• Title/Summary/Keyword: Defense Model

Search Result 1,792, Processing Time 0.029 seconds

A Study on Strengthening Consequence Management System Against CBRN Threats (CBRN 위협에 대비한 사후관리체계 강화방안)

  • Kwon, Hyuckshin;Kwak, Minsu;Kim, Kwanheon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.40 no.4
    • /
    • pp.429-435
    • /
    • 2020
  • North Korea declared itself complete with nuclear force after its sixth nuclear test in 2017. Despite efforts at home and abroad to denuclearize the Korean Peninsula, the prospects for the denuclearization are not bright. Along with political and diplomatic efforts to deter NK's WMD threats, the government is required to strengthen its consequence management capabilities against 'catastrophic situations' expected in case of emergency. Accordingly, this study was conducted to present measures to strengthen follow-up management against CBRN threats. The research model was partially supplemented and utilized by the THIRA process adopted and utilized by the U.S. Department of Homeland Security among national-level disaster management plan development models. Korea's consequence management (CM) system encompasses risk and crisis management on disaster condition. The system has been carried out in the form of a civil, government and military integrated defense operations for the purpose of curbing the spread or use of CBRNs, responding to threats, and minimizing expected damages. The preventive stage call for the incorporation of CBRN concept and CM procedures into the national management system, supplementing the integrated alarm systems, preparation of evacuation facilities, and establishment of the integrated training systems. In the preparation phase, readjustment of relevant laws and manuals, maintenance of government organizations, developing performance procedures, establishing the on-site support systems, and regular training are essential. In the response phase, normal operations of the medical support system for first aid and relief, installation and operation of facilities for decontamination, and development of regional damage assessment and control guidelines are important. In the recovery phase, development of stabilization evaluation criteria and procedures, securing and operation of resources needed for damage recovery, and strengthening of regional damage recovery capabilities linked to local defense forces, reserve forces and civil defense committees are required.

Measurement of Dynamic Stability Derivatives of Tailless Lamda-shape UAV using Forced Oscillation Method (강제진동 기법을 이용한 무미익 비행체의 동안정 미계수 측정)

  • Yang, Kwangjin;Chung, Hyoungseog;Cho, Donghyun;An, Eunhye;Ko, Joonsoo;Hong, JinSung;Kim, Yongduk;Lee, MyungSup;Hur, Gi-Bong
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.44 no.7
    • /
    • pp.552-561
    • /
    • 2016
  • In this experimental study, the dynamic stability derivatives of a tailless lambda-shape UAV are estimated from time history data of aerodynamic moments measured from the internal balance while the test model is forced to oscillate at given frequencies and amplitudes. A 3-axis forced oscillation apparatus is designed to induce decoupled roll, yaw, pitch oscillations respectively. The results show that the roll damping derivatives remain stable at the entire range of angle of attack tested, whereas the pitch damping derivatives become unstable beyond $15^{\circ}$ angle of attack. The amplitude and frequency have little impact on roll damping derivatives while the smaller amplitude and frequency of oscillation improves the pitch stability. The yaw damping derivative values are fairly small as expected for a tailless configuration. The results indicate that the proposed methodology and test apparatus area valid for estimating the dynamic stability derivatives of a tailless UAV.

Estimation of Longitudinal Dynamic Stability Derivatives for a Tailless Aircraft Using Dynamic Mesh Method (Dynamic Mesh 기법을 활용한 무미익 비행체 종축 동안정 미계수 예측)

  • Chung, Hyoung-Seog;Yang, Kwang-Jin;Kwon, Ky-Beom;Lee, Ho-Keun;Kim, Sun-Tae;Lee, Myung-Sup;Reu, Taekyu
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.43 no.3
    • /
    • pp.232-242
    • /
    • 2015
  • For stealth performance consideration, many UAV designs are adopting tailless lambda-shaped configurations which are likely to have unsteady dynamic characteristics. In order to control such UAVs through automatic flight control system, more accurate estimation of dynamic stability derivatives becomes essential. In this paper, dynamic stability derivatives of a tailless lambda-shaped UAV are estimated through numerically simulated forced oscillation method incorporating dynamic mesh technique. First, the methodology is validated by benchmarking the CFD results against previously published experimental results of the Standard Dynamics Model(SDM). The dependency of initial angle of attack, oscillation frequency and oscillation magnitude on the dynamic stability derivatives of a tailless UAV configuration is then studied. The results show reasonable agreements with experimental reference data and prove the validity and efficiency of the concept of using CFD to estimate the dynamic derivatives.

