• Title/Summary/Keyword: Military Use

Search Result 960, Processing Time 0.027 seconds

A Feasibility Study on the Estimation of a Ship's Susceptibility Based on the Effectiveness of its Anti-Air Defense Systems (함정 대공방어시스템의 효과도를 활용한 피격성 추정 가능성 연구)

  • GeonHui Lee;SeokTae Yoon;YongJin Cho
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.60 no.1
    • /
    • pp.57-64
    • /
    • 2023
  • Recently, the increased use of anti-ship guided missiles, a weapon system that detects and attacks targets in naval engagement, has come to pose a major threat to the survivability of ships. In order to improve the survivability of ships in response to such anti-ship guided missiles, many studies of means to counteract them have been conducted in militarily advanced countries. The integrated survivability of a ship can be largely divided into susceptibility, vulnerability, and recoverability, and is expressed as the conditional probability, if the ship is hit, of damage and recovery. However, as research on susceptibility is a major military secret of each country, access to it is very limited and there are few publicly available data. Therefore, in this study, a possibility of estimating the susceptibility of ships using an anti-air defense system corresponding to anti-ship guided missiles was reviewed. To this, scenarios during engagement, weapon systems mounted to counter threats, and maximum detection/battle range according to the operational situation of the defense weapon system were defined. In addition, the effectiveness of the anti-air defense system and susceptibility was calculated based on the performance of the weapon system, the crew's ability to operate the weapon system, and the detection probability of the detection/defense system. To evaluate the susceptibility estimation feasibility, the sensitivity of the detailed variables was reviewed, and the usefulness of the established process was confirmed through sensitivity analysis.

A Study on the Definition of Panok in the Records of the Joseon Dynasty - Based on the Records Related to DB Pan-ock in Institute for the Translation of Korean Classics - (조선 시대 기록을 통해서 본 판옥의 정의에 관한 연구 - 한국고전종합DB의 판옥(板屋) 관련 기록을 중심으로 -)

  • Kim, Ra-Nee;Han, Dong-Soo
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.24 no.4
    • /
    • pp.117-124
    • /
    • 2022
  • Recognizing the problem that the definition of the term pan-ock does not appear precisely in the dictionary, the definition of pan-ock was established through analysis by analyzing 183 cases of pan-ock searched in the Korean Classics DB and classifying them into buildings and ships. First of all, the 65 pan-ocks classified as architecture were used in various ways, such as residences, religious facilities, jang-pan-ocks, and prisons, depending on their use. Second, the 90 cases of pan-ock related to ships were the concept of houses that combine work and accommodation on ships. Finally, through military installations, literary expressions, and bureaucrats who have seen trains and wagons, Pan-ock uses boards. It can be used for walls or roofs only, or for both walls and roofs. Therefore, it is necessary to consider the case of the Joseon Dynasty with the definition of Pan-ock in the existing dictionary. In other words, Pan-ock refers to "houses, religious facilities, royal tombs, and prisons, with various uses and forms. In addition, it refers to the joining of only the wall or the roof with planks, or the joining of both the wall and the roof," suggesting a broader interpretation of the category.

Securitization and the Merger of Great Power Management and Global Governance: The Ebola Crisis

