• Title/Summary/Keyword: Threat Factor

Search Result 176, Processing Time 0.02 seconds

Lessons learned from Operation Iraqi Freedom(OIF) for ROK forces (이라크전쟁의 군사적 교훈)

  • Mun, Gwang-Geon
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.71-111
    • /
    • 2003
  • The key lessons of the very complex modern war can be dangerously misleading to the outsiders. The efforts trying to draw lessons learned from the Iraq War (OIF : Operation Iraqi Freedom) may be biased by the view of point by Americans, because most of war episodes have been come from the Western media coverage. More serious bias can be committed thanks to the differences of warfighting doctrines and military technology between US forces and ROK forces. However, OIF-fought allied commanders and outside military experts said this campaign exemplified 21st-century warfare: swift, agile and decisive, employing overpowering technology to bring relentless violence to bear in many places at once. Even though the campaign evolved differently than anticipated, allied forces regrouped and regained the initiative remarkably quickly, thanks in large part to a new command flexibility, tied to new technology that made possible the more rapid sharing of data. These factors permitted "new air-land dynamic". The things that compel that are good sensors networked with good intelligence disseminated through a robust networking system, which then yields speed. Speed turns out to be a very important factor for conducting "Rapid Decisive Operations" relied on joint "Mass of Effects". ROK forces facing the heaviest ground threat in the world may learn more from Cold War era-typed US Army 3rd Infantry Division (3ID), which operating considerably beyond existing doctrine. 3ID flew its personnel into Kuwait to meet up with equipment already located in the region as pre-positioned stock. During OIF, the division conducted continuous offensive operations over 230km deep battlespace for 21 days. The lessons learned for ROK army to prepare tomorrow's war may be found from 3ID in its training, command and control, task organization, firepower and battlespace management, and logistics.

  • PDF

A Research on the Housing Safety Threat Condition of the Elderly in Rural Area (농촌 고령자의 안전위협에 관한 주거실태 조사연구)

  • Kang, Hye-Kyung;Cho, Hee-Keum;Lee, Mi-Young;Eum, Ga-Young
    • Journal of the Korean housing association
    • /
    • v.25 no.5
    • /
    • pp.21-32
    • /
    • 2014
  • This research intends to discover the housing conditions of the elderly in rural area in South Korea, and identify measures to improve the conditions for an independent and safe life of seniors. This research conducted both survey research and experimental study. The survey interviewed 1,000 elderly people over 65 in farming areas across the country based on random selection from Census 2010 and sampling by regional size and administrative unit (Eup, Myeon, Li) to reflect the regional characteristics more accurately. The data was analyzed using SPSS 18.0 program. The experimental study identified the housing elements that may threaten the life of seniors based on a complete survey on households of elderly people over 65 in a selected typical rural village. As a result, the most inconvenient and threatening factor in the housing facilities appears to be the floor level difference. It was identified that most houses had the risk of falling due to the differences of the floor level between indoor and outdoor, and slippery floor materials. The squat toilets also bring inconvenience not only to the seniors with limited mobility but also to healthy elderly people. In particular, as most bathroom doors opened inward, it may be difficult to escape from or rescue someone in an emergency of falling, fainting or exhaustion.

Insights into Tan Spot and Stem Rust Resistance and Susceptibility by Studying the Pre-Green Revolution Global Collection of Wheat

  • Abdullah, Sidrat;Sehgal, Sunish Kumar;Jin, Yue;Turnipseed, Brent;Ali, Shaukat
    • The Plant Pathology Journal
    • /
    • v.33 no.2
    • /
    • pp.125-132
    • /
    • 2017
  • Tan spot (TS), caused by the fungus Pyrenophora tritici-repentis (Died) Drechs, is an important foliar disease of wheat and has become a threat to world wheat production since the 1970s. In this study a globally diverse pre-1940s collection of 247 wheat genotypes was evaluated against Ptr ToxA, P. tritici-repentis race 1, and stem rust to determine if; (i) acquisition of Ptr ToxA by the P. tritici-repentis from Stagonospora nodorum led to increased pathogen virulence or (ii) incorporation of TS susceptibility during development stem rust resistant cultivars led to an increase in TS epidemics globally. Most genotypes were susceptible to stem rust; however, a range of reactions to TS and Ptr ToxA were observed. Four combinations of diseasetoxin reactions were observed among the genotypes; TS susceptible-Ptr ToxA sensitive, TS susceptible-Ptr ToxA insensitive, TS resistant-Ptr ToxA insensitive, and TS resistant-Ptr ToxA toxin sensitive. A weak correlation (r = 0.14 for bread wheat and -0.082 for durum) was observed between stem rust susceptibility and TS resistance. Even though there were no reported epidemics in the pre-1940s, TS sensitive genotypes were widely grown in that period, suggesting that Ptr ToxA may not be an important factor responsible for enhanced prevalence of TS.

