• Title/Summary/Keyword: Technology protection

Search Result 5,023, Processing Time 0.046 seconds

A Trend Analysis and Technology Application of Defense Technology Protection (방위산업 기술보호 동향분석 및 기법적용)

  • Lee, Hyo Keun;Lee, Woon Soon;Oh, Yoo Jin;Park, ShinSuk
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.4
    • /
    • pp.579-586
    • /
    • 2017
  • The defense industry has become a global industry, and military technology is actively being traded between countries to increase their military capabilities. The Republic of Korea has been ranked one of the top 10 countries for exports of military technology. To maintain competitive advantages in the global defense industry, it is essential to protect key technologies employed by exported weapon systems. Various techniques have been developed for protection of confidential technologies in weapon systems, and the U.S. DoD has been leading the development of the protection techniques. This paper reviews current anti-tampering techniques that prevent leakage of key technology from weapon exportation or pillage. Based on the protection techniques employed by the U.S. DoD Anti-Tamper Executive Agent, this paper suggests novel design methods for protection of confidential technologies. The proposed design methods were tested on an actual weapon system.

Development of a structure analytic hierarchy approach for the evaluation of the physical protection system effectiveness

  • Zou, Bowen;Wang, Wenlin;Liu, Jian;Yan, Zhenyu;Liu, Gaojun;Wang, Jun;Wei, Guanxiang
    • Nuclear Engineering and Technology
    • /
    • v.52 no.8
    • /
    • pp.1661-1668
    • /
    • 2020
  • A physical protection system (PPS) is used for the protection of critical facilities. This paper proposes a structure analytic hierarchy approach (SAHA) for the hierarchical evaluation of the PPS effectiveness in critical infrastructure. SAHA is based on the traditional analysis methods "estimate of adversary sequence interruption, EASI". A community algorithm is used in the building of the SAHA model. SAHA is applied to cluster the associated protection elements for the topological design of complicated PPS with graphical vertexes equivalent to protection elements.

Implementation and Evaluation of the Wibro-based Location Identification System for Air Base Protection Force (Wibro 기반 비행기지 방어전력 위치식별체계 구축 및 실험)

  • Pyo, Sang-Ho;Koo, Jung;Ko, Young-Bae;Kim, Ki-Hyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.3
    • /
    • pp.306-314
    • /
    • 2012
  • This paper proposes a new system to maximize efficiency of Air Base Protection Operations through the development of location identification software. The Wibro-based location identification system for Air Base Protection Force offers Blue Ground Force digitalized character message which is not exposed to enemy. Also, it is possible to automatically provide the location of Blue Ground Force to Air Base Ground Operations Center. The test result proves that this system is very helpful when Air Base Protection Force executes Air Base Protection Operations.

Protection Design and Lightning Zone Analysis for Unmanned Aerial Vehicle with Composite Wings (복합재 주익 무인항공기의 낙뢰보호 설계와 피격영역 해석)

  • Hee-chae Woo;Yong-Tae Kim
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.26 no.3
    • /
    • pp.302-312
    • /
    • 2023
  • This paper describes the analysis of lightning strike zoning, the indirect lightning data simulation and the protection design for lightning indirect effects of equipment by lightning strike for unmanned aircraft consisting of composite wings. Through the analysis of lightning strike zoning according to the external shape of unmanned aerial vehicles, the structure areas that should be protected during lightning strike is derived, and the protection requirements of lightning indirect effects for flight critical equipments and equipment that must be operated upon lightning strike was derived. Lightning protection levels according to the location of mounting equipment and surrounding structure materials for each equipment was derived, and the protection design of the unmanned aerial vehicle with composite structures was also proposed from direct effect of lightning. Later, the lightning protection technology will be verified by the ground test of lightning direct and indirect effects.

An Optimal Selective Protection Scheme for Scalable Video Coding

  • Hendry, Hendry;Kim, Munchurl
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2011.07a
    • /
    • pp.294-295
    • /
    • 2011
  • The fundamental problem of selective protection scheme for encoded bitstreams is to find an efficient algorithm to select the set of frames required to be encrypted that can maximize protection effect with the minimum amount of protected data is required. In this paper, we propose an optimal selective protection scheme for SVC bitstreams by protecting the best combination of frames for selective protection in the sense that the amount of data required for protection is minimized and the resulting visual quality degradation is maximized. The selection of the frames to be encrypted is done by first expressing R-Q (protection rate - visual quality) relationship with Lagragian cost model. The experimental results show that, compared to protecting SVC bitstreams layer by layer, the proposed scheme gives superior performance in terms of protection effectiveness due to its better selection of frames for protection given protection bit budgets.

  • PDF

Analysis of Security System Priority for the Systematic Defense Technology Security (체계적인 방위산업기술보호를 위한 보호체계 우선순위 분석 연구)

  • Park, Heungsoon;Kim, Seyong;Kim, Yonghwan
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.3-12
    • /
    • 2019
  • The outflow of defense technology can cause serious damage not only in terms of business losses, but also in terms of national security and national interests. Recently, the government has enacted the Defense Technology Security Act, recognizing the importance of technology in the defense industry, and prepared guidelines for the defense technology security accordingly. According to the law, institutions and companies with defense technologies should establish a defense technology protection system, and the government should implement various technology protection policies to improve their level of technology protection. In this study, the implications were derived by comparing existing technology protection guidelines and priority analysis was performed on the protection system details through AHP for self-diagnosis items in the defense technology security guidelines. As a result, it is expected that it will enable efficient diagnosis of the level of protection and policy support for the systematic establishment of the protection system for the target institutions.

연구소 소식

  • Korea Fire Protection Association
    • Fire Protection Technology
    • /
    • s.18
    • /
    • pp.67-69
    • /
    • 1995
  • PDF