• Title/Summary/Keyword: military applications

Search Result 468, Processing Time 0.023 seconds

Two Attribute-based Broadcast Encryption Algorithms based on the Binary Tree (이진트리 기반의 속성기반 암호전송 알고리즘)

  • Lee, Moon Sik;Kim, HongTae;Hong, Jeoung Dae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.3
    • /
    • pp.358-363
    • /
    • 2014
  • In this paper, we present two constructions of the attribute-based broadcast encryption(ABBE) algorithm. Attribute-based encryption(ABE) algorithm enables an access control mechanism over encrypted data by specifying access policies among private keys and ciphertexts. ABBE algorithm can be used to construct ABE algorithm with revocation mechanism. Revocation has a useful property that revocation can be done without affecting any non-revoked uers. The main difference between our algorithm and the classical ones derived from the complete subtree paradigm which is apt for military hierarchy. Our algorithm improve the efficiency from the previously best ABBE algorithm, in particular, our algorithm allows one to select or revoke users by sending ciphertext of constant size with respect to the number of attributes and by storing logarithm secret key size of the number of users. Therefore, our algorithm can be an option to applications where computation cost is a top priority and can be applied to military technologies in the near future.

A Study on Performance Characteristics of Ti-Zr Type Metal Hydrides and Hydrogen Storage Cylinders with the Hydrides (Ti-Zr계 금속수소화물 및 수소저장실린더의 성능특성 연구)

  • Kim, Ki-Youl
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.4
    • /
    • pp.519-526
    • /
    • 2012
  • Recently fuel cell is considered to be a new technology that can substitute the ICE(Internal Combustion Engine) as well as overcome environmental issues. In military applications, fuel cell has an unique advantages, which are quietness, namely, stealth. The environmental requirement such as shock and vibration in military application, however, is very severe comparing to civilian demand. Especially, the safety concerning hydrogen storage is the most important problem. Among the candidate methods to store hydrogen, the metal hydride storage is promising method owing to the storage mechanism of chemical absorption of hydrogen to metal hydrides. In this study, the new composition of Ti-Zr type metal hydride(A composition) was suggested and investigated to increase the hydrogen storage capacity. For comparison, the hydrogen charge-discharge properties were investigated with the commercialized Ti-Zr type metal hydride(B composition) using PCT(Pressure-Composition-Temperature) measurement. Also two hydrogen storage cylinders were loaded with each metal hydride and their hydrogen charging and discharging characteristics were investigated. As a result, it was found that the new Ti-Zr type metal hydride has a slightly higher hydrogen storage capacity compared to commercial Ti-Zr type metal hydride.

Enhancing Internet of Things Security with Random Forest-Based Anomaly Detection

  • Ahmed Al Shihimi;Muhammad R Ahmed;Thirein Myo;Badar Al Baroomi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.67-76
    • /
    • 2024
  • The Internet of Things (IoT) has revolutionized communication and device operation, but it has also brought significant security challenges. IoT networks are structured into four levels: devices, networks, applications, and services, each with specific security considerations. Personal Area Networks (PANs), Local Area Networks (LANs), and Wide Area Networks (WANs) are the three types of IoT networks, each with unique security requirements. Communication protocols such as Wi-Fi and Bluetooth, commonly used in IoT networks, are susceptible to vulnerabilities and require additional security measures. Apart from physical security, authentication, encryption, software vulnerabilities, DoS attacks, data privacy, and supply chain security pose significant challenges. Ensuring the security of IoT devices and the data they exchange is crucial. This paper utilizes the Random Forest Algorithm from machine learning to detect anomalous data in IoT devices. The dataset consists of environmental data (temperature and humidity) collected from IoT sensors in Oman. The Random Forest Algorithm is implemented and trained using Python, and the accuracy and results of the model are discussed, demonstrating the effectiveness of Random Forest for detecting IoT device data anomalies.

