• Title/Summary/Keyword: 군 운용 지역

Search Result 54, Processing Time 0.032 seconds

A study on Operation Rules of Korean Air Defence Identification Zone (한국 방공식별구역 운영규칙에 관한 고찰)

  • Kwon, Jong-Pil;Lee, Yeong H.
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.2
    • /
    • pp.189-217
    • /
    • 2017
  • Declaration of Air Defense and Identification Zones started with the United States in 1950, which was followed by declaration of KADIZ by the Republic of Korea in 1951. Initial ADIZ were solely linked with air defense missions, but their roles have changed as nations around the globe manifested a tendency to expand their influence over maritime resources and rights. In particular, China declared ADIZ over the East China Sea in October 2013 and forced all passing aircraft to submit flight plan to ATC or military authority, saying failure of submission will be followed by armed engagement. China announced it would declare another zone over the South China Sea despite the ongoing conflict in the area, clearly showing ADIZ's direct connection with territorial claim and EEZ and that it serves as a zone within which a nation can execute its rights. The expanded KADIZ, which was expanded in Dec 15, 2013 in response to Chinese actions, overlaps with the Chinese ADIZ over the East China Sea and the Japanese ADIZ. The overlapping zone is an airspace over waters where not only the Republic of Korea but also of China and Japan argue to be covering their continental shelf and EEZ. Military conventions were signed to prevent contingencies among the neighboring nations while conducting identifications in KADIZ, including the overlapping zone. If such military conventions and practice of air defense identification continue to be respected among states, it is under the process of turning into a regional customary law, although ADIZ is not yet recognized by international law or customary law. Moreover, identification within ADIZ is carried out by military authorities of states, and misguided customary procedures may cause serious negative consequences for national security since it may negatively impact neighboring countries in marking the maritime border, which calls for formulation of operation rules that account for other state activities and military talks among regional stake holders. Legal frameworks need to be in place to guarantee freedom of flights over international seas which UN Maritime Law protects, and laws regarding military aircraft operation need to be supplemented to not make it a requirement to submit flight plan if the aircraft does not invade sovereign airspace. Organizational instructions that require approval of Chairman of Joint Chiefs of Staff for entrance and exit of ADIZ for military aircraft need to be amended to change the authority to Minister of National Defense or be promoted to a law to be applicable for commercial aircraft. Moreover, in regards to operation and management of ADIZ, transfer of authority should be prohibited to account for its evolution into a regional customary law in South East Asia. In particular, since ADIZ is set over EEZ, military conventions that yield authority related to national security should never be condoned. Among Korea, China, Japan and Russia, there are military conventions that discuss operation and management of ADIZ in place or under negotiation, meaning that ADIZ is becoming a regional customary law in North East Asia region.

  • PDF

A Proposal for Software Framework of Intelligent Drones Performing Autonomous Missions (지능형 드론의 자율 임무 수행을 위한 소프트웨어 프레임워크 제안)

  • Shin, Ju-chul;Kim, Seong-woo;Baek, Gyong-hoon;Seo, Min-gi
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.4
    • /
    • pp.205-210
    • /
    • 2022
  • Drones, which have rapidly grown along with the 4th industrial revolution, spread over industries and also widely used for military purposes. In recent wars in Europe, drones are being evaluated as a game changer on the battlefield, and their importance for military use is being highlighted. The Republic of Korea Army also planned drone-bot systems including various drones suitable for echelons and missions of the military as future defense forces. The keyword of these drone-bot systems is autonomy by artificial intelligence. In addition, common use of operating platforms is required for the rapid development of various types of drones. In this paper, we propose software framework that applies diverse artificial intelligence technologies such as multi-agent system, cognitive architecture and knowledge-based context reasoning for mission autonomy and common use of military drones.

