• Title/Summary/Keyword: 국방정보기술

Search Result 691, Processing Time 0.027 seconds

A sea trial method of hull-mounted sonar using machine learning and numerical experiments (기계학습 및 수치실험을 활용한 선체고정형소나 해상 시운전 평가 방안)

  • Ho-seong Chang;Chang-hyun Youn;Hyung-in Ra;Kyung-won Lee;Dea-hwan Kim;Ki-man Kim
    • The Journal of the Acoustical Society of Korea
    • /
    • v.43 no.3
    • /
    • pp.293-304
    • /
    • 2024
  • In this paper, efficient and reliable methodologies for conducting sea trials to evaluate the performance of hull-mounted sonar systems is discussed. These systems undergo performance verification during ship construction via sea trials. However, the evaluation procedures often lack detailed consideration of variabilities in detection performance due to seabed topography, seasonal factors. To resolve this issue, temperature and salinity structure data were collected from 1967 to 2022 using ARGO floats and ocean observers data. The paper proposes an efficient and reliable sea trial method incorporating Bellhop modeling. Furthermore, a machine learning model applying a Physics-Informed Neural Networks was developed using the acquired data. This model predicts the sound speed profile at specific points within the sea trial area, reflecting seasonal elements of performance evaluation. In this study, we predicted the seasonal variations in sound speed structure during sea trial operations at a specific location within the trial area. We then proposed a strategy to account for the variability in detection performance caused by seasonal factors, using results from Bellhop modeling.

Beginning of the Meteorological Satellite: The First Meteorological Satellite TIROS (기상위성의 태동: 최초의 기상위성 TIROS)

  • Ahn, Myoung-Hwan
    • Atmosphere
    • /
    • v.22 no.4
    • /
    • pp.489-497
    • /
    • 2012
  • Recently released a top secret document explicitly shows that the early development plan for an earth observation satellite in the USA has a hidden and more important purpose for a concept of 'free space' than the scientific purpose. At that time, the hidden and secret concept imbedded within the early space development plan prevail other national policies of the USA government for purpose of the national security. Under these circumstances, it is quite reasonable to accept a possibility that the meteorological satellites which play a key role in the every area of meteorology and climatology was also born for the hidden purposes. Even it is so, it is quite amazing that the first meteorological satellite is launched in the USA despite of the facts that the major users of the meteorological satellites were not very enthusiastic with the meteorological satellite and the program was not started as a formal meteorological satellite project. This was only possible because of the external socio-political impact caused by the successful launch of the Russian Sputnik satellite and a few key policy developers who favored the meteorological satellite program. It is also interesting to note that the beginning of the first Korean meteorological satellite program was initiated by a similar socio-political influence occurred by the launch of a North Korean satellite.

Minimum-Cost Path Finding Algorithm in Real-Time For Computer Generated Force (실시간성을 고려한 가상군 최소비용 길 찾기 알고리즘)

  • Han, Chang-Hee;Min, Young-Hye;Park, Sang-Hyuk;Kim, Jai-Hoon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.1
    • /
    • pp.17-25
    • /
    • 2011
  • At the computer games, we can experience a variety of environments using a virtual object. It is similar to that be trained in War-game simulator of the defense. Actual soldiers and a computer-generated virtual group(Computer Generated Force: CGF) in 3-D virtual battlefield environment are training. However, path finding algorithm, one of the techniques of simulation models, to the current level only considers the shortest time path. So, this current level at the special situation of the army in the battlefield for selecting the optimal path is limited. The focus of this paper is to select the least-cost path using the deadline with several different mission conditions(METT+TC). For the only shortest time path algorithm and the least-cost path algorithm using dealine,($d_t$, one of METT+TC elements), Its usefulness is verifying the change of the move spent time(t) for all possible paths and the fighting power of the combat troops(Troops ability, a) through a comparison of the total cost of moves(c(t)). According to the results, when considering the deadline, the proposed algorithm saves about 62.5% of the maximum cost.

A Study of Artificial Intelligence Learning Model to Support Military Decision Making: Focused on the Wargame Model (전술제대 결심수립 지원 인공지능 학습방법론 연구: 워게임 모델을 중심으로)

  • Kim, Jun-Sung;Kim, Young-Soo;Park, Sang-Chul
    • Journal of the Korea Society for Simulation
    • /
    • v.30 no.3
    • /
    • pp.1-9
    • /
    • 2021
  • Commander and staffs on the battlefield are aware of the situation and, based on the results, they perform military activities through their military decisions. Recently, with the development of information technology, the demand for artificial intelligence to support military decisions has increased. It is essential to identify, collect, and pre-process the data set for reinforcement learning to utilize artificial intelligence. However, data on enemies lacking in terms of accuracy, timeliness, and abundance is not suitable for use as AI learning data, so a training model is needed to collect AI learning data. In this paper, a methodology for learning artificial intelligence was presented using the constructive wargame model exercise data. First, the role and scope of artificial intelligence to support the commander and staff in the military decision-making process were specified, and to train artificial intelligence according to the role, learning data was identified in the Chang-Jo 21 model exercise data and the learning results were simulated. The simulation data set was created as imaginary sample data, and the doctrine of ROK Army, which is restricted to disclosure, was utilized with US Army's doctrine that can be collected on the Internet.

