• Title/Summary/Keyword: National defense policy

Search Result 261, Processing Time 0.025 seconds

The Study on the implementation of Portable Http Live Streaming Transmitter based the Embedded Linux (임베디드 리눅스 기반의 휴대용 Http 라이브 스트리밍 전송기 구현에 관한 연구)

  • Lee, Jea-Hee;Cho, Tae-Kyung
    • Journal of Digital Convergence
    • /
    • v.13 no.11
    • /
    • pp.141-148
    • /
    • 2015
  • In this paper, for developing and implementing the HLS(Http Live Streaming) transmitter based embedded linux which is operated easily and cheap and lower power, portable in all networks and client environments compared to exist video live streaming transmitters. We design the developed HLS transmitter hardware using the Arm11 core and then porting the Embedded Linux OS(Operating System) and implementing the HLS protocol using the open source FFmpeg and Segmenter. For proving the performance of developed HLS transmitter, we make the testing environment for testing the performance of HLS transmitter including the notebook, iPhone, android Phone, Notebook and then analysis the received video in the client displayer. In this paper, we suggest the developed HLS transmitter performance data values higher than the Apple company's HLS recommended specification values and the picture of developed HLS transmitter operation in the testing environment. The application field of this paper result is that the man who works in the emergency situation take HLS and transmit the live emergency situation to the head quarter using this portable HLS.

Application of Analytical Hierarchy Process in Analyzing the Priorities of Strategy for Improving the Army Military Foodservice (계층분석과정(AHP)을 이용한 육군 군대급식 개선과제의 실행 우선순위 분석)

  • Baek, Seung-Hee
    • Korean Journal of Community Nutrition
    • /
    • v.19 no.1
    • /
    • pp.51-59
    • /
    • 2014
  • The current exploratory study presents the Analytical Hierarchy Process (AHP) as a potential decision-making method to obtain the relative weights of alternatives through pairwise comparison in the context of hierarchical structure. The aim of this study was to elicit prior strategy to improve army military foodservice. Content analysis and seven times of in-depth interview from 13 officers of the Ministry of National Defense were conducted to develop the hierarchical structure for AHP analysis. Questionnaires were distributed to 61 foodservice managers and 39 dietitian and military foodservice officers. The highest-ranked strategy for improving military foodservice was the 'renewal of the kitchen facilities' (0.2578), followed by 'enlargement of foodservice operating staffs' (0.2345), 'specialization of sanitation & foodservice management' (0.2222), 'Practical foodservice budget control' (0.1394), and 'menu variety & standardized recipe' (0.1281). 'Enlargement of foodservice facilities' (0.3995), 'increase the no. of kitchen police' (0.3463), 'sanitary & cooking training reinforcement of kitchen police' (0.4445), 'management of foodservice budget by total amount' (0.5043), and 'standardization of mass cooking' (0.3571) were the highest overweight item in each strategy. The study also compared the relative weights of alternatives of foodservice managers with that of dietitians and military foodservice officers. Those two groups revealed some difference in their priority of important strategy regarding army military foodservice. The results of this study would provide the data for making a policy or compilation of the budget regarding army military foodservice.

Ways to apply the Strategic Communications to the ROK Navy (한국해군의 전략커뮤니케이션 (SC : Strategic Communication) 적용 방안)

  • Chung, Sam-Man
    • Strategy21
    • /
    • s.41
    • /
    • pp.294-332
    • /
    • 2017
  • The aim of this study is to find ways to apply the strategic communications to the Republic of Korea Navy. It may be a little bit late for the ROK Navy to accommodate the SC in these days because the adoption and implementation of the SC by the Combined Forces Command has already been begun. It was in 2007 when the SC was in place in the CFC. ROK's Ministry of National Defense and Joint Chiefs of Staff have also mulled over the SC and begun to apply it in part in the annual exercises such as Key Resolve command post drills and Foal Eagle field training exercise, etc. For the ROK Navy, in addition to those exercises, it is faced with further areas like North Korean maritime provocations and other maritime incidents where its version of SC is needed. As noted, the SC is not intended to deter or defend directly those provocations and incidents, but aims to create conditions favorable to the achievement of the navy's strategic objectives. The ROK Navy has to establish a SC planning center and implementing organizations within the Headquarters to be consistent with its above organizations such as MND, JCS, and CFC that have already applied the SC in part or in entirety. SC center and other related organizations need to be under the control of VCNO and the center needs to be located and administered by the policy division in N-5 at the HQs. The vision of the navy's SC is the winning without combats and the least damages in time of war. In other for the navy to reach the vision, the strategies to be executed are early establishment of SC implementing organizations, forming consensus over the need for the SC within the navy, strengthening core competencies to apply the SC, acquiring the SC experts and making doctrines on the SC. The SC, in addition, in the navy has to be planned and implemented in not only peace time and crisis time but also war time.

