• Title/Summary/Keyword: 전장상황 인식

Search Result 42, Processing Time 0.029 seconds

사이버전을 위한 보안기술 현황과 전망

  • Seo, Dong-Il;Cho, Hyun-Sook
    • Review of KIISC
    • /
    • v.21 no.6
    • /
    • pp.42-48
    • /
    • 2011
  • 전장의 양상이 물리적인 대량살상을 중심으로 한 전통적인 재래전에서 눈에 보이지 않는 사이버전으로 변화되고 있는 시점에서 이에 대비하기 위한 사이버전 공격 및 방어기술은 매우 중차대한 문제이다. 사이버전을 위한 보안 기술로는 암호 인증 인식 감시와 같은 정보보안 핵심원천 기술, 분산서비스거부공격 대응기술, 스마트 아이디 기술, 영상보안 및 바이오인식 기술, 부채널 공격 방지 기술 등이 있다. 이러한 기술들은 사이버전을 위해 사용될 수 있는 매우 명확한 분야라 할 것이다. 또한, 사이버전 기솔로는 암호 인증 인식 감시와 같은 핵심 원천 기술 및 기존 보안 기술 분야를 포함하고 초경량 고비도 암호화 기술, 밀리터리 포렌식 기술, 사이버공격 근원지 역추적 기술, 사이버 공격 정보공유 협업관제 기술, 사이버 공격 무기 제작 기술 등이었다. 특히, 사이버전은 작은 비용으로 최대 효과를 거둘 수 있는 비대칭 전력의 매우 중요한 분야이며, 주요 선진국들은 사이버 공격에 대한 자위권 확보 차원에서 사이버전에 대한 기술적 제도적 준비를 서두르고 있는 상황이다. 본 기고문에서는 이와 같은 사이버전을 위한 보안 기술 현황과 전망을 살펴보고자 한다.

자율 주행 자동차 관련 SW기술 동향

  • Jang, Seung-Ju
    • Information and Communications Magazine
    • /
    • v.33 no.4
    • /
    • pp.27-33
    • /
    • 2016
  • 자율 주행(스마트) 자동차는 첨단 IT기술을 이용하여 사람의 개입을 줄여서 운행하는 자동차를 말한다. 자율 주행(스마트) 자동차는 자율적으로 차량 주변 환경 및 상황을 판단하여 정해진 목적지까지 안전하게 이동하는 차량을 의미한다. 자율 주행(스마트) 자동차는 주행 안전성과 운전자의 편의성을 향상시키기 위한 연구 형태로 주로 이루어지고 있다. 자율 주행(스마트) 자동차 기술은 자율 주행의 정도를 적용하여 단계별로 개발이 진행될 것으로 보인다. 자율 주행 자동차 기술은 인간 세상에 또 다른 변혁을 몰고 오고 있다. 자율 주행 자동차와 관련한 기술은 첨단 IT기술을 기계 자동차에 접목하는 것인데, 적용하는 IT 기술은 HW, SW기술로 나눌 수 있다. IT HW 기술로는 환경 인식에 필요한 HW, 위치 인식 HW, 판단/제어를 위한 여러가지 센서 HW 등이 있다. IT SW 기술로는 IT HW를 구동하기 위한 실시간 OS, IT HW 전장장치를 구동할 수 있는 여러가지 SW 관련 기술, 자율 주행을 위한 경로 알고리즘 등이 있다. 본 고에서는 자율 주행 자동차에 적용되는 IT SW 기술 중심으로 살펴본다.

The Extended-Military Multimedia Systems Based on Real-Time Scheduling Scheme (실시간 스케줄링을 적용한 Extended-Military Multimedia Systems)

  • Park, Sang-Hyuk;Kim, Jai-Hoon;Han, Chang-Hee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.1
    • /
    • pp.26-32
    • /
    • 2011
  • It is very important for more effective military operation to share information required in recognizing a situation by monitoring battlefield. The recognition of situations is offered visually though multi-media systems such as a COP(Common Operation Picture), UAV etc. The operating method has rapidly changed into Network-Centric Warfare (NCW). As a result, the data that these Multimedia systems should control is increasing. Improved performance of Multimedia systems is required to deal with them. In this paper, we propose Extended-Military Multimedia System(E-MMS) applying the most excellent scheduling method in terms of meet-ratio in real time when Multimedia systems carry out assigned information in real time for monitoring as the method of improved performance. As a result of utility about proposed system, it is verified that realtime EDF(Earliest Deadline First) scheduling method is more improved up to 20% compared to non-realtime FCFS(First Come First Service) in terms of the deadline meet ratio.

