• Title/Summary/Keyword: National Defense Respond

Search Result 47, Processing Time 0.026 seconds

Development of Korean Warrior Platform Architecture (한국형 워리어플랫폼 아키텍처 개발 연구)

  • Kim, Wukki;Shin, Kyuyong;Cho, Seongsik;Baek, Seungho;Kim, Yongchul
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.5
    • /
    • pp.111-117
    • /
    • 2021
  • With the rapid development of advanced science and technology including the 4th industrial revolution, the future battlefield environment is evolving at a rapid pace. In order to actively respond to issues such as reduction of military resources and shortening of service period, and to emphasize the realization of human-centered values, the Ministry of National Defense is re-establishing the role of the Army in accordance with the defense reform and is promoting the Warrior Platform, a next-generation individual combat system. In this paper, we intend to present the optimal warrior platform architecture suitable for the Korean Army by realizing the concept of future ground operations and analyzing overseas cases. We analyze the essential abilities required of individual combatants and the abilities required for each unit type, and specifically presents a plan for integration and linkage of warrior platform equipment. We also propose an efficient business promotion direction by presenting the data flow and power connection diagram between the devices that need integration and interworking.

Mechanical Performance Study of Flexible Protection Tube for Submarine Cables (해저케이블용 유연보호튜브의 기계적 성능 연구)

  • Kyeong Soo Ahn;Yun Jae Kim;Jin-wook Choe;Jinseok Lim;Sung Woong Choi
    • Composites Research
    • /
    • v.37 no.2
    • /
    • pp.101-107
    • /
    • 2024
  • Demand for submarine cable is increasing due to advances in submarine power transmission technology and submarine cable manufacturing technology. Submarine cable use various types of protective equipment to prevent problems such as high maintenance costs in the event of cable damage and power outages during maintenance periods. Among them, flexible protection tube is a representative protective equipment to protect cables and respond to external forces such as waves and current. The flexible protection tube is made of polyurethane 85A hyperelastic material, so the calculation of mechanical behavior is carried out using mechanical properties based on experimental results. In this study, a study was conducted to determine the bending performance and tensile performance of flexible protection tube through analytical methods. The physical properties obtained through the multiaxial tensile test of polyurethane 85A were used for the analysis. Bending and tensile performance were determined for the maximum bending moment standard of 15 kN·m and the tensile load standard of 50 kN. As a result, it was confirmed that when the maximum bending moment of 15 kN·m of the flexible protection tube occurred, the bending performance of the MBR was secured at 13 m and when a tensile load of 50 kN, it was applied the maximum vertical displacement was 968 mm, confirming that the tensile performance was secured.

CHILDHOOD TRAUMA:PSYCHIATRIC OVERVIEW (아동기 외상의 정신과적 개관)

  • Han, Sung-Hee
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.13 no.1
    • /
    • pp.3-14
    • /
    • 2002
  • Childhood psychic trauma appears to be a crucial factor in the development of serious disorders both in childhood and in adulthood. Traumatized children show strong tendency to revisualize or re-feel a traumatic events. Play and behavioral reenactments are frequent manifestations of both the single blow and the long-standing traumas in childhood. Those children who suffer the results of single, intense terror appear to exhibit detailed memory, retrospective reworkings and misperceptions. In long-standing or repetitive trauma, children would show psychic numbing, self-hypnosis, dissociation and rage. Child's brain is undergoing critical and sensitive periods of differentiation. During this time, developing central nervous system is exquisitely sensitive to stress. Stressor-activated neurotransmitters and hormones can play major roles in neurogenesis, migration, synaptogenesis, and neurochemical differentiation. Internal opiate system operates in some trauma and causes the victim to fail to respond, to avoid, to shut off feelings. Evidence is also accumulating in traumatology that dysfuntion of locus coeruleus and ventral tegmental neucleus system leads to catecholamine receptors hypersensitivity. This change result in hypervigilance, increased startle, affective lability, and increased autonomic nervous system hyperreactivity. Another site of action of trauma on the brain is hypothalamic-pituitary-adrenal axis. Individuals with PTSD do not have enough cortisol to halt the alarm reaction. When children are exposed to long-standing extreme events, massive attempts to protect the psyche and to preserve the self are put into gear. These developmental traumas mobilize various kinds of defense mechanisms. Massive denial, dissociation, self anesthesia, identification with aggressor and aggression turned against the self often lead to profound character changes in the youngsters.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