The Comparison and Analysis on Students' Awareness of National Security -Focus on the students of military science established college and those of military science non-established college- (대학생들의 안보의식에 대한 비교·분석 -군사학과 설치 대학과 미설치 대학 대학생들을 중심으로-)

  • Lee, Sung Choon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.7
    • /
    • pp.4246-4257
    • /
    • 2014
  • The aim of this study was to search for a security strategy and security education program by analyzing the security awareness of universities with and without Department of Military Science. The results of university student's security awareness revealed a normal level of recognition and differences according to region and gender. The recognition of stability of current Korean national security is normally low on average, which suggests that students feel anxiety towards national security. In addition, the North Korea provocation influence on national security has been recognized highly (score of 4.33 on average). The national security awareness of university students in the case of whether establishing a Dept. of Military Science or not showed a normal level, which revealed a score of 3.44, and differed according to region, gender and recruitment, and had a relationship with the recognition of Dept. of Military Science management. Therefore, the political consideration of security authorities is in strong demand to improve the security awareness of general university students, and have an influx of great human resources by advertising the educational contents, advantages and future career of Dept. of Military Science students.

Study on the Realization of Tourism Culture Welfare by Using Confucius Heritage - Based on Confucian Buildings - (유교유산을 활용한 관광문화복지 구현에 대한 연구 - 유교건물을 중심으로 -)

  • Oh, Seung-ha;Jo, Won-seob
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.1
    • /
    • pp.90-99
    • /
    • 2016
  • The present study investigates the realization of tourism culture welfare by using Confucian heritage. From June 13 to November 7, 2014, site surveys and interviews were conducted for hyanggo (hyanggo: Confucian temple and school to teach students in Joseon Dynasty period), seowon (seowon: a memorial hall for Confucianist services to honor distinguished scholars and statesmen) and nujung (nujung: outdoor pavilion or gazebo) located in Youngwol -gun. Questionnaire pertaining to site survey and in-depth interviews for the building owners and managers was used to collect necessary data and scientific investigation was performed for analysis. As a result, the historical background was found to be culturally valuable asset for both region's tourism and culture welfare. Secondly, hyanggyo and seowon were found to exhibit traditional Confucius cultural form, while nujung exhibited a rare architectural trait. Hence it seems necessary to develop a different social tourism resource specialized for nujung. Thirdly, the rendering of Confucius heritages to tourism culture welfare resources thus far seems to be insufficient; hence, development and operation of marketing programs will be necessary. The implications of the present study require succession and modern reinterpretation of Confucian heritages for further development into digital tourism that will encompass Confucian culture and today's culture. Furthermore, studies of the tourism culture welfare policies that will promote the co-existence with the region will be needed.

Eurasian Naval Power on Display: Sino-Russian Naval Exercises under Presidents Xi and Putin (유라시아 지역의 해군 전력 과시: 시진핑 주석과 푸틴 대통령 체제 하에 펼쳐지는 중러 해상합동훈련)