The Effect of Mobile Foodservice Platform Service Characteristics on Ease of Use, Usefulness and Reuse Intention (모바일 외식 플랫폼서비스특성이 사용용이성과 유용성 및 재사용의도에 미치는 영향)

  • Jeon, Jang Chul
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.2
    • /
    • pp.31-37
    • /
    • 2019
  • This study examined the sub - dimensions of mobile food platform service characteristics and verified how they affect the usability, usability and re - use intention. The data collection is from February 11, 2019 to February 28, 2019. The researcher visited the food service company and presented the questionnaire by direct interview. The results of the analysis are summarized as follows. First, the ubiquitous connectivity and interactivity of the mobile eater platform service have a significant effect on ease of use, but the situational awareness has no significant effect. Second, ubiquitous connectivity, situational awareness, and interactivity have a significant effect on usability, and ease of use has a significant effect on usability. Third, ubiquitous connectivity has a significant effect on re - use intention, and situational awareness and interactivity have a significant effect on re - use intention. Fourth, ease of use has no significant effect on re-use intention, but usefulness has a significant effect on re-use intention.

Comparative Analysis and Implications of Command and Control(C2)-related Information Exchange Models (지휘통제 관련 정보교환모델 비교분석 및 시사점)

  • Kim, Kunyoung;Park, Gyudong;Sohn, Mye
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.59-69
    • /
    • 2022
  • For effective battlefield situation awareness and command resolution, information exchange without seams between systems is essential. However, since each system was developed independently for its own purposes, it is necessary to ensure interoperability between systems in order to effectively exchange information. In the case of our military, semantic interoperability is guaranteed by utilizing the common message format for data exchange. However, simply standardizing the data exchange format cannot sufficiently guarantee interoperability between systems. Currently, the U.S. and NATO are developing and utilizing information exchange models to achieve semantic interoperability further than guaranteeing a data exchange format. The information exchange models are the common vocabulary or reference model,which are used to ensure the exchange of information between systems at the content-meaning level. The information exchange models developed and utilized in the United States initially focused on exchanging information directly related to the battlefield situation, but it has developed into the universal form that can be used by whole government departments and related organizations. On the other hand, NATO focused on strictly expressing the concepts necessary to carry out joint military operations among the countries, and the scope of the models was also limited to the concepts related to command and control. In this paper, the background, purpose, and characteristics of the information exchange models developed and used in the United States and NATO were identified, and comparative analysis was performed. Through this, we intend to present implications when developing a Korean information exchange model in the future.

A study on the cyber common operation picture for situational awareness in cyberspace (사이버공간 내 상황인식을 위한 사이버 공통 작전 상황도 연구)

  • Kim, Kook-jin;Youn, Jae-pil;Yoon, Suk-joon;Kang, Ji-won;Kim, Kyung-shin;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.87-101
    • /
    • 2022
  • Cyber-attacks occur in the blink of an eye in cyberspace, and the damage is increasing all over the world. Therefore, it is necessary to develop a cyber common operational picture that can grasp the various assets belonging to the 3rd layer of cyberspace from various perspectives. By applying the method for grasping battlefield information used by the military, it is possible to achieve optimal cyberspace situational awareness. Therefore, in this study, the visualization screens necessary for the cyber common operational picture are identified and the criteria (response speed, user interface, object symbol, object size) are investigated. After that, the framework is designed by applying the identified and investigated items, and the visualization screens are implemented accordingly. Finally, among the criteria investigated by the visualization screen, an experiment is conducted on the response speed that cannot be recognized by a photograph. As a result, all the implemented visualization screens met the standard for response speed. Such research helps commanders and security officers to build a cyber common operational picture to prepare for cyber-attacks.

Development of Korean Joint Tactical Data Link System Based on CLIP (CLIP 기반의 한국형 합동전술데이터링크 체계 개발)

  • Kim, Seung-Chun;Lee, Hyung-Keun
    • Journal of IKEEE
    • /
    • v.15 no.1
    • /
    • pp.15-22
    • /
    • 2011
  • In order to performing the joint operation of Korean army efficiently, informations about surveillance, reconnaissance, and situation awareness need to be possessed jointly. In the first development phase (basis type) of the Korean joint tactical data link system (JTDLS-K), essential tactical information and recognized situation are owned among platforms in common by using existing wireless terminals. In the second development phase (completion type) of the JTDLS-K, a JTDLS which can perform network centric warfare (NCW) will be developed in due consideration of technology development of the basis type and common technology maturity degree. This is a joint battlefield system that can show fighting power simultaneous and polysynthetically through providing command and control messages effectively to each platform, which is participating in the joint and combined operations. In this paper, the development of JTDLS-K with a common data processor based on common link integration processing (CLIP) is described. From the test results of the system presented in this paper, it is demonstrated that quadrature phase shift keying (QPSK) signals can be applied to the system.

