• Title/Summary/Keyword: Military command

Search Result 313, Processing Time 0.027 seconds

Study on Bullet-Proof Performance of Multi-Layered Hybrid Armor Against 9mm FMJ Projectile (9mm 권총탄 위협을 받는 적층구조의 방탄성능 연구)

  • Lee, Jong-Gu;Kim, Siho;Kim, Gunin;Cho, Maenghyo
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.25 no.6
    • /
    • pp.487-495
    • /
    • 2012
  • In order to prevent the high velocity bullet from penetration, aluminum alloy and RHA(Rolled Homogeneous Armour) steel, which have a high tensile and compressive strength, are usually used as the bullet-proof armor material. Although these materials have a good bullet proof performance, but not an area density which is a weight increasing factor of bullet-proof armor. Therefore, Mg(magnesium) alloy is a promising substitute for the traditional bullet-proof armor material due to the relatively low areal density. The spatial efficiency of Mg alloy, however, is inferior to the traditional material's, which is a volume(thickness) increasing factor of bullet-proof armor. In this study, we select the multi-layered hybrid armor which consist of Ceramic, with a high strength; Mg alloy, with a low areal density; Kevlar, with a high tensile strength-to-weight ratio; in order to make up for the poor spatial efficiency of Mg alloy. By predicting V50 of the multi-layered armor against 9mm FMJ(Full Metal Jarket). we show that the multi-layered armor have the capability in improving bullet-proof performance in the respect of the areal density, but also the spatial efficiency.

Winning Coalition, Expansion of Wealth, and Naval Power (승자연합과 부(富)의 확장, 그리고 해군력)

  • Park, Ju-Hyeon
    • Strategy21
    • /
    • s.41
    • /
    • pp.174-207
    • /
    • 2017
  • Human history shows diverse strategies for survival and prosperity. This study introduces the concept of the expansion of wealth as a key to explain choice and behavior of political entities. American scholar, -Bruce Bueno de Mesquita-, offers theoretical grounds for this concept in that the cores of selectorate theory is settled. The political entity consists of two groups, -the winning coalition that has power to replace leader and non-winning coalition that has not. Leaders implement policies serving for the welfare of winning coalition in return for their loyalty. Both internal problems caused by demographic changes and external ones of climate changes, epidemic disease, or invasion compel leader and winning coalition to adopt policies of expansion that they believe may lead to the acquisition of wealth needed to counter those problems. The process starts by occupying one spot where other entities reside and then connecting it to its own. The line between spots functions as a foothold to form a new line to other spots. By repeating this process, a space is created in which new laws and orders are instated. In the early stage of expansion, war is hardly avoidable. Once finished successfully, the political circumstance tilts to encourage economic activities in order to generate national revenues to strengthen political power of winning coalition. However, as scale of economic activities grows, so does political power of civic classes in production and trade. To gain financial support required to run the political entity, delegation of power or bestowing autonomy to non-winning coalition is inevitable. Thus, expansion is not the ultimate solution, only to prolong the political survival if succeed. Maritime power came to attractive option when overland expansion had become obstructed. It offered much greater advantages in terms of political risks and financial burdens in exploring new regions of precious commodities than overland expansion. Each political entity around world have been, for the first time in human history, connected by maritime means since 15th century. It is worthy of noting that land conditions propelled people out to sea. Political and economic situations created opportunities to exploit geographical position in pursuit of wealth. In the 21st century, we witness the operation of international winning coalition that presides over the rules of expansion. Competing for market is synonymous to the expansion in this era, the cause and aim of it has not been changed though. Energy and dollars are key factors of expansion since the end of the 2nd world war. No matter what the forms and conditions change, naval power is still the most relevant means for expansion as it retains unique characters of maneuver, flexibility, continuity, display and projection of power. The strategy for using naval power should be in line with two different approaches for expansion: Approaches to the international winning coalition by making contribution to world order, and approaches to the non-international winning coalition by enhancing military diplomatic activities. The former will serve our share of winning coalition while the latter will open chances to acquire further prosperity.

