• Title/Summary/Keyword: Defense Information Technology

Search Result 962, Processing Time 0.028 seconds

Control Policy for the Land Remote Sensing Industry (미국(美國)의 지상원격탐사(地上遠隔探査) 통제제탁(統制制度))

  • Suh, Young-Duk
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.20 no.1
    • /
    • pp.87-107
    • /
    • 2005
  • Land Remote Sensing' is defined as the science (and to some extent, art) of acquiring information about the Earth's surface without actually being in contact with it. Narrowly speaking, this is done by sensing and recording reflected or emitted energy and processing, analyzing, and applying that information. Remote sensing technology was initially developed with certain purposes in mind ie. military and environmental observation. However, after 1970s, as these high-technologies were taught to private industries, remote sensing began to be more commercialized. Recently, we are witnessing a 0.61-meter high-resolution satellite image on a free market. While privatization of land remote sensing has enabled one to use this information for disaster prevention, map creation, resource exploration and more, it can also create serious threat to a sensed nation's national security, if such high resolution images fall into a hostile group ie. terrorists. The United States, a leading nation for land remote sensing technology, has been preparing and developing legislative control measures against the remote sensing industry, and has successfully created various policies to do so. Through the National Oceanic and Atmospheric Administration's authority under the Land Remote Sensing Policy Act, the US can restrict sensing and recording of resolution of 0.5 meter or better, and prohibit distributing/circulating any images for the first 24 hours. In 1994, Presidential Decision Directive 23 ordered a 'Shutter Control' policy that details heightened level of restriction from sensing to commercializing such sensitive data. The Directive 23 was even more strengthened in 2003 when the Congress passed US Commercial Remote Sensing Policy. These policies allow Secretary of Defense and Secretary of State to set up guidelines in authorizing land remote sensing, and to limit sensing and distributing satellite images in the name of the national security - US government can use the civilian remote sensing systems when needed for the national security purpose. The fact that the world's leading aerospace technology country acknowledged the magnitude of land remote sensing in the context of national security, and it has made and is making much effort to create necessary legislative measures to control the powerful technology gives much suggestions to our divided Korean peninsula. We, too, must continue working on the Korea National Space Development Act and laws to develop the necessary policies to ensure not only the development of space industry, but also to ensure the national security.

  • PDF

Study on the Economic Co-operation action by analyzing the North Korea's Military Negotiations - Focusing on Inter-Korean Military Talks and working level talks about Gaeseong industrial complex - (북한 협상모델 분석을 통한 경제협력 실천방안 연구 - 남북 군사협상 및 개성공단 실무회담 사례를 중심으로-)

  • Lee, Sung-Choon
    • International Commerce and Information Review
    • /
    • v.15 no.3
    • /
    • pp.353-384
    • /
    • 2013
  • When it comes to the current inter-Korean relationship, the two Koreas are in the step of core practical negotiation on exchanges and cooperation away from deadlock so far. It is expected that they will have more and frequent meetings in the future. Therefore, now is the time the South Korea needed to come up with systematic countermeasures because there is nothing more important and giving more impact on our society than the matter of North Korea. As the purpose of social science lies with the explanation and prediction of the social phenomena in the society, it is considered to be meaningful to analyze the representative military negotiations such as the defense ministry-level talks, general-level talks, and working-level talks between the two Koreas where the participants from South Korea consisting of the military representatives discussed with their counterparts of North Korea since the signing of the armistice in Korea on July 27, 1953. This study analyzes and evaluates the behaviors of North Korea's military negotiations with the South Korea in the Kim Jong-il era on the overall basis. In particular, the research tries to prove that the behaviors of military negotiations under Kim Jeong-il regime were made in the frame of the negotiation model by analyzing many negotiations presented in 'With Century', Kim Il Sung's Memoirs under his anti-Japan-guerilla era and suggesting the analysis frame of anti-Japan-guerilla style negotiation model. Based on the results of this proof, the study looks at carefully the specific characteristics of anti-Japan guerrilla-type negotiation.

