• Title/Summary/Keyword: National intelligence agency

Search Result 150, Processing Time 0.022 seconds

Application of Knowledge Graph in a military Intelligent Image Analysis System (군사용 지능형 영상 판독 시스템에서의 지식그래프 적용 방안)

  • Na, Hyung-Sun;Kang, Hyung-Seok;Ahn, Jinhyun;Im, Dong-Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.05a
    • /
    • pp.583-585
    • /
    • 2022
  • 기존 군사 분야 영상 판독 시스템은 영상 판독관들의 작업 부담이 크고, 판독관들의 경험과 숙련도에 의존적이다. 이전 연구에서 판독관들의 부담을 줄이고 경험 및 숙련 의존도를 낮추기 위해 문장 추천 시스템을 제안하였다. 하지만 학습에 사용된 데이터의 양이 적고, 학습에 사용되지 않은 장비 혹은 지역 등의 단어가 등장 시 제대로 동작하지 않는 한계점이 있었다. 이를 해결하기 위해 학습 데이터 단계와 디코딩 단계에 지식그래프를 적용하여 문장의 다양성과 확장성을 확보하고, 데이터 부족 문제를 완화하였다. 이 연구는 추후 판독관들의 업무 과부화를 완화하고 업무 효율을 높일 수 있을 것이다.

The Rise of Drone Swarms: Military Applications, Countermeasures, and Strategic Implications

  • Hwang Hyun-Ho
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.2
    • /
    • pp.318-325
    • /
    • 2024
  • The rapid advancement of drone technology has led to the emergence of drone swarms, a game-changing concept in modern warfare. This study explores the military applications, countermeasures, and strategic implications of drone swarms. By examining the current trends in drone swarm development and deployment, this research highlights the potential of this technology to revolutionize the battlefield. The study also investigates the challenges and vulnerabilities associated with drone swarms, emphasizing the need for effective countermeasures. Through an analysis of multi-sensor fusion, directed energy weapons, and artificial intelligence, this research proposes comprehensive strategies to counter the threats posed by drone swarms. Furthermore, the study delves into the ethical and legal issues surrounding the use of autonomous drone swarms, underscoring the necessity for international norms and regulations. The findings of this research contribute to the understanding of the transformative impact of drone swarms on military strategy and national security, while providing valuable insights for policymakers, military strategists, and researchers in the field.

A Study on the Analysis and Improvement of Defense Technology Planning in Response to the Fourth Industrial Revolution (4차 산업혁명 대응을 위한 국방기술기획 분석 및 개선방안 연구)

  • Noh, Sang-Woo;Song, Yu Ha;Choi, Jong-Min
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.551-556
    • /
    • 2018
  • With the rise of the fourth industrial revolution, the importance of establishing R&D strategies to develop ICT technologies such as Big Data, Artificial Intelligence, Robots, the Internet of Objects, and 3D Printing is increasing. In this study, we analyzed the effects of the fourth industrial revolution on society and the present state of the national defense technology planning system, and proposed improvement measures for the utilization of the fourth industrial revolution in the defense industry from the perspective of defense R&D. The current defense R&D strategy focuses on securing the core technologies of each weapon system required by the military through research and development. Under the current system, the role of fourth industrial revolution technology will be confined to some of the weapons systems required by the military. In order to overcome this limitation, we propose a technology roadmap for the future weapons systems.

Hybrid phishing site detection system with GRU-based shortened URL determination technique (GRU 기반 단축 URL 판별 기법을 적용한 하이브리드 피싱 사이트 탐지 시스템)

  • Hae-Soo Kim;Mi-Hui Kim
    • Journal of IKEEE
    • /
    • v.27 no.3
    • /
    • pp.213-219
    • /
    • 2023
  • According to statistics from the National Police Agency, smishing crimes using texts or messengers have increased dramatically since COVID-19. In addition, most of the cases of impersonation of public institutions reported to agency were related to vaccination and reward, and many methods were used to trick people into clicking on fake URLs (Uniform Resource Locators). When detecting them, URL-based detection methods cannot detect them properly if the information of the URL is hidden, and content-based detection methods are slow and use a lot of resources. In this paper, we propose a system for URL-based detection using transformer for regular URLs and content-based detection using XGBoost for shortened URLs through the process of determining shortened URLs using GRU(Gated Recurrent Units). The F1-Score of the proposed detection system was 94.86, and its average processing time was 5.4 seconds.

Enactment of Anti-terrorism law In the Third World And The Instruction for Us (제3세계 국가의 테러방지법제정과 우리나라에 있어서 시사점)

  • Cho, Sung-Je;Soung, Jea-Hyen
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.10
    • /
    • pp.274-283
    • /
    • 2009
  • To effectively and quickly respond to new forms of terrorism, a more organically integrated and coordinated system will be needed. As establishing the grounds of such a system based on laws would be most in congruence with legalism, it would be desirable to fundamentally establish an antiterrorism act. However, enactment of such counter-terrorism laws must be accomplished by means with which human rights violations against citizens may be minimized, contrary to what has been the case with third world nations. The act will need to include clauses that may relieve organizations, such as national human rights committees or citizen groups, of concerns over potential human rights violations. To address vulnerabilities of investigative rights issues which relate to cases relevant to acts of terrorism being delegated to the National Intelligence Service, the investigative jurisdiction shall be assigned to the public prosecutors and law enforcement officials as with other criminal proceedings. As for public concern that establishing the Anti-Terrorism Center under the National Intelligence Service, a secret service agency, may infringe upon human rights, functional and organizational dualism of the Anti -terrorism Center would be worth taking into account.

