• Title/Summary/Keyword: 사관(寺觀)

Search Result 505, Processing Time 0.027 seconds

A study on the characteristics of the Korea National Guard the root of the reserve power (예비전력의 효시(嚆矢) 호국군(護國軍)의 성격에 관한 연구)

  • Jong-Hyun Park
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.127-134
    • /
    • 2022
  • Although the Korea National Guard(KNG) has a short history, it has a great meaning in that it is the first of the Korean reserve forces system. Research on the KNG has been passively conducted so far. Even so, the research conducted was limited to a fragmentary description from a historical point of view and did not identify the characteristics of the KNG. Therefore, in this study, after examining the background of the times when the KNG existed, we tried to identify the characteristics of the KNG from a new perspective from legal, institutional, military, and political perspectives. In summary, the KNG was born as an efficient system in preparation for war while receiving legal support. In addition, the adoption of the volunteer army system, a recruiting system of advanced countries, the fact that officers were trained through a separate military academy unique to the KNG, and that they contributed to rear area operations are highly evaluated from a military standpoint. On the other hand, it is negative that politicians and non-military groups colluded from the process of establishing the KNG. Finally, with this study as an opportunity, it is hoped that research on the reserve force that existed before the Korean War will become more active.

Proposal for Government Quality Assurance Risk Assessment System for Military Supplies (군수품 정부품질보증 위험성 평가제도 개선을 위한 제언)

  • Namsu Ahn
    • Journal of Korean Society for Quality Management
    • /
    • v.51 no.2
    • /
    • pp.155-170
    • /
    • 2023
  • Purpose: Nowadays, the risk assessment system is widely used in many industrial and public areas to reduce the possible risks. The system is used to determine the priorities of the government quality assurance works in Defense Agency for Technology and Quality. However, as the risk assessment system is used for other purposes, there are some items that need improvement, and in this study, we propose improvement plans by benchmarking the risk assessment systems of other institutions. Methods: In this paper, first, the procedures of risk assessment system used in many industrial sites were reviewed, and how each institution specialized and applied the system. Afterwards, by benchmarking various risk assessment systems, an improvement plan on how to operate the risk assessment system in the case of government quality assurance for centrally procured military supplies was presented, and practical application cases were presented to prove the usefulness of the improvement plan. Results: The proposed risk assessment system differs from the existing system in five major aspects. First, inputs, outputs, and key performance indicators were specified from the systematic point of view. Second, risk analysis was analyzed in four dimensions: probability of occurrence, impact, detection difficulty. Third, risk mitigation measures were classified, control, transfer, and sharing. Fourth, the risk mitigation measures were realized through document verification, product verification, process verification, and quality system evaluation. Finally, risk mitigation measures were implemented and the effectiveness of the risk mitigation measures was evaluated through effectiveness evaluation. Conclusions: In order for the risk assessment procedure proposed in this study to be applied to actual work, it is necessary to obtain the consent of the person involved in the work due to the increased time for risk identification and preparation of the government quality assurance log, and a change in the information system that performs the actual work is required. Therefore, the authors of this study plan to actively perform internal seminar presentations and work improvement suggestions to apply these research outputs to actual work.

Analysis of the effectiveness of Maritime English education through the application of a smart platform (스마트 플랫폼 적용을 통한 해사영어 교육 효과 분석)

  • Jin Ki Seor;Dongsu Shin;Young-soo Park
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.154-155
    • /
    • 2023
  • The International Convention on Standards for Training, Certification, and Watchkeeping of Seafarers (STCW) outlines the qualifications that maritime cadets must meet in order to serve as merchant marine officers. Maritime English is one of the most essential qualifications for STCW, and each national authority is implementing Maritime English education that complies with national and international regulations. In this study, an English proficiency background survey was conducted to investigate the factors related to the Maritime English skills and competencies. In line with this, maritime cadets utilized the Standard Maritime English Communication Phrases (SMCP) learning platform to track their learning progress and its efficacy. This study examined the applicability of the automatic scoring platform for Maritime English education, as well as its future potential for widespread use in the maritime education field.

