• Title/Summary/Keyword: Military systems

Search Result 1,560, Processing Time 0.029 seconds

A Case Study of Infographics for National Defense - Focusing on the Datajournalism of Afghanistan War in Guardian (국방분야에서 인포그래픽 적용사례 연구 - 영(英) 가디언지 아프가니스탄전 데이터저널리즘을 중심으로)

  • Kim, Dong Hwan
    • Spatial Information Research
    • /
    • v.22 no.5
    • /
    • pp.43-52
    • /
    • 2014
  • Recently, Big Data is a buzzword in the creative economy generation. The organizations related to spatial information society focus on building the spatial big data systems. As spatial big data is a combination of spatial information and big data, the data visualization is essential in order to utilize them efficiently. One of the great methodologies for data visualization is infographics. Nationally, Chousn.com initiated the infographics news in 2010. Korean Administration Branches also recognized the importance of infographic and they adopted infographics for their briefings from 2013. Internationally, Visual.ly is leading company in the infographics market and they produced noticeable interactive infographics for Egypt Parliamentary Elections results. In the defense part, Guardian's datajournalism of Afghanistan war log was a good example of utilizing infographics. Throughout the research, five requirements are extracted. First source data should have precision and accuracy in terms of time and space manner. Second, infographics images have a compressibility. Third, the infographics is properly processed for military commanders. Fourth, sharing, openness and communication are essential for high quality infographic. Lastly, infographics should be an analytic tool for predicting future event based on the past data. Infographics is not a direct representation of data but an analytic tool for helping user's choice and decision in critical moments.

The Emerging security initiatives and forecasting future social and natural environment changes (신흥안보 창발과 미래 사회 및 자연환경 변화예측)

  • Jung, Min-Sub;NamKung, Seung-Pil;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.2
    • /
    • pp.327-331
    • /
    • 2020
  • In that this study is a subject and character of risk, emerging security covers non-military areas in addition to traditional military security: environmental security, human security, resource security, and cyber security. The rise of these risks is not only changing the phenomenon of the new expansion of security areas, but also the expansion of the number and scope of security entities and the aspect of security world politics. These risks are transnational security issues at the global level in terms of their nature and extent of the damage, as well as multi-layered ones that affect local and personal security issues at the regional and national levels. In addition to national actors, non-state actors such as international organizations, multinational corporations, and global civil society, and furthermore, technology and social systems themselves are causing risks. Therefore, to solve the new security problem, it is necessary to establish a middle-level and complex governance mechanism that is sought at the regional and global levels beyond the fragmented dimension of the occurrence of new security issues that have been overlooked in the existing frame of perception, and to predict and find ways to respond to new security paradigms that have been identified in a broader sense.

A study on overcoming the prospect of North Korea's fourth-generation war threats : Focusing on the Homeland Defense Reservists (북한의 제4세대전쟁 위협전망과 극복방안 연구: 향토예비군 운용 개선을 중심으로)

  • Kim, Yeon Jun
    • Convergence Security Journal
    • /
    • v.16 no.6_1
    • /
    • pp.3-13
    • /
    • 2016
  • We take it for granted that strong sides defeat weaker counterparts, while predicting the outcome of the battles. But in modern war, we can find plenty of evidence that weak sides won against the strong. This phenomenon can be understood logically by the fourth-generation war theory. the North Korean does not give up its unification strategy, which is unification by force, even though its inferior power. It is continuing various political, social and military levels of provocations toward both the international community and South Korea. Recently, North Korea did nuclear test, launched ICBM test, provoked the DMZ, and expecting to continue the provocations of the fourth-generation war level. We have to understand the nature of North Korea's fourth-generation war threats and provocations that it is focusing on. Based on this, have a new understanding of the value of the Homeland Defense Reservists as fundamental measures as the fourth-generation war threat and supplement related systems. We can firmly refuse the balance of power and power shift of the Korean Peninsula through improved Homeland Defense Reservists. As the expected North Korea's the fourth-generation war threats, our Homeland Defense Reservists is a firm will of conduct war, and political-social-economic-military means, it is possible to display as the best alternative.

