• 제목/요약/키워드: Defense Information Technology(IT)

Search Result 473, Processing Time 0.026 seconds

A Study on Sensor Collection Planning based on Target Scheduling and Deviation Correction for Strategic UAV Surveillance and Reconnaissance (전략급 무인기의 감시정찰을 위한 표적 스케줄링 및 편차 보정 기반 촬영계획 자동화 기술 연구)

  • Junghee Cho;Yunjeong Choi;Hayrim Lee;Soyoung Jeong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.2
    • /
    • pp.177-188
    • /
    • 2024
  • The strategic UAV for theater level ISR(Intelligence, Surveillance and Reconnaissance) mission typically has numerous ground targets over area of responsibility(AOR) or area of operation(AO). It is necessary to automatically incorporate these multitude of ground targets into mission planning process in order to collect ISR images before actual flight mission. In addition, weather information such as wind direction and/or velocity may have significant impacts on the qualities of collected sensor images, especially in SAR(Synthetic Aperture Radar) images. Thus weather factors in the operation altitude should also be considered in the mission planning stage. In this study, we propose a novel mission planning scheme based on target scheduling and deviation correction method incorporating weather factors.

OBSERVABILITY-IN-DEPTH: AN ESSENTIAL COMPLEMENT TO THE DEFENSE-IN-DEPTH SAFETY STRATEGY IN THE NUCLEAR INDUSTRY

  • Favaro, Francesca M.;Saleh, Joseph H.
    • Nuclear Engineering and Technology
    • /
    • v.46 no.6
    • /
    • pp.803-816
    • /
    • 2014
  • Defense-in-depth is a fundamental safety principle for the design and operation of nuclear power plants. Despite its general appeal, defense-in-depth is not without its drawbacks, which include its potential for concealing the occurrence of hazardous states in a system, and more generally rendering the latter more opaque for its operators and managers, thus resulting in safety blind spots. This in turn translates into a shrinking of the time window available for operators to identify an unfolding hazardous condition or situation and intervene to abate it. To prevent this drawback from materializing, we propose in this work a novel safety principle termed "observability-in-depth". We characterize it as the set of provisions technical, operational, and organizational designed to enable the monitoring and identification of emerging hazardous conditions and accident pathogens in real-time and over different time-scales. Observability-in-depth also requires the monitoring of conditions of all safety barriers that implement defense-in-depth; and in so doing it supports sensemaking of identified hazardous conditions, and the understanding of potential accident sequences that might follow (how they can propagate). Observability-in-depth is thus an information-centric principle, and its importance in accident prevention is in the value of the information it provides and actions or safety interventions it spurs. We examine several "event reports" from the U.S. Nuclear Regulatory Commission database, which illustrate specific instances of violation of the observability-in-depth safety principle and the consequences that followed (e.g., unmonitored releases and loss of containments). We also revisit the Three Mile Island accident in light of the proposed principle, and identify causes and consequences of the lack of observability-in-depth related to this accident sequence. We illustrate both the benefits of adopting the observability-in-depth safety principle and the adverse consequences when this principle is violated or not implemented. This work constitutes a first step in the development of the observability-in-depth safety principle, and we hope this effort invites other researchers and safety professionals to further explore and develop this principle and its implementation.

The Architecture Model for Defense Systems Test Works based on Systems Engineering (SE기반 무기체계 시험업무 아키텍처 모델 연구)

  • Taeheum Na;Dongeun Heo;Youngmin Kim;Jooyeoun Lee
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.2
    • /
    • pp.203-212
    • /
    • 2024
  • This paper describes the establishment of defense systems test works architecture model for the efficient operation of an expanded test organization and the provision of standardized test services after the integration of proving grounds in ADD. The system engineering vee model is applied to the defense system test works to define the project management model and the unit-test management model. In order to establish the defense systems test works architecture model, the process flow of test works, artifacts by life cycle, and interrelations between regulations and test works are explained, and Integrated Test Information System for implementation of architecture model is discussed. Through the defense systems test works architecture model presented in this study, it will contribute to quickly responding to the test requirements of complex and diverse defense systems, efficiently managing projects, and providing standardized test services.