A Study on Space Insurance of Foreign nation's Law (외국의 우주보험 관련법 연구)

  • Cho, Hong-Je
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.26 no.1
    • /
    • pp.271-297
    • /
    • 2011
  • Recently, risk of space accident possibility increased in according to commercial space activity and space debris. It failed launch satellite second times in South Korea. Therefore was discussed on liability and insurance issue. Generally, discuss of space insurance be divided two type. Firstly, space insurance relevant to launching satellite and in-orbit. Satellite Launch Insurance and In-Orbit Insurance by the Satellite Operator Secondly, space insurance relevant to Third Party Liability. The former is to protect owner of satellite and operator. The latter is to liable and indemnify owner of satellite and operator's liability. US, UK, France, Russia, South Korea forced to buy space insurance following to domestic law. This is a brief overview of risk allocation and insurance practices in the commercial space transportation industry today. We begin with traditional space transportation, i.e., commercial satellite launches. This is a mature industry with known players. Industry practices have developed and legislation has been adopted in the U.S. and other countries over the past decades to address liability and insurance issues. The primary focus here is on U.S. law, but the discussion of industry practice applies more generally. We then move on to a more exotic form of space transportation: Commercial human space flight. Several private companies are now signing up space tourists for commercial suborbital human space flight, advertised to become available in the near future. The United States amended its launch legislation in 2004 to promote commercial human space flight. But questions remain as to how this new industry will respond to the risk allocation regime established by the U.S. legislation, which leaves both the space flight operator and space tourist exposed to risk and potential liability. As a general proposition, state statutes and contractual waivers alone cannot be relied upon to provide adequate liability protection, and insurance will be required. Federally mandated contractual waivers by space flight participants or liability caps would be helpful to complement insurance solutions. Eventually, as the industry matures, such practices could be extended to an international legal regime. For all the issues mentioned above, I have studied the existing international treaties and several country's domestic law to the space by referring U.S's Commercial Space Launch Amendment Act of 2004 and concluded that uniform legal regime to govern these insurance issues should be established domestically and internationally in the future.

  • PDF

Efficacy of UN's Sanctions on North Korea's Nuclear and North Korea's Regime Survival Strategy (유엔의 북핵 대북제재조치의 실효성과 북한의 체제생존전략)

  • KIM, JOO-SAM
    • Korea and Global Affairs
    • /
    • v.2 no.1
    • /
    • pp.69-92
    • /
    • 2018
  • North Korea conducted a total of six nuclear tests from the 1st test of 2006 to September, 2017. North Korea developed an armed forces security strategy at the level of regime protection and defense to respond to U.S. hostile policy. However, it is certain that strategic goals of North Korea's nuclear test were to overcome a crisis in North Korea's regime through US-North Korea negotiation and complete nuclear armed forces for socialist unification on the Korean Peninsula. North Korea's continuous nuclear test is a direct factor in threatening peace on the Korean Peninsula and an indirect factor in security dynamics of Northeast Asia. The U.N. Security Council has enforced sanctions against North Korea through six resolutions against North Korea's reckless nuclear test for the past 10 years. However, Kim Jong-Un's regime is in a position to stick to simultaneous pursuit of nuclear and economic development in spite of anti-North sanction of international society including U.N. and U.S.A. It is understood that North Korea was stimulated to conduct intense nuclear test as U.N. and U.S.A's anti-North sanction was not effective on North Korea. Full-scale and local wars are expected as military options, one of anti-North sanctions of the Trump administration. The Trump administration has attempted diplomatic pressure strategy as a secondary boycott unlike previous administrations. Nevertheless, North Korea has stood against U.N. and U.S.A's anti-North sanction with brinkmanship tactics, announcing full-scale military confrontation against U.S. It is judged that North Korea will pursue simultaneous nuclear weapons and economic development in terms of regime survival. North Korea will have less strategic choices in that its regime may collapse because of realistic national strategy between U.S.A. and China.

