• Title/Summary/Keyword: Defense Strategy

Search Result 403, Processing Time 0.026 seconds

A Study on the Reform of A Defence IT Governance System (국방 IT 거버넌스 개선에 관한 연구)

  • Yang, Ho-Kyung;Park, Hyun-Kyoo;Cha, Hyun-Jong;Cho, Yong-Gun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.5B
    • /
    • pp.777-784
    • /
    • 2010
  • In modern information society, the necessity arose of having to manage overall information technology as information technology is introduced to companies and public organizations while the necessity of joining the goals of business and IT is increasing. Also, there has been an increase in organizations which are preventing the overlapping of IT investigations and pursuing ROI. Hereupon, many developed companies created the concept of IT governance. IT governance indicates the structure and dynamic behavior of companies' business and the structural affecting factors influencing IT, and this is expressed as business, the business & IT related committees and departments inside and outside, the framework representing their relationship and range of activity, organizational diagram and process composition. Intermingled with such external factors, the reestablishment of defense IT governance in order to reach the vision and goal of our current military defense has become a requirement. This study aims to describe core strategy for building defense IT governance framework. In order to support these claims, the comprehensive IT governance and information technology are mentioned, domestic and overseas military cases are analyzed, and core strategy for building defense IT governance framework is analyzed as well.

Analysis concerning the latest operating concept and status for Air Defense Identification Zone(ADIZ) (최근 방공식별구역 운영 개념과 현황 분석)

  • Kim, Dongsoo;Hong, Sungpyo;Chong, Mangseok
    • Journal of Aerospace System Engineering
    • /
    • v.8 no.4
    • /
    • pp.44-51
    • /
    • 2014
  • This thesis analyzes the latest operating concept and status for Air Defense Identification Zone (ADIZ) researching overseas ADIZ CONOPS, international legal basis for ADIZ, the intention & background of proclamation for China Air Defense Identification Zone(CADIZ). Firstly, ADIZ is lawful concerning international connivance for ADIZ where around 20 countries have operated, Article 56 "Rights, jurisdiction & duties of the coastal State" and Article 301 "Peaceful uses of the seas" on the United Nations Convention on the Law of the Sea(UNCLS). Secondly, ADIZ has been regarded as a support means for national interest & policy as well as military air defense one. Thirdly, Based on legal re-interpretation for UNCLS relating to ADIZ, China proclaimed CADIZ where can ensure national maritime policy and strategy including A2/AD(Anti-Access & Area Defence), inroad into the ocean, claim for Senkaku Islands possession, etc..

Development Direction of Defense Weapon System for the 4th Industrial Revolution (4차 산업혁명 대응을 위한 국방 무기체계 개발 발전방향)

  • Kim, Sang-Hun;Chey, Seung-Woo;Hong, Sung-pyo
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.22 no.2
    • /
    • pp.71-79
    • /
    • 2019
  • Since the announcement of President Klaus Schwab's fourth industrial revolution at the World Economic Forum in Davos, Switzerland in January 2016, the fourth industrial revolution has emerged as a hot topic in our society. The United States, Japan, China, and Germany, which are major advanced nations, are preparing and implementing a strategy and system for responding to the Fourth Industrial Revolution, focusing on information and communication technology (ICT) and manufacturing convergence in response to the fourth industrial revolution era. Korea is announcing the expansion of financial support for R & D investment budget and related industries for major technology related to revolution. In this paper, we analyze the defense R & D project procedure of the Defense Improvement Project, which is responsible for the development of the defense weapon system, and present the development direction of the defense weapon system in accordance with the 4th world industrial revolution trend.

Research of Considerations for Effective Operation of Weapons Data Link (무장데이터링크의 효과적인 운용을 위한 고려사항 고찰)

  • Woo, Sang Hyo;Baek, Inhye;Kwon, Ki-Jeong;Kim, Ki Bum
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.6
    • /
    • pp.886-893
    • /
    • 2018
  • U.S. and the allies attacked chemical weapons sites in Syria in 2018, and verbal battles are carried out about the effectiveness of the air strike. Syria claimed 13 missiles were shot down, and Russia claimed 71 missiles were shot down while the U.S. released pictures of completely destroyed targets, only. It led controversy about the effectiveness of missile defense system. If there is a method to observe mission success rate of the air strike, it can not only improve combat awareness but also can be a good sales strategy in military industry. This paper describes effects and considerations of a Weapon Data Link(WDL) technology which can be used as a smoking gun of effectiveness. The paper describes WDL abilities such as In-Flight Track Update, Loiter, and Bomb Hit Indication etc., and presents examples of expected effectiveness of the WDL. In addition, this paper briefly summarizes operational consideration for better performance.

An Intelligent MAC Protocol Selection Method based on Machine Learning in Wireless Sensor Networks

  • Qiao, Mu;Zhao, Haitao;Huang, Shengchun;Zhou, Li;Wang, Shan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5425-5448
    • /
    • 2018
  • Wireless sensor network has been widely used in Internet of Things (IoT) applications to support large and dense networks. As sensor nodes are usually tiny and provided with limited hardware resources, the existing multiple access methods, which involve high computational complexity to preserve the protocol performance, is not available under such a scenario. In this paper, we propose an intelligent Medium Access Control (MAC) protocol selection scheme based on machine learning in wireless sensor networks. We jointly consider the impact of inherent behavior and external environments to deal with the application limitation problem of the single type MAC protocol. This scheme can benefit from the combination of the competitive protocols and non-competitive protocols, and help the network nodes to select the MAC protocol that best suits the current network condition. Extensive simulation results validate our work, and it also proven that the accuracy of the proposed MAC protocol selection strategy is higher than the existing work.