Improved Trend Estimation of Non-monotonic Time Series Through Increased Homogeneity in Direction of Time-variation (시변동의 동질성 증가에 의한 비단조적 시계열자료의 경향성 탐지력 향상)

  • Oh, Kyoung-Doo;Park, Soo-Yun;Lee, Soon-Cheol;Jun, Byong-Ho;Ahn, Won-Sik
    • Journal of Korea Water Resources Association
    • /
    • v.38 no.8 s.157
    • /
    • pp.617-629
    • /
    • 2005
  • In this paper, a hypothesis is tested that division of non-monotonic time series into monotonic parts will improve the estimation of trends through increased homogeneity in direction of time-variation using LOWESS smoothing and seasonal Kendall test. From the trend analysis of generated time series and water temperature, discharge, air temperature and solar radiation of Lake Daechung, it is shown that the hypothesis is supported by improved estimation of trends and slopes. Also, characteristics in homogeneity variation of seasonal changes seems to be more clearly manifested as homogeneity in direction of time-variation is increased. And this will help understand the effects of human intervention on natural processes and seems to warrant more in-depth study on this subject. The proposed method can be used for trend analysis to detect monotonic trends and it is expected to improve understanding of long-term changes in natural environment.

Curve Number for a Small Forested Mountainous Catchment (산지 소유역 유출곡선지수)

  • Oh, Kyoung-Doo;Jun, Byong-Ho;Han, Hyung-Geun;Jung, Sung-Won;Cho, Young-Ho;Park, Soo-Yun
    • Journal of Korea Water Resources Association
    • /
    • v.38 no.8 s.157
    • /
    • pp.605-616
    • /
    • 2005
  • In this paper, runoff curve numbers (CN's) for a small forested mountainous catchment are estimated using rainfall-runoff data measured at Sulma experimental catchment every 10 minutes and a new guideline for applying the antecedent rainfall conditions (ARC's) for small mountainous watersheds in Korea is proposed. Sulma experimental catchment is a typical natural mountainous basin with $97\%$ of forested land cover and CN's are estimated to be in the range between 51 and 89 with median value of 72. The test hypothesis stating as 1-day ARC is better than 5-day ARC in determining CN's for a small mountainous watershed is shown to be acceptable. Also, linear regression equations for the estimation of CN's for small mountainous catchments are proposed. As there is no significant investigations available on CN's for small mountainous catchments, the newly proposed relationships between CN's and ARC may be used as a preliminary guideline to assign CN's for the estimation of floods from rainfall data on mountainous regions.

A Study on the Quality Level Survey Methodology for Manufacturers of Military Suppliers (군수품 생산업체 품질수준조사 방법론에 관한 연구)

  • Park, Jae-Hyun;Seo, Sang-Won;Jang, Min-Ki
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.167-178
    • /
    • 2021
  • Since 2014, the quality level survey of the defense industry has been carried out annually. The need for this was felt as the quality control policy was inadequately reflected in the survey results. In this study, to secure valid and reliable data, the quality level survey measurement indicators and questionnaires used previously were analyzed and developed as customized papers according to the size of the company. The questionnaire index was simplified through the elimination of unnecessary and redundant items to improve the response rate and reliability. In addition, a comprehensive score was computed based on the improvement index so that the result of the quantitative quality level survey could be calculated. Through this, it was possible to determine the quality level attained by the defense industry. Through the quality level survey, we intend to secure data that can analyze the quality management environment to maintain quality levels of the defense industry and identify ways to establish mid-to-long-term quality management strategies and improve systems to enhance the quality level of the defense industry in the future.

Joined in the government-owned handicraft industry during the Joseon Dynasty Job type and role (조선시대 관영수공업에서 입사장(入絲匠)의 직무 유형과 역할)

  • KIM, Serine
    • Korean Journal of Heritage: History & Science
    • /
    • v.54 no.2
    • /
    • pp.216-239
    • /
    • 2021
  • Inlay (入絲), a poetic technique of digging grooves in the surface of crafts and decorating them with metal materials, was used throughout the royal daily routines, ceremonies and government officials of the Joseon Dynasty. The government-owned handicraft industry in the Joseon Dynasty was composed of craftsmen belonging to central and local government offices and was operated mainly by government-owned craftsmen. The inlay craftsman was transferred to the central government office and was in charge of inlay poetry for crafts. The current records of Korean inlay craftsmen are concentrated in the state-owned handicraft industry. In the state-owned handicraft industry, the government offices of inlay craftsmen can be divided into Kongjo (工造), Sangeuiwon (尙衣院), and the military. Here the election of a temporary government office for airspace is added. The government offices and military inlay craftsmen who use inlay crafts are assigned, and the inlay craftsmen are placed separately in the temporary office where the fine division of labor is developed. It can be made by utilizing craftsmen. The operation of these production systems was indispensable in pre-modern Korean society, where crafts had to be produced by hand. In this paper, we investigated the roles and job types of craftsmen in the state-owned handicraft industry during the Joseon Dynasty, focusing on inlay craftsmen. Although the details applied to the characteristics and materials of the field, labor supply and demand, etc. are different, Korea pursued crafts for various purposes through craftsmanship within the framework of the basic state-owned handicraft policy . The institutional equipment for implementation was almost common. We believe that adding and analyzing some literature records and relics will help us to study the crafts of the Joseon era in more detail.

