• Title/Summary/Keyword: Power of command

Search Result 334, Processing Time 0.031 seconds

A Dilemma of Kyrgyzstan Goes Through the Process of Nation-Building: National Security Problems and Independent National Defense Capability (국가건설과정에서 키르기스스탄의 국가안보와 자주국방의 딜레마)

  • Kim, Seun Rae
    • Journal of International Area Studies (JIAS)
    • /
    • v.14 no.4
    • /
    • pp.27-52
    • /
    • 2011
  • The regions of Central Asia have each acquired an elevated strategic importance in the new security paradigm of post-September 1lth. Comprised of five states, Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan and Uzbekistan, Central Asia's newly enhanced strategic importance stems from several other factors, ranging from trans-national threats posed by Islamic extremism, drug production and trafficking, to the geopolitical threats inherent in the region's location as a crossroads between Russia, Southwest Asia and China. Although the U.S. military presence in the region began before September 11th, the region became an important platform for the projection of U.S. military power against the Taliban in neighboring Afghanistan. The analysis goes on to warn that 'with US troops already in place to varying extents in Central Asian states, it becomes particularly important to understand the faultlines, geography, and other challenges this part of the world presents'. The Kyrgyz military remains an embryonic force with a weak chain of command, the ground force built to Cold War standards, and an almost total lack of air capabilities. Training, discipline and desertion - at over 10 per cent, the highest among the Central Asian republics - continue to present major problems for the creation of combat-effective armed forces. Kyrgyzstan has a declared policy of national defence and independence without the use of non-conventional weapons. Kyrgyzstan participates in the regional security structures, such as the Collective Security Treaty Organisation (CSTO) and the Shanghai Co-operation Organisation (SCO) but, in security matters at least, it is dependent upon Russian support. The armed forces are poorly trained and ill-equipped to fulfil an effective counter-insurgency or counter-terrorist role. The task of rebuilding is much bigger, and so are the stakes - the integrity and sovereignty of the Kyrgyz state. Only democratization, the fight against corruption, reforms in the military and educational sectors and strategic initiatives promoting internal economic integration and national cohesion hold the key to Kyrgyzstan's lasting future

A Study on the Utilization and Control Method of Hybrid Switching Tap Based Automatic Voltage Regulator on Smart Grid (스마트그리드의 탭 전환 자동 전압 조정기의 다중 스위칭 제어 방법 및 활용 방안에 관한 연구)

  • Park, Gwang-Yun;Kim, Jung-Ryul;Kim, Byung-Gi
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.31-39
    • /
    • 2012
  • In this paper, we propose a microprocessor-based automatic voltage regulator(AVR) to reduce consumers' electric energy consumption and to help controlling peak demanding power. Hybrid Switching Automatic Voltage Regulator (HS-AVR) consist of a toroidal core, several tap control switches, display and command control parts. The coil forms an autotransformer which has a serial main winding and four parallel auxiliary windings. It controls the output voltage by changing the combination of the coils and the switches. Relays are adopted as the link switches of the coils to minimize the loss. To make connecting and disconnecting time accurate, relays of the circuit have parallel TRIACs. A software phase locked loop(PLL) has been used to synchronize the timings of the switches to the voltage waveform. The software PLL informs the input voltage zero-crossing and positive/negative peak timing. The traditional voltage transformers and AVRs have a disadvantage of having a large mandatory capacity to accommodate maximum inrush current to avoid the switch contact damage. But we propose a suitable AVR for every purpose in smart grid with reduced size and increased efficiency.