A study on Korea's defense export expansion strategy - Focusing on Korea-Poland Defense Export Case - (한국의 방산수출 확대 전략 연구 - 한·폴란드 방산수출 사례를 중심으로 -)

  • Geum-Ryul Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.141-151
    • /
    • 2023
  • Since the end of the Cold War in the 1990s, European countries have cut defense costs and reduced armaments as an era of peace without large-scale wars continues, and as a result, the West's defense industry base has gradually weakened. On the other hand, South Korea, the world's only divided country, was able to achieve high growth in the defense industry as a result of continuous arms strengthening in the face of North Korea's nuclear and missile threats. With the rapid increase in demand for conventional weapons systems and changes in the structure of the global defense market due to the Russia-Ukraine war, Korea's weapons system drew great attention as a large-scale defense export contract with Poland was signed in 2022. In 2023, K-Defense ranked ninth in the world's arms exports and aims to become the world's fourth-largest defense exporter by 2027. Therefore, this study analyzed the case of Korea-Poland defense exports to derive problems, and presented development strategies related to export revitalization of K-Defense, a national strategic industry. In order for the defense industry to become Korea's next growth engine, it is necessary to establish a defense organization, prepare government-level measures to protect defense industry technology, and expand military and security cooperation with allies linked to defense exports.

Strategy for South Korea-Vietnamese Military Cooperation in the field of defense (한(韓)·베트남 군사협력 추진전략 : 방산분야를 중심으로)

  • Lee, Kang Kyong
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.105-112
    • /
    • 2018
  • South Korea and Vietnam have been engaged in extensive political, economic and cultural exchanges since the establishment of diplomaticties in 1992. In March 2018, Moon Jae-in, President of South Korea, made an official visit to Vietnam, a key partner of the New Southern Policy and discussed comprehensive cooperation measures, including expanding trade volume and measures to establish peace on the Korean Peninsula. At the defense ministers' meeting held in April 2018, the two countries signed a joint defense and defense cooperation statement, which included promotion of maritime security, defense cooperation, UN PKO activities, excavation of remains, and joint military cooperation. Currently, Vietnam is facing territorial disputes with China over the South China Sea, and is stepping up military modernization and military buildup to counter this. In particular, Vietnam is strengthening its external military cooperation beyond ideology with the U.S., Russia, India and France to strengthen its maritime power. Against this backdrop, the bilateral cooperation between South Korea and Vietnam needs to expand beyond the traditional economic and cultural exchanges to military cooperation. The study aims to review the relationship between South Korea and Vietnam on the 26th anniversary of the normalization of diplomaticties and seek ways to develop military cooperation with Vietnam, which has grown to the next China. To that end, it analyzed Vietnam's security environment and military strategy and presented strategies for promoting military cooperation focusing on defense areas.

  • PDF

A performance based strategy for design of steel moment frames under blast loading

  • Ashkezari, Ghasem Dehghani
    • Earthquakes and Structures
    • /
    • v.15 no.2
    • /
    • pp.155-164
    • /
    • 2018
  • Design of structures subjected to blast loads are usually carried out through nonlinear inelastic dynamic analysis followed by imposing acceptance criteria specified in design codes. In addition to comprehensive aspects of inelastic dynamic analyses, particularly in analysis and design of structures subjected to transient loads, they inherently suffer from convergence and computational cost problems. In this research, a strategy is proposed for design of steel moment resisting frames under far range blast loads. This strategy is inspired from performance based seismic design concepts, which is here developed to blast design. For this purpose, an algorithm is presented to calculate the capacity modification factors of frame members in order to simplify design of these structures subjected to blast loading. The present method provides a simplified design procedure in which the linear dynamic analysis is preformed, instead of the time-consuming nonlinear dynamic analysis. Nonlinear and linear analyses are accomplished in order to establish this design procedure, and consequently the final design procedure is proposed as a strategy requiring only linear structural analysis, while acceptance criteria of nonlinear analysis is implicitly satisfied.

Concept of Strategy in Organizational Information Security (조직 차원의 정보보안 전략의 개념)

  • Park, Sang-Seo
    • Convergence Security Journal
    • /
    • v.7 no.3
    • /
    • pp.15-24
    • /
    • 2007
  • As the importance of information security increases, organizations are employing various security countermeasures into their information systems. However, they are not being adapted based on a strategic framework. Therefore this paper researches on the concept of the strategy in organizational information security. This paper studies literatures to find out how information security strategies have been discussed and what types of them have been proposed until now. This paper contributes to the formation of concept of strategy and classification of them by focusing on strategies themselves in organizational information security.

  • PDF

Variable Structure Controller with Time-Varying Switching Surface under the Bound of Input using Evolution Strategy (진화전략과 입력제약조건에 의한 시변스위칭면의 가변구조제어기 설계)

  • Lee, Min-Jeong;Kim, Hyeon-Sik;Choe, Yeong-Gyu;Jeon, Seong-Jeup
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.48 no.4
    • /
    • pp.402-409
    • /
    • 1999
  • Variable structure control law is well known to be a robust control algorithm and evolution strategy is used as an effective search algorithm in optimization problems. In this paper, we propose a variable structure controller with time-varying switching surface. We calculate the maximum value of seitching surface gradient that is of the 3rd order polynomial form. Evolution strategy is used to optimize the parameters of the switching surface gradient. Finally, the proposed method is applied to position tracking control for BLDC motor. Experimental results show that the proposed method is more useful than the conventional variable structure controller.

  • PDF