Intestinal Nematodes from Small Mammals Captured near the Demilitarized Zone, Gyeonggi Province, Republic of Korea

  • Kim, Deok-Gyu;Park, Jae-Hwan;Kim, Jae-Lip;Jung, Bong-Kwang;Jeon, Sarah Jiyoun;Lim, Hyemi;Lee, Mi Youn;Shin, Eun-Hee;Klein, Terry A.;Kim, Heung-Chul;Chong, Sung-Tae;Song, Jin-Won;Baek, Luck-Ju;Chai, Jong-Yil
    • Parasites, Hosts and Diseases
    • /
    • v.53 no.1
    • /
    • pp.135-139
    • /
    • 2015
  • A total of 1,708 small mammals (1,617 rodents and 91 soricomorphs), including Apodemus agrarius (n = 1,400), Microtus fortis (167), Crocidura lasiura (91), Mus musculus (32), Myodes (= Eothenomys) regulus (9), Micromys minutus (6), and Tscherskia (= Cricetulus) triton (3), were live-trapped at US/Republic of Korea (ROK) military training sites near the demilitarized zone (DMZ) of Paju, Pocheon, and Yeoncheon, Gyeonggi Province from December 2004 to December 2009. Small mammals were examined for their intestinal nematodes by necropsy. A total of 1,617 rodents (100%) and 91 (100%) soricomorphs were infected with at least 1 nematode species, including Nippostrongylus brasiliensis, Heligmosomoides polygyrus, Syphacia obvelata, Heterakis spumosa, Protospirura muris, Capillaria spp., Trichuris muris, Rictularia affinis, and an unidentified species. N. brasiliensis was the most common species infecting small mammals (1,060; 62.1%) followed by H. polygyrus (617; 36.1%), S. obvelata (370; 21.7%), H. spumosa (314; 18.4%), P. muris (123; 7.2%), and Capillaria spp. (59; 3.5%). Low infection rates (0.1-0.8%) were observed for T. muris, R. affinis, and an unidentified species. The number of recovered worms was highest for N. brasiliensis (21,623 worms; mean 20.4 worms/infected specimen) followed by S. obvelata (9,235; 25.0 worms), H. polygyrus (4,122; 6.7 worms), and H. spumosa (1,160; 3.7 worms). A. agrarius demonstrated the highest prevalence for N. brasiliensis (70.9%), followed by M. minutus (50.0%), T. triton (33.3%), M. fortis (28.1%), M. musculus (15.6%), C. lasiura (13.2%), and M. regulus (0%). This is the first report of nematode infections in small mammals captured near the DMZ in ROK.

Mechanistic Analysis of Taxol-induced Multidrug Resistance in an Ovarian Cancer Cell Line

  • Wang, Ning-Ning;Zhao, Li-Jun;Wu, Li-Nan;He, Ming-Feng;Qu, Jun-Wei;Zhao, Yi-Bing;Zhao, Wan-Zhou;Li, Jie-Shou;Wang, Jin-Hua
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.9
    • /
    • pp.4983-4988
    • /
    • 2013
  • Objectives: To establish a taxol-resistant cell line of human ovarian carcinoma (A2780/Taxol) and investigate its biological features. Methods: The drug-resistant cell line (A2780/Taxol) was established by continuous stepwise selection with increasing concentrations of Taxol. Cell morphology was assessed by microscopy and growth curves were generated with in vitro and in vivo tumor xenograft models. With rhodamine123 (Rh123) assays, cell cycle distribution and the apoptotic rate were analyzed by flow cytometry (FCM). Drug resistance-related and signal associated proteins, including P-gp, MRPs, caveolin-1, PKC-${\alpha}$, Akt, ERK1/2, were detected by Western blotting. Results: A2780/Taxol cells were established with stable resistance to taxol. The drug resistance index (RI) was 430.7. Cross-resistance to other drugs was also shown, but there was no significant change to radioresistance. Compared with parental cells, A2780/Taxol cells were significantly heteromorphous, with a significant delay in population doubling time and reduced uptake of Rh123 (p<0.01). In vivo, tumor take by A2780 cells was 80%, and tumor volume increased gradually. In contrast, with A2780/Taxol cells in xenograft models there was no tumor development. FCM analysis revealed that A2780/Taxol cells had a higher percentage of G0/G1 and lower S phase, but no changes of G2 phase and the apoptosis rate. Expression of P-gp, MRP1, MRP2, BCRP, LRP, caveolin-1, PKC-${\alpha}$, Phospho-ERK1/2 and Phospho-JNK protein was significantly up-regulated, while Akt and p38 MARK protein expression was not changed in A2780/Taxol cells. Conclusion: The A2780/Taxol cell line is an ideal model to investigate the mechanism of muti-drug resistance related to overexpression of drug-resistance associated proteins and activation of the PKC-${\alpha}/ERK$ (JNK) signaling pathway.

