• Title/Summary/Keyword: RMF A&A

Search Result 35, Processing Time 0.017 seconds

A Study on the Application of the Cyber Threat Management System to the Future C4I System Based on Big Data/Cloud (빅데이터/클라우드 기반 미래 C4I체계 사이버위협 관리체계 적용 방안 연구)

  • Park, Sangjun;Kang, Jungho
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.27-34
    • /
    • 2020
  • Recently, the fourth industrial revolution technology has not only changed everyday life greatly through technological development, but has also become a major keyword in the establishment of defense policy. In particular, Internet of Things, cloud, big data, mobile and cybersecurity technologies, called ICBMS, were selected as core leading technologies in defense information policy along with artificial intelligence. Amid the growing importance of the fourth industrial revolution technology, research is being carried out to develop the C4I system, which is currently operated separately by the Joint Chiefs of Staff and each military, including the KJCCS, ATCIS, KNCCS and AFCCS, into an integrated system in preparation for future warfare. This is to solve the problem of reduced interoperability for joint operations, such as information exchange, by operating the C4I system for each domain. In addition, systems such as the establishment of an integrated C4I system and the U.S. military's Risk Management Framework (RMF) are essential for efficient control and safe operation of weapons systems as they are being developed into super-connected and super-intelligent systems. Therefore, in this paper, the intelligent cyber threat detection, management of users' access to information, and intelligent management and visualization of cyber threat are presented in the future C4I system based on big data/cloud.

An algorithm for estimating surface normal from its boundary curves

  • Park, Jisoon;Kim, Taewon;Baek, Seung-Yeob;Lee, Kunwoo
    • Journal of Computational Design and Engineering
    • /
    • v.2 no.1
    • /
    • pp.67-72
    • /
    • 2015
  • Recently, along with the improvements of geometry modeling methods using sketch-based interface, there have been a lot of developments in research about generating surface model from 3D curves. However, surfacing a 3D curve network remains an ambiguous problem due to the lack of geometric information. In this paper, we propose a new algorithm for estimating the normal vectors of the 3D curves which accord closely with user intent. Bending energy is defined by utilizing RMF(Rotation-Minimizing Frame) of 3D curve, and we estimated this minimal energy frame as the one that accords design intent. The proposed algorithm is demonstrated with surface model creation of various curve networks. The algorithm of estimating geometric information in 3D curves which is proposed in this paper can be utilized to extract new information in the sketch-based modeling process. Also, a new framework of 3D modeling can be expected through the fusion between curve network and surface creating algorithm.

Analysis of Transient Performance of KALIMER-600 Reactor Pool by Changing the Elevation of Intermediate Heat Exchanger (중간 열교환기 높이 상승에 의한 KALIMER-600 원자로 풀 과도 성능 변화 분석)

  • Han, Ji-Woong;Eoh, Jae-Hyuk;Kim, Seong-O
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.34 no.11
    • /
    • pp.991-998
    • /
    • 2010
  • The effect of increasing the elevation of an IHX (intermediate heat exchanger) on the transient performance of the KALIMER-600 reactor pool during the early phase of a loss of normal heat sink accident was investigated. Three reactors equipped with IHXs that were elevated to different heights were designed, and the thermal-hydraulic analyses were carried out for the steady and transient state by using the COMMIX-1AR/P code. In order to analyze the effects of the elevation of an IHX between reactors, various thermal-hydraulic properties such as mass flow rate, core peak temperature, RmfQ (ratio of mass flow over Q) and initiation time of decay heat removal via DHX (decay heat exchanger) were evaluated. It was found that with an increase in the IHX elevation, the circulation flow rate increases and a steep rise in the core peak temperature under the same coastdown flow condition is prevented without a delay in the initiation of the second stage of cooling. The available coastdown flow range in the reactor could be increased by increasing the elevation of the IHX.

Comparisons of Foot Pressure Patterns between Experienced Skiers and Intermediate Skiers during Alpine Skiing (알파인 스킹 시 상급 스키어와 중급 스키어 간의 족저압력 패턴 비교)

  • Kim, Joo-Nyeon;Yoo, Si-Hyun;Ha, Sung-He;Kim, Jin-Hae;Ryu, Ji-Seon;Park, Sang-Kyoon;Yoon, Suk-Hoon
    • Korean Journal of Applied Biomechanics
    • /
    • v.24 no.1
    • /
    • pp.19-26
    • /
    • 2014
  • This study investigated foot pressure patterns between experienced skiers and intermediate skiers during alpine skiing. Five experienced skiers and five intermediate skiers participated in this study. Foot pressure measurement system was used to measure vertical ground reaction force (vGRF) and contact area under the six plantar regions. Each participant was asked to perform basic parallel turns and carved turns on a $18^{\circ}$ groomed slope. Each right turn was divided into the initiation phase, the steering phase 1 and 2. For the initiation phase of the basic parallel turns, significantly greater contact area was found on the LRF and RRF of the intermediate skiers (p<.05) and significantly greater vGRF was found on the LRF of the intermediate skiers (p<.05). Also significantly greater vGRF and contact area were found on the LRF and RRF of the intermediate skiers at the steering phase 1 (p<.05) and on the LRF of the intermediate skiers at the steering phase 2 (p<.05). For the carved turns, significantly greater vGRF and contact area were found on the LRF and RRF of the intermediate skiers at all three phase (p<.05). On the other hand, significantly greater vGRF was found on the RFF of the experienced skiers at the steering phase 1 (p<.05). Also significantly greater vGRF and contact area were found on the RMF of the experienced skiers at the steering phase 2 (p<.05). In order to increase performance, we suggest that the intermediate skiers should be unweighted at the initiation phase and shift the body weight to the forefoot of the outer foot at the steering phase 1. Also, the outer ski should be loaded more than the both skis at the steering phase 1 and 2.

The effects of the operation of an information security management system on the performance of information security (정보보호 관리체계의 지속적인 정보보호 관리과정(PDCA)이 정보보호 성과에 미치는 영향에 관한 실증 연구)

  • Jang, Sang-Soo;Lee, Sang-Joon;Noh, Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1123-1132
    • /
    • 2012
  • Many domestic organizations are introducing and operating various information security management systems capable of coping with technical, administrative, and legal issues comprehensively and systematically, in order to prevent various infringement incidents such as personal information disclosure and hacking preemptively and actively. However, empirical analyses regarding the extent to which an information security management system contributes to information security performance have not been fully conducted, even though enterprises and organizations are actively introducing such systems in order to achieve their information security objectives as a part of their organizational management activities in line with their respective business, by investing considerable effort and resources in developing and operating these systems. This approach can be used to apply, develop, and operate the information management system actively within an organization. this study focused on analyzing how each specific phase of the information security management system affects information security performance, compared with previous studies, which generally focus on the information security control item in analyzing information security performance. The information security management system was analyzed empirically to determine how the Security PCDA cycling model affects information security performance.