• Title/Summary/Keyword: Threat Integration

Search Result 55, Processing Time 0.021 seconds

Managing the Reverse Extrapolation Model of Radar Threats Based Upon an Incremental Machine Learning Technique (점진적 기계학습 기반의 레이더 위협체 역추정 모델 생성 및 갱신)

  • Kim, Chulpyo;Noh, Sanguk
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.4
    • /
    • pp.29-39
    • /
    • 2017
  • Various electronic warfare situations drive the need to develop an integrated electronic warfare simulator that can perform electronic warfare modeling and simulation on radar threats. In this paper, we analyze the components of a simulation system to reversely model the radar threats that emit electromagnetic signals based on the parameters of the electronic information, and propose a method to gradually maintain the reverse extrapolation model of RF threats. In the experiment, we will evaluate the effectiveness of the incremental model update and also assess the integration method of reverse extrapolation models. The individual model of RF threats are constructed by using decision tree, naive Bayesian classifier, artificial neural network, and clustering algorithms through Euclidean distance and cosine similarity measurement, respectively. Experimental results show that the accuracy of reverse extrapolation models improves, while the size of the threat sample increases. In addition, we use voting, weighted voting, and the Dempster-Shafer algorithm to integrate the results of the five different models of RF threats. As a result, the final decision of reverse extrapolation through the Dempster-Shafer algorithm shows the best performance in its accuracy.

Monitoring the Desiccation of Inland Wetland by Combining MNDWI and NDVI: A Case Study of Upo Wetland in South Korea (MNDWI와 NDVI의 통합을 통한 내륙습지의 육화현상 추적: 우포늪을 사례로)

  • Hwang, Young Seok;Um, Jung-Sup
    • Spatial Information Research
    • /
    • v.23 no.6
    • /
    • pp.31-41
    • /
    • 2015
  • This research is primarily intended to explore a novel way to monitor desiccation of inland wetland by combining MNDWI (Modified Normalized Difference Water Index) and NDVI (Normalized Difference Vegetation Index). The changes for vegetation and water condition on Upo Wetland located at southeastern Korea were investigated by MNDWI and NDVI derived from 2002, 2010 and 2015 Landsat data. The integrated use of MNDWI and NDVI made it possible to identify area-wide vegetation cover changes and to assess water storage changes on multi-annual time scales simultaneously. Comparing MNDWI with NDVI reveals the quantitative evidences for anthropogenic and environmental influences (such as road, building, water) causing an accelerated wetland desiccation. In fact, our monitoring approach raises critical issues regarding the hydrological cycle and its inter-annual changes for inland wetland under threat of drying up and highlights the important role of MNDWI and NDVI integration for any urgent or long-term treatment plan. This research presents scientific and objective evidences to support integrated approach of NDVI and MNDWI in exploring drying up trends of wetlands.

A Study of Software Architecture Design Methods for Multiple Access Con trol under Web-based Medical Information System Environment (웹 기반 의료정보시스템 다중 접근제어를 위한 소프트웨어아키텍쳐 설계방법)

  • Noh, Si-Choon;Hwang, Jeong-Hee
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.43-49
    • /
    • 2011
  • Web-based health information provides a lot of conveniences, however the security vulnerabilities that appear in the network environment without the risk of exposure in the use of information are growing. Web-based medical information security issues when accessing only the technology advances, without attempting to seek a safe methodology are to increase the threat element. So it is required. to take advantage of web-based information security measures as a web-based access control security mechanism-based design. This paper is based on software architecture, design, ideas and health information systems were designed based on access control security mechanism. The methodologies are to derive a new design procedure, to design architecture and algorithms that make the mechanism functio n. To accomplish this goal, web-based access control for multiple patient information architecture infrastructures is needed. For this software framework to derive features that make the mechanism was derived based on the structure. The proposed system utilizes medical information, medical information when designing an application user retrieves data in real time, while ensuring integration of encrypted information under the access control algorithms, ensuring the safety management system design.