A Study on the Technology Analysis of Marine Unmanned System for Determination of Core Technology Requirements (핵심기술 소요결정을 위한 해양 무인체계 요구기술 분석 연구)

  • Won, You-Jae;Eom, Jin-Wook;Park, Chan-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.6
    • /
    • pp.350-361
    • /
    • 2019
  • The fourth industrial revolution based on the intelligent revolution has revolutionized the society as a whole, and it has also affected the defense sector. Various aspects of the war have been changing with the development of technology. In particular, various strategies such as research and development of core technology related to defense unmanned system field and infrastructure are being established based on the fourth industrial revolution technology. In this paper, we have conducted a study to select the technology required for maritime unmanned systems, which can be considered as a priority consideration for the future development of the core technology to be secured prior to the development of the weapon system. First, the core technology prioritization model for the marine unmanned system was established, and the technology fields of the unmanned robot were reclassified and integrated in the related literature such as the classification of the defense technology standard. For the empirical analysis, a questionnaire survey was conducted for 12 specialists who are engaged in the planning of weapons systems, and the importance of technical fields that require development in the development of marine unmanned systems was analyzed. As a result, it was possible to identify the key technology areas that should be considered in selecting the key technologies proposed by the military groups, research institutes, and companies. This could contribute to the establishment of the technology roadmap to develop the marine unmanned system from the future point of view.

A Study on the Strategy for Improvement of Operational Test and Evaluation of Weapon System and the Determination of Priority (무기체계 운용시험평가 개선전략 도출 및 우선순위 결정)

  • Lee, Kang Kyong;Kim, Geum Ryul;Yoon, Sang Don;Seol, Hyeon Ju
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.177-189
    • /
    • 2021
  • Defense R&D is a key process for securing weapons systems determined by mid- and long-term needs to cope with changing future battlefield environments. In particular, the test and evaluation provides information necessary to determine whether or not to switch to mass production as the last gateway to research and development of weapons systems and plays an important role in ensuring performance linked to the life cycle of weapons systems. Meanwhile, if you look at the recent changes in the operational environment of the Korean Peninsula and the defense acquisition environment, you can see three main characteristics. First of all, continuous safety accidents occurred during the operation of the weapon system, which increased social interest in the safety of combatants, and the efficient execution of the limited defense budget is required as acquisition costs increase. In addition, strategic approaches are needed to respond to future battlefield environments such as robots, autonomous weapons systems (RAS), and cyber security test and evaluation. Therefore, in this study, we would like to present strategies for improving the testing and evaluation of weapons systems by considering the characteristics of the security environment that has changed recently. To this end, the improvement strategy was derived by analyzing the complementary elements of the current weapon system operational test and evaluation system in a multi-dimensional model and prioritized through the hierarchical analysis method (AHP).

The Influence of Maternal Overprotective Parenting on the Externalizing Behaviors of Child with Disability : Testing the Moderated Mediation Effect of Child's Effortful Control through Defense Style of Mother and Child (장애아동의 외현화 행동에 어머니의 과보호 양육행동이 미치는 영향 : 어머니 및 아동의 방어유형에 의한 아동의 의도적 통제의 조절된 매개효과 검증)

  • Lee, Dong-Young
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.10
    • /
    • pp.550-563
    • /
    • 2021
  • This study recognizes that the externalizing problem behaviors of child with disabilities are the result of the social interaction between mother and child, and empirically verifies its systematic causal structure and multidimensional influence relationship. It was attempted to derive practical implications that can help the smooth normalization process of children's families. Therefore, 135 children with disabilities and their mothers selected by convenience sampling were targeted, and in the relationship between maternal overprotective parenting and externalizing behaviors of child, effortful control was used as a mediating variable, and defense style of mothers and children was used as a moderating variable. A Conditional Process Analysis(CPA) that can verify the moderated mediation Effect was performed by establishing a research model. As a result of the analysis, first, the overprotective parenting behavior of mother was statistically significant in both direct and indirect effects in increasing externalizing behaviors of child, and the mediation effect by effortful control was also statistically significant. Second, it was confirmed that the moderated mediation effect of effortful control by the mother's defense style was statistically significant, and the moderated mediation effect of effortful control by the child's defense style was not statistically significant. Based on the above results, assuming the importance of the influence of maternal parenting, a direct strategy for change in maternal overprotective parenting, child's Practical implications of parallel strategies with the tendency toward effective control and suboptimal strategies through the application of mothers' coping strategies were discussed.

