• 제목/요약/키워드: System Destruction Operations

검색결과 17건 처리시간 0.025초

A Study on Defense Robot Combat Concepts Using Fourth Industrial Revolution Technologies

  • Sang-Hyuk Park;Jae-Geon Lee;Moo-Chun Kim
    • International Journal of Advanced Culture Technology
    • /
    • 제12권1호
    • /
    • pp.249-253
    • /
    • 2024
  • The ultimate purpose of this study is as follows: The current primary concern in the defense sector revolves around how to strategically utilize Fourth Industrial Revolution technologies in combat. The Fourth Industrial Revolution denotes a shift towards an environment where automation and connectivity are maximized, driven by technologies such as artificial intelligence. Coined by Klaus Schwab in the 2015 Davos Forum, this term highlights the significant role of machine learning and artificial intelligence. Particularly, the military application of Fourth Industrial Revolution technologies is expected to be actively researched and implemented. Combat involves military actions between units, typically conducted as part of a larger war, with units striving to achieve one or more objectives. The concept of combat refers to the fundamental ideas of how units should engage with the enemy, both presently and in future scenarios, to achieve assigned objectives.

전문의 대상 설문조사를 이용한 보건의료 기술평가 대상 시술의 우선 순위 선정 - 이비인후과와 흉부외과를 중심으로 - (Prioritisation of Medical Procedure for Health Technology Assessment)

  • 안형식;김선민;신영수;김차엽;김선미;이순형
    • 보건행정학회지
    • /
    • 제7권2호
    • /
    • pp.46-64
    • /
    • 1997
  • Background & Objectives : Korea is face with the social need for health care technology assessment so that it is urgently needed to found principles and methodology in technology assessment in health care. As a groundwork for health care technology assessment, we tried to prioritize medical technology for assessment. Among medical technologies, procedure is somewhat difficult to assess, compared to drug or equipment. In this study, we aimed at the prioritisation of medical procedure to be assessed, in terms of efficay, safety, and adequacy. Method : For the standardized classification of medical procedure, ICD-9-CM(International Classification of Diseases 9th edition - Clinical Modification) was used. Among the list the procedures coming under otorhinolaringjology and thoracic surgery were selected by three family physicians. The list of procedure was mailed to the board certified surgeons of both disciplines, with the question asking about the necessity for assessment in terms of efficay, safety, and adequacy. Replied questionnaires were analyzed in each procedure. Results : Of 560 otorhinolaryngologist and 480 thoracic surgeon, 114 surgeons replied. Of otorhinolaryngological procedure, incision, excision, and destruction of inner ear : fenestration of inner ear : stapedectomy and its revision were the most urgent technology to assess in the aspect of safety. For adequacy, operations on Eustachian tube: fenestration of inner ear: incision, excision, and destruction of inner ear were highly ranked in necessity, and for efficary, operations on Eustachian tube; external maxillary antrotomy; fenestration of inner ear. Thoracic surgeons replied thoracic procedures, lung transplantation; heart transplantation; implantation of heart assist system [pump] are most important for evaluation in terms of safety; and heart transplantation; Lung transplantation; Implantation of heart assist system [pump] in terms of adequacy, and surgical collapse of lung [Artificia니 pnemothorax or pnuexoperitoeum]; lung transplantation; periarterial sympathectomy in terms of efficacy. As a whole, surgeons regard safety evaluation is more urgent than adequacy or efficary. In addition, otorhinolaryngological surgeons regard evaluation of their procedures more urgent than thoracic surgeons regard theirs. Conclusion : By the questionnaire to board certified physicians, we get some preliminary data for prioritisation of technologies to assess. Through the questionnaire like this, much information would be gathered for technology assessment, especially for medical procedure, if not enough. In the near future, well structured expert opinion gathering research, such as modified Delphi or nominal group technique, should be done succeedingly.

