• Title/Summary/Keyword: Enemy Information

Search Result 172, Processing Time 0.03 seconds

A Study on Operation Concept of Naval Surface to Air Defense System with Complex Assets (함대공 방어체계 복합자산 운용개념 연구)

  • Taegu Kim;Woongjae Na;Seoyeon Yang;Yeojin Park;Donghyuk Shim;Da-Bin Ryu;Nahae Yun;In-Chul Park;Lae-Eun Kim
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.4
    • /
    • pp.190-198
    • /
    • 2023
  • The purpose of this study was to propose an operational concept for a ship in a fleet equipped with an interceptor missile system, a naval surface to air defense system, and to develop a simulation program that reflects it. The results of the defense activities of other ships in the fleet can be reflected by receiving information about the status of the enemy missiles. The allocation of defensive assets is based on the survival probability of the ship, not on the destruction of enemy attacks, which can be obtained as the product of the expected survival probability for each enemy missile. In addition, the concept of predicted survivability was introduced to assess the loss of future defense opportunities that would result from assigning a new command. A simulation program was also developed as a tool for realizing the proposed concept of operations, which generated cases.

The Importance of Military Security -Mainly focused on the Battle of Gaeseong, the early part of the Korean War- (전투사례로 본 군사보안의 중요성 연구 - 6.25 전쟁 초기, 개성일대 전투를 중심으로-)

  • Kim, Gyu-Nam;Lee, Hyun-Hee
    • Convergence Security Journal
    • /
    • v.16 no.6_1
    • /
    • pp.51-58
    • /
    • 2016
  • "History is a mirror" means that we should be prepared for the threats of enemies through learning from repeating history. Currently South Korea is facing various provocations, including North Korea's nuclear weapons and missile s. For the protection of the life and property of its people, South Korea should regard North Korea as a main enemy and be fully prepared for the threats. The Korean War was a war between well-prepared North Korea and ill-prepa red South Korea. After Liberation, North Korean army incorporated the Chinese Communist army, placed battle equi pment with the support of the Soviet army, and finished corps-level training while South Korea at that time did not finish battalion-level training. In wartime and peacetime, an army should improve military security by concealing its own information and find its enemy's information. North Korea carefully prepared for the war, collecting information about the organization, deployment and operation of the South Korean army. South Korean army failed to cope with it and had hard times in its early battles. In this paper, I will emphasize the importance of military security, focusing on the Battle of Gaeseong, the early part of the Korean War.

Cyber Defense Analysis and Improvement of Military ecosystem with Information Security Industry (국방 사이버 방호체계 구축 생태계 취약점 분석 및 개선방안)

  • Baek, Jaejong;Moon, Byoung-Moo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1263-1269
    • /
    • 2014
  • Since the cyber defense has been dependent on commercial products and protection systems, in aspect of the recent trends, our cyber defence ecosystem can be more vulnerable. In case of general defense weapon companies, they have to be observed by the government such as certain proprietary technologies and products for the protection from the enemy. On the contrary, most cyber weapon companies have not been managed like that. For this reason, cyber attack can reach to the inside of our military through the security hole of commercial products. In this paper, we enhanced a military cyber protection ecosystems out of enemy attacks and analyze the hypothetical scenarios to evaluate and verify the vulnerability, and finally more securable ecosystem of military protection system is presented politically and technically.

A case study of digital intermediate space designed - The focus on the consumer community - (디지털 매개공간 유형에 관한 사례 연구 - 수용자 커뮤니티를 중심으로 -)

