• Title/Summary/Keyword: Defense IT

Search Result 3,796, Processing Time 0.027 seconds

An Ecosystem Model and Content Research of the Satellite Information Utilization Business (위성정보 활용 사업의 생태계 모델과 콘텐츠 연구)

  • Seungkuk Baik ;Jinhwa Roh;Hyounjoo Shim;Xuanning Zhu
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.5_4
    • /
    • pp.1075-1084
    • /
    • 2023
  • Satellite-derived data is collected by observing the Earth and is used in various fields such as national defense, natural disasters, location-based services, infrastructure, environment, energy, marine, and insurance. This study aims to present the virtuous cycle structure of the satellite information data industry and the business ecosystem model of the industry. As a research method, cases were collected and categorized from the following areas: literature, online, application, and content. The results show that the ecosystem model of the satellite information data industry provides an approach to content services in public and commercial areas, and develops various algorithmic technologies to facilitate content production and services at the level of complex general-purpose technologies. Second, in terms of content typology, satellite information data can be subdivided into monitoring content, urban space monitoring content, and satellite information content. Third, the consumption value of satellite content could be subdivided into informational value, environmental, social and governance (ESG) value, educational value, and content value. In order to expand the global content market, Korea will need to focus on creating an ecosystem for the satellite information industry and discovering differentiated content. It will also need to increase the popularization and accessibility of data to the general public and promote the Korean K-Satellite Information Data Industry ecosystem through government support, policy efforts, and policies such as establishing legal systems, increasing investment, and training human resources.

How Does A Leader's Public Diplomacy Enhance International Support? (지도자의 공공외교는 어떻게 국제협력을 증진하는가?)

  • Hwang, Won-June
    • Journal of Public Diplomacy
    • /
    • v.3 no.1
    • /
    • pp.21-42
    • /
    • 2023
  • Objective: To understand the contents and effects of public diplomacy by leaders, this paper throws out two questions: "To draw cooperation and support of international society in the middle of national crises, with what content do leaders conduct public diplomacy?" and "Through what mechanism, does leaders' public diplomacy promote cooperation and support of other countries?" Methods: To answer the research questions, this paper conducts a single case study with Ukrainian President Volodymyr Zelensky's public diplomacy in the Russia-Ukraine war in 2022. More specifically, the author collects text from Zelesky's Twitter and analyzes it in a descriptive manner. Results: When Russia invaded Ukraine in 2022, President Zelensky proactively utilized his SNS to communicate with people in other countries and thereby achieved the desired effect of public diplomacy. He has been delivering messages of 'appreciation of cooperation and support', 'situation of Ukraine', and 'congratulations or condolences', which could augment support, credibility, and audience cost. Conclusion: The effects of public diplomacy led to enhanced cooperation by alleviating problems within international cooperation and support. However, in the case of Ukraine, the patron's dilemma and commitment problem lasted, from which conducting public diplomacy has not been proven to be enough. The result of this paper provides lessons for the public diplomacy of the Republic of Korea in times of national crises in the future. In this regard, leaders should make efforts to promote the effectiveness of public diplomacy even in times of peace.

A triple band printed monopole antenna with a bent branch strips for WiFi / 5G (와이파이 및 5G용 굽은 가지 스트립을 가진 삼중대역 인쇄형 모노폴 안테나)

  • Min-Woo Kim;Dong-Gi Shin;Oh-Rim Ryu;Young-Soon Lee
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.6
    • /
    • pp.536-542
    • /
    • 2021
  • In this paper, we proposed a triple band printed monopole antenna with a bent branch strips for WiFi / 5G. An antenna structure in which bent strips for generating multiple resonance are attached in the form of branches was newly proposed based on a typical monopole strip vertically erected as a triple band antenna structure. The proposed antenna is designed on a FR-4 substrate with dielectric constant 4.3, thickness of 1.6 mm, and size of 28×40 mm2. The measured impedance bandwidth is 430 MHz (2.22~2.65 GHz) in the 2.4 GHz WLAN, 450 MHz (3.38~3.83 GHz) in the 3.5 GHz and 2390 MHz (4.95~7.34 GHz), In particular, it has been observed that antenna has a stable omnidirectional radiation patterns as well as gain of 1.537 dBi, 1.878 dBi and 2.337 dBi in the entire frequency band of interest.