  • PDF

A Study on the Response Plan through the Analysis of North Korea's Drones Terrorism at Critical National Facilities - Focusing on Improvement of Laws and Systems - (국가중요시설에 대한 북한의 드론테러 위협 분석을 통한 대응방안 연구 - 법적·제도적 개선을 중심으로 -)

  • Choong soo Ha
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.2
    • /
    • pp.395-410
    • /
    • 2023
  • Purpose: The purpose of this study was to analyze the current state of drone terrorism response at such critical national facilities and derive improvements, especially to identify problems in laws and systems to effectively utilize the anti-drone system and present directions for improvement. Method: A qualitative research method was used for this study by analyzing a variety of issues not discussed in existing research papers and policy documents through in-depth interviews with subject matter experts. In-depth interviews were conducted based on 12 semi-structured interviews by selecting 16 experts in the field of anti-drone and terrorism in Korea. The interview contents were recorded with the prior consent of the study participants, transcribed back to the Korean file, and problems and improvement measures were derived through coding. For this, the threats and types were analyzed based on the cases of drone terrorism occurring abroad and measures to establish anti-drone system were researched from the perspective of laws and systems by evaluating the possibility of drone terrorism in the Republic of Korea. Result: As a result of the study, improvements to some of the problems that need to be preceded in order to effectively respond to drone terrorism at critical national facilities in the Republic of Korea, have been identified. First, terminologies related to critical national facilities and drone terrorism should be clearly defined and reflected in the Integrated Defense Act and the Terrorism Prevention Act. Second, the current concept of protection of critical national facilities should evolve from the current ground-oriented protection to a three-dimensional protection concept that considers air threats and the Integrated Defense Act should reflect a plan to effectively install the anti-drone system that can materialize the concept. Third, a special law against flying over critical national facilities should be enacted. To this end, legislation should be enacted to expand designated facilities subject to flight restrictions while minimizing the range of no fly zone, but the law should be revised so that the two wings of "drone industry development" and "protection of critical national facilities" can develop in a balanced manner. Fourth, illegal flight response system and related systems should be improved and reestablished. For example, it is necessary to prepare a unified manual for general matters, but thorough preparation should be made by customizing it according to the characteristics of each facility, expanding professional manpower, and enhancing response training. Conclusion: The focus of this study is to present directions for policy and technology development to establish an anti-drone system that can effectively respond to drone terrorism and illegal drones at critical national facilities going forward.

Effects of Edible Lentinus tuber-regium on Oxidative Stress and Defense System in Serum of SD Rats (유용버섯 Lentinus tuber-regium이 산화적 스트레스 및 방어체계에 미치는 영향)

  • Choi, Jin-Ho;Park, Soo-Hyun;Kim, Dae-Ik;Kim, Jeung-Min;Kim, Chang-Mok;Kim, Gwang-Po
    • The Korean Journal of Mycology
    • /
    • v.29 no.1
    • /
    • pp.41-46
    • /
    • 2001
  • Oxidative stress and defense system of SD-rats were studied with an edible Nigerian mushroom, namely, Lentinus tuber-regium (Fries) Singer. Experimental diets prepared with Lentinus tuber-regium (LTR) instead of carbohydrates were fed to SD rats for 6 weeks. Hydrolxyl radical $({\cdot}OH)$ formations were significantly inhibited (21.7% and 16.4%, respectively). In LTR-50 and LTR-100 groups used instead of carbohydrates, and hydrogen peroxide and nitric oxide (NO) were also significantly inhibited by 10%, and $6{\sim}10%$, respectively compared with control group, but there was no significant changes in superoxide radical $({O_2}^-)$ formations in these groups. Lipid peroxide (LPO) and oxidized protein (OP) levels as an oxidative stress were desirably inhibited ($6{\sim}12%\;and\;5{\sim}13%$, respectively) in these LTR groups compared with control group. Superoxide dismutase (SOD), glutathione peroxidase (GSHPx) and catalase (CAT) activities were significantly increased ($15{\sim}50%,\;10{\sim}25%\;and\;60{\sim}90%$, respectively) in these LTR groups. These results suggest that an edible mushroom, Lentinus tuber-regium may inhibit an oxygen radicals and oxidative stresses, but may also effectively modulate an aging processes.