A Study of Methodology Based on Role-Based Serucity Agent Medical Information System Security Architecture Design (보안 에이전트 역할 기반에 기초한 의료정보시스템 소프트웨어 보안아키텍쳐 설계방안)

  • Lee, Dae-Sung;Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.77-83
    • /
    • 2011
  • In addition to the rapid development of health information technology services for the development of new medical information, a lot of research is underway. Improve health care services for patients are many ways to help them. However, no information about the security, if only the technology advances in health care systems will create an element of risk and threat. Today's issues and access issues are stable over a public network. Ad hocsensor network using secure, non-integrated health information system's security vulnerabilities does not solve the security vulnerabilities. In the development and utilization of health information systems to be subject to greater restrictions. Different security policies in an environment with a medical information system security policy mechanism that can be resolved if people get here are needed. Context-aware and flexible policy of integration and confidential medical information through the resistance should be guaranteed. Other cross-domain access control policy for telecommunications should be protected. In this paper, that the caller's medical information system, diversification, diversification Security agent in the environment, architecture, design, plan, role-based security system are proposed. The proposed system architecture, design work in the field and in the utilization of one model are expected to be.

Sensitivity Analysis of Simulated Precipitation System to the KEOP-2004 Intensive Observation Data (KEOP-2004 집중관측 자료에 대한 강수예측의 민감도 분석)

  • Park, Young-Youn;Park, Chang-Geun;Choi, Young-Jean;Cho, Chun-Ho
    • Atmosphere
    • /
    • v.17 no.4
    • /
    • pp.435-453
    • /
    • 2007
  • KEOP (Korea Enhanced Observing Period)-2004 intensive summer observation was carried out from 20 June to 5 July 2004 over the Southwestern part of the Korean peninsula. In this study, the effects of KEOP-2004 intensive observation data on the simulation of precipitation system are investigated using KLAPS (Korea Local Analysis and Prediction System) and PSU/NCAR MM5. Three precipitation cases during the intensive observation are selected for detailed analysis. In addition to the control experiments using the traditional data for its initial and boundary conditions, two sensitivity experiments using KEOP data with and without Jindo radar are performed. Although it is hard to find a clear and consistent improvement in the verification score (threat score), it is found that the KEOP data play a role in improving the position and intensity of the simulated precipitation system. The experiments started at 00 and 12 UTC show more positive effect than those of 06 and 18 UTC. The effect of Jindo radar is dependent on the case. It plays a significant role in the heavy rain cases related to a mesoscale low over Changma front and the landing of a Typhoon. KEOP data produce more strong difference in the 06/18 UTC experiments than in 00/12 UTC, but give more positive effects in 00/12 UTC experiments. One of the possible explanations for this is that : KEOP data could properly correct the atmosphere around them when there are certain amounts of data, while gives excessive effect to the atmospheric field when there are few data. CRA analysis supports this reasoning. According to the CRA (Contiguous Rain Area) analysis, KEOP data in 00/12 UTC experiments improve only the surrounding area, resulting in essentially same precipitation system so the effects remain only in each convective cell rather than the system itself. On the other hand, KEOP data modify the precipitation system itself in 06/18 UTC experiments. Therefore the effects become amplified with time integration.

A Hybrid Vulnerability of NFC Technology in Smart Phone (스마트폰에서 NFC를 이용한 융.복합 하이브리드 취약점)

  • Park, Chang Min;Park, Neo;Park, Won Hyung
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.3-8
    • /
    • 2012
  • Smartphones have all the recent technology integration and NFC (Near Field Communication) Technology is one of them and become an essential these days. Despite using smartphones with NFC technology widely, not many security vulnerabilities have been discovered. This paper attempts to identify characteristics and various services in NFC technology, and to present a wide range of security vulnerabilities, prevention, and policies especially in NFC Contactless technology. We describe a security vulnerability and an possible threat based on human vulnerability and traditional malware distribution technic using Peer-to-Peer network on NFC-Enabled smartphones. The vulnerability is as follows: An attacker creates a NFC tag for distributing his or her malicious code to unspecified individuals and apply to hidden spot near by NFC reader in public transport like subway system. The tag will direct smartphone users to a certain website and automatically downloads malicious codes into their smartphones. The infected devices actually help to spread malicious code using P2P mode and finally as traditional DDoS attack, a certain target will be attacked by them at scheduled time.

A Study on Analysis and Countermeasure of Security threat in NFC (NFC 서비스 보안 위협 분석 및 대응방안 연구)

  • Kim, Hyung-Uk;Kim, Hyung-joo;Kang, Jung-ho;Jun, Moon-seog
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.183-191
    • /
    • 2016
  • Most recent trend reveals broader state of provision of NFC service as NFC technology was applied on smartphones which has become core communication tools by providing integrated services such as payment, medical, and personal authentication. Moreover, with integration of original service and NFC technology, new service providers now can handle personal information of original service or can handle other personal information with transition of previous service provider to NFC service provider. Considering current state of security industry along with NFC technology and service, we would like to analyze current stage of security threats and plan the counter strategies to create NFC service structure.