  • Richard Weitz
    • Maritime Security
    • /
    • v.5 no.1
    • /
    • pp.1-53
    • /
    • 2022
  • One manifestation of the contemporary era of renewed great power competition has been the deepening relationship between China and Russia. Their strengthening military ties, notwithstanding their lack of a formal defense alliance, have been especially striking. Since China and Russia deploy two of the world's most powerful navies, their growing maritime cooperation has been one of the most significant international security developments of recent years. The Sino-Russian naval exercises, involving varying platforms and locations, have built on years of high-level personnel exchanges, large Russian weapons sales to China, the Sino-Russia Treaty of Friendship, and other forms of cooperation. Though the joint Sino-Russian naval drills began soon after Beijing and Moscow ended their Cold War confrontation, these exercises have become much more important during the last decade, essentially becoming a core pillar of their expanding defense partnership. China and Russia now conduct more naval exercises in more places and with more types of weapons systems than ever before. In the future, Chinese and Russian maritime drills will likely encompass new locations, capabilities, and partners-including possibly the Arctic, hypersonic delivery systems, and novel African, Asian, and Middle East partners-as well as continue such recent innovations as conducting joint naval patrols and combined arms maritime drills. China and Russia pursue several objectives through their bilateral naval cooperation. The Treaty of Good-Neighborliness and Friendly Cooperation Between the People's Republic of China and the Russian Federation lacks a mutual defense clause, but does provide for consultations about common threats. The naval exercises, which rehearse non-traditional along with traditional missions (e.g., counter-piracy and humanitarian relief as well as with high-end warfighting), provide a means to enhance their response to such mutual challenges through coordinated military activities. Though the exercises may not realize substantial interoperability gains regarding combat capabilities, the drills do highlight to foreign audiences the Sino-Russian capacity to project coordinated naval power globally. This messaging is important given the reliance of China and Russia on the world's oceans for trade and the two countries' maritime territorial disputes with other countries. The exercises can also improve their national military capabilities as well as help them learn more about the tactics, techniques, and procedures of each other. The rising Chinese Navy especially benefits from working with the Russian armed forces, which have more experience conducting maritime missions, particularly in combat operations involving multiple combat arms, than the People's Liberation Army (PLA). On the negative side, these exercises, by enhancing their combat capabilities, may make Chinese and Russian policymakers more willing to employ military force or run escalatory risks in confrontations with other states. All these impacts are amplified in Northeast Asia, where the Chinese and Russian navies conduct most of their joint exercises. Northeast Asia has become an area of intensifying maritime confrontations involving China and Russia against the United States and Japan, with South Korea situated uneasily between them. The growing ties between the Chinese and Russian navies have complicated South Korean-U.S. military planning, diverted resources from concentrating against North Korea, and worsened the regional security environment. Naval planners in the United States, South Korea, and Japan will increasingly need to consider scenarios involving both the Chinese and Russian navies. For example, South Korean and U.S. policymakers need to prepare for situations in which coordinated Chinese and Russian military aggression overtaxes the Pentagon, obligating the South Korean Navy to rapidly backfill for any U.S.-allied security gaps that arise on the Korean Peninsula. Potentially reinforcing Chinese and Russian naval support to North Korea in a maritime confrontation with South Korea and its allies would present another serious challenge. Building on the commitment of Japan and South Korea to strengthen security ties, future exercises involving Japan, South Korea, and the United States should expand to consider these potential contingencies.

  • PDF

For Making an Efficient Disaster Emergency Communication System for Public Safety in South Korea (국민안전 확보를 위한 긴급통신망시스템 통합구축 방안)

  • Choi, Kwan;Kim, Min-Ji
    • Korean Security Journal
    • /
    • no.44
    • /
    • pp.169-198
    • /
    • 2015
  • The purpose of present study is to provide an efficient 'Disaster Emergency Communication System' (below DECS) to deal with serious disaster situations in national levels. Currently, DECSs such as the VHF, UHF, and TRS are worked to control some disaster situations in the world. However, new system such as for sending the correct image and big data is more likely to need than current the DECSs in the comtemporary societies. Several serious disaster events such as the Sam-Poong Department Store Collapse, Daegu Subway Fire, and Sewol Submerge event, nevertheless, there was not the DECS based on the field in South Korea. In July 2014, finally, South Korean government started to provide a PS-LTE system which is the new and one system with fire fighting, police, army, railway. however, there are no many academic studies for DECSs to deal with disaster situations in South Korea. The present research highlights to explore an efficient DECS of Korean styles to fix some national security and public safety. The paper provides three key findings: first is how to make a unified Korean DECS based on PS-LTE. Second is how to make sure the frequency of 700MHz levels to communicate in the shady areas. Three is what kinds of communication facility is adequate for fixing PS-LTE DECS.

