Journal of National Security and Military Science (안보군사학연구)
Institute for National Security and Military Affairs
- Semi Annual
- /
- 2713-704X(pISSN)
Domain
- Society, Anthropology, Welfare, Woman > Social Institution
Serial No. 1
-
Clausewitz's On War is a very difficult classic. Because its manuscript was not completed by him, and the Korean translations are hard to understand. Seven Korean translations of the twelve, all of the Korean translations of On War, are the plagiarisms or very alike to the former translations. It remains only five translations, to that is worth reading. Even the five are composed of Korean, difficult to understand. Because they are full of japanese and chinese terms, the sentence structures too long and complex, and many of terms too 'military'. Now is the time to translate the book new, that is understandable with easy and simple terms and short sentences.
-
President Lee, Syngman was ROK supreme commander at the Korean war. But, it is doubt that he executed his authority and responsibility by the ROK constitution and law. At the phase of the Korean War conduct, his role may be divided into 'military operation execution one' and 'political-diplomacy one'. He appointed unqualified person to the important position of the national defence, didn't make war execution system, and was not make to meet the war. And, after transferring the ROK force operation commanding authority to the Commander in Chief, UN Command, his role was extremely trivial at the military operation execution phase. Any way, he intended to recover the inferior national strength and military capacity with USA aid, and concentrated his effort toward diplomacy with USA. At last, he succeeded in making a mutual defence treaty and gained a big result to harden Korea national security after war. In sum, president Lee was shrewd politician and diplomat than military leader. And, it can be evaluated that he supplemented the lost part of military affairs side with diplomat one.
-
The key lessons of the very complex modern war can be dangerously misleading to the outsiders. The efforts trying to draw lessons learned from the Iraq War (OIF : Operation Iraqi Freedom) may be biased by the view of point by Americans, because most of war episodes have been come from the Western media coverage. More serious bias can be committed thanks to the differences of warfighting doctrines and military technology between US forces and ROK forces. However, OIF-fought allied commanders and outside military experts said this campaign exemplified 21st-century warfare: swift, agile and decisive, employing overpowering technology to bring relentless violence to bear in many places at once. Even though the campaign evolved differently than anticipated, allied forces regrouped and regained the initiative remarkably quickly, thanks in large part to a new command flexibility, tied to new technology that made possible the more rapid sharing of data. These factors permitted "new air-land dynamic". The things that compel that are good sensors networked with good intelligence disseminated through a robust networking system, which then yields speed. Speed turns out to be a very important factor for conducting "Rapid Decisive Operations" relied on joint "Mass of Effects". ROK forces facing the heaviest ground threat in the world may learn more from Cold War era-typed US Army 3rd Infantry Division (3ID), which operating considerably beyond existing doctrine. 3ID flew its personnel into Kuwait to meet up with equipment already located in the region as pre-positioned stock. During OIF, the division conducted continuous offensive operations over 230km deep battlespace for 21 days. The lessons learned for ROK army to prepare tomorrow's war may be found from 3ID in its training, command and control, task organization, firepower and battlespace management, and logistics.
-
We can feel the fear through the reports of outbreaking centers of terror. Also, we noticed through "the 9.11 terror" that there exists no safety zone from terrorism. However, we should question ourselves whether we are relaxing attention or ceasing anxiety too much in the perimeter, as in the peninsula of Korea. Through "the 9.11 terror", the vulnerability of the United State's homeland security has been exposed, giving a serious damage to the national pride. President Bush started the war against terror to strengthen global joints of anti-terrorism, identify terrorists and contribute to the global peace, adopting offensive realism including preemptive attack concept which means to remove the threat preemptively. In today's reality of international politics, where the inhuman, indiscriminate, and anti-civilizational international terror became greater, extending to the stage of war, the international societies' agony and focus lies on how to banish it. The 9.11 terrorism, which is a new form of terrorism, is being distinguished from conventional terrorism into new terrorism. New terrorism is a new form of terrorism meaning that you do not know the enemy, the goal does not exist and they conscientiously use the weapons of mass destruction. This paper is a work meant to help understanding new terrorism, the new form, by a comparative analysis with the conventional terrorism. Therefore the origin, concept and general characteristics new terrorism is picked out and the representative forms of it, which are suicide bombing, cyber, biochemical and nuclear terrorism, are analyzed in detail in theoretical manner.
-
The objective of this study is to provide basic information for planning and practicing social welfare services for married nurse officers serving in the Korean military. For such a purpose, this study identifies the difficulties which married nurse officers have faced and the necessary services which are supposed to alleviate them. The data were collected by sending a questionnaire to 114 married nurse officers from July 16 to August 10, 2001. The results of this study are as follows: First, the married nurse officers were relatively dissatisfied with such domains as child care and education, health, and housing. And among the thirty-four problems, the married nurse officers expressed the most serious dissatisfaction with the difficulty in attending the events held in child's school, lack of children's dormitory run by the military, difficulty in adjusting to the school due to frequent house-moving, and limited access to dental care. Second, the married nurse officers needed services in domains such as housing, child care and education, and health. Specifically, they wanted the military-run housing, child care facility within military hospitals, maternity leave for child care and education, extension of risk allowances, and support for BOQ. Third, with regard to the seriousness of problems as well as the priority of services, the married nurse officers gave higher priority to such domains as child care and education, health, and housing. These results indicate that married nurse officers were to the largest extent concerned with these three domains and that they had the urgent need for services relevant to those domains. The importance of routine need assessments as well as solutions to the family-related problems for married nurse officers is therefore suggested in this study.
