• Title/Summary/Keyword: 국방빅데이터

Search Result 43, Processing Time 0.025 seconds

Survival Analysis of Battalion-Level Commanders(leaders) Using Big Data as Results of Brigade-Level KCTC Training - Focused on Infantry Battalion Defensive Operations - (여단급 KCTC 훈련 결과 빅데이터를 활용한 대대급 이하 지휘관(자)의 생존분석 - 보병대대 방어작전을 중심으로 -)

  • Jinseong Yun;Hoseok Moon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.1
    • /
    • pp.94-106
    • /
    • 2024
  • In this study, we conducted a survival analysis on battalion-level commanders(leaders), focusing on infantry battalion defensive operations using the big data of brigade-level KCTC(Korea Combat Training Center) training results. Unlike previous studies, we utilized the brigade-level KCTC training results data for the first time to conduct a survival analysis, and the research subjects were battalion-level commanders(leaders), which can affect the battle. At this time, the battle results were defined, and through cluster analysis, infantry battalions were divided into excellent, average, and insufficient units, and the difference in the survival rate of the commanders was analyzed through the Kaplan-Meier survival analysis. This provided an opportunity to objectively compare the differences between excellent and insufficient units. Subsequently, factors affecting the survival of commanders were derived using the Cox proportional hazard model, and it was possible to confirm the influencing factors from various angles by also using the survival tree model. Significance and limitations confirmed in the research process were presented as policy suggestions and future research directions.

A Study for Bigdata Service Interworking on Real-Time Military Defense Cloud (실시간 의사결정 정보 지원을 위한 국방 클라우드-빅데이터 서비스 연동 방안 연구)

  • Lee, Ga-Won;Park, Jun Young;Kim, Yong Hyun;Huh, Eui-Nam
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.61-63
    • /
    • 2016
  • 국방 정보화의 기조인 네트워크 중심의 디지털 정예강군 실현을 위해 공통 서비스 환경인 클라우드 컴퓨팅 기반 환경 구축 및 전장 정보의 실시간 공유, 서비스 기반 정보 시스템 제공은 필수적이다. 이를 위해서는 국방 특성에 맞는 클라우드 구조 확립이 필요하며, 본 논문에서는 실시간 의사결정 정보 지원을 위한 국방 특성을 살펴보고 클라우드 구성을 설계한다.

Approaches to Applying Social Network Analysis to the Army's Information Sharing System: A Case Study (육군 정보공유체계에 사회관계망 분석을 적용하기 위한방안: 사례 연구)

  • GunWoo Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.597-603
    • /
    • 2023
  • The paradigm of military operations has evolved from platform-centric warfare to network-centric warfare and further to information-centric warfare, driven by advancements in information technology. In recent years, with the development of cutting-edge technologies such as big data, artificial intelligence, and the Internet of Things (IoT), military operations are transitioning towards knowledge-centric warfare (KCW), based on artificial intelligence. Consequently, the military places significant emphasis on integrating advanced information and communication technologies (ICT) to establish reliable C4I (Command, Control, Communication, Computer, Intelligence) systems. This research emphasizes the need to apply data mining techniques to analyze and evaluate various aspects of C4I systems, including enhancing combat capabilities, optimizing utilization in network-based environments, efficiently distributing information flow, facilitating smooth communication, and effectively implementing knowledge sharing. Data mining serves as a fundamental technology in modern big data analysis, and this study utilizes it to analyze real-world cases and propose practical strategies to maximize the efficiency of military command and control systems. The research outcomes are expected to provide valuable insights into the performance of C4I systems and reinforce knowledge-centric warfare in contemporary military operations.

Analysis of Domestic Security Solution Market Trend using Big Data (빅데이터를 활용한 국내 보안솔루션 시장 동향 분석)

  • Park, Sangcheon;Park, Dongsoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.492-501
    • /
    • 2019
  • To use the system safely in cyberspace, you need to use a security solution that is appropriate for your situation. In order to strengthen cyber security, it is necessary to accurately understand the flow of security from past to present and to prepare for various future threats. In this study, information security words of security/hacking news of Naver News which is reliable by using text mining were collected and analyzed. First, we checked the number of security news articles for the past seven years and analyzed the trends. Second, after confirming the security/hacking word rankings, we identified major concerns each year. Third, we analyzed the word of each security solution to see which security group is interested. Fourth, after separating the title and the body of the security news, security related words were extracted and analyzed. The fifth confirms trends and trends by detailed security solutions. Lastly, annual revenue and security word frequencies were analyzed. Through this big data news analysis, we will conduct an overall awareness survey on security solutions and analyze many unstructured data to analyze current market trends and provide information that can predict the future.

