• Title/Summary/Keyword: system deployment

Search Result 878, Processing Time 0.024 seconds

Analysis and implications of North Korea's new strategic drones 'Satbyol-4', 'Satbyol-9' (북한의 신형 전략 무인기 '샛별-4형', '샛별-9형' 분석과 시사점)

  • Kang-Il Seo;Jong-Hoon Kim;Man-Hee Won;Dong-Min Lee;Jae-Hyung Bae;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.167-172
    • /
    • 2024
  • In major wars of the 21st century, drones are expanding beyond surveillance and reconnaissance to include land and air as well as sea and underwater for purposes such as precision strikes, suicide attacks, and cognitive warfare. These drones will perform multi-domain operations, and to this end, they will continue to develop by improving the level of autonomy and strengthening scalability based on the High-Low Mix concept. Recently, drones have been used as a major means in major wars around the world, and there seems to be a good chance that they will evolve into game changers in the future. North Korea has also been making significant efforts to operate reconnaissance and attack drones for a long time. North Korea has recently continued to engage in provocations using drones, and its capabilities are gradually becoming more sophisticated. In addition, with the recent emergence of new strategic Drones, wartime and peacetime threats such as North Korea's use of these to secure surveillance, reconnaissance and early warning capabilities against South Korea and new types of provocations are expected to be strengthened. Through this study, we hope to provide implications by analyzing the capabilities of North Korea's strategic Drones, predicting their operation patterns, and conducting active follow-up research on the establishment of a comprehensive strategy, such as our military's drone deployment and counter-drone system solutions.

Study on Weather Modification Hybrid Rocket Experimental Design and Application (기상조절용 하이브리드 로켓의 실험 설계 및 활용연구)

  • Joo Wan Cha;Bu-Yo Kim;Miloslav Belorid;Yonghun Ro;A-Reum Ko;Sun Hee Kim;Dong-Ho Park;Ji Man Park;Hae Jung Koo;Ki-Ho Chang;Hong Hee Lee;Soojong Kim
    • Atmosphere
    • /
    • v.34 no.2
    • /
    • pp.203-216
    • /
    • 2024
  • The National Institute of Meteorological Sciences in Korea has developed the Weather Modification Hybrid Rocket (WMHR), an advanced system that offers enhanced stability and cost-effectiveness over conventional solid-fuel rockets. Designed for precise operation, the WMHR enables accurate control over the ejection altitude of pyrotechnics by modulating the quantity of oxidizer, facilitating specific cloud seeding at various atmospheric layers. Furthermore, the rate of descent for pyrotechnic devices can be adjusted by modifying parachute sizes, allowing for controlled dispersion time and concentration of seeding agents. The rocket's configuration also supports adjustments in the pyrotechnic device's capacity, permitting tailored seeding agent deployment. This innovation reflects significant technical progression and collaborations with local manufacturers, in addition to efforts to secure testing sites and address hybrid rocket production challenges. Notable outcomes of this project include the creation of a national framework for weather modification technology utilizing hybrid rockets, enhanced cloud seeding methods, and the potential for broader meteorological application of hybrid rockets beyond precipitation augmentation. An illustrative case study confirmed the WMHR's operational effectiveness, although the impact on cloud seeding was limited by unfavorable weather conditions. This experience has provided valuable insights and affirmed the system's potential for varied uses, such as weather modification and deploying high-altitude meteorological sensors. Nevertheless, the expansion of civilian weather rocket experiments in Korea faces challenges due to inadequate infrastructure and regulatory limitations, underscoring the urgent need for advancements in these areas.

A Study Concerning the Background of Formation in Deleuze's System (들뢰즈 체계의 형성 배경에 대한 연구 - 칸트 선험철학 체계 그 심연으로부터의 역류 -)

