• Title/Summary/Keyword: 네트

Search Result 16,620, Processing Time 0.038 seconds

The Future of Countermobility Capability with a Literature Analysis from FASCAM to Terrain Shaping Obstacle(TSO) (미래 대기동 작전 능력의 발전방안 연구 -살포식지뢰(FASCAM)로부터 지형 조성 장애물(TSO) 전력을 중심으로-)

  • Park, Byoung-Ho;Sim, Jaeseong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.291-298
    • /
    • 2021
  • In this study, the future of countermobility capability is presented by analyzing the status of the countermobility obstacles focusing on the history of landmines and munitions. The conventional landmine was forbidden globally by the CCW and Ottawa Treaty because it caused civilian damage after the war. Because the inhumanity of those mines had been acknowledged, shatterable mines with a self-destruct (SD) function and M93 "HORNET" anti-tank munition with enhanced sensors have been fielded. In 2016, the Obama administration announced a policy that banned all antipersonnel landmines, leaving a considerable gap in the countermobility capability. To deal with these problems, the developments of "SAVO" and the SLEP program of Volcano mines were conducted. In the sense of a long-term approach, the countermobility obstacles, including mines, were chosen as fundamental forces for Multi-Domain Operations and were improved to Terrain Shaping Obstacles (TSO). TSO has improved sensors and mobility kill capabilities and features an enhanced remote control over each munition on the battlefield through a network established with satellite communication. The combined arms countermobility might be fully capable until 2050 if the TSO program can be completed successfully.

The Solidarity Networking between Labor and Civil Society Movements: the Case Study of Hope Bus (시민사회의 연대운동 네트워킹 사례연구: 희망버스를 중심으로)

  • Lee, Byoung-Hoon;Kim, Jindu
    • Korean Journal of Labor Studies
    • /
    • v.23 no.2
    • /
    • pp.109-139
    • /
    • 2017
  • In light that solidarity movements become significant under the situation of 'labor and labor movement' crisis, our study pays attention to the fact that the Hope Bus campaigns made remarkable achievements, and aims to figure out how those campaigns were successful, by focusing on their solidarity networking. The successful operating conditions of solidarity networking in the Hope Bus campaigns are examined in three aspects - the conditions of triggering, forming, and activating. The solidarity networking of Hope Bus campaigns were mainly triggered by the injustice of layoffs by Hanjin Heavy Industry, aerial protest by Jin-sook Kim, and the tragic symbol of the protest site (Crane no. 85). The solidarity movement of Hope Bus could be formed by the mutual trust and cohesive team-building of key network brokers, their utilization and expansion of social movement networks, and massive ripple effect of SNS-mediated communication. The solidarity networking of Hope Bus was effectively activated by open and de-hierarchical operations of the central planning group, active solidarity activities of participant groups, and the provision of 'heuristic experience' for developing the sensibility to labor solidarity. The virtuous combination of those three operating conditions leads to the building of unified forces among social movements, massive civil participation, and meaningful movement outcomes, through the solidarity networking of Hope Bus campaigns.

The Policy for the Job Creation in the International Development Cooperation: Case Study of Foreign Donor Countries (국제개발협력분야 일자리 창출을 위한 정책적 제언: 해외 공여국 사례를 중심으로)

  • Han, Jong Taek;Kim, Jun Yeup
    • International Area Studies Review
    • /
    • v.21 no.4
    • /
    • pp.295-316
    • /
    • 2017
  • The job creation is one of the important issue from the public and private sector. For the job opportunity, the private sector would contribute to create plentiful opportunities for job-seekers. Especially, foreign donor countries has fostered the development consulting firm in the private sector with the legal and institutional support. As the result, it has played the important role to create the job opportunity for whoever want to find the way in the international development cooperation. However, South Korea does not yet make the environment as much as foreign donor countries. Hence, this study aims to analyze the case on fostering the development consulting firm in the international development cooperation to draw the political implication for South Korea. With this, the result of the study is significant to rebuild the index on the impact evaluation of the employment that is fit to the international development cooperation. Thus, foreign donor countries suggests that fostering the development consulting firms in the international development cooperation should be based on the political and institutional support, tied network, and sustainable supply of human resources. Indeed, the improvement of the index on the impact evaluation of the employment would contribute to correctly measure the impact from the development consulting firm in the private sector.

