• Title/Summary/Keyword: Defense Information Technology(IT)

Search Result 473, Processing Time 0.025 seconds

Optimal Control Of Two-Hop Routing In Dtns With Time-Varying Selfish Behavior

  • Wu, Yahui;Deng, Su;Huang, Hongbin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권9호
    • /
    • pp.2202-2217
    • /
    • 2012
  • The transmission opportunities between nodes in Delay Tolerant Network (DTNs) are uncertain, and routing algorithms in DTNs often need nodes serving as relays for others to carry and forward messages. Due to selfishness, nodes may ask the source to pay a certain reward, and the reward may be varying with time. Moreover, the reward that the source obtains from the destination may also be varying with time. For example, the sooner the destination gets the message, the more rewards the source may obtain. The goal of this paper is to explore efficient ways for the source to maximize its total reward in such complex applications when it uses the probabilistic two-hop routing policy. We first propose a theoretical framework, which can be used to evaluate the total reward that the source can obtain. Then based on the model, we prove that the optimal forwarding policy confirms to the threshold form by the Pontryagin's Maximum Principle. Simulations based on both synthetic and real motion traces show the accuracy of our theoretical framework. Furthermore, we demonstrate that the performance of the optimal forwarding policy with threshold form is better through extensive numerical results, which conforms to the result obtained by the Maximum Principle.

Robust Backup Path Selection in Overlay Routing with Bloom Filters

  • Zhou, Xiaolei;Guo, Deke;Chen, Tao;Luo, Xueshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권8호
    • /
    • pp.1890-1910
    • /
    • 2013
  • Routing overlay offers an ideal methodology to improve the end-to-end communication performance by deriving a backup path for any node pair. This paper focuses on a challenging issue of selecting a proper backup path to bypass the failures on the default path with high probability for any node pair. For existing backup path selection approaches, our trace-driven evaluation results demonstrate that the backup and default paths for any node pair overlap with high probability and hence usually fail simultaneously. Consequently, such approaches fail to derive a robust backup path that can take over in the presence of failure on the default path. In this paper, we propose a three-phase RBPS approach to identify a proper and robust backup path. It utilizes the traceroute probing approach to obtain the fine-grained topology information, and systematically employs the grid quorum system and the Bloom filter to reduce the resulting communication overhead. Two criteria, delay and fault-tolerant ability on average, of the backup path are proposed to evaluate the performance of our RBPS approach. Extensive trace-driven evaluations show that the fault-tolerant ability of the backup path can be improved by about 60%, while the delay gain ratio concentrated at 14% after replacing existing approaches with ours. Consequently, our approach can derive a more robust and available backup path for any node pair than existing approaches. This is more important than finding a backup path with the lowest delay compared to the default path for any node pair.

무기체계 연구개발사업에서 기술적 위험지표 적용 가능성 분석 (An Analysis of the Applicability of Technical Risk Index in the Weapons System Research & Development Projects)

  • 이선헌;김민준
    • 한국군사과학기술학회지
    • /
    • 제20권6호
    • /
    • pp.835-843
    • /
    • 2017
  • The Technology Readiness Assessment(TRA) has the advantage of identifying immature technologies in promoting weapon system research and development project. However, a more diverse set of information is required for the determination of phase shift and technical risk management for weapons system R&D projects. In this paper, we investigate the various indexes the various indexes proposed to overcome the limitations of the Technology Readiness Level(TRL) and analyze the possibility of applying to the actual weapons system R&D projects. Based on the analysis, it was possible to provide additional information that could not be presented in TRA using technical risk indexes other than TRL, confirming that it could be used for technical risk management for weapons system R&D projects.

