• Title/Summary/Keyword: Threat Decision

Search Result 129, Processing Time 0.027 seconds

Inductive Classification of Multi-Spectral Threat Data for Autonomous Situation Awareness (자율적인 상황인식을 위한 다중센서 위협데이타의 귀납적 분류)

  • Jeong, Yong-Woong;Noh, Sang-Uk;Go, Eun-Kyoung;Jeong, Un-Seob
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.3
    • /
    • pp.189-196
    • /
    • 2008
  • To build autonomous agents who can make a decision on behalf of humans in time-critical complex environments, the formulation of operational knowledge base could be essential. This paper proposes the methodology of how to formulate the knowledge base and evaluates it in a practical application domain. We analyze threat data received from the multiple sensors of Aircraft Survivability Equipment(ASE) for Korean helicopters, and integrate the threat data into the inductive model through compilation technique which extracts features of the threat data and relations among them. The compiled protocols of state-action rules can be implemented as the brain of the ASE. They can reduce the amounts of reasoning, and endow the autonomous agents with reactivity and flexibility. We report experimental results that demonstrate the distinctive and predictive patterns of threats in simulated battlefield settings, and show the potential of compilation methods for the successful detection of threat systems.

Artificial Intelligence based Threat Assessment Study of Uncertain Ground Targets (불확실 지상 표적의 인공지능 기반 위협도 평가 연구)

  • Jin, Seung-Hyeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.305-313
    • /
    • 2021
  • The upcoming warfare will be network-centric warfare with the acquiring and sharing of information on the battlefield through the connection of the entire weapon system. Therefore, the amount of information generated increases, but the technology of evaluating the information is insufficient. Threat assessment is a technology that supports a quick decision, but the information has many uncertainties and is difficult to apply to an advanced battlefield. This paper proposes a threat assessment based on artificial intelligence while removing the target uncertainty. The artificial intelligence system used was a fuzzy inference system and a multi-layer perceptron. The target was classified by inputting the unique characteristics of the target into the fuzzy inference system, and the classified target information was input into the multi-layer perceptron to calculate the appropriate threat value. The validity of the proposed technique was verified with the threat value calculated by inputting the uncertain target to the trained artificial neural network.

L-band Pulsed Doppler Radar Development for Main Battle Tank (전차 탑재 L-밴드 펄수 도플러 레이더 설계 및 제작)

  • Park, Gyu-Churl;Ha, Jong-Soo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.20 no.6
    • /
    • pp.580-588
    • /
    • 2009
  • A Missile Warning Radar is an essential sensor for active protection system to detect antitank missile in all weather environments. This paper presents the design, development, and test results of L-band pulsed Doppler radar system for main battle tank. This radar system consists of 3 LRUs, which include antenna unit, transmitter and receiver unit and radar signal & data processing unit. The developed core technologies include the patch antenna, SSPA transmitter, coherent I/Q detector, DSP based Doppler FFT filter, adaptive CFAR, SIW tracking capability, and threat decision. The design performance of the developed radar system is verified through various ground fixed and moving vehicle test.

Decision Support System for the Water Supply System in Fukuoka, Japan

    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2001.05a
    • /
    • pp.15-24
    • /
    • 2001
  • This study introduces an integrated decision support system (DSS) for the water supply system in Fukuoka City, Japan. The objective is to conceive a comprehensive tool that may aid decision-makers to derive the best water supply alternatives from a multi-reservoir system in order to minimize the long-term drought damages and threat of water shortage. The present DSS consists of graphical user interface (GUI), a database manager, and mathematical models for runoff analysis, water demand forecasting, and reservoir operation. The methodology applied explicitly integrates the drought risk assessment based on the concept of reliability, resiliency, and vulnerability, as constraints to derive the management operation. The application of the DSS to the existing water supply system in Fukuoka City was found to be an efficient tool to facilitate the examination of a sequence of water supply scenarios toward an improved performance of the actual water supply system during periods of drought.

  • PDF

IP-CCTV Risk Decision Model Using AHP (Cloud Computing Based) (AHP를 활용한 IP-CCTV 위험 결정 모델 (클라우드 컴퓨팅 기반으로))

  • Jung, Sung-hoo;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.229-239
    • /
    • 2018
  • This paper analyzes the problems of existing CCTV and discusses cyber security problems of IP-CCTV in cloud computing environment. In order to reduce the risk of simply removing the risk associated with the provision of cloud services, the risk analysis and counter-measures need to be carried out effectively. Therefore, the STRIDE model as the Threat Risk Modeling is used to analyze the risk factors, and Analytic Hierarchy Process(AHP) is used to measure risk priorities based on the analyzed threats.

