• Title/Summary/Keyword: Integrated security system

Search Result 574, Processing Time 0.035 seconds

Method's to introduce ROKN Nuclear Propulsion Submarines (한국형 원자력 추진 잠수함 도입방안)

  • Jang, Jun-Seop
    • Strategy21
    • /
    • s.42
    • /
    • pp.5-52
    • /
    • 2017
  • Debates about introducing nuclear submarines have been a main issue in Korea. The highest officials and the government has started to think seriously about the issue. Yet there were no certain decision to this issue or any agreements with US but it is still necessary to review about introducing nuclear submarines, the technologies and about the business. The reason for such issues are the highest officials of Korea to build nuclear submarine, nK's nuclear development and SLBM launching. ROKN's nuclear submarine's necessity will be to attack(capacity to revenge), defend(anti-SSBN Operation) and to respond against neighboring nation's threat(Russia, Japan, China). Among these nations, US, Russia (Soviet Union), Britain, France had built their submarines in a short term of time due to their industrial foundation regarding with nuclear propulsion submarines. However China and India have started their business without their industrial foundation prepared and took a long time to build their submarines. Current technology level of Korea have reached almost up to US, Russia, Britain and France when they first built their nuclear propulsion submarines since we have almost completed the business for the Changbogo-I,II and almost up to complete building the Changbogo-III which Korea have self designed/developed. Furthermore Korea have reached the level where we can self design large nuclear reactors and the integrated SMART reactor which we can call ourselves a nation with worldwide technologies. If introducing the nuclear submarine to the Korea gets decided, first of all we would have to review the technological problems and also introduce the foreign technologies when needed. The methods for the introduction will be developments after loans from the foreign, productions with technological cooperations, and individual production. The most significant thing will be that changes are continuous and new instances are keep showing up so that it is important to only have a simple reference to a current instances and have a review on every methods with many possibilities. Also developing all of the technologies for the nuclear propulsion submarines may be not possible and give financial damages so there may be a need to partially introduce foreign technologies. For the introduction of nuclear propulsion submarines, there must be a resolution of the international regulations together with the international/domestics resistances and the technological problems to work out for. Also there may be problem for the requirement fees to solve for and other tough problems to solve for. However nuclear submarines are powerful weapon system to risk everything above. This is an international/domestically a serious agenda. Therefore rather than having debates based on false facts, there must be a need to have an investigations and debates regarding the nation's benefits and national security.

Study on the Realities in Seoul Subway Crimes: Criminal Psychology (서울지하철 범죄 실태에 대한 범죄심리학적 연구)

  • Rim, Sang-Gon
    • Korean Security Journal
    • /
    • no.7
    • /
    • pp.233-285
    • /
    • 2004
  • ‘Defined legally as a violation of law' (Sutherland, E. H. Principles of Criminology, Lippincott, Chicago, 1939) Crime within the group is essentially and primarily antisocial in that the criminal who is welfare of his group acts instead against it and breaks the principles of social solidarity not merely by not doing what these principles prescribe, but by doing something exactly opposites. Any program set up to attack crime and delinquent behavior at their sources. A program of his nature needs the constant and comprehensive collaboration of psychiatrists, social works, educations, lawmakers, and public officials, since crime is a social problem and it should be treated as such. Some crime preventives which should be mentioned are as follows, (1) The insurance that every child will be decently born and that his home life be socially and economically adequate; without socially mature parents the chid is handicapped at the start; thus parental education, integrated with the public school system, should be developed now. (2) A more meaningful educational program which would emphasize ideals of citizenship, moral integrity, and respect for the law and the police. (3) A periodic check made for potential delinquents throughout the public schools and treatment provided if possible; and if not, proper segregation in institutions. (4) Careful attention paid to press, movies, and radio so that crime may no longer appear to be glamorous. This can be done by women's clubs, civic bodies, and other educational groups exerting pressure on the movie syndicates and broadcasting companies to free their productions of the tawdry and lurid characteristics of crime and criminals. Aggression associated with the phallic stage of development, The child ordinarily comprehends sexual intercourse as an aggressive and sadistic act on the part of the male, and specifically on the part of the penis. Evidence that the penis is phantasied as a weapon of violence and destruction come from unconscious productions of normal adults. Limerick, for instance, often refer to the penis as square, or too large, etc., so that intercourse is dangerous and painful for the partner, This may wall be a projection of the male's own fear of coitus. A certain portion of the death-instinct always remains within the person; it is called 'primal sadism' and according to Freud is identical with masochism. 'After the chief part of it(the death instinct) has been directed outwards towards objects, there remains as a residuum within the organism the true erotogenic masochism, which on the one hand becomes a component of the libido and on the other still has the subject itself for a object.' Criminalism, compulsive-neurotic frequent repetition of criminal acts in a compulsive manner. Like most symptoms of the compulsive-neurotic, such antisocial act are closely rated to feelings of hostility and aggression, often against the father. Because these acts are symptomatic, they afford only temporary relief and are therefore repeated. One patient with compulsive-neurotic criminalism was apprehended after breaking into hardware store and stealing money. He later confessed to many similar incidents over the preceding two years. At the same time it was apparent that he stole only for the sake of stealing. He did not need the money he thus obtained and had no special plans for using it.