The Effect of Health Risk Factors on Gender in Early Adolescents: The Application of Logit Analysis (초기청소년대상자의건강위험요인이성별에미치는영향요인분석: 로짓분석의활용)

  • Yoo, Keun-Hwan
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.7
    • /
    • pp.85-93
    • /
    • 2019
  • The purpose of this study is to identify the influence of demographic characteristics such as inappropriate lifestyle, stress, and health status among health risk factors of early adolescents according to gender. There is a gender difference in the perception of mental and physical health of early adolescents, and the result can be different in behavior patterns between men and women. This study was conducted to identify the health risk factors as independent variables for early adolescents in Daegu and Gyeongbuk area, and to analyze the determinants of gender (male, female) differences by parents, family environment, friends, academic background, appearance, grade, location, school grades, family situation, and health status as demographic factors. And, the Odds Ratio of the early adolescents was analyzed through logit analysis and the differences according to the influence relationship of each of them were examined. As a result of the analysis, the more the sleep and physical activity, parents, home environment, friends, academic background, and appearance are increased, the more the influence is likely to become on the male students. On the contrary, the rest of the health risk factors can increase, and the threat to the health risk factors is likely to become severe to the female students.Among them, it is necessary to develop a pre-preventive program for early adolescents' health risk factors, provide basic data for practical application in the field, and seek a detailed program according to the gender of early adolescents.

Construction and Application of Intelligent Decision Support System through Defense Ontology - Application example of Air Force Logistics Situation Management System (국방 온톨로지를 통한 지능형 의사결정지원시스템 구축 및 활용 - 공군 군수상황관리체계 적용 사례)

  • Jo, Wongi;Kim, Hak-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.2
    • /
    • pp.77-97
    • /
    • 2019
  • The large amount of data that emerges from the initial connection environment of the Fourth Industrial Revolution is a major factor that distinguishes the Fourth Industrial Revolution from the existing production environment. This environment has two-sided features that allow it to produce data while using it. And the data produced so produces another value. Due to the massive scale of data, future information systems need to process more data in terms of quantities than existing information systems. In addition, in terms of quality, only a large amount of data, Ability is required. In a small-scale information system, it is possible for a person to accurately understand the system and obtain the necessary information, but in a variety of complex systems where it is difficult to understand the system accurately, it becomes increasingly difficult to acquire the desired information. In other words, more accurate processing of large amounts of data has become a basic condition for future information systems. This problem related to the efficient performance of the information system can be solved by building a semantic web which enables various information processing by expressing the collected data as an ontology that can be understood by not only people but also computers. For example, as in most other organizations, IT has been introduced in the military, and most of the work has been done through information systems. Currently, most of the work is done through information systems. As existing systems contain increasingly large amounts of data, efforts are needed to make the system easier to use through its data utilization. An ontology-based system has a large data semantic network through connection with other systems, and has a wide range of databases that can be utilized, and has the advantage of searching more precisely and quickly through relationships between predefined concepts. In this paper, we propose a defense ontology as a method for effective data management and decision support. In order to judge the applicability and effectiveness of the actual system, we reconstructed the existing air force munitions situation management system as an ontology based system. It is a system constructed to strengthen management and control of logistics situation of commanders and practitioners by providing real - time information on maintenance and distribution situation as it becomes difficult to use complicated logistics information system with large amount of data. Although it is a method to take pre-specified necessary information from the existing logistics system and display it as a web page, it is also difficult to confirm this system except for a few specified items in advance, and it is also time-consuming to extend the additional function if necessary And it is a system composed of category type without search function. Therefore, it has a disadvantage that it can be easily utilized only when the system is well known as in the existing system. The ontology-based logistics situation management system is designed to provide the intuitive visualization of the complex information of the existing logistics information system through the ontology. In order to construct the logistics situation management system through the ontology, And the useful functions such as performance - based logistics support contract management and component dictionary are further identified and included in the ontology. In order to confirm whether the constructed ontology can be used for decision support, it is necessary to implement a meaningful analysis function such as calculation of the utilization rate of the aircraft, inquiry about performance-based military contract. Especially, in contrast to building ontology database in ontology study in the past, in this study, time series data which change value according to time such as the state of aircraft by date are constructed by ontology, and through the constructed ontology, It is confirmed that it is possible to calculate the utilization rate based on various criteria as well as the computable utilization rate. In addition, the data related to performance-based logistics contracts introduced as a new maintenance method of aircraft and other munitions can be inquired into various contents, and it is easy to calculate performance indexes used in performance-based logistics contract through reasoning and functions. Of course, we propose a new performance index that complements the limitations of the currently applied performance indicators, and calculate it through the ontology, confirming the possibility of using the constructed ontology. Finally, it is possible to calculate the failure rate or reliability of each component, including MTBF data of the selected fault-tolerant item based on the actual part consumption performance. The reliability of the mission and the reliability of the system are calculated. In order to confirm the usability of the constructed ontology-based logistics situation management system, the proposed system through the Technology Acceptance Model (TAM), which is a representative model for measuring the acceptability of the technology, is more useful and convenient than the existing system.

