• 제목/요약/키워드: National Defense Research Information

검색결과 263건 처리시간 0.024초

국방정보보호산업 관련 중부권 연구기관 활용방안 (A Participation Scheme of the Central Region Research Institute related to National Defense Information Security Industry)

  • 엄정호
    • 안보군사학연구
    • /
    • 통권9호
    • /
    • pp.191-206
    • /
    • 2011
  • This study is presented a scheme that information security research institutions located within the central area can be participated actively m national defense information security industry. The many of information security company are located in the central region(Daejeon) and there are many research institutes. However, the participation rate of the Defense Information Security Industry is not high compared to other provinces. Although a variety of reasons, there are no the Defense Privacy Office that could have a role in protocol and the information about the industry. In addition, the Department of Defense related to national defense information security industry have not information about research institutions in the central region and are not well to identify the characteristics of institutional technology and research. So in this paper we presented some of the alternatives. 1) Building Pool involved in information security research according to the characteristics of each agency 2) Constitute the research community between Research institutions and the company 3) Build the technology cooperation between research institutions and the defense research institutes 4) Utilization of industry/university/research institutes related to Information Security Industry 5) Make strategic alliances among research institutes based on technical expertise.

  • PDF

국방주요정보통신기반시설 중심의 정보보호기술구조 연구 (A Study on the Information Security Technical Architecture focusing on the Primary Defense Information Infrastructure)

  • 최지나;남길현
    • 한국군사과학기술학회지
    • /
    • 제9권1호
    • /
    • pp.80-88
    • /
    • 2006
  • The purpose of this thesis is to research and propose a practical Information Security Technical Architecture on Primary Defense Information Infrastructure with regard to requirement of information security. The scope of this research is limited to national defense information master plan & security rule, and U.S. DoD's IATF is used to plan a detailed structure. The result of this research can be used as a guide book for providing security for Army IT infrastructure now and in the future as well as to devise a plan for research and development in information protection technology.

국방 전군적 아키텍처 프레임워크에 관한 연구 (A Study on National Defense Enterprise Architecture Framework)

  • 이태공;김진우
    • 한국국방경영분석학회지
    • /
    • 제29권2호
    • /
    • pp.45-60
    • /
    • 2003
  • As we live in real If era, If become a mandatory component for nations and organizations to survive in severe competition. If is also thought of as strategic asset for effective business operations, yet there is no proved statement on the interoperability and system integration which causes serious problem in terms of requirement engineering among current systems. The National Defense Enterprise Architecture Framework is a strategic information asset base, which define the military operation activities for the mission, the information necessary for military operations, the technologies necessary for implementing new technology in response to changing operational needs. It is an integrated model or representation. Information Systems will be evolved by the National Defense Enterprise Architecture framework. The purpose of this framework is to present overall picture of national defense information system domain so that information systems are interoperated, integrated and information sharing is increased among affiliated organization of Defense Military.

Analyzing Knowledge Structure of Defense Area using Keyword Network Analysis

  • Lee, Yong-Kyu;Yoon, Soung-Woong;Lee, Sang-Hoon
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권10호
    • /
    • pp.173-180
    • /
    • 2018
  • In this paper, we analyzed key keywords and research themes in the field of defense research using keyword network analysis and tried to grasp the whole knowledge structure. To do this, we extracted data from 2,165 research data from defense related research institutes from 2010 to 2017 and applied the Pareto rule to the number of abstracts of words and the number of links between words, We extracted a total of 2,303 words based on the criterion and extracted 204 final key words through component analysis. By analyzing the centrality and cohesiveness through these key words, we confirmed the concept of core research in the defense field and derived a total of 7 large groups and 16 small groups of each group in the knowledge structure of the defense area.

국방연구정보의 모바일 시맨틱 통합검색 시스템 (A Mobile Semantic Integrated Search System of National Defense Research Information)

  • 유동희;나민영
    • 정보처리학회논문지B
    • /
    • 제18B권5호
    • /
    • pp.295-304
    • /
    • 2011
  • 국방 분야의 연구정보들을 효과적으로 관리하기 위해서는 국방연구정보에 관한 메타데이터가 체계적으로 관리되어야 하며, 이를 기반으로 국방연구정보의 융합과 관리를 돕는 통합시스템이 구축되어야 한다. 이와 함께, 모바일 장비를 이용한 검색이 증가하고 있는 추세이므로 사용자들에게는 모바일 환경에서의 효과적인 통합 검색 서비스가 제공되어야 한다. 본 논문에서는 국방연구정보를 활용한 모바일 시맨틱 통합검색 시스템을 제안하고자 한다. 이를 위해, 더블린코어의 메타데이터와 주요 국방 관련 연구기관의 데이터베이스 정보를 분석하여 국방연구 온톨로지와 국방연구 규칙을 정의하였고, 정의된 온톨로지와 규칙이 국방연구정보의 시맨틱 통합검색에 활용되는 것을 보이기 위해 모바일 시맨틱 통합검색 시스템의 프로토타입을 구현하였다. 또한 모바일 환경에서의 시맨틱 통합검색을 지원하기 위한 트리플 기반 검색 서비스와 향후 활용 가능한 모바일 시맨틱 통합검색 서비스들을 제시하였다.