  • 서동진;임종훈
    • Korean Institute of Interior Design Journal
    • /
    • no.29
    • /
    • pp.281-288
    • /
    • 2001
  • It shows 21st century as a networking society that is moving up the concept of global town and being industrialized with regional and personal connections. Individual's original idea and variety of 21th century may be respected by such environmental change, and age (Literary, human axis, technology axis, nature axis, kaining farming axis are central keyword) of culture that cultural capacity of individual becomes important fetters that create added value is forecasted to become. The moaning for space that is unemployment enemy by change of conceptional environment about cultural life and agreeable quality of life by development of Information-Communication technology may be required newly. As it does interaction along with development of science technique and Information-Communication technology, the future environment of various that complex! Is predicted to form network environment (existence space, cyberspace) newly. Human central interest is risen in technology balance hereupon, and these characteristic escaped in physical system that do with functional special quality and require human central and sensitive interaction. First, if examine about phenomenon by Digitize and chance aspect that is risen in 21th century, Digitize is time that action occurs fusion Tuesday that is various and Blur phenomenon of city·space, and the period to collapse the border between several individual. Second, importance more than man-centered and sensitive aspect of functional physical system is risen by digital age with development of technology medium, and as the five digital senses showed up, it suggests a sensual of the times and therefore the interest and direction get set up for the sensual sides of consumers. Third, special quality is, medium enemy by that digital space connotes meaning disk floret, variability, transparency, space red of extensity etc.. to burn and is digitalised, can be risen by symbolic, original individualities and emotional communication's the importance is required sensitivity enemy who is sympathy horn by fusion anger of individual. Technology of new media may open direction of new communication through interface that did not enjoy so far is going to supply new means that can express own to human

  • PDF

Fuzzy Rule-Based Method for Air Threat Evaluation (적기의 위협 평가 자동화를 위한 퍼지 규칙 방법론)

  • Choi, Byeong Ju;Kim, Ji Eun;Kim, Jin Soo;Kim, Chang Ouk
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.1
    • /
    • pp.57-65
    • /
    • 2016
  • Threat evaluation is a process to estimate the threat score which enemy aerial threat poses to defended assets. The objective of threat evaluation is concerned with making an engagement priority list for optimal weapon allocation. Traditionally, the threat evaluation of massive air threats has been carried out by air defence experts, but the human decision making is less effective in real aerial attack situations with massive enemy fighters. Therefore, automation to enhance the speed and efficiency of the human operation is required. The automatic threat evaluation by air defense experts who will perform multi-variable judgment needs formal models to accurately quantify their linguistic evaluation of threat level. In this paper we propose a threat evaluation model by using a fuzzy rule-based inference method. Fuzzy inference is an appropriate method for quantifying threat level and integrating various threat attribute information. The performance of the model has been tested with a simulation that reflected real air threat situation and it has been verified that the proposed model was better than two conventional threat evaluation models.

Success Factors of Digital Contents Distribution Websites (디지털콘텐츠 유통 웹사이트의 성공요인(에 관한 연구))

  • Choi, Yong-Soek;Kwon, Hyeog-In
    • Journal of Information Technology Applications and Management
    • /
    • v.13 no.4
    • /
    • pp.215-235
    • /
    • 2006
  • Recently, Development of IT and digital-tech, and this is becoming factor of digital contents industry development. But, problem that is more suitable e-business model's necessity and quality enemy of distribution web-site to digital contents as transaction this firm dispute by transaction special quality and Payment-system increase of digital contents increases rapidly was risen. In this study, Digital Contents qualify estimation very important persons of digital contents as sequence of study that investigate from target's viewpoint which is serviced through web-site that digital contents is not factors of web-site service method whether digital contents distribution web-site factors effect that is some in customer satisfaction from general viewpoint of actuality digital contents distribution and is the actual proof enemy. This paper's goal that these study finding leads as digital contents industry discusses individual enterprise's success and failure as field of business in quickening period yet but domestic digital contents industry field will be roared and may can have competitive power by enterprises which wish to already started business or inaugurate an enterprise enter in field with successful beginning and direction and develop continuously.