The LVC Linkage for the Interoperability of the Battle Lab (Battle Lab에서의 상호운용성을 위한 LVC 연동방안)

  • Yun, Keun-Ho;Shim, Shin-Woo;Lee, Dong-Joon
    • Journal of the Korea Society for Simulation
    • /
    • v.21 no.1
    • /
    • pp.81-88
    • /
    • 2012
  • In the M&S filed, The Battle Lab is available for acquisition, design, development tool, validation test, and training in the weapon system of development process. Recently, the Battle Lab in the military of Korea is still in an early stage, in spite of importance of battle lab construction. In the environment of network centric warfare, a practical use of the M&S which is connecting live, virtual and constructive model can be applied to all field of System Engineering process. It is necessary thar the Battle Lab is not restricted by time and space, and is possible for the technical implementation. In this paper, to guarantee the interoperability of live and virtual simulation, virtual simulators connect live simulators by using the tactical data link. To guarantee the interoperability of virtual and constructive simulation, both virtual simulators and constructive simulators use the RTI which is the standard tool of M&S. We propose the System that constructed the Air Defence Battle Lab. In case of the approach of target tracks, The Air Defence Battle Lab is the system for the engagement based on a command of an upper system in the engagement weapon system. Constructive simulators which are target track, missile, radar, and launcher simulator connect virtual simulators which are MCRC, battalion, and fire control center simulators using the RPR-FOM 1.0 that is a kind of RTI FOM. The interoperability of virtual simulators and live simulators can be guaranteed by the connection of the tactical data links which are Link-11B and ATDL-1.

Realtime Strategy Generation System using Case-based Reasoning (사례기반 추론을 이용한 실시간 전술 생성 시스템 설계)

  • Park, Jong-An;Hong, Chul-Eui;Kim, Won-Il
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.5
    • /
    • pp.49-54
    • /
    • 2011
  • Case-based reasoning is an efficient method to find solutions for new problems by using past cases after appropriate changes. It is widely used in everyday life because it resembles the way human acts. In this paper, we propose a military system that generates the most appropriate tactics for CGF (Computer Generated Forces) by utilizing past practices. It indeed applies case-based reasoning at the process of armed conflict. When the CGF squad on a mission, they will be given an action plan to reach the final goal. In the process of executing, tactics for specific action should be organized such as attacks, ambushes, and tactical moves. By using the proposed method, tactics were generated by case-based reasoning. The proposed system successfully receives input through each command and control agent, measures the degree of similarity with the case in case DB, selects the most similar case, modifies, uses, and then stores it for next time.

A Development of Integrated Control System for Platform Equipments of Unmanned Surface Vehicle (USV) (무인수상정 플랫폼 장비의 통합 제어 시스템 개발)

  • Hwang, Hun-Gyu;Kim, Hyun-Woo;Kim, Bae-Sung;Woo, Yun-Tae;Shin, Il-Sik;Shin, Ji-Hwan;Lee, Young-Jin;Choi, Byung-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.8
    • /
    • pp.1611-1618
    • /
    • 2017
  • Recently, the development for USV-related technologies are actively growing up in military domain. The USV (unmanned surface vehicle) conducts various missions for national defense at maritime environment. For succeed the missions, the USV essentially needs an automatic and remote control platform which includes propulsion system, steering system, control system, power system and so on. In this paper, we developed an integrated control system for the platform equipments and verified effectiveness of the developed system. To do this, we designed a system architecture and implemented a main control system that processes and controls platform equipments by received command. Also we developed components of designed architecture such as engine control device, water-jet control device and power control device. For test and verify the developed system, we designed and made a test-bed of engine and water-jet with related parts, and proceeded a basin test for verifying the developed system based on the test-bed.

