• Title/Summary/Keyword: Hardware based

Search Result 3,645, Processing Time 0.033 seconds

A Study on the Improvement of the TRA Framework for Complex Weapon Systems from the System Integration Perspective (시스템 통합 관점의 복합 무기체계 기술성숙도 평가 프레임워크 개선에 관한 연구)

  • Jiin Koo;Sukjae Jeong
    • Journal of The Korean Institute of Defense Technology
    • /
    • v.5 no.2
    • /
    • pp.23-30
    • /
    • 2023
  • TRA(Technology Readiness Assessment) quantitatively assesses the current level of domestic technology and is used as a key tool for determining the possibility of domestic R&D and risk management. However, since the current TRA utilizes hardware-oriented TRL(Technology Readiness Level), it is suitable for independent assessment of each technologies, but has limitations in evaluation from a system integration perspective. In addition, the checklist-based assessment is highly likely to involve subjective evaluation. This study proposes an enhanced TRA framework by redefining TRA procedures and criteria from the systems integration perspective of system engineering. We focused on developing a framework that overcomes the limitations of the current TRL/TRA and enables easier and more intuitive assessment. The proposed framework distinguishes between TE(Technology Element) and CTE(Critical Technology Element) in terms of HW, SW and interface and redefines TRL. TRA is performed according to the TRL redefined from the above three points of view, and the lowest evaluation value is used as system maturity level in consideration of risk management. The proposed CTE selection method minimizes the intervention of the evaluator by utilizing the quantitative goal of the key ROC(Required Operational Capability), development difficulty, and application of COTS(Common Off The Shelf) technology. The effectiveness of this framework was confirmed through a case study of the TSS(Target Surveillance System). It is hoped that starting with this study, research at the framework level will be activated and contribute to the improvement of the TRA system.

  • PDF

Evaluation method for interoperability of weapon systems applying natural language processing techniques (자연어처리 기법을 적용한 무기체계의 상호운용성 평가방법)

  • Yong-Gyun Kim;Dong-Hyen Lee
    • Journal of The Korean Institute of Defense Technology
    • /
    • v.5 no.3
    • /
    • pp.8-17
    • /
    • 2023
  • The current weapon system is operated as a complex weapon system with various standards and protocols applied, so there is a risk of failure in smooth information exchange during combined and joint operations on the battlefield. The interoperability of weapon systems to carry out precise strikes on key targets through rapid situational judgment between weapon systems is a key element in the conduct of war. Since the Korean military went into service, there has been a need to change the configuration and improve performance of a large number of software and hardware, but there is no verification system for the impact on interoperability, and there are no related test tools and facilities. In addition, during combined and joint training, errors frequently occur during use after arbitrarily changing the detailed operation method and software of the weapon/power support system. Therefore, periodic verification of interoperability between weapon systems is necessary. To solve this problem, rather than having people schedule an evaluation period and conduct the evaluation once, AI should continuously evaluate the interoperability between weapons and power support systems 24 hours a day to advance warfighting capabilities. To solve these problems, To this end, preliminary research was conducted to improve defense interoperability capabilities by applying natural language processing techniques (①Word2Vec model, ②FastText model, ③Swivel model) (using published algorithms and source code). Based on the results of this experiment, we would like to present a methodology (automated evaluation of interoperability requirements evaluation / level measurement through natural language processing model) to implement an automated defense interoperability evaluation tool without relying on humans.

  • PDF

Real-time Color Recognition Based on Graphic Hardware Acceleration (그래픽 하드웨어 가속을 이용한 실시간 색상 인식)

