• Title/Summary/Keyword: Military security

Search Result 926, Processing Time 0.026 seconds

Case study on the utilization of women in the Ukrainian military

  • Jong-Hoon Kim;Sang-Keun Cho;Eui-Chul Shin;In-Chan Kim;Myung-Sook Hong;Sung-Hu Kang;Sang-Hyuk Park
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.1
    • /
    • pp.153-158
    • /
    • 2023
  • Experts are concerned about the lack of troops and security vacuum due to the low birth rate in the Republic of Korea. They consider policies to expand the proportion and role of female soldiers to address these issues. In this regard, We would like to introduce the successful use of female personnel in the Ukrainian military and draw implications for the Korean military. This will provide a clue to offset the shortage of troops in the Republic of Korea.

A Transformation Military Databases based on the Relational Data model into XML Databases (관계형 데이터 모델 기반 군사용 데이터베이스의 XML 데이터베이스로의 변환)

  • Kim, Chang-Seok;Kim, Eong-Su
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.269-310
    • /
    • 2003
  • AS Extensible Markup Language(XML) is emerging as the data format of the Internet era, there are increasing needs to efficiently transform between database and XML documents. In this paper, we propose a schema transformation method from relational database to XML database. To transform the schema, we represent input schema as Entity-Relationship diagram. Entity-Relationship model translator scans the input Entity-Relationship diagram using BFS (breadth First Search) and translates the diagram into hierarchical structure model. The XML Schema generator produces XML Scema code using the transformed hierarchical structure model. The proposed method has a merit that having reusability facility of XML Schema property in comparison with existing researches.

  • PDF

Mind control interface technology for the military control instrument (군사용 제어기기를 위한 마인드 컨트롤 인터페이스 기술)

  • Kim, Eung-Su
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.249-267
    • /
    • 2003
  • EEG is an electrical signal, which occurs during information processing in the brain. These EEG signals have been used clinically, but nowadays we are mainly studying Brain-Computer Interface (BCI) such as interfacing with a computer through the EEG, controlling the machine through the EEG. The ultimate purpose of BCI study is specifying the EEG at various mental states so as to control the computer and machine. This research makes the controlling system of directions with the artifact that are generated from the subject's will, for the purpose of controlling the machine correctly and reliably. We made the system like this. First, we select the particular artifact among the EEG mixed with artifact, then, recognize and classify the signals' pattern, then, change the signals to general signals that can be used by the controlling system of directions.

  • PDF

On the Korean Translations of Clausewitz's On War ("전쟁론" 번역서 유감1))

  • Kim, Man-Su
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.1-34
    • /
    • 2003
  • Clausewitz's On War is a very difficult classic. Because its manuscript was not completed by him, and the Korean translations are hard to understand. Seven Korean translations of the twelve, all of the Korean translations of On War, are the plagiarisms or very alike to the former translations. It remains only five translations, to that is worth reading. Even the five are composed of Korean, difficult to understand. Because they are full of japanese and chinese terms, the sentence structures too long and complex, and many of terms too 'military'. Now is the time to translate the book new, that is understandable with easy and simple terms and short sentences.

  • PDF

A Study of The ROK's Defense Exporting Strategies (한국의 방산수출 전략 연구)

  • Lee, Pil-Jung
    • Journal of National Security and Military Science
    • /
    • s.9
    • /
    • pp.141-190
    • /
    • 2011
  • Defense industry as 'a new dynamics of economic growth' policy implies driving policy of defense products' export. The purpose of this study is to suggest suitable strategies to meet with such policy in terms of region and individual nation. The strategies towards advanced region are joint sale strategy for the third countries, extension strategy of trade-off and development strategy of products to exploit niche markets. The strategies towards non-advanced regions are package strategy including exchange of economic development know-how, strengthening strategy of relationships to leading groups in national decision-making processes, exploit strategy of sales market through transfer discard and surplus equipments to other nations, government to government sale strategy towards countries holding low leveled equipment maintaining and management abilities. Finally, successive strategies require leaders' will, active sales diplomacy and active international cooperations of defense industry.

