• Title/Summary/Keyword: Combat Management System

Search Result 133, Processing Time 0.027 seconds

Transaction Mining for Fraud Detection in ERP Systems

  • Khan, Roheena;Corney, Malcolm;Clark, Andrew;Mohay, George
    • Industrial Engineering and Management Systems
    • /
    • v.9 no.2
    • /
    • pp.141-156
    • /
    • 2010
  • Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour, and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.

CNN and SVM-Based Personalized Clothing Recommendation System: Focused on Military Personnel (CNN 및 SVM 기반의 개인 맞춤형 피복추천 시스템: 군(軍) 장병 중심으로)

  • Park, GunWoo
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.347-353
    • /
    • 2023
  • Currently, soldiers enlisted in the military (Army) are receiving measurements (automatic, manual) of body parts and trying on sample clothing at boot training centers, and then receiving clothing in the desired size. Due to the low accuracy of the measured size during the measurement process, in the military, which uses a relatively more detailed sizing system than civilian casual clothes, the supplied clothes do not fit properly, so the frequency of changing the clothes is very frequent. In addition, there is a problem in that inventory is managed inefficiently by applying the measurement system based on the old generation body shape data collected more than a decade ago without reflecting the western-changed body type change of the MZ generation. That is, military uniforms of the necessary size are insufficient, and many unnecessary-sized military uniforms are in stock. Therefore, in order to reduce the frequency of clothing replacement and improve the efficiency of stock management, deep learning-based automatic measurement of body size, big data analysis, and machine learning-based "Personalized Combat Uniform Automatic Recommendation System for Enlisted Soldiers" is proposed.

A Study on the application method of UPS's Battery Safety for battleship Command and Fire Control System (지휘무장통제체계용 UPS 배터리의 안전성 확보방안 연구)

  • Park, Gun-Sang;Kim, Jae-Yun;Kim, Dong-Gyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.587-596
    • /
    • 2021
  • Naval battleships have systems to perform special purposes, such as the Command and Fire Control System (CFCS). Some of the this equipment should be equipped with an Uninterruptible Power System (UPS ) to ensure operational continuity and the backup of important data, even during unexpected power outages caused by problems with the ship's power generator. Heavy combat losses can occur if the equipment cannot satisfy the function. Therefore, it is important to design a stable UPS. The battery and Battery Management System (BMS) are two of the most important factors for designing a stable UPS. A power outage will be encountered if the battery and BMS are not stable. The customer will be exposed to abnormal situations, loss of important tactical data, and inability to operate some of the CFCS. As a result, an enhanced safety system should be designed. Thus, this study implemented and verified the improved system in terms of three methods, such as comparative analysis of the batteries, improvement about leakage current of the circuit, and tests of the aggressive environmental resistance to improve the UPS for CFCS.

Analysis of Network Influence Factor considering Social Network Analysis and C2 Time (소셜 네트워크 분석과 지휘통제시간을 고려한 네트워크 영향력 요소 분석)

  • Jeon, Jin-Tae;Park, Gun-Woo;Lee, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.257-266
    • /
    • 2011
  • Over the society the trial for several systems to be connected with Network has been continued to share information and to make it various. In accordance with such a change, the concept of military warfare conduction has been changing form platform centric warfare in separate combat system based on network centric warfare in network based. We have continuously made an effort that we try to get the goal with efficient system which is linked up with network, but such a study on that one in military system analysis is still slower than the study out of military until now. So this study is searching network influence factor by using military network with application of social network analysis method which is used broadly in the society and the science as well. At this time we search co-relationships between social network and the thing that we can analyse C2 time by effectiveness measurement means. By this study it has value of network influence factor identification for the growing network composition.