  • PDF

A Study on the Reestablishment of the Drone's Concept (드론 개념의 재정립에 관한 연구)

  • Lee, Seungyoung;Kang, Wook
    • Korean Security Journal
    • /
    • no.58
    • /
    • pp.35-58
    • /
    • 2019
  • Drone was originally developed for air force aircraft or missile exercise shooting targets, and is being considered as the entire unmanned aircraft to the public. The core concept of a drone can be divided into 'unmanned' and 'aircraft'. However, there are many questions about whether the Fourth Industrial Revolution, expressed as a convergence scientific innovation, is appropriate at a time when smart cities are proposed as a concept of new urban spatial formation, and the role of self-driving vehicles, including drones, is being emphasized within the new urban integrated transport system. In this study, the concept of the existing drones was analyzed for the development process, definitions in each country's laws, and the results of the preceding research to present a concept suitable for future society and a unified term. It is not desirable to define a drone for the purpose of a country, an institution, or an operating entity, depending on the circumstances of the era. It is more reasonable to find the concept of a drone based on human life than in the traditional way, and more reasonable considering the development of the drones in the future. Subsequent studies should be more detailed, more data and research results analyzed, and discussed areas that were not covered in this study. Based on this, research should also be conducted on a variety of topics, including legislation, preparation of operational regulations, and related industrial processes and regulations.

Proposal of Performance Evaluation Methodology for Hydropower Reservoirs with Resilience Index (회복탄력성을 고려한 발전용댐의 성능평가 방법론 제안)

  • Kim, Dong Hyun;Yoo, Hyung Ju;Shin, Hong-Joon;Lee, Seung Oh
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.1
    • /
    • pp.47-56
    • /
    • 2022
  • Recently, water resources and energy policies such as integrated water management and carbon neutrality are changing rapidly. There is an opinion that the value of hydropower reservoirs related to these policies should be re-evaluated. In the past, they have contributed to flood control in addition to electricity generation, such as operating at a limited water level during the flood season, but loss of power generation is inevitable with this operation. Therefore, this study introduced the concept of resilience to the hydropower generation system to minimize the power loss. A framework for evaluating the power generation performance of them was presented by defining the maximization of electricity sales as performance. Based on the current procedure of multiple operation plan, a scenario was established and simulation was performed using HEC-5. As a result of applying to the framework, it was confirmed that the power generation performance according to each scenario was evaluated as an important factor. And it was confirmed that the performance of flood control and water use could also be evaluated.

Evaluation of Crop Production Increase through Insect Pollination Service in Korean Agriculture (한국 농업에서 곤충 화분매개 서비스를 통한 식량 생산 증진 기능 평가)