CNN and SVM-Based Personalized Clothing Recommendation System: Focused on Military Personnel (CNN 및 SVM 기반의 개인 맞춤형 피복추천 시스템: 군(軍) 장병 중심으로)

  • Park, GunWoo
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.347-353
    • /
    • 2023
  • Currently, soldiers enlisted in the military (Army) are receiving measurements (automatic, manual) of body parts and trying on sample clothing at boot training centers, and then receiving clothing in the desired size. Due to the low accuracy of the measured size during the measurement process, in the military, which uses a relatively more detailed sizing system than civilian casual clothes, the supplied clothes do not fit properly, so the frequency of changing the clothes is very frequent. In addition, there is a problem in that inventory is managed inefficiently by applying the measurement system based on the old generation body shape data collected more than a decade ago without reflecting the western-changed body type change of the MZ generation. That is, military uniforms of the necessary size are insufficient, and many unnecessary-sized military uniforms are in stock. Therefore, in order to reduce the frequency of clothing replacement and improve the efficiency of stock management, deep learning-based automatic measurement of body size, big data analysis, and machine learning-based "Personalized Combat Uniform Automatic Recommendation System for Enlisted Soldiers" is proposed.

The Study on Data Governance Research Trends Based on Text Mining: Based on the publication of Korean academic journals from 2009 to 2021 (텍스트 마이닝을 활용한 데이터 거버넌스 연구 동향 분석: 2009년~2021년 국내 학술지 논문을 중심으로)

  • Jeong, Sun-Kyeong
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.133-145
    • /
    • 2022
  • As a result of the study, the poorest keywords were information, big data, management, policy, government, law, and smart. In addition, as a result of network analysis, related research was being conducted on topics such as data industry policy, data governance performance, defense, governance, and data public. The four topics derived through topic modeling were "DG policy," "DG platform," "DG in laws," and "DG implementation," of which research related to "DG platform" showed an increasing trend, and "DG implementation" tended to shrink. This study comprehensively summarized data governance-related studies. Data governance needs to expand research areas from various perspectives and related fields such as data management and data integration policies at the organizational level, and related technologies. In the future, we can expand the analysis targets for overseas data governance and expect follow-up studies on research directions and policy directions in industries that require data-based future industries such as Industry 4.0, artificial intelligence, and Metaverse.

The study of Defense Artificial Intelligence and Block-chain Convergence (국방분야 인공지능과 블록체인 융합방안 연구)

  • Kim, Seyong;Kwon, Hyukjin;Choi, Minwoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.81-90
    • /
    • 2020
  • The purpose of this study is to study how to apply block-chain technology to prevent data forgery and alteration in the defense sector of AI(Artificial intelligence). AI is a technology for predicting big data by clustering or classifying it by applying various machine learning methodologies, and military powers including the U.S. have reached the completion stage of technology. If data-based AI's data forgery and modulation occurs, the processing process of the data, even if it is perfect, could be the biggest enemy risk factor, and the falsification and modification of the data can be too easy in the form of hacking. Unexpected attacks could occur if data used by weaponized AI is hacked and manipulated by North Korea. Therefore, a technology that prevents data from being falsified and altered is essential for the use of AI. It is expected that data forgery prevention will solve the problem by applying block-chain, a technology that does not damage data, unless more than half of the connected computers agree, even if a single computer is hacked by a distributed storage of encrypted data as a function of seawater.