  • PDF

Analysis of Civil Defense Shelters and Measures (민방위 대피소의 실태분석 및 대책방안)

  • Kim, Tae-Hwan
    • 한국방재학회:학술대회논문집
    • /
    • 2011.02a
    • /
    • pp.31-31
    • /
    • 2011
  • 1990년 이후 공산체계인 구소련과 동구권이 몰락하고 세계적으로 탈냉전의 변화와 우리의 민주정부 수립 후 햇빛정책 등에도 불구하고 북한은 적화통일을 포기하지 않고 작년 11월에 연평도에 포격을 가하여 민간인과, 군이 2명이 사망하는 사건이 발생 하였다. 또한 북한의 공격은 과거의 포탄공격뿐만 아니라 미사일이나 화생방과 같은 생화학물질 탑재 가능한 공격이 예상된다. 이에 대비 정부에서는 고정시설의 화생방 방호는 일단유사시에 국민의 생명과 재산을 보호하는데 필수요소로서 집단보호개념에 도입하고 있으며, 현재 각 중요 대피시설 및 지자체의 기존 대피시설을 개인방호, 탐지, 제독, 운용절차를 포함한 실태파악 및 재래식 탄을 포함한 통합적인 조치를 마련하고 있다. 작년 2010년 11월 연평도에서의 북한 포격이후 우리는 서해5도나 접경지역 주민과 그리고 근접거리의 서울시민들이 안전하게 포격으로부터 피난 할 수 있는 민방위대피소에 대한 문제점이 대두되고 대책방안을 요구하고 있다. 소방방재청 기준에 따르면 직격(直擊) 핵폭탄을 제외한 화생방, 재래식 무기 공격에 견딜 수 있는 시설은 '1등급 대피시설'인데 서울에는 한 곳도 없다. 고층건물의 지하 2층 이하나 지하철, 터널 같은 2등급 대피시설도 폭격은 견딜 수 있지만 화생방 공격에는 취약하다. 지하상가 등 건축물의 지하층, 지하차도나 보도는 그보다 더 취약한 3등급이며 단독 주택의 지하층처럼 방호 효과가 떨어지는 곳이 4등급이다. 2등급으로 분류된 대피소의 경우 분류만 되어 있을 뿐 장기간 대피시 시민들이 사용 할 수 있는 거주공간이 아닌 임시 대피로서의 역할만 하고 있다. 본 연구에서는 민방위 기본법에 따라 지하에 $3.3m^2$ 당 4명 이상이 대피할 수 있는 규모의 공간을 갖추기만 하면 대피시설로 볼 수 있는 현 문제점과 1등급에서 4등급으로 나뉘어져있는 민방위 대피소와 대피소가 있지만 피난공간으로서의 역할과 구조적으로 안전한가에 대한 국내외 실태 분석을 통하여 분석한 결과 우리는 서해5도 대피시설의 반 이상이 무용지물이고 접경지 또한 피난시에 피난장으로서의 대피소가 난방이나, 구급품과 식구 시설 등이 구비가 되어 있지 않고 대피시설로 지정한곳이 간판이나 안내시설이 없다. 외국의 경우 스위스는 연방정부의 관리책임으로 전쟁이나 핵 확산에 따른 화생방 업무 전담팀을 두고 있으며, 방독면은 개인 방호물자로서 전국민 100% 보유하고, 각가정이나 건축, 시설물의 경우 화생방 표준 대피시설 설치관련 규정 마련 시행하고 있다. 대피시설은 화생방 방호가 가능한 지휘부용 대피시설과 일반 주민대피용 시설을 구분하여 설치운영하고 있으며, 전국에 650만개를 설치하고 있다. 결론은 대피시설이 북한 공경시 피난시설로의 활용방안을 모색 등급구분에 따른 현실적용 수정과 기존 대피소 보강과 재선별이 필요하고, 신축시 설계 표준설계안 그리고 기존의 대피소에 대한 보수, 보강방법 가이드라인과 장기간 거주에 대한 설비구축 등과 국민 대홍보등을 제안하였다.