  • Jung, Chuleui;Shin, Jong Hwa
    • Korean journal of applied entomology
    • /
    • v.61 no.1
    • /
    • pp.229-238
    • /
    • 2022
  • Animal pollination is an important ecosystem service provided mostly by diverse insect groups such as bees and hover flies. Maintaining agricultural productivity and securing the nutritional balance are closely tied to human wellbeing. This study aimed to estimate the pollination dependent food production in Korean agricultural system. Crop production data were obtained from Korean statistical information service (KOSIS) data of 2015. By implementing pollination dependency, crop production and market price, contribution of insect pollination to crop production increase were estimated from total 71 crops including 12 cereals, 19 fruits, 18 field vegetables, 13 greenhouse vegetables and 9 specialty crops. Mean pollination dependency of all crops were 29.2% and it was higher on fruits, specialty crops and greenhouse vegetables as well, but low (7.5%) in cereal crops. Pollination dependent (PD) production was estimated as 17.8% of total agricultural crop production with the economic value of 6,850 (6,508-7,193) billion won. Especially, PD production of greenhouse vegetables accounted 49.2% followed by fruits of 42.9%. Even specialty crop also showed higher PD production (35.9%). It was obvious that pollination is the vital service for agricultural production as well as nutritional security in Korea. Further protection and enhancing the pollination service were discussed with integrated pollinator-pest management (IPPM) strategies.

Improved Resource Allocation Model for Reducing Interference among Secondary Users in TV White Space for Broadband Services

  • Marco P. Mwaimu;Mike Majham;Ronoh Kennedy;Kisangiri Michael;Ramadhani Sinde
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.55-68
    • /
    • 2023
  • In recent years, the Television White Space (TVWS) has attracted the interest of many researchers due to its propagation characteristics obtainable between 470MHz and 790MHz spectrum bands. The plenty of unused channels in the TV spectrum allows the secondary users (SUs) to use the channels for broadband services especially in rural areas. However, when the number of SUs increases in the TVWS wireless network the aggregate interference also increases. Aggregate interferences are the combined harmful interferences that can include both co-channel and adjacent interferences. The aggregate interference on the side of Primary Users (PUs) has been extensively scrutinized. Therefore, resource allocation (power and spectrum) is crucial when designing the TVWS network to avoid interferences from Secondary Users (SUs) to PUs and among SUs themselves. This paper proposes a model to improve the resource allocation for reducing the aggregate interface among SUs for broadband services in rural areas. The proposed model uses joint power and spectrum hybrid Firefly algorithm (FA), Genetic algorithm (GA), and Particle Swarm Optimization algorithm (PSO) which is considered the Co-channel interference (CCI) and Adjacent Channel Interference (ACI). The algorithm is integrated with the admission control algorithm so that; there is a possibility to remove some of the SUs in the TVWS network whenever the SINR threshold for SUs and PU are not met. We considered the infeasible system whereby all SUs and PU may not be supported simultaneously. Therefore, we proposed a joint spectrum and power allocation with an admission control algorithm whose better complexity and performance than the ones which have been proposed in the existing algorithms in the literature. The performance of the proposed algorithm is compared using the metrics such as sum throughput, PU SINR, algorithm running time and SU SINR less than threshold and the results show that the PSOFAGA with ELGR admission control algorithm has best performance compared to GA, PSO, FA, and FAGAPSO algorithms.

A Study on the Threat of North Korean Small Drones (북한 소형 드론 위협 사례에 대한 연구)

  • Kwang-Jae Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.397-403
    • /
    • 2024
  • North Korea's rapidly advancing drone development and operational capabilities have become a significant threat to South Korea's security. The drone incursions by North Korea in 2014, 2017, and 2022 demonstrate the technological advancement and provocative potential of North Korean drones. This study aims to closely analyze the military threats posed by North Korean drones and seek effective countermeasures. The research examines the development level of North Korean drone technology, its military applications, the characteristics and patterns of recent drone incursions, the adequacy and limitations of South Korea's current response systems, and future countermeasures. For this purpose, domestic and international research literature and media reports were reviewed, and specific North Korean drone incursion cases were analyzed. The results indicate that North Korea's small drones possess technological features such as small size, low altitude, low-speed flight, long-duration flight, and reconnaissance equipment. These drones pose threats that can be utilized for reconnaissance, surveillance, surprise attacks, and terrorism. Additionally, South Korea's current response systems reveal limitations such as inadequate detection and identification capabilities, low interception success rates, lack of an integrated response system, and insufficient specialized personnel and equipment. Therefore, this study suggests various technical, policy, and international cooperative countermeasures, including the development of drone detection and identification technologies, the utilization of diverse drone neutralization technologies, the establishment of legal and institutional foundations, the construction of a cooperative framework among relevant agencies, and the strengthening of international cooperation. The study particularly emphasizes the importance of raising awareness of the North Korean drone threat across South Korean society and unifying national efforts to respond to these threats.