A Case Study of Multicultural Applications of World Military Powers (세계 강군의 다문화 적용사례 연구)

  • Kim, In Chan;Cho, Sang Keun;Kim, Jong Hoon;Hong, Myung Sook;Bang, Dong Hyup;Park, Sang Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.441-447
    • /
    • 2022
  • The Republic of Korea Army predicted that the continuous decline in fertility rate and the low birth rate, one of the biggest issues in our society, would lead to a security crisis due to a lack of military personnel, and revised the Military Service Act in 2010 to prevent enlistment of 'clearly mixed races', which had previously restricted enlistment. made it compulsory As a result, 50 children from multicultural families enlisted in the military in 2011, and the Military Manpower Administration at the time predicted that more than 8,000 people would enlist every year after 2020. This poses another challenge for the Army. A lack of understanding and respect for different languages, religions, and eating habits can lead to conflict among members, which will lead to weakening of combat power. Therefore, through a case study of multicultural application by world powers, the history of success and failure of respect for multiculturalism and the current policy of respecting multiculturalism of the U.S. Army are studied to examine the direction of our army.

Nasal Immunization Using Chitosan Nanoparticles with Glycoprotein B of Murine Cytomegalovirus

  • Marcela Slovakova;Sylva Janovska;Radek Sleha;Vera Radochova;Alexandra Hatala;Nikola Mannova;Radovan Metelka;Ludovit Pudelka;Pavel Bostik
    • Journal of Microbiology and Biotechnology
    • /
    • v.34 no.3
    • /
    • pp.663-672
    • /
    • 2024
  • The use of nanoparticles as a delivery system for a specific antigen could solve many limitations of mucosal vaccine applications, such as low immunogenicity, or antigen protection and stabilization. In this study, we tested the ability of nasally administered chitosan nanoparticles loaded with glycoprotein B of murine cytomegalovirus to induce an immune response in an animal model. The choice of chitosan nanoparticle type was made by in vitro evaluation of sorption efficiency and antigen release. Three types of chitosan nanoparticles were prepared: crosslinked with tripolyphosphate, coated with hyaluronic acid, and in complex with polycaprolactone. The hydrodynamic size of the nanoparticles by dynamic light scattering, zeta potential, Fourier transform infrared spectroscopy, scanning electron microscopy, stability, loading efficiency, and release kinetics with ovalbumin were evaluated. Balb/c mice were immunized intranasally using the three-dose protocol with nanoparticles, gB, and adjuvants Poly(I:C) and CpG ODN. Subsequently, the humoral and cell-mediated antigen-specific immune response was determined. On the basis of the properties of the tested nanoparticles, the cross-linked nanoparticles were considered optimal for further investigation. The results show that nanoparticles with Poly(I:C) and with gB alone raised IgG antibody levels above the negative control. In the case of mucosal IgA, only gB alone weakly induced the production of IgA antibodies compared to saline-immunized mice. The number of activated cells increased slightly in mice immunized with nanoparticles and gB compared to those immunized with gB alone or to negative control. The results demonstrated that chitosan nanoparticles could have potential in the development of mucosal vaccines.

A Scheme to Categorize Ubiquitous Sensor Network Services and Their Practical Issues (유비쿼터스 센서네트워크 서비스 분류 기법 및 상용화 이슈)

  • Eun, Seongbae;So, Sun Sup;Chae, Yigeun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.3
    • /
    • pp.202-208
    • /
    • 2007
  • Recently, a lot of research have been studied to apply wireless sensor networks to USN applications. The characteristics of USN applications is that they are varied according to the sort of sensors and sensing objects. They includes military applications, water pollusion monitoring, intelligent traffic system, farm, logistics, location position applications, and so on. There is no traditional method to classify these applications. In this paper, we propose a taxonomy scheme to classify USN applications. The criteria is based on 3 properties, the criticalness of services, the mobility of sensing entity, and the mobility of sensed objects, to classify them into 8 groups. We also describe the technical issues and related works in them. Our taxonomy can make USN applications to be easily understood and memorized.

