• Title/Summary/Keyword: 보안부대

Search Result 54, Processing Time 0.033 seconds

The Memorial Park Planning of 5·18 Historic Sites - For Gwangju Hospital of Korea Army and 505 Security Forces - (5·18 사적지 기념공원화 계획 - 국군광주병원과 505보안부대 옛터를 대상으로 -)

  • Lee, Jeong-Hee;Yun, Young-Jo
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.47 no.5
    • /
    • pp.14-27
    • /
    • 2019
  • This study presents a plan for a memorial park that respects the characteristics based on the historical facts for the concept of space of the Gwangju Hospital of Korea Army and the location of the 505 Security Forces, which were designated as historic sites after the 5-18 Democratization Movement. The Gwangju Metropolitan City as it is the location of the 5-18 historic sites, is taking part in the 5-18 Memorial Project, and plans to establish a city park recognizing the historic site of the 5-18 Democratization Movement, which has been preserved only as a memory space to this point. The park is promoting a phased development plan. This study suggests that the 5-18 historic sites can be modernized and that social consensus can establish the framework of the step-by-step planning and composition process to ensure the plans for the space heals wounds while preserving the history. In this paper, we propose a solution to a problem. We solve the approach for space utilization through an analysis of precedent research and planning cases related to park planning at historical sites. In addition to exploring the value of the site, we also describe the space utilization strategy that covers the historical characteristics and facts while maintaining the concept of park planning. As a result of the research, the historic site of the Gwangju Hospital of Korea Army is planned as a park of historical memory and healing in order to solve the problems left behind by the 5-18 Democratization Movement. The historic site of the 505 Security Forces was selected as an area for historical experiences and a place for learning that can be sympathized with by future generations of children and adolescents in terms of expanding and sustaining the memory of the 5-18 Democratization Movement. In the planning stage, the historical sites suggested the direction of space utilization for representation as did the social consensus of citizens, related groups, and specialists. Through this study, we will contribute to construction of a memorial park containing historical values in from 5-18 historic sites. It is meaningful to suggest a direction that can revitalize the life of the city as well as its citizen and can share with the history with future generations beyond being a place to heal wounds and keep alive the memory of the past.

Face Recognition using wavelet transform and PCA/LDA (웨이브릿 변환과 PCA/LDA를 이용한 얼굴 인식)

  • 송영준;김영길;문성원;권혁봉
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.392-395
    • /
    • 2004
  • It was recently focus to face recognition at a security system according to development of computer. The face recognition has method using geometrical feature and one using statistical feature. The proposed method uses k level LL, LH, HL, HH subband images adopting wavelet transform. And, we adopt PCA/LDA to subband images. As a result of simulation, recognition rate of subband images using wavelet transform is more high than one of full size image.

  • PDF

A study on method of setting up the defense integrated security system (군 통합보안시스템 구축 방안 연구)

  • Jang, Worl-Su;Choi, Jung-Young;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.575-584
    • /
    • 2012
  • A established military security tast based on existing manual and off-line needs the change and development to support effective and systematic task performance according to environment change of informational and scientific project in the military. Therefore this study suggests to set up the standard model of the defense integrated security system to automate and informationize major defense security task based on actual and problem in the area of major defense of security task and case analysis of these in America, England and other countries. The standard model consist of unit systems were made up integrated security system, security management system, man entrance system, vehicle entrance system, high-tech guard system, terror prevention system and the security accident analysis system, and this suggested model based on possible technology and system. If this model is apply to each real military unit, we will expect the development of defense security.

Implementation and It's Application of XML Signature Mechanism (XML 전자서명 메커니즘 구현과 응용)

  • 전형득;송유진
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.487-490
    • /
    • 2002
  • 최근 기업에서 인터넷을 활용한 전자문서 교환이 급증함에 따라 교환되는 문서의 안전한 전달을 위한 보안 서비스 문제가 대두되고 있다. B2B 전자문서 교환은 기업간 문서의 신속한 교환과 처리과정의 자동화를 통해 기업 업무 자동화에 큰 기여를 하고 있는 전자문서 교환방식(EDI)을 통해 이루어진다. 그러나 현재의 전자문서 교환방식은 해당 소프트웨어 개발과 통신망에 대한 부대 비용으로 인해 광범위하게 채택되지 못하고 있다. 이러한 문제를 해결하기 위한 방안으로 현재 광범위하게 사용되고 있는 웹기반 표준문서인 XML을 이용한 전자문서 교환이 새롭게 떠오르고 있다.[1] 본 논문은 XML 전자서명 메커니즘을 구현하고 XML 기반 전자조달 시스템에의 응용이 목표이다. XML 전자서명 기술을 이용해 전송되는 XML문서의 무결성, 인증 그리고 송수신 부인봉쇄의 보안 서비스를 제공하고, 전자조달 시스템에의 적용에 관한 것이다.

  • PDF

Study on primary officer military counseling model (초급간부 군 상담모델 개발 연구)

  • Seo, Seon Woo
    • Convergence Security Journal
    • /
    • v.16 no.6_1
    • /
    • pp.75-83
    • /
    • 2016
  • Soldiers management is the core of military combat power to preserve and accident prevention. But in unforeseen times and places did the unthinkable soldier causes an accident, the inexperienced primary officer were upset, and can often be quite nervous. And various accidents prevention is also win the war, the reason for existence in the military for combat readiness as a precondition for perfection. There are primary officers at the forefront of this critical mission. However, in spite of the lack of time to work for combat readiness, orders from higher units of troops management and that's level giving a lot of pressure to primary officer. So I made the primary officer military counseling model ike this. Using Primary officer counseling model is possible to rapid and efficient counseling advice against the target client soldier. The efficient counseling is must take precedence on understanding on client soldier deeply. Depth understanding someone needs a lot of effort and time. However, to Primary officer, it is true that they have a lack of condition that are enough to give the time and effort. Therefore, effective counseling and accident prevention is possible to use counseling model through choice and concentration activities.