Legitimacy of the wartime maritime blockade of the Korean Peninsula : Focusing on the response to ships in neutral countries (전시 한반도 근해 해상봉쇄의 합법성: 중립국 선박에 대한 대응을 중심으로)

  • Park, Hyun-rok
    • Maritime Security
    • /
    • v.5 no.1
    • /
    • pp.85-112
    • /
    • 2022
  • The maritime blockade has long been used as a means of war in that it serves as a bridge for economic warfare by paralyzing enemy maritime transport, although it is not a decisive battle, and in the Korean War, U.N. forces have achieved significant results in the war with limited maritime blockade through the Clark Line. However, with China emerging as a maritime powers based on its strong naval power, there is a lack of consideration on how to set up a blockade to block maritime activities and how to respond neutral ships or carrying wartime contraband products if war breaks out again on the Korean Peninsula, In addition, since maritime blockade should be used as a sensitive and flexible naval force projection in that it has interests with neutral countries, it should be carefully reviewed in that it can be used only through careful and reasonable judgment considering the principle of ensuring the legality of maritime blockade Therefore, in this study, Reexamine the process of change in the application of the International Law of Blockade, and through this, Derive the basic principle of ensuring the legitimacy of maritime blockade. In addition, by reviewing the application of these basic principles in the waters off the Korean Peninsula at wartime, we presented answers to research questions by reviewing what needs to be done to neutral ships and ships carrying wartime contraband products, and considered the implications for us

  • PDF

The Study on the Countermeasure Plans about Leakage, Explosion and Fire Accidents of Atmospheric Storage Tank (옥외저장탱크 누출, 폭발 및 화재사고 대응방안에 관한 고찰)

  • Lee, Gab-Kyoo
    • Fire Science and Engineering
    • /
    • v.30 no.6
    • /
    • pp.48-56
    • /
    • 2016
  • A crude oil leakage from a large atmospheric storage tank occurred on 4 April 2014 at 14:50 in Ulsan City, while storing the crude oil in the tank. Emergency Rescue Control Group was deployed in the scene. The company, Fire Service Headquarters and associated agencies got together in Command Post (CP) for discussing an effective corresponding strategy. Many solution plans were drafted in the debate such as power down, stopping the facilities, checking the density of inflammable gas, suppressing oil evaporation, moving the leaked crude oil to a nearby tank and a processing plant and avoiding marine pollution. All the solutions were carried out in cooperation with several agencies and partners. The oil leakage accident was successfully settled up within the process of responding, The Fire Service Headquarters and the company thought that the most important thing was the suppression of oil evaporation and the elimination of ignition source. With Fire Service Headquarters and several agencies' every effort, an explosion and a fire didn't occurred in the scene. This study suggest the improvement of the operating system in Emergency Rescue Control Group in case of petroleum leakage, explosion and fire accidents of atmospheric storage tank, different from a ordinary disaster. Assuming that petroleum leakage in atmospheric storage tank develop the explosion and fire accidents, the spreading speed of the flame and the burning time was experimented and compared with each other. Furthermore, this study concentrates on the effective field response plan prepared for the afterward explosion and fire accidents from petroleum leak in a storage tank, with the database experimented and analyzed in accordance with the angle of radiation in the foam nozzle and the pressure of pumping in a fire engine.

Detection of Delay Attack in IoT Automation System (IoT 자동화 시스템의 지연 공격 탐지)

  • Youngduk Kim;Wonsuk Choi;Dong hoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.787-799
    • /
    • 2023
  • As IoT devices are widely used at home, IoT automation system that is integrate IoT devices for users' demand are gaining populrity. There is automation rule in IoT automation system that is collecting event and command action. But attacker delay the packet and make time that real state is inconsistent with state recongnized by the system. During the time, the system does not work correctly by predefined automation rule. There is proposed some detection method for delay attack, they have limitations for application to IoT systems that are sensitive to traffic volume and battery consumption. This paper proposes a practical packet delay attack detection technique that can be applied to IoT systems. The proposal scheme in this paper can recognize that, for example, when a sensor transmits an message, an broadcast packet notifying the transmission of a message is sent to the Server recognized that event has occurred. For evaluation purposes, an IoT system implemented using Raspberry Pi was configured, and it was demonstrated that the system can detect packet delay attacks within an average of 2.2 sec. The experimental results showed a power consumption Overhead of an average of 2.5 mA per second and a traffic Overhead of 15%. We demonstrate that our method can detect delay attack efficiently compared to preciously proposed method.

