• Title/Summary/Keyword: Military systems

Search Result 1,541, Processing Time 0.026 seconds

The Genealogy of Rebellious Communication and Twitter A Discourse Analysis of the Park Jung-geun Case ('불온 통신'의 계보와 '트위터' 박정근 사건에 대한 담론 분석을 중심으로)

  • Hong, Namhee
    • Korean journal of communication and information
    • /
    • v.81
    • /
    • pp.329-362
    • /
    • 2017
  • This study starts from the awareness that 'rebellious communication' is still being regulated in various ways even though 'rebellious communication' was declared unconstitutional in a decision by the Constitutional Court in 2002. The meaning of 'rebellious' has been amplified and transformed at various points through the censorship systems established during the Japanese colonial era, the US military period, and the regime of Park Jung-hee. In particular, 'rebellious communication' is regulated to protect 'national security' and 'social customs' from the perspective of power. This study analyzed discourses containing judgement about the Park Jung-geun case and the violation of the National Security Law using retweet accounts or posts related to North Korea. This study explores the genealogy of 'rebellious communication' based on its relationship to the characteristics of Twitter and specific individuals.

  • PDF

Hegemonic Competition and the Role of Naval Power (패권경쟁과 해군력의 역할)

  • Kim, Kyeong-Sik
    • Strategy21
    • /
    • s.41
    • /
    • pp.108-152
    • /
    • 2017
  • This paper aims to analyze hegemonic competition and the role of naval power. To this end the paper is composed of four chapters titled introduction, the role of naval power in the hegemonic competition, the role of naval power in the East Asia, and the lessons and implications for the Korean Peninsula. Since the modern era, the hegemonic competition in the East Asian region has been the intrusion and struggle process between the world system and the East Asian regional system, and the ocean between these two systems has become the goal and means of supremacy(hegemony). Currently, the hegemonic competition between the US and China consists of systemic competition at the global level and marine competition at the regional level. When South Korea is forced to make strategic choices in the course of the US-China hegemonic competition, naval power will be the first factor to be considered. The ROK is asymmetrically maintaining a deep dependency relationship with the United States in terms of security and China in relation to the economy. And while the ROK's national economic power is acquired from the ocean, the ROK's military power is imbalanced because it is centered on the ground forces. These international relations and asymmetric-unbalanced resources distribution will not be able to effectively cope with the hegemonic competition between the US and China in the future, and will limit Korea's strategic choice. Since naval power and forces are the prerequisites for the hegemonic competition or the maintenance of supremacy we must construct balanced naval forces(naval power) that are not subordinate to the ground forces at the national strategic level for the future of the country.

A Study on Implementation of Transient Radiation Effects on Electronics(TREE) Assessment System (전자소자의 과도방사선피해 평가체계 구축 연구)

  • Lee, Nam-Ho;Hwang, Young-Gwan;Kim, Jong-Ryul;Jeong, Sang-Hun;Oh, Seung-Chan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2329-2334
    • /
    • 2012
  • In this paper, we performed a study of damage assessment model development to analyze the initial nuclear pulse radiation damage to semiconductor devices for military weapon systems. At first we modeled(M) the nuclear pulse radiation and diode device, and simulated(S) the output characteristics of the device to the input. Then the manufactured diodes which had the same characteristics with the modeled one were irradiated to the similar pulsed type radiation and their output signals were measured simultaneously. Error between the M & S results and the measured values of the analysis was 22.9%. Through the error value we could confirm that the damage assessment model simulated the TREE effects with a quite accuracy.

An Architecture of the Military Aircraft Safety Check System Using 4th Industrial Revolution Technology (4차 산업혁명기술을 활용한 군 항공기 안전점검 체계 설계)

  • Eom, Jung-Ho
    • Convergence Security Journal
    • /
    • v.20 no.2
    • /
    • pp.145-153
    • /
    • 2020
  • The aviation safety policy master plan is promoting the development of aviation safety management technology applying the 4th industrial revolution technology with the goal of establishing a flawless aviation safety management system and establishing a future aviation safety infrastructure. The master plan includes the establishment of various aviation safety management systems such as aircraft fault management using AI & Big data and flight training system using VR/AR. Currently, the Air Force is promoting a flight safety management system using new technology under the goal of building smart air force. Therefore, this study intends to apply the 4th Industrial Revolution technology to the aircraft condition check system that finally checks the safety of the aircraft before flight. The Air Force conducts airframe flaw checks and pre-flight aircraft check. In this study, we architect the airframe flaw check system using AI and drones, and the pre-flight aircraft condition check system using the IoT and big data for more precise and detailed check of aircraft condition and flawlessness check.