  • PDF

Dynamic Frequency Reuse Scheme Based on Traffic Load Ratio for Heterogeneous Cellular Networks (이종 셀룰러 네트워크 환경에서 트래픽 비율에 따른 동적 주파수 재사용 기법)

  • Chung, Sungmoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.12
    • /
    • pp.2539-2548
    • /
    • 2015
  • Overcoming inter-cell interference and spectrum scarcity are major issues in heterogeneous cellular networks. Static Frequency reuse schemes have been proposed as an effective way to manage the spectrum and reduce ICI(Inter cell Interference) in cellular networks. In a kind of static frequency reuse scheme, the allocations of transmission power and subcarriers in each cell are fixed prior to system deployment. This limits the potential performance of the static frequency reuse scheme. Also, most of dynamic frequency reuse schemes did not consider small cell and the network environment when the traffic load of each cell is heavy and non-uniform. In this paper, we propose an inter-cell resource allocation algorithm that dynamically optimizes subcarrier allocations for the multi-cell heterogeneous networks. The proposed dynamic frequency reuse scheme first finds the subcarrier usage in each cell-edge by using the exhaustive search and allocates subcarrier for all the cells except small cells. After that it allocates subcarrier for the small cell and then iteratively repeats the process. Proposed dynamic frequency reuse scheme performs better than previous frequency reuse schemes in terms of the throughput by improving the spectral efficiency due to it is able to adapt the network environment immediately when the traffic load of each cell is heavy and non-uniform.

Requirement Analysis of Satellite On-the-Move Transportable Terminal System (이동통신형 차량위성단말 시스템 요구사항 분석)

  • Oh, Il-Hyuk;Song, Choong-Ho;Ko, Dong-Kuk
    • Journal of Satellite, Information and Communications
    • /
    • v.3 no.1
    • /
    • pp.41-47
    • /
    • 2008
  • Line-of-sight communications cannot easily support korean armed forces because of mountainous terrain. ADD(Agency for Defense Development) introduced ANASIS(Army Navy Air-force Satellite Information System) to meet the Korean warfighter's operational needs. Currently, army's military satcom terminal is designed for either fixed site or on-the-pause operation. The US army is under development of multi-band integrated on-the-move satellite terminals to let the army's communication capability to keep pace with globally deployable Joint Task Force for network-centric application. In this paper we analyzed X-band and Ka-band link and subsystem requirement. Our focus here is to describe key technical issues. Especially, On the basis of 3dB beam width of 0.9m antenna, Tracking accuracy and disturbances compensation signal processing on-the-move of Antenna Tracking system is analyzed. Also, protocol is analyzed that minimize blockage on the move due to an obstacle. when the received signal blocked, it stop to transmit burst signal and retransmit when blockage removed through received synchronization signal monitoring. Analyzed specification will be used to make prototype terminal to analyze risk for mass production

  • PDF

An Efficient Video Management Technique using Forward Timeline on Multimedia Local Server (전방향 시간 경계선을 활용한 멀티미디어 지역 서버에서의 효율적인 동영상 관리 기법)

  • Lee, Jun-Pyo;Woo, Soon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.10
    • /
    • pp.147-153
    • /
    • 2011
  • In this paper, we present a new video management technique using forward timeline to efficiently store and delete the videos on a local server. The proposed method is based on capturing the changing preference of the videos according to recentness, frequency, and playback length of the requested videos. For this purpose, we utilize the forward timeline which represents the time area within a number of predefined intervals. The local server periodically measures time popularity and request segment of all videos. Based on the measured data, time popularity and request segment, the local server calculates the mean time popularity and mean request segment of a video using forward timeline. Using mean time popularity and mean request segment of video, we estimate the ranking and allocated storage space of a video. The ranking represents the priority of deletion when the storage area of local server is running out of space and the allocated storage space means the maximum size of storage space to be allocated to a video. In addition, we propose an efficient storage space partitioning technique in order to stably store videos and present a time based free-up storage space technique using the expected variation of video data in order for avoiding the overflow on a local server in advance. The simulation results show that the proposed method performs better than other methods in terms of hit rate and number of deletion. Therefore, our video management technique for local server provides the lowest user start-up latency and the highest bandwidth saving significantly.

