• Title/Summary/Keyword: 무력화

Search Result 171, Processing Time 0.027 seconds

Study on the countermeasures of the runway bombing using the mobile runway (이동식 활주로를 이용한 활주로 폭격 대응 방안에 관한 연구)

  • Seong, Min Cheol;Kim, Yongchul
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.35-41
    • /
    • 2019
  • Considering North Korea's strategy, North Korea's top hitting target in the event of a war is likely to be the main goal of the air force runway to neutralize the air force. As a countermeasure, there are emergency runway construction and runway emergency recovery operations. However, emergency runway construction is mainly intended for emergency landing and fueling and rearmament. The emergency runway restoration operation has also several limitations considering North Korea's threatening missile level, recovery time, and so on, so it cannot respond quickly to the North's runway bombing. In this study, we first describe the threat of North Korea's missiles and their air defense capabilities. Then the concept and limitations of the mobile runway, which is the next generation countermeasure, are presented.

On Security of Android Smartphone Apps Employing Cryptography (안드로이드 스마트폰 암호 사용 앱 보안 분석 및 대응)

  • Park, Sang-Ho;Kim, Hyeonjin;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1049-1055
    • /
    • 2013
  • Smartphones are rapidly growing because of easy installation of the apps (application software) that users actually want. There are increasingly many apps that require cryptographic suites to be installed, for instance, for protecting account and financial data. Android platform provides protection mechanisms for memory and storage based on Linux kernel, but they are vulnerable to rooting attacks. In this paper, we analyze security mechanisms of Android platform and point out security problems. We show the security vulnerabilities of several commercial apps and suggest appropriate countermeasures.

Development of Multitone Jamming Technique Using DDS Core in FPGA (FPGA의 DDS Core를 이용한 다중 톤 재밍 신호 생성)

  • Hong, Sang-Geun;Kwak, Chang-Min;Lee, Wang-Yong
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.22 no.9
    • /
    • pp.827-832
    • /
    • 2011
  • Communication is very important in warfare. Dispatch riders were used in ancient warfare, but communication system is used in modern warfare, as the advancement of communication equipments. In order to weaken enemy military strength, communication jamming signal disrupts enemy communication systems. Tone jamming is one of the common communication jamming techniques. Tone jamming is that several tones are placed in the spectrum for neutralizing the enemy's radio communication receivers. In this paper, we develop multitone jamming signal controlled tone number up to 10 tones and tone interval between tones using DDS(Direct Digital Synthesizer) core and FPGA(Field Programmable Gate Arry) of Xilinx Inc. and show the jamming signal output.

Creating Change in the Ecology of Religious Education for Overcoming Racism (인종주의 극복을 위한 종교교육 생태의 창조적 변화에 관한 연구)

  • Son, Moon
    • Journal of Christian Education in Korea
    • /
    • v.61
    • /
    • pp.109-129
    • /
    • 2020
  • This study reflects the regional context of Northeast Asian countries embodied in US-North Korean nuclear tension. The researcher uses the methodological inquiry of practical theology to analyze the political affairs and intertwine with religious education. The ecology of religious education to dismantle the threat of ethnic and racial discrimination such as white supremacy supports a shared pedagogy between students and their teachers in the narrative of Jesus to challenge all forms of oppression as the democratic presence of God.

A Study on the Risk Management Information System of the Underground Space - focused on Fire Growth Risk Assessment System- (지하공간의 위험관리정보시스템에 관한 연구 -화재확산평가시스템 중심으로-)

  • 박종근;노삼규
    • Fire Science and Engineering
    • /
    • v.16 no.4
    • /
    • pp.49-58
    • /
    • 2002
  • A large number of accidents at an underground place have been happening, including the gas explosion under construction of subway; the fires of underground utility and underground shopping malls, and other explosion, at home and abroad recently. These accidents make the function of a city ineffective due to the paralyses of electricity and communications net as well as the loss of property and cause people to feel unsecured with accompaniment of a heavy of toll of lives. This research will show evaluation methods of a numerical value of expected average loss space of combustion with the use of probability in order to present potential risk of combustion growth that underground space might cause, and how designer decides a system that enables us to compare and evaluate relatively the effectiveness of measures for preventing burning by calculating the expansion route and the damage size of burning in case of fire.