  • PDF

Information Acquisition of Simulation Objects by Resolution in Multi-resolution Model based War Game (다중 해상도 모델 기반 워게임 체계에서 해상도별 모의 객체의 정보 획득)

  • Bae, Hyun Shik;Rhee, Eun joo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.147-154
    • /
    • 2018
  • In this paper, we propose methods to acquire enemy object information, which is frequently required in multi-resolution model based war game and affects the simulation performance. In the information request method, a multi-resolution model selects information of a specific resolution and provides them to external objects. In the information announcement method, a multi-resolution model announces all information, and external objects select information of a specific resolution. In the information sharing method, external objects obtains information of a specific resolution by inquiring all information of a multi-resolution model which are stored in a shared space. Simulation results show that the information sharing method is more efficient than the information request method and the information announcement method because the information acquisition is fast. In addition, the proposed methods will increase the efficiency of war game operation by shortening the time for acquiring enemy forces' information.

Embodiment of living body measure system modelling for rehalibitation treatment of positive simulation for HRV algorithm analysis interface of Mobile base (모바일기반의 HRV 인터페이스에 처리에 대한 생체계측 시스템 모델링의 구현)

  • Kim, Whi-Young
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.1013-1014
    • /
    • 2006
  • Mobilecomputer offers more fundamental role than role assistance enemy of modern technology equipment and new Information Technology can reconsider, and reconstruct creatively accuracy of physiological concept. That military register symptoms are developed of disease, before far before rehalibitation, offer possibility that can intervene in process that motive change of military register symptoms after rehalibitation. But, that many parameters become analysis target and mathematical settlement and equalization system of neted data of that is huge, same time collection of all datas can lift difficulty etc.. These main weakness puts in structural relation between elements that compose system. Therefore, dynamics research that time urea of systematic adjustment has selected method code Tuesday nerve dynamics enemy who groping of approach that become analysis point is proper and do with recycling bioelectricity signal. Nature model of do living body signal digital analysis chapter as research result could be developed and scientific foundation groping could apply HSS (Hardware-software system) by rehalibitation purpose. Special quality that is done radish form Tuesday of bioelectricity signal formation furthermore studied, and by the result, fundamental process of bodysignal in do structure circuit form of analog - digital water supply height modelling do can

  • PDF

A Survey Study on Standard Security Models in Wireless Sensor Networks

  • Lee, Sang Ho
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.4
    • /
    • pp.31-36
    • /
    • 2014
  • Recent advancement in Wireless Sensor Networks (WSNs) has paved the way for WSNs to enable in various environments in monitoring temperature, motion, sound, and vibration. These applications often include the detection of sensitive information from enemy movements in hostile areas or in locations of personnel in buildings. Due to characteristics of WSNs and dealing with sensitive information, wireless sensor nodes tend to be exposed to the enemy or in a hazard area, and security is a major concern in WSNs. Because WSNs pose unique challenges, traditional security techniques used in conventional networks cannot be applied directly, many researchers have developed various security protocols to fit into WSNs. To develop countermeasures of various attacks in WSNs, descriptions and analysis of current security attacks in the network layers must be developed by using a standard notation. However, there is no research paper describing and analyzing security models in WSNs by using a standard notation such as The Unified Modeling Language (UML). Using the UML helps security developers to understand security attacks and design secure WSNs. In this research, we provide standard models for security attacks by UML Sequence Diagrams to describe and analyze possible attacks in the three network layers.

  • PDF

Development of 3D Defense Space Game using Oculus

  • Iim, Won-Gyu;Lee, Byeong Cheol;Kim, Soo Kyun;An, Syoungog
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.8
    • /
    • pp.45-50
    • /
    • 2019
  • Oculus Rift is the most universal VR (virtual Reality) headset for gamers and FPS (First Person Shooting) is the most suitable game genre to play with VR. Using VR can increase the player's sense of reality and make them feel as though they are in direct contact with the enemy while battling. The suggested VR game is a first person game where the player must defend a specific target against the surging enemy all within the time limit. Many objects will need to be used in this method. Object pooling will be used in order to manage all the numerous objects. When an object is repeatedly created and deleted it typically overwhelms the memory. To resolve this issue the game initially summons the object at the beginning of the scene and afterwards only uses the object when needed, lessening the burden on the memory. A ranking system is implemented to keep the game records in order to stimulate a competitive spirit between the players, and the game has received positive response during test play among college students in their 20s.