국방 CALS를 위한 IWSDB 구축에 관한 연구 (The study on the construction of IWSDB for National Defense CALS)

  • 신선우;손해용;김철환
    • 한국전자거래학회지
    • /
    • 제1권1호
    • /
    • pp.93-116
    • /
    • 1996
  • This study aims to develop an approach to construct IWSDB for National Defense CALS. Along with the introduction of Korean version of CALS conception, it is essential to analyze the national defense system with a new information technology for the construction of IWSDB. A long-tenn goal of CALS is to construct fully Integrated Data Environment (IDE) and establish IWSDB for the application of CALS conception to the life cycle management of weapon system. IWSDB is a set of databases that contain digital data. It supports common interface of data objects and databases throughout the life cycle management of weapon system, including design, engineering, analysis, manufacturing, operation, and logistics. etc. The goal of this study is threefold. First, we propose a right direction for the establishment of Integrated Data Environment. For the integrated database technology, we use the five schema architecture and the distributed object oriented technology that will lead to the "share of data." Second, we present the most effective IWSDB architecture for defense CALS, which will provide the efficient data sharing by business process modeling. Third, we suggest that IWSDB should be constructed based on the process which is related to the acquisition and logistics of weapon system for the national defense, and at the same time it should be implemented with GITIS for government agencies and CITIS for the industries in order to obtain the efficient data sharing.

  • PDF

국방 기사 자동 분석 시스템 구축 방안 연구 (A Study on Automatic Analysis System of National Defense Articles)

  • 김현중;김우주
    • 한국군사과학기술학회지
    • /
    • 제21권1호
    • /
    • pp.86-93
    • /
    • 2018
  • Since media articles, which have a great influence on public opinion, are transmitted to the public through various media, it is very difficult to analyze them manually. There are many discussions on methods that can collect, process, and analyze documents in the academia, but this is mostly done in the areas related to politics and stocks, and national-defense articles are poorly researched. In this study, we will explain how to build an automatic analysis system of national defense articles that can collect information on defense articles automatically, and can process information quickly by using topic modeling with LDA, emotional analysis, and extraction-based text summarization.

위성 전군방공경보체계 QPSK 모뎀 설계 (QPSK Modem Design of Satellite Air-defence Warning System)

  • 김영훈
    • 한국군사과학기술학회지
    • /
    • 제18권6호
    • /
    • pp.755-761
    • /
    • 2015
  • Satellite Air-defence Warning System receives the aircraft/ballistic track information and air defense control command obtained from Master Control & Reporting Center (MCRC) and Air Missile Defence Cell (AMD Cell) Systems. It consists of terminal and control system to propagate track information and air defense control command control via the military satellite communications. In this paper, there were described track information, air defense control command, the frame structure of modem to transmit a voice information and modulation/demodulator design, network synchronization methods via the satellite network.

시뮬레이션 기반 육군전술지휘정보체계 웜 피해평가에 관한 연구 (A Study on Simulation-Based Worm Damage Assessment on ATCIS)

  • 김기환;김완주;이수진
    • 한국군사과학기술학회지
    • /
    • 제11권1호
    • /
    • pp.43-50
    • /
    • 2008
  • The army developed the ATCIS(Army Tactical Command Information System) for the battlefield information system with share the command control information through the realtime. The using the public key and the encryption equipment in the ATCIS is enough to the confidentiality, integrity. But, it is vulnerable about the availability with the zero day attack. In this paper, we implement the worm propagation simulation on the ATCIS infrastructure through the modelling on the ATCIS operation environment. We propose the countermeasures based on the results from the simulation.

