• Title/Summary/Keyword: System Destruction Operations

Search Result 17, Processing Time 0.019 seconds

A Study on Defense Robot Combat Concepts Using Fourth Industrial Revolution Technologies

  • Sang-Hyuk Park;Jae-Geon Lee;Moo-Chun Kim
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.1
    • /
    • pp.249-253
    • /
    • 2024
  • The ultimate purpose of this study is as follows: The current primary concern in the defense sector revolves around how to strategically utilize Fourth Industrial Revolution technologies in combat. The Fourth Industrial Revolution denotes a shift towards an environment where automation and connectivity are maximized, driven by technologies such as artificial intelligence. Coined by Klaus Schwab in the 2015 Davos Forum, this term highlights the significant role of machine learning and artificial intelligence. Particularly, the military application of Fourth Industrial Revolution technologies is expected to be actively researched and implemented. Combat involves military actions between units, typically conducted as part of a larger war, with units striving to achieve one or more objectives. The concept of combat refers to the fundamental ideas of how units should engage with the enemy, both presently and in future scenarios, to achieve assigned objectives.

Prioritisation of Medical Procedure for Health Technology Assessment (전문의 대상 설문조사를 이용한 보건의료 기술평가 대상 시술의 우선 순위 선정 - 이비인후과와 흉부외과를 중심으로 -)

  • 안형식;김선민;신영수;김차엽;김선미;이순형
    • Health Policy and Management
    • /
    • v.7 no.2
    • /
    • pp.46-64
    • /
    • 1997
  • Background & Objectives : Korea is face with the social need for health care technology assessment so that it is urgently needed to found principles and methodology in technology assessment in health care. As a groundwork for health care technology assessment, we tried to prioritize medical technology for assessment. Among medical technologies, procedure is somewhat difficult to assess, compared to drug or equipment. In this study, we aimed at the prioritisation of medical procedure to be assessed, in terms of efficay, safety, and adequacy. Method : For the standardized classification of medical procedure, ICD-9-CM(International Classification of Diseases 9th edition - Clinical Modification) was used. Among the list the procedures coming under otorhinolaringjology and thoracic surgery were selected by three family physicians. The list of procedure was mailed to the board certified surgeons of both disciplines, with the question asking about the necessity for assessment in terms of efficay, safety, and adequacy. Replied questionnaires were analyzed in each procedure. Results : Of 560 otorhinolaryngologist and 480 thoracic surgeon, 114 surgeons replied. Of otorhinolaryngological procedure, incision, excision, and destruction of inner ear : fenestration of inner ear : stapedectomy and its revision were the most urgent technology to assess in the aspect of safety. For adequacy, operations on Eustachian tube: fenestration of inner ear: incision, excision, and destruction of inner ear were highly ranked in necessity, and for efficary, operations on Eustachian tube; external maxillary antrotomy; fenestration of inner ear. Thoracic surgeons replied thoracic procedures, lung transplantation; heart transplantation; implantation of heart assist system [pump] are most important for evaluation in terms of safety; and heart transplantation; Lung transplantation; Implantation of heart assist system [pump] in terms of adequacy, and surgical collapse of lung [Artificia니 pnemothorax or pnuexoperitoeum]; lung transplantation; periarterial sympathectomy in terms of efficacy. As a whole, surgeons regard safety evaluation is more urgent than adequacy or efficary. In addition, otorhinolaryngological surgeons regard evaluation of their procedures more urgent than thoracic surgeons regard theirs. Conclusion : By the questionnaire to board certified physicians, we get some preliminary data for prioritisation of technologies to assess. Through the questionnaire like this, much information would be gathered for technology assessment, especially for medical procedure, if not enough. In the near future, well structured expert opinion gathering research, such as modified Delphi or nominal group technique, should be done succeedingly.

  • PDF

Study on the State Leadership's Safety Measures Regarding the North Korean Threat of Weapons of Mass Destruction - Focuses on the Threat of North Korean Nuclear Weapons (북한 대량살상무기 위협에 대한 국가지도부 안전대책에 관한 연구 - 북한 핵무기 위협을 중심으로)

