• 제목/요약/키워드: 과학기술통제

Search Result 334, Processing Time 0.038 seconds

Quadruple-Metric Based Command and Control Information Recommendation System (쿼드러플-메트릭 기반 지휘통제 정보 추천 시스템)

  • Park, Gyudong;Kim, Jongmo;Jeon, Hocheol
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.40-42
    • /
    • 2022
  • Command and control (C2) information is exploding as sensor and network technologies development. In the C2 are a, processing information on time is very important. If it is not possible to process all information on time because of resource limitation, higher priority information should be processed first. For this, recommendation system is available. Because it can select and present information suitable for each user among tons of information in the order of priority. This study extends the triple-metric priority criterion, which is widely used to implement military communication networks, to the quadruple-metric priority criterion, and proposes a C2 information recommendation system based on it, and shows it's feasibility through experiments.

  • PDF

Design of the Fire Control System for KSR-III (KSR-III 발사 통제 시스템 설계)

  • Hong, I.H.;Seo, J.H.;Kim, Y.M.;Ryu, H.S.
    • Proceedings of the KIEE Conference
    • /
    • 2000.11d
    • /
    • pp.721-723
    • /
    • 2000
  • 국내 과학관측 로켓(Korea Sounding Rocket-III; 이하 KSR-III) 발사통제 시스템 개발 중 로켓 임무 달성에 필요한 시스템 구성과 제작에 대한 전반적인 설계내용을 기술하였다. 로켓 임무와 설계 요구 조건에 의해 각 통제 콘솔과 발사 상황판은 설계되었고 현재 제작 중에 있으며. 향후 KSR-III 발사시험 시 활용 할 계획이다.

  • PDF

Outcome and Enhancement of ISO 27001(ISMS) in National R&D Information Management Environment (국가R&D정보관리 환경에서 ISO 27001(ISMS) 성과 및 개선 방향)

  • Lee, Byeong-Hee;Yeo, Il-Yeon;Kim, Jae-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.823-825
    • /
    • 2011
  • R&D에 관한 주요 국가 및 산업기술의 정보 유출이 문제가 되고 있다. 2009년 11월 국가과학기술지식정보서비스(NTIS)는 영국표준협회(BSI)로부터 ISO 27001에 대한 11개 도메인, 133개 보안 통제항목의 정보보호관리체계((Information Security Management System) 인증을 획득하였고 이후 사후인증 심사를 받고 있다. 본 논문에서는 정보보호 국제 표준인증인 ISO 27001과 관련하여 NTIS의 정보보호관리체계에 대하여 국가R&D정보관리의 경영적 관점에서 실증적 현황 및 성과와 향후 개선 및 발전 방향에 대하여 검토한다. ISO 27001 도입 후 133개 통제항목 중에서 적용율이 증가하였고 중부적합/경부적합/개선권고 사항이 크게 감소하였으나 정보자산 및 개인정보 관리는 지속적인 관심과 개선이 필요함을 알 수 있었다.

작물보호와 행정

  • Hyeon, Jae-Seon
    • The Science & Technology
    • /
    • v.6 no.8 s.51
    • /
    • pp.23-24
    • /
    • 1973
  • 행정이란 Webster의 사전에 의하면 "장기적 안목에서 어떤 기관이 그 목적달성을 위한 활동의 계획, 조직, 그리고 통제하는 사무적 관리상을 말하며 이것은 흔히 수술적 응급대책과는 구별된다."라고 하고 있다. 따라서 작품보호행정은 작물보호가 무엇을 목적으로 하고 있는가를 명백히 인식하고 이론을 토태로 한 합리적이고 효율적인 목적달성을 위한 계획의 수립, 구체적 운영을 위한 기구의 편성, 그리고 이 조직의 합리적 운영등을 그 내용으로 하고 있다.