A Study on the Necessity of Verification about depot level maintenance plan through the Weapons System cases analysis (무기체계 사례 분석을 통한 창정비개발계획안 검증 필요성 연구)

  • Ahn, Jung-Jun;Kim, Su-Dong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.2
    • /
    • pp.76-82
    • /
    • 2019
  • This study has done to search for a solution to remove risk limitedly caused by separating weapon system acquisition from operation and maintenance at the view point of Logistic Commander who's responsible for stable operation and maintenance after acquiring weapon system. At the System development stage, unverified overhaul development plan may cause additional manpower and costs after the development, and furthermore it is likely to have risk to lower reliability of the military. Thus, research and development agency should write overhaul development plan at the System development stage, and it should be verified through evaluation and verification test. Secondly, during research and development, institutional supplementation is needed to calculate human and material resources writing overhaul development plan. Thirdly, it should be able to analyze proper operation & maintenance plan and cost for overhaul plan at the pre-investigation stage. Fourthly, the base which can develop overhaul concept and overhaul factors should be included in the need and need determination document. Lastly, for the weapon system which has small amount of high power figure, project management should be performed to be able to specify at the each acquisition level of weapon system to realize Article 28, clause 3 and 4 of Defense business law.

Auto-compatibility Analysis for Ka-band payload of COMS

  • Park, Jae-Woo;Lee, Seong-Pal;Baek, Myung-Jin
    • Journal of Satellite, Information and Communications
    • /
    • v.2 no.2
    • /
    • pp.41-47
    • /
    • 2007
  • The first geostationary satellite made by Korea, COMS, has the three different payload ; Meteorological sensor, Oceanographic sensor and Ka-band communication payload. There are Meteorological & Ocean Data Communication Subsystem(MODCS) and Telemetry, Command and Ranging Subsystem(TC&R) as other RF radiation sources. MODCS transmits and receives Meteo and Ocean measurement data from/to earth using L-band and TC&R using S-band. The Ka-band communication payload will provide high-speed multimedia services and communication services for natural disaster such as prediction, prevention, and recovery services in the government communications network.Ka-band beacon is for the earth antenna pointing and the experiment of rain fading. This paper gives the analysis results about the mutual radiation effect on Ka-band communication payload, Ka-band beacon, MODCS and TC&R. Up/Down link power and coupling factor including the geometrical position and distance of antenna, filter rejection and degradation factor due to the different polarization are considered. The results show MODCS and TC&R are compatible for Ka-band communication payload and Ka-band beacon does not interfere with MODCS and TC&R normal operation.

  • PDF

A Design and Implementation of A Robot Client Middleware for Network-based Intelligent Robot based on Service-Oriented (지능형 네트워크 로봇을 위한 서비스 지향적인 로봇 클라이언트 미들웨어 설계와 구현)

  • Kwak, Dong-Gyu;Choi, Jae-Young
    • The KIPS Transactions:PartA
    • /
    • v.19A no.1
    • /
    • pp.1-8
    • /
    • 2012
  • Network-based intelligent robot is connected with network system, provides interactions with humans, and carries out its own roles on ubiquitous computing environments. URC (Ubiquitous Robot Companion) robot has been proposed to develop network-based robot by applying distributed computing techniques. On URC robot, it is possible to save the computing power of robot client by environments, has been proposed to develop robot software using service-oriented architecture on server-client computing environments. The SOMAR client robot consists of two layers - device service layer and robot service layer. The device service controls physical devices, and the robot service abstracts robot's services, which are newly defined and generated by combining many device services. RSEL (Robot Service Executing Language) is defined in this paper to represent relations and connections between device services and robot services. A RESL document, including robot services by combining several device services, is translated to a programming language for robot client system using RSEL translator, then the translated source program is compiled and uploaded to robot client system with RPC (Remote Procedure Call) command. A SOMAR client system is easy to be applied to embedded systems of host/target architecture. Moreover it is possible to produce a light-weight URC client robot by reducing workload of RSEL processing engine.

