• Title/Summary/Keyword: Smart Defense

Search Result 169, Processing Time 0.02 seconds

A Model of Artificial Intelligence in Cyber Security of SCADA to Enhance Public Safety in UAE

  • Omar Abdulrahmanal Alattas Alhashmi;Mohd Faizal Abdullah;Raihana Syahirah Abdullah
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.173-182
    • /
    • 2023
  • The UAE government has set its sights on creating a smart, electronic-based government system that utilizes AI. The country's collaboration with India aims to bring substantial returns through AI innovation, with a target of over $20 billion in the coming years. To achieve this goal, the UAE launched its AI strategy in 2017, focused on improving performance in key sectors and becoming a leader in AI investment. To ensure public safety as the role of AI in government grows, the country is working on developing integrated cyber security solutions for SCADA systems. A questionnaire-based study was conducted, using the AI IQ Threat Scale to measure the variables in the research model. The sample consisted of 200 individuals from the UAE government, private sector, and academia, and data was collected through online surveys and analyzed using descriptive statistics and structural equation modeling. The results indicate that the AI IQ Threat Scale was effective in measuring the four main attacks and defense applications of AI. Additionally, the study reveals that AI governance and cyber defense have a positive impact on the resilience of AI systems. This study makes a valuable contribution to the UAE government's efforts to remain at the forefront of AI and technology exploitation. The results emphasize the need for appropriate evaluation models to ensure a resilient economy and improved public safety in the face of automation. The findings can inform future AI governance and cyber defense strategies for the UAE and other countries.

Implementation of a KPI Focused e-QMS: A Case Study in the Aerospace & Defense Industry (KPI 중심의 e-QMS 구현: 우주항공 및 방위 산업 사례 연구)

  • Jae Young Shin;Wan Seon Shin
    • Journal of Korean Society for Quality Management
    • /
    • v.51 no.1
    • /
    • pp.131-154
    • /
    • 2023
  • Purpose: The purpose of this paper is to design an integrated informatization system that can manage quality & KPI by integrating management systems in the aerospace and defense industry, and study the effect on KPI when applied to related companies. Methods: The 7 management systems required for integration in the AS&D industry were studied, and an empirical analysis was conducted for H company in South Korea for the application of e-QMS integrated informatization & KPI system based on security environment and open quality. Results: The results of this study were analyzed to have an effect on the improvement of customer satisfaction and the positive improvement of quality failure cost in the aerospace and defense industry. And it was analyzed that it works to continuously comply with ethical management and environmental laws and prevent safety accidents. Conclusion: The greatest significance of this study is that it attempted to build an e-QMS integrated system in the aerospace and defense industry. Considering that the case of integrated management system and integrated operation of KPI in related industries has not been introduced in the existing literature, the results of this study will be shared as a meaningful preceding study in the era of digital quality information. In addition, the fact that the open-quality quality innovation methodology emphasizing measurement(M), tracking(T), and connection(C) was actually applied in an AS&D company and its effectiveness was objectively proven. It is expected that it will be a good paper for follow-up research.

A Study on the Information Modeling of Defense R&D Process Using IDEF Methodology (IDEF 방법론을 이용한 국방 연구개발 프로세스의 정보모델링 연구)

  • Kim, Chul-Whan
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.1
    • /
    • pp.41-60
    • /
    • 2005
  • IDEF(Integrated Definition) method, a standard methodology of CALS process modelling, was applied to the weapon system R&D process to provide information modelling by analysing about goal, input, output and constraints in the R&D process. The information to be managed in R&D institutes was identified by using SmartER which is the automation program of IDEF1/1X and obtained information modelling for TO-BE model. The work process of weapon system R&D consists of the concept study phase, the exploration development phase, the system development phase, the prototype manufacturing phase, and the report writing of R&D results phase. The information modelling of weapon system R&D is the R&D work process with information sharing by means of IWSDB Since IDEF is suitable for large scale system development like weapon system R&D, further studies on IDEF would be required to achieve the goal of defense CALS.