  • Choi, Kee-Nam
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.325-354
    • /
    • 2013
  • The concept of national security and the fundamental system for crisis management have departed from traditional methods and the importance of a national critical infrastructure crisis management has been emphasized. A national critical infrastructure crisis means a situation where human resource, material and functional system that may have a material effect on the critical functions of the government, the vitality and integrity of society, national economy and the safety of the public becomes disabled due to causes such as terrorism or major disasters. Although North Korea had been subject to numerous rounds of negotiations and sanctions as it continually developed nuclear weapons since the 1960s, it has also showed off its nuclear armaments through successful nuclear testings and missile launches. As the development and threat of North Korea's weapons of mass destruction becomes more noticeable and the range of its risk expands, this study focuses on the potential for an absence of leadership for national crisis management where the country's leadership, which should serve the critical role and function of handling national crises, becomes completely destroyed by the unexpected initial attacks by North Korea. As a result, the purpose of this study is to propose safety measures for the country's leadership in preparation for North Korea's threat of nuclear weapons by examining the concept and degree of risk of weapons of mass destruction with a focus on nuclear weapons, analyzing the substance of the threat of North Korean nuclear weapons and evaluating such threat. In conclusion, first, to ensure the normal functioning of a national crisis management system in the event of a national crisis, we must seek safety measures that conform to the scope and succession order of the leadership of the national crisis management for an Enduring Constitutional Government (ECG) and the Continuity Of Operations (COOP). Second, in the event of a national ceremony, the gathering of the country's leadership all together in an open place should be avoided. In unavoidable circumstances, the next in rank that will act on behalf of the current leader should be designated and relevant safety measures should be taken. Third, during time of peace, in preparation for national crises, the scope of protection for the country's leadership should be prescribed and specific security and safety measures should be implemented. Fourth, the succession order for acting president in the case of the death of the president pursuant to Articles 71 and 26(1) of the National Government Organization Act should reconsidered to see whether it is a reasonable provision that takes into consideration a national crisis management that corresponds to the threat of North Korean nuclear weapons and weapons of mass destruction. Pursuant to the Basic Guidelines for National Crisis Management set out under Presidential Directive No. 229, the Korean government is currently operating a case-by-case "crisis management standard manual" and its sub-manuals and has also prepared the Presidential Security Service's security and safety measure regulations regarding the acting president. Therefore, the Korean government should actualize the above points in the case-by-case crisis management standard manual and security and safety measure regulations regarding the acting president to implement and legislate them.

  • PDF

A Network-based Optimization Model for Effective Target Selection (핵심 노드 선정을 위한 네트워크 기반 최적화 모델)

  • Jinho Lee;Kihyun Lee
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.4
    • /
    • pp.53-62
    • /
    • 2023
  • Effects-Based Operations (EBO) refers to a process for achieving strategic goals by focusing on effects rather than attrition-based destruction. For a successful implementation of EBO, identifying key nodes in an adversary network is crucial in the process of EBO. In this study, we suggest a network-based approach that combines network centrality and optimization to select the most influential nodes. First, we analyze the adversary's network structure to identify the node influence using degree and betweenness centrality. Degree centrality refers to the extent of direct links of a node to other nodes, and betweenness centrality refers to the extent to which a node lies between the paths connecting other nodes of a network together. Based on the centrality results, we then suggest an optimization model in which we minimize the sum of the main effects of the adversary by identifying the most influential nodes under the dynamic nature of the adversary network structure. Our results show that key node identification based on our optimization model outperforms simple centrality-based node identification in terms of decreasing the entire network value. We expect that these results can provide insight not only to military field for selecting key targets, but also to other multidisciplinary areas in identifying key nodes when they are interacting to each other in a network.

A Study on Operation Concept of Naval Surface to Air Defense System with Complex Assets (함대공 방어체계 복합자산 운용개념 연구)

  • Taegu Kim;Woongjae Na;Seoyeon Yang;Yeojin Park;Donghyuk Shim;Da-Bin Ryu;Nahae Yun;In-Chul Park;Lae-Eun Kim
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.4
    • /
    • pp.190-198
    • /
    • 2023
  • The purpose of this study was to propose an operational concept for a ship in a fleet equipped with an interceptor missile system, a naval surface to air defense system, and to develop a simulation program that reflects it. The results of the defense activities of other ships in the fleet can be reflected by receiving information about the status of the enemy missiles. The allocation of defensive assets is based on the survival probability of the ship, not on the destruction of enemy attacks, which can be obtained as the product of the expected survival probability for each enemy missile. In addition, the concept of predicted survivability was introduced to assess the loss of future defense opportunities that would result from assigning a new command. A simulation program was also developed as a tool for realizing the proposed concept of operations, which generated cases.

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.4
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

Analysis and implications on Ukrainian Military Intelligence Team's Decapitation Operation (우크라이나 군사정보팀의(Military Intelligence Team) 핀셋작전 분석과 시사점)

  • Cho, Sang Keun;Zhytko, Andrii;Park, Sung Jun;Kwon, Bum June;Seo, Kanh ll;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.435-439
    • /
    • 2022
  • ROK has a lot to benchmark from how Ukraine is fighting Russia back with its tactical wins. They have taken a targeted strategy to strike Russia's top generals with high precision. To carry out this strategy, Ukraine is operating a Special Operations Force, which utilizes US/NATO forces, civilian and own resources for maximum impact. Of note, they utilize Starlink for seamless connection from detection, decision-making to strike to maximize operational efficiency. As ROK faces security threat of weapons of mass destruction, Ukraine's military intelligence organization set-up, weapons system and operations can provide some guidance on how to leverage its various SOF as well.

