• Title/Summary/Keyword: 국방기술

Search Result 4,307, Processing Time 0.03 seconds

A Study on the Operation Concept of Cyber Warfare Execution Procedures (사이버전 수행절차 운영개념에 관한 연구)

  • Kim, Sung-Joong;Yoo, JiHoon;Oh, HaengRok;Shin, Dongil;Shin, DongKyoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.73-80
    • /
    • 2020
  • Due to the expansion of cyber space, war patterns are also changing from traditional warfare to cyber warfare. Cyber warfare is the use of computer technology to disrupt the activities of nations and organizations, especially in the defense sector. However, the defense against effective cyber threat environment is inadequate. To complement this, a new cyber warfare operation concept is needed. In this paper, we study the concepts of cyber intelligence surveillance reconnaissance, active defense and response, combat damage assessment, and command control in order to carry out cyber operations effectively. In addition, this paper proposes the concept of cyber warfare operation that can achieve a continuous strategic advantage in cyber battlefield.

A Study of Machine Learning based Hardware Trojans Detection Mechanisms for FPGAs (FPGA의 Hardware Trojan 대응을 위한 기계학습 기반 탐지 기술 연구)

  • Jang, Jaedong;Cho, Mingi;Seo, Yezee;Jeong, Seyeon;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.109-119
    • /
    • 2020
  • The FPGAs are semiconductors that can be redesigned after initial fabrication. It is used in various embedded systems such as signal processing, automotive industry, defense and military systems. However, as the complexity of hardware design increases and the design and manufacturing process globalizes, there is a growing concern about hardware trojan inserted into hardware. Many detection methods have been proposed to mitigate this threat. However, existing methods are mostly targeted at IC chips, therefore it is difficult to apply to FPGAs that have different components from IC chips, and there are few detection studies targeting FPGA chips. In this paper, we propose a method to detect hardware trojan by learning the static features of hardware trojan in LUT-level netlist of FPGA using machine learning.

The new fusion interpolation for high resolution depth image (고품질 및 고해상도 깊이 영상 구현을 위한 새로운 결합 보간법)

  • Kim, Jihyun;Choi, Jinwook;Ryu, Seungchul;Kim, Donghyun;Sohn, Kwanghoon
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2012.07a
    • /
    • pp.40-43
    • /
    • 2012
  • 3차원 영상 기술은 방송, 영화, 게임, 의료, 국방 등 다양한 기존 산업들과 융합하며 새로운 패러다임을 형성하고 있으며, 고품질 및 고해상도의 3차원 영상 획득에 대한 필요성이 강조되고 있다. 이에 따라, 최근에는 3차원 입체 영상을 제작 하는 방법 중 하나인 2D-plus-Depth 구조에 대한 연구가 활발히 진행되고 있다. 2D-plus-Depth 구조는 Charge-Coupled Device(CCD) 센서 등을 이용한 일반 카메라와 깊이 카메라를 결합한 형태로써 이 구조로부터 얻은 깊이 영상의 해상도를 상향 변환하기 위해서 Joint Bilateral Upsampling(JBU)[1], 컬러 영상의 정보를 활용한 보간법[2] 등의 방법들이 사용된다. 하지만 이 방법들은 깊이 영상을 높은 배율로 상향 변환할 경우 텍스처가 복사되거나 흐림 및 블록화 현상이 발생하는 문제점이 있다. 본 논문에서는 2D-plus-Depth 구조에서 얻은 고해상도 컬러 영상에서 보간 정보를 구하고 이 정보를 저해상도의 깊이 영상에 적용하여 상향 변환된 가이드 깊이 영상을 제작한다. 이 가이드 깊이 영상을 Bilateral Filtering[8]을 이용함으로써 고품질의 고해상도 깊이 영상을 획득한다. 실험 결과 제안하는 방법으로 해상도를 상향 변환을 할 경우에 기존의 보간법들에 비해 깊이 영상의 특성을 잘 보존함을 확인할 수 있고, 가이드 깊이 영상에 필터링을 처리한 결과가 JBU의 결과보다 향상됨을 확인할 수 있다.

  • PDF

Value-Based Enterprise Architecture Framework: VBEAF (가치기반 엔터프라이즈 아키텍처 프레임워크: VBEAF)

  • Lee, Jihyun;Hwang, Sunmyung
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.6
    • /
    • pp.77-85
    • /
    • 2014
  • Until now there have been many kinds of enterprise architecture frameworks including the DoDAF in defense domain, the FEAF in administration domain, and the TEAF in finance domain. These EAFs define EA viewpoints for supporting each domain and propose perspectives and models for each viewpoint. These EAFs provide consistent models from different perspectives that interact with each other. However, they have too many perspectives so that their complexities are too high, or they do not define enough models for concrete architecture description. Especially, they neither consider business values, that mean the ultimate purpose of an organization nor execute processes for achieving the business values. This paper thus proposes the VBEAF, business value based enterprise architecture framework that considers and executes business values in organizational business processes.

