• Title/Summary/Keyword: Defense Technical Information

Search Result 92, Processing Time 0.033 seconds

A Graphical User Interface Design for Surveillance and Security Robot (감시경계 로봇의 그래픽 사용자 인터페이스 설계)

  • Choi, Duck-Kyu;Lee, Chun-Woo;Lee, Choonjoo
    • The Journal of Korea Robotics Society
    • /
    • v.10 no.1
    • /
    • pp.24-32
    • /
    • 2015
  • This paper introduces a graphical user interface design that is aimed to apply to the surveillance and security robot, which is the pilot program for the army unmanned light combat vehicle. It is essential to consider the activities of robot users under the changing security environment in order to design the efficient graphical user interface between user and robot to accomplish the designated mission. The proposed design approach firstly identifies the user activities to accomplish the mission in the standardized scenarios of military surveillance and security operation and then develops the hierarchy of the interface elements that are required to execute the tasks in the surveillance and security scenarios. The developed graphical user interface includes input control component, navigation component, information display component, and accordion and verified by the potential users from the various skilled levels with the military background. The assessment said that the newly developed user interface includes all the critical elements to execute the mission and is simpler and more intuitive compared to the legacy interface design that was more focused on the technical and functional information and informative to the system developing engineers rather than field users.

The Major Common Technology Field Analysis of Domestic Mobile Carriers based on Patent Information Data (특허 자료 정보 기반 국내 이동통신 사업자 주요 공통 기술 분야 분석)

  • Kim, Jang-Eun;Cho, Yu-Seup;Kim, Young-Rae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.5
    • /
    • pp.723-737
    • /
    • 2017
  • In order to decide the national technical standards policy for national policy/market economy activities, the people in charge commonly make policy decisions based on the current technology level/concentration/utilization by means of major common technology field analysis using patent data. One possible source of such patent data is the domestic mobile carriers through the Korea Intellectual Property Rights Information System (KIPRIS) of the Korean Intellectual Property Office (KIPO). Using this system, we collected 20,294 patents and 152 International Patent Classification (IPC) types and confirmed KTs (9,738 cases / 47.98%), which perform relatively high technology retention activities compared to other mobile carriers through the KIPRIS of KIPO. Based on these data, we performed three analyses (SNA, PCA, ARIMA) and extracted 30 IPC types from the SNA and 4 IPC types from the PCA. Based on the above analysis results, we confirmed that 4 IPC (H04W, H04B, G06Q, H04L) types are the major common technology field of the domestic mobile carriers. Finally, the number of 4 IPC (H04W, H04B, G06Q, H04L) forecast averages of the ARIMA forecast result is lower than the number of existing time series patent data averages.

A Study on Tools to Develop Electronic Documents (전자문헌 개발도구에 관한 고찰 - SGML, HTML과 PDF를 중심으로 -)

  • Kim, Yong;NamKoong, Hwang
    • Journal of Information Management
    • /
    • v.29 no.1
    • /
    • pp.1-19
    • /
    • 1998
  • With development in computing and networking technologies, national supports and attention for building digital library, which is to overcome the limits of time and location in using information resources, is increasing. To accomplish the main goal of digital library that is to freely share and transfer information on network, the importance of standardization in developing electronic document is increasing. Now several tools to develop electronic document, which will be used in digital library, are developed for electronic document used on WWW. But none of them has absolute advantages to other formats. Those tools, that is, have comparative advantages and disadvantages for making electronic documents. Through reviewing features and analyzing comparative advantage and disadvantage of SGML, HTML, and PDF, which will be used to develop electronic documents in digital libraries, this study focuses on their comparative advantages and disadvantages. With doing it, this study propose relevant type of electronic document formats to the types of information resources.

  • PDF

A Study on Management Strategy of Special Libraries in Digital Environment : on the Basis of Special Libraries in the field of Science and Technology (디지털 환경에서의 전문도서관 경영전략수립에 관한 연구 : 과학기술분야 전문도서관을 중심으로)

  • Hwang, Jae-Young;Lee, Eung-Bong
    • Journal of Information Management
    • /
    • v.37 no.3
    • /
    • pp.99-115
    • /
    • 2006
  • The purpose of this study is to build new management strategy of special libraries in the field of science and technologies. Though information service of digital libraries were developed very much due to IT technologies, management condition of special libraries is getting more worse. Immediate cause of this problem is absence of management strategies which were veiled by IT panacea. In order to overcome this problem, this study looks into the internal and external environment change which are surrounded by special libraries. And also examined procedures and method of environment analysis which is needed to build management strategies. As the result of research, this study analyze internal and external environment by SWOT analysis method, and finally propose new management strategies.

A Study on the Interrelationship between DISC Personality Types and Cyber Security Threats : Focusing on the Spear Phishing Attacks (DISC 성격 유형과 사이버 보안 위협간의 상호 연관성에 관한 연구 : 스피어피싱 공격 사례를 중심으로)

  • Kim, Mookjung;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.215-223
    • /
    • 2019
  • The recent trend of cyber attack threat is mainly APT (Advanced Persistent Threat) attack. This attack is a combination of hacking techniques to try to steal important information assets of a corporation or individual, and social engineering hacking techniques aimed at human psychological factors. Spear phishing attacks, one of the most commonly used APT hacking techniques, are known to be easy to use and powerful hacking techniques, with more than 90% of the attacks being a key component of APT hacking attacks. The existing research for cyber security threat defense is mainly focused on the technical and policy aspects. However, in order to preemptively respond to intelligent hacking attacks, it is necessary to study different aspects from the viewpoint of social engineering. In this study, we analyze the correlation between human personality type (DISC) and cyber security threats, focusing on spear phishing attacks, and present countermeasures against security threats from a new perspective breaking existing frameworks.

