• Title/Summary/Keyword: 무력화

Search Result 174, Processing Time 0.023 seconds

A Study on the Analysis of R&D Trends and the Development Plan of Electronic Attack System (전자공격체계 연구개발 동향 분석과 발전방안에 대한 연구)

  • Sim, Jaeseong;Park, Byoung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.469-476
    • /
    • 2021
  • An electronic attack (EA) system is an essential weapon system for performing electronic warfare missions that contain signal tracking and jamming against multiple threats using electromagnetic waves, such as air defense radars, wireless command and communication networks, and guided missiles. The combat effectiveness can be maximized, and the survivability of militarily protecting combat power can be enhanced through EA mission operations, such as disabling the functions of multiple threats. The EA system can be used as a radio frequency jamming system to respond to drone attacks on the core infrastructure, such as airports, power plants, and communication broadcasting systems, in the civilian field. This study examined the criteria for classification according to the electronic attack missions of foreign EA systems based on an aviation platform. The foreign R&D trends by those criteria were investigated. Moreover, by analyzing the R&D trends of domestic EA systems and future battlefields in the domestic security environments, this paper proposes technological development plans of EA systems suitable for the future battlefield environments compared to the foreign R&D trends.

A study on Deep Operations Effect Analysis for Realization of Simultaneous Offense-Defence Integrated Operations (공방동시통합작전 구현을 위한 종심작전 효과분석 연구)

  • Cho, Jung Keun;Yoo, Byung Joo;Han, Do Heon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.116-126
    • /
    • 2021
  • Ground Component Command (GCC) has been developing operational planning and execution systems to implement "Decisive Integrated Operations", which is the concept of ground operations execution, and achieved remarkable results. In particular, "Simultaneous Offense-Defense Integrated Operations" is developed mainly to neutralize enemies in deep areas and develop favorable conditions for the allies early by simultaneously attacking and defending from the beginning of the war. On the other hand, it is limited to providing scientific and reasonable support for the commander's decision-making process because analyzing the effects of the deep operation with existing M&S systems is impossible. This study developed a model for analyzing the effects of deep operations that can be used in the KJCCS. Previous research was conducted on the effects of surveillance, physical strike, and non-physical strike, which are components of deep operations to find the characteristics and limitations and suggest a research direction. A methodology for analyzing the effects of deep operations reflecting the interactions of components using data was then developed by the GCC, and input data for each field was calculated through combat experiments and a literature review. Finally, the Deep operations Effect CAlculating Model(DECAM) was developed and distributed to the GCC and Corps battle staff during the ROK-US Combined Exercise. Through this study, the effectiveness of the methodology and the developed model were confirmed and contribute to the development of the GCC and Corps' abilities to perform deep operations.

A Study on the Cerber-Type Ransomware Detection Model Using Opcode and API Frequency and Correlation Coefficient (Opcode와 API의 빈도수와 상관계수를 활용한 Cerber형 랜섬웨어 탐지모델에 관한 연구)

  • Lee, Gye-Hyeok;Hwang, Min-Chae;Hyun, Dong-Yeop;Ku, Young-In;Yoo, Dong-Young
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.10
    • /
    • pp.363-372
    • /
    • 2022
  • Since the recent COVID-19 Pandemic, the ransomware fandom has intensified along with the expansion of remote work. Currently, anti-virus vaccine companies are trying to respond to ransomware, but traditional file signature-based static analysis can be neutralized in the face of diversification, obfuscation, variants, or the emergence of new ransomware. Various studies are being conducted for such ransomware detection, and detection studies using signature-based static analysis and behavior-based dynamic analysis can be seen as the main research type at present. In this paper, the frequency of ".text Section" Opcode and the Native API used in practice was extracted, and the association between feature information selected using K-means Clustering algorithm, Cosine Similarity, and Pearson correlation coefficient was analyzed. In addition, Through experiments to classify and detect worms among other malware types and Cerber-type ransomware, it was verified that the selected feature information was specialized in detecting specific ransomware (Cerber). As a result of combining the finally selected feature information through the above verification and applying it to machine learning and performing hyper parameter optimization, the detection rate was up to 93.3%.

