• Title/Summary/Keyword: Defense data

Search Result 1,769, Processing Time 0.025 seconds

Prediction of Vertical Sea Water Temperature Profile in the East Sea Based on Machine Learning and XBT Data

  • Kim, Young-Joo;Lee, Soo-Jin;Kim, Young-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.11
    • /
    • pp.47-55
    • /
    • 2022
  • Recently, researches on the prediction of sea water temperature using artificial intelligence models has been actively conducted in Korea. However, most researches in the sea around the Korean peninsula mainly focus on predicting sea surface temperatures. Unlike previous researches, this research predicted the vertical sea water temperature profile of the East Sea, which is very important in submarine operations and anti-submarine warfare, using XBT(eXpendable Bathythermograph) data and machine learning models(RandomForest, XGBoost, LightGBM). The model was trained using XBT data measured from sea surface to depth of 200m in a specific area of the East Sea, and the prediction accuracy was evaluated through MAE(Mean Absolute Error) and vertical sea water temperature profile graphs.

On the Design of a Big Data based Real-Time Network Traffic Analysis Platform (빅데이터 기반의 실시간 네트워크 트래픽 분석 플랫폼 설계)

  • Lee, Donghwan;Park, Jeong Chan;Yu, Changon;Yun, Hosang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.721-728
    • /
    • 2013
  • Big data is one of the most spotlighted technological trends in these days, enabling new methods to handle huge volume of complicated data for a broad range of applications. Real-time network traffic analysis essentially deals with big data, which is comprised of different types of log data from various sensors. To tackle this problem, in this paper, we devise a big data based platform, RENTAP, to detect and analyse malicious network traffic. Focused on military network environment such as closed network for C4I systems, leading big data based solutions are evaluated to verify which combination of the solutions is the best design for network traffic analysis platform. Based on the selected solutions, we provide detailed functional design of the suggested platform.

QoS Support in the Air Defense Alternative System (방공작전 예비체계의 QoS 지원)

  • Sim, Dong-Sub;Lee, Young-Ran;Kim, Ki-Hyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.5
    • /
    • pp.903-909
    • /
    • 2010
  • ADAS is the air defense control system performing air surveillance and identification of ROK and near air. This system is self-developed by Air Force, currently operated successfully as the alternative system of MCRC. ADAS processes converting and combining transferred the real time radar data detected by radars. additionally, it displays significant radar data as producing in tracks. Then, it uses the message queue for IPC(Inter Process Communication). the various tactical data processed in the server is ultimately send to the network management process through the message queue for transmitting to the weapon director console. the weapon director receives this transmitted tactical data through the console to execute air defense operations. However, there is a problem that data packet is delayed or lost since the weapon Director does not receive as the amount of tactical data from the server overflowed with air tracks and missions increased. This paper improved the algorism to display and transmit the various tactical data processed from ADAS server to numbers of the weapon director console in the real time without any delay or lost. Improved the algorism, established at exercise, the development server in the real operation network and the weapon director console, is proved by comparing the number of sending tactical data packets in the server and receiving packets in the weapon director.

Efficient Mission Data Transmission with Sampling-Based Optimization in MIL-STD-1553B (MIL-STD-1553B 통신에서 샘플링 기반 최적화 기법을 이용한 효율적 임무 자료 전송)

  • Lee, Heoncheol;Kim, Kipyo;Kwon, Yongsung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.3
    • /
    • pp.370-378
    • /
    • 2018
  • The mission data in missile systems should be quickly and reliably transmitted from a mission transmission device to a guidance control unit. The MIL-STD-1553B is one of the reliable communication standards, but its bit rate is generally limited to 1Mbps due to the intrinsic properties of its electrical design. Therefore, the bus controller needs to be optimized to efficiently transmit the mission data on the inevitably limited bit rate. This paper proposes an analytical approach based on sampling-based optimization methods to maximize the data throughput without data loss. The proposed approach was evaluated in the simulations with the data transmission model for the MIL-STD-1553B communication system. The results of the proposed methods were applied to a real-time system and showed that the proposed method was successfully performed.

Study of the Bomb Hit Indication of Moving Target Using Weapon Data Link Message (무장데이터링크 메시지를 이용한 기동표적 타격평가 연구)

  • Baek, Inhye;Woo, Sang Hyo;Kim, Ki Bum
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.2
    • /
    • pp.187-196
    • /
    • 2021
  • The Network-Centric warfare over weapon data link networks has been developed for the recent decade. Since the US navy had begun to develop tactical digital information chain, it has gradually transformed into weapon data link technology. As data link network system and its protocol have been advanced into high-technology, focusing and targeting on moving targets become possible in net-enabled environments. However, it is difficult to identify the primary information from numerous battlefields and understanding approaches to damage a target in a timely manner. In this paper, to better understand the targeting assessment, we suggest a specific solution: Bomb Hit Indication(BHI) using information in weapon data link messages. In order to prove our suggestion, we implement the BHI solution and apply it into the weapon data link integrating system.

