首页 > 最新文献

Journal of The Korean Institute of Defense Technology最新文献

英文 中文
A Study on the Data Pseudonymization Methodology for Defense Training Data as Artificial Intelligence Technology is applied to the Defense Field 人工智能技术应用于国防领域的国防训练数据假名化方法研究
Pub Date : 2023-09-01 DOI: 10.52682/jkidt.2023.5.3.1
Hyunsuk Cho, Sujin Kang, Dongrae Cho, Yeongseop Shin
Recently, in the defense field, efforts are being made to collect data by building data centers to incorporate artificial intelligence technology. Weapon system training data can be used as input data for artificial intelligence models and can be used as high-quality data to maximize training performance and develop military strategies. However, training data contains personal information such as the names and military numbers of the personnel who operated the equipment, and training records that reveal the characteristics of the weapon system. If such data is passed on to the enemy, not only the specifications and performance of the weapon system but also the proficiency of each operator may be exposed. In this paper, we propose a pseudonym processing methodology for education and training data security and also suggest a direction for revising related laws.
最近,在国防领域,正在努力通过建立数据中心来整合人工智能技术来收集数据。武器系统训练数据可以作为人工智能模型的输入数据,可以作为高质量的数据来最大化训练性能和制定军事战略。然而,训练数据包含个人信息,如操作设备的人员的姓名和军号,以及揭示武器系统特征的训练记录。如果这些数据被传递给敌人,不仅武器系统的规格和性能,而且每个操作人员的熟练程度都可能暴露。本文提出了一种教育培训数据安全的假名处理方法,并提出了相关法律的修订方向。
{"title":"A Study on the Data Pseudonymization Methodology for Defense Training Data as Artificial Intelligence Technology is applied to the Defense Field","authors":"Hyunsuk Cho, Sujin Kang, Dongrae Cho, Yeongseop Shin","doi":"10.52682/jkidt.2023.5.3.1","DOIUrl":"https://doi.org/10.52682/jkidt.2023.5.3.1","url":null,"abstract":"Recently, in the defense field, efforts are being made to collect data by building data centers to incorporate artificial intelligence technology. Weapon system training data can be used as input data for artificial intelligence models and can be used as high-quality data to maximize training performance and develop military strategies. However, training data contains personal information such as the names and military numbers of the personnel who operated the equipment, and training records that reveal the characteristics of the weapon system. If such data is passed on to the enemy, not only the specifications and performance of the weapon system but also the proficiency of each operator may be exposed. In this paper, we propose a pseudonym processing methodology for education and training data security and also suggest a direction for revising related laws.","PeriodicalId":476380,"journal":{"name":"Journal of The Korean Institute of Defense Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135685874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Operational Patterns for Drone Reconnaissance and Attack Missions 无人机侦察攻击任务作战模式研究
Pub Date : 2023-09-01 DOI: 10.52682/jkidt.2023.5.3.18
Jong su Park, Keon Young Yi
The threat of drones is widely occurring not only in the military field but also for important national facilities such as airports and nuclear power plants. Drones are very diverse in types and control methods, so it is not easy to have a uniform defense method and system, and with the development of drone technology, the war paradigm using drones as weapons is also changing. In particular, advances in drone technology are improving the efficiency and accuracy of reconnaissance and attack missions. Nevertheless, it is very difficult to secure research cases on military operation of drones due to difficulties in obtaining information on military operations. Therefore, in this study, we try to create basic data that can effectively establish a plan for performing reconnaissance and attack missions by deriving each operational aspect through analysis of operation cases of reconnaissance and attack drones.