Effect of Hypersonic Missiles on Maritime Strategy: Focus on Securing and Exploiting Sea Control (극초음속 미사일이 해양전략에 미치는 영향: 해양통제의 확보와 행사를 중심으로)

  • Cho, Seongjin
    • Maritime Security
    • /
    • v.1 no.1
    • /
    • pp.241-271
    • /
    • 2020
  • The military technology currently receiving the most attention is the hypersonic missile. hypersonic is faster than the speed of sound or Mach 5+. The vast majority of the ballistic missiles that it inspired achieved hypersonic speeds as they fell from the sky. Rather than speed, today's renewed attention to hypersonic weapons owes to developments that enable controlled flight. These new systems have two sub-varieties: hypersonic glide vehicles and hypersonic cruise missiles. Hypersonic weapons could challenge detection and defense due to their speed, maneuverability, and low altitude of flight. The fundamental question of this study is: 'What effect will the hypersonic missile have on the maritime strategy?' It is quite prudent to analyze and predict the impact of technology in the development stage on strategy in advance. However, strategy is essential because it affect future force construction. hypersonic missiles act as a limiting factor in securing sea control. The high speed and powerful destructive power of the hypersonic missile are not only difficult to intercept, but it also causes massive ship damage at a single shot. As a result, it is analyzed that the Securing sea control will be as difficult as the capacity of sea denial will be improved geographically and qualitatively. In addition, the concept of Fortress Fleet, which was criticized for its passive strategy in the past, could be reborn in a modern era. There are maritime power projection/defence, SLOC attack/defence in exploiting sea control. The effects of hypersonic missiles on exploiting sea control could be seen as both limiting and opportunity factors.

  • PDF

A Conversion Protocol for 2W Telephone Signal over Ethernet in a Private PSTN (사설 PSTN에서 2W 전화 신호의 이더넷 변환 프로토콜)

  • Shin, JinBeom;Cho, KilSeok;Lee, DongGwan;Kim, TaeHyon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.6
    • /
    • pp.645-654
    • /
    • 2021
  • In this paper, we proposed a protocol to convert 2W telephone analog signals to Ethernet data in a private PSTN 2W tactical voice system. There are several kinds of operational problems in the tactical telephone network where 2W telephone copper lines are installed hundreds of meters away from the PBX in a headquarter site. The reason is that it is difficult to install and maintain the 2W telephone copper cable in severe operational fields and to meet safety and stability operational requirements of the telephone line under lighting and electromagnetic environments. In order to solve these challenging demands, we proposed an efficient method that the 2W analog interface signals between a private PBX system and a 2W telephone is converted to Ethernet messages using the optical Ethernet data communication network already deployed in the tactical weapon system. Thus, it is not necessary to install an additional optic cable for the ethernet telephone line and to maintain the private PSTN 2W telephone network. Also it provides safe and secure telecommunication operation under lightning and electromagnetic environments. This paper presents the conversion protocol from 2W telephone signals over Ethernet interface between PBX systems and 2W telephones, the mutual exchange protocol of ethernet messages between two converters, and the rule to process analog signal interface. Finally, we demonstrate that the proposed technique can provide a feasible solution in the tactical weapon system by analyzing its performance and experimental results such as the bandwidth of 2W telephone ethernet network and the transmission latency of voice signal, and the stability of optic ethernet voice network along with the ethernet data network.

Cyber attack group classification based on MITRE ATT&CK model (MITRE ATT&CK 모델을 이용한 사이버 공격 그룹 분류)

  • Choi, Chang-hee;Shin, Chan-ho;Shin, Sung-uk
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.1-13
    • /
    • 2022
  • As the information and communication environment develops, the environment of military facilities is also development remarkably. In proportion to this, cyber threats are also increasing, and in particular, APT attacks, which are difficult to prevent with existing signature-based cyber defense systems, are frequently targeting military and national infrastructure. It is important to identify attack groups for appropriate response, but it is very difficult to identify them due to the nature of cyber attacks conducted in secret using methods such as anti-forensics. In the past, after an attack was detected, a security expert had to perform high-level analysis for a long time based on the large amount of evidence collected to get a clue about the attack group. To solve this problem, in this paper, we proposed an automation technique that can classify an attack group within a short time after detection. In case of APT attacks, compared to general cyber attacks, the number of attacks is small, there is not much known data, and it is designed to bypass signature-based cyber defense techniques. As an attack model, we used MITRE ATT&CK® which modeled many parts of cyber attacks. We design an impact score considering the versatility of the attack techniques and proposed a group similarity score based on this. Experimental results show that the proposed method classified the attack group with a 72.62% probability based on Top-5 accuracy.