  • Kim, Dae-hyeon
    • Journal of the Daesoon Academy of Sciences
    • /
    • v.37
    • /
    • pp.329-355
    • /
    • 2021
  • The objective of this paper is to reveal that the formation of Deleuze's system is a result of a back flow of the 'ideal of pure reason' in Kant's system. I will try to seize upon the keyword in his main book, Difference and Repetition, and examine the aspect of mutual transformation between Deleuze's transcendental empiricism and Kant's transcendentalism. When analyzing Deleuze's system, most researchers tend to focus on anti-Hegelianism, but it is proper that Kant be adopted as the start when tracing the way of deployment directly. Fundamentally, Deleuze is different from Hegel in his approach to observing entire ground of thought. Even if Deleuze surely has the capability of becoming in the dialectical context, his systemic environment wherein dialectics is applied is different even at the onset. While Hegel follows the way of origin and copy or a system that begins from a preceding point of origin, Deleuze follows a way of copy and recopy or a system that begins without a point of origin. This characteristic of Deleuze's system originates directly from idealistic play. In fact, we can anticipate and identify in his book that he refers to Kant who accepted the tradition of empiricism. Therefore, the main contents of this paper is to present an overview of Kant's influence on Deleuze's system. While tracing ideas back to Kant's system, the cohabitation of empiricism and rationalism, which Kant felicitously revoiced, there emerges a definitude of world recognition. This occurs through cohabitation, and this is both deconstructed and integrated by Deleuze, and therein definitude is turned into a vision of prosperity. To the vision of prosperity that spans definitude to recognition, a philosopher has the right to select a philosophical system because selection methodology in philosophy is not a problem of legitimacy so much as the needs of the times. Deleuze's choice resulted in the opening of pandora's box in an abyss and secret contents have in turn risen sharply.

Ship Detection from SAR Images Using YOLO: Model Constructions and Accuracy Characteristics According to Polarization (YOLO를 이용한 SAR 영상의 선박 객체 탐지: 편파별 모델 구성과 정확도 특성 분석)

  • Yungyo Im;Youjeong Youn;Jonggu Kang;Seoyeon Kim;Yemin Jeong;Soyeon Choi;Youngmin Seo;Yangwon Lee
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.5_3
    • /
    • pp.997-1008
    • /
    • 2023
  • Ship detection at sea can be performed in various ways. In particular, satellites can provide wide-area surveillance, and Synthetic Aperture Radar (SAR) imagery can be utilized day and night and in all weather conditions. To propose an efficient ship detection method from SAR images, this study aimed to apply the You Only Look Once Version 5 (YOLOv5) model to Sentinel-1 images and to analyze the difference between individual vs. integrated models and the accuracy characteristics by polarization. YOLOv5s, which has fewer and lighter parameters, and YOLOv5x, which has more parameters but higher accuracy, were used for the performance tests (1) by dividing each polarization into HH, HV, VH, and VV, and (2) by using images from all polarizations. All four experiments showed very similar and high accuracy of 0.977 ≤ AP@0.5 ≤ 0.998. This result suggests that the polarization integration model using lightweight YOLO models can be the most effective in terms of real-time system deployment. 19,582 images were used in this experiment. However, if other SAR images,such as Capella and ICEYE, are included in addition to Sentinel-1 images, a more flexible and accurate model for ship detection can be built.

Design and Implementation of a Web Application Firewall with Multi-layered Web Filter (다중 계층 웹 필터를 사용하는 웹 애플리케이션 방화벽의 설계 및 구현)

  • Jang, Sung-Min;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.157-167
    • /
    • 2009
  • Recently, the leakage of confidential information and personal information is taking place on the Internet more frequently than ever before. Most of such online security incidents are caused by attacks on vulnerabilities in web applications developed carelessly. It is impossible to detect an attack on a web application with existing firewalls and intrusion detection systems. Besides, the signature-based detection has a limited capability in detecting new threats. Therefore, many researches concerning the method to detect attacks on web applications are employing anomaly-based detection methods that use the web traffic analysis. Much research about anomaly-based detection through the normal web traffic analysis focus on three problems - the method to accurately analyze given web traffic, system performance needed for inspecting application payload of the packet required to detect attack on application layer and the maintenance and costs of lots of network security devices newly installed. The UTM(Unified Threat Management) system, a suggested solution for the problem, had a goal of resolving all of security problems at a time, but is not being widely used due to its low efficiency and high costs. Besides, the web filter that performs one of the functions of the UTM system, can not adequately detect a variety of recent sophisticated attacks on web applications. In order to resolve such problems, studies are being carried out on the web application firewall to introduce a new network security system. As such studies focus on speeding up packet processing by depending on high-priced hardware, the costs to deploy a web application firewall are rising. In addition, the current anomaly-based detection technologies that do not take into account the characteristics of the web application is causing lots of false positives and false negatives. In order to reduce false positives and false negatives, this study suggested a realtime anomaly detection method based on the analysis of the length of parameter value contained in the web client's request. In addition, it designed and suggested a WAF(Web Application Firewall) that can be applied to a low-priced system or legacy system to process application data without the help of an exclusive hardware. Furthermore, it suggested a method to resolve sluggish performance attributed to copying packets into application area for application data processing, Consequently, this study provide to deploy an effective web application firewall at a low cost at the moment when the deployment of an additional security system was considered burdened due to lots of network security systems currently used.