  • PDF

Applications of metamaterials: Cloaking, Photonics, and Energy Harvesting

  • Kim, Kyoungsik
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2015.08a
    • /
    • pp.77.2-77.2
    • /
    • 2015
  • Recently, metamaterials attracted much attention because of the potential applications for superlens, cloaking and high precision sensors. We developed several dielectric metamaterials for enhancing antireflection or light trapping capability in solar energy harvesting devices. Colloidal lithography and electrochemical anodization process were employed to fabricate self-assembed nano- and microscale dielectric metamaterials in a simple and cost-effective manner. We improved broadband light absorption in c-Si, a-Si, and organic semiconductor layer by employing polystyrene (PS) islands integrated Si conical-frustum arrays, resonant PS nanosphere arrays, and diffusive alumina nanowire arrays, respectively. We also demonstrated thin metal coated alumina nanowire array which is utilized as an efficient light-to-heat conversion layer of solar steam generating devices. The scalable design and adaptable fabrication route to our light management nanostructures will be promising in applications of solar energy harvesting system. On the other hands, broadband invisible cloaks, which continuously work while elastically deforming, are developed using smart metamaterials made of photonic and elastic crystals. A self-adjustable, nearly lossless, and broadband (10-12GHz) smart meatamaterials have great potentials for applications in antenna system and military stealth technology.

  • PDF

A MBASE-based Development Method for Ubiquitous Computing Systems (MBASE를 적용한 유비쿼터스 컴퓨팅 시스템 개발 방법론)

  • Kim, Sangsoo;Lee, Donghyun;In, Hoh
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.1 no.2
    • /
    • pp.5-11
    • /
    • 2005
  • Ubiquitous computing is an emerging technic for various areas such as public, private (individual), military, industrial, medical sectors. The applications of ubiquitous computing are expected to be prevailed from home to office. Unfortunately, it is not effective to apply existing system/software development methodologies into this emerging ubiquitous computing applications. In this paper, MBASE (Model-Based system Architecting and Software Engineering) is applied as a development method of ubiquitous computing applications. The advantage of MBASE is to identify mismatches of product, process, property, and success models and resolve them in developing the ubiquitous computing applications. A SmartView, a ubiquitous computing application, is presented as a case study o f MBASE.

  • PDF

Simulation and Performance Assessment of a Geiger-mode Imaging LADAR System (가이거모드 영상 LADAR 시스템의 시뮬레이션과 성능예측)

  • Kim, Seongjoon;Lee, Impyeong;Lee, Youngcheol
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.5
    • /
    • pp.687-698
    • /
    • 2012
  • LADAR systems can rapidly acquire 3D point clouds by sampling the target surfaces using laser pulses. Such point clouds are widely used for diverse applications such as DSM/DTM generation, forest biomass estimation, target detection, wire avoidance and so on. Many kinds of LADAR systems have been developed with their respective purposes and applications. Particularly, Geiger mode imaging LADAR systems are increasingly utilized since they are energy efficient thank to extremely sensitive detectors incorporated into the systems. The purpose of this research is the performance assessment of a Geiger mode imaging LADAR system based on simulation with the real system parameters. We thus developed a simulation method of such a LADAR system by modeling its geometric, radiometric, optic and electronic aspects. Based on the simulation, we performed the performance assessment of a newly designed system to derive the outlier ratio and false alarm rate expected during its operation in almost real environment with reasonable system parameters. The proposed simulation and performance assessment method will be effectively utilized for system design and optimization, and test data generation.

Risk Management and Assessment Methodology in System Design (위험관리 프로세서와 평가의 새로운 접근)

  • 조희근;박영원
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.2 no.2
    • /
    • pp.197-208
    • /
    • 1999
  • Recently, risk management is a very important issue in many industrial applications. This paper describes a general structure for risk management and suggests a new risk assessment methodology. In risk management applications of financial or insurance industries, there are many methodologies developed for practical use. However, areas for improvement exist to facilitate the application of the methods. Two major risk assessment methodologies have been developed and widely applied in system engineering. One is in its original development application from aerospace and defense industry, and the other was developed in applied software engineering. In a large and complicated system development application, an effective risk management can reduce total development cost as well as uncertainty in achieving project goals of schedule and performance.

  • PDF