maintain a certain level of security in the total life cycle of information and information processing system in the defense sector. By applied to the defense field, we intend to present the direction of defense security work in the future and induce an shift in security paradigm.

A Study of Implementation of Defense Configuration Management System based on PLM (PLM 기반의 국방 형상관리 정보체계 구축 사례연구)

  • Lim, Chae-O
    • Korean Journal of Computational Design and Engineering
    • /
    • v.13 no.4
    • /
    • pp.305-313
    • /
    • 2008
  • A configuration management system was implemented by applying PLM to the defense field. The PLM system has recently been incorporated in a wide range of industries, and it has allowed for improvements in work productivity and expansion of related services by comprehensively managing and securing connection regarding configuration information in the defense field. Implementations include acquisition of configuration related information and reinforcement of BOM-oriented configuration management function, securing compatibility among 3D drawings of different agencies, improvement of drawing and document management functions, comprehensive systematic configuration management focused on product structure, strengthened configuration control functions, a management system according to the work flow and life cycle functions, an integrated configuration management system of 3D model CAD resources and an enhanced management system. This paper covers a case study reviewing the implementation of a PLM-based configuration management information system and its results, so that the information can be made available to other agencies and companies seeking to apply PLM in their organizations.