An Improvement of Hit-probability and an Efficient Counter-fire Execution (명중확률 개선 및 효율적인 대화력전 수행방안)

  • Kim, Se-Yong;Lee, Jae-Yeong
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.4
    • /
    • pp.143-152
    • /
    • 2008
  • At an initial battle stage, counter-fire capability have critical impact on defeating the enemy in the future warfare. In this paper, we proposed an efficient method of counter-fire execution. To do that, hit-probability for each artillery type was evaluated using CEP and applied to calculate new target reference table of a counter-fire operation. In order to compare new result to the one obtained by using previous reference table from BTCS, we did simulation using MANA model. Simulation outputs show that new method is superior to previous method of counter-fire operation in various scenarios depending upon each method and usage of UAV.

  • PDF

Development of VGPO/I Jamming Technique for Phase Sampled DRFM (위상 샘플방식 DRFM에 적용 가능한 VGPO/I 재밍기법 기술 구현)

  • Choi, Young-Ik;Hong, Sang-Guen;Lee, Wang-Yong;Park, Jin-tae;Lee, Chang-hoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.12
    • /
    • pp.1105-1111
    • /
    • 2016
  • In modern warfare, various target tracking radars are used for target location tracking. So, the importance of EA radar jamming technique which disrupt enemy target tracking radar in oder to neutralize tararget location tracking has increased. VGPO/I jamming is a base technique of EA(Electronic Attack), it is possible to operate to pulse-Doppler radar. In this papar, we develop VGPO/I jamming technique that can apply to phase sampled DRFM by using phase information and verifiy through simulations.

Concept of EMP(Electromagnetic Pulse) and Way of Solutions (EMP의 개념 및 대응 방안)

  • Kim, Young-ho;Kim, Soo-hong;Park, Tae-yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.468-470
    • /
    • 2015
  • EMP(ElectroMagnetic Pulse) was founded by United States first time from hydrogen bomb experiments in the Pacific Ocean. Although nuclear weapons are weapons of destruction and casualties as heat and explosive force, accidentally it discovered EMP that it can be used as a weapon system that can impose serious damage to electronic equipments without damaging our life, and especially, the automated weapons operated by a computer, such as an electronic device can be effectively neutralized. Therefore, the main military facilities have provided the equipment that can protected from EMP as necessary. In this paper, the concept of EMP is described and countermeasures to protect against EMP are surveyed and described.

  • PDF

A Study on The Protection of Industrial Technology based on LDAP (LDAP기반의 산업기술 유출방지에 관한 연구)

  • Kim, Do-Hyeoung;Yoo, Jae-Hyung;Lee, Dong-Hwi;Ki, Jae-Seok;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.21-30
    • /
    • 2008
  • This study researched into the method that allows only the certified user and computational engineer to possibly use network resources and computing resources by implementing the system of the intensified certification and security based on LDAP(Lightweight Directory Access Protocol) directory service, that copes with incapacitation in security program due to making the security program forcibly installed, and that can correctly track down the industrial-technology exporter along with applying the user-based security policy through inter-working with the existing method for the protection of industrial technology. Through this study, the intensified method for the protection of industrial technology can be embodied by implementing the integrated infra system through strengthening the existing system of managing the protection of industrial technology, and through supplementing vulnerability to the method for the protection of industrial technology.

  • PDF

Numerical Study on Variation of Penetration Performance into Concrete by Penetrator Nose Shape (침투자의 노즈 형상에 따른 콘크리트 침투성능 변화에 관한 수치적 연구)

  • Ju, Yongwon
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.3
    • /
    • pp.109-116
    • /
    • 2018
  • In order to destroy the hard target, it is essential to develop a penetration warhead with high penetration performance. To design a penetration warhead, this paper discusses the effect of nose shape factors such that nose shape, nose length, nose tip diameter, on the penetration performance of the penetrator. AUTODYN-2D has been used to conduct the computational analysis. The experimental result of Forrestal, and a simulation result have been compared to verify the reliability of computational analysis. Computational results show that the nose length have more influence on the penetration performance than the nose shape. Furthermore, simulation results show that the penetration performance can be improved by increasing the nose tip diameter to a specific value, when the nose length of the penetrator is uniform.