  • Cui, Shunji;Buzan, Barry
    • Analyses & Alternatives
    • /
    • v.3 no.1
    • /
    • pp.29-61
    • /
    • 2019
  • Within the discipline of International Relations (IR), the literatures on global governance (GG) and great power management (GPM) at best ignore each other, and at worst treat the other as a rival or enemy. On the one hand, the GPM literature, like both realism in all its forms, and neoliberalism, takes for granted the ongoing, disproportionate influence of the great powers in the management of the international system/society, and does not look much beyond that. On the other hand, the GG literature emphasizes the roles of smaller states, non-state actors and intergovernmental organizations (IGOs), and tends to see great powers more as part of the problem than as part of the solution. This paper argues that the rise to prominence of a non-traditional security agenda, and particularly of human security, has triggered a de facto merger of GPM and GG that the IR literature usually treated as separate and often opposed theories. We use the Ebola crisis of 2014-15 to show how an issue framed as human security brought about a multi-actor response that combined the key elements of GPM and GG. The security framing overrode many of the usual inhibitions between great powers and non-state actors in humanitarian crises, including even the involvement of great power military forces. Through examining broadly the way in which the Ebola crisis is tackled, we argue that in an age of growing human security challenges, GPM and GG are necessarily and fruitfully merging. The role of great powers in this new human security environment is moving away from the simple means and ends of traditional GPM. Now, great powers require the ability to cooperate and coordinate with multiple-level actors to make the GG/GPM nexus more effective and sustainable. In doing so they can both provide crucial resources quickly, and earn respect and status as responsible great powers. IGOs provide legitimation and coordination to the GPM/GG package, and non-state actors (NSAs) provide information, specialist knowledge and personnel, and links into public engagement. In this way, the unique features of the Ebola crisis provide a model for how the merger of GPM and GG might be taken forward on other shared-fate threats facing global international society.

  • PDF

A Mrthod on the Design of Sensor Network for the Surrounding Safety Using Drones (드론을 활용한 주변 안전을 위한 센서 네트워크 구성 방안)

  • Hong, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.667-669
    • /
    • 2021
  • Recently, RFID/USN technology has been applied in various fields such as logistics, environment, education, home network, disaster prevention, military, and medical care, but despite the remarkable development of RFID/USN technology, it is difficult to apply it to marine industry due to the characteristics of poor marine environment. Therefore, satellites are mainly used in the marine sector, and existing communication networks are used in the coast, so measures for forming a shelf-only short-range network in the ocean are being considered. In this paper, we consider the use of drones as mobile base stations of USN as a base station role using USN in existing PS-LTE and LTE networks.Since autonomous navigation vessels are aiming for the intelligent system, the number of crew and labor force should be reduced and the function of autonomous network formation in the form of more stable and intelligent ICT convergence technology should be strengthened.

  • PDF

A Study on the Moral Responsibility of Lethal Autonomous Weapon Systems (LAWS): Focused on Robert Sparrow's "Responsibility Gap" Theory (치명적 자율무기체계의 도덕적 책임 문제 연구 : 로버트 스패로우의 '책임간극' 이론에 대한 고찰)

  • Hyunyoung Moon;Sangsu Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.375-381
    • /
    • 2023
  • In an increasingly hyperconnected battlefield, the reliance on battlefield networks and AI-based autonomous weapons systems creates uncertainty and raises ethical concerns. This article explores the responsibility gap in operating autonomous weapons systems, using Robert Sparrow's theory. By analyzing Sparrow's arguments, we propose overcoming the responsibility gap in lethal autonomous weapon systems (LAWS). Our objective is to establish a framework of responsibility that aligns with the evolving battlefield, promoting the development and use of responsible weapon systems.

Efficient and Secure Signature Scheme applicable to Secure multi-party Computation

  • Myoungin Jeong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.7
    • /
    • pp.77-84
    • /
    • 2023
  • This research originated from the need to enhance the security of secure multiparty computation by ensuring that participants involved in multiparty computations provide truthful inputs that have not been manipulated. While malicious participants can be involved, which goes beyond the traditional security models, malicious behaviors through input manipulation often occur in real-world scenarios, leading to privacy infringements or situations where the accuracy of multiparty computation results cannot be guaranteed. Therefore, in this study, we propose a signature scheme applicable to secure multiparty technologies, combining it with secret sharing to strengthen the accuracy of inputs using authentication techniques. We also investigate methods to enhance the efficiency of authentication through the use of batch authentication techniques. To this end, a scheme capable of input certification was designed by applying a commitment scheme and zero-knowledge proof of knowledge to the CL signature scheme, which is a lightweight signature scheme, and batch verification was applied to improve efficiency during authentication.