Approaches to Applying Social Network Analysis to the Army's Information Sharing System: A Case Study (육군 정보공유체계에 사회관계망 분석을 적용하기 위한방안: 사례 연구)

  • GunWoo Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.597-603
    • /
    • 2023
  • The paradigm of military operations has evolved from platform-centric warfare to network-centric warfare and further to information-centric warfare, driven by advancements in information technology. In recent years, with the development of cutting-edge technologies such as big data, artificial intelligence, and the Internet of Things (IoT), military operations are transitioning towards knowledge-centric warfare (KCW), based on artificial intelligence. Consequently, the military places significant emphasis on integrating advanced information and communication technologies (ICT) to establish reliable C4I (Command, Control, Communication, Computer, Intelligence) systems. This research emphasizes the need to apply data mining techniques to analyze and evaluate various aspects of C4I systems, including enhancing combat capabilities, optimizing utilization in network-based environments, efficiently distributing information flow, facilitating smooth communication, and effectively implementing knowledge sharing. Data mining serves as a fundamental technology in modern big data analysis, and this study utilizes it to analyze real-world cases and propose practical strategies to maximize the efficiency of military command and control systems. The research outcomes are expected to provide valuable insights into the performance of C4I systems and reinforce knowledge-centric warfare in contemporary military operations.

Numerical simulation of flood water level in a small mountain stream considering cross-section blocking and riverbed changes - A case study of Shingwangcheon stream in Pohang before and after Typhoon Hinnamnor flood (단면 폐색과 하상 변화를 고려한 산지 중소하천의 홍수위 수치모의 - 태풍 힌남노 전후의 포항 신광천을 사례로 -)

  • Lee, Chanjoo;Jang, Eun-kyung;Ahn, Sunggi;Kang, Woochul
    • Journal of Korea Water Resources Association
    • /
    • v.56 no.12
    • /
    • pp.837-844
    • /
    • 2023
  • Small and medium-sized mountain rivers that flow through steep, confined valleys carry large amounts of coarse-grained sediment and woody debris during floods. It causes an increase in flood water level by aggrading the riverbed and the cross-section blockage due to driftwood accumulation during flooding. However, the existing flood level calculation in the river basic plan does not consider these changes. In this study, using the Typhoon Hinnamnor flood in September 2022 as an example, we performed numerical simulations using the HEC-RAS model, taking into account the blockage of a cross-section at the bridge and changes in riverbed elevation that occurred during floods, and analyzed the flood level to predict flood risk. This study's results show that flooding occurs if more than 30% of the cross-section is blocked. The rise of flood water levels corresponds to that of the riverbed due to sediment deposition. These results can be used as basic data to prevent and effectively manage flood damage and contribute to establishing flood defense measures that consider actual phenomena.

A Machine Learning-Based Encryption Behavior Cognitive Technique for Ransomware Detection (랜섬웨어 탐지를 위한 머신러닝 기반 암호화 행위 감지 기법)

  • Yoon-Cheol Hwang
    • Journal of Industrial Convergence
    • /
    • v.21 no.12
    • /
    • pp.55-62
    • /
    • 2023
  • Recent ransomware attacks employ various techniques and pathways, posing significant challenges in early detection and defense. Consequently, the scale of damage is continually growing. This paper introduces a machine learning-based approach for effective ransomware detection by focusing on file encryption and encryption patterns, which are pivotal functionalities utilized by ransomware. Ransomware is identified by analyzing password behavior and encryption patterns, making it possible to detect specific ransomware variants and new types of ransomware, thereby mitigating ransomware attacks effectively. The proposed machine learning-based encryption behavior detection technique extracts encryption and encryption pattern characteristics and trains them using a machine learning classifier. The final outcome is an ensemble of results from two classifiers. The classifier plays a key role in determining the presence or absence of ransomware, leading to enhanced accuracy. The proposed technique is implemented using the numpy, pandas, and Python's Scikit-Learn library. Evaluation indicators reveal an average accuracy of 94%, precision of 95%, recall rate of 93%, and an F1 score of 95%. These performance results validate the feasibility of ransomware detection through encryption behavior analysis, and further research is encouraged to enhance the technique for proactive ransomware detection.

A Study on the Information Protection Intention of Digital Healthcare Service Providers (디지털 헬스케어 서비스 제공자의 정보보호의도에 관한 연구)

  • Yang, Chang-Gyu
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.17 no.4
    • /
    • pp.163-172
    • /
    • 2022
  • This study investigates the IPI (Information Protection Intention) of DHS (Digital Healthcare Service) providers by introducing PMT (Protection Motivation Theory). This study examines the effects of protection motivation, such as threat appraisal and coping appraisal, on IPI, such as ICI(Induction Control Intention) and SDI(Self Defense Intention). The research model, based on the PMT, adopted severity, vulnerability, reaction efficacy and self-efficacy as independent variables. The research model was validated through quantitative research, a survey of 222 DHS providers in South Korea, using structural equation modeling. The results show that (1) a clear awareness of the consequences of security threats increases the understanding of DHS providers on the severity of closure of healthcare information, and thus may decreases abuse of DHS by providers; (2) user confidence and satisfaction on the security system may make them be confident that they can handle the closure of healthcare information by themselves; and (3) although DHS providers are realizing the consequences of closure of healthcare information, they think that they are unlikely to encounter such situations. As a result of this study, venture companies that provide DHS need to provide contents that can continuously increase providers' security level in order to increase providers' information protection intention. It suggests that IPI is important through trust of healthcare service providers.