Development of Software-Defined Perimeter-based Access Control System for Security of Cloud and IoT System (Cloud 및 IoT 시스템의 보안을 위한 소프트웨어 정의 경계기반의 접근제어시스템 개발)

  • Park, Seung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.15-26
    • /
    • 2021
  • Recently, as the introduction of cloud, mobile, and IoT has become active, there is a growing need for technology development that can supplement the limitations of traditional security solutions based on fixed perimeters such as firewalls and Network Access Control (NAC). In response to this, SDP (Software Defined Perimeter) has recently emerged as a new base technology. Unlike existing security technologies, SDP can sets security boundaries (install Gateway S/W) regardless of the location of the protected resources (servers, IoT gateways, etc.) and neutralize most of the network-based hacking attacks that are becoming increasingly sofiscated. In particular, SDP is regarded as a security technology suitable for the cloud and IoT fields. In this study, a new access control system was proposed by combining SDP and hash tree-based large-scale data high-speed signature technology. Through the process authentication function using large-scale data high-speed signature technology, it prevents the threat of unknown malware intruding into the endpoint in advance, and implements a kernel-level security technology that makes it impossible for user-level attacks during the backup and recovery of major data. As a result, endpoint security, which is a weak part of SDP, has been strengthened. The proposed system was developed as a prototype, and the performance test was completed through a test of an authorized testing agency (TTA V&V Test). The SDP-based access control solution is a technology with high potential that can be used in smart car security.

A Study on the Design and Implementation of a Position Tracking System using Acceleration-Gyro Sensor Fusion

  • Jin-Gu, Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.1
    • /
    • pp.49-54
    • /
    • 2023
  • The Global Positioning System (GPS) was developed for military purposes and developed as it is today by opening civilian signals (GPS L1 frequency C/A signals). The current satellite orbits the earth about twice a day to measure the position, and receives more than 3 satellite signals (initially, 4 to calculate even the time error). The three-dimensional position of the ground receiver is determined using the data from the radio wave departure time to the radio wave Time of Arrival(TOA) of the received satellite signal through trilateration. In the case of navigation using GPS in recent years, a location error of 5 to 10 m usually occurs, and quite a lot of areas, such as apartments, indoors, tunnels, factory areas, and mountainous areas, exist as blind spots or neutralized areas outside the error range of GPS. Therefore, in order to acquire one's own location information in an area where GPS satellite signal reception is impossible, another method should be proposed. In this study, IMU(Inertial Measurement Unit) combined with an acceleration and gyro sensor and a geomagnetic sensor were used to design a system to enable location recognition even in terrain where GPS signal reception is impossible. A method to track the current position by calculating the instantaneous velocity value using a 9-DOF IMU and a geomagnetic sensor was studied, and its feasibility was verified through production and experimentation.

A Critical Study on Google Arts & Culture's "Non-Profit" Strategy and its Appropriation of Publicness of Museums (구글 아트 앤 컬처(Google Arts & Culture)의 '비영리' 전략에 대한 비판적 고찰 - 뮤지엄의 공공성을 전용하는 디지털 플랫폼 기업의 비즈니스 모델 -)

  • Park, Sohyun
    • Korean Association of Arts Management
    • /
    • no.59
    • /
    • pp.33-72
    • /
    • 2021
  • I intended to discuss the new phase of the publicness of museums in a digital environment with the Goole Arts & Culture Project. To this end, I critically examined the instrumental approaches and technological optimism in the application of digital technology to museums, and scrutinized the recent museological issues, particularly the revision or curtailment of the museum's publicness amid the spread of neoliberal policy, which have been omitted within those technological approaches. This is because the meaning of Google Art & Culture can be considered more effectively through an extended theoretical reconstruction. Based on these theoretical discussions, I critically reviewed how the "non-profit," an important concept that defines the publicness of museums, was adopted and utilized as an business strategy by Google. As a result, I wanted to reveal that the neoliberalization of museums, the failure of the government's public function, the crisis of museum's publicness, and Google's "non-profit" strategy have been closely related. Armed with advanced digital technology, the GAC project appropriated the publicness of museums as a useful profit-making model. As such, now the concept of publicness of museums is at a point of more controversial and radical transformation than ever before.