A Study on the Necessity of Verification about depot level maintenance plan through the Weapons System cases analysis (무기체계 사례 분석을 통한 창정비개발계획안 검증 필요성 연구)

  • Ahn, Jung-Jun;Kim, Su-Dong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.2
    • /
    • pp.76-82
    • /
    • 2019
  • This study has done to search for a solution to remove risk limitedly caused by separating weapon system acquisition from operation and maintenance at the view point of Logistic Commander who's responsible for stable operation and maintenance after acquiring weapon system. At the System development stage, unverified overhaul development plan may cause additional manpower and costs after the development, and furthermore it is likely to have risk to lower reliability of the military. Thus, research and development agency should write overhaul development plan at the System development stage, and it should be verified through evaluation and verification test. Secondly, during research and development, institutional supplementation is needed to calculate human and material resources writing overhaul development plan. Thirdly, it should be able to analyze proper operation & maintenance plan and cost for overhaul plan at the pre-investigation stage. Fourthly, the base which can develop overhaul concept and overhaul factors should be included in the need and need determination document. Lastly, for the weapon system which has small amount of high power figure, project management should be performed to be able to specify at the each acquisition level of weapon system to realize Article 28, clause 3 and 4 of Defense business law.

A study on the cyber common operation picture for situational awareness in cyberspace (사이버공간 내 상황인식을 위한 사이버 공통 작전 상황도 연구)

  • Kim, Kook-jin;Youn, Jae-pil;Yoon, Suk-joon;Kang, Ji-won;Kim, Kyung-shin;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.87-101
    • /
    • 2022
  • Cyber-attacks occur in the blink of an eye in cyberspace, and the damage is increasing all over the world. Therefore, it is necessary to develop a cyber common operational picture that can grasp the various assets belonging to the 3rd layer of cyberspace from various perspectives. By applying the method for grasping battlefield information used by the military, it is possible to achieve optimal cyberspace situational awareness. Therefore, in this study, the visualization screens necessary for the cyber common operational picture are identified and the criteria (response speed, user interface, object symbol, object size) are investigated. After that, the framework is designed by applying the identified and investigated items, and the visualization screens are implemented accordingly. Finally, among the criteria investigated by the visualization screen, an experiment is conducted on the response speed that cannot be recognized by a photograph. As a result, all the implemented visualization screens met the standard for response speed. Such research helps commanders and security officers to build a cyber common operational picture to prepare for cyber-attacks.

Proposal for the 『Army TIGER Cyber Defense System』 Installation capable of responding to future enemy cyber attack (미래 사이버위협에 대응 가능한 『Army TIGER 사이버방호체계』 구축을 위한 제언)

  • Byeong-jun Park;Cheol-jung Kim
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.157-166
    • /
    • 2024
  • The Army TIGER System, which is being deployed to implement a future combat system, is expected to bring innovative changes to the army's combat methods and comabt execution capability such as mobility, networking and intelligence. To this end, the Army will introduce various systems using drones, robots, unmanned vehicles, AI(Artificial Intelligence), etc. and utilize them in combat. The use of various unmanned vehicles and AI is expected to result in the introduction of equipment with new technologies into the army and an increase in various types of transmitted information, i.e. data. However, currently in the military, there is an acceleration in research and combat experimentations on warfigthing options using Army TIGER forces system for specific functions. On the other hand, the current reality is that research on cyber threats measures targeting information systems related to the increasing number of unmanned systems, data production, and transmission from unmanned systems, as well as the establishment of cloud centers and AI command and control center driven by the new force systems, is not being pursued. Accordingly this paper analyzes the structure and characteristics of the Army TIGER force integration system and makes suggestions for necessity of building, available cyber defense solutions and Army TIGER integrated cyber protections system that can respond to cyber threats in the future.