Proposal on for Response System to International Terrorism (국제 테러리즘의 대응체제 구축방안)

  • Suh, Sang-Yul
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.99-131
    • /
    • 2005
  • Terrorism which became today's common phenomena over the world is one of the most serious threats the world confront. Although International society make and operate outstanding anti-terrorism system, terror would never end without solving fundamental problems. The main body of terrorism converts from nation to organization and from organization to cell, which makes it difficult for us to recognize the main body. Since the target of today's new terrorism is many and unspecified persons, terrorists will never hesitate to use mass destruction weapons such as nuclear, biological, chemical weapons, and also use cyber-technique or cyber-terrorism. So, effective counter-terrorism measures should be performed as follows. First, it must be better for international society should make long-time plan of solving fundamental problems of terrorism other than to operate directly on terror organization and its means. Second, preventive method should be made. The most effective method of eradicating terrorism is prevention. For this, it is necessary to remove environmental elements of terrorism and terrorist bases, and to stop inflow of money and mass destruction weapons to terrorists. Third, integrated anti-terror organization should be organized and operated for continuous counter-terrorism operations. Also international alliance for anti-terrorism should be maintained to share informations and measures. Fourth, concerned department in the government should prepare counter-terrorism plans in their own parts as follows and make efforts to integrate the plans. - Ministry of Government Administration and Home Affairs : conventional terror - Ministry of Health and Welfare : bio-terror - Ministry of Science and Technology : nuclear-terror Especially, they should convert their policy and operation from post-terror actions to pre-terror actions, designate terror as national disaster and organize integrated emergency response organization including civil, government, and military elements. In conclusion, pre-terror activities and remedy of fundamental causes is the best way to prevent terror. Also, strengthening of intelligence activities, international cooperations, and preventive and comprehensive counter-measures must not ignored.

  • PDF

Public Key-Based Operator Authentication Mechanism for Access Control of Multi-Control Systems in OT Control Network (OT제어망에서 다중 제어시스템 접근통제용 공개키 기반 운용자 인증 방안)

  • Kim, Dae-Hwi;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.9
    • /
    • pp.64-75
    • /
    • 2022
  • The method of accessing multiple control systems in the OT control network centered on operation technology uses the operator authentication technology of each control system. An example is ID/PW operator authentication technology. In this case, since the OT control network is composed of multiple control systems, operator authentication technology must be applied to each control system. Therefore, the operator must bear the inconvenience of having to manage authentication information for each control system he manages. To solve these problems, SSO technology is used in business-oriented IT networks. However, if this is introduced into the OT control network as it is, the characteristics of the limited size of the OT control network and rapid operator authentication are not reflected, so it cannot be seen as a realistic alternative. In this paper, a public key-based authentication mechanism was newly proposed as an operator authentication technology to solve this problem. In other words, an integrated public key certificate that applies equally to all control systems in the OT control network was issued and used to access all control systems, thereby simplifying the authentication information management and making access to the control system more efficient and secure.

A Case Study on the Threat of Small Drone and the Development of Counter-Drone System (소형드론 위협 사례와 대드론체계 발전방향)

  • Kang-Il Seo;Ki-Won Kim;Jong-Hoon Kim;Sang-Keun Cho;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.327-332
    • /
    • 2023
  • On December 26, 2022, North Korea's drone provocation resumed for the first time in eight years. The threat covered not only the Seoul metropolitan area but also the no-fly zone for the presidential office's security, and the South Korean military's response to it is not appropriate, which is a major controversy. In the midst of this, problems caused by the prohibition of small drones' flight and illegal intrusion into restricted areas are increasing in Korea, and the threat is becoming a reality, such as being used for terrorist attacks abroad. In this paper, the concept of "Counter-Drone" and related technologies were considered for these drone threats, and implications were derived through domestic and overseas small drone threats, and the direction of development of the Counter-Drone system was presented. North Korea's drone threat is expected to be more diversified, massified, and advanced, resulting in bolder attacks and provocations. Therefore, the South Korean military should push for early powering of the integrated control system and the conter drone system, joint and military cooperation in response to the threat of small drones, and the ability to carry out joint operations between South Korea and the U.S.