A Study on the Solutions of Guided Missile Attacks using 3-D RCS Data of Maritime Ship (함정의 3차원 RCS 측정 데이터를 활용한 유도탄 대응 기법 연구)

  • Gwak, Sang-Yell
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.4
    • /
    • pp.552-557
    • /
    • 2020
  • The Radar Cross Section (RCS) is a virtual region indicating the strength of a wavelength at which a radar signal is reflected and received. As the ship's RCS represents its own stealth performance and survivability, efforts have been made in various areas from design to construction to reduce the RCS. The RCS can be predicted using design drawings and CAD models, but it is necessary to measure the RCS at sea since sea clutter and multipath reflections occur in the sea environment. However, such RCS predictions and measured values provide only a simple relative magnitude to the user, and there has not been much research on this topic. In this paper, a missile countermeasure technique was studied using 3D RCS measurement data in an operating environment. The elevation and azimuth angle of the ship viewed from the missile were estimated using the location information of the missile, and the RCS value was inverted by mapping it to previously measured 3D RCS measurement data. In addition, by using the movement information of the missile, the RCS observed by the missile could be predicted in advance, and this method can be used to propose a response plan based on the maneuvering and chaff system.

Design of X-Band High Efficiency 60 W SSPA Module with Pulse Width Variation (펄스 폭 가변을 이용한 X-대역 고효율 60 W 전력 증폭 모듈 설계)

  • Kim, Min-Soo;Koo, Ryung-Seo;Rhee, Young-Chul
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.9
    • /
    • pp.1079-1086
    • /
    • 2012
  • In this paper, X-band 60 W Solid-State Power Amplifier with sequential control circuit and pulse width variation circuit for improve bias of SSPA module was designed. The sequential control circuit operate in regular sequence drain bias switching of GaAs FET. The distortion and efficiency of output signals due to SSPA nonlinear degradation is increased by making operate in regular sequence the drain bias wider than that of RF input signals pulse width if only input signal using pulsed width variation. The GaAs FETs are used for the 60 W SSPA module which is consists of 3-stage modules, pre-amplifier stage, driver-amplifier stage and main-power amplifier stage. The main power amplifier stage is implemented with the power combiner, as a balanced amplifier structure, to obtain the power greater than 60 W. The designed SSPA modules has 50 dB gain, pulse period 1 msec, pulse width 100 us, 10 % duty cycle and 60 watts output power in the frequency range of 9.2~9.6 GHz and it can be applied to solid-state pulse compression radar using pulse SSPA.

Quantitatively Managed Leveling for Capability Maturity Model Integration Implementation (정량적 소프트웨어 능력성숙도모델 도입전략 및 사례)

  • Kim, Hanyoung;Lee, Wookey;Lee, James J.H.;Lee, Rich C.K.
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.3
    • /
    • pp.335-346
    • /
    • 2013
  • With the overwhelming development of information technologies, the need for software development that can deal with diversified and complex business processes has increased dramatically. As a result, companies prefer softwares that can handle far more complex processing ability and also it should be stable as well as easier to maintain. These ambivalent requirements keep the software development organizations from assessing the quantitative abilities, so that under the support of the U.S. Department of Defense the Capability Maturity Model (CMM) and Capability Maturity Model Integration (CMMI) have been developed. The CMMI upper levels for the software development companies will be evaluated to be excellent and authenticated, which drives the companies to get and maintain high levels of maturity. In this paper, a case study for a domestic software company has been exploited how to achieve CMMI level 4 and what kind of factors have been played an effective role. These issues at the domestic and international software and maintenance program, can influence the trustworthiness and marketing effects for the global market. In this paper, the company's actual case study will give clues to find out the important factors for the development and maintenance of software companies maturity levels.