  • PDF

북한 대량살상무기 위협에 대한 국가지도부 안전대책에 관한 연구 - 북한 핵무기 위협을 중심으로 (Study on the State Leadership's Safety Measures Regarding the North Korean Threat of Weapons of Mass Destruction - Focuses on the Threat of North Korean Nuclear Weapons)

  • 최기남
    • 시큐리티연구
    • /
    • 제37호
    • /
    • pp.325-354
    • /
    • 2013
  • 국가안보의 개념과 위기관리의 기본시스템이 전통적 방식을 탈피하여 국가핵심기반위기관리의 중요성이 강조되고 있다. 국가핵심기반위기는 테러, 대규모 재난 등의 원인에 의해 국민의 안위, 국가 경제, 사회의 생명력과 일체성 및 정부의 핵심기능에 중대한 영향을 미칠 수 있는 인적 물적 기능적 체계가 마비되는 상황을 의미한다. 북한은 1960년대부터 지속적으로 핵무기를 개발하여 수차에 거쳐 협상과 제재를 받아왔지만, 핵실험과 미사일 발사 실험의 성공을 통해 핵무장을 과시한 바 있다. 본 연구는 북한의 대량살상무기의 개발과 위협이 가시화되고 그 위험 범위가 확대됨에 따라 국가적 위기대처에 핵심적인 역할과 기능을 수행해야 할 국가지도부가 북한의 우발적인 초기공격에 초토화됨으로써 국가위기관리의 지도력에 공백이 발생할 수 있다는 점에 주목하였다. 이에 따라 대량살상무기인 핵무기를 중심으로 그 개념과 위협의 정도를 고찰하고 북한 핵무기의 위협의 실체를 분석하고 평가하였으며, 북한의 핵무기 위협에 대비한 국가지도부의 안전대책을 제시하고자 하였다. 결론은 첫째 국가적 위기 시 국가위기관리시스템의 정상적인 작동을 위한 헌법적 행정부 유지(Enduring Constitutional Government, ECG), 업무연속성 확보(Continuity Of Operations, COOP)를 위한 국가위기관리지도부의 범위와 승계순위에 따른 안전대책을 강구하여야 한다. 둘째는 국가적 행사시 국가지도부가 공개된 장소에 모두 집합하는 경우를 지양해야 한다. 불가피한 경우 차 상위 대행권자를 지정하여 보호조치를 취하여야 한다. 셋째는 평시 국가적 위기시를 대비한 국가지도부 보호를 위한 범위를 규정하고 구체적인 경호안전대책을 시행하여야 한다. 넷째는 우리나라 정부조직법 제71조와 제26조 1항의 대통령 유고시 직무대행 승계 순위가 북한의 대량살상무기인 핵무기의 위협에 상응한 국가위기관리를 고려한 합리적인 규정인지를 재검토해야 한다 등이다. 정부는 대통령훈령 제229호 국가위기관리 기본지침에 따라 유형별 '위기관리 표준매뉴얼'과 하위 실무매뉴얼을 운영하고 있으며, 대통령경호실의 대통령 권한대행에 대한 경호 안전업무관련 규정을 가지고 있다. 따라서 정부는 유형별 위기관리 표준매뉴얼, 대통령 권한대행의 경호안전업무관련 규정에 이를 구체화하여 시행되도록 법제화하여야 한다.

  • PDF

핵심 노드 선정을 위한 네트워크 기반 최적화 모델 (A Network-based Optimization Model for Effective Target Selection)

  • 이진호;이기현
    • 산업경영시스템학회지
    • /
    • 제46권4호
    • /
    • pp.53-62
    • /
    • 2023
  • Effects-Based Operations (EBO) refers to a process for achieving strategic goals by focusing on effects rather than attrition-based destruction. For a successful implementation of EBO, identifying key nodes in an adversary network is crucial in the process of EBO. In this study, we suggest a network-based approach that combines network centrality and optimization to select the most influential nodes. First, we analyze the adversary's network structure to identify the node influence using degree and betweenness centrality. Degree centrality refers to the extent of direct links of a node to other nodes, and betweenness centrality refers to the extent to which a node lies between the paths connecting other nodes of a network together. Based on the centrality results, we then suggest an optimization model in which we minimize the sum of the main effects of the adversary by identifying the most influential nodes under the dynamic nature of the adversary network structure. Our results show that key node identification based on our optimization model outperforms simple centrality-based node identification in terms of decreasing the entire network value. We expect that these results can provide insight not only to military field for selecting key targets, but also to other multidisciplinary areas in identifying key nodes when they are interacting to each other in a network.