What Concerns Does ChatGPT Raise for Us?: An Analysis Centered on CTM (Correlated Topic Modeling) of YouTube Video News Comments (ChatGPT는 우리에게 어떤 우려를 초래하는가?: 유튜브 영상 뉴스 댓글의 CTM(Correlated Topic Modeling) 분석을 중심으로)

  • Song, Minho;Lee, Soobum
    • Informatization Policy
    • /
    • v.31 no.1
    • /
    • pp.3-31
    • /
    • 2024
  • This study aimed to examine public concerns in South Korea considering the country's unique context, triggered by the advent of generative artificial intelligence such as ChatGPT. To achieve this, comments from 102 YouTube video news related to ethical issues were collected using a Python scraper, and morphological analysis and preprocessing were carried out using Textom on 15,735 comments. These comments were then analyzed using a Correlated Topic Model (CTM). The analysis identified six primary topics within the comments: "Legal and Ethical Considerations"; "Intellectual Property and Technology"; "Technological Advancement and the Future of Humanity"; "Potential of AI in Information Processing"; "Emotional Intelligence and Ethical Regulations in AI"; and "Human Imitation."Structuring these topics based on a correlation coefficient value of over 10% revealed 3 main categories: "Legal and Ethical Considerations"; "Issues Related to Data Generation by ChatGPT (Intellectual Property and Technology, Potential of AI in Information Processing, and Human Imitation)"; and "Fear for the Future of Humanity (Technological Advancement and the Future of Humanity, Emotional Intelligence, and Ethical Regulations in AI)."The study confirmed the coexistence of various concerns along with the growing interest in generative AI like ChatGPT, including worries specific to the historical and social context of South Korea. These findings suggest the need for national-level efforts to ensure data fairness.

5G Cyber Physical System-based Smart City Service Policy (5G CPS 기반 스마트시티 서비스 정책)

  • Kim, Byung-Woon
    • Informatization Policy
    • /
    • v.27 no.4
    • /
    • pp.67-84
    • /
    • 2020
  • This study proposes a smart city service revitalization policy based on communication facility infrastructure in 5G CPS - the core of the 4th industrial revolution, R&D, and related legislations. The 5G CPS is a converged form of ICT technologies, communications facilities, and physical systems. In this study, we propose methods of creating new services for the smart city domain based on communication facilities and the cloud platform in 5G CPS - first, by improving the communication methods classification system based on the facility scale; second, by establishing the national telecommunication facility infrastructure and making long-term investment; third, by reorganizing the Smart City Act aimed at activating new services; and lastly, by expanding the national data analytics R&D and policy support.

Smart Tourism Information System and IoT Data Collection Devices for Location-based Tourism and Tourist Safety Services

  • Ko, Tae-Seung;Kim, Byeong-Joo;Jwa, Jeong-Woo
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.310-316
    • /
    • 2022
  • The smart tourism service provides services such as travel planning and tour guides to tourists using key technologies of the 4th industrial revolution, such as the Internet of Things, communication infrastructure, big data, artificial intelligence, AR/VR, and drones. We are developing smart tourism services such as recommended travel products, my travel itinerary, tourism information, and chatbots for tourists through the smart tourism app. In this paper, we develop a smart tourism service system that provides real-time location-based tourism information and weather information to tourists. The smart tourism service system consists of a smart tourism app, a smart tourism information system, and an IoT data collection device. The smart tourism information system receives weather information from the IoT data collection device installed in the tourist destination. The location-based smart tourism service is provided as a smart tourism app in the smart tourism information system according to the Beacon's UUID in the IoT data collection device. The smart tourism information system stores the Beacon's UUIDs received from tourists and provides a safe hiking service for tourists.

Approaches to Applying Social Network Analysis to the Army's Information Sharing System: A Case Study (육군 정보공유체계에 사회관계망 분석을 적용하기 위한방안: 사례 연구)

  • GunWoo Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.597-603
    • /
    • 2023
  • The paradigm of military operations has evolved from platform-centric warfare to network-centric warfare and further to information-centric warfare, driven by advancements in information technology. In recent years, with the development of cutting-edge technologies such as big data, artificial intelligence, and the Internet of Things (IoT), military operations are transitioning towards knowledge-centric warfare (KCW), based on artificial intelligence. Consequently, the military places significant emphasis on integrating advanced information and communication technologies (ICT) to establish reliable C4I (Command, Control, Communication, Computer, Intelligence) systems. This research emphasizes the need to apply data mining techniques to analyze and evaluate various aspects of C4I systems, including enhancing combat capabilities, optimizing utilization in network-based environments, efficiently distributing information flow, facilitating smooth communication, and effectively implementing knowledge sharing. Data mining serves as a fundamental technology in modern big data analysis, and this study utilizes it to analyze real-world cases and propose practical strategies to maximize the efficiency of military command and control systems. The research outcomes are expected to provide valuable insights into the performance of C4I systems and reinforce knowledge-centric warfare in contemporary military operations.

Encounter Measure System Against Cyber-Terror And Legalism (사이버테러 대응체제와 법치주의)

  • Jeong, Jun-hyeon;Kim, Kui-nahm
    • Convergence Security Journal
    • /
    • v.4 no.3
    • /
    • pp.83-90
    • /
    • 2004
  • Preventive measures and control over cyber terrorism in Korea is a complex problem. Today laws should meet requirements made by modern technologies development, Law enforcement, special services and judicial system cooperation, their efforts coordination and their material security are priority directions, None of the country is able to prevent cyber terror independently and international cooperation in this field is vital. Taking the above into consideration, we propose and inisit that National Intelligence Service(NIS) should share cyber terror data with Police Agency and have top police authority over the cyber terror.

  • PDF