Inter-device Mutual Authentication and Formal Verification in Vehicular Security System (자동차 보안시스템에서 장치간 상호인증 및 정형검증)

  • Lee, Sang-Jun;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.205-210
    • /
    • 2015
  • The auto industry has significantly evolved to the extent that much attention is paid to M2M (Machine-to-Machine) communication. In M2M communication which was first used in meteorology, environment, logistics, national defense, agriculture and stockbreeding, devices automatically communicate and operate in accordance with varying situations. M2M system is applied to vehicles, specifically to device-to-device communication inside cars, vehicle-to-vehicle communication, communication between vehicles and traffic facilities and that between vehicles and surroundings. However, communication systems are characterized by potential intruders' attacks in transmission sections, which may cause serious safety problems if vehicles' operating system, control system and engine control parts are attacked. Thus, device-to-device secure communication has been actively researched. With a view to secure communication between vehicular devices, the present study drew on hash functions and complex mathematical formulae to design a protocol, which was then tested with Casper/FDR, a tool for formal verification of protocols. In brief, the proposed protocol proved to operate safely against a range of attacks and be effective in practical application.

Prospects of Characteristics Factors on Serious Game through Application Case Study Analysis (응용분야 사례 분석을 통한 기능성 게임의 특성요인 전망)

  • Choi, Woo-Seok
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.409-416
    • /
    • 2017
  • The game market has not only grown in size of the 10 trillion won but also the form and function of game use. Serious game combines the educational purpose and the fun of the game and develops it so that contents such as national defense. In this study, we analyze the cases of five application areas for the activation of serious games, and develop factors that the serious game should have, we want to see what the characteristics are and how important it is. The results of analysis show that it was analyzed that most serious games of application field were developed as 'experiential games' such as education, learning, experience, and simulation. This means that it is very effective to develop a serious game in consideration of the characteristics that a potential user should prefer a sensible game as well as a clear goal of a serious game in game development.

Intelligent learning system based on the profile of learner (학습자 프로파일 기반의 지능형 학습 시스템)

  • Cho, Tae-Kyung
    • Journal of Digital Convergence
    • /
    • v.14 no.2
    • /
    • pp.227-233
    • /
    • 2016
  • Typical Web-based learning system is operating the variety of learning contents. However, it is not easy to efficiently select appropriate learning contents. In this paper, we propose a learning content delivery method that can provide the most suitable preferences and feedback to the learner. By analyzing the profile of the learner, it determines the positive feedback and evaluation to be provided to the learner. The result of applying learning techniques were applied to provide the best learning content to adaptively out the form. The proposed method appears as a learning experience and learning outcomes are higher after a study was conducted to suggest that could help in the learning progress of the students themselves. This paper are applied to real learners. And the learners using the system were surveyed by the questionnaire on learning experience and learning outcomes were analyzed.

Effects of External Factors on Corruption in Government Society (공직사회의 외부요인이 공직부패에 미치는 영향)

  • Bae, Young-Min;Han, Seung-Jo
    • Journal of Digital Convergence
    • /
    • v.18 no.10
    • /
    • pp.129-136
    • /
    • 2020
  • The purpose of this study is to identify the influence of external-social and cultural factors on the perception of corruption in the public society through the Structural Equation Model(SEM) and to seek ways to reduce corruption in the public society. Currently the level of corruption in public sectors that people think is still large, and it is necessary to continuously reduce corruption in public sectors in order to improve national competitiveness. Since one society is a part of a country in system theory and social network theory, public society needs quantitative research in order to find the causes of corruption and solve them. The model was built and the variables were defined in SEM based on 600 questionnaires. As a result of analysis, corruption in public offices has decreased since the implementation of the solicitation and graft law, and socio-cultural factors have had a direct impact on corruption in public offices. The further research area is to seek detailed ways for transforming the education and awareness of civil society across the country in addition to the efforts of the public officials themselves in order to reduce corruption in public offices.