-
Multi-sensor data fusion techniques combine evidences from multiple sensors in order to get more accurate and efficient meaningful information through several process levels that may not be possible from a single sensor alone. One of the most important parts in the data fusion system is the identification fusion, and it can be categorized into physical models, parametric classification and cognitive-based models, and parametric classification technique is usually used in multi-sensor data fusion system by its characteristic. In this paper, we propose a novel heuristic identification fusion method in which we adopt desirable properties from not only parametric classification technique but also cognitive-based models in order to meet the realtime processing requirements.
-
To get the basic data for making comfortable military uniforms and to examine the distribution of clothing microclimate, seasonal fluctuations of skin temperature, subjective sensation, and clothing microclimate were measured from 10 males. The subject were questioned on thermal comfort in experiment. Clothing microclimate temperature at breast, skin temperature at four sites (breast, upper arm, thigh, leg), deep body temperature at eardrum( tympanic temperature), and subjective sensation were measured for an hour in the controlled climatic chamber. The subjects felt comfortable when skin temperature were recorded
$34.43^{\circ}C$ at breast,$33.53^{\circ}C$ at upper arm,$32.9^{\circ}C$ at thigh, and 32.50 at leg. Then mean skin temperature was$33.55\pm$ $0.63^{\circ}C$ . Clothing microclimate temperature ranged from 31.2 to$33.8^{\circ}C$ , and clothing microclimate humidity ranged from 49.80~52.41%. In the comparison of these results with the microclimate of military uniforms, it needs more insulation in clothing for military uniforms. It also says that military uniforms should be made of the textiles which can control humidity. -
EEG is an electrical signal, which occurs during information processing in the brain. These EEG signals have been used clinically, but nowadays we are mainly studying Brain-Computer Interface (BCI) such as interfacing with a computer through the EEG, controlling the machine through the EEG. The ultimate purpose of BCI study is specifying the EEG at various mental states so as to control the computer and machine. This research makes the controlling system of directions with the artifact that are generated from the subject's will, for the purpose of controlling the machine correctly and reliably. We made the system like this. First, we select the particular artifact among the EEG mixed with artifact, then, recognize and classify the signals' pattern, then, change the signals to general signals that can be used by the controlling system of directions.
-
AS Extensible Markup Language(XML) is emerging as the data format of the Internet era, there are increasing needs to efficiently transform between database and XML documents. In this paper, we propose a schema transformation method from relational database to XML database. To transform the schema, we represent input schema as Entity-Relationship diagram. Entity-Relationship model translator scans the input Entity-Relationship diagram using BFS (breadth First Search) and translates the diagram into hierarchical structure model. The XML Schema generator produces XML Scema code using the transformed hierarchical structure model. The proposed method has a merit that having reusability facility of XML Schema property in comparison with existing researches.
-
In this paper, we propose a generalized disturbance torque suppression control scheme of servo motors for missile fin actuators. Our controller consists of both a model based feed-forward controller and a stabilizing feedback controller. The feed-forward controller is designed such that the output of nominal plant tracks perfectly the reference position command with a desired dynamic characteristics. The feedback controller stabilizes the overall closed loop system. Furthermore, the feedback controller contains a free function that can be chosen arbitrary. The free function can be designed so as to achieve both the suppression of disturbances and the robustness to model uncertainties. In order to illuminate the superior performance of our control scheme to the conventional ones, we present some simulation results.
-
To build an information oriented armed forces, the Korean military telecommunication networks adopt TCP/IP standard communication infrastructures based on ATM packet switched networks. Utilizing this network infrastructure, the Korean armed forces also applies to the areas of battleship management for efficient operation command controls and resource management for efficient resource allocations. In this military communication networks, it is essential to determine the least cost network topology under equal performance and reliability constraints. Basically, this type of communication network design problem is known in the literature as an NP Hard problem. As the number of network node increases, it is very hard to obtain an optimal solution in polynomial time. Therefore, it is reasonable to use a heuristic algorithm which provides a good solution with minimal computational efforts. In this study, we developed a simulated annealing based heuristic algorithm which can be utilized for the design of military communication networks. The developed algorithm provides a good packet switched network topology which satisfies a given set of performance and reliability constraints with reasonable computation times.
-
In this paper, we analyze the security requirement for a circulation of the classified documents. During the whole document process phases, including phases of drafting, sending/receiving messages, document approval, storing and saving, reading, examining, out-sending and canceling a document, we catch hold of accompanied threat factors and export every threat factors of security. We also propose an appropriate and correspondent approach for security in a well-prepared way. Last, we present the security guidelines for security architecture of the classified documents circulation.
-
While the social activities using Internet become generalized, the side effect of the information security violation is increasing steadily and threaten the countries which is not ready to prevent from offensive penetration such as the Information-fighter or Cyber-military. In this paper, we define the concept and characteristics of the modern Information-Warfare and analyze various kinds of threatened elements and also examine the recent trend in other countries. And introducing Computer Forensics raised recently for the confrontation against the security violation in the future, we will show the developing strategies and the necessity in order to response cyber attacks. These developing strategies can be used to ensure and re-trace the technical evidence for the security violation and to achieve the disaster relief effectively. So we hope that can apply them to the actual preparation through developing cyber trial test of the defense and attack for the Information-Warfare.
-
While the demand for energy has shown a sharp increase recently, the supply seems to be limited by the fact that the conventional fossil fuel energy or nuclear energy has its own environmental problems such as, for example, global warming or nuclear waste disposal. To overcome such limited supply of energy, the utilization of natural thermal energy such as river water and seawater as well as treated sewage can be a substantial supplement. The potential use of the unused energy has become more and more feasible these days as the heat pump technology has been advanced. In the present study, the unused energy resources are estimated on regional and monthly basis for each resource by the method proposed here in order to establish the fundamental data for its utilization. The potential use of the unused energy is a1so discussed.