Research Trends of the Jellyfish Blooms (해파리 대량발생의 연구동향)

  • Chung, Mi-Hee;Youn, Seok-Hyun;Yoon, Won-Duk
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.17 no.1
    • /
    • pp.25-31
    • /
    • 2012
  • The frequency and abundance of jellyfish, presumably related with climate change, fisheries overexploitation, marine pollution including land reclamation and dyke construction, are increasing worldwide. This feature has attracted interest and concerns from general public and public officials, and government is seeking how the damages could be prevented or reduced down. Korean government, having recent huge blooms of jellyfish, engaged in reducing and/or countermeasuring jellyfish damages. Korean research themes include ecology and physiology of blooming jellyfish species, understanding of the blooming mechanism, and focus on the eradication of blooming jellyfish, without governmental integrative management plan. EU is undertaking scientific projects focused on understanding of the mechanism and control of jellyfish blooms, and establishment of an integrative management. In USA, government has established the code on jellyfish management for conserving and protecting the fish and shellfish resources and one of its department is specially assigned to monitor jellyfish appearance, undertake research, and prepare management plan. Japan also assigned a department and research institute for jellyfish research. Their main interest is to predict jellyfish drifting and mass bloom. Compared to Korea, USA, EU and Japan emphasize integrative management that includes ecological understanding, public education and outreaches, communication and control, if possible, of jellyfish blooms, based on scientific data. We suggest then, 1) establishment of an integrative scientific system consisting of policy and scientific experts to prepare inter-ministrial integrative management plan to effectively combat jellyfish blooms and to maximize the scientific result; 2) concept change from harmful to exploitable marine animal in policy making and research; and 3) active education and information service for people. We expect that these suggestions can be useful for jellyfish management and policy making on another harmful marine organisms.

Obligated Involuntary Officer's Employment Support Plan Research After Discharge (군(軍) 단기복무장교의 전역 후 취업지원 방안 연구)

  • Kim, Ji Deok
    • Convergence Security Journal
    • /
    • v.18 no.5_2
    • /
    • pp.11-19
    • /
    • 2018
  • Because Korean military promotes employment support policy which give priority to the middle service officer who served more than 5 but less than 10 years and long term service officer who served more than 10 years, the support policy for obligated involuntary officer is relatively deficient. To make matters worse, national youth unemploy ment makes obligated involuntary officers suffer from serious unemployment crisis after discharge. These problems have bad effect on gaining ROTC KAOCS cadets who constitute about 80% of first appointment officers and because they are mostly discharged after just taking a short service, it's time to find a measure to solve the problem. Thus, this study is investigated to improve competitive rate of entry of ROTC KAOCS for securing outstanding manpower by deducing MR about legislation and system which are related to employment support for obligated involuntary officers and suggesting stable job secure plan for employment support, supplement system, and after discharge, model way of career management during military service of an obligated involuntary officers who are suitable for qualificated men who are needed for a company. Also, it will lead to combat power development of the military consequently.

  • PDF

Nuclear Terrorism and Global Initiative to Combat Nuclear Terrorism(GICNT): Threats, Responses and Implications for Korea (핵테러리즘과 세계핵테러방지구상(GICNT): 위협, 대응 및 한국에 대한 함의)

  • Yoon, Tae-Young
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.29-58
    • /
    • 2011
  • Since 11 September 2001, warnings of risk in the nexus of terrorism and nuclear weapons and materials which poses one of the gravest threats to the international community have continued. The purpose of this study is to analyze the aim, principles, characteristics, activities, impediments to progress and developmental recommendation of the Global Initiative to Combat Nuclear Terrorism(GICNT). In addition, it suggests implications of the GICNT for the ROK policy. International community will need a comprehensive strategy with four key elements to accomplish the GICNT: (1) securing and reducing nuclear stockpiles around the world, (2) countering terrorist nuclear plots, (3) preventing and deterring state transfers of nuclear weapons or materials to terrorists, (4) interdicting nuclear smuggling. Moreover, other steps should be taken to build the needed sense of urgency, including: (1) analysis and assessment through joint threat briefing for real nuclear threat possibility, (2) nuclear terrorism exercises, (3) fast-paced nuclear security reviews, (4) realistic testing of nuclear security performance to defeat insider or outsider threats, (5) preparing shared database of threats and incidents. As for the ROK, main concerns are transfer of North Korea's nuclear weapons, materials and technology to international terror groups and attacks on nuclear facilities and uses of nuclear devices. As the 5th nuclear country, the ROK has strengthened systems of physical protection and nuclear counterterrorism based on the international conventions. In order to comprehensive and effective prevention of nuclear terrorism, the ROK has to strengthen nuclear detection instruments and mobile radiation monitoring system in airports, ports, road networks, and national critical infrastructures. Furthermore, it has to draw up effective crisis management manual and prepare nuclear counterterrorism exercises and operational postures. The fundamental key to the prevention, detection and response to nuclear terrorism which leads to catastrophic impacts is to establish not only domestic law, institution and systems, but also strengthen international cooperation.