Curriculum development group specializing in the Department of Hu-man Resources plan (군 전문인력 양성학과 교육과정 개발 방안)

  • Kim, Young Joung
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.195-202
    • /
    • 2013
  • Defense reform our military for the globalization of information. Scientific command structure, troop structure, unit structure, step-by-step into the power structure while promoting a history of quantitative-oriented structure, and structure of the quality of state-of-the-art technology-driven transition in the middle of the bottle numberplans about the current 3.3-fold increase in reducing the cadre(officers and NCOs). NCO groups in the executive, especially expanding the current level of 100% increase in the rate of long-serving, while ensuring a stable job and to superior resources to secure a stable policy through science. Military alliance is now underway. In the midst of this group, and urged the group at the University of the leading military and specialized resources to ensure each agreement required by subjects to reflect. Thus effectively improve the quality of education and the demands of the job analysis, DACUM curriculum development methods and procedures can be applied at the time of urgent need for foster an excellent resource for the discharge of curriculum development at the University of Selected as a core job, career, and job classification configuration inside of Duty according to KST derived from the group reflect on the training courses to meet the requirements in the curriculum through the development of curriculum, job definition, job model set to propose.

An Efficient IoT Healthcare Service Management Model of Location Tracking Sensor (위치 추적 센서 기반의 IOT 헬스케어 서비스 관리 모델)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.14 no.3
    • /
    • pp.261-267
    • /
    • 2016
  • As IoT technology has gained the attention all around the world, the development for various services of healthcare, smart city, agriculture, and defense based on IoT is in progress. However, it is likely that healthcare services based on IoT have a problem of being leaked of patients' biological information by a third party and that risks patients' lives. In this paper, an IoT health care service managing model based on location sensor is proposed, which secures the biological information of a patient and simplifies the procedure to process the treatment and administration steps by using the data resources sensed. Even when an emergency occurs, this proposed model can respond quickly using the location information of the patient, which enables the staff in the hospital to locate the patient in real time. In addition, there is an advantage to minimize the time and the process of care, because the location of the equipment for necessary treatment is possible to be instantaneously located with attached sensors.

A Case Study of the Audio-Visual Archives System Development and Management (시청각(사진/동영상) 기록물 관리를 위한 시스템 구축과 운영 사례 연구)

  • Shin, Dong-Hyeon;Jung, Se-Young;Kim, Seon-Heon
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.9 no.1
    • /
    • pp.33-50
    • /
    • 2009
  • ADD(Agency for Defense Development) has developed digital audio-visual archives management system to ensure easy access and long-term preservation for digital audio-visual archives. This paper covers total process of the system development and database management in the aspect of preservation and utilization by users' easy search through digitization of audio-visual archives. In detail, it contains system design for images and video data handling, standard workflow establishment, data quality, and metadata settings for database by converting an analog data into digital format. Also, this study emphasizes the importance of audio-visual archives management system through cost-effectiveness analysis.

A Study on the Improvement of Airworthiness Certification (항공기 감항증명제도에 대한 고찰)

  • Hwang, Ho-Won;Hong, Seung-Taek
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.26 no.1
    • /
    • pp.31-63
    • /
    • 2011
  • Since Korea has invested only on developing an aircraft, it is true that Korea has neglected detailed standards and procedures about certification activities including essential safety procedures. Most developed countries have implemented mandatory airworthiness system by legislating it for operational safety of aircraft based on ICAO Annex 8, and the U.S. Department of Defense and the FAA's Airworthiness system have been adapted it to the realities of their circumstance. Therefore, Airworthiness system that can guarantee the safety of the aircraft at international level is necessary to enhance flight safety and to create export opportunities of an aircraft as a country which can develop an aircraft by itself To achieve this, a study on the improvement of aircraft airworthiness was carried out by analyzing the problem of domestic airworthiness system and by reflecting international best practices on the establishment of a system for improved Airworthiness.

  • PDF

Measures to Prevent the Leakage of Military Internal Information through the Analysis of Military Secret Leakage Cases: Focusing on Insider Behaviors (군사기밀 유출 사례 분석을 통한 군 내부정보 유출 방지 방안 : 내부자 행위 중심으로)

  • Eom, Jung-Ho;Kim, Nam-Uk
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.85-92
    • /
    • 2020
  • None of the recent cases of military secret leakages have leaked internal information using networks. This is because the Internet and the Intranet are physically separated, and has a difficult process when transmitting and receiving data through the Internet. Therefore, most of the leaked paths are to copy and hand over secrets, shoot and send them with a smartphone, or disclose after remembering them. So, the technology of blocking and detecting military secret leakages through the network is not effective. The purpose of this research is to propose a method to prevent information leakage by focusing on the insider behaviors, the subject of leakage, rather than the military secret. The first is a preventive measure to prevent the leakage behavior of military secrets, the second is to block suspicious access to the military secret data, and the last is to detect the leakage behavior by insiders.

Enhancing the Efficiency and Reliability for M&S based Test and Evaluation System Development (M&S 기반 시험평가 장비 개발의 효율성 및 신뢰성 강화 방안)

  • Cho, Kyu-Tae;Lee, Seung-Young;Lee, Han-Min;Kim, Sae-Hwan;Jeong, Ha-Min
    • Journal of the Korea Society for Simulation
    • /
    • v.21 no.1
    • /
    • pp.89-96
    • /
    • 2012
  • Recent modeling and simulation technologies are being used in various fields, especially in the field of military simulation-based acquisition (Simulation Based Acquisition) is recognized as an essential policy. In test and evaluation phase of the SBA process, to build a simulation-based T&E(test and evaluation) environment is needed when T&E cannot be carried by real weapon system. To improve efficiency and reliability for T&E, interoperability, reusability and reliability for T&E equipments and systems are important. In this study, we propose applying simulation framework for efficienct test and applying VV&A process for reliable evaluation. We describes the characteristics of the development process, the actual test cases and the results of evaluation. Finally utilization plan and the future direction of research is described.