Reclassification of the vulnerability group of wartime equipment (군집분석을 이용한 전시장비의 취약성 그룹 재분류)

  • Lee, Hanwoo;Kim, Suhwan;Joo, Kyungsik
    • Journal of the Korean Data and Information Science Society
    • /
    • v.26 no.3
    • /
    • pp.581-592
    • /
    • 2015
  • In the GORRAM, the estimation of resource requirements for wartime equipment is based on the ELCON of the USA. The number of vulnerability groups of ELCON are 22, but unfortunately it is hard to determine how the 22 groups are classified. Thus, in this research we collected 505 types of basic items used in wartime and classified those items into new vulnerability groups using AHP and cluster analysis methods. We selected 11 variables through AHP to classify those items with cluster analysis. Next, we decided the number of vulnerability groups through hierarchical clustering and then we classified 505 types of basic items into the new vulnerability groups through K-means clustering.This paper presents new vulnerability groups of 505 types of basic items fitted to Korean weapon systems. Furthermore, our approach can be applied to a new weapon system which needs to be classified into a vulnerability group. We believe that our approach will provide practitioners in the military with a reliable and rational method for classifying wartime equipment and thus consequentially predict the exact estimation of resource requirements in wartime.

Big Data Governance Model for Effective Operation in Cyberspace (효과적인 사이버공간 작전수행을 위한 빅데이터 거버넌스 모델)

  • Jang, Won-gu;Lee, Kyung-ho
    • The Journal of Bigdata
    • /
    • v.4 no.1
    • /
    • pp.39-51
    • /
    • 2019
  • With the advent of the fourth industrial revolution characterized by hyperconnectivity and superintelligence and the emerging cyber physical systems, enormous volumes of data are being generated in the cyberspace every day ranging from the records about human life and activities to the communication records of computers, information and communication devices, and the Internet of things. Big data represented by 3Vs (volume, velocity, and variety) are actively used in the defence field as well. This paper proposes a big data governance model to support effective military operations in the cyberspace. Cyberspace operation missions and big data types that can be collected in the cyberspace are classified and integrated with big data governance issues to build a big data governance framework model. Then the effectiveness of the constructed model is verified through examples. The result of this study will be able to assist big data utilization planning in the defence sector.

  • PDF

RTiK-Linux: The Design of Real-Time implemented Kernel for Linux (RTiK-Linux: 리눅스용 실시간 이식 커널의 설계)

  • Kim, Joo-Man;Song, Chang-In;Lee, Cheol-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.9
    • /
    • pp.45-53
    • /
    • 2011
  • According to the necessity of measuring equipments for advanced military systems, real-time characteristics such as time determinism and execution accuracy pursuing low-latencies have become very important. With this reason, the market demand for real-time features in the general purpose operating system such as Linux has been enlarging. To meet these requirements, RTLinux and RTAI has been developed as dual-kernels based on Linux. However, developers should use assembler languages to facilitate real-time in RT-Linux, it is very difficult to deal with it. RTAI has disadvantage that it only provides soft real-time. To solve these problems, RTiK-Linux was developed. In this paper, we propose a new dual-kernel with hard real-time capabilities in Linux, called RTiK-Linux(Real-Time implemented Kernel for Linux). We first introduce related researches and then describe the design methodologies to guarantee the resolution which almost accords with the timer settings. Finally, we present the results of experimental measurements and analyze them in order to validate and evaluate the proposed RTiK-Linux.

