• Title/Summary/Keyword: ATCIS

Search Result 13, Processing Time 0.019 seconds

National Defense Domain Ontology Development Using Mixed Ontology Building Methodology (MOBM) (혼합형 온톨로지 구축방법론을 이용한 국방온톨로지 구축)

  • Ra, Minyoung;Yoo, Donghee;No, Sungchun;Shin, Jinhee;Han, Changhee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.279-282
    • /
    • 2012
  • 본 연구에서는 혼합형 온톨로지 구축방법론을 이용하여 ATCIS 체계에 활용 가능한 국방온톨로지의 구축 과정을 보여주고자 한다. 이를 위해, 실제 ATCIS의 데이터베이스 정보들을 활용하였고 해당 방법론이 ATCIS 체계에 적용될 때 추가적으로 고려해야 할 사항들을 함께 분석하였다. 이러한 연구 결과는 향후 보다 실용적인 국방온톨로지 구축을 위한 기반 자료로 활용될 것으로 기대된다.

A Study on the Application of the Cyber Threat Management System to the Future C4I System Based on Big Data/Cloud (빅데이터/클라우드 기반 미래 C4I체계 사이버위협 관리체계 적용 방안 연구)

  • Park, Sangjun;Kang, Jungho
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.27-34
    • /
    • 2020
  • Recently, the fourth industrial revolution technology has not only changed everyday life greatly through technological development, but has also become a major keyword in the establishment of defense policy. In particular, Internet of Things, cloud, big data, mobile and cybersecurity technologies, called ICBMS, were selected as core leading technologies in defense information policy along with artificial intelligence. Amid the growing importance of the fourth industrial revolution technology, research is being carried out to develop the C4I system, which is currently operated separately by the Joint Chiefs of Staff and each military, including the KJCCS, ATCIS, KNCCS and AFCCS, into an integrated system in preparation for future warfare. This is to solve the problem of reduced interoperability for joint operations, such as information exchange, by operating the C4I system for each domain. In addition, systems such as the establishment of an integrated C4I system and the U.S. military's Risk Management Framework (RMF) are essential for efficient control and safe operation of weapons systems as they are being developed into super-connected and super-intelligent systems. Therefore, in this paper, the intelligent cyber threat detection, management of users' access to information, and intelligent management and visualization of cyber threat are presented in the future C4I system based on big data/cloud.

A Research on Quality Improvement of Software-based Video Teleconferencing on the Tactical Communication Networks Less Than 1Mbps (1Mbps 이하 전술통신망에서의 소프트웨어 방식 화상회의 품질향상 연구)

  • Kim, Gwon-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1C
    • /
    • pp.63-75
    • /
    • 2012
  • This paper researched the operation methods of software video teleconferencing on the tactical communication networks under 1Mbps. The tactical communication networks have limited bandwidths, frequent data losses and transmission delays due to the unstable networks. In addition, the bandwidth for video teleconferencing has to be much smaller since the Army Tactical Command Information System(ATCIS) has priority of using the bandwidth. This paper analyzed such restrictions of tactical communication networks, presented some methods to improve the quality of the software video teleconferencing on the tactical communication networks and their actual experiments as well. It is applied in the first place to re-transmit the lost packets and to reduce the image size for the data traffic. Nothing is better for the video teleconferencing than to provide the bandwidth enough for every user. However, on the tactical communication networks with the limited bandwidth, video teleconferencing can be improved by optimizing the compression rate of image data, the number of image frames, the audio codec and the usage of audio compensation data.