함대공 방어체계 복합자산 운용개념 연구 (A Study on Operation Concept of Naval Surface to Air Defense System with Complex Assets)

  • 김태구;나웅재;양서연;박여진;심동혁;류다빈;윤나혜;박인철;김래은
    • 산업경영시스템학회지
    • /
    • 제46권4호
    • /
    • pp.190-198
    • /
    • 2023
  • The purpose of this study was to propose an operational concept for a ship in a fleet equipped with an interceptor missile system, a naval surface to air defense system, and to develop a simulation program that reflects it. The results of the defense activities of other ships in the fleet can be reflected by receiving information about the status of the enemy missiles. The allocation of defensive assets is based on the survival probability of the ship, not on the destruction of enemy attacks, which can be obtained as the product of the expected survival probability for each enemy missile. In addition, the concept of predicted survivability was introduced to assess the loss of future defense opportunities that would result from assigning a new command. A simulation program was also developed as a tool for realizing the proposed concept of operations, which generated cases.

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • 제12권4호
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

우크라이나 군사정보팀의(Military Intelligence Team) 핀셋작전 분석과 시사점 (Analysis and implications on Ukrainian Military Intelligence Team's Decapitation Operation)

  • 조상근;안드레이;박성준;권범준;서강일;박상혁
    • 문화기술의 융합
    • /
    • 제8권6호
    • /
    • pp.435-439
    • /
    • 2022
  • 2022년 2월 24일, 우크라이나-러시아 전쟁이 발발했다. 이 전쟁에서 특이한 현상들이 발생하고 있는데, 그중에 하나가 2차 세계대전 이후 장군들의 전사율이 가장 높다는 것이다. 이것은 우크라이나군이 러시아군의 장군들만을 제거하는 핀셋작전을 전개하고 있기 때문이다. 이를 위해, 우크라이나군은 군사정보팀이라는 특수작전 부대를 운용하고 있는데, 이들은 자체, 미군·나토군, 민간 등의 자산을 융복합하여 다영역에서 활용함으로써 시너지를 창출하고 있다. 특히, 이들은 스타링크를 활용하여 '감시-결심-타격' 활동을 실시간 초연결함으로써 생존성과 작전효용성을 극대화하고 있다. 한국군 또한 다양한 특수작전부대를 보유하고 있고, 한반도에는 대량살상무기 위협이 내재되어 있다. 따라서 우크라이나군에서 운용하는 군사정보팀의 조직편성, 무기체계 및 운용 방법은 한국군이 미래 위협을 상쇄하는데 방향성을 제공할 수 있다.

대형 유류저장탱크 전면화재 대응을 위한 대용량포방사시스템 연구 (Study of High-capacity Foam Discharging Systems for Full Surface Fire of Big Oil Tanks)

  • 임주열;정영진
    • 한국화재소방학회논문지
    • /
    • 제33권6호
    • /
    • pp.173-180
    • /
    • 2019
  • 유류탱크 화재는 화재진압이 쉽지 않다. 미국, 일본, 싱가포르 등의 국가에서는 오랜 시행착오 끝에 대형 유류저장탱크의 전면화재에 대응하기 위한 대용량의 포방사 시스템을 도입하였다. 본 연구에서는 American Petroleum Institute (API), National Fire Protection Association (NFPA), British Standard European Norm (BS EN)의 관련 기준과 일본의 법령 등을 바탕으로 대용량 포방사에 대한 기준과 방법 등을 연구하였고, 모형탱크 전면화재 진압 비교실험을 통해 대용량 포방사의 성능을 확인하였다. 그 결과 소용량의 노즐 여러 개를 사용하는 것보다 대용량의 노즐 하나를 사용하는 대용량 포방사가 화재진압 성능이 더 우수 하였고, 노즐의 배치를 달리하여 서로 다른 방향에서 방사하는 것보다 동일한 방향에서 집중 방사하는 것이 더욱 효과적이었다. 결국 대용량포방사시스템의 국내도입 필요성을 확인하였다. 그러나 대용량포방사시스템의 운용은 현장 여건에 따라서는 매우 제한적일 수밖에 없다. 따라서 시스템을 최대한 경량화 되고 이동이 쉬운 것으로 도입하여야 한다. 또한 주요 탱크별로 운영계획을 수립하면서 대구경 소방호스의 장거리 설치문제, 소방활동 공간의 협소문제 등 파악되는 장애요인을 현장 여건에 따라 해결해 나가는 것이 현실적 방안으로 보인다.