RSNT-cFastICA for Complex-Valued Noncircular Signals in Wireless Sensor Networks

  • Deng, Changliang;Wei, Yimin;Shen, Yuehong;Zhao, Wei;Li, Hongjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.4814-4834
    • /
    • 2018
  • This paper presents an architecture for wireless sensor networks (WSNs) with blind source separation (BSS) applied to retrieve the received mixing signals of the sink nodes first. The little-to-no need of prior knowledge about the source signals of the sink nodes in the BSS method is obviously advantageous for WSNs. The optimization problem of the BSS of multiple independent source signals with complex and noncircular distributions from observed sensor nodes is considered and addressed. This paper applies Castella's reference-based scheme to Novey's negentropy-based algorithms, and then proposes a novel fast fixed-point (FastICA) algorithm, defined as the reference-signal negentropy complex FastICA (RSNT-cFastICA) for complex-valued noncircular-distribution source signals. The proposed method for the sink nodes is substantially more efficient than Novey's quasi-Newton algorithm in terms of computational speed under large numbers of samples, can effectively improve the power consumption effeciency of the sink nodes, and is significantly beneficial for WSNs and wireless communication networks (WCNs). The effectiveness and performance of the proposed method are validated and compared with three related BSS algorithms through theoretical analysis and simulations.

Analysis on Causal Factors Affecting the Stress of Pilots by the Environmental Differences between Live-Virtual Simulation (Live-Virtual 시뮬레이션 환경차이에 따른 조종사 스트레스 유발요인 분석)

  • Kim, Jinju;Kim, Sungho;Seol, Hyeonju;Jee, Cheolkyu;Hong, Youngseok
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.1
    • /
    • pp.31-36
    • /
    • 2016
  • Recently, Live-Virtual-Constructive (L-V-C) integrate training system has proposed as a solution for the problems such as limitation of training areas, increase of mission complexity, rise in oil prices. In order to integrate each training system into the one effectively, we should solve the issue about stress of pilots by the environmental differences between Live and Virtual simulation which could be occurred when each system is connected together. Although it was already examined in previous study that the psychological effects on pilots was occurred by the environmental differences between actual and simulated flights, the study did not include what the causal factors affecting psychological effects are. The aim of this study is to examine which environmental factors that cause pilots' psychological effects. This study analyzed the biochemical stress hormone, cortisol to measure the pilots' psychological effects and cortisol was measured using Enzyme-linked immunoassay (EIA). A total of 40 pilots participated in the experiment to compare the differences in pilots' cortisol response among live simulation, virtual simulation, and the virtual simulation applying three environmental factors (gravity force, noise, and equipment) respectively. As a result, there were significant differences in cortisol level when applied the gravity force and equipment factors to the virtual simulation, while there was no significant difference in the case of the noise factor. The results from this study can be used as a basis for the future research on how to make L-V system by providing minimum linkage errors and design the virtual simulator that can reduce the differences in the pilots' psychological effects.

Sampling Procedures Enhancement in Government Defense Quality Assurance Procedures: Case Studies in Combat Force Support Material & Ammunition Areas (국방 품질보증 활동 강화를 위한 샘플링 방법 개선: 전투물자 및 탄약 분야 사례 위주)

  • Ahn, Nam-Su;Jeong, Ji-Sun;Jeong, Woon-Kwon;Hwang, Woo-Yull;Park, Sang-Won
    • Journal of Korean Society for Quality Management
    • /
    • v.40 no.3
    • /
    • pp.245-258
    • /
    • 2012
  • Purpose: Recently, many quality issues are aroused in military forces, such as failures in K-series weapons, combat boots defects and 40mm ammunition explosion accident. To address these problems, the one and only government defense quality assurance agency, DTaQ(Defense Agency for Technology & Quality) tried to improve many quality assurance procedures and introduced new systems such as MRA(Manufacturing Readiness Assessment), TRA(Technology Readiness Assessment), and etc. However, as the amount of war supplies increasing every year, the resource(budget and manpower) for quality assurance is limited. Therefore, DTaQ had difficulty to handle the issue efficiently and effectively, and we propose the method to address this problem. Methods: The most popular quality assurance technique is a sampling method, in this research, we first review the many sampling techniques and compare the strength and weakness of each method. After then, we selected the most appropriate sampling techniques and applied the procedures in combat force support material and ammunition areas. Results: We can reduce the number of samples dramatically, thus the required amount of labor time and money can be saved. Also, the new sampling technique enforces the supplier to produce the product which meets the target value(desirable value). Conclusion: We can reduce the number of samples dramatically, thus the required amount of labor time and money can be saved. Also, the new sampling technique enforces the supplier to produce the product which meets the target value(desirable value). Lastly, since the new sampling method requires many numerical calculations, we developed a simple android OS smart-phone application which can be used easily in field.