Recently, in the defense field, efforts are being made to collect data by building data centers to incorporate artificial intelligence technology. Weapon system training data can be used as input data for artificial intelligence models and can be used as high-quality data to maximize training performance and develop military strategies. However, training data contains personal information such as the names and military numbers of the personnel who operated the equipment, and training records that reveal the characteristics of the weapon system. If such data is passed on to the enemy, not only the specifications and performance of the weapon system but also the proficiency of each operator may be exposed. In this paper, we propose a pseudonym processing methodology for education and training data security and also suggest a direction for revising related laws.
{"title":"A Study on the Data Pseudonymization Methodology for Defense Training Data as Artificial Intelligence Technology is applied to the Defense Field","authors":"Hyunsuk Cho, Sujin Kang, Dongrae Cho, Yeongseop Shin","doi":"10.52682/jkidt.2023.5.3.1","DOIUrl":"https://doi.org/10.52682/jkidt.2023.5.3.1","url":null,"abstract":"Recently, in the defense field, efforts are being made to collect data by building data centers to incorporate artificial intelligence technology. Weapon system training data can be used as input data for artificial intelligence models and can be used as high-quality data to maximize training performance and develop military strategies. However, training data contains personal information such as the names and military numbers of the personnel who operated the equipment, and training records that reveal the characteristics of the weapon system. If such data is passed on to the enemy, not only the specifications and performance of the weapon system but also the proficiency of each operator may be exposed. In this paper, we propose a pseudonym processing methodology for education and training data security and also suggest a direction for revising related laws.","PeriodicalId":476380,"journal":{"name":"Journal of The Korean Institute of Defense Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135685874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.52682/jkidt.2023.5.3.18
Jong su Park, Keon Young Yi
The threat of drones is widely occurring not only in the military field but also for important national facilities such as airports and nuclear power plants. Drones are very diverse in types and control methods, so it is not easy to have a uniform defense method and system, and with the development of drone technology, the war paradigm using drones as weapons is also changing. In particular, advances in drone technology are improving the efficiency and accuracy of reconnaissance and attack missions. Nevertheless, it is very difficult to secure research cases on military operation of drones due to difficulties in obtaining information on military operations. Therefore, in this study, we try to create basic data that can effectively establish a plan for performing reconnaissance and attack missions by deriving each operational aspect through analysis of operation cases of reconnaissance and attack drones.
{"title":"A Study on Operational Patterns for Drone Reconnaissance and Attack Missions","authors":"Jong su Park, Keon Young Yi","doi":"10.52682/jkidt.2023.5.3.18","DOIUrl":"https://doi.org/10.52682/jkidt.2023.5.3.18","url":null,"abstract":"The threat of drones is widely occurring not only in the military field but also for important national facilities such as airports and nuclear power plants. Drones are very diverse in types and control methods, so it is not easy to have a uniform defense method and system, and with the development of drone technology, the war paradigm using drones as weapons is also changing. In particular, advances in drone technology are improving the efficiency and accuracy of reconnaissance and attack missions. Nevertheless, it is very difficult to secure research cases on military operation of drones due to difficulties in obtaining information on military operations. Therefore, in this study, we try to create basic data that can effectively establish a plan for performing reconnaissance and attack missions by deriving each operational aspect through analysis of operation cases of reconnaissance and attack drones.","PeriodicalId":476380,"journal":{"name":"Journal of The Korean Institute of Defense Technology","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135686022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.52682/jkidt.2023.5.3.8
Yong-Gyun Kim, Dong-Hyen Lee
The current weapon system is operated as a complex weapon system with various standards and protocols applied, so there is a risk of failure in smooth information exchange during combined and joint operations on the battlefield. The interoperability of weapon systems to carry out precise strikes on key targets through rapid situational judgment between weapon systems is a key element in the conduct of war. Since the Korean military went into service, there has been a need to change the configuration and improve performance of a large number of software and hardware, but there is no verification system for the impact on interoperability, and there are no related test tools and facilities. In addition, during combined and joint training, errors frequently occur during use after arbitrarily changing the detailed operation method and software of the weapon/power support system. Therefore, periodic verification of interoperability between weapon systems is necessary. To solve this problem, rather than having people schedule an evaluation period and conduct the evaluation once, AI should continuously evaluate the interoperability between weapons and power support systems 24 hours a day to advance warfighting capabilities. To solve these problems, To this end, preliminary research was conducted to improve defense interoperability capabilities by applying natural language processing techniques (①Word2Vec model, ②FastText model, ③Swivel model) (using published algorithms and source code). Based on the results of this experiment, we would like to present a methodology (automated evaluation of interoperability requirements evaluation / level measurement through natural language processing model) to implement an automated defense interoperability evaluation tool without relying on humans.
{"title":"Evaluation method for interoperability of weapon systems applying natural language processing techniques","authors":"Yong-Gyun Kim, Dong-Hyen Lee","doi":"10.52682/jkidt.2023.5.3.8","DOIUrl":"https://doi.org/10.52682/jkidt.2023.5.3.8","url":null,"abstract":"The current weapon system is operated as a complex weapon system with various standards and protocols applied, so there is a risk of failure in smooth information exchange during combined and joint operations on the battlefield. The interoperability of weapon systems to carry out precise strikes on key targets through rapid situational judgment between weapon systems is a key element in the conduct of war. Since the Korean military went into service, there has been a need to change the configuration and improve performance of a large number of software and hardware, but there is no verification system for the impact on interoperability, and there are no related test tools and facilities. In addition, during combined and joint training, errors frequently occur during use after arbitrarily changing the detailed operation method and software of the weapon/power support system. Therefore, periodic verification of interoperability between weapon systems is necessary. To solve this problem, rather than having people schedule an evaluation period and conduct the evaluation once, AI should continuously evaluate the interoperability between weapons and power support systems 24 hours a day to advance warfighting capabilities. To solve these problems, To this end, preliminary research was conducted to improve defense interoperability capabilities by applying natural language processing techniques (①Word2Vec model, ②FastText model, ③Swivel model) (using published algorithms and source code). Based on the results of this experiment, we would like to present a methodology (automated evaluation of interoperability requirements evaluation / level measurement through natural language processing model) to implement an automated defense interoperability evaluation tool without relying on humans.","PeriodicalId":476380,"journal":{"name":"Journal of The Korean Institute of Defense Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135685865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}