Research of Small Fixed-Wing Swarm UAS (소형 고정익 무인기 군집비행 기술 연구)

  • Myung, Hyunsam;Jeong, Junho;Kim, Dowan;Seo, Nansol;Kim, Yongbin;Lee, Jaemoon;Lim, Heungsik
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.12
    • /
    • pp.971-980
    • /
    • 2021
  • Recently popularized drone technologies have revealed that low-cost small unmanned aerial vehicles(UAVs) can be a significant threat to prevailing power by operating in group or in swarms. Researchers in many countries have tried to utilize integrated swarm unmanned aerial system(SUAS) in the battlefield. Agency for Defense Development also identified four core technologies in developing SUAS: swarm control, swarm network, swarm information, and swarm collaboration, and the authors started researches on swarm control and network technologies in order to be able to operate vehicle platforms as the first stage. This paper introduces design and integration of SUAS consisting of small fixed-wing UAVs, swarm control and network algorithms, a ground control system, and a launcher, with which swarm control and network technologies have been verified by flight tests. 19 fixed-wing UAVs succeeded in swarm flight in the final flight test for the first time as a domestic research.

US, China and the Russo-Ukraine War: The Conditions for Generating a Mutually Perceived Hurting Stalemate and Consequent Ceasefire In Moscow and Kyiv

  • Benedict E. DeDominicis
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.4
    • /
    • pp.177-192
    • /
    • 2023
  • A prerequisite for a lasting ceasefire is the emergence of a prevailing view in Moscow and Kyiv that the fighting has reached a hurting stalemate. In sum, they both lose more through continuing warfare than by a ceasefire. This study applies social identity dynamics of nationalism to this escalatory conflict. It generates findings that imply that China as a third-party great power intervening mediator can potentially play a pivotal role. Shifting the respective prevailing views in Moscow and Kyiv of their interaction from a zero-sum foundation requires proffering powerful economic and political third-party incentives. Effective inducement would facilitate national defense, development and prestige for Moscow as well as Kyiv. China arguably has the underutilized potential power capabilities necessary to alter the respective prevailing views of strategic relationships among the great powers within Moscow, Brussels and Washington. A prerequisite for success in striving effectively towards this strategic goal is cooperation with the Beijing despite skepticism from Washington. This study utilizes a process tracing methodological approach. It highlights that the foundations of the Russo-Ukraine war lie in the institutionalization within Euro-Atlantic integration of the Cold War assumption that the USSR was an imperialist revisionist actor. Russia is the USSR's successor state. Moscow's prevailing view is that Russian national self-determination was unjustly circumscribed in the multinational Soviet totalitarian Communist system. The Euro-Atlantic community is perceived as a neocolonial imperial threat by allying with post-1991 Ukrainian nationalism at Russia's expense. The study finds that acknowledging Eurasian regional multipolarity is necessary, if not sufficient, to coopt Beijing into a global political stabilization strategy. It functionally aims to promote international balancing to lessen potentials for horizontal as well as vertical escalation of the Russo-Ukrainian conflict.

Accommodation of Trade Measures for Environment Purposes on the WTO Rules (환경조치의 WTO체제 수용에 관한 연구)

  • Chae, Dae-Seok;Kim, Mie-Jung
    • International Commerce and Information Review
    • /
    • v.13 no.3
    • /
    • pp.433-457
    • /
    • 2011
  • This study attempts to make a constructive contribution to the debate on which WTO rules accommodate trade measures for environmental purposes. Does trade undermine the regulatory efforts of governments. However, the theoretical dimensions are partly addressed on the several key questions. For instances, is economic integration through trade and investment a threat to the environment? to control pollution and resource degradation? Will economic grow driven by trade help us to move towards a sustainable use of the world's environmental resources? The growing world economy has been accompanied by environmental degradation including deforestation, losses in bio-diversity, global warming, air pollution, depletion of the ozone layer, overfishing and so on. The sheer number of us obviously put pressure on natural resources and ecological systems, and this pressure will counting to rise as we grow towards 10 billion in the next century. What is more, there is no indication that consumption per capita is slowing. The perceived costs of acting alone in terms of lost investments and jobs often take the stream out of regulatory initiatives. In the worst case scenario environmental community is fearful that international trade will magnify the effects of poor environmental polices in the world Generally, economic growth drive by trade may speed up the process of environmental degradation unless sufficient environmental safeguards are put in place. Under these circumstances, this paper attempts to make a constructive contribution to the study on which WTO rules accommodate trade measures for environmental purposes.

  • PDF