DACUM 기법을 이용한 방위산업체 정보통신보안실무자 직무분석 (Job Analysis for IT Security Workers in Defense Industry through DACUM Process)

  • 우광제;송해덕
    • 융합보안논문지
    • /
    • 제14권4호
    • /
    • pp.73-84
    • /
    • 2014
  • 지식 정보화 사회가 심화되면서 정보보호에 대한 중요성이 날로 높아지고 있다. 최근 들어 개인정보와 핵심 산업기술 유출 사고가 늘어나면서 모든 산업분야는 보안대책을 강구하는데 안간힘을 쓰고 있다. 특히 방위산업은 국가 안전보장에 필요한 국방력을 구축하는 분야이므로 일반 산업분야보다 더 높은 수준의 보안대책이 요구된다. 방위산업체는 방위산업보안업무훈령에 따라 업체별 규모와 여건에 맞게 보안조직을 편성하고 보안실무자를 임명 운영하고 있다. 정보 통신의 발달로 대부분의 핵심정보와 기술이 정보통신 시스템이나 저장매체에 기록 관리되고 있는 환경 속에서 정보통신보안실무자의 임무와 역할이 매우 중요하다. 그럼에도 방위산업체 정보통신보안실무자들의 직무에 대한 체계적인 분석과 그들의 전문성 향상을 위한 교육과정 개발이 부족한 실정이다. 이에 본 연구에서는 대표적인 직무분석 기법인 DACUM을 활용해서 정보통신보안실무자들의 책무와 과업을 도출하였고, 설문조사를 통해서 도출된 과업에 대한 타당도와 신뢰도를 검증하였다. 본 연구의 결과는 방위산업체 정보통신보안 업무의 발전에 기여하고 관련 규정의 개정 및 교육과정 개발을 위한 기초자료로 활용될 수 있을 것이다.

스마트 국방혁신을 위한 미래 작전환경 분석의 이해와 군 적용방안에 대한 고찰 (A Study on the Understanding of the Analysis of the Future Operational Environment for Smart Defense Innovation and the Application of the ROK MND)

  • 김세용;김익현
    • 한국IT서비스학회지
    • /
    • 제20권1호
    • /
    • pp.55-65
    • /
    • 2021
  • For smart defense innovation, the key is to apply state-of-the-art technologies of the Fourth Industrial Revolution to national defense. In order to apply state-of-the-art technology to the defense sector, we need to apply and develop technologies to analyze and respond to uncertain future operational environments. To this end, our military is investing a lot of time and effort. To understand future operational environment analysis and to apply and develop our military, we explored the perspectives of operational environment analysis in major countries and studied specific cases of U.S. troops with systematic analysis functions. The U.S. Army has established a cooperative system to analyze future operational environment under the leadership of the Education Command and operates the organization organically. It also utilizes the collective intelligence of expert groups in various fields by utilizing the MSC, and it is time for the Korean military to take the lead in keeping with the era of transformation. To that end, the organization of the U.S. Education Command should be benchmarked and the Korean Future Operation Environment Analysis Organization should be established and operated. Through this study, we have developed an understanding of the future operational environment analysis system of the U.S. Army and presented a plan to apply the ROK MND.

S&T Text Mining을 이용한 국방 유망기술 식별에 관한 연구 (A Study on the Identifying Emerging Defense Technology using S&T Text Mining)

  • 이태봉;이춘주
    • 한국국방경영분석학회지
    • /
    • 제36권1호
    • /
    • pp.39-49
    • /
    • 2010
  • 본 연구에서는 과학기술 텍스트 마이닝을 이용하여 국방 유망기술을 식별하는 방법론을 제안하고 있다. 그동안 국가차원에서 NTIS와 DTiMS를 포함한 과학기술 관련 정보체계를 구축하는데 많은 노력을 기울여왔는데 과학기술 정보체계는 연구자와 정책입안자, 또는 실무자들이 기술적 변화를 분석하고 효율적인 업무진행, 지식공유, 전략개발, 또는 조직의 경쟁력을 높이기 위한 정책개발에 활용성이 크다. 본 연구에서는 INSPEC 데이터베이스에 과학기술 텍스트마이닝 기법을 적용하여 미래 무인전투기술에 대한 지식네트워크 구조와 국방 유망기술을 식별하는 과정을 예시함으로써 구축된 과학기술 정보체계를 이용한 미래 유망기술의 식별 방법론을 제시하였다.