The Study on the Measure to Improve the Event Place Guarding Operation System (행사장경호 운용시스템 개선방안에 관한 연구)

  • Lee, Sang-Chul;Kim, Tae-Min
    • Korean Security Journal
    • /
    • no.11
    • /
    • pp.203-226
    • /
    • 2006
  • A highly sophisticated expertise and systematic and integrated management of security operation are essential for a crowded stadium. a special object of security guarding. Nonetheless, the recent incident in a singing concert hall reveals the overall problem like the lacking safety management system. lacking deployment of professional security personnel, absence of safety manuals and safety measures, as well as the lack of professionalism of private sector security companies. In this study, we presented three categories that needed improvement, like the legal and institutional improvement, improvement of policy and improvement of operation which are required to set up the model to operate the optimal private sector security duties. For the revision of law and institution for a better and more desirable method, we discussed the revision of related laws and regulations pursuant to the security operation at places where events are held, including the revision of law on security guarding work, regulation on common housing management, uniformity of security guarding, and law on performance. For the improvement of policies, we discussed the introduction of security consultants, strengthening the security instructor system, expansion of relevant organizations, establishment of mutual cooperation, privatization of profitable events, improvement of awareness about the security activities provided by private sector, policy for the professionalism of private security operation, expansion of security exhibition and seminar. For the improvement of operation. we discussed professional security techniques. such as the technique of security consulting, the application of CPTED technique, the technique for the integration of system, the method of operation, the establishment of a system to support public security operations and volunteers, establishment of a manual for security guarding performance, modernization and high tech-oriented equipment, organization of security guarding entity in which the industry, academic society and government participates together.

  • PDF

Relations between emotional labor and job stress among some dental hygienists (일부 치과위생사의 감정노동과 직무스트레스와의 관계)

  • Yoon, Song-Uk;Kim, Jung Sook
    • Journal of Korean society of Dental Hygiene
    • /
    • v.11 no.2
    • /
    • pp.179-188
    • /
    • 2011
  • Objectives : The study set out to analyze correlations between emotional labor and job stress among dental hygienist, who have direct and lasting relationships with patients in dental clinic, and provide basic data to resolve stressors and manage stress. Methods : A survey was taken among dental hygienists working at dental clinics, and 200 questionnaires were used in analysis. The gathered data were put to Cronbach's alpha with the SPSS WIN12.0 program to test the reliability of the inventories to measure their emotional labor and job stress. In addition, correlation analysis was conducted to examine relations between the items of emotional labor and those of job stress along with regression analysis to examine relations between emotional labor and job stress. Finally, t-test and One-way ANOVA were conducted to test mean differences in the job stress items according to the degrees of emotional labor with the statistical significance level set at 0.05. Results : 1. The measurement tool used in the study recorded 0.7 for all the areas of Cronbach's alpha for internal reliability and thus achieved high reliability. 2. The overall mean of emotional labor was 2.74, which indicates that the dental hygienists had 'average' or higher stress for emotional labor. 3. Emotional labor had statistically significant relations with educational background, place of work, motivation to choose to be a dental hygienist, and religion of their general characteristics. 4. There was statistical significance in relations between general characteristics and job stress according to educational background, position at work, and experience with change of occupation. 5. The correlations between emotional labor and the stress areas were analyzed. As a result, emotional labor was in positive(+) correlations with job demand, lack of job autonomy, relational conflict, job instability, organizational system, and corporate culture. In addition, regression analysis was conducted to test causal relations between emotional labor and job stress. The results indicate that there were positive(+) influences between emotional labor and job stress. Conclusions : The results show that emotional labor can serve as a mediating variable for job stress in dental clinic. Thus both dental clinics and dental hygienists need to have ways to deal with job stress derived from emotional labor in which they are forced to process their emotions according to the dental clinics' demands, properly. The study will hopefully trigger ongoing follow-up researches on the deployment of dental hygienists according to their job characteristics and the situational variables to alleviate the negative results of emotional labor.

