• Title/Summary/Keyword: Military Safety

Search Result 473, Processing Time 0.024 seconds

Study on Foreign Military Authority Recognition Questionsets (MARQs) (해외 군당국의 감항인정의제 고찰)

  • Roh, Jin Chul;Goo, Bon Wook;Ko, Joon Soo
    • Journal of Aerospace System Engineering
    • /
    • v.10 no.4
    • /
    • pp.105-114
    • /
    • 2016
  • The world is currently confronted with regional conflicts among nations that seek to protect their territory. The associated counter-terrorism activities and international business flows can be increased through airworthiness-recognition tasks that are related to aircraft exports, dispatch troops, and overseas bases. It is important to establish airworthiness-recognition processes between foreign military authorities to minimize the potential for sovereign national positions and responsibilities. For this study, the military airworthiness recognition between recognition partners was surveyed to secure flight safety for the development and operation of aircrafts. The analysis of the U.S. and European Military Authority Recognition Questionsets (MARQs) in this paper introduces the rules, inspection capabilities, production process, and certification of the airworthiness authority. The regulatory activities, which are required by the Korea Military Airworthiness Authority (MAA) with respect to foreign MAAs, can be reduced by the implementation of the MARQ.

A Study on the Planning of Civil Defense Shelter and Design 3 - Focusing on Considerations Related to Military Threat - (민방위 대피시설 계획 및 설계 방안에 관한 연구 3 - 군사위협에 따른 고려 요소를 중심으로 -)

  • Park, Namkwun
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.1
    • /
    • pp.97-106
    • /
    • 2015
  • Currently, South Korea is exposed to various attacks of North Korea such as traditional, nuclear, and ABC weapons. Now it is hard to make an accurate estimate the damage may have been occurred to citizens due to those attacks. It is only possible to assume the rough outline. As a countermeasure to such military threats of North Korea, government-aided evacuation facilities services are going along across the board concerning the object, installation range, budget, and drawing standards. Whereas, in case of public evacuation facilities, there is no special regulation or principle in designation. Since various facilities are regarded as applicable, any protection against military threats can't be anticipated. In this study, military threats provoked by North Korea are figured out, thus the problem of plan and design that public evacuation facilities have are pointed out. This study suggest the result and proposal.

A Study on the Method for Judging the Required Protection Capacity through Decision Making (의사결정론을 통한 방호요구수준 판단방안 제시에 관한 연구)

  • Lee, Sung-Hak;Park, Sang-Woo;Baek, Jang-Woon;Park, Young-Jun
    • Journal of the Korea Institute of Building Construction
    • /
    • v.19 no.2
    • /
    • pp.167-174
    • /
    • 2019
  • Protective facilities are the last means of ensuring the survivability of personnel and assets, and there is a greater amount of matters to consider than those of general buildings. However, the Defense Military Facilities Criteria and the Ministry of the Interior and Safety, Ordinance No. 20, are only considering the expected enemy threats. In this study, we use objective and statistical methods to refine the consideration of the required capacity of protection based on the opinions of the experts. Specifically, the study adopts the Delphi technique associating the experts related to 30 defense military facilities criteria. The first-round questions were open-ended, and it compiled the points to consider related to the bulletproof and explosion - proof design. The second questionnaire was applied as closed questionnaire with 7 points scale methods. As a result of the factor analysis on the opinions of the experts, it was confirmed that the protection requirement level was due to METT + TC.

Avionics Architecture Design for Military Unmanned Aerial Vehicles (군용 무인기의 항공전자 아키텍처 설계)

  • Jae Ick, Shim;Jae Won, Choi;Yong Tae, Kim;Dong Wan, Yoo;Kook Bo, Yang;Hyun Seok, Ha;Sang Jin, Kim;Seung Yul, Lee;Sang Jun, Jung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.6
    • /
    • pp.628-636
    • /
    • 2022
  • This paper describes the design of the avionics architecture for military unmanned aerial vehicles considering the airworthiness requirements for the first time. This design considers the redundancy in the system data bus and the power system and the data link system to meet the system safety requirements of the airworthiness requirements of military UAVs. This avionics architecture design has been verified through the system integration test and the flight test after manufacturing the UAV.

