• Title/Summary/Keyword: defense performance

Search Result 2,006, Processing Time 0.028 seconds

Development of MATLAB GUI Based Software for Monitoring Ionospheric Disturbances

  • Kim, Bu-Gyeom;Kang, Seonho;Han, Deokhwa;Song, Junesol;So, Hyoungmin;Kim, Kap Jin;Kee, Changdon
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.8 no.2
    • /
    • pp.69-77
    • /
    • 2019
  • This study introduces MATLAB Graphical User Interface (GUI)-based software to monitor ionospheric disturbances. This software detects ionospheric disturbances using Global Positioning System (GPS) and Global Navigation Satellite System (GLONASS) measurements, and estimates a location of the disturbance source through the detected disturbance. In addition, this software includes a sky plot making function and frequency analysis function through wavelet transform. To evaluate the performance of the developed software, data of 2011 Tohoku earthquake in Japan were analyzed by using the software. The analysis results verified that the ionospheric disturbances were detected through GPS and GLONASS measurements, and the location of the disturbance source was estimated through the detected disturbance.

BM3D and Deep Image Prior based Denoising for the Defense against Adversarial Attacks on Malware Detection Networks

  • Sandra, Kumi;Lee, Suk-Ho
    • International journal of advanced smart convergence
    • /
    • v.10 no.3
    • /
    • pp.163-171
    • /
    • 2021
  • Recently, Machine Learning-based visualization approaches have been proposed to combat the problem of malware detection. Unfortunately, these techniques are exposed to Adversarial examples. Adversarial examples are noises which can deceive the deep learning based malware detection network such that the malware becomes unrecognizable. To address the shortcomings of these approaches, we present Block-matching and 3D filtering (BM3D) algorithm and deep image prior based denoising technique to defend against adversarial examples on visualization-based malware detection systems. The BM3D based denoising method eliminates most of the adversarial noise. After that the deep image prior based denoising removes the remaining subtle noise. Experimental results on the MS BIG malware dataset and benign samples show that the proposed denoising based defense recovers the performance of the adversarial attacked CNN model for malware detection to some extent.

A Study on the Optimal Allocation of Maintenance Personnel in the Military Emergency Maintenance System Considering the Property of Impatience (Impatience 특성을 고려한 군 긴급정비시스템 정비인력 최적할당 연구)

  • Kim, Sungwoo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.4
    • /
    • pp.449-456
    • /
    • 2021
  • Impatience characteristics are an important factor to be considered in the defense field, which is sensitive to time, but there are not many cases applied. In addition, due to the difficulty of analysis that must consider various probabilistic factors (breakdown/maintenance distribution, impatience characteristics, etc.), military decision makers consider only simple data (number of occurrences per year, maintenance time, etc.) Therefore, in this study, a model capable of analyzing the performance of the emergency maintenance system for determining the appropriate size and organization of military and civilian maintenance personnel was presented in consideration of impatience characteristics and probabilistic factors. And through numerical analysis, the appropriate size of the military and civilian emergency maintenance teams was analyzed. This study is significant in that it can improve readiness of operational power and prevent waste of defense budget through efficient operation of the military's emergency maintenance system.

An Analysis on the Reduction of Measurement Time Using Interpolation Algorithm in Near-field RCS Measurements for Aircraft Shape (항공기 형상에 대한 근전계 RCS 측정에서 내삽 알고리즘을 이용한 측정시간 단축에 대한 분석)

  • Park, Homin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.4
    • /
    • pp.339-346
    • /
    • 2022
  • The importance of stealth technology is increasing in modern warfare, and Radar Cross Section(RCS) is widely used as an indicator of stealth technology. It is useful to measure RCS using an image-based near-field to far-field transformation algorithm in short-range monostatic conditions. However, the near-field measurement system requires a longer measurement time compared to other methods. In this work, it is proposed to reduce the measured data using an interpolation method in azimuth angular domain. The calculated far-field RCS values according to the sampling rate is shown, and the performance of the algorithm applied with interpolation in the angular domain is presented. It is shown that measurement samples can be reduced several times by using the redundancy in the angular domain while producing results similar to the conventional method.

Technology forecasting from the perspective of integration of technologies: Drone technology

  • Jinho, Kim;Jaiill, Lee;Eunyoung, Yang;Seokjoong, Kang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.31-50
    • /
    • 2023
  • In the midst of dynamic industrial changes, companies need data analysis considering the effects of integration of various technologies in order to establish innovative R & D strategies. However, the existing technology forecasting model evaluates individual technologies without considering relationship among them. To improve this problem, this study suggests a new methodology reflecting the integration of technologies. In the study, a technology forecasting indicator was developed using the technology integration index based on social network analysis. In order to verify the validity of the proposed methodology, 'drone task performance technology' based on patent data was applied to the research model. This study aimed to establish a theoretical basis to design a research model that reflects the degree of integration of technologies when conducting technology forecasting research. In addition, this study is meaningful in that it quantitatively verified the proposed methodology using actual patent data.