Diagnosis on Degree of Saturation Model of COSMOS Affected by Geometric and Detection Conditions and Detector Placements (교통조건, 기하구조 조건 및 검지기 설치위치에 따른 실시간신호제어시스템 포화도 산출방식 진단)

  • KIM, Jun-Young;KIM, Jin Tae
    • Journal of Korean Society of Transportation
    • /
    • v.34 no.1
    • /
    • pp.81-94
    • /
    • 2016
  • The Korean real-time traffic responsive control systems, Cycle Offset Split Model of Seoul (COSMOS), employs a single theoretical model to estimate the degree-of-saturation (DS) on approaches. However, the deployment of the system has been accomplished without practical consideration of its field performance. This paper delivers a diagnosis study performed to find the relationships yet known on the DS values against the operational conditions unproved in theory but ordinarily observed in field practice. Based on the analysis of the historical log data (476,505 cycles) obtained from the COSMOS server, it was found; (1) full coverage of lane detections should perform better than the sample coverage of detection in ordinary conditions, (2) the sample coverage of detection perform better than the other case with an exclusive bus lane, (3) detection in which a shared lane is involved provide poor estimation of DS, (4) poor DS estimation when a detection lane is adjacent to a shared lane, and (5) the DS values obtained during a day can hardly be stable all time. The findings suggest traffic engineers a progressive direction to move forward for the next real-time traffic control systems.

Dynamic Frequency Reuse Scheme Based on Traffic Load Ratio for Heterogeneous Cellular Networks (이종 셀룰러 네트워크 환경에서 트래픽 비율에 따른 동적 주파수 재사용 기법)

  • Chung, Sungmoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.12
    • /
    • pp.2539-2548
    • /
    • 2015
  • Overcoming inter-cell interference and spectrum scarcity are major issues in heterogeneous cellular networks. Static Frequency reuse schemes have been proposed as an effective way to manage the spectrum and reduce ICI(Inter cell Interference) in cellular networks. In a kind of static frequency reuse scheme, the allocations of transmission power and subcarriers in each cell are fixed prior to system deployment. This limits the potential performance of the static frequency reuse scheme. Also, most of dynamic frequency reuse schemes did not consider small cell and the network environment when the traffic load of each cell is heavy and non-uniform. In this paper, we propose an inter-cell resource allocation algorithm that dynamically optimizes subcarrier allocations for the multi-cell heterogeneous networks. The proposed dynamic frequency reuse scheme first finds the subcarrier usage in each cell-edge by using the exhaustive search and allocates subcarrier for all the cells except small cells. After that it allocates subcarrier for the small cell and then iteratively repeats the process. Proposed dynamic frequency reuse scheme performs better than previous frequency reuse schemes in terms of the throughput by improving the spectral efficiency due to it is able to adapt the network environment immediately when the traffic load of each cell is heavy and non-uniform.

A study on the change of the depth and catch of hairtail trolling lines (갈치 끌낚시 어구의 수심변화 및 어획량 시험)

  • KIM, Mun-Kwan;PARK, Su-Hyeon;KANG, Hyeong-Cheol;PARK, Yong-Seok;AN, Young-Il;LEE, Chun-Woo;PARK, Su-Bong
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.54 no.2
    • /
    • pp.107-115
    • /
    • 2018
  • In this study, we tested Japanese trolling lines in the Jeju fishery. This fishery simulates the natural marine environment with many seabed rocks, and has been redesigned and manufactured it to be suitable for the Jeju fishery. In order to ensure that the trolling lines were deployed at the inhabitation depth of hairtails, the conditions required for the fishing gear to reach the target depth were determined for use during the experiment. The experimental test fishing was conducted at the depth of 120 m water in front of Jeju Seongsanpo and in the offshore area of Jeju Hanlim. The fishing gear used in the test fishing is currently used in a variety of field operations in Japan. However, several problems were identified, such as twisting of the line during its deployment and excessive sinking of the main line. The fishing gear was, therefore, redesigned and manufactured to be more suitable for the Jeju fishery environment. For the fishing gear to accurately reach the target depth, depth loggers were installed at the starting point of the main line and at the 250 m and 340 m points of the line. Depth and time were recorded every 10 seconds. According to the daytime positioning of hairtails in the lower water column, the target depth of the fishing gear was set at 100-110 m, which was 10-20 m above the sea floor. At a speed of 1.9 knots and with a 9 kg sinker attached, the main fishing line was deployed and catch yields at depths of 100 m, 150 m and 180 m were recorded and analyzed. When the 180 m main line was fully deployed, the time for the hairtail trolling lines to arrive at the appropriate configuration had to be 5 minutes. At this time, the depth of the fishing gear was 16-23 m above the sea floor, in accordance with the depths at which the hairtails were during the day. In addition, in order to accurately place the fishing gear at the inhabitation water depth of hairtails, the experimental test fishing utilized the results of the depth testing that identified the conditions required for the fishing gear to reach the target depth, and the result was a catch of up to 97 kg a day.