A Study on ways to secure personal information stability according to the implementation of the mobile phone use system for milityary personnel (군장병 휴대전화 사용제도 시행에 따른 개인정보 안정성 확보 방안 연구)

  • Hwangbo, Wongyu;Shin, Dong-Kyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.49-58
    • /
    • 2022
  • As military service members are fully permitted to use mobile phones for sickness after work, it is time to minimize the direct collection of personal information from telecommunication companies when opening mobile phones to secure the safety of military service personnel's personal information. Prior to introducing the use of mobile phones by soldiers after work, the Ministry of National Defense established a security control system such as blocking the mobile phone shooting function to prevent security accidents and concerns about some adverse functions such as illegal cyber gambling, game addiction, and viewing pornography. come. Mobile telecommunications companies entrust personal information processing tasks, such as opening mobile phones, to telecommunications agencies and carry out management and supervision, such as checking the status of personal information protection measures. When a military service member opens a mobile phone, a personal information management agency is newly established using the right to portability of personal information, and a system for requesting the transmission of personal information from the military service member is proposed.

Affect the Safety needs of Military Personnel Guard on Organizational Commitment, and Job Satisfaction (군 경호·경찰직 요원의 안전욕구가 조직몰입 및 직무만족에 미치는 영향)

  • Kim, Jin Hwan;Kim, Sang Jin
    • Convergence Security Journal
    • /
    • v.16 no.3_2
    • /
    • pp.65-74
    • /
    • 2016
  • Questionnaires were deployed total of 320 and the recovered 259 questionnaires were used in the analysis. The collected questionnaires were analyzed by using SPSS21.0, Amos21.0. Statistical analysis was to test the hypothesis through reliability analysis, factor analysis, and structural equation modeling analysis. Statistical significance level was set at .05. These results obtained in this study according to the method and procedure is as follows. Safety needs has a significant impact on job satisfaction and organizational commitment and organizational commitment has a significant impact on job satisfaction. And organizational commitment was investigated as part of a mediating role in the relationship between job satisfaction and safety needs.

Study on the Energy Security Strategy of South Korea - Focused on the Innovation System Perspective - (국가 에너지안보 추진전략 분석에 관한 연구 - 혁신시스템 관점에서의 분석 및 추진전략을 중심으로 -)

  • Choi, Jeong-Hwan;Lee, Hong-Hoon
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.21 no.6
    • /
    • pp.679-688
    • /
    • 2015
  • Stability and security of energy resources are one of the most important factors for a national-development. In this research, we analyzed the Republic of Korea's policy making system on energy security and identified the problems from an innovation system perspective. In terms of the actors, they had limitations that ROK's navy do not have enough strategic plan for energy transportation. The links between innovation actors except defense area were relatively good, but links between the military area(navy) and other innovation actors had weak linkage. The infrastructure did't have enough consideration for military force development. For the institution; the role of the military area on energy security was not completely established. Therefore, participation of the defense area(navy) is required to be stated institutionally.

Correlation Analysis between Integrated Stress Responses and EEG Signals of Construction Workers (건설근로자의 통합적 스트레스 반응과 뇌파신호의 상관관계 분석)

  • Lee, Su-Jin;Lim, Cha-Yeon;Park, Young-Jun
    • Journal of the Korea Institute of Building Construction
    • /
    • v.20 no.1
    • /
    • pp.93-102
    • /
    • 2020
  • The purpose of this study is to find out how to measure the stress related to accidents at the construction site promptly and conveniently to prevent safety accidents of construction workers. Accordingly, we analyzed the correlations between the questionnaire tool index that measures the stress associated with complex psychology of humans by integrating emotion, cognition, physical and behavioral responses, and basic brain waves, SEF-90, concentration, stress index from brain wave. As a result, which had the highest correlation with the stress measured through the questionnaire, was the SEF-90, and the regression analysis between two independent variables yielded a specific regression equation. This suggests the possibility of measuring the integrated stress of construction workers through the EEG signal at the construction site, and it can be used for the safety management of the construction site in the future.

Lightweight Key Escrow Scheme for Internet of Battlefield Things Environment (사물인터넷 환경을 위한 경량화 키 위탁 기법)

  • Tuan, Vu Quoc;Lee, Minwoo;Lim, Jaesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.12
    • /
    • pp.1863-1871
    • /
    • 2022
  • In the era of Fourth Industrial Revolution, secure networking technology is playing an essential role in the defense weapon systems. Encryption technology is used for information security. The safety of cryptographic technology, according to Kerchoff's principles, is based on secure key management of cryptographic technology, not on cryptographic algorithms. However, traditional centralized key management is one of the problematic issues in battlefield environments since the frequent movement of the forces and the time-varying quality of tactical networks. Alternatively, the system resources of each node used in the IoBT(Internet of Battlefield Things) environment are limited in size, capacity, and performance, so a lightweight key management system with less computation and complexity is needed than a conventional key management algorithm. This paper proposes a novel key escrow scheme in a lightweight manner for the IoBT environment. The safety and performance of the proposed technique are verified through numerical analysis and simulations.