A Survey on the CPS Security (CPS 보안 문제점 조사 분석)

  • Jeon, Sol;Doh, Inshil;Chae, Kijoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.225-228
    • /
    • 2016
  • CPS(Cyber Physical System)는 사이버 세계(cyber world)와 물리적 세계(physical word)를 연결하여, 현실과 사이버의 정보를 융합 분석하고, 분석한 데이터를 현실에 Feedback 하는 자동적이고 지능적인 제어 시스템이다. 이러한 CPS는 빅데이터를 분석하여 사용자에게 알맞은 정보를 제공해 주며 딥러닝(Deep Learning)을 통해 정확하고 세밀한 Feedback을 제공하는 등 이종 복합 시스템 간의 고신뢰성과 실시간성을 보장하는 무결점 자율 제어 시스템으로 주목 받고 있다. 실생활에서는 의료, 헬스케어, 교통, 에너지, 홈, 국방, 재난대응, 농업, 제조 등에서 폭 넓게 사용되고 있다. 해외에서는 이와 같은 CPS를 이용해 한 분야에 세밀하게 접목시켜 발전을 도모하며, CPS에 의해 변혁되는 데이터 구동형 사회를 준비하고 있다. 하지만, 이러한 CPS를 사용할 때, 보안의 문제점으로 대규모 정전사태가 발생하고, 생명을 위협하는 등의 취약점 또한 드러나고 있어 이에 대한 보안의 중요성과 CPS의 적용분야를 파악하여 전반적인 보안 문제점을 분석하고자 한다.

Study for Analyzing Defense Industry Technology using Datamining technique: Patent Analysis Approach (데이터마이닝을 통한 방위산업기술 분석 연구: 특허분석을 중심으로)

  • Son, Changho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.10
    • /
    • pp.101-107
    • /
    • 2018
  • Recently, Korea's defense industry has advanced highly, and defense R&D budget is gradually increasing in defense budget. However, without objective analysis of defense industry technology, effective defense R&D activities are limited and defense budgets can be used inefficiently. Therefore, in addition to analyzing the defense industry technology quantitatively reflecting the opinions of the experts, this paper aims to analyze the defense industry technology objectively by quantitative methods, and to make efficient use of the defense budget. In addition, we propose a patent analysis method to grasp the characteristics of the defense industry technology and the vacant technology objectively and systematically by applying the big data analysis method, which is one of the keywords of the 4th industrial revolution, to the defense industry technology. The proposed method is applied to the technology of the firepower industry among several defense industrial technologies and the case analysis is conducted. In the process, the patents of 10 domestic companies related to firepower were collected through the Kipris in the defense industry companies' classification of the Korea Defense Industry Association(KDIA), and the data matrix was preprocessed to utilize IPC codes among them. And then, we Implemented association rule mining which can grasp the relation between each item in data mining technique using R program. The results of this study are suggested through interpretation of support, confidence lift index which were resulted from suggested approach. Therefore, this paper suggests that it can help the efficient use of massive national defense budget and enhance the competitiveness of defense industry technology.

A Study on the Application of the Cyber Threat Management System to the Future C4I System Based on Big Data/Cloud (빅데이터/클라우드 기반 미래 C4I체계 사이버위협 관리체계 적용 방안 연구)

  • Park, Sangjun;Kang, Jungho
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.27-34
    • /
    • 2020
  • Recently, the fourth industrial revolution technology has not only changed everyday life greatly through technological development, but has also become a major keyword in the establishment of defense policy. In particular, Internet of Things, cloud, big data, mobile and cybersecurity technologies, called ICBMS, were selected as core leading technologies in defense information policy along with artificial intelligence. Amid the growing importance of the fourth industrial revolution technology, research is being carried out to develop the C4I system, which is currently operated separately by the Joint Chiefs of Staff and each military, including the KJCCS, ATCIS, KNCCS and AFCCS, into an integrated system in preparation for future warfare. This is to solve the problem of reduced interoperability for joint operations, such as information exchange, by operating the C4I system for each domain. In addition, systems such as the establishment of an integrated C4I system and the U.S. military's Risk Management Framework (RMF) are essential for efficient control and safe operation of weapons systems as they are being developed into super-connected and super-intelligent systems. Therefore, in this paper, the intelligent cyber threat detection, management of users' access to information, and intelligent management and visualization of cyber threat are presented in the future C4I system based on big data/cloud.