  • PDF

Prospects for U-PPBEES Under the U-Society (유비쿼터스 사회의 도래에 따른 u-국방기획관리제도의 특성 전망)

  • Lee, Pil-Jung
    • Journal of National Security and Military Science
    • /
    • s.7
    • /
    • pp.91-128
    • /
    • 2009
  • Society is developing fast. Nobody could expect that computer could be used in purpose of trajectory calculation when the ANIAC was developed in the past. However, nowadays technology development brought computerization which substitutes to mankind's working. And personal computer including internet make our society to be IT age. Such age is in revolutionizing now that could be able to bring a new paradigm. We should prepare to such change which scholars predict the end of revolution could be reached at ubiquitous age. This study is purposing firstly for predicting which changes are arisen in the defence sector when social system will become ubiquitous age. That is how change of ubiquitous paradigm could influence to the defence sector and which appearance could be arisen in ubiquitous defence environment. The second purpose of this study is to predict the characteristics of Planing, Programing, Budgeting, Executing, Evaluating, System (PPBEES) of the defence sector.

  • PDF

Impact of ITSM Military Service Quality and Value on Service Trust

  • Woo, Hanchul;Lee, Sangdo;Huh, Jun-Ho;Jeong, Sukjae
    • Journal of Multimedia Information System
    • /
    • v.7 no.1
    • /
    • pp.55-72
    • /
    • 2020
  • As the IT service environment grows, it is critical in terms of IT service quality to minimize the occurrence of failures due to changes in applications and to diagnose and recover in a short period of time how failure will affect the business. Thus, the Defense Acquisition Program Administration (DAPA) has been building and operating ITSMs to implement IT service management in a leading manner. Information Technology Service Management (ITSM) is divided into events, obstacles, changes, versions and setup management to ensure flexibility and stability in service delivery. It is also operated separately from service level, availability, capacity, financial and IT service continuity management to ensure service quality and cost efficiency. Based on ITSM military service history, this study looks at the impact of quality of service on value, satisfaction, and trust. The results of the analysis are highly valuable for future ITSM implementation and operation.

A Design of Electronic Evidence-seizure Mechanism for the Response of Information-warfare (정보전 대응을 위한 전자적 증거포착 메커니즘 설계1))

  • Park, Myeong-Chan;Lee, Jong-Seop;Choe, Yong-Rak
    • Journal of National Security and Military Science
    • /
    • s.2
    • /
    • pp.285-314
    • /
    • 2004
  • The forms of current war are diversified over the pan-national industry. Among these, one kind of threats which has permeated the cyber space based on the advanced information technology causes a new type of war. C4ISR, the military IT revolution, as a integrated technology innovation of Command, Control, Communications, Computer, Intelligence, Surveillance and Reconnaissance suggests that the aspect of the future war hereafter is changing much. In this paper, we design the virtual decoy system and intrusion trace marking mechanism which can capture various attempts and evidence of intrusion by hackers in cyber space, trace the penetration path and protect a system. By the suggested technique, we can identify and traceback the traces of intrusion in cyber space, or take a legal action with the seized evidence.

  • PDF

A Study on the selection of cadets 3 Army Military Academies (육군 3사관학교 생도선발에 관한 고찰)

  • Jung, Jae Keak
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.87-92
    • /
    • 2019
  • The Army 3 Military Academy is a government-approved transfer school. After two years of education as an officer training institution, I will be graduated from college and concurrently be called as an army. In order to become a Korean officer, I would like to examine the recruitment of cadets who are trained through various educational institutions and who will become the backbone of the future army.

Method And Mathematical Algorithm For Finding The Quasi-Optimal Purpose Plan

  • Piskunov, Stanislav;Yuriy, Rayisa;Shabelnyk, Tetiana;Kozyr, Anton;Bashynskyi, Kyrylo;Kovalev, Leonid;Piskunov, Mykola
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.88-92
    • /
    • 2021
  • A method and a mathematical algorithm for finding a quasi-optimal assignment plan with rectangular efficiency matrices are proposed. The developed algorithm can significantly reduce the time and computer memory consumption for its implementation in comparison with optimal methods.