미.중의 군사전략과 한반도 안보 (The Korean Peninsula security and Military Strategy of USA and China)

  • 손도심
    • 안보군사학연구
    • /
    • 통권4호
    • /
    • pp.289-350
    • /
    • 2006
  • The world has been rapidly restructured in an agenda of national security from center of military strength to that of economic strength since the post cold-war era China military leadership-division carried out RMA through learning of a lesson from Gulf war in 1990 -1991 and Iraq war in 2003, thus the leadership-division made an attempt to convert the military system to a technical intensive system. The principle based on RMA of China military is (National defense strategy) drafted by the central military committee 1985 and (Four modernization general principles) 1978. China has introduced Russian high-technological arms and equipment in order to build up the military arms greatly thanks to an economical development, and they take pragmatism line as chinese socialism with their strategy to make secure a position as military powers such as they successfully launched a manned spacecraft and are building an air-craft carrie and soon. USA has a theory of dichotomy whether a country is a cooperator for USA, or not. and also enemy or friend since 9.11terror, thus USA is different from their direction of police. This is because USA stands a position as the superpower of the supremacy hegemony of the world. We must be carefully aware that USA considers as important area for Middle east, West south Asia, Central Asia and Northwest Asia to meet the demands of 2lcentury. Accordingly, the focus of USA's military strategy will be probably concentrated at the above mentioned four areas. On the other hand, USA enjoys such a superpower position due to collapse of USSR which was the past main enemy since the post cold war era. We could give an conclusive example as fact that USA has recurred to unilateralism But USA carry on the military operations to the terror groups at global around by converting thje military strike strategy to pre-emptive strike strategy since9.11 terror, 2001. USA seeks for transformation to the mobile military forces with light-quantity oriented in order to carry on such the military operations and makes progress GPR, And the USA forces in Korea makes progress a military renovation as part of such a military strategy. On the other hand, USA promotes the measures of choose for the countries standing at the crossroads of strategy and carries forward a main scheme of provision for four priority aims that the leaders of a hostile country and mis-country shall be prohibited from use and obtainment of weapons of mass destruction. Accordingly, this treatise found out a significant meaning to have an effect on the national security in the korean peninsula.

  • PDF

운전 중 고전력 케이블의 절연저항 데이터의 취득과 통계적 처리 방법 (Data Acquisition and Statistical Processing of Insulation Resistance for High-Power Cables in Operation)

  • 박성희;엄기홍
    • 한국인터넷방송통신학회논문지
    • /
    • 제18권6호
    • /
    • pp.181-186
    • /
    • 2018
  • 산업화의 추세에 따라 수요가 급증하고 있는 고전력을 생산하기 위하여 시설장비 및 부하의 대용량화가 수반되고 있다. 전기설비의 규모는 점차 복잡해 지고, 대규모화 됨으로써 고도 정보화 사회로의 발전에 크게 기여하고 있다. 그러나, 발전 설비에서 불의의 사고가 발생하여 전기의 생산이 중단된다면, 전기에 의존하여 작동 중인 수 많은 장비가 지장을 받게되고, 산업사회에 막대한 경제적 손실 및 장애를 초래하게 된다. 사고가 발생한 발전설비를 복구하기 위해서는 많은 시간과 비용이 소요되어 국가 산업 활동에 막대한 경제적 피해를 끼치게 된다. 사고를 미연에 방지하기 위하여 케이블의 동작 상태를 정기적으로 감시 확인하여야 한다. 우리는 사고가 가장 빈번하게 발생하는 접속부에 대해 안정적인 사용을 위한 진단의 정확성과 신뢰성을 향상시키기 위한 연구를 하였다. 이 논문에서 데이터 취득을 하고, 통계적 처리를 하기 위한 방법을 제시한다.