Cyber Threats Analysis of AI Voice Recognition-based Services with Automatic Speaker Verification (화자식별 기반의 AI 음성인식 서비스에 대한 사이버 위협 분석)

  • Hong, Chunho;Cho, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.33-40
    • /
    • 2021
  • Automatic Speech Recognition(ASR) is a technology that analyzes human speech sound into speech signals and then automatically converts them into character strings that can be understandable by human. Speech recognition technology has evolved from the basic level of recognizing a single word to the advanced level of recognizing sentences consisting of multiple words. In real-time voice conversation, the high recognition rate improves the convenience of natural information delivery and expands the scope of voice-based applications. On the other hand, with the active application of speech recognition technology, concerns about related cyber attacks and threats are also increasing. According to the existing studies, researches on the technology development itself, such as the design of the Automatic Speaker Verification(ASV) technique and improvement of accuracy, are being actively conducted. However, there are not many analysis studies of attacks and threats in depth and variety. In this study, we propose a cyber attack model that bypasses voice authentication by simply manipulating voice frequency and voice speed for AI voice recognition service equipped with automated identification technology and analyze cyber threats by conducting extensive experiments on the automated identification system of commercial smartphones. Through this, we intend to inform the seriousness of the related cyber threats and raise interests in research on effective countermeasures.

A study on machine learning-based defense system proposal through web shell collection and analysis (웹쉘 수집 및 분석을 통한 머신러닝기반 방어시스템 제안 연구)

  • Kim, Ki-hwan;Shin, Yong-tae
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.87-94
    • /
    • 2022
  • Recently, with the development of information and communication infrastructure, the number of Internet access devices is rapidly increasing. Smartphones, laptops, computers, and even IoT devices are receiving information and communication services through Internet access. Since most of the device operating environment consists of web (WEB), it is vulnerable to web cyber attacks using web shells. When the web shell is uploaded to the web server, it is confirmed that the attack frequency is high because the control of the web server can be easily performed. As the damage caused by the web shell occurs a lot, each company is responding to attacks with various security devices such as intrusion prevention systems, firewalls, and web firewalls. In this case, it is difficult to detect, and in order to prevent and cope with web shell attacks due to these characteristics, it is difficult to respond only with the existing system and security software. Therefore, it is an automated defense system through the collection and analysis of web shells based on artificial intelligence machine learning that can cope with new cyber attacks such as detecting unknown web shells in advance by using artificial intelligence machine learning and deep learning techniques in existing security software. We would like to propose about. The machine learning-based web shell defense system model proposed in this paper quickly collects, analyzes, and detects malicious web shells, one of the cyberattacks on the web environment. I think it will be very helpful in designing and building a security system.

Analysis of Human Body Injury by Non-penetrating Ballistic Impact Using a Finite Element Model of the Head and Neck (근육 모델이 고려된 두부 및 경추 유한요소모델을 이용한 비관통 피탄 충격에 의한 인체 상해 해석)

  • Kang, Moon Jeong;Jo, Young Nam;Chae, Jeawook;Yoo, Hong Hee
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.41 no.1
    • /
    • pp.1-6
    • /
    • 2017
  • Ballistic impact on a soldier wearing a helmet can induce fatal injury, even if the helmet is not penetrated. Although studies on this type of injury have been performed, most of them have used an analytical model focused on head injury only. The injury of the neck muscles and cervical vertebrae by non-penetrating ballistic impact affects the survivability of soldiers, despite not inflicting fatal injury to the human body. Therefore, an analytical model of the head and neck muscles are necessary. In this study, an analysis of human body injury using the previously developed head model, as well as a cervical model with muscles, was performed. For the quantitative prediction of injury, the stress, strain, and HIC were compared. The results from the model including the cervical system indicated a lower extent of injury than the results from the model excluding them. The results of head injury were compared with other references for reliability.

SOA-based Video Service Platform Model Design for Military e-Learning Service (군 원격교육체계를 위한 SOA기반 동영상서비스 플랫폼모델 설계)

  • Kim, Kyung-Rog;Moon, Nam-Mee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.5
    • /
    • pp.24-32
    • /
    • 2011
  • According to accelerate the convergence of defense and information technology, there is a need for innovative change in Military e-Learning service system. In other words, It has increased the need for system integration based on standards and interoperability to develop into a network-centric information and knowledge. In this study, It would like to introduce an integrated direction Military e-Learning service system on the SOA-based video content services in the operating system for the operating model. SOA is taking advantage in integration and expansion of the unit with a process. Using it, define of video services platform architecture and define of business model based on the Imprimatur model. Based on this, it define the role of actors for video content service in each step of the operating model, that is Production model, Brokerage model and consumption model. In the operating system, it define the functions and data to control and handle the needed functionality for video content services based on the operational model.