• Title/Summary/Keyword: 접근/방어 체계

Search Result 28, Processing Time 0.024 seconds

대유도탄 근접방어체계(CIWS)현황과 발전동향

  • Lee, Hyo-Geun
    • Defense and Technology
    • /
    • no.8 s.138
    • /
    • pp.42-48
    • /
    • 1990
  • CIWS의 성능 및 유용성에 관한 토론은 안전한 실제시험의 구상이 어려우며, 성능입증자료가 부족하다. 유도탄이 안전하게 목표지점을 향해 접근할때 항상 대유도탄 방어체계가 준비되도록 제작자들은 요구받고 있다. 장래의 고객이 미 해군의 지연된 Goalkeeper체계의 평가결과를 아는 것은 가치가 있는 일이다. 그러나 미 해군은 Phalanx 체계에 대한 엑조세(Exocet)와 하-푼(Harpoon) 유도탄의 시험결과를 비밀에 부치고 있다.

  • PDF

한반도 주변 해역의 극치해면 및 해류 추정 방법

  • 최병호;고진석
    • Proceedings of the Korean Society of Coastal and Ocean Engineers Conference
    • /
    • 1996.10a
    • /
    • pp.15-18
    • /
    • 1996
  • 우리나라 연안의 항만의 설계해면 및 해안구조물의 방어수위가 현재에 확률적으로 얼마나 안전한가의 여부와 현재 건설 중인 항만 개발 사업, 대규모 매립 사업, 기후 면화에 따른 해수위 상승 등에 변화되는 해양 환경에 따라 설계 수위와 연안방어체계를 어떻게 설정해야 할 것인가는 한국의 해안ㆍ해양 공학의 기본 과제임에도 불국하고 소홀하게 다루어지고 있는데 합리적인 접근방법에 의해 우리나라의 연안방어체계에 필수적인 극치자료를 제공하는 과업은 용이한 일은 아니다. (중략)

  • PDF

An Optimal Investment Planning Model for Improving the Reliability of Layered Air Defense System based on a Network Model (다층 대공방어 체계의 신뢰도 향상을 위한 네트워크 모델 기반의 최적 투자 계획 모델)

  • Lee, Jinho;Chung, Suk-Moon
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.3
    • /
    • pp.105-113
    • /
    • 2017
  • This study considers an optimal investment planning for improving survivability from an air threat in the layered air defense system. To establish an optimization model, we first represent the layered air defense system as a network model, and then, present two optimization models minimizing the failure probability of counteracting an air threat subject to budget limitation, in which one deals with whether to invest and the other enables continuous investment on the subset of nodes. Nonlinear objective functions are linearized using log function, and we suggest dynamic programming algorithm and linear programing for solving the proposed models. After designing a layered air defense system based on a virtual scenario, we solve the two optimization problems and analyze the corresponding optimal solutions. This provides necessity and an approach for an effective investment planning of the layered air defense system.

GIS-based review of Goguryeo's defense system during the Gungnaeseong Period with the focus on the upper and middle reaches of the Amnok River and the mid-stream region of the Liohe River (GIS를 활용한 고구려 국내성 시기의 관방체계 검토 - 압록강 중상류~요하 중류를 중심으로 -)

  • Hong, Balgeum;Kang, Dongseok
    • Korean Journal of Heritage: History & Science
    • /
    • v.54 no.1
    • /
    • pp.260-279
    • /
    • 2021
  • The Goguryeo kingdom established a unique defense system centered on a series of mountain fortresses. However, modern-day studies on its defense system have tended to focus on how they were positioned and generally consist of little more than individual surveys or introductions to the relevant materials, leaving much to be desired. This study attempts to extend the scope of studies about fortresses dating back to the Goguryeo period, taking into account the limitations of the available materials. As such, this study reviews the defense system of Goguryeo during the Gungnaeseong Period (i.e., the period when Gungnaeseong was the capital of Goguryeo) using the GIS system, with the focus on fortresses that are thought to have been built in the area extending from the middle and upper reaches of the Amnok River to the mid-stream region of the Liohe River, based on the aforementioned studies. The results of the study are as follows. First, the major roads built during the Gungnaeseong Period were as stated in the foregoing studies to some extent. Researchers believed that during the middle period of the dynasty, a major road ran along the Suzihe, Fuer and Xinkai rivers before finally reaching Jian. The study found that fortified walls and fortress strongholds were built along this road. Second, there were seven fortresses between the middle and upper reaches of the Amnokgang River and the midstream region of the Liaohe River. A primary defense line was closely established between the strongholds and the nearby walls, with secondary and tertiary defense lines established more loosely and encompassing a much wider area. Third, regarding the defense system along the major roads, the Choejinbosanseong, Goisanseong and Cheolbaesanseong fortresses served as strongholds along the 60-kilometer-long primary defense line, with 80-kilometer-long secondary and tertiary defense lines set up behind it. The final 120-kilometer-long defense line of the capital was established along with the Onyeosanseong Fortress, while a stumbling block was set up close to the capital as a defense system, rather than building a fortified wall. To summarize, a primary defense system was established centered on a series of fortresses, with each stronghold maintaining a closely-knit defense system in connection with other nearby strongholds to repel invaders.