Contrast Analysis for CBRN attacks on educational research and best practices (테러대비를 위한 CBRNE교육 선진사례 분석에 관한 연구)

  • Kim, Tae hwan;Park, Dae woo;Hong, Eun sun
    • Journal of the Society of Disaster Information
    • /
    • v.5 no.1
    • /
    • pp.78-100
    • /
    • 2009
  • This study is to protect peoples' life, minimize the property damage by coping with threats quickly and take more preventive measures in advance against nuclear bomb, CBR, and potential explosive. For this, CBRNE(Chemical, Biological, Radiological, Nuclear, Explosive) program research was used. Thanks to advance in technology, terrorist groups and even individuals make or keep nuclear and CBR weapons. And also it's likely that disaster and threats from a toxic gas, acute pathogens, accidents in the nuclear power plants and a high explosive could be happened a lot. Recently more organized terrorist groups maintain random attacks for unspecified individuals and also it's highly likely that a large-scale terrorist attack by WMD and CBRNEwill be done. To take strict measures against CBRNE attacks by terrorists is on the rise as an urgent national task. Moreover biological weapons are relatively easy and inexpensive to obtain or produce and cause mass casualties with a small amount. For this reason, more than 25 countries have already possessed them. In the 21 st century, the international safety environment marks the age of complicated threats : transnational threats such as comprehensive security and terror, organized crime, drug smuggling, illegal trade of weapons of mass destruction, and environmental disruption along with traditional security threats. These cause military threats, terror threats, and CBRNE threats in our daily life to grow. Therefore it needs to come up with measures in such areas as research development, policy, training program. Major industrial nations on CBRNE like USA, Canada, Switzerland, and Israel have implemented various educational programs. These researches could be utilized as basic materials for drawing up plans for civil defense, emergency services and worldwide countermeasures against CBRNE.

  • PDF

A Study on adopting cloud computing in the military (국방 클라우드 컴퓨팅 도입에 관한 보안체계 연구)

  • Jang, Worl-Su;Choi, Jung-Young;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.645-654
    • /
    • 2012
  • The South Korean Defense Ministry is planning and pushing forward to conduct a cloud computing pilot project in 2012. Taking into consideration the high-level security necessary in the military as well as wartime duties, if not designed properly, this project may anticipate severe damage to national security and interest. In particular, despite the fact that vulnerability due to inter-Korean confrontation and regular security-related incidents have been triggered, unconditionally conducting a cloud computing pilot project without reviewing not only violates security regulations but also causes various security-related side effects in and outside South Korea. Therefore, this thesis found conditions for conduct of this project by suggesting duties that can apply cloud computing as well as security technology, administration, post-accident matters and conditions for legally solving cloud computing in the military.

A Study on the Factors Affecting the Intention of Continuous Use of Intelligent Government Administrative Services (지능형 정부 행정서비스 지속사용의도에 영향을 미치는 요인에 대한 연구)

  • Lee, Se-Ho;Han, Seung-jo;Park, Kyung-Hye
    • Journal of Digital Convergence
    • /
    • v.19 no.11
    • /
    • pp.85-93
    • /
    • 2021
  • The government is pursuing plans to create new e-government services. In terms of improving business procedures, dBrain (finance), e-people (personnel), and Onnara (electronic payment and business management) have achieved considerable results, and are currently making efforts to improve existing administrative services using newly emerged ICT. Among them, this paper attempted to study whether self-learning-based intelligent administrative services are efficient in the work process of public officials promoting actual work and affect their continued use. Based on individual perceptions and attitudes toward advanced ICTs such as AI, big data, and blockchain, public officials' influences on administrative services were identified and verified using UTAUT variables. They believe that the establishment and introduction of innovative administrative services can be used more efficiently, and they have high expectations for the use and provision of services as ICT develops. In the future, a model will be also applied to citizens