A Study on Improvement of Research Ethic System in University (대학 연구윤리체계의 발전방안 연구)

  • Ahn, Sang-Yoon
    • Journal of Digital Convergence
    • /
    • v.20 no.1
    • /
    • pp.203-211
    • /
    • 2022
  • This study is to examine the causes of research misconduct such as plagiarism, forgery, redundant publication, unfair author expression, and incapacitation of the research ethics system of university researchers and to suggest improvement plan. It basically relied on literature research. In order to supplement the deficiencies in literature research, I sought advice from an expert professor who had experience working in a research-related field in university or who is currently in a position related to research ethics through the delphi-method. As a result of the study, from the perspective of individual researchers, the complacent attitude, dishonesty, and greed for research funds were identified as the main reasons. In terms of organization, it was analyzed for reasons such as lack of detail and application of regulations, lack of verification system, and performance-oriented research environment. In order to overcome research misconduct caused by the researcher's personal reasons, regularization, increase in the number of research ethics education, and strengthening personal penalties were suggested. As a way to overcome irregularities arising from institutional reasons, the reinforcement of the verification system, the reinforcement of the whistle-blower's personal protection system, the omission of promotion, and the quality and quantitative balance of research evaluation was suggested.

A Multi-Degree of Freedom Measurement System for Determining Geometric Errors in Miniaturized Machine Tool (소형공작기계의 기하학적 오차 평가를 위한 다자유도 측정시스템)