Improving the Performance of Certified Defense Against Adversarial Attacks (적대적인 공격에 대한 인증 가능한 방어 방법의 성능 향상)

  • Go, Hyojun;Park, Byeongjun;Kim, Changick
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2020.11a
    • /
    • pp.100-102
    • /
    • 2020
  • 심층 신경망은 적대적인 공격으로 생성된 적대적 예제에 의해 쉽게 오작동할 수 있다. 이에 따라 다양한 방어 방법들이 제안되었으나, 더욱 강력한 적대적인 공격이 제안되어 방어 방법들을 무력화할 가능성은 존재한다. 이러한 가능성은 어떤 공격 범위 내의 적대적인 공격을 방어할 수 있다고 보장할 수 있는 인증된 방어(Certified defense) 방법의 필요성을 강조한다. 이에 본 논문은 인증된 방어 방법 중 가장 효과적인 방법의 하나로 알려진 구간 경계 전파(Interval Bound Propagation)의 성능을 향상하는 방법을 연구한다. 구체적으로, 우리는 기존의 구간 경계 전파 방법의 훈련 과정을 수정하는 방법을 제안하며, 이를 통해 기존 구간 경계 전파 방법의 훈련 시간을 유지하면서 성능을 향상할 수 있음을 보일 것이다. 우리가 제안한 방법으로 수행한 MNIST 데이터 셋에 대한 실험에서 우리는 기존 구간 경계 전파 방법 대비 인증 에러(Verified error)를 Large 모델에 대해서 1.77%, Small 모델에 대해서 0.96% 낮출 수 있었다.

  • PDF

Study on Enhancing Training Efficiency of MARL for Swarm Using Transfer Learning (전이학습을 활용한 군집제어용 강화학습의 효율 향상 방안에 관한 연구)

  • Seulgi Yi;Kwon-Il Kim;Sukmin Yoon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.26 no.4
    • /
    • pp.361-370
    • /
    • 2023
  • Swarm has recently become a critical component of offensive and defensive systems. Multi-agent reinforcement learning(MARL) empowers swarm systems to handle a wide range of scenarios. However, the main challenge lies in MARL's scalability issue - as the number of agents increases, the performance of the learning decreases. In this study, transfer learning is applied to advanced MARL algorithm to resolve the scalability issue. Validation results show that the training efficiency has significantly improved, reducing computational time by 31 %.

Dwell Time Optimization of Alert-Confirm Detection for Active Phased Array Radars

  • Kim, Eun Hee;Park, JoonYong
    • Journal of electromagnetic engineering and science
    • /
    • v.19 no.2
    • /
    • pp.107-114
    • /
    • 2019
  • Alert-confirm detection is a highly efficient method to improve phased array radar search performance. It comprises sequential detection in two steps: alert detection, in which a target is detected at a low detection threshold, and confirm detection, which is triggered by alert detection with a longer dwell time to minimize false alarms. This paper provides a design method for applying the alert-confirm detection to multifunctional radars. We find optimum dwell times and false alarm probabilities for each alert detection and confirm detection under the dual constraints of total false alarm probability and maximum allowable dwell time per position. These optimum values are expressed as a function of the mean new target appearance rate. The proposed alert-confirm detection increases the maximum detection range even with a shorter frame time than that of uniform scanning.

Performance Enhancement of Android Malware Classification using PCA (주성분 분석을 활용한 안드로이드 악성코드 분류 성능 향상 방안)

  • Jeon, Dong-Ha;Lee, Soo-Jin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.249-250
    • /
    • 2022
  • 최근 API Call을 기반으로 하는 악성코드 탐지 및 분류에 대한 연구가 활발히 진행되고 있다. 그러나 API Call 기반의 데이터는 방대한 양과 다양한 차원의 특성으로 인해 분석과 학습 모델 구축 측면에서 비효율적인 한계가 있다. 이에 본 연구에서는 방대한 API Call 정보를 포함하고 있는 CICAndMal2020 데이터 세트를 대상으로 기존의 특성 선택 기법이 아닌 주성분 분석(Principal Component Analysis)을 사용하여 차원을 대폭 축소 시킨 후 머신러닝 기법을 적용하여 분류를 시도하였다. 실험 결과 전체 9,503개의 특성을 25개의 주성분(전체 대비 약 0.26% 수준)으로 축소시키고 다중 분류 기준 약 84%의 정확도를 나타냈다. 결과적으로 기존 연구에서의 탐지 모델 대비 정확도, F1-score 등의 성능 향상은 물론 차원 축소 측면에서 매우 향상된 결과를 달성하였다.

  • PDF

Location-Routing Problem for Reconnaissance Surveillance Missions of the Maritime Manned-Unmanned Surface Vehicles (해양 유·무인 수상함정의 감시정찰 임무를 위한 위치-경로 문제)

  • Jinho Lee
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.4
    • /
    • pp.238-245
    • /
    • 2023
  • As technologies have been more quickly developed in this 4th Industry Revolution era, their application to defense industry has been also growing. With these much advanced technologies, we attempt to use Manned-Unmanned Teaming systems in various military operations. In this study, we consider the Location-Routing Problem for reconnaissance surveillance missions of the maritime manned-unmanned surface vehicles. As a solution technique, the two-phase method is presented. In the first location phase, the p-median problem is solved to determine which nodes are used as the seeds for the manned vehicles using Lagrangian relaxation with the subgradient method. In the second routing phase, using the results obtained from the location phase, the Vehicle Routing Problems are solved to determine the search routes of the unmanned vehicles by applying the Location Based Heuristic. For three network data sets, computational experiments are conducted to show the performance of the proposed two-phase method.