Effects of the User's Perceived Threat to Freedom and Personalization on Intention to Use Recommendation Services (자유 위협과 개인화에 대한 사용자의 지각이 상품 추천 서비스 수용에 미치는 영향)

  • Lee, Gyu-Dong;Kim, Jong-Uk;Lee, Won-Jun
    • Asia pacific journal of information systems
    • /
    • v.17 no.1
    • /
    • pp.123-145
    • /
    • 2007
  • There are flourishing studies in the acceptance or usage of information systems literature. Most of them have taken the pro - acceptance view. Undesirably, information technologies often provoke users' reactance or resistance. This paper explores one of the negative reactions -psychological reactance. The present paper studies the effects of the users' perception of threatened freedom and personalization degree on intention to use recommendation services. High personalization can be a major motivation for users to accept recommendation systems. However recommendation services are a two-edged sword, which not only provides users the efficiency of decision making but also poses threats to free choice. When people consider that their freedom is reduced or threatened by others, they experience the motivational state to restore the freedom. This motivational state must be considered in understanding usage of information systems, especially personalized services which are designed for persuasion or compliance. This paper empirically investigates the effect of personalization and the psychological reactance on the intention to use information systems in the personalized recommendation context. Users' perception of personalization increases the usefulness of recommendation service while their perception of threat to freedom reduces the intention to use personalized recommendation service. Findings and implications are discussed.

GAP: A Study on Strategic Derivation Approach Using Perceptual Difference

  • Yang, Hoe-Chang;Huh, Moo-Yul;Yang, Woo-Ryeong
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.2
    • /
    • pp.17-26
    • /
    • 2018
  • Purpose - The purpose of this study is to provide a formalized process of decision making for companies or organizations that need to make various decisions in the age of uncertainty. Therefore, this study aimed to proposes a strategic decision-making approach citing the relatively easily accessible using IPA(important-performance analysis) and SWOT/AHP analysis. Research design, data, and methodology - To be specific, the first step is to derive necessary attributes and conduct IPA. The second step is to subdivide the IPA results into internal strength and weakness factors and the external opportunity and threat factors, hierarchize those factors, and weight them accordingly. The third step is to build a causality model to propose a method of supporting a rational decision making. Results - The foregoing approach seems to facilitate the diversification of decision-making strategies by helping businesses or organizations to measure and analyze the attributes needed for certain decisions. Additionally, the perceived importance and satisfaction (or achievement) usage of those derived attributes can be used as the reference data for SWOT/AHP analysis. Conclusions - The proposed stepwise approach is applicable to businesses or organizations in need of making stepwise decisions in line with their retained competencies in comparison to conventional or intuitive decision-making practices.

Reliability Analysis of Interleaved Memory with a Scrubbing Technique (인터리빙 구조를 갖는 메모리의 스크러빙 기법 적용에 따른 신뢰도 해석)

  • Ryu, Sang-Moon
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.20 no.4
    • /
    • pp.443-448
    • /
    • 2014
  • Soft errors in memory devices that caused by radiation are the main threat from a reliability point of view. This threat can be commonly overcome with the combination of SEC (Single-Error Correction) codes and scrubbing technique. The interleaving architecture can give memory devices the ability of tolerating these soft errors, especially against multiple-bit soft errors. And the interleaving distance plays a key role in building the tolerance against multiple-bit soft errors. This paper proposes a reliability model of an interleaved memory device which suffers from multiple-bit soft errors and are protected by a combination of SEC code and scrubbing. The proposed model shows how the interleaving distance works to improve the reliability and can be used to make a decision in determining optimal scrubbing technique to meet the demands in reliability.

A Coherent Model in Upholding General Deterrence Theory and Impact to Information Security Management

  • Choi, Myeong-Gil;Ramos, Edwin R.;Kim, Man-Sig;Kim, Jin-Soo;Whang, Jae-Hoon;Kim, Ki-Joo
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.3
    • /
    • pp.73-86
    • /
    • 2009
  • To establish an effective security strategy, business enterprises need a security benchmarking tool. The strategy helps to lessen an impact and a damage in any threat. This study analyses many aspects of information security management and suggests a way to deal with security investments by considering important factors that affect security manager's decision. To address the different threats resulting from a major cause of accidents inside an enterprise, we investigate an approach that followed ISO17799. We unfold a criminology theory that has designated many measures against the threat as suggested by General Deterrence Theory. The study proposes a coherent model of the theory to improve the security measures especially in handling and protecting company assets and human lives as well.

  • PDF

A Study on the New Threat Level Decision Method for Information System (새로운 정보시스템 위협수준결정방법론에 대한 연구)

  • Kim, Tai-Hoon;Yeo, Sang-Soo;Cho, Sung-Eon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.12
    • /
    • pp.2280-2286
    • /
    • 2007
  • Information system contains various components, and these components can be categorized into some types. When preparing security level management activity, it is most important to define the target of management activity. And after deciding these targets, security level management activity can be started. This paper defines management targets by dividing information system into some parts, and shows these targets can be managed variously according to operation environments and characteristics.