Real data-based active sonar signal synthesis method (실데이터 기반 능동 소나 신호 합성 방법론)

  • Yunsu Kim;Juho Kim;Jongwon Seok;Jungpyo Hong
    • The Journal of the Acoustical Society of Korea
    • /
    • v.43 no.1
    • /
    • pp.9-18
    • /
    • 2024
  • The importance of active sonar systems is emerging due to the quietness of underwater targets and the increase in ambient noise due to the increase in maritime traffic. However, the low signal-to-noise ratio of the echo signal due to multipath propagation of the signal, various clutter, ambient noise and reverberation makes it difficult to identify underwater targets using active sonar. Attempts have been made to apply data-based methods such as machine learning or deep learning to improve the performance of underwater target recognition systems, but it is difficult to collect enough data for training due to the nature of sonar datasets. Methods based on mathematical modeling have been mainly used to compensate for insufficient active sonar data. However, methodologies based on mathematical modeling have limitations in accurately simulating complex underwater phenomena. Therefore, in this paper, we propose a sonar signal synthesis method based on a deep neural network. In order to apply the neural network model to the field of sonar signal synthesis, the proposed method appropriately corrects the attention-based encoder and decoder to the sonar signal, which is the main module of the Tacotron model mainly used in the field of speech synthesis. It is possible to synthesize a signal more similar to the actual signal by training the proposed model using the dataset collected by arranging a simulated target in an actual marine environment. In order to verify the performance of the proposed method, Perceptual evaluation of audio quality test was conducted and within score difference -2.3 was shown compared to actual signal in a total of four different environments. These results prove that the active sonar signal generated by the proposed method approximates the actual signal.

Host-Based Intrusion Detection Model Using Few-Shot Learning (Few-Shot Learning을 사용한 호스트 기반 침입 탐지 모델)

  • Park, DaeKyeong;Shin, DongIl;Shin, DongKyoo;Kim, Sangsoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.7
    • /
    • pp.271-278
    • /
    • 2021
  • As the current cyber attacks become more intelligent, the existing Intrusion Detection System is difficult for detecting intelligent attacks that deviate from the existing stored patterns. In an attempt to solve this, a model of a deep learning-based intrusion detection system that analyzes the pattern of intelligent attacks through data learning has emerged. Intrusion detection systems are divided into host-based and network-based depending on the installation location. Unlike network-based intrusion detection systems, host-based intrusion detection systems have the disadvantage of having to observe the inside and outside of the system as a whole. However, it has the advantage of being able to detect intrusions that cannot be detected by a network-based intrusion detection system. Therefore, in this study, we conducted a study on a host-based intrusion detection system. In order to evaluate and improve the performance of the host-based intrusion detection system model, we used the host-based Leipzig Intrusion Detection-Data Set (LID-DS) published in 2018. In the performance evaluation of the model using that data set, in order to confirm the similarity of each data and reconstructed to identify whether it is normal data or abnormal data, 1D vector data is converted to 3D image data. Also, the deep learning model has the drawback of having to re-learn every time a new cyber attack method is seen. In other words, it is not efficient because it takes a long time to learn a large amount of data. To solve this problem, this paper proposes the Siamese Convolutional Neural Network (Siamese-CNN) to use the Few-Shot Learning method that shows excellent performance by learning the little amount of data. Siamese-CNN determines whether the attacks are of the same type by the similarity score of each sample of cyber attacks converted into images. The accuracy was calculated using Few-Shot Learning technique, and the performance of Vanilla Convolutional Neural Network (Vanilla-CNN) and Siamese-CNN was compared to confirm the performance of Siamese-CNN. As a result of measuring Accuracy, Precision, Recall and F1-Score index, it was confirmed that the recall of the Siamese-CNN model proposed in this study was increased by about 6% from the Vanilla-CNN model.