AR based Field Training System Algorithm for Small Units (증강현실 기반의 소부대 야외 전술훈련체계 알고리즘)

  • Park, Sangjun;Kim, Jee Won;Kim, Kyoung Min;Kim, Hoedong
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.81-87
    • /
    • 2018
  • Military training is being carried out to win the combats through the quick and accurate response exercise for changeable engagement situations on battle fields. However, practically, it is really difficult to do actual fight training. Even though ROK Army is doing effort for practical training in KCTC(Korea army advanced Combat Training Center) supplying such as MILES equipments but a single platoon is able to use KCTC facilities or MILES equipments only 10 days a year. In order to find solution on this problem many researches suggesting AR or VR technology are still on the way. Nevertheless these are not fully covered the training done in the real field. In this regard, this paper proposes how the AR technology algorithm to apply on small units during field training exercise.

  • PDF

A Study on the Establishment of Social Cooperative for the Job Creation of discharged solider (제대군인 일자리 창출을 위한 사회적 협동조합 설립 방안 연구)

  • Koo, Young Hui;Kim, Ji Deok
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.149-158
    • /
    • 2018
  • Military officials in Korea are forced to change jobs early due to the retirement age after active service. Measures are needed in view of the 55% average employment rate of middle and long term soldiers during the last five years. The last government of Park Geun-hye push ahead creating of 50,000 jobs in discharged soldier with policy, but the results were not great. Therefore, it is time to drastically change the government's efforts to create large-scale jobs for discharged soldiers. It is necessary to break away from the traditional ways of expanding opportunities for employment at the academic level. So it became necessary for discharged soldiers to actively review ways to build their own organizations. For such reasons, this study presents a measure to create job through food service, Security personnel training and Manpower provision business, Special Soldier Control and Training Center Operation business, Han River Water Cleaning Project, Caring business, and delivery business by establishing their own social cooperation to create jobs for discharged soldiers.

  • PDF

Scenario-based Future Infantry Brigade Information Distribution Capability Analysis (시나리오 기반의 미래 보병여단 정보유통능력 분석 연구)

  • Junseob Kim;Sangjun Park;Yiju You;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.139-145
    • /
    • 2023
  • The ROK Army is promoting cutting-edge, future-oriented military development such as a mobile, intelligent, and hyper-connected Army TIGER system. The future infantry brigade plans to increase mobility with squad-level tactical vehicles to enable combat in multi-domain operations and to deploy various weapon systems such as surveillance and reconnaissance drones. In addition, it will be developed into an intelligent unit that transmits and receives data collected through the weapon system through a hyper-connected network. Accordingly, the future infantry brigade will transmit and receive more data. However, the Army's tactical information communication system has limitations in operating as a tactical communication system for future units, such as low transmission speed and bandwidth and restrictions on communication support. Therefore, in this paper, the information distribution capability of the future infantry brigade is presented through the offensive operation scenario and M&S.

A Study on The Cyber Threat Centered Defense Cyber Protection Level Analysis (사이버 위협 중심의 국방 사이버 방호수준 분석에 관한 연구)

  • Seho Choi;Haengrok Oh;Joobeom Yun
    • Convergence Security Journal
    • /
    • v.21 no.4
    • /
    • pp.77-85
    • /
    • 2021
  • Cyber protection is an activity that protects the information systems we operate from cyber attacks and threats. To know the level of protection of the currently operating cyber protection system, it is necessary to update the current state of attack technology by reflecting the constantly evolving cyber threats and to analyze whether it is possible to respond with the protection function. Therefore, in this paper, we analyze the relationship between the attack procedures and defense types of the cyber kill chain with the defense technology(Mitigation ID) of MITRE and present the cyber protection level for each military unit type with a focus on defensive cyber activities. In the future, it is expected that the level of cyber protection will be improved through real-time analysis of the response capabilities of cyber protection systems operating in the defense sector to visualize the level of protection for each unit, investigate unknown cyber threats, and actively complement vulnerabilities.

A Robust Blind Watermarking for Digital Image Using DWT According to its Resolution (해상도에 따른 DWT 기반 디지털 영상의 강인성 블라인드 워터마킹)

  • Lee, Yongseok;Seo, Youngho;Kim, Dongwook
    • Journal of Broadcast Engineering
    • /
    • v.20 no.6
    • /
    • pp.888-900
    • /
    • 2015
  • This paper proposes a blind watermarking scheme using DWT satisfying robustness, invisibility, and security to protect the ownership of digital image contents. This scheme does not determine any watermarking position by local image information. It rather inserts the watermark information into all the four lowest frequency subbands after transforming the host image by n-level 2-dimensional DWT, depending on, the sizes of the host image and the watermark data. Its watermark insertion methodology uses some weighting factors according to the kind of the subband and its energy level to adjust the invisibility and the robustness of the watermark. This method is experimented for various pixel-value change attacks and geometric attacks with various images having different resolutions and aspect ratios. With the experimental results and by comparing with existing methods, we show that the proposed method has a great deal of general usage with good watermark invisibility and good robustness against attacks.