  • S. H., Kweon;Y., Liu;S. H., Yang
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2004.10a
    • /
    • pp.638-643
    • /
    • 2004
  • 소형화된 기계가공시스템은 사용재료의 다양화와 에너지 및 공간의 감소와 같은 장점을 가지고 작고 정밀한 부품을 가공할 수 있는 시스템으로 주목받고 있다. 이러한 시스템이 비록 그 크기가 일반적인 가공시스템에 비해 작지만 정렬 및 조립공정, 기계요소의 불완정성에 의한 기하학적 오차는 여전히 존재한다. 기하학적 오차 평가는 기계시스템의 정밀도를 효과적으로 적은 비용으로 향상시킬 수 있는 오차보정기술을 적용할 수 있는 토대가 된다. 일반적으로, 3 축의 직선축으로 이루어진 공작기계는 21 개의 오차요소를 가진다. 레이져간섭계는 이러한 오차요소를 평가하는데 널리 사용되고 있지만 광학계를 정렬하고 설치하는 데 많은 어려움이 있으며 한번의 설치로 한 개의 오차요소만이 측정 가능하다. 또한, 소형공작기계의 경우, 그 크기로 인해 기존의 레이져 간섭계를 직접적으로 적용할 수 없다. 따라서, 본 연구에서는 소형공작기계를 포함한 소형가공시스템의 기하학적 오차 평가를 위한 새로운 다자유도 측정시스템을 제안하였다. 5 개의 정전용량변위센서를 사용하는 이 시스템을 통해 한 축의 움직임에 따른 5 개의 오차요소를 동시에 측정 가능하다. 균질 변환행렬을 이용한 측정알고리듬을 구성하고 이를 모의시험을 통해 평가하였다. 수학적 모델링을 통해 각 센서의 출력값을 유도하고 이를 이용하여 각 오차요소를 계산하기 위한 식을 유도하였다. 여기서, 단순화된 식을 적용한 경우, 임의의 오차에 대한 측정 알고리듬의 정확도를 평가하였다. 또한, 측정 시스템의 설치시 발생하는 셋업오차에 대한 측정 알고리듬의 민감도 분석을 행하였다. 제안하는 측정 시스템은 구조가 간단하고 고가의 부가장비가 필요치 않다. 또한, 적은 비용으로 구성할 수 있으며 높은 측정 정밀도를 가지고 소형가공시스템에 필요한 오차 평가를 행할 수 있다.가 함유된 계란을 생산하고 섭취하였을 때 특정항체들의 결합을 통해 병원성 미생물의 성장이나 군체를 형성하는 것을 무력화시켜 결과적으로 병원균을 감소시키거나 억제시킨다는 점이다. 오늘날 약물에 내성을 지닌 박테리아의 출현으로 질병감염을 막는데 항생제의 사용효과가 점차 감소하고 있기 때문에 이러한 항생제를 대체할 수 있는 방안으로 계란항체를 이용할 수 있다.한 중공 플랜지 형상의 단조 방법 중 보다 적절한 단조방법인 압조 단조에 있어서 일반적으로 사용되고 있는 SM10C에 대한 유한요소 해석을 수행하였으며, 제품의 형상비에 따라 폴딩 결함의 발생 유무를 검토하고, 폴딩 결함 없이 단조하기 위한 중공 플랜지의 형상한계 비를 제시하였다.도 경미하게 나타났으나, 경련이 나타난 쥐에서는 KA만을 투여한 흰쥐와 구별되지 않았다. 이상의 APT의 항산화 효과는 KA로 인한 뇌세포 변성 개선에 중요한 인자로 작용할 것으로 사료되나, 보다 명확한 APT의 기전을 검색하고 직접 임상에 응응하기 위하여는 보다 다양한 실험 조건이 보완되어야 찰 것으로 생각된다. 항우울약들의 항혈소판작용은 PKC-기질인 41-43 kD와 20 kD의 인산화를 억제함에 기인되는 것으로 사료된다.다. 것으로 사료된다.다.바와 같이 MCl에서 작은 Dv 값을 갖는데, 이것은 CdCl$_{4}$$^{2-}$ 착이온을 형성하거나 ZnCl$_{4}$$^{2-}$ , ZnCl$_{3}$$^{-}$같은 이온과 MgCl$^{+}$, MgCl$_{2}$같은 이온종을 형성하기 때문인것 같다. 한편 어떠한 용리액에서던지 NH$_{4}$$^{+}$의 경

  • PDF

North Korea's Nuclear Strategy: Its Type Characteristics and Prospects (북한 핵전략의 유형적 특징과 전망)

  • Kim, Kang-nyeong
    • Korea and Global Affairs
    • /
    • v.1 no.2
    • /
    • pp.171-208
    • /
    • 2017
  • This paper is to analyze the type characteristics and prospects of the North Korean nuclear strategy. To this end, the paper is composed of 5 chapters titled introduction; the concept and type of nuclear strategy; the nuclear capabilities of North Korea and the declarative nuclear strategy; the operational characteristics and prospects of the North Korean nuclear strategy; and conclusion. Recently, the deployment of nuclear weapons and the enhancement of nuclear capabilities in North Korea have raised serious problems in our security and military preparedness. Nuclear strategy means military strategy related to the organization, deployment and operation of nuclear weapons. The study of North Korea's nuclear strategy begins with a very realistic assumption that the nuclear arsenal of North Korea has been substantiated. It is a measure based on North Korea's nuclear arsenal that our defense authorities present the concepts of preemptive attack, missile defense, and mass retaliation as countermeasures against the North Korean nuclear issue and are in the process of introducing and deploying them. The declared nuclear declaration strategy of the DPRK is summarized as: (1)Nuclear deterrence and retaliation strategy under the (North Korea's) Nuclear Weapons Act, (2)Nuclear preemptive aggression, (3)The principle of 'no first use' of nuclear weapons in the 7th Congress. And the intentions and operational characteristics of the North Korean nuclear strategy are as follows: (1)Avoiding blame through imitation of existing nuclear state practices, (2)Favoring of nuclear strategy through declarative nuclear strategy, (3)Non-settlement of nuclear strategy due to gap between nuclear capability and nuclear posture. North Korea has declared itself a nuclear-weapon state through the revised Constitution(2012.7), the Line of 'Construction of the Nuclear Armed Forces and the Economy'(2013.3), and the Nuclear Weapons Act(2013.4). However, the status of "nuclear nations" can only be granted by the NPT, which is already a closed system. Realistically, a robust ROK-US alliance and close US-ROK cooperation are crucial to curbing and overcoming the North Korean nuclear threat we face. On this basis, it is essential not only to deter North Korea's nuclear attacks, but also to establish and implement our own short-term, middle-term and long-term political and military countermeasures for North Korea's denuclearization and disarmament.