The Status of North Korean Airspace after Reunification (북한 공역의 통일 후 지위)

  • Kwon, Chang-Young
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.1
    • /
    • pp.287-325
    • /
    • 2017
  • Considering the development of aerospace, military science and technology since the 20th century, the sky is very important for the nation's existence and prosperity. The proverb "Whosoever commands the space commands the world itself!" emphasizes the need for the command of the air. This essay is the first study on the status of airspace after reunification. First, the territorial airspace is over the territory and territorial sea, and its horizontal extent is determined by the territorial boundary lines. Acceptance of the present order is most reasonable, rather than attempting to reconfigure through historical truths about border issues, and it could be supported by neighboring countries in the reunification period. For peace in Northeast Asia, the reunified Korea needs to respect the existing border agreement between North Korea and China or Russia. However, the North Korean straight baselines established in the East Sea and the Yellow Sea should be discarded because they are not available under United Nations Convention on the Law of the Sea. It is desirable for the reunified Korea to redefine the straight baselines that comply with international law and determine the territorial waters up to and including the 12-nautical mile outside it. Second, the Flight Information Region (hereinafter "FIR") is a region defined by the International Civil Aviation Organization (hereinafter "ICAO") in order to provide information necessary for the safe and efficient flight of aircraft and the search and rescue of aircraft. At present, Korea is divided into Incheon FIR which is under the jurisdiction of South Korea and Pyongyang FIR which is under the jurisdiction of North Korea. If North Korea can not temporarily exercise control of Pyongyang FIR due to a sudden change of circumstances, it is desirable for South Korea to exercise control of Pyongyang FIR, and if it is unavoidable, ICAO should temporarily exercise it. In reunified Korea, it is desirable to abolish Pyongyang FIR and integrate it into Incheon FIR with the approval of ICAO, considering systematic management and control of FIR, establishment of route, and efficiency of management. Third, the Air Defense Identification Zone (hereinafter "ADIZ") is a zone that requires easy identification, positioning, and control of aircraft for national security purposes, and is set up unilaterally by the country concerned. The US unilaterally established the Korea Air Defense Identification Area (KADIZ) by the Declaration of Commitment on March 22, 1951. The Ministry of Defense proclaimed a new KADIZ which extended to the area including IEODO on December 13, 2013. At present, North Korea's military warning zone is set only at maritime boundaries such as the East Sea and the Yellow Sea. But in view of its lack of function as ADIZ in relations with China and Russia, the reunified Korea has no obligation to succeed it. Since the depth of the Korean peninsula is short, it is necessary to set ADIZ boundary on the outskirts of the territorial airspace to achieve the original purpose of ADIZ. Therefore, KADIZ of the reunified Korea should be newly established by the boundary line that coincides with the Incheon FIR of the reunified Korea. However, if there is no buffer zone overlapping with or adjacent to the ADIZs of neighboring countries, military tensions may rise. Therefore, through bilateral negotiations for peace in Northeast Asia, a buffer zone is established between adjacent ADIZs.

  • PDF

Comparative Analysis of STS contents on the Next Generation Science Textbook and High School Science Textbooks Focused on the Earth Science (차세대 과학 교과서와 기존 과학 교과서의 STS 교육내용 비교 분석 -지구과학 영역을 중심으로-)

  • Hyun, Jiyong;Park, Shingyu;Kim, Jungwook;Chung, Wonwoo
    • Journal of Science Education
    • /
    • v.32 no.2
    • /
    • pp.1-16
    • /
    • 2008
  • The purpose of this study was to analyze about STS contents in the next generation science textbook for 10th grade according to curriculum revision 2007 and high school science textbooks focused on the Earth Science which were published according to the 7th curriculum. The contents of STS were analyzed by the STS topics of Yager(1989), Piel's standard(1981), and student activities by SATIS. The results of this study are the same as follows: 'The next generation science textbook' was shown that 20.9% is STS material amount in average by Yager's standard. 'High school science textbooks' were shown that 11.3% is STS material amount in average. Based on the STS topics by Yager's standard, most of STS content is focused on 'Relativity with local community', 'Application of science' and 'Cooperative work on real problems'. However, there is rare contents such as 'Multiple dimensions of science', 'Practice with decision-making strategies' and 'Evaluation concerned for getting and using information' in the next generation science textbook. In high school science textbooks were shown that 'Applicability of science' is the highest and 'Relativity with local community' is the next high contents. Based on the STS topics by Piel's standard, most of STS contents are focused on 'Environmental quality', 'Space research' and 'National defence' in the next generation science textbook. But high school science textbooks are focused on 'Natural resources' and 'Technology development'. The activities were analyzed by SATIS student activities. The major categories of activities included in the next generation science textbook were 'Investigation', 'Simulation' and 'Data analysis'. But, there were rare activities like 'Roleplaying', 'Research design' and 'Simulation' in high school science textbooks.

  • PDF