The Mass Production Weapon System Environmental Stress-Screening Test Design Method based on Cost-effective-Optimization (비용 효과도 최적화 기반 양산 무기체계 환경 부하 선별 시험 설계 방법)

  • Kim, Jangeun
    • Journal of Applied Reliability
    • /
    • v.18 no.3
    • /
    • pp.229-239
    • /
    • 2018
  • Purpose: There is a difficulty in Environmental Stress Screening (ESS) test design for weapon system's electrical/electronic components/products in small and medium-sized enterprises. To overcome this difficulty, I propose an easy ESS test design approach algorithm that is optimized with only one environment tolerance design information parameter (${\Delta}T$). Methods: To propose the mass production weapon system ESS test design for cost-effective optimization, I define an optimum cost-effective mathematical model ESS test algorithm model based on modified MIL-HDBK-344, MIL-HDBK-2164 and DTIC Technical Report 2477. Results: I clearly confirmed and obtained the quantitative data of ESS effectiveness and cost optimization along our ESS test design algorithm through the practical case. I will expect that proposed ESS test method is used for ESS process improvement activity and cost cutting of mass production weapon system manufacturing cost in small and medium-sized enterprises. Conclusion: In order to compare the effectiveness of the proposed algorithm, I compared the effectiveness of the existing ESS test and the proposed algorithm ESS test based on the existing weapon system circuit card assembly for signal processing. As a result of the comparison, it was confirmed that the test time was reduced from 573.0 minutes to 517.2minutes (9.74% less than existing test time).

The Study on analysis methodology of optimal performance and quantity for Mission-Based drones (임무 기반 드론의 최적성능 및 소요량 분석 방법론 연구)

  • Ha, Young-Seok
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.231-236
    • /
    • 2020
  • This paper addresses the analysis method about optimal performance and required quantity for Mission-Based drones. In the case of drones, although scientific verification of operational performance and quantity of demanded, such as total flight time, total operation time, and appropriate required quantity, is required depending on the operation concept, there is no methodology for analyzing them systematically. That is the reason this research was carried out. Through the suggestion and study about Mission-Based six step analysis method and, this study can present the optimal ROC (Required Operational Capability) and the required quantity based on the operational concept of drones, and technical and economic effects were suggested.

Analysis of Improving Requirement on Military Security Regulations for Future Command Control System (미래 지휘통제체계를 위한 보안 규정 개선 요구사항 분석)

  • Kang, Jiwon;Moon, Jae Woong;Lee, Sang Hoon
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.69-75
    • /
    • 2020
  • The command control system, like the human brain and nervous system, is a linker that connects the Precision Guided Missile(PGR) in information surveillance and reconnaissance (ISR) and is the center of combat power. In establishing the future command and control system, the ROK military should consider not only technical but also institutional issues. The US Department of Defense establishes security policies, refines them, and organizes them into architectural documents prior to the development of the command and control system. This study examines the security architecture applied to the US military command control system and analyzes the current ROK military-related policies (regulations) to identify security requirements for the future control system. By grouping the identified security requirements, this study identifies and presents field-specific enhancements to existing security regulations.

Measuring the Degree of Content Immersion in a Non-experimental Environment Using a Portable EEG Device

  • Keum, Nam-Ho;Lee, Taek;Lee, Jung-Been;In, Hoh Peter
    • Journal of Information Processing Systems
    • /
    • v.14 no.4
    • /
    • pp.1049-1061
    • /
    • 2018
  • As mobile devices such as smartphones and tablet PCs become more popular, users are becoming accustomed to consuming a massive amount of multimedia content every day without time or space limitations. From the industry, the need for user satisfaction investigation has consequently emerged. Conventional methods to investigate user satisfaction usually employ user feedback surveys or interviews, which are considered manual, subjective, and inefficient. Therefore, the authors focus on a more objective method of investigating users' brainwaves to measure how much they enjoy their content. Particularly for multimedia content, it is natural that users will be immersed in the played content if they are satisfied with it. In this paper, the authors propose a method of using a portable and dry electroencephalogram (EEG) sensor device to overcome the limitations of the existing conventional methods and to further advance existing EEG-based studies. The proposed method uses a portable EEG sensor device that has a small, dry (i.e., not wet or adhesive), and simple sensor using a single channel, because the authors assume mobile device environments where users consider the features of portability and usability to be important. This paper presents how to measure attention, gauge and compute a score of user's content immersion level after addressing some technical details related to adopting the portable EEG sensor device. Lastly, via an experiment, the authors verified a meaningful correlation between the computed scores and the actual user satisfaction scores.

Security Stress Management Plan for Military Soldiers (군 장병의 보안 스트레스 관리방안)

  • Lee Tae Bok
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.61-67
    • /
    • 2024
  • Soldiers serving in military units and institutions are subject to strict security policies and technologies because they handle sensitive and confidential information related to national security, so they are likely to experience security stress. The purpose of this study is to recognize the need to manage the security stress of military personnel and to suggest management measures. To this end, a literature study was conducted on 12 KCI(Korean Journal Citation Index) journals dealing with security stress. Since 2016, research on security stress has been conducted mainly through empirical analysis through surveys. Studies related to security stress were divided into studies dealing with factors that affect stress, the relationship between security stress and security compliance intentions, and factors that reduce security stress. In particular, it was confirmed that factors such as organizational justice, organizational technical support, and security feedback can alleviate security stress. Next, by applying the results of this literature study to the defense security environment, we presented security stress management measures for military personnel in terms of improving security-related organizational justice awareness, technical support, and security feedback. The significance of this study is that we recognized the need to manage military personnel's security stress and reviewed practical measures related to this.