  • PDF

The Productivity and Cost of Yarding Operations Using a Tractor-attached Winch in Pinus densiflora Stands (소나무 임분에서의 트랙터윈치를 이용한 집재작업 생산성 및 비용분석)

  • Jeong, Eung-Jin;Cho, Min-Jae;Park, Jeong-Mook;Cho, Koo-Hyun;Yoo, Young-Min;Cha, Du-Song
    • Journal of Korean Society of Forest Science
    • /
    • v.108 no.4
    • /
    • pp.574-581
    • /
    • 2019
  • The present study analyzed the productivity and cost of winching operations for evaluating the efficiency of a tractor-attached winch in a Pinus densiflora thinning site located in the Yangyang County of Gangwon-do. The mean yarding distance and mean timber volume were 29 m and 0.15 ㎥, respectively. In the 95 cycles of yarding operations, the uphill and downhill yarding operations constituted 51% and 49%, respectively, of the total yarding operations. The productivity of the uphill yarding operation was 2.28 ㎥/h, and the productivity of the downhill yarding operation was 1.89 ㎥/h. The findings of this study revealedthat productivity would increase by 0.5 ㎥/h when the rate of utilization of the machine is increased to 80% by reducing the operational delay time. The cost of the downhill yarding operation was 44,116 KRW/㎥, whereas that of the uphill yarding operation was 53,369 KRW/㎥. The difference in cost resulted from the difference in the number of yarding stems (stems/cycle). Furthermore, the results of the multiple linear regression equation developed for predicting the yarding operation times showed that productivity was significantly affected by working conditions such as yarding distance (m), the number of stems per cycle (stems/cycle), and the terrain slope (%) in the uphill and downhill yarding operations. Further research is required for developing an accurate prediction model equation according to a yarding direction.

Analysis of Survivability for Combatants during Offensive Operations at the Tactical Level (전술제대 공격작전간 전투원 생존성에 관한 연구)

  • Kim, Jaeoh;Cho, HyungJun;Kim, GakGyu
    • The Korean Journal of Applied Statistics
    • /
    • v.28 no.5
    • /
    • pp.921-932
    • /
    • 2015
  • This study analyzed military personnel survivability in regards to offensive operations according to the scientific military training data of a reinforced infantry battalion. Scientific battle training was conducted at the Korea Combat Training Center (KCTC) training facility and utilized scientific military training equipment that included MILES and the main exercise control system. The training audience freely engaged an OPFOR who is an expert at tactics and weapon systems. It provides a statistical analysis of data in regards to state-of-the-art military training because the scientific battle training system saves and utilizes all training zone data for analysis and after action review as well as offers training control during the training period. The methodologies used the Cox PH modeling (which does not require parametric distribution assumptions) and decision tree modeling for survival data such as CART, GUIDE, and CTREE for richer and easier interpretation. The variables that violate the PH assumption were stratified and analyzed. Since the Cox PH model result was not easy to interpret the period of service, additional interpretation was attempted through univariate local regression. CART, GUIDE, and CTREE formed different tree models which allow for various interpretations.

A Methodology of AI Learning Model Construction for Intelligent Coastal Surveillance (해안 경계 지능화를 위한 AI학습 모델 구축 방안)

  • Han, Changhee;Kim, Jong-Hwan;Cha, Jinho;Lee, Jongkwan;Jung, Yunyoung;Park, Jinseon;Kim, Youngtaek;Kim, Youngchan;Ha, Jeeseung;Lee, Kanguk;Kim, Yoonsung;Bang, Sungwan
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.77-86
    • /
    • 2022
  • The Republic of Korea is a country in which coastal surveillance is an imperative national task as it is surrounded by seas on three sides under the confrontation between South and North Korea. However, due to Defense Reform 2.0, the number of R/D (Radar) operating personnel has decreased, and the period of service has also been shortened. Moreover, there is always a possibility that a human error will occur. This paper presents specific guidelines for developing an AI learning model for the intelligent coastal surveillance system. We present a three-step strategy to realize the guidelines. The first stage is a typical stage of building an AI learning model, including data collection, storage, filtering, purification, and data transformation. In the second stage, R/D signal analysis is first performed. Subsequently, AI learning model development for classifying real and false images, coastal area analysis, and vulnerable area/time analysis are performed. In the final stage, validation, visualization, and demonstration of the AI learning model are performed. Through this research, the first achievement of making the existing weapon system intelligent by applying the application of AI technology was achieved.