An Investigation on the Periodical Transition of News related to North Korea using Text Mining (텍스트마이닝을 활용한 북한 관련 뉴스의 기간별 변화과정 고찰)

  • Park, Chul-Soo
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.3
    • /
    • pp.63-88
    • /
    • 2019
  • The goal of this paper is to investigate changes in North Korea's domestic and foreign policies through automated text analysis over North Korea represented in South Korean mass media. Based on that data, we then analyze the status of text mining research, using a text mining technique to find the topics, methods, and trends of text mining research. We also investigate the characteristics and method of analysis of the text mining techniques, confirmed by analysis of the data. In this study, R program was used to apply the text mining technique. R program is free software for statistical computing and graphics. Also, Text mining methods allow to highlight the most frequently used keywords in a paragraph of texts. One can create a word cloud, also referred as text cloud or tag cloud. This study proposes a procedure to find meaningful tendencies based on a combination of word cloud, and co-occurrence networks. This study aims to more objectively explore the images of North Korea represented in South Korean newspapers by quantitatively reviewing the patterns of language use related to North Korea from 2016. 11. 1 to 2019. 5. 23 newspaper big data. In this study, we divided into three periods considering recent inter - Korean relations. Before January 1, 2018, it was set as a Before Phase of Peace Building. From January 1, 2018 to February 24, 2019, we have set up a Peace Building Phase. The New Year's message of Kim Jong-un and the Olympics of Pyeong Chang formed an atmosphere of peace on the Korean peninsula. After the Hanoi Pease summit, the third period was the silence of the relationship between North Korea and the United States. Therefore, it was called Depression Phase of Peace Building. This study analyzes news articles related to North Korea of the Korea Press Foundation database(www.bigkinds.or.kr) through text mining, to investigate characteristics of the Kim Jong-un regime's South Korea policy and unification discourse. The main results of this study show that trends in the North Korean national policy agenda can be discovered based on clustering and visualization algorithms. In particular, it examines the changes in the international circumstances, domestic conflicts, the living conditions of North Korea, the South's Aid project for the North, the conflicts of the two Koreas, North Korean nuclear issue, and the North Korean refugee problem through the co-occurrence word analysis. It also offers an analysis of South Korean mentality toward North Korea in terms of the semantic prosody. In the Before Phase of Peace Building, the results of the analysis showed the order of 'Missiles', 'North Korea Nuclear', 'Diplomacy', 'Unification', and ' South-North Korean'. The results of Peace Building Phase are extracted the order of 'Panmunjom', 'Unification', 'North Korea Nuclear', 'Diplomacy', and 'Military'. The results of Depression Phase of Peace Building derived the order of 'North Korea Nuclear', 'North and South Korea', 'Missile', 'State Department', and 'International'. There are 16 words adopted in all three periods. The order is as follows: 'missile', 'North Korea Nuclear', 'Diplomacy', 'Unification', 'North and South Korea', 'Military', 'Kaesong Industrial Complex', 'Defense', 'Sanctions', 'Denuclearization', 'Peace', 'Exchange and Cooperation', and 'South Korea'. We expect that the results of this study will contribute to analyze the trends of news content of North Korea associated with North Korea's provocations. And future research on North Korean trends will be conducted based on the results of this study. We will continue to study the model development for North Korea risk measurement that can anticipate and respond to North Korea's behavior in advance. We expect that the text mining analysis method and the scientific data analysis technique will be applied to North Korea and unification research field. Through these academic studies, I hope to see a lot of studies that make important contributions to the nation.