  • PDF

A Survey of Decentralized Finance(DeFi) based on Blockchain

  • Kim, Junsang;Kim, Seyong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.3
    • /
    • pp.59-67
    • /
    • 2021
  • Blockchain technology began in 2008 when an unidentified person named Satoshi Nakamoto proposed a cryptocurrency called Bitcoin. Satoshi Nakamoto had distrust of the existing financial system and wanted to implement a financial system that is robust against hacking or mannipulation without a middleman such as a bank through blockchain technology. Satoshi proposed a blockchain as a technology to prevent the creation of the bitcoin and forging of transactions, and through this, the functions of issuance, transaction, and verification of currency were implemented. Since then, Ethereum, a cryptocurrency that can implement the smart contract on the blockchain, has been developed, allowing financial products that require complex contracts such as deposits, loans, insurance, and derivatives to be brought into the area of cryptocurrency. In addition, it is expanding the possibility of substituting products provided by financial institutions through combination with real assets. These applications are defined as Decentralized Finance (DeFi). This paper was prepared to understand the overall technical understanding of DeFi and to introduce the services currently in operation. First, the technologies and ecosystems that implement the overall DeFi are explained, and then the representative DeFi services are categorized by feature and described.

Development of NCS and Embedded System-Based Training Program for Smart Manufacturing Application (스마트제조 적용을 위한 NCS 및 임베디드 기반 교육훈련 프로그램 개발)

  • Lee, Woo-Young;Son, Deuk-soo;Oh, Jae-Jun;Yu, Jong-Hyeok
    • Journal of Practical Engineering Education
    • /
    • v.11 no.2
    • /
    • pp.283-289
    • /
    • 2019
  • Recently, product mobility, data compatibility and communication connectivity have become very important to the control system, depending on the application of smart manufacturing. Accordingly, embedded systems are essential in all industries including home appliances, telecommunication, and national defense. Therefore, the demand for embedded system development personnel is increasing further, and education and training programs are needed to combine the practical skills of industrial sites, including programming skills and hardware. Currently, embedded system education offers a variety of education centered on Aduino, but this is mostly for beginners and is not sufficient for majors. In addition, while various prototype studies related to embedded systems are active, the training and training programs for working-level human resources needed at industrial sites are very scarce. Therefore, in order to foster the working personnel of the embedded system for the application of smart manufacturing, this paper selected the capability unit through in-depth interviews and survey analysis of 10 experts based on NCS, and developed education and training programs and contents.

Smart Anti-jamming Mobile Communication for Cloud and Edge-Aided UAV Network

  • Li, Zhiwei;Lu, Yu;Wang, Zengguang;Qiao, Wenxin;Zhao, Donghao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.12
    • /
    • pp.4682-4705
    • /
    • 2020
  • The Unmanned Aerial Vehicles (UAV) networks consisting of low-cost UAVs are very vulnerable to smart jammers that can choose their jamming policies based on the ongoing communication policies accordingly. In this article, we propose a novel cloud and edge-aided mobile communication scheme for low-cost UAV network against smart jamming. The challenge of this problem is to design a communication scheme that not only meets the requirements of defending against smart jamming attack, but also can be deployed on low-cost UAV platforms. In addition, related studies neglect the problem of decision-making algorithm failure caused by intermittent ground-to-air communication. In this scheme, we use the policy network deployed on the cloud and edge servers to generate an emergency policy tables, and regularly update the generated policy table to the UAVs to solve the decision-making problem when communications are interrupted. In the operation of this communication scheme, UAVs need to offload massive computing tasks to the cloud or the edge servers. In order to prevent these computing tasks from being offloaded to a single computing resource, we deployed a lightweight game algorithm to ensure that the three types of computing resources, namely local, edge and cloud, can maximize their effectiveness. The simulation results show that our communication scheme has only a small decrease in the SINR of UAVs network in the case of momentary communication interruption, and the SINR performance of our algorithm is higher than that of the original Q-learning algorithm.