  • PDF

Enhancing Existing Products and Services Through the Discovery of Applicable Technology: Use of Patents and Trademarks (제품 및 서비스 개선을 위한 기술기회 발굴: 특허와 상표 데이터 활용)

  • Seoin Park;Jiho Lee;Seunghyun Lee;Janghyeok Yoon;Changho Son
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.4
    • /
    • pp.1-14
    • /
    • 2023
  • As markets and industries continue to evolve rapidly, technology opportunity discovery (TOD) has become critical to a firm's survival. From a common consensus that TOD based on a firm's capabilities is a valuable method for small and medium-sized enterprises (SMEs) and reduces the risk of failure in technology development, studies for TOD based on a firm's capabilities have been actively conducted. However, previous studies mainly focused on a firm's technological capabilities and rarely on business capabilities. Since discovered technologies can create market value when utilized in a firm's business, a firm's current business capabilities should be considered in discovering technology opportunities. In this context, this study proposes a TOD method that considers both a firm's business and technological capabilities. To this end, this study uses patent data, which represents the firm's technological capabilities, and trademark data, which represents the firm's business capabilities. The proposed method comprises four steps: 1) Constructing firm technology and business capability matrices using patent classification codes and trademark similarity group codes; 2) Transforming the capability matrices to preference matrices using the fuzzy function; 3) Identifying a target firm's candidate technology opportunities using the collaborative filtering algorithm; 4) Recommending technology opportunities using a portfolio map constructed based on technology similarity and applicability indices. A case study is conducted on a security firm to determine the validity of the proposed method. The proposed method can assist SMEs that face resource constraints in identifying technology opportunities. Further, it can be used by firms that do not possess patents since the proposed method uncovers technology opportunities based on business capabilities.

Estimating home fire severity with statistical distributions (통계적 분포를 통한 주택 화재 심도 추정)

  • Yunjung Park;Inha Song;Soyoun Lee;Kwang Hyun Nam;Rosy Oh;Jaeyoun Ahn
    • The Korean Journal of Applied Statistics
    • /
    • v.36 no.6
    • /
    • pp.591-618
    • /
    • 2023
  • This paper evaluates the performance of various distribution assumptions in regression settings for estimating insurance loss. The gamma distribution is commonly used to handle the asymmetry property of loss distribution. However, recent studies highlight the significance of heavy-tailedness in loss distribution. Through an analysis of real home fire insurance data, we compare the effectiveness of different distribution assumptions in regression methods. Our findings show that the choice of parametric distributional assumption is crucial in determining premiums for various insurance products, including "excess of loss insurance" and "limit insurance". Additionally, we discuss practical considerations for applying our results in home fire insurance.

A Study on the Adsorption Properties of Diisopropyl Methyl Phosphonate on Chromium-Based Metal-Organic Frameworks Using Acetic Acid as a Modulator (아세트산을 조절인자로 제작한 크롬 기반 금속유기골격체의 diisopropyl methyl phosphonate 흡착 특성 연구)

  • Sangjo Jeong
    • Applied Chemistry for Engineering
    • /
    • v.34 no.6
    • /
    • pp.596-602
    • /
    • 2023
  • Chromium-based metal-organic frameworks (MIL-101(Cr)) were synthesized, and their potential use as a filling material for gas masks or protective clothing was assessed through adsorption experiments using diisopropyl methyl phosphate (DIMP) as a simulant for chemical warfare agents. MIL-101(Cr) was prepared using acetic acid (MIL-101(Cr)-A) and sodium hydroxide (MIL-101(Cr)-N) as modulators. The use of acetic acid as a modulator resulted in a larger specific surface area and a higher DIMP adsorption capacity. MIL-101(Cr)-A absorbed approximately 160% of its own weight of moisture when exposed to an environment with a relative humidity of 90% for 10 days, surpassing other adsorbents such as activated carbon. The DIMP adsorption capacity of MIL-101(Cr)-A decreased to about 40% of its initial adsorption capacity after 24 hours of exposure to an environment with a relative humidity of 90%. However, this capacity is still higher compared to that of activated carbon used in commercial gas masks, suggesting a high potential for future use as a filling material for gas masks or protective clothing.

A Study on the Relationship between Organizational Culture and Organizational Citizenship Behavior Perceived by Korean Navy Personnel: Mediating Effect of Affective Commitment and Moderating Effect of Coworker Social Loafing (해군장병이 인식하는 조직문화와 조직시민행동의 관계 연구: 정서적 몰입의 매개효과와 동료의 사회적 태만 조절효과)

  • Hong Jeong Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.6
    • /
    • pp.981-992
    • /
    • 2023
  • This study, the effect of organizational culture perceived by millennial Naval Personnel working on naval ships on organizational citizenship behavior was empirically analyzed. First, it was found that OC(group/hierarchy) had a positive effect on OCB. Second, affective commitment plays a mediating role in the relationship between OC(group/hierarchy) and OCB. It was confirmed that organizational culture has a direct effect on OCB, but also indirectly through affective commitment. Third, Coworker social loafing had a negative moderating effect in the relationship. Therefore, in order to improve organizational citizenship behavior, it is necessary to improve a balanced organizational culture suitable for changes in the organizational environment, Strengthen the key influencers for organizational members to affective commitment themselves in the organization, and promote improvement in social loafing.