  • PDF

A Study for Cyber Situation Awareness System Development with Threat Hunting (위협 헌팅을 적용한 사이버 상황인식 시스템 개발에 관한 연구)

  • Lee, Jaeyeon;Choi, Jeongin;Park, Sanghyun;Kim, Byeongjin;Hyun, Dae-Won;Kim, Gwanyoung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.6
    • /
    • pp.807-816
    • /
    • 2018
  • Threat hunting is defined as a process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions. The main concept of threat hunting is to find out weak points and remedy them before actual cyber threat has occurred. And HMM(Hunting Maturity Matrix) is suggested to evolve hunting processes with five levels, therefore, CSOC(Cyber Security Operations Center) can refer HMM how to make them safer from complicated and organized cyber attacks. We are developing a system for cyber situation awareness system with pro-active threat hunting process called unMazeTM. With this unMaze, it can be upgraded CSOC's HMM level from initial level to basic level. CSOC with unMaze do threat hunting process not only detecting existing cyber equipment post-actively, but also proactively detecting cyber threat by fusing and analyzing cyber asset data and threat intelligence.

Authority Control on the Web : Knowledge Organization Systems and Authority Control for Digital Libraries (웹에서의 전거통제:디지털 도서관의 지식조직 시스템(KOS)과 전거 통제)

  • Yoon, Cheong-Ok
    • Journal of Information Management
    • /
    • v.33 no.4
    • /
    • pp.85-105
    • /
    • 2002
  • The purpose of this study is to review the expanded role of authority files, which uses the Knowledge Organization System(KOS) to organize contents and manage the collections in digital libraries. The KOS plays a role as a bridge between the users' information needs and materials by providing links between catalogs and digital resources on the web and supporting retrieval of the relevant items. It is described how a KOS can be used to link a digital resource to related materials, to provide more descriptive records for entities, and access to relevant physical objects.

The Development of Electromagnetic pulse Protection Capability in the Main System of a Tank Battalion (전차대대 주요체계의 EMP 방호능력 발전방안에 관한 연구)

  • Choi, Hokab;Han, Jaeduk;Son, Sangwoo;Kim, Sungkon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.40 no.6
    • /
    • pp.623-631
    • /
    • 2020
  • An electromagnetic pulse (EMP) attack on a nuclear weapon or the airlift of an electronic bomb affects weapons systems, information devices, wired and wireless communication equipment, and power supply equipment. It can lead to confusion on the battlefield. The current standards for EMP protection when applied to the military are centered on fixed and mobile facilities and equipment. It is, however, important to study EMP protection for a single tactical unit centered on the weapon system. In this study, EMP protection standards were established for command and control, maneuvering and firepower systems vulnerable to EMPs, focusing on battle tanks with mobility, firepower, and shock force. Also, specific development plans for EMP protection capabilities are proposed, including the shielding and blocking of EMPs. Through the study, the Korean government intends to ensure a unit's command and control under an EMP attack as well as preserve the viability of a unit's personnel and guarantee the conditions for the execution of a mission.

Particle Analysis of Uranium Bearing Materials Using Ultra High-resolution Isotope Microscope System (초고분해능 동위원소현미경 시스템을 활용한 우라늄 핵종 입자 분석 기술)

  • Jeongmin Kim;Yuyoung Lee;Jung Youn Choi;Haneol Lee;Hyunju Kim
    • Economic and Environmental Geology
    • /
    • v.56 no.5
    • /
    • pp.557-564
    • /
    • 2023
  • Nuclear materials such as uranium are used as fuel for nuclear power generation, but there is a high possibility that they will be used for non-peaceful purposes, so international inspections and regulations are being conducted. Isotope analysis data of fine particulate obtained from nuclear facilities can provide important information on the origin and concentration method of nuclear material, so it is widely used in the field of nuclear safety and nuclear forensics. In this study we describe the analytical method that can directly identify nuclear particles and measure their isotopic ratios for fine samples using a large-geometry secondary ion mass spectrometer and introduce its preliminary results. Using the U-200 standard material, the location of fine particles was identified and the results consistent with the standard value were obtained through microbeam analysis.

The Structure and Process of Technological Risk (기술위험의 구조와 절차)

  • Yun Jin-Hyo
    • Journal of Science and Technology Studies
    • /
    • v.3 no.1 s.5
    • /
    • pp.75-103
    • /
    • 2003
  • The technological risk has two major aspects. The one is technological aspect of the risk which consists of rules of nature and rational behaviors of humans. The other is social aspect of risk which consists of human values and nonrational and emotional behaviors of humans. So the technological risks should be called and treated as the technological and social risks. Because of these, not only technological professionals but also public people should have the chance to participate in the management of technological risks.

  • PDF