  • PDF

Responses of nutrient uptake, carbohydrates and antioxidants against low temperature in plants (저온에 대한 식물의 양분흡수, 탄수화물 및 항산화 반응 특성)

  • Lee, Suyeon;Jung, Jungah;Sung, Jwakyung;Ha, Sangkeun;Lee, Deogbae;Kim, Taewan;Song, Beomheon
    • Korean Journal of Agricultural Science
    • /
    • v.41 no.2
    • /
    • pp.75-83
    • /
    • 2014
  • Recently, a quick drop of air temperature in plastic film houses by adverse weather conditions leads to the occurrence of low temperature damages to growing crops. Chilling injury, defined as a variety of growth restriction occurring below the optimal temperature, is one of environmental factors strongly affecting crop growth and yield. Low temperature causes the restricted evapotranspiration, reduced mineral uptake (P > K > $NO_3{^-}$), and an increase in electrolyte leakage such as K. Despite being different with plant species, an accumulation of soluble carbohydrates such as glucose, fructose, sucrose and starch under chilling condition is well known. A variety of environmental stresses are known to cause oxidative damage to plants either directly or indirectly by triggering an increased level of production of reactive oxygen species (ROS), and, to combat the oxidative damage, plants have the antioxidant defense systems comprising of enzymes, SOD, POD, CAT, GPX and APX, and non-enzymes, ascorbate, gluthathione, ${\alpha}$-tocopherol, phenolic compounds, carotenoid and flavonoids. The aim of this review is to provide basic information to build chilling-indicators and optimal nutrition management under adverse temperature conditions as broadly considering mineral uptake, carbohydrate metabolism and antioxidative defense system.

A Study on the Database Design in the MDO Environment (다분야 통합환경에서의 데이터베이스 설계 연구)

  • Hwang, Jin Yong;Jeong, Ju Yeong;Lee, Jae U;Byeon, Yeong Hwan
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.31 no.5
    • /
    • pp.25-36
    • /
    • 2003
  • Aircraft design pursues integrated design efforts by considering all design elements together. In the integrated design environment, it is crucial for the design data to be consistent, free of errorm, and most recent. Database design process consists of the analysis of the data which shall be stored and managed, the construction of the E-R Diagram, and the mapping of the database table. As a DBMS (DataBase Management System), Oracle 8i is employed to design and construct the database. The database design methodology is devised to apply for the several MDO(Multidisciplinary Design Optimization) techniques like MDF(MultiDisplinary Feasible), IDF(Individual Discipline Feasible), and CO(Collaborative Optimization). The defined process is demonstrated through a couple of design examples, including a simple numerical example and a UCAV(Unmanned Combat Aerial Vehicle) design optimization.

Classification of Traffic Classes for Application Services in Military Communication Networks (군 통신망 응용서비스를 위한 트래픽 클래스 분류 방법)

  • Choi, Geun-Kyung;Kim, Bo-Sung;Roh, Byeong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1C
    • /
    • pp.76-88
    • /
    • 2012
  • Traffic classification for application services in military communication networks is one of the core requirements to provide efficient resource management for NCW operations. Though several standards and organizations provided their own traffic classification methods, the methods have been mainly focused on commercial services, but not reflected military specifics. In addition, though various military application services have been emerged, some of those services have been classified into different traffic classes due to implicit criteria for the classification among organizations. In this paper, we propose a methodology to classify traffic classes and to determine delivery requirements for military application services based on various standards by DoD as well as several commercial standards based on Y.1541. The validation of the proposed methodology was carried out by comparing the results by proposed one with the traffic classification suggestions by existing commercial standards, DoD and FCS. We expect that the proposed methodology can contribute to achieve efficient operations of limited military network resources, since the proposed method can provide systematic and consistent way to assign traffic classes for new and existing military applications services.