  • Kim, Ku-Jin;Yoon, Ji-Young;Choi, Yoo-Joo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.1
    • /
    • pp.1-12
    • /
    • 2008
  • In this paper, we present a real-time algorithm for recognizing the vehicle color from the indoor and outdoor vehicle images based on GPU (Graphics Processing Unit) acceleration. In the preprocessing step, we construct feature victors from the sample vehicle images with different colors. Then, we combine the feature vectors for each color and store them as a reference texture that would be used in the GPU. Given an input vehicle image, the CPU constructs its feature Hector, and then the GPU compares it with the sample feature vectors in the reference texture. The similarities between the input feature vector and the sample feature vectors for each color are measured, and then the result is transferred to the CPU to recognize the vehicle color. The output colors are categorized into seven colors that include three achromatic colors: black, silver, and white and four chromatic colors: red, yellow, blue, and green. We construct feature vectors by using the histograms which consist of hue-saturation pairs and hue-intensity pairs. The weight factor is given to the saturation values. Our algorithm shows 94.67% of successful color recognition rate, by using a large number of sample images captured in various environments, by generating feature vectors that distinguish different colors, and by utilizing an appropriate likelihood function. We also accelerate the speed of color recognition by utilizing the parallel computation functionality in the GPU. In the experiments, we constructed a reference texture from 7,168 sample images, where 1,024 images were used for each color. The average time for generating a feature vector is 0.509ms for the $150{\times}113$ resolution image. After the feature vector is constructed, the execution time for GPU-based color recognition is 2.316ms in average, and this is 5.47 times faster than the case when the algorithm is executed in the CPU. Our experiments were limited to the vehicle images only, but our algorithm can be extended to the input images of the general objects.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

Characteristics of Intrusion MO and Perception of Target Hardening of Burglars (침입절도범 재소자의 수법 특성과 타겟하드닝 관련 인식)

  • Park, Hyeonho;Kim, Kang-Il;Kim, Hyo-gun
    • Korean Security Journal
    • /
    • no.60
    • /
    • pp.33-61
    • /
    • 2019
  • It is quite difficult to actually prove the effectiveness of so-called target-hardening, one of the various strategies used to reduce crime, one of the serious problems in society recently. In particular, three to five minutes is often used as golden time for intruders to give up or stop, which is based on foreign and some indirect research cases in Korea, but there were no studies that more directly identified the average break-in operation time or the abandonment time based on the elapsed time when the shield hardware resists intruders. This study was the first of its kind in Korea to investigate and verify samples of 90 inmates of break-in burglars who were imprisoned in August 2018 by profiling the average criminal experience, education level, age, height and weight of typical Korean professional break-in thieves, and specific criminal methods, average break-in operation time, and the criteria for giving up if not breached. According to the analysis results, in the survey on the number of pre-invasion theft crimes by intruders, many of the respondents who participated in the survey were criminals of professional invasions, and by their physical characteristics, there was not much difference from ordinary adult men. Residential facilities were the highest in the world, followed by commercial and educational facilities. According to the survey on the types of facilities that committed intrusion into residential facilities, it was not safe to say that single-family housing accounted for the largest portion of single-family housing, multi-family housing, apartment high-rise (more than three stories), and apartment low-rise (more than one to three stories) among residential facilities, and that the ratio of apartment high-rise was higher than expected. Based on the average time required to break into a place for an intrusion crime, it is assumed that the psychological time worked in a place where the break-in was difficult, since the break-in was not performed while measuring the time of the break-in operation. In the case of time to give up a crime, more than half of the respondents said they would give up the crime even in less than four minutes, suggesting that a significant number of intrusive crimes can be prevented even if the facility has four minutes of intrusion resistance. This proves that most intruders will give up the break-in if the break-in resistance performance of the security facility is exercised for more than five minutes.

Real-Time 3D Ultrasound Imaging Method Using a Cross Array Based on Synthetic Aperture Focusing: I. Spherical Wave Transmission Approach (합성구경 기반의 교차어레이를 이용한 실시간 3차원 초음파 영상화 기법 : I. 구형파 송신 방법)

  • 김강식;송태경
    • Journal of Biomedical Engineering Research
    • /
    • v.25 no.5
    • /
    • pp.391-401
    • /
    • 2004
  • 3D imaging systems using 2D phased arrays have a large number of active channels, compelling to use a very expensive and bulky beamforming hardware, and suffer from low volume rate because, in principle, at least one ultrasound transmit-receive event is necessary to construct each scanline. A high speed 3D imaging method using a cross array proposed previously to solve the above limitations can implement fast scanning and dynamic focusing in the lateral direction but suffer from low resolution except at the fixed transmit focusing along the elevational direction. To overcome these limitations, we propose a new real-time volumetric imaging method using a cross array based on the synthetic aperture technique. In the proposed method, ultrasound wave is transmitted successively using each elements of an 1D transmit array transducer, one at a time, which is placed along the elevational direction and for each firing, the returning pulse echoes are received using all elements of an 1D receive array transducer placed along the lateral direction. On receive, by employing the conventional dynamic focusing and synthetic aperture method along lateral and elevational directions, respectively, ultrasound waves can be focused effectively at all imaging points. In addition, in the proposed method, a volume of interest consisting of any required number of slice images, can be constructed with the same number of transmit-receive steps as the total number of transmit array elements. Computer simulation results show that the proposed method can provide the same and greatly improved resolutions in the lateral and elevational directions, respectively, compared with the 3D imaging method using a cross array based on the conventional fixed focusing. In the accompanying paper, we will also propose a new real-time 3D imaging method using a cross array for improving transmit power and elevational spatial resolution, which uses linear wave fronts on transmit.

