• Title/Summary/Keyword: Defense Analysis

Search Result 2,928, Processing Time 0.036 seconds

Rifle performance improvement cost estimation through Relation between the accuracy and Engagement results Using the Engagement class simulation model (명중률과 교전결과의 상관관계분석을 통한 개인화기 성능개선비용 추정 : 교전급 분석모델을 중심으로)

  • TaeKyeom Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.289-295
    • /
    • 2024
  • This study analyzes the correlation between the accracy of rifle and the result of engagement. And estimates the improvement cost of the rifle accordingly. For this experiment, an engagement class simulation model(AWAM: Army Weapon Effectiveness Analysis Model) was used. We also selected the rifle, which is a portable weapon for the experiment. Prior to this experiment, we conducted a reliability test(VV&A: Verification, Validation and Accreditation) on the model. The VV&A process is mainly done during the development of the DM&S model, which is also necessary for the operation of the M&S. We confirmed the need for VV&A during the experiment and obtained reliable experimental results using the corrected values. In the Accuracy Experiment we found that the 20% improvement is the most effective. And we were able to estimate the cost of acquiring a rifle with a 20% higher accuracy. The cost was estimated by simple regression analysis based on the price of the current rifle. Through this study, we could know the impact of the accuracy of rifle on the experimental results and estimate the cost of improved rifle.

Expression Analysis of Oryza sativa Ascorbate Peroxidase 1 (OsAPx1) in Response to Different Phytohormones and Pathogens (벼 ascobate peroxidase 단백질의 병원균 및 식물호르몬에 대한 발현 분석)

  • Wang, Yiming;Wu, Jingni;Choi, Young Whan;Jun, Tae Hwan;Kwon, Soon Wook;Choi, In Soo;Kim, Yong Chul;Gupta, Ravi;Kim, Sun Tae
    • Journal of Life Science
    • /
    • v.25 no.10
    • /
    • pp.1091-1097
    • /
    • 2015
  • We have isolated and characterized an ascorbate peroxidase (APx) gene, OsAPx1 from rice. Northern and Western blot analyses indicated that at young seedling stage, OsAPx1 mRNA was expressed highly in root, shoot apical meristem (SAM) and leaf sheath than leaf. In mature plant, OsAPx1 gene expressed highly in root, stem and flower but weakly in leaf. OsAPx1 gene and protein expression level was induced in leaves inoculated with Magnaporthe oryzae (M. oryzae) and Xanthomonas oryzae pv. oryzae (Xoo). Phytohormones treatment showed that OsAPx1 was up-regulated by jasmonic acid (JA), but was down regulated by ABA and SA co-treatments with JA, resulting that they have antagonistic effect on pathogen responsive OsAPx1 expression. Phylogenetic analysis illustrated that Arabidopsis AtAPx1 has a close relationship with OsAPx1. In AtAPx1 knock out lines, the accumulation of O2- and H2O2 are all highly detected than wild type, revealing that the high concentration of exogenous H2O2 cause the intercellular superoxide anion and hydrogen peroxide accumulation in AtAPx1 knockout plant. These results suggested that OsAPx1 gene may be associated with the pathogen defense cascades as the mediator for balancing redox state by acting ROS scavenger and is associated with response to the pathogen defense via Jasmonic acid signaling pathway.

Sports Injuries in College Taekwondo Players: Retrospective Analysis of 47 Players (대학 태권도 선수들에서의 스포츠 손상: 47명에 대한 후향적 연구)

  • Jung, Hong-Geun;Park, Hee-Gon;Kim, Jong-Phil;Kim, You-Jin;Kim, Ki-Choul;Kim, Young-In;Lee, Sang-Min
    • Journal of Korean Orthopaedic Sports Medicine
    • /
    • v.5 no.1
    • /
    • pp.69-74
    • /
    • 2006
  • Purpose: To perform the retrospective analysis of the sports injuries sustained by the college Taekwondo athletes in the respect of the injury patterns, mechanism of injury and clinical outcome Materials and Methods: This study is based on 47 out of 49 college Takwondo athletes, who had experienced the Takwondo related musculoskeletal injuries severe enough to visit the clinic for medical treatment. The mean age at the time of injury was 18.8 years and 39 were males and 8 females. The Taekwondo career was average 9.6 years and the injuries were sustained at average 6.7 years of their career. The injuries were analyzed by the detailed interview with thorough physical examination. Results: Forty-seven Taekwondo athletes in the study experienced average 1.8 injury/person (total 85 cases) with 26 persons of one time experience(55.3%), 11 persons of 2 times(23.4%),4 persons of 3 times (8.5%),5 persons of 4 times (10.6%) and 1 person of 5 times (2.2%). Injuries occurred during training in 50 cases (58.8%), while during match in 35 cases (41.2%). Injuries occurred during the attack phase of the match are 26 cases (31.7%) while 49 cases (57.6%) during the defense phase. As for the pattern of injury, fracture was the most common with 49 cases (57.6%), followed by ligament injury with 21 cases (24.7%). The upper extremity injuries were 32 cases (37.7%) while the lower extremity injuries were 44 cases (51.8%) Mode of medical treatment were operation in 15cases(17.7%), cast in 21 cases(24.7%), splint in 33 cases (38.8%), physical therapy in 15cases(17.7%) and acupuncture in 1 case(1.1%) Conclusion: Almost all the college Taekwondo athletes (96%) experienced sports injuries severe enough to receive medical treatments with the fracture being the most common injury pattern. The injuries occurred more commonly during the defense phase of the competition.