A Study on the Satisfaction Level of the National Defense Electronic Procurement System Service by Applying the SERVQUAL Model (SERVQUAL 모형을 적용한 국방전자조달 서비스에 대한 만족도 분석)

  • Min, Wonbae;Kang, Seokjoong;Lee, Bumkoo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.2
    • /
    • pp.488-495
    • /
    • 2014
  • The national defense electronic procurement system is an information system supporting DAPA, services (Army, Navy and Air Force), and the procurement companies in the electronic bidding. It has contributed greatly to improving the efficiency of the national defense electronic procurement process by providing various information services based on inter-operation among the related parties. However the national defense electronic procurement system is expected to be upgraded to the next version in accord with rapidly evolving infrastructure based on high technology and increasing various communication channels. This paper investigates the satisfaction level of the system users and proposes directions for the next-generation procurement portal.

Efficient Parallel TLD on CPU-GPU Platform for Real-Time Tracking

  • Chen, Zhaoyun;Huang, Dafei;Luo, Lei;Wen, Mei;Zhang, Chunyuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.201-220
    • /
    • 2020
  • Trackers, especially long-term (LT) trackers, now have a more complex structure and more intensive computation for nowadays' endless pursuit of high accuracy and robustness. However, computing efficiency of LT trackers cannot meet the real-time requirement in various real application scenarios. Considering heterogeneous CPU-GPU platforms have been more popular than ever, it is a challenge to exploit the computing capacity of heterogeneous platform to improve the efficiency of LT trackers for real-time requirement. This paper focuses on TLD, which is the first LT tracking framework, and proposes an efficient parallel implementation based on OpenCL. In this paper, we firstly make an analysis of the TLD tracker and then optimize the computing intensive kernels, including Fern Feature Extraction, Fern Classification, NCC Calculation, Overlaps Calculation, Positive and Negative Samples Extraction. Experimental results demonstrate that our efficient parallel TLD tracker outperforms the original TLD, achieving the 3.92 speedup on CPU and GPU. Moreover, the parallel TLD tracker can run 52.9 frames per second and meet the real-time requirement.

CDN Scalability Improvement using a Moderate Peer-assisted Method

  • Shi, Peichang;Wang, Huaimin;Yin, Hao;Ding, Bo;Wang, Tianzuo;Wang, Miao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.3
    • /
    • pp.954-972
    • /
    • 2012
  • Content Delivery Networks (CDN) server loads that fluctuant necessitate CDN to improve its service scalability especially when the peak load exceeds its service capacity. The peer assisted scheme is widely used in improving CDN scalability. However, CDN operators do not want to lose profit by overusing it, which may lead to the CDN resource utilization reduced. Therefore, improving CDN scalability moderately and guarantying CDN resource utilization maximized is necessary. However, when and how to use the peer-assisted scheme to achieve such improvement remains a great challenge. In this paper, we propose a new method called Dynamic Moderate Peer-assisted Method (DMPM), which uses time series analysis to predict and decide when and how many server loads needs to offload. A novel peer-assisted mechanism based on the prediction designed, which can maximize the profit of the CDN operators without influencing scalability. Extensive evaluations based on an actual CDN load traces have shown the effectiveness of DMPM.

PC-SAN: Pretraining-Based Contextual Self-Attention Model for Topic Essay Generation

  • Lin, Fuqiang;Ma, Xingkong;Chen, Yaofeng;Zhou, Jiajun;Liu, Bo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.8
    • /
    • pp.3168-3186
    • /
    • 2020
  • Automatic topic essay generation (TEG) is a controllable text generation task that aims to generate informative, diverse, and topic-consistent essays based on multiple topics. To make the generated essays of high quality, a reasonable method should consider both diversity and topic-consistency. Another essential issue is the intrinsic link of the topics, which contributes to making the essays closely surround the semantics of provided topics. However, it remains challenging for TEG to fill the semantic gap between source topic words and target output, and a more powerful model is needed to capture the semantics of given topics. To this end, we propose a pretraining-based contextual self-attention (PC-SAN) model that is built upon the seq2seq framework. For the encoder of our model, we employ a dynamic weight sum of layers from BERT to fully utilize the semantics of topics, which is of great help to fill the gap and improve the quality of the generated essays. In the decoding phase, we also transform the target-side contextual history information into the query layers to alleviate the lack of context in typical self-attention networks (SANs). Experimental results on large-scale paragraph-level Chinese corpora verify that our model is capable of generating diverse, topic-consistent text and essentially makes improvements as compare to strong baselines. Furthermore, extensive analysis validates the effectiveness of contextual embeddings from BERT and contextual history information in SANs.