Unmanned Water Treatment System Based on Five Senses Technology to Cope with Overloading of Customized Smart Water Grid Machines (스마트워터그리드 맞춤형 기계과부하시 오감기술을 이용한 무인 수처리 시스템에 관한 연구)

  • Kim, Jae-Yeol;You, Kwan-Jong;Jung, Yoon-Soo;Ahn, Tae-Hyoung;Lee, Hak-Jae
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.16 no.2
    • /
    • pp.69-80
    • /
    • 2017
  • In or To use, manage, and preserve sustainable water resources for the current and future generations amid the threat of abnormal climate, it is necessary to establish a smart water grid system, the next-generation intelligent water management system. In this study, sensors, which make use of the five senses to watch, listen, and detect machine vibration, bearing temperature, machine operation sounds, current, voltage, and other symptoms that cannot be verified when the irrigation facilities are running, are used to establish various decision-making criteria appropriate to on-site situations. Based on such criteria, the unmanned conditions in the facilities were verified and analyzed. Existing technologies require on-site workers to check any defects caused by overloading of machines, which is the biggest constraining factor in the application of an unmanned control system for irrigation facilities. The new technology proposed in this study, on the other hand, allows for the unmanned analysis of the existence of machine vibration. This controls the decision-making process of any defect based on the analysis results, and necessary measures are taken automatically, resulting in improved reliability of the unmanned automation.

Selection of Potential Virulence Factors Contributing to Streptococcus suis Serotype 2 Penetration into the Blood-Brain Barrier in an In Vitro Co-Culture Model

  • Liu, Hongtao;Zhu, Seng;Sun, Yingying;Li, Na;Gu, Jingmin;Sun, Changjiang;Feng, Xin;Han, Wenyu;Jiang, Jianxia;Lei, Liancheng
    • Journal of Microbiology and Biotechnology
    • /
    • v.27 no.1
    • /
    • pp.161-170
    • /
    • 2017
  • Meningitis caused by Streptococcus suis serotype 2 (S. suis 2) is a great threat to the pig industry and human health. Virulence factors associated with the pathogenesis of meningitis have yet to be clearly defined, even though many potential S. suis 2 virulence factors have been identified. This greatly hinders the progress of S. suis 2 meningitis pathogenesis research. In this study, a co-culture blood-brain barrier (BBB) model was established using primary porcine brain microvascular endothelial cells and astrocytes, and the whole genome library of S. suis 2 was constructed using phage display technology. Finally, a total of 14 potential virulence factors contributing to S. suis 2 adherence to and invasion of the BBB were selected by analyzing the interactions between the phage library and the co-culture model. Twelve of these factors have not been previously reported in meningitis-related research. The data provide valuable insight into the pathogenesis of S. suis 2 meningitis and potential targets for the development of drug therapies.

A Study on Concentration of Indoor Nitrogen Dioxide in Relation to House Characteristics (주택특성에 관련된 실내 이산화질소 농도에 관한 연구)

  • 양원호;배현주;김현용;정문식;정문호
    • Journal of environmental and Sanitary engineering
    • /
    • v.14 no.4
    • /
    • pp.85-92
    • /
    • 1999
  • Indoor air quality tends to be the dominant contributor to personal exposure because most people spend over 90% of their time indoors. For some contaminants, exposure to indoor air poses a potentially greater health threat than outdoor air exposures. Indoor nitrogen dioxide ($NO_2$) levels are mainly affected gas range, flue gas spillage, kerosene heaters, wood-burning appliances and cigarette smoke. In addition, indoor $NO_2$ levels are influenced by such house characterization as surface reaction and air exchange rate. In this study, the measurements of indoor and outdoor $NO_2$ concentrations were taken using identical protocols, and information was collected on housing characteristics using identical questionnaires in 14 houses out of 15 houses for daily 30 daily 30 days in Brisbane, Australia.The usage of gas range was the most contributing factor in indoor $NO_2$ concentration in relation to house characteristics. Average indoor and outdoor ratios of NO2 concentration in electronic and gas cooking houses were $0.6{\pm}0.1$ and $0.9{\pm}0.2$, respectively. The frequency distributions of $NO_2$ concentration in each house were approximately log-normal Geometric mean of indoor $NO_2$ concentrations of electronic and gas cooking houses for daily 30 days ranged from 2.5 ppm to 11.5 ppm with a mean 6.8 and from 4.7 ppm to 28.6 ppm with a mean 15.6 ppm, respectively. The $NO_2$ concentrations between electronic and gas cooking houses were significantly different (p<0.05). Since each house has different life-style and house characteristics, sampling interval to measure the $NO_2$ levels was recommended above 7 days.