  • PDF

Security Measures against Assembly and Demonstration during International Conference - the Case of the Nuclear Security Summit - (국제회의 시 집회시위에 관한 안전관리 방안 - 핵 안보정상회의 개최를 중심으로 -)

  • Lee, Sun-Ki
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.193-222
    • /
    • 2011
  • Our country successfully hosted the G20 summit in Seoul in November, 2010. Afterwards, however, the Yeonpyungdo shelling incident took place by the North, and the North Korean nuclear issue have strained interKorean relations. Our country is going to host the nuclear security summit, which is of great significance at this point of time. The nuclear security summit is to be attended by 47 countries. The participant countries of this summit is larger in number than those of the ASEM, APEC and the G20 summit that our country has ever hosted. That is a large-scale international conference that invites the UN, the IAEA and the EU, which are three major nuclear-related international organizations. A successful hosting of the nuclear security summit will serve as an opportunity to boost our country's national prestige, and is likely be beneficial to the settlement of the North Korean nuclear issue. Like other international submits in foreign countries, however, violent anti-globalization demonstrations are expected to occur when the nuclear security summit is held in April next year. The purpose of this study was to make a case analysis of demonstrations during multilateral international conferences hosted by foreign countries over ten years between 1999 and 2009, to examine the controversial points over the demonstrations, and ultimately to seek ways of ensuring safety against possible assemblies and demonstrations during the forthcoming nuclear security summit, which is scheduled to be held in April next year. The findings of the study on feasible security measures are as follows: First, information and intelligence gathering should be reinforced, and the inspection should be stepped up. Second, pacification among domestic NGOs and the supplementation of the existing legal devices are required. Third, publicity should be strengthened. Fourth, riot police officers should be selected as early as possible to bolster their education and training, and more reinforced emergency measures should be taken. It's needed to seek assistance from the military as one of emergency measures, and national defense readiness should be bolstered across the nation in collaboration with the Ministry of National Defense when the summit is near at hand. Finally, CBR countermeasures should be taken in preparation for CBR terrorism.

  • PDF

Analyzing Research Trends in Blockchain Studies in South Korea Using Dynamic Topic Modeling and Network Analysis (다이나믹 토픽모델링 및 네트워크 분석 기법을 통한 블록체인 관련 국내 연구 동향 분석)

  • Kim, Donghun;Oh, Chanhee;Zhu, Yongjun
    • Journal of the Korean Society for information Management
    • /
    • v.38 no.3
    • /
    • pp.23-39
    • /
    • 2021
  • This study aims to explore research trends in Blockchain studies in South Korea using dynamic topic modeling and network analysis. To achieve this goal, we conducted the university & institute collaboration network analysis, the keyword co-occurrence network analysis, and times series topic analysis using dynamic topic modeling. Through the university & institute collaboration network analysis, we found major universities such as Soongsil University, Soonchunhyang University, Korea University, Korea Advanced Institute of Science and Technology (KAIST) and major institutes such as Ministry of National Defense, Korea Railroad Research Institute, Samil PricewaterhouseCoopers, Electronics and Telecommunications Research Institute that led collaborative research. Next, through the analysis of the keyword co-occurrence network, we found major research keywords including virtual assets (Cryptocurrency, Bitcoin, Ethereum, Virtual currency), blockchain technology (Distributed ledger, Distributed ledger technology), finance (Smart contract), and information security (Security, privacy, Personal information). Smart contracts showed the highest scores in all network centrality measures showing its importance in the field. Finally, through the time series topic analysis, we identified five major topics including blockchain technology, blockchain ecosystem, blockchain application 1 (trade, online voting, real estate), blockchain application 2 (food, tourism, distribution, media), and blockchain application 3 (economy, finance). Changes of topics were also investigated by exploring proportions of representative keywords for each topic. The study is the first of its kind to attempt to conduct university & institute collaboration networks analysis and dynamic topic modeling-based times series topic analysis for exploring research trends in Blockchain studies in South Korea. Our results can be used by government agencies, universities, and research institutes to develop effective strategies of promoting university & institutes collaboration and interdisciplinary research in the field.