The way to achieve Universal Health Coverage: Focusing on the Historical and Cultural Context of Health Care Sector in Vietnam (보편적 건강보장을 향한 노정 : 베트남 보건의료 부문의 역사·문화적 맥락을 중심으로)

  • BEAK, Yong Hun
    • The Southeast Asian review
    • /
    • v.28 no.1
    • /
    • pp.173-218
    • /
    • 2018
  • This study focuses on the healthcare sector in Vietnam which is promoting universal health insurance for the achievement of Universal Health Coverage (UHC) under Sustainable Development Goals (SDGs). The purpose of this study is to examine the characteristics of the reform process of the health care system and the law on health insurance through the historical and cultural contexts and its implications from the perspective of development. Based on the three dimensions of UHC - extension of protection for population, provision of various medical services, and financial protection, the current status of the Vietnam healthcare sector is summarized respectively as follows. First, according to the revised Health Insurance law which came into effect in 2015, the mandatory health insurance premiums are calculated based on household units. Second, there is a medical network that can provide preventive and healthcare services centered on primary health care facilities, for example commune health stations (trạm y $t{\hat{e}}$ $X{\tilde{a}}$). Third, out-of-pocket expenditure is still a large proportion although public spending has increased and private spending has decreased since the enforcement of the health insurance law and various schemes. Vietnam is currently striving towards a universal health care system. The development of institutions and systems should be designed in a way that is appropriate for the members of the society rather than efficiency. This article findings shed light on the role of social values, family culture, and informal institutions.

Implications of the Sijung of Iching in modern network society (『주역(周易)』의 시중(時中) 사상이 현대 네트워크 사회에 갖는 함의)

  • Lee, Keun Yong
    • (The)Study of the Eastern Classic
    • /
    • no.37
    • /
    • pp.547-576
    • /
    • 2009
  • Iching has been taught people wisdoms of Sijung since it appeared in oriental society thousands years ago. Sijung means each of us meets the change of the present situation reasonably and practices the timely truth. The current society we've been living is infra-structured by various kinds of visible or invisible networks. This society is called 'network society' which is characteristic of inter-connectivity, interactivity, and complexity, etc. This thesis is to study whether and how the wisdoms of Iching can be helpful for behaviors in network society. For this, the meaning of several hexagrams and the new paradigm of network society were reviewed. Then, which hexagrams give what wisdoms to individuals, organizations, and difficult situations in network society was discussed. In network society, individuals are surfing internet, meeting, chatting, and making groups to implement meaningful works. To these, some hexagrams give wisdoms such as the ethics of rightness, the virtue of the mean. Organizations in network society should rebuild and reform inner suborganizations, cooperate with other organizations including citizen alliances, competing firms, and government organs. To these, some hexagrams give wisdoms such as faithfulness, considerateness, and completeness. Other hexagrams give also wisdoms such as neighborhood, non-selfishness, and self-discipline, to difficult situations lack in communication in network society.

Design and Implementation of Anomaly Traffic Control framework based on Linux Netfilter System and CBQ Routing Mechanisms (리눅스 Netfilter시스템과 CBQ 라우팅 기능을 이용한 비정상 트래픽 제어 프레임워크 설계 및 구현)

  • 조은경;고광선;이태근;강용혁;엄영익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.129-140
    • /
    • 2003
  • Recently viruses and various hacking tools that threat hosts on a network becomes more intelligent and cleverer, and so the various security mechanisms against them have ken developed during last decades. To detect these network attacks, many NIPSs(Network-based Intrusion Prevention Systems) that are more functional than traditional NIDSs are developed by several companies and organizations. But, many previous NIPSS are hewn to have some weakness in protecting important hosts from network attacks because of its incorrectness and post-management aspects. The aspect of incorrectness means that many NIPSs incorrectly discriminate between normal and attack network traffic in real time. The aspect of post-management means that they generally respond to attacks after the intrusions are already performed to a large extent. Therefore, to detect network attacks in realtime and to increase the capability of analyzing packets, faster and more active responding capabilities are required for NIPS frameworks. In this paper, we propose a framework for real-time intrusion prevention. This framework consists of packet filtering component that works on netfilter in Linux kernel and traffic control component that have a capability of step-by-step control over abnormal network traffic with the CBQ mechanism.