Use of Imaging and Biopsy in Prostate Cancer Diagnosis: A Survey From the Asian Prostate Imaging Working Group

  • Li-Jen Wang;Masahiro Jinzaki;Cher Heng Tan;Young Taik Oh;Hiroshi Shinmoto;Chau Hung Lee;Nayana U. Patel;Silvia D. Chang;Antonio C. Westphalen;Chan Kyo Kim
    • Korean Journal of Radiology
    • /
    • v.24 no.11
    • /
    • pp.1102-1113
    • /
    • 2023
  • Objective: To elucidate the use of radiological studies, including nuclear medicine, and biopsy for the diagnosis and staging of prostate cancer (PCA) in clinical practice and understand the current status of PCA in Asian countries via an international survey. Materials and Methods: The Asian Prostate Imaging Working Group designed a survey questionnaire with four domains focused on prostate magnetic resonance imaging (MRI), other prostate imaging, prostate biopsy, and PCA backgrounds. The questionnaire was sent to 111 members of professional affiliations in Korea, Japan, Singapore, and Taiwan who were representatives of their working hospitals, and their responses were analyzed. Results: This survey had a response rate of 97.3% (108/111). The rates of using 3T scanners, antispasmodic agents, laxative drugs, and prostate imaging-reporting and data system reporting for prostate MRI were 21.6%-78.9%, 22.2%-84.2%, 2.3%-26.3%, and 59.5%-100%, respectively. Respondents reported using the highest b-values of 800-2000 sec/mm2 and fields of view of 9-30 cm. The prostate MRI examinations per month ranged from 1 to 600, and they were most commonly indicated for biopsy-naïve patients suspected of PCA in Japan and Singapore and staging of proven PCA in Korea and Taiwan. The most commonly used radiotracers for prostate positron emission tomography are prostate-specific membrane antigen in Singapore and fluorodeoxyglucose in three other countries. The most common timing for prostate MRI was before biopsy (29.9%). Prostate-targeted biopsies were performed in 63.8% of hospitals, usually by MRI-ultrasound fusion approach. The most common presentation was localized PCA in all four countries, and it was usually treated with radical prostatectomy. Conclusion: This survey showed the diverse technical details and the availability of imaging and biopsy in the evaluation of PCA. This suggests the need for an educational program for Asian radiologists to promote standardized evidence-based imaging approaches for the diagnosis and staging of PCA.

Characteristics of source localization with horizontal line array using frequency-difference autoproduct in the East Sea environment (동해 환경에서 차주파수 곱 및 수평선배열을 이용한 음원 위치추정 특성)

  • Joung-Soo Park;Jungyong Park;Su-Uk Son;Ho Seuk Bae;Keun-Wha Lee
    • The Journal of the Acoustical Society of Korea
    • /
    • v.43 no.1
    • /
    • pp.29-38
    • /
    • 2024
  • The Matched Field Processing (MFP) is an estimation method for a source range and depth based on the prediction of sound propagation. However, as the frequency increases, the prediction inaccuracy of sound propagation increases, making it difficult to estimate the source position. Recently proposed, the Frequency-Difference Matched Field Processing (FD-MFP) is known to be robust even if there is a mismatch by applying a frequency-difference autoproduct extracted from the auto-correlation of a high frequency signal. In this paper, in order to evaluate the performance of the FD-MFP using a horizontal line array, simulations were conducted in the environment of the East Sea of Korea. In the area of Bottom Bounce (BB) and Convergence Zone (CZ) where detection of a sound source is possible at a long range, and the results of localization were analyzed. According to the the FD-MFP simulations of horizontal line array, the accuracy of localization is similar or degraded compared to the conventional MFP due to diffracted field and mismatch of sound speed. There was no clear result from the simulations conforming that the FD-MFP was more robust to mismatch than the conventional MFP.

Security Stress Management Plan for Military Soldiers (군 장병의 보안 스트레스 관리방안)

  • Lee Tae Bok
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.61-67
    • /
    • 2024
  • Soldiers serving in military units and institutions are subject to strict security policies and technologies because they handle sensitive and confidential information related to national security, so they are likely to experience security stress. The purpose of this study is to recognize the need to manage the security stress of military personnel and to suggest management measures. To this end, a literature study was conducted on 12 KCI(Korean Journal Citation Index) journals dealing with security stress. Since 2016, research on security stress has been conducted mainly through empirical analysis through surveys. Studies related to security stress were divided into studies dealing with factors that affect stress, the relationship between security stress and security compliance intentions, and factors that reduce security stress. In particular, it was confirmed that factors such as organizational justice, organizational technical support, and security feedback can alleviate security stress. Next, by applying the results of this literature study to the defense security environment, we presented security stress management measures for military personnel in terms of improving security-related organizational justice awareness, technical support, and security feedback. The significance of this study is that we recognized the need to manage military personnel's security stress and reviewed practical measures related to this.