Study of Web Services Interoperabiliy for Multiple Applications (다중 Application을 위한 Web Services 상호 운용성에 관한 연구)

  • 유윤식;송종철;최일선;임산송;정회경
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.217-220
    • /
    • 2004
  • According as utilization for web increases rapidly, it is demanded that model about support interaction between web-based applications systematically and solutions can integrate new distributed platforms and existing environment effectively, accordingly, Web Services appeared by solution in reply. These days, a lot of software and hardware companies try to adoption of Web Services to their market, attenpt to construct their applications associationing components from various Web Services providers. However, to execute Web Services completely. it must have interoperability and need the standardization work that avoid thing which is subject to platform, application as well as service and programming language from other companies. WS-I (Web Services Interoperability organization) have established Basic Profile 1.0 based on XML, UDDI, WSDL and SOAP for web services interoperability and developed usage scenario Profile to apply Web Services in practice. In this paper, to verify suitability Web Services interoperability between heterogeneous two applications, have design and implements the Book Information Web Services that based on the Web Services Client of J2SE platform and the Web Services Server of .NET platform, so that analysis and verify the service by adaptation of WS-I Basic Profile.

  • PDF

Performance Analysis and Comparison of Stream Ciphers for Secure Sensor Networks (안전한 센서 네트워크를 위한 스트림 암호의 성능 비교 분석)

  • Yun, Min;Na, Hyoung-Jun;Lee, Mun-Kyu;Park, Kun-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.3-16
    • /
    • 2008
  • A Wireless Sensor Network (WSN for short) is a wireless network consisting of distributed small devices which are called sensor nodes or motes. Recently, there has been an extensive research on WSN and also on its security. For secure storage and secure transmission of the sensed information, sensor nodes should be equipped with cryptographic algorithms. Moreover, these algorithms should be efficiently implemented since sensor nodes are highly resource-constrained devices. There are already some existing algorithms applicable to sensor nodes, including public key ciphers such as TinyECC and standard block ciphers such as AES. Stream ciphers, however, are still to be analyzed, since they were only recently standardized in the eSTREAM project. In this paper, we implement over the MicaZ platform nine software-based stream ciphers out of the ten in the second and final phases of the eSTREAM project, and we evaluate their performance. Especially, we apply several optimization techniques to six ciphers including SOSEMANUK, Salsa20 and Rabbit, which have survived after the final phase of the eSTREAM project. We also present the implementation results of hardware-oriented stream ciphers and AES-CFB fur reference. According to our experiment, the encryption speeds of these software-based stream ciphers are in the range of 31-406Kbps, thus most of these ciphers are fairly acceptable fur sensor nodes. In particular, the survivors, SOSEMANUK, Salsa20 and Rabbit, show the throughputs of 406Kbps, 176Kbps and 121Kbps using 70KB, 14KB and 22KB of ROM and 2811B, 799B and 755B of RAM, respectively. From the viewpoint of encryption speed, the performances of these ciphers are much better than that of the software-based AES, which shows the speed of 106Kbps.