Development of Automatic Terrain Following Simulator Using Digital Terrain Elevation Data (디지털 지형 고도 데이터를 이용한 자동 지형 추종 시뮬레이터 개발)

  • Jisu Lee;MunGyou Yoo;Hyunju Lee;Ki Hoon Song;Dong-Ik Cheon;Sangchul Lee
    • Journal of Aerospace System Engineering
    • /
    • v.18 no.1
    • /
    • pp.88-98
    • /
    • 2024
  • In this paper, an Automatic Terrain Following (ATF) Simulator using Digital Terrain Elevation Data (DTED) was proposed. This ATF Simulator consists of a Flight Simulator, a Radar Simulator, and a Terrain Following Computer (TFC) Simulator. DTED and radar scan data generated with DTED were used as the terrain information necessary for terrain following. The ATF Simulator provides three modes of operation: a passive mode that uses DTED, an active mode that uses radar scan data, and a hybrid mode that uses both. We developed an ATF Simulator that could reduce the cost and time required to develop a terrain following system using the LabVIEW development environment and the MATLAB App Designer development environment. It was verified by confirming that the ATF Simulator met all functional requirements.

Cross-layer Design of Joint Routing and Scheduling for Maximizing Network Capacity of IEEE 802.11s based Multi-Channel SmartGrid NAN Networks (IEEE 802.11s 를 사용한 스마트그리드 NAN 네트워크의 최대 전송 성능을 위한 다중 채널 스케쥴링과 라우팅의 결합 설계)

  • Min, Seok Hong;Kim, Bong Gyu;Lee, Jae Yong;Kim, Byung Chul
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.5
    • /
    • pp.25-36
    • /
    • 2016
  • The goal of the SmartGrid is to maximize energy efficiency by exchanging bi-directional real-time power information with the help of ICT(Information and Communication Technology). In this paper, we propose a "JRS-MS" (Joint Routing and Scheduling for Multi-channel SmartGrid) algorithm that uses numerical modeling methods in IEEE 802.11s based STDMA multi-channel SmartGrid NAN networks. The proposed algorithm controls the amount of data transmission adaptively at the link layer and finds a high data-rate path which has the least interference between traffic flows in multi-channel SmartGrid NAN networks. The proposed algorithm improve transmission performance by enhancing network utilization. By comparing the results of performance analysis between the proposed algorithm and the JRS-SG algorithm in the previous paper, we showed that the JRS-MS algorithm can improve transmission performance by maximally utilizing given network resources when the number of flows are increasing in the multi-hop NAN wireless mesh networks.

Classification of HTTP Automated Software Communication Behavior Using a NoSQL Database

  • Tran, Manh Cong;Nakamura, Yasuhiro
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.2
    • /
    • pp.94-99
    • /
    • 2016
  • Application layer attacks have for years posed an ever-serious threat to network security, since they always come after a technically legitimate connection has been established. In recent years, cyber criminals have turned to fully exploiting the web as a medium of communication to launch a variety of forbidden or illicit activities by spreading malicious automated software (auto-ware) such as adware, spyware, or bots. When this malicious auto-ware infects a network, it will act like a robot, mimic normal behavior of web access, and bypass the network firewall or intrusion detection system. Besides that, in a private and large network, with huge Hypertext Transfer Protocol (HTTP) traffic generated each day, communication behavior identification and classification of auto-ware is a challenge. In this paper, based on a previous study, analysis of auto-ware communication behavior, and with the addition of new features, a method for classification of HTTP auto-ware communication is proposed. For that, a Not Only Structured Query Language (NoSQL) database is applied to handle large volumes of unstructured HTTP requests captured every day. The method is tested with real HTTP traffic data collected through a proxy server of a private network, providing good results in the classification and detection of suspicious auto-ware web access.

A Study on Social Media Marketing Strategies for Digital Libraries (디지털도서관의 소셜미디어 마케팅 전략에 관한 연구)

  • Hwang, Jae-Young;Koo, Chan-Mi
    • Journal of Information Management
    • /
    • v.42 no.4
    • /
    • pp.225-242
    • /
    • 2011
  • With the development of the IT and internet, companies try to use Blogs, Twitter, Facebook, smart phone for their marketing and customer relationship management. What is called social media marketing appear and it lead to new value creation to the company. However, until now most of libraries in Korea didn't have much interest in marketing and PR. In recent, libraries are starting to be interested in marketing and social network service. Library try to use social network service for marketing. This research introduces the various cases and status of using social network service for marketing in Korea and international library field, analyzes these cases from a marketing perspective. Finally, this research suggests the considerations and successful strategy for using social media marketing in library field.