A Comparative Study on the Effect of Enterprise SNS on Job Performance - Focused on the Mediation Effect of Communication Level and Moderating Effect of Nationality - (기업용 SNS 이용이 업무성과에 미치는 영향의 국가 간 비교연구 - 커뮤니케이션 수준의 매개효과와 국적의 조절효과를 중심으로 -)

  • Chen, Jing-Yuan;Kwon, Sun-Dong
    • Management & Information Systems Review
    • /
    • v.38 no.4
    • /
    • pp.137-157
    • /
    • 2019
  • Companies are trying to use enterprise SNS for collaboration and speedy decision-making. This study verified the mediating effect of communication between enterprise SNS and job performance, and proved the moderating effect of nationality between enterprise SNS and communication. This study collected survey data of 81 Korean and 81 Chinese from employees who have used enterprise SNS in Korea and China. As results of data analysis, first, enterprise SNS improved job performance through speedy information sharing and error reduction. Second, communication mediated the effect of enterprise SNS on job performance. Third, enterprise SNS increased the level of organizational communication through decreasing the burden of offline face-to-face communication. Compared with Chinese corporate organizations, Korean corporate organizations have high power distances, centralized control, and high superior authority. Therefore, in the off-line communication situation, the subordinate feels the social pressure to follow the command of the superior. Thus communication is one-way and closed. In this Korean organizational situation, corporate SNS can be used as a means to bypass rigid offline communication. In the online communication environment of non face-to-face corporate SNS, anxiety and stress of face-to-face communication can be reduced, so communication between the upper and lower sides can flow more smoothly. The contribution of this paper is that it proved that enterprise SNS promotes communication and improve job performance by reducing the anxiety or stress of offline communication, while according to prior research successful adoption of many types of information systems requires the fit between an organization and its organizational culture.

A Microcomputer-Based Data Acquisition System (Microcomputer를 이용(利用)한 Data Acquisition System에 관(關)한 연구(硏究))

  • Kim, Ki Dae;Kim, Soung Rai
    • Journal of Biosystems Engineering
    • /
    • v.7 no.2
    • /
    • pp.18-29
    • /
    • 1983
  • A low cost and versatile data acquisition system for the field and laboratory use was developed by using a single board microcomputer. Data acquisition system based on a Z80 microprocessor was built, tested and modified to obtain the present functional system. The microcomputer developed consists of 6 kB ROM, 5 kB RAM, 6-seven segment LED display, 16-Hex. key and 8 command key board. And it interfaces with an 8 channel, 12 bits A/D converter, a microprinter, EPROM programmer for 2716, and RS232C interface to transfer data between the system and HP3000 mini-computer manufactured by Hewlett Packard Co., A software package was also developed, tested, and modified for the system. This package included drivers for the AID converter, LED display, key board, microprinter, EPROM programmer, and RS232c interface. All of these programs were written in 280 assembler language and converted to machine codes using a cross assembler by HP3000 computer to the system during modifying stage by data transferring unit of this system, then the machine language wrote to the EPROM by this EPROM programmer. The results are summarized as follows: 1. Measuring program developed was able to control the measuring intervals, No. of channels used, and No. of data, where the maximum measuring speed was 58.8 microsec. 2. Calibration of the system was performed with triangle wave generated by a function generator. The results of calibration agreed well to the test results. 3. The measured data was able to be written into EPROM, then the EPROM data was compared with original data. It took only 75 sec. for the developed program to write the data of 2 kB the EPROM. 4. For the slow speed measurements, microprinter instead of EPROM programmer proved to be useful. It took about 15 min. for microprinter to write the data of 2 kB. 5. Modified data transferring unit was very effective in communicating between the system and HP3000 computer. The required time for data transferring was only 1~2 min. 6. By using DC/DC converting devices such as 78-series, 79-series. and TL497 IC, this system was modified to convert the only one input power sources to the various powers. The available power sources of the system was DC 7~25 V and 1.8 A.

  • PDF