A study on standard implementation method of defense CALS system (국방 CALS체계의 표준 적용방안에 관한 연구)

  • 김철환;송인출
    • Proceedings of the CALSEC Conference
    • /
    • 1999.11a
    • /
    • pp.75-84
    • /
    • 1999
  • CALS is a strategy to share integrated product data through a set of standards to achieve efficiencies in business and operational mission areas. In this research, we first studied current status for CALS standard and then analyzed the case of US DoD. The results can be summarized as implementing for two major standard in defense CALS system. They are STEP and XML. Our recommendations can be used to set direction for CALS standard implementation and standard selection process.

  • PDF

Estimation and Uncertainty Evaluation on Mass Flow Rate of Air Intake by Using Air Data (비행정보를 이용한 흡입구의 공기유량 추정 및 불확도 평가)

  • Park, Iksoo;Park, Jungwoo;Ki, Taeseok;Choi, Jin;Lee, Juyoung
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.22 no.3
    • /
    • pp.14-20
    • /
    • 2018
  • An estimation law of air mass flow rate for high speed engine control is presented. The variables of mass estimation equations are modified to measurable variables which can be obtained during flight, and the effectiveness of each variable to the estimation accuracy is evaluated. The equation is modified to a simplified form, and the uncertainty is evaluated. In addition, reference data for the selection of estimation methods is suggested by considering the sensitivity analysis of sensor error.

A Study on the Trend of an Avionics System Architecture Development for UAV (무인기 항공전자 체계의 아키텍처 개발 동향연구)

  • Kim, Sung Woo;Sim, Jae Ick;Lee, Wang Gug;Lee, Woo Jin;Won, Dae Yeon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.4
    • /
    • pp.436-447
    • /
    • 2014
  • The major elements of avionics system architecture are requirements, Real Time Operating System, message communication, memory, and data format etc. Herein describes a state-of-the-art development trend for the avionics system architecture, system requirements and data bus among the major elements of avionics system. While, domestic technology has been tried to Integrated Modular Avionics(IMA) system based on the Avionics Full Duplex Switched Ethernet(AFDX) technology during Light Attack Helicopter(LAH) project in Korea, but not yet proved as the product case in Full Scale Development Phase. The avionics system architecture considering the domestic inexperience of the IMA system architecture are suggested for the Next-generation Corps Unmanned Aircraft System.

Finding Naval Ship Maintenance Expertise Through Text Mining and SNA

  • Kim, Jin-Gwang;Yoon, Soung-woong;Lee, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.7
    • /
    • pp.125-133
    • /
    • 2019
  • Because military weapons systems for special purposes are small and complex, they are not easy to maintain. Therefore, it is very important to maintain combat strength through quick maintenance in the event of a breakdown. In particular, naval ships are complex weapon systems equipped with various equipment, so other equipment must be considered for maintenance in the event of equipment failure, so that skilled maintenance personnel have a great influence on rapid maintenance. Therefore, in this paper, we analyzed maintenance data of defense equipment maintenance information system through text mining and social network analysis(SNA), and tried to identify the naval ship maintenance expertise. The defense equipment maintenance information system is a system that manages military equipment efficiently. In this study, the data(2,538cases) of some naval ship maintenance teams were analyzed. In detail, we examined the contents of main maintenance and maintenance personnel through text mining(word cloud, word network). Next, social network analysis(collaboration analysis, centrality analysis) was used to confirm the collaboration relationship between maintenance personnel and maintenance expertise. Finally, we compare the results of text mining and social network analysis(SNA) to find out appropriate methods for finding and finding naval ship maintenance expertise.

Selecting the Optimal Hidden Layer of Extreme Learning Machine Using Multiple Kernel Learning

  • Zhao, Wentao;Li, Pan;Liu, Qiang;Liu, Dan;Liu, Xinwang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5765-5781
    • /
    • 2018
  • Extreme learning machine (ELM) is emerging as a powerful machine learning method in a variety of application scenarios due to its promising advantages of high accuracy, fast learning speed and easy of implementation. However, how to select the optimal hidden layer of ELM is still an open question in the ELM community. Basically, the number of hidden layer nodes is a sensitive hyperparameter that significantly affects the performance of ELM. To address this challenging problem, we propose to adopt multiple kernel learning (MKL) to design a multi-hidden-layer-kernel ELM (MHLK-ELM). Specifically, we first integrate kernel functions with random feature mapping of ELM to design a hidden-layer-kernel ELM (HLK-ELM), which serves as the base of MHLK-ELM. Then, we utilize the MKL method to propose two versions of MHLK-ELMs, called sparse and non-sparse MHLK-ELMs. Both two types of MHLK-ELMs can effectively find out the optimal linear combination of multiple HLK-ELMs for different classification and regression problems. Experimental results on seven data sets, among which three data sets are relevant to classification and four ones are relevant to regression, demonstrate that the proposed MHLK-ELM achieves superior performance compared with conventional ELM and basic HLK-ELM.