• Title/Summary/Keyword: Defense White Paper

Search Result 13, Processing Time 0.028 seconds

The Trend and Implications of the Publication of China's Defense and Security White Papers (중국의 국방·안보백서 발간의 추이와 함의)

  • Kim, Kang-nyeong
    • Korea and Global Affairs
    • /
    • v.3 no.1
    • /
    • pp.39-76
    • /
    • 2019
  • This paper is to analyze the trend and implications of the publication of China's defense and security white papers. To this end the paper is composed of 5 chapters titled instruction; publication details and composition of China's defense and security white paper; the gist of the white paper on national defense and security during the Chinese president Xi Jinping era; the implications of Chinese white paper on national defense and security during the Chinese president Xi Jinping era; and conclusion. The Chinese Ministry of National Defense had published seven books every two years since 1998 to 2010. In 1995, the ministry published a white paper titled 'China's arms control and disarmament' for the first time. In 2013, it published a white paper titled 'The Diversified Employment of China's Armed Forces' and 'China's Military Strategy' in 2015. All have the common characteristic of being a propaganda policy reflecting China's strategic calculations. It seems that China has began to publish defense white papers in a proactive manner, due to the following factors: (1)pressure on China to demand military transparency from neighboring countries such as the United States; (2)the erosion of the 'China threat.' and (3)confidence in the achievement of China's military modernization. The 'active defensive strategy' and the 'strong defense strategy' of Si Jinping are implied in the words "China's dream is a dream of a powerful country and dream of a strong nation is essential to construct a strong nation." His these strategies have raised security concerns for neighboring countries. We need to maintain and reinforce strong ROK-US security cooperation, and hedging strategies to harmoniously promote ROK-China economic cooperation.

Perceptual Ad-Blocker Design For Adversarial Attack (적대적 공격에 견고한 Perceptual Ad-Blocker 기법)

  • Kim, Min-jae;Kim, Bo-min;Hur, Junbeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.871-879
    • /
    • 2020
  • Perceptual Ad-Blocking is a new advertising blocking technique that detects online advertising by using an artificial intelligence-based advertising image classification model. A recent study has shown that these Perceptual Ad-Blocking models are vulnerable to adversarial attacks using adversarial examples to add noise to images that cause them to be misclassified. In this paper, we prove that existing perceptual Ad-Blocking technique has a weakness for several adversarial example and that Defense-GAN and MagNet who performed well for MNIST dataset and CIFAR-10 dataset are good to advertising dataset. Through this, using Defense-GAN and MagNet techniques, it presents a robust new advertising image classification model for adversarial attacks. According to the results of experiments using various existing adversarial attack techniques, the techniques proposed in this paper were able to secure the accuracy and performance through the robust image classification techniques, and furthermore, they were able to defend a certain level against white-box attacks by attackers who knew the details of defense techniques.

Simple Identification Methods for Unknown Suspicious White Powders using Microfluidic-based Platform (미세유체 기반의 플랫폼을 이용한 미지의 백색가루 간이식별 탐지방안)

  • Park, Jae Woo;Song, Jiyoung;Na, Sang Cheol;Byun, Kisik;Jeon, Noo Li
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.6
    • /
    • pp.853-859
    • /
    • 2017
  • Terrorists always threats the global security with the possibility of using prohibited warfare, NBCs(Nuclear, Biological and Chemical Warfare). Compared to other prohibited warfares, most of biological warfare agents (BWAs) have no physical properties and time delays from spread to affect. Therefore the early detection is important to protect and decontaminate from BWAs. On the preliminary detection stage for suspicious material, most of detection kits only serve to know weather the BWAs exists or not. Due to this reason, simple field confirmation testing for suspicious substances have been used to identify materials which show negative result on detection kits. Considering the current Lab on a Chip(LOC) technologies, we suggest simple identification platform for unknown suspicious substances based on paper fluidics. We hope that our research will envision the future direction for the specific point-of-view for LOC technologies on detection strategy of BWAs.

Study on the White Noise effect Against Adversarial Attack for Deep Learning Model for Image Recognition (영상 인식을 위한 딥러닝 모델의 적대적 공격에 대한 백색 잡음 효과에 관한 연구)

  • Lee, Youngseok;Kim, Jongweon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.1
    • /
    • pp.27-35
    • /
    • 2022
  • In this paper we propose white noise adding method to prevent missclassification of deep learning system by adversarial attacks. The proposed method is that adding white noise to input image that is benign or adversarial example. The experimental results are showing that the proposed method is robustness to 3 adversarial attacks such as FGSM attack, BIN attack and CW attack. The recognition accuracies of Resnet model with 18, 34, 50 and 101 layers are enhanced when white noise is added to test data set while it does not affect to classification of benign test dataset. The proposed model is applicable to defense to adversarial attacks and replace to time- consuming and high expensive defense method against adversarial attacks such as adversarial training method and deep learning replacing method.

Implementation of the Distributed Telemetry System Based on Retransmission (재전송 기반의 분산 원격측정 시스템 구현)

  • Im, Sooyeol;Hwang, Chiho;Lee, Hwansuk;Ahn, Seongbok
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.6
    • /
    • pp.821-827
    • /
    • 2014
  • This paper considers a distributed telemetry system using retransmission algorithm with one master telemetry and two slave telemetries. The master telemetry merges data from each slave telemetry and own measured data. If there exist some errors in data from the slave telemetry, the master telemetry requests retransmission to corresponding slave telemetry. In this paper, we propose a retransmission algorithm applied to implementing the distributed telemetry system. Simulation results demonstrate that the retransmission improves the performance of the communication between the master and slave telemetries.