전장 정보체계의 전투력 상승효과 측정을 위한 새로운 MOE 제안 (A Proposal of New MOE to Assess the Combat Power Synergistic Effect of Warfare Information System)

  • 이용복;정환식;김용흡;이재영
    • 산업공학
    • /
    • 제22권3호
    • /
    • pp.205-213
    • /
    • 2009
  • Warfare information system is a core factor of future combat operation under NCW(Network centric Warfare) environment. In this paper, we proposed a new MOE(Measure of Effectiveness) that can assess the combat power synergistic effect of warfare information system in the theater-level joint fire operation. This new MOE uses the rule of Newton's second law($F=(m{\Delta}{\upsilon})/{\Delta}t{\Rightarrow}(M{\upsilon}I)/T$). Four factors considered in combat power evaluation are network power(M), movement velocity(v), information superiority(I), command and control time(T). We applied this new MOE to the JFOS-K(Joint Fire Operating System-Korea) to assess its combat power effect and compared with other's effects obtained from different MOE.

CacheSCDefender: VMM-based Comprehensive Framework against Cache-based Side-channel Attacks

  • Yang, Chao;Guo, Yunfei;Hu, Hongchao;Liu, Wenyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권12호
    • /
    • pp.6098-6122
    • /
    • 2018
  • Cache-based side-channel attacks have achieved more attention along with the development of cloud computing technologies. However, current host-based mitigation methods either provide bad compatibility with current cloud infrastructure, or turn out too application-specific. Besides, they are defending blindly without any knowledge of on-going attacks. In this work, we present CacheSCDefender, a framework that provides a (Virtual Machine Monitor) VMM-based comprehensive defense framework against all levels of cache attacks. In designing CacheSCDefender, we make three key contributions: (1) an attack-aware framework combining our novel dynamic remapping and traditional cache cleansing, which provides a comprehensive defense against all three cases of cache attacks that we identify in this paper; (2) a new defense method called dynamic remapping which is a developed version of random permutation and is able to deal with two cases of cache attacks; (3) formalization and quantification of security improvement and performance overhead of our defense, which can be applicable to other defense methods. We show that CacheSCDefender is practical for deployment in normal virtualized environment, while providing favorable security guarantee for virtual machines.

국방의사결정 : 전망과 대비방향 (National Defense Decision-Making : Prospects and New Directions)

  • 권태영
    • 한국국방경영분석학회지
    • /
    • 제16권1호
    • /
    • pp.18-34
    • /
    • 1990
  • In light of the recent developments of transitory nature, it is likely that national defense decision-making will be more difficult to make for years to come. In other words, sudden changes in security environment would call into question the basic assumptions on which we have built our national defense planning and increase the number of the uncertain factors in the decision-making process; the subdivision and ramification of national defense management would increase the factors for decision-making and complicate even further the mutual interactions among these factors; the accelerated pace of sophistication and diversification of weapon systems and military technology would increase the risk of failure and system costs geometrically; and the reduced level of acceptance among the people on the sanctification of national defense in proportion to the rapid progress toward a more democratic and industrial society would engender an increased criticism or checking role by the National Assembly or by the mass media. As the changes in national defense environment and conditions create an innumerable number of new tasks, this paper intends to suggest a few core policy measures to improve the quality of national defense decision-making. More specifically, it proposes to 1) eradicate entirely the bureaucratic behavior and tendencies; 2) utilize actively the brain staff for quality assurance of decision-making; 3) and introduce and apply as a whole set, a total system, or an incorporated pack age the PPBEES(Planning-Programming-Budgeting-Executing-Evaluating-System)/LCMM (Life-Cycle Management Model for System Acquision), the OR/SA(Operations Research/Systems Analysis), and DMIS (Defense Management Information System).

  • PDF

Background Subtraction for Moving Cameras based on trajectory-controlled segmentation and Label Inference

  • Yin, Xiaoqing;Wang, Bin;Li, Weili;Liu, Yu;Zhang, Maojun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권10호
    • /
    • pp.4092-4107
    • /
    • 2015
  • We propose a background subtraction method for moving cameras based on trajectory classification, image segmentation and label inference. In the trajectory classification process, PCA-based outlier detection strategy is used to remove the outliers in the foreground trajectories. Combining optical flow trajectory with watershed algorithm, we propose a trajectory-controlled watershed segmentation algorithm which effectively improves the edge-preserving performance and prevents the over-smooth problem. Finally, label inference based on Markov Random field is conducted for labeling the unlabeled pixels. Experimental results on the motionseg database demonstrate the promising performance of the proposed approach compared with other competing methods.

Topology-based Workflow Scheduling in Commercial Clouds

  • Ji, Haoran;Bao, Weidong;Zhu, Xiaomin;Xiao, Wenhua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권11호
    • /
    • pp.4311-4330
    • /
    • 2015
  • Cloud computing has become a new paradigm by enabling on-demand provisioning of applications, platforms or computing resources for clients. Workflow scheduling has always been treated as one of the most challenging problems in clouds. Commercial clouds have been widely used in scientific research, such as biology, astronomy and weather forecasting. Certainly, it is very important for a cloud service provider to pursue the profits for the commercial essence of clouds. This is also significantly important for the case of providing services to workflow tasks. In this paper, we address the issues of workflow scheduling in commercial clouds. This work takes the communication into account, which has always been ignored. And then, a topology-based workflow-scheduling algorithm named Resource Auction Algorithm (REAL) is proposed in the objective of getting more profits. The algorithm gives a good performance on searching for the optimum schedule for a sample workflow. Also, we find that there exists a certain resource amount, which gets the most profits to help us get more enthusiasm for further developing the research. Experimental results demonstrate that the analysis of the strategies for most profits is reasonable, and REAL gives a good performance on efficiently getting an optimized scheme with low computing complexity.