An Investigation on the Periodical Transition of News related to North Korea using Text Mining (텍스트마이닝을 활용한 북한 관련 뉴스의 기간별 변화과정 고찰)

  • Park, Chul-Soo
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.3
    • /
    • pp.63-88
    • /
    • 2019
  • The goal of this paper is to investigate changes in North Korea's domestic and foreign policies through automated text analysis over North Korea represented in South Korean mass media. Based on that data, we then analyze the status of text mining research, using a text mining technique to find the topics, methods, and trends of text mining research. We also investigate the characteristics and method of analysis of the text mining techniques, confirmed by analysis of the data. In this study, R program was used to apply the text mining technique. R program is free software for statistical computing and graphics. Also, Text mining methods allow to highlight the most frequently used keywords in a paragraph of texts. One can create a word cloud, also referred as text cloud or tag cloud. This study proposes a procedure to find meaningful tendencies based on a combination of word cloud, and co-occurrence networks. This study aims to more objectively explore the images of North Korea represented in South Korean newspapers by quantitatively reviewing the patterns of language use related to North Korea from 2016. 11. 1 to 2019. 5. 23 newspaper big data. In this study, we divided into three periods considering recent inter - Korean relations. Before January 1, 2018, it was set as a Before Phase of Peace Building. From January 1, 2018 to February 24, 2019, we have set up a Peace Building Phase. The New Year's message of Kim Jong-un and the Olympics of Pyeong Chang formed an atmosphere of peace on the Korean peninsula. After the Hanoi Pease summit, the third period was the silence of the relationship between North Korea and the United States. Therefore, it was called Depression Phase of Peace Building. This study analyzes news articles related to North Korea of the Korea Press Foundation database(www.bigkinds.or.kr) through text mining, to investigate characteristics of the Kim Jong-un regime's South Korea policy and unification discourse. The main results of this study show that trends in the North Korean national policy agenda can be discovered based on clustering and visualization algorithms. In particular, it examines the changes in the international circumstances, domestic conflicts, the living conditions of North Korea, the South's Aid project for the North, the conflicts of the two Koreas, North Korean nuclear issue, and the North Korean refugee problem through the co-occurrence word analysis. It also offers an analysis of South Korean mentality toward North Korea in terms of the semantic prosody. In the Before Phase of Peace Building, the results of the analysis showed the order of 'Missiles', 'North Korea Nuclear', 'Diplomacy', 'Unification', and ' South-North Korean'. The results of Peace Building Phase are extracted the order of 'Panmunjom', 'Unification', 'North Korea Nuclear', 'Diplomacy', and 'Military'. The results of Depression Phase of Peace Building derived the order of 'North Korea Nuclear', 'North and South Korea', 'Missile', 'State Department', and 'International'. There are 16 words adopted in all three periods. The order is as follows: 'missile', 'North Korea Nuclear', 'Diplomacy', 'Unification', 'North and South Korea', 'Military', 'Kaesong Industrial Complex', 'Defense', 'Sanctions', 'Denuclearization', 'Peace', 'Exchange and Cooperation', and 'South Korea'. We expect that the results of this study will contribute to analyze the trends of news content of North Korea associated with North Korea's provocations. And future research on North Korean trends will be conducted based on the results of this study. We will continue to study the model development for North Korea risk measurement that can anticipate and respond to North Korea's behavior in advance. We expect that the text mining analysis method and the scientific data analysis technique will be applied to North Korea and unification research field. Through these academic studies, I hope to see a lot of studies that make important contributions to the nation.

The relationship of the office given condition of the country important facility private security and job satisfaction degree (국가중요시설 경비원의 직무여건과 직무만족도의 관계)