  • PDF

An Efficient Privacy Preserving Method based on Semantic Security Policy Enforcement (의미적 보안정책 집행에 의한 효율적 개인정보보호 방식)

  • Kang, Woo-Jun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.173-186
    • /
    • 2013
  • New information technologies make it easy to access and acquire information in various ways. However, It also enable powerful and various threat to system security. To challenge these threats, various extended access control methods are being studied. We suggest a new extended access control method that make it possible to conform to security policies enforcement even with discrepancy between policy based constraints rules and query based constraints rules via their semantic relationship. New our approach derives semantic implications using tree hierarchy structure and coordinates the exceed privileges using semantic gap factor calculating the degree of the discrepancy. In addition, we illustrate prototype system architecture and make performance comparison with existing access control methods.

A Study on Security Risk according to the activation of Bio-Authentication Technology (바이오 인증 기술의 활성화에 따른 보안 위험성에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.57-63
    • /
    • 2016
  • In recent years, there is growing interest in 'Fin-tech' in the domestic and international financial sector. And a variety of services in such a situation has emerged. To ensure the safety of from hacking attacks, many new technologies have been developed. These leading technology is the Bio-authentication method that you consider applying to the financial sector. Bio authentication is using biometric information. Also it is known that can cope the threat of fabrication and modifying attacks with shared and stored. However, Recently, When you look at hacking incidents of biometric data(560 million cases) in the United States Office of Personnel Management and advent of the fingerprints counterfeit technology, We can be known that should be reconsidered about the safety of bio-certification. Especially, it should be provided with a response measures for the problem of embezzlement that biometric information already been leaked. Thereby In this paper, by investigating biometric technologies and practices applied and of the vulnerability factor in many industries, it expected to be utilized in the prepared threats countermeasures in accordance with the application of the biometric authentication technology in a future.

Compliance with Respiratory Infection Preventive Behaviors and Its related Factors in Older Adults using a Senior Center

  • Park, Yeon-Hwan;Lee, Seong Hyeon;Yi, Yu Mi;Lee, Chi Young;Lee, Min Hye
    • Research in Community and Public Health Nursing
    • /
    • v.29 no.3
    • /
    • pp.322-334
    • /
    • 2018
  • Purpose: The purpose of this study is to identify factors related to compliance with respiratory infection preventive behaviors including hand washing, cough etiquette, and oral hygiene of older adults. Methods: A cross-sectional study was conducted with a convenience sample of 100 older adults (mean age: $76.11{\pm}6.35$ years, female: 86.0%). Data were collected from a community senior center through face to face interviews by using instruments including measuring knowledge, perceived threat, self-efficacy, compliance with respiratory infection preventive behaviors. Results: The mean score of knowledge was 7.52 out of 13 in total. The compliance with hand washing with soap was 6.0% for 8 or more times per day. Among the participants, 12.0% adhered to the cough etiquette. Sixty-two older adults (62.0%) didn't use interdental brushes or floss at all. The stepwise linear regression indicated that age and self-efficacy for respiratory infection preventive behaviors were significant factors and explained 24.0% of the compliance with hand washing and the cough etiquette. Education level, cancer diagnosis, and self-efficacy for respiratory infection preventive behaviors were significant predictors of oral hygiene. The factor with the greatest effect was self-efficacy in the two models. Conclusion: The findings suggest that it is necessary to improve compliance with respiratory infection preventive behaviors among older adults using senior centers. In order to enhance the compliance, it is necessary to develop nursing programs based on the self-efficacy for respiratory infection preventive behaviors in the senior centers.

Layered Authoring of Cyber Warfare Training Scenario (계층적 사이버전 훈련 시나리오 저작)

  • Song, Uihyeon;Kim, Donghwa;Ahn, Myung Kil
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.191-199
    • /
    • 2020
  • Cyber warfare training is a key factor for boosting cyber warfare competence. In general, cyber warfare training is conducted by scenarios, and the effects of training can be enhanced by including various elements in the scenarios that can improve the quality of training. In this paper, we introduce the training information, network map, traffic generation policy, threat/defense behavior identified as elements to be included in training scenarios, and propose a method of authoring training scenarios by layering and combining them. We also propose a database design for integrated management of each scenario layer. The layered training scenario authoring method has the advantage of increasing convenience of authoring by reusing existing layers and extending training scenarios based on various combinations between the layers.