Study of High-capacity Foam Discharging Systems for Full Surface Fire of Big Oil Tanks (대형 유류저장탱크 전면화재 대응을 위한 대용량포방사시스템 연구)

  • Im, Joo-Yeol;Chung, Yeong-Jin
    • Fire Science and Engineering
    • /
    • v.33 no.6
    • /
    • pp.173-180
    • /
    • 2019
  • Oil tank fires need to be suppressed differently from other oil-related fires, due to the high-temperature flames and hot updraft above the tank, in the former case, that cause the destruction of large amounts of foam. We studied high-capacity foam discharge systems based on the standards of the American Petroleum Institute (API), National Fire Protection Association (NFPA), British Standard European Norm (BS EN), and the laws of Japan. The performance of a high-capacity foam discharge system was measured by conducting real fire experiments with model oil tanks. We concluded that lightweight and easily movable high-capacity foam discharge systems should be urgently introduced in domestic operations. Additionally, the obstacles faced by major tanks, such as long-distance installation of large-diameter fire hoses and narrowing of firefighting spaces, should be resolved depending on the conditions of the site.

The Korean Peninsula security and Military Strategy of USA and China (미.중의 군사전략과 한반도 안보)

  • Son, Do-Sim
    • Journal of National Security and Military Science
    • /
    • s.4
    • /
    • pp.289-350
    • /
    • 2006
  • The world has been rapidly restructured in an agenda of national security from center of military strength to that of economic strength since the post cold-war era China military leadership-division carried out RMA through learning of a lesson from Gulf war in 1990 -1991 and Iraq war in 2003, thus the leadership-division made an attempt to convert the military system to a technical intensive system. The principle based on RMA of China military is (National defense strategy) drafted by the central military committee 1985 and (Four modernization general principles) 1978. China has introduced Russian high-technological arms and equipment in order to build up the military arms greatly thanks to an economical development, and they take pragmatism line as chinese socialism with their strategy to make secure a position as military powers such as they successfully launched a manned spacecraft and are building an air-craft carrie and soon. USA has a theory of dichotomy whether a country is a cooperator for USA, or not. and also enemy or friend since 9.11terror, thus USA is different from their direction of police. This is because USA stands a position as the superpower of the supremacy hegemony of the world. We must be carefully aware that USA considers as important area for Middle east, West south Asia, Central Asia and Northwest Asia to meet the demands of 2lcentury. Accordingly, the focus of USA's military strategy will be probably concentrated at the above mentioned four areas. On the other hand, USA enjoys such a superpower position due to collapse of USSR which was the past main enemy since the post cold war era. We could give an conclusive example as fact that USA has recurred to unilateralism But USA carry on the military operations to the terror groups at global around by converting thje military strike strategy to pre-emptive strike strategy since9.11 terror, 2001. USA seeks for transformation to the mobile military forces with light-quantity oriented in order to carry on such the military operations and makes progress GPR, And the USA forces in Korea makes progress a military renovation as part of such a military strategy. On the other hand, USA promotes the measures of choose for the countries standing at the crossroads of strategy and carries forward a main scheme of provision for four priority aims that the leaders of a hostile country and mis-country shall be prohibited from use and obtainment of weapons of mass destruction. Accordingly, this treatise found out a significant meaning to have an effect on the national security in the korean peninsula.

  • PDF

Data Acquisition and Statistical Processing of Insulation Resistance for High-Power Cables in Operation (운전 중 고전력 케이블의 절연저항 데이터의 취득과 통계적 처리 방법)

  • Park, Sung-Hee;Um, Kee-Hong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.181-186
    • /
    • 2018
  • With progress in industrialization, facilities for generating, delivering, and receiving high levels of electric power are in great demand. The scale of electric power equipment is increasing in both size and complexity. This has contributed to the development of our modern, high-tech and information-based society. However, if the generation of electric power is suspended due to unexpected accidents at power facilities or power stations, a range of equipment the operations of which are dependent on electric power can be damaged, causing substantial socioeconomic losses in an industrial society. A great deal of time and money would be expended to repair damaged facilities at a power station, causing enormous economic loss. In order to detect the deterioration processes of power cables, and to prevent the destruction of power cables, the operation status of power cables should be monitored on a regular basis. We studied the method in order to improve accuracy and reliability for diagnosising the junction where accident occurs frequently. We present the method of data acquisition and statistical processing.