A Study on the Analysis Method of Technology Trend on Tactical Data Link Using Intellectual Property Information (지식재산 정보를 이용한 전술데이터링크 기술동향 분석방법 연구)

  • Noh, Giseop
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.539-544
    • /
    • 2021
  • The tactical data link is a military data network to improve the ability to recognize battlefield situations. The ROK military is promoting the tactical data link performance improvement programs. Tactical data link is essential to combine and integrate various platforms, sensor data, and command and control (C2) systems. Therefore, the research on related technical fields is required. However, the tactical data link has not disclosed detailed technical information due to the characteristics of military operation. In this paper, we propose a data-based automated analysis methodology using intellectual property information to understand the technology trend of tactical data link. In this paper, data related to intellectual property is automatically collected and pre-processed, and analyzed in terms of time series. In addition, the current status of each institution of patent technology information was generated, and the process of identifying key-researchers through network analysis was presented with providing results of our approach in this paper.

A Study on the Yun Seon-Do's Garden on Bogildo Island based on the Recognition of the Land Systems in the Joseon Dynasty (조선조 토지제도와 인식을 통해 본 보길도 윤선도 원림 조영 배경 연구)

  • Lee, Tae-Gyeom;Kim, Han-Bai
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.37 no.2
    • /
    • pp.1-10
    • /
    • 2019
  • Based on the land system of Joseon Dynasty and contemporary perception of land, this study analyzed the reason Yun seon-do entered Bogildo Island and a characteristic of Buyong-dong garden. According to this analysis, this study interpreted the purpose that Yun seon-do had built Buyong-dong garden at a socio-economic perspective. The land such as Sarlimchontack(山林川澤) is recognized as a commonland in the Joseon Dynasty. Except the reserved area(禁山), however, actions to make commonland private through Ib-an(立案) and protecting graves was frequent. Bogildo Island was a place difficult to build a private garden because the island had been appointed a reserved forest to protect pine trees. Right after Byungjahoran, Yun seon-do entered the island on the pretext of protecting forests, and built Buyong-dong garden. The island was easy to move to manage private farms as well as possessed abundant forest resources and resources that have economic value such as fish and salt. It indicates that, unlike his pretext, economic benefits have also been considered.

A Data-driven Classifier for Motion Detection of Soldiers on the Battlefield using Recurrent Architectures and Hyperparameter Optimization (순환 아키텍쳐 및 하이퍼파라미터 최적화를 이용한 데이터 기반 군사 동작 판별 알고리즘)

  • Joonho Kim;Geonju Chae;Jaemin Park;Kyeong-Won Park
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.1
    • /
    • pp.107-119
    • /
    • 2023
  • The technology that recognizes a soldier's motion and movement status has recently attracted large attention as a combination of wearable technology and artificial intelligence, which is expected to upend the paradigm of troop management. The accuracy of state determination should be maintained at a high-end level to make sure of the expected vital functions both in a training situation; an evaluation and solution provision for each individual's motion, and in a combat situation; overall enhancement in managing troops. However, when input data is given as a timer series or sequence, existing feedforward networks would show overt limitations in maximizing classification performance. Since human behavior data (3-axis accelerations and 3-axis angular velocities) handled for military motion recognition requires the process of analyzing its time-dependent characteristics, this study proposes a high-performance data-driven classifier which utilizes the long-short term memory to identify the order dependence of acquired data, learning to classify eight representative military operations (Sitting, Standing, Walking, Running, Ascending, Descending, Low Crawl, and High Crawl). Since the accuracy is highly dependent on a network's learning conditions and variables, manual adjustment may neither be cost-effective nor guarantee optimal results during learning. Therefore, in this study, we optimized hyperparameters using Bayesian optimization for maximized generalization performance. As a result, the final architecture could reduce the error rate by 62.56% compared to the existing network with a similar number of learnable parameters, with the final accuracy of 98.39% for various military operations.