Journal of The Korean Institute of Defense Technology最新文献

筛选
英文 中文
A Study on the Data Pseudonymization Methodology for Defense Training Data as Artificial Intelligence Technology is applied to the Defense Field 人工智能技术应用于国防领域的国防训练数据假名化方法研究
Journal of The Korean Institute of Defense Technology Pub Date : 2023-09-01 DOI: 10.52682/jkidt.2023.5.3.1
Hyunsuk Cho, Sujin Kang, Dongrae Cho, Yeongseop Shin
{"title":"A Study on the Data Pseudonymization Methodology for Defense Training Data as Artificial Intelligence Technology is applied to the Defense Field","authors":"Hyunsuk Cho, Sujin Kang, Dongrae Cho, Yeongseop Shin","doi":"10.52682/jkidt.2023.5.3.1","DOIUrl":"https://doi.org/10.52682/jkidt.2023.5.3.1","url":null,"abstract":"Recently, in the defense field, efforts are being made to collect data by building data centers to incorporate artificial intelligence technology. Weapon system training data can be used as input data for artificial intelligence models and can be used as high-quality data to maximize training performance and develop military strategies. However, training data contains personal information such as the names and military numbers of the personnel who operated the equipment, and training records that reveal the characteristics of the weapon system. If such data is passed on to the enemy, not only the specifications and performance of the weapon system but also the proficiency of each operator may be exposed. In this paper, we propose a pseudonym processing methodology for education and training data security and also suggest a direction for revising related laws.","PeriodicalId":476380,"journal":{"name":"Journal of The Korean Institute of Defense Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135685874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Operational Patterns for Drone Reconnaissance and Attack Missions 无人机侦察攻击任务作战模式研究
Journal of The Korean Institute of Defense Technology Pub Date : 2023-09-01 DOI: 10.52682/jkidt.2023.5.3.18
Jong su Park, Keon Young Yi
{"title":"A Study on Operational Patterns for Drone Reconnaissance and Attack Missions","authors":"Jong su Park, Keon Young Yi","doi":"10.52682/jkidt.2023.5.3.18","DOIUrl":"https://doi.org/10.52682/jkidt.2023.5.3.18","url":null,"abstract":"The threat of drones is widely occurring not only in the military field but also for important national facilities such as airports and nuclear power plants. Drones are very diverse in types and control methods, so it is not easy to have a uniform defense method and system, and with the development of drone technology, the war paradigm using drones as weapons is also changing. In particular, advances in drone technology are improving the efficiency and accuracy of reconnaissance and attack missions. Nevertheless, it is very difficult to secure research cases on military operation of drones due to difficulties in obtaining information on military operations. Therefore, in this study, we try to create basic data that can effectively establish a plan for performing reconnaissance and attack missions by deriving each operational aspect through analysis of operation cases of reconnaissance and attack drones.","PeriodicalId":476380,"journal":{"name":"Journal of The Korean Institute of Defense Technology","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135686022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation method for interoperability of weapon systems applying natural language processing techniques 应用自然语言处理技术的武器系统互操作性评价方法
Journal of The Korean Institute of Defense Technology Pub Date : 2023-09-01 DOI: 10.52682/jkidt.2023.5.3.8
Yong-Gyun Kim, Dong-Hyen Lee
{"title":"Evaluation method for interoperability of weapon systems applying natural language processing techniques","authors":"Yong-Gyun Kim, Dong-Hyen Lee","doi":"10.52682/jkidt.2023.5.3.8","DOIUrl":"https://doi.org/10.52682/jkidt.2023.5.3.8","url":null,"abstract":"The current weapon system is operated as a complex weapon system with various standards and protocols applied, so there is a risk of failure in smooth information exchange during combined and joint operations on the battlefield. The interoperability of weapon systems to carry out precise strikes on key targets through rapid situational judgment between weapon systems is a key element in the conduct of war. Since the Korean military went into service, there has been a need to change the configuration and improve performance of a large number of software and hardware, but there is no verification system for the impact on interoperability, and there are no related test tools and facilities. In addition, during combined and joint training, errors frequently occur during use after arbitrarily changing the detailed operation method and software of the weapon/power support system. Therefore, periodic verification of interoperability between weapon systems is necessary. To solve this problem, rather than having people schedule an evaluation period and conduct the evaluation once, AI should continuously evaluate the interoperability between weapons and power support systems 24 hours a day to advance warfighting capabilities. To solve these problems, To this end, preliminary research was conducted to improve defense interoperability capabilities by applying natural language processing techniques (①Word2Vec model, ②FastText model, ③Swivel model) (using published algorithms and source code). Based on the results of this experiment, we would like to present a methodology (automated evaluation of interoperability requirements evaluation / level measurement through natural language processing model) to implement an automated defense interoperability evaluation tool without relying on humans.","PeriodicalId":476380,"journal":{"name":"Journal of The Korean Institute of Defense Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135685865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信