Cramer-Rao Lower Bound of Effective Carrier-to-noise Power Ratio Estimation for a GPS L1 C/A Signal under Band-limited White Noise Jamming Environments (대역제한 백색잡음 재밍환경에서 GPS L1 C/A 신호를 위한 유효 반송파 대 잡음 전력비 추정치의 CRLB)

  • Yoo, Seungsoo;Yeom, Dong-Jin;Jee, Gyu-In;Kim, Sun Yong
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.20 no.8
    • /
    • pp.890-894
    • /
    • 2014
  • In this paper, we derive the CRLB (Cramer-Rao Lower Bound) of effective carrier-to-noise power ratio ($C/N_0$) estimation for a GPS (Global Positioning System) L1 C/A (Coarse/Acquisition) signal under band-limited white noise jamming environments. The quality of a received GPS signal is commonly described in terms of its $C/N_0$, implying that the noise is white and thus can be described by scalar noise density. However, if some intentional interference is received to a victim GPS receiver, then the $C/N_0$ is no longer the efficacious performance indicator. The correct and straightforward measurement to analyze the receiving situation is the effective $C/N_0$. In this paper, we consider a band-limited white noise jamming whose bandwidth is 2MHz and is the same as one of the first null-to-null bandwidth of the GPS L1 C/A signal.

Characteristic Analysis of RGB-LED Backlight for Current and Temperature Variations (RGB형 LED Backlight의 전류 및 온도 변화에 따른 특성 분석)

  • Lim, S.H.;Lim, J.G.;Shin, H.B.;Chung, S.K.;Shin, M.J.;Sohn, S.G.
    • Proceedings of the KIPE Conference
    • /
    • 2007.07a
    • /
    • pp.244-246
    • /
    • 2007
  • The LCD backlight technique using light-emitting diode(LED) has been studied in the recent backlight market. The white light is need for LCD backlight and it is generally implemented by combining the RGB-LEDs to obtain the high brightness. However, RGB-LEDs have different color characteristics for the current and temperature variations, which results in the color shift problem. The color shift characteristics of RGB-LEDs for the current and temperature variations are investigated in this paper. This result can be used to control the color of backlight system using RGB-LEDs.

  • PDF

Efficient Process Control Through Research on Storage Lifetime of a White Smoke Hand Grenade, KM8 (저장수명 연구를 통한 백색 연막수류탄(KM8)의 공정관리 효율화)

  • Chang, Il-Ho;Hong, Suk-Hwan;Back, Seung-Jun;Son, Young-Kap
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.5
    • /
    • pp.888-896
    • /
    • 2011
  • A white smoke hand grenade, KM8 is used to make smoke screen in order to provide visual field interceptions or signals. The grenade fails when its time to emit smoke is longer than the specified emission time so that the smoke concentration becomes lighter. This paper considered failure in smoke emission time, and evaluated its storage lifetime. The main objective of this paper is to modify the present specification limits of smoke emission time for the efficient process control in manufacturing, through analyzing effect of its specification change on the storage lifetime, based on the lifetime evaluation results. Accelerated degradation test was performed and then failure in smoke emission time was reproduced from the test. And estimated storage lifetimes from the accelerated test results was compared to evaluated lifetimes of grenades using the ASRP data. Past process testing results of the grenade in manufacturing were analyzed in this paper. Then, each storage lifetime for the specifications, ${\pm}3$ and ${\pm}5$ in seconds, extended from the current specification in manufacturing were estimated using the past testing results, and compared to one another.

ESTIMATION OF NON-INTEGRAL AND INTEGRAL QUADRATIC FUNCTIONS IN LINEAR STOCHASTIC DIFFERENTIAL SYSTEMS

  • Song, IL Young;Shin, Vladimir;Choi, Won
    • Korean Journal of Mathematics
    • /
    • v.25 no.1
    • /
    • pp.45-60
    • /
    • 2017
  • This paper focuses on estimation of an non-integral quadratic function (NIQF) and integral quadratic function (IQF) of a random signal in dynamic system described by a linear stochastic differential equation. The quadratic form of an unobservable signal indicates useful information of a signal for control. The optimal (in mean square sense) and suboptimal estimates of NIQF and IQF represent a function of the Kalman estimate and its error covariance. The proposed estimation algorithms have a closed-form estimation procedure. The obtained estimates are studied in detail, including derivation of the exact formulas and differential equations for mean square errors. The results we demonstrate on practical example of a power of signal, and comparison analysis between optimal and suboptimal estimators is presented.

The Impact of Information-Centric Force Improvements on Deterrence of Invasion: A Game-Theoretic Analysis (정보중심 전력증강의 전쟁억제 효과: 게임이론적 분석)

  • Cho, Jea-Yeong;Kim, Seung-Kwon
    • Journal of the military operations research society of Korea
    • /
    • v.31 no.1
    • /
    • pp.1-13
    • /
    • 2005
  • Due to the rapid developments in information and computer technology, the warfare paradigm is being transformed into information-centric and knowledge-based warfare. This atmosphere may have significant impact on the ROK armed forces' Force Improvement Plans (FIP) which is documented in 'Defense White Paper 2004'. We focus here on the relationship of information-centric force and deterrence of invasion. Particularly, we are interested in understanding the level of information superiority that might be required to deter the invasion. In order to solve this problem, we employed two-sided, zero-sum strategic game to simulate the outcome with six hypothetical cases devised by varying the level of information superiority.