Analyzing the Defense Budgetary in the Republic of Korea with the Punctuated Equilibrium Theory (단절균형이론을 적용한 국방예산 분석에 관한 연구)

  • Yongjoon Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.6
    • /
    • pp.779-787
    • /
    • 2023
  • Previous research regarding budget analysis has been mostly limited to describing annual changes in defense budgets relative to total budgets without a theoretical background. More empirical defense budget research is needed with better data. This study conducts an empirical analysis of national defense expenditures using Punctuated Equilibrium Theory (PET). The purpose of this study is to examine trends in the Republic of Korea's (ROK) functional defense budgets (total defense budget, force operation budget, force improvement budget) and to identify and analyze radical points of change in the defense budget using punctuated equilibrium theory. This study also explores trends and punctuations in the national defense budgets using annual defense budget data from the ROK for every year from 1998 to 2017. This study finds that from 1998 to 2017 the spending pattern of the total defense budget in the ROK was characterized by 19 years of stable growth and a one-time punctuation (5.0%). The force operation budget exhibited stable growth in eighteen years and was punctuated twice (10%). The force improvement budget was punctuated five times.

SaaS Platform Structure Design for Authentication and Accounting based on Trusted Computing Technology (신뢰 컴퓨팅기술 기반 SaaS 인증 및 과금 플랫폼 구조 설계)

  • Lee, Sang Hwan;Kim, Jane Chungyoon;Jun, Sungik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.991-994
    • /
    • 2007
  • 최근 컴퓨터 기술의 발전과 네트워크의 개방화 그리고 무선 모바일 통신 기술의 비약적인 보급으로 인하여 컴퓨팅 환경을 이루고 있는 각종 장치(PC, 모바일 단말, 저장장치, 네트워크 기기 등)가 다양한 형태의 보안 위협에 노출되어 데이터의 유실, 조작, 유출되어 금전적인 피해를 입거나 프라이버시 침해를 받고 있다. 이러한 문제를 근본적으로 해소하기 위하여 설립된 TCG(Trusted Computing Group)는 세계적인 IT 핵심기업들을 중심으로 구성된 비영리 단체로서 PC 혹은 모바일 기기 등의 단말과 서버 장비 그리고 저장 장치 및 네트워크로 구성된 컴퓨팅 환경에서 보안성 향상 및 데이터의 신뢰성을 제고하기 위하여 TPM(Trusted Platform Module)이라는 반도체 칩을 신뢰의 기반(root of trust)으로 한 신뢰 플랫폼을 제안하고 있다. 한편 SaaS(Software as a Service)는 패키지 형태의 소프트웨어를 네트워크 서비스 형태로 바꾸어 사용량에 비례한 요금제로 과금하는 방식을 채택하고 사용자가 온디맨드로 요청한 서비스를 적시에 제공하는 기술로 최근 전세계적으로 각광을 받고 있다. 이때 다양한 컴퓨팅 환경 안의 사용자에게 높은 신뢰성과 보안성 그리고 연속성을 갖는 SaaS 서비스를 제공하고 데이터의 무결성 및 비밀유지와 정확한 서비스 사용시간을 기록하고 업로드하는 기능들을 제공하는 SaaS 플랫폼은 TPM기반의 신뢰컴퓨팅 기술을 통하여 쉽게 구현될 수 있다. 본 논문에서는 일시적으로 네트워크와 차단된 상태의 PC 혹은 모바일 단말에서도 위의 조건들을 만족하는 SaaS 서비스를 지원하는 신뢰 플랫폼이 가져야 할 기능들에 대하여 분석-도출한 후 그러한 기능들을 제공하는 컴포넌트로 구성된 신뢰형 SaaS 사용자 플랫폼을 설계하였다.

Study on the Vulnerabilities of Automatic Speech Recognition Models in Military Environments (군사적 환경에서 음성인식 모델의 취약성에 관한 연구)

  • Elim Won;Seongjung Na;Youngjin Ko
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.201-207
    • /
    • 2024
  • Voice is a critical element of human communication, and the development of speech recognition models is one of the significant achievements in artificial intelligence, which has recently been applied in various aspects of human life. The application of speech recognition models in the military field is also inevitable. However, before artificial intelligence models can be applied in the military, it is necessary to research their vulnerabilities. In this study, we evaluates the military applicability of the multilingual speech recognition model "Whisper" by examining its vulnerabilities to battlefield noise, white noise, and adversarial attacks. In experiments involving battlefield noise, Whisper showed significant performance degradation with an average Character Error Rate (CER) of 72.4%, indicating difficulties in military applications. In experiments with white noise, Whisper was robust to low-intensity noise but showed performance degradation under high-intensity noise. Adversarial attack experiments revealed vulnerabilities at specific epsilon values. Therefore, the Whisper model requires improvements through fine-tuning, adversarial training, and other methods.