A Proposal of Classification System on Cyber Attack for Damage Assessment of Cyber Warfare (사이버전 피해 평가를 위한 사이버 공격의 분류 체계 제시)

  • Park, Jinho;Kim, Yonghyun;Kim, Donghwa;Shin, Dongkyoo;Shin, Dongil
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.235-238
    • /
    • 2017
  • 최근에는 랜섬웨어의 일종인 '워너크라이' 등의 바이러스로 인한 피해도 기하급수적으로 증가하고, 그 수법도 사용자가 파일에 접근하면 감염되던 형태에서 인터넷에 접속되기만 하면 감염되는 형태로 진화하면서 사이버전에 사용되어질 수 있는 사이버 공격에 대응하는 방어 및 회복 방책에 대한 관심이 한층 더 증폭되고 있다. 하지만 일반적으로 방어, 회복 등의 대응 과정은 공격의 피해를 평가하여 결과로 산출된 피해 정도를 전제 조건으로 가지기 때문에 먼저 해킹 공격의 피해를 평가하여야 한다. 본 논문에서는 사이버전에서 사용되어질 수 있는 해킹 공격 및 위협의 피해를 공격의 종류별로 평가하기 위해, 피해 정도를 수치화할 수 있는지의 여부 등을 기준으로 하여 총 3가지 Interruption, Modification, Interception로 구성된 해킹 공격의 분류 체계를 제시한다.

Examination of Validity of Motivation Activation Tendency as a Target Group in Delivering Anti-drug Advertisements (마약퇴치 광고의 표적 집단 활용을 위한 동기 활성화의 타당도 조사)

  • Lee, Seungjo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.8
    • /
    • pp.301-311
    • /
    • 2017
  • The current study investigated whether individual variation in motivational activation would predict the drug-use and interacts with discrete emotions to influence the responses to anti-drug advertisements. Motivational activation tendency indicates an individual's level to approach life-sustaining elements and defend life-threatening stimuli. Discrete emotion represents joy, sadness, and fear elicited by the advertisements. The experiment proceeded using both self-reports and physiological responses with 80 subjects. Results showed that approach motivation activation can be a target for anti-drug advertisements and in order to target individuals higher in approach activation, it is necessary to use the appeal type to elicit positive emotions such as joy.

Optimal Allocation Model of KDX for Missile Defense (미사일 방어를 위한 KDX 최적배치모형 연구)

  • Lee, Sang-Heon;Jeong, In-Cheol
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.4
    • /
    • pp.69-77
    • /
    • 2006
  • In most positioning and allocation practices, many mathematical models are proposed in various fields. The set covering (SC) problem has many practical applications of modeling not only real world problem but also in military. As our air defense weapon systems are getting older and declining the performance, new plans far acquisition of high-tech air defense weapon system are being conducted. In this paper we established simulation model for optimal allocation of KDX which carries new missile defense weapon system by using partial set covering considering both attacker and defender side. By implementating simulation model, we assess the available scenarios and show the optimal pre-positioning of KDX and interceptor's allocation. Furthermore, we provide a variety of experiments and extensive scale sized situations for Korea Indigenous Missile Defense (KIMD) and support decision-making for efficient positioning of unit.

  • PDF

An Analysis of Functional Requirements of the ASBM Defense Systems (ASBM 방어체계의 시나리오기반 기능요구사항 분석)

  • Lee, Kyoung Haing;Park, Young Han;Baek, Byung Sun;Baek, Sang Hoon
    • Journal of Aerospace System Engineering
    • /
    • v.10 no.4
    • /
    • pp.98-104
    • /
    • 2016
  • This research describes the functional requirements of anti-ship ballistic missile (ASBM) defense systems, which depend on the threat characteristics of the ASBM. Recently, China has carried out a training launch of the DF-21D strategic countermeasures for the placement of Korean terminal high-altitude air defense (THAAD). The ASBM is being used as a primary means of attacking aircraft carriers, using an anti-access/area denial (A2/AD) strategy. Considering the missile technology connection between China and North Korea, there is a very high probability that North Korea already owns an ASBM. From this point of view, work with Aegis operational concepts provided implications for an ASBM threat. Utilizing quality function deployment (QFD) based on the operational concepts, the functional requirement were calculated.

Study on Insider Pattern Monitoring System for Secure Smart Building Operations (안전한 스마트빌딩 운영을 위한 내부자 패턴 모니터링 시스템 연구)

  • Kim, Jeong-Ho;Chung, Hague;Jun, Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.288-289
    • /
    • 2016
  • 최근 사물인터넷(Internet of Things)의 발달로 인해 사물과 사물간의 통신을 이용해 사용자가 어느 곳에서나 집 또는 사무실 등의 장소의 정보를 얻을 수 있게 되었다. 하지만 IoT기기들을 스마트빌딩에 활용하는데 있어서 내부에서 공격이 발생했을 경우에 효과적으로 방어할 수 있는 방어체계가 갖추어져 있지 않아 위험하다는 점이 존재한다. 따라서 본 논문에서는 IoT 네트워크를 구축한 스마트빌딩에서 내부 사용자 접근에 대한 누적 정보를 바탕으로 스마트빌딩 내부에서 발생할 수 있는 불법적인 내부자 공격에 대하여 스마트빌딩을 안전하게 운영할 수 있는 내부자 패턴 모니터링 시스템을 제안한다.

A Review on the DACS Design from the Perspective of Flight Performance Requirements (비행성능 요구 관점에서 DACS 형상 설계에 관한 고찰)

  • Park, Iksoo;Jin, Jungkun;Ha, Dongsung;Lim, Seongtaek
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2017.05a
    • /
    • pp.358-363
    • /
    • 2017
  • The high intercept probability depends on optimization of the system, which consists of target detection, tracking system, missile system and so on. To reduce the complexity of global optimization of the system performance, simplification of the relative dependances of each sub-system is done and design parameters for DACS configuration are identified. The conceptual design process is addressed based on the requirement of the design parameters and new methodology is suggested for higher performance.

  • PDF