A comparison study of the characteristics of private and public security service of Koryo dynasty and modern security service (고려시대 공적·사적경호의 특성과 현대경호와의 비교연구)

  • Lee, Sung-Jin
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.417-442
    • /
    • 2013
  • This study considers the characteristics of the separation of public and private security service during Koryo dynasty, and compares it with the modern security service. Modern day security service's definition of private and public security service was used to distinguish them. Given the different historical settings, it's difficult to argue that the distinction between public and private service during Koryo dynasty was clear, but it can be said that public security service was centered around palace guard and concerns the activities of protest, and military made for the relationship, and private security service was centered around power of DoBang and includes the activities of malingering, and Byolchogun. During the early days of Koryo, protest, district military and soldiers who stay in the palace were all parts of a palace revolt and this institutional improvement of soldiers who stay in the palace was accomplished during King Seongjong's rule. The tradition of a palace revolt can find its roots in the middle military, and after the unification, a palace revolt was reformed into the king's palace revolt of second and the 6th along the course of establishing the nation's system. All of the changes stem from the reformation for consolidating the royal authority. Gyung Dae Seoung wanted to protect himself and he slept with his army night and days and because of that, group of soldiers was created and it was called DOBANG. Some members were from dobang gyeonryong, The forced were powerful because it was gathered with a warriors with extraordinaire martial arts and competent management. Most of the soldiers followed gyeong dae seung because they believed that he has a strong leadership and loves his people, and had a strong faith in him. However, the general gyeong jang had a belief that politics must be reverted to the previous so the relationships between jungbang wasn't smooth. Because of the economic operational problems, due to fraud committed by the mens under his command failed to maintain integrity and was criticised.The misconception also fed up with the emperor and the deepening relationships between the soldiers, his dobang was dismantled. After he took over the dobang, for his personal safety and to strengthen his position he compensated gyeon dae seong's dobang and developed the organization. In the process of extending the dobang Choi chung heon recruited many talented people to strengthen the military base, and also accepted the advice and expanded the power of Dobang. Choi Chung Heon thus consolidated his political gains by weakening the power of the king's army and adjusting the myth, which could've threatened his regime, and this was called Dobang number 6th. Dobang number six got even more powerful by his son named Choi woo, and after ruling, he expanded into a room, and a substantial reorganization of Dobang was developed. And then the creation of yabyeolcho also showed the effect to prevent the crisis. Although the palace guards who were public security service of Koryo Dynasty was still maintained during the military rule era when the royal authority was incapacitated, it was only maintained to have a symbolic meaning as the actual authority including military power was with Choi, the master of Dobang, private security service group. Likewise, during the rule of Choi, private securty service could reign over public security service, and the noteworthy characteristic of Dobang is that it assisted the private soldier groups to seize the military power by reorganizing and modifying military system. Although both differences and similarities can be found when comparing the guards of Koryo Dynasty with those of contemporary society, they have a similarity in terms of the essence of guards that they guarantee the safety of their clients. As for differences, the royalty of Koryo Dynasty and the pursuit of profit of contemporary society are in contrast, and contemporary guards can be seen as the fulfillment of responsibility and duty by free will, whereas guards of Koryo Dynasty were ruled with military coercion.

  • PDF