ROI Image Compression Method Using Eye Tracker for a Soldier (병사의 시선감지를 이용한 ROI 영상압축 방법)

  • Chang, HyeMin;Baek, JooHyun;Yang, DongWon;Choi, JoonSung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.3
    • /
    • pp.257-266
    • /
    • 2020
  • It is very important to share tactical information such as video, images, and text messages among soldiers for situational awareness. Under the wireless environment of the battlefield, the available bandwidth varies dynamically and is insufficient to transmit high quality images, so it is necessary to minimize the distortion of the area of interests such as targets. A natural operating method for soldiers is also required considering the difficulty in handling while moving. In this paper, we propose a natural ROI(region of interest) setting and image compression method for effective image sharing among soldiers. We verify the proposed method through prototype system design and implementation of eye gaze detection and ROI-based image compression.

A Study on the Development of Evaluation Model for Selecting a Standard for DITA using AHP (AHP를 이용한 국방정보기술표준 선정 평가 모델 개발에 관한 연구)

  • Kim, Ja-Hee;Kim, Woo-Je;Cho, Hyun-Ki;Lee, Eun-Young;Seo, Min-Woo
    • IE interfaces
    • /
    • v.25 no.1
    • /
    • pp.96-105
    • /
    • 2012
  • Recently, the interoperability has become more important to enhance the net-centric capabilities of the warfighter. DITA (Defense Information Technical stAndard) is the set of IT standards for improving interoperability, scalability, effectiveness, and efficiency. In this paper, we analyzed the standardizing process to derive the selection criteria and structurized the derived selection criteria using the KJ (Kawakita Jiro) method. Finally, we developed an evaluation model for selecting a standard for DITA using AHP (Analytic Hierarchy Process). As a result, we present eight selection criteria (maintainability, trend, stability, portability, effect of other standard, constraint of the network, and applicability to the systems). We also applied some examples that several IT standards to our selection model for validating the model. We expect our model to help to decide objectively whether the new standard can be listed in DITA.

Analysis of Laser-protection Performance of Asymmetric-phase-mask Wavefront-coding Imaging Systems

  • Yangliang, Li;Qing, Ye;Lei, Wang;Hao, Zhang;Yunlong, Wu;Xian'an, Dou;Xiaoquan, Sun
    • Current Optics and Photonics
    • /
    • v.7 no.1
    • /
    • pp.1-14
    • /
    • 2023
  • Wavefront-coding imaging can achieve high-quality imaging along with a wide range of defocus. In this paper, the anti-laser detection and damage performance of wavefront-coding imaging systems using different asymmetric phase masks are studied, through modeling and simulation. Based on FresnelKirchhoff diffraction theory, the laser-propagation model of the wavefront-coding imaging system is established. The model uses defocus distance rather than wave aberration to characterize the degree of defocus of an imaging system. Then, based on a given defocus range, an optimization method based on Fisher information is used to determine the optimal phase-mask parameters. Finally, the anti-laser detection and damage performance of asymmetric phase masks at different defocus distances and propagation distances are simulated and analyzed. When studying the influence of defocus distance, compared to conventional imaging, the maximum single-pixel receiving power and echo-detection receiving power of asymmetric phase masks are reduced by about one and two orders of magnitude respectively. When exploring the influence of propagation distance, the maximum single-pixel receiving power of asymmetric phase masks decreases by about one order of magnitude and remains stable, and the echodetection receiving power gradually decreases with increasing propagation distance, until it approaches zero.