A Study of Pervasive Roaming Services with Security Management Framework (퍼베이시브 로밍 서비스를 위한 보안 관리 프레임워크)

  • Kim, Gwan-Yeon;Hwang, Zi-On;Kim, Yong;Uhm, Yoon-Sik;Park, Se-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.115-129
    • /
    • 2007
  • The ubiquitous and autonomic computing environments is open and dynamic providing the universal wireless access through seamless integration of software and system architectures. The ubiquitous computing have to offer the user-centric pervasive services according to the wireless access. Therefore the roaming services with the predefined security associations among all of the mobile devices in various networks is especially complex and difficult. Furthermore, there has been little study of security coordination for realistic autonomic system capable of authenticating users with different kinds of user interfaces, efficient context modeling with user profiles on Smart Cards, and providing pervasive access service by setting roaming agreements with a variety of wireless network operators. This paper proposes a Roaming Coordinator-based security management framework that supports the capability of interoperator roaming with the pervasive security services among the push service based network domains. Compared to traditional mobile systems in which a Universal Subscriber Identity Module(USIM) is dedicated to one service domain only, our proposed system with Roaming Coordinator is more open, secure, and easy to update for security services throughout the different network domains such as public wireless local area networks(PWLANs), 3G cellular networks and wireless metropolitan area networks(WMANs).

A Study on Analysis and Development of Education Program in Information Security Major (대학의 정보보호 관련학과 교육과정분석과 모델개발에 관한 연구)

  • 양정모;이옥연;이형우;하재철;유승재;이민섭
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.3
    • /
    • pp.17-26
    • /
    • 2003
  • Recently, as the internet is widespread rapidly among the public, people can use a variety of useful information services through the internet. Accordingly, the protection of information supplied by computer networks 5 has become a matter of primary concern on the whole world. To accede to the realistic demands, it has been worked out some countermeasures to cultivate the experts in information security by the government and many educational facilities. Already the government authority has carried out the each kinds of concerning projects under the framed a policy, Five-Year Development Plan for Information Security Technology. Also, many domestic universities perceives such an international trend, and so they frame their plans to train for the experts in this field, including to found a department with respect to the information security. They are ready to execute their tangible works, such as establishment of educational goal, development of teaching materials, planning curriculum, construction of laboratories and ensuring instructors. Moreover, such universities lead to their students who want to be information security experts to get the fundamental knowledge to lay the foundation for acquiring the information security technology in their bachelor course. In this note, we survey and analyze the curricula of newly-established or member-extended departments with respect to information security fields of some leading universities in the inside and outside of the country, and in conclusion, we propose the effective model of curriculum and educational goal to train the students for the information security experts.

Implementation of A Security Token System using Fingerprint Verification (지문 인증을 이용한 보안 토큰 시스템 구현)

  • 문대성;길연희;안도성;반성범;정용화;정교일
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.63-70
    • /
    • 2003
  • In the modern electronic world, the authentication of a person is an important task in many areas of online-transactions. Using biometrics to authenticate a person's identity has several advantages over the present practices of Personal Identification Numbers(PINs) and passwords. To gain maximum security in the verification system using biometrics, the computation of the verification as well as the store of the biometric pattern has to be taken place in the security token(smart card, USB token). However, there is an open issue of integrating biometrics into the security token because of its limited resources(memory space, processing power). In this paper, we describe our implementation of the USB security token system having 206MHz StrongARM CPU, 16MBytes flash memory, and 1MBytes RAM. Also, we evaluate the performance of a light-weighted In-gerprint verification algorithm that can be executed in the restricted environments. Based on experimental results, we confirmed that the RAM requirement of the proposed algorithm was about 6.8 KBytes and the Equal Error Rate(EER) was 1.7%.

Detection of Zebra-crossing Areas Based on Deep Learning with Combination of SegNet and ResNet (SegNet과 ResNet을 조합한 딥러닝에 기반한 횡단보도 영역 검출)

  • Liang, Han;Seo, Suyoung
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.39 no.3
    • /
    • pp.141-148
    • /
    • 2021
  • This paper presents a method to detect zebra-crossing using deep learning which combines SegNet and ResNet. For the blind, a safe crossing system is important to know exactly where the zebra-crossings are. Zebra-crossing detection by deep learning can be a good solution to this problem and robotic vision-based assistive technologies sprung up over the past few years, which focused on specific scene objects using monocular detectors. These traditional methods have achieved significant results with relatively long processing times, and enhanced the zebra-crossing perception to a large extent. However, running all detectors jointly incurs a long latency and becomes computationally prohibitive on wearable embedded systems. In this paper, we propose a model for fast and stable segmentation of zebra-crossing from captured images. The model is improved based on a combination of SegNet and ResNet and consists of three steps. First, the input image is subsampled to extract image features and the convolutional neural network of ResNet is modified to make it the new encoder. Second, through the SegNet original up-sampling network, the abstract features are restored to the original image size. Finally, the method classifies all pixels and calculates the accuracy of each pixel. The experimental results prove the efficiency of the modified semantic segmentation algorithm with a relatively high computing speed.