A Study on the ROK Army Leadership for promoting Jointness (합동성 증진을 위한 한국군 리더십 연구)

  • Jin, Jae-Yeoul
    • Korea and Global Affairs
    • /
    • v.1 no.2
    • /
    • pp.209-242
    • /
    • 2017
  • The purpose of this study is to contribute to enhancing spiritual combat power as the core of intangible combat power in Korean armed forces through analyses and suggestions on Admiral Yi Sun-sin's leadership for four major sweeping victories based upon jointness which effectively integrates tangible and intangible combat power in armed forces to maximize the synergy of fighting power. As our armed forces has improved their military structure in the dimension of hardwares so as to enhance their efficiency, according to the results of analyzing the process to promote the jointness between our armed forces and our allied powers in the dimension of softwares supporting such hardware dimensions, it was necessary to innovate the system for reinforcing future-oriented spiritual combat power as well as all the tasks related to leadership as the core of intangible combat power jointly and harmoniously. In order to derive tasks about the leadership of Korean armed forces in the dimension of softwares which should be combined with military structural reform for strengthening spiritual combat power for national defense, this study selected research questions linked with jointness. That is, (1) what is the core of military leadership in Western advanced countries in the age of jointness? (2) What are the contemporary illuminations or implications of Korean leaderships through Admiral Yi Sun-sin's war history? Then, this study analyzed literature reviews, this author's field interviews in the time of war participation, and leadership war history focusing on Admiral Yi Sun-sin's leadership for four major sweeping victories. According to the results of these analyses, this study extracted (1) the strategic leadership to predict and prepare the future, (2) the leadership of integration to create synergy effects, and (3) the leadership of knowledge to be practiced focusing on combats. In addition, in order to reinforce spiritual combat power based upon jointness, (1) it is necessary to precede in-depth and substantial leadership diagnosis for enhancing jointness. (2) It is necessary to embody national defense reform as well as integration for jointness improvement after scientifically comparing and analyzing the differentiation and integration between the Ministry of National Defense, army-navy-air force leadership centers, and PKO centers. (3) It is necessary to promote the merger and abolition between institutions related to intangibale combat power under the Ministry of National Defense.

Evaluation of MR Based Respiratory Motion Correction Technique in Liver PET/MRI Study (Liver PET/MRI 검사 시 MR 기반 호흡 움직임 보정 방법의 유용성 평가)

  • Do, Yong Ho;Lee, Hong Jae;Kim, Jin Eui;Noh, Gyeong Woon
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.22 no.1
    • /
    • pp.15-22
    • /
    • 2018
  • Purpose Respiratory motion during PET/MRI acquisition may result in image blurring and error in measurement for volume and quantification of lesion. The aim of this study was to evaluate changes of quantitative accuracy, tumor size and image quality by applying MR based respiratory motion correction technique (MBRMCT) using integrated PET/MR scanner. Materials and Methods Data of 30 patients (aged $62.5{\pm}10.2y$) underwent $^{18}F-FDG$ liver PET/MR (Biograph mMR 3.0T, Siemens) study were collected. PET listmode data for 7 minutes was simultaneously acquired with maximum average gate (MAG), minimum time gate (MTG) and non gate (NG) T1 weighted MR images. Gated PET reconstruction was performed using mu-maps generated from MAG and MTG by setting 35% of efficiency window. Maximum SUV ($SUV_{max}$), peak SUV ($SUV_{peak}$), tumor size and full width at half maximum (FWHM) in the z-axis direction of MAG, MTG and NG PET images were evaluated. Results Compared to NG, mean $SUV_{max}$ and $SUV_{peak}$ were increased in MAG 13.15%(p<0.0001), 8.66%(p<0.0001), MTG 13.27%(p<0.0001), 8.80%(p<0.0001) and mean tumor size and FWHM were decreased in MAG 14.47%(p<0.0001), 15.49%(p=0.0004), MTG 14.89%(p<0.0001), 15.79%(p=0.0003) respectively. Mean $SUV_{max}$ and $SUV_{peak}$ of MTG were increased by 0.07%(p=0.8802), 0.13%(p=0.7766). Mean tumor size and FWHM of MTG were decreased by 0.49%(p=0.2786), 0.36%(p=0.2488) compared to MAG. There was no statistically significant difference between MAG and MTG which increase total scan time for about 7 and 2 minutes. Conclusion SUV, accuracy of tumor size and spatial resolution were improved in both of MAG and MTG by applying MBRMCT without installing additional hardware in liver PET/MR study. More accurate information can be provided with the increase of 2 minutes scan time if applying MTG of MBRMCT to various abdominal PET/MR studies affected by respiratory motion.