无人机的威胁不仅出现在军事领域,也出现在机场、核电站等重要国家设施。无人机的种类和控制方式非常多样化,因此很难有一个统一的防御方法和体系,而且随着无人机技术的发展,以无人机为武器的战争范式也在发生变化。特别是,无人机技术的进步正在提高侦察和攻击任务的效率和准确性。但是,由于军事作战情报的获取困难,很难确保无人机的军事作战研究案例。因此,在本研究中,我们试图通过分析侦察和攻击无人机的作战案例,推导出每个作战方面,从而创建可以有效制定执行侦察和攻击任务计划的基础数据。
{"title":"A Study on Operational Patterns for Drone Reconnaissance and Attack Missions","authors":"Jong su Park, Keon Young Yi","doi":"10.52682/jkidt.2023.5.3.18","DOIUrl":"https://doi.org/10.52682/jkidt.2023.5.3.18","url":null,"abstract":"The threat of drones is widely occurring not only in the military field but also for important national facilities such as airports and nuclear power plants. Drones are very diverse in types and control methods, so it is not easy to have a uniform defense method and system, and with the development of drone technology, the war paradigm using drones as weapons is also changing. In particular, advances in drone technology are improving the efficiency and accuracy of reconnaissance and attack missions. Nevertheless, it is very difficult to secure research cases on military operation of drones due to difficulties in obtaining information on military operations. Therefore, in this study, we try to create basic data that can effectively establish a plan for performing reconnaissance and attack missions by deriving each operational aspect through analysis of operation cases of reconnaissance and attack drones.","PeriodicalId":476380,"journal":{"name":"Journal of The Korean Institute of Defense Technology","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135686022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation method for interoperability of weapon systems applying natural language processing techniques 应用自然语言处理技术的武器系统互操作性评价方法
Pub Date : 2023-09-01 DOI: 10.52682/jkidt.2023.5.3.8
Yong-Gyun Kim, Dong-Hyen Lee
The current weapon system is operated as a complex weapon system with various standards and protocols applied, so there is a risk of failure in smooth information exchange during combined and joint operations on the battlefield. The interoperability of weapon systems to carry out precise strikes on key targets through rapid situational judgment between weapon systems is a key element in the conduct of war. Since the Korean military went into service, there has been a need to change the configuration and improve performance of a large number of software and hardware, but there is no verification system for the impact on interoperability, and there are no related test tools and facilities. In addition, during combined and joint training, errors frequently occur during use after arbitrarily changing the detailed operation method and software of the weapon/power support system. Therefore, periodic verification of interoperability between weapon systems is necessary. To solve this problem, rather than having people schedule an evaluation period and conduct the evaluation once, AI should continuously evaluate the interoperability between weapons and power support systems 24 hours a day to advance warfighting capabilities. To solve these problems, To this end, preliminary research was conducted to improve defense interoperability capabilities by applying natural language processing techniques (①Word2Vec model, ②FastText model, ③Swivel model) (using published algorithms and source code). Based on the results of this experiment, we would like to present a methodology (automated evaluation of interoperability requirements evaluation / level measurement through natural language processing model) to implement an automated defense interoperability evaluation tool without relying on humans.
当前的武器系统是一个复杂的武器系统,应用了各种标准和协议,因此在战场上的联合作战中存在信息交换失败的风险。通过武器系统之间的快速态势判断对关键目标进行精确打击的武器系统的互操作性是进行战争的关键因素。韩国军队自服役以来,有大量的软硬件需要改变配置和提高性能,但没有对互操作性影响的验证体系,也没有相关的测试工具和设施。此外,在联训和联合训练中,由于随意改变武器/动力保障系统的详细操作方法和软件,在使用过程中经常出现错误。因此,定期核查武器系统之间的互操作性是必要的。为了解决这一问题,人工智能应该24小时不间断地评估武器与动力保障系统之间的互操作性,而不是让人们安排一个评估周期,进行一次评估,以提高作战能力。为此,采用自然语言处理技术(①Word2Vec模型、②FastText模型、③Swivel模型)(利用已发表的算法和源代码),对提高防务互操作能力进行了初步研究。基于实验结果,我们提出了一种方法(通过自然语言处理模型自动评估互操作性需求评估/水平测量)来实现不依赖人类的自动化防御互操作性评估工具。
{"title":"Evaluation method for interoperability of weapon systems applying natural language processing techniques","authors":"Yong-Gyun Kim, Dong-Hyen Lee","doi":"10.52682/jkidt.2023.5.3.8","DOIUrl":"https://doi.org/10.52682/jkidt.2023.5.3.8","url":null,"abstract":"The current weapon system is operated as a complex weapon system with various standards and protocols applied, so there is a risk of failure in smooth information exchange during combined and joint operations on the battlefield. The interoperability of weapon systems to carry out precise strikes on key targets through rapid situational judgment between weapon systems is a key element in the conduct of war. Since the Korean military went into service, there has been a need to change the configuration and improve performance of a large number of software and hardware, but there is no verification system for the impact on interoperability, and there are no related test tools and facilities. In addition, during combined and joint training, errors frequently occur during use after arbitrarily changing the detailed operation method and software of the weapon/power support system. Therefore, periodic verification of interoperability between weapon systems is necessary. To solve this problem, rather than having people schedule an evaluation period and conduct the evaluation once, AI should continuously evaluate the interoperability between weapons and power support systems 24 hours a day to advance warfighting capabilities. To solve these problems, To this end, preliminary research was conducted to improve defense interoperability capabilities by applying natural language processing techniques (①Word2Vec model, ②FastText model, ③Swivel model) (using published algorithms and source code). Based on the results of this experiment, we would like to present a methodology (automated evaluation of interoperability requirements evaluation / level measurement through natural language processing model) to implement an automated defense interoperability evaluation tool without relying on humans.","PeriodicalId":476380,"journal":{"name":"Journal of The Korean Institute of Defense Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135685865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of The Korean Institute of Defense Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1