A Study on the Generation and Transmission of Drone Jamming Signals Based on the MAVLink Protocol (MAVLink 프로토콜 기반 드론 교란 신호 생성 및 송출에 관한 연구)

  • Woojin Lee;Changhan Lim;Jaeyeon Lee
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.75-84
    • /
    • 2023
  • Recently, as the use of drones for military purposes is increasing, such as the Russia-Ukraine War, North Korea's reconnaissance against South Korea, and Army Tiger 4.0's dronebot system, anti-drone technology is developing a lot in each country. However, traditional anti-drone technologies in the form of using conventional weapons or electronic warfare weapons have the disadvantage of being expensive, so anti-drone technologies that can be performed at low cost are currently being newly researched. Therfore, in response to these anti-drone technologies, many efforts are being made to increase the survivability of our allies. In line with this trend, this study assumes a virtual anti-drone system applied with cyber domain and electronic warfare domain technologies that can be performed at low cost, rather than a technique using expensive conventional weapons or electronic warfare weapons among various anti-drone technologies. In response to this, we would like to present a plan to increase the survivability of friendly drones.

Designing Integrated Development Environments and Integration Agents for Intelligent Software Development (지능형 소프트웨어 개발을 위한 통합개발환경 및 연동 에이전트 설계)

  • Min-gi Seo;Da-na Jung;Yeon-je Cho;Ju-chul Shin;Seong-woo Kim
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.5
    • /
    • pp.635-642
    • /
    • 2023
  • With the development of artificial intelligence technology, drones are evolving beyond simple remote control tools into intelligent drones that perform missions autonomously. The importance of drones is gradually gaining attention due to the use of drones in overseas military conflicts and the analysis of the future operational environment in Korea. AMAD is proposed for the rapid development of intelligent drones. In order to develop intelligent software based on AMAD, an integrated development environment (IDE) that supports users with functions such as debugging, performance evaluation, and monitoring is essential. In this paper, we define the concepts of the development environment required for intelligent software development and describe the results of reflecting them in the design of the IDE and AMAD's agents, SVI and MPD, which are interfaced with the IDE.

AI-Based Intelligent CCTV Detection Performance Improvement (AI 기반 지능형 CCTV 이상행위 탐지 성능 개선 방안)

  • Dongju Ryu;Kim Seung Hee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.117-123
    • /
    • 2023
  • Recently, as the demand for Generative Artificial Intelligence (AI) and artificial intelligence has increased, the seriousness of misuse and abuse has emerged. However, intelligent CCTV, which maximizes detection of abnormal behavior, is of great help to prevent crime in the military and police. AI performs learning as taught by humans and then proceeds with self-learning. Since AI makes judgments according to the learned results, it is necessary to clearly understand the characteristics of learning. However, it is often difficult to visually judge strange and abnormal behaviors that are ambiguous even for humans to judge. It is very difficult to learn this with the eyes of artificial intelligence, and the result of learning is very many False Positive, False Negative, and True Negative. In response, this paper presented standards and methods for clarifying the learning of AI's strange and abnormal behaviors, and presented learning measures to maximize the judgment ability of intelligent CCTV's False Positive, False Negative, and True Negative. Through this paper, it is expected that the artificial intelligence engine performance of intelligent CCTV currently in use can be maximized, and the ratio of False Positive and False Negative can be minimized..

Analysis of methods for the model extraction without training data (학습 데이터가 없는 모델 탈취 방법에 대한 분석)

  • Hyun Kwon;Yonggi Kim;Jun Lee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.57-64
    • /
    • 2023
  • In this study, we analyzed how to steal the target model without training data. Input data is generated using the generative model, and a similar model is created by defining a loss function so that the predicted values of the target model and the similar model are close to each other. At this time, the target model has a process of learning so that the similar model is similar to it by gradient descent using the logit (logic) value of each class for the input data. The tensorflow machine learning library was used as an experimental environment, and CIFAR10 and SVHN were used as datasets. A similar model was created using the ResNet model as a target model. As a result of the experiment, it was found that the model stealing method generated a similar model with an accuracy of 86.18% for CIFAR10 and 96.02% for SVHN, producing similar predicted values to the target model. In addition, considerations on the model stealing method, military use, and limitations were also analyzed.