  • Son, Ki-Ho
    • Korean Security Journal
    • /
    • no.33
    • /
    • pp.103-135
    • /
    • 2012
  • The object is that this research searches the relationship of the office given condition actual condition of the country important facility private security guard and job satisfaction degree. In order to grasp and analyze the real state of the country important facility private security guards directly, the questionnaire, that is the general measurement tool, was utilized and the guard whom it works in the airport, the port region and general work place, that is the national important facility of Busan and Ulsan area, was aimed at. The enough survey object was illustrated to the facility and person in charge in the security company and the item was previewed and the total 400 sheets was distributed and 331 sheets (82.8%) except the doubleness subject intention and incongruent questionnaire was utilized for the analysis. The statistic processing of collected data utilized the SPSS version 15.0 the statistical package program through data coding and cleaning process and performed the frequency analysis, reliability analysis, t-test, one way analysis of variance, Pearson analysis, and regression analysis. The relationship of the office given condition actual condition of the guard about the national important facility and job satisfaction degree was classified into the interpersonal relationship, task characteristic, office environment, and complement factor and the difference of the job satisfaction degree according to the general characteristic was verified. If the conclusion obtained through the method of study described in the above looked at, for as to general tendency, the low wages and poor field environment was continued. In the general characteristic, the man was higher than the excitation about the job satisfaction level. As there was lots of the age and the scholarship was low, the age was high. And as there was lots of the career and income, the police of a petition or search and guide staff was high and the job satisfaction degree in which relatively the employee and the other job group is high so that the case of being the former student incidence can be the poorest was shown rather than the facility security agent. As the interrelation analysis result job satisfaction was high, the change of occupation pseudo was low and the organizational commitment degrees was increased. The regression analysis result job satisfaction degree was exposed to reach the meaningful effect on the change of occupation pseudo and organizational commitment. It had an effect on the change of occupation pseudo as the task characteristic and office ambient level was low. It had an effect on the organizational commitment as the extend of satisfaction about the task characteristic and interpersonal relationship, complement, and office ambient level were high. If the research result of this time is integrated, the support of the political system including the interpersonal relationship thesis between top and bottom of the organized I and substantial complement actualization is urgently needed between the office given condition improvement effort in the country important facility defense manpower field and police of a petition and special guard.

  • PDF

Vulnerability Analysis for Industrial Control System Cyber Security (산업제어시스템의 사이버보안을 위한 취약점 분석)

  • Kim, Do-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.1
    • /
    • pp.137-142
    • /
    • 2014
  • Industrial control system (ICS) is a computer based system which are typically used in nation-wide critical infra-structure facilities such as electrical, gas, water, wastewater, oil and transportation. In addition, ICS is essentially used in industrial application domain to effectively monitor and control the remotely scattered systems. The highly developed information technology (IT) and related network techniques are continually adapted into domains of industrial control system. However, industrial control system is confronted significant side-effects, which ICS is exposed to prevalent cyber threats typically found in IT environments. Therefore, cyber security vulnerabilities and possibilities of cyber incidents are dramatically increased in industrial control system. The vulnerabilities that may be found in typical ICS are grouped into Policy and Procedure, Platform, and Network categories to assist in determining optimal mitigation strategies. The order of these vulnerabilities does not necessarily reflect any priority in terms of likelihood of occurrence or severity of impact. Firstly, corporate security policy can reduce vulnerabilities by mandating conduct such as password usage and maintenance or requirements for connecting modems to ICS. Secondly, platfom vulnerabilities can be mitigated through various security controls, such as OS and application patching, physical access control, and security software. Thirdly, network vulnerabilities can be eliminated or mitigated through various security controls, such as defense-in-depth network design, encrypting network communication, restricting network traffic flows, and providing physical access control for network components.

Development of C2 Virtual Linked Simulator For Engineering and Engagement Level Battle Experimentation (공학-교전급 전투실험을 위한 C2 가상모의 연동 시뮬레이터 개발)

  • Lee, Sangtae;Lee, Seungyoung;Hwang, Kun-Chul;Kim, Saehwan;Lee, Kyuhyun
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.4
    • /
    • pp.11-19
    • /
    • 2013
  • The Korean naval weapon systems, combat experiments establish the concept of Battle operations, and create the future of the new weapons system. Doctrine development and training as well as ranging from experiments for evaluate the performance of mission operations for combat experiments are used. The battle lab is effectively support tool for the Korean Naval battle experiments. The battle lab is through a dedicated testing facility and to build efficient and effective simulation-based acquisition supporting environment. In this paper, the ship / submarines C2 operations virtual simulator was developed to support the concept of Battle operations of naval combat experiments in training and tactical development. The ship C2 operations virtual simulator makes the anti-ship and anti-aircraft the engagement scenario for performed experiments using the SADM. The submarines C2 operations virtual simulator makes the anti-submarine engagement scenario for performed experiments using EAS. EAS System was created before reuse. EAS system by modifying the additional interfaces HLA-RTI has been reused. Reflected in the tactics and training after analysis of the results through the battle experiment. Also increase training fidelity through operator involvement. The anti-ship and anti-aircraft system architecture (SADM) and anti-submarine system architecture (EAS) requires unique design of system framework since two separate architectures should be integrated into a system. An C2 virtual linked architecture was used to integrate different system architecture. A C2 virtual linked software framework, designed that have integrated protocol for battle experimental linkage and battlefield visualization environment.

Proposal of a Hypothesis Test Prediction System for Educational Social Precepts using Deep Learning Models

  • Choi, Su-Youn;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.9
    • /
    • pp.37-44
    • /
    • 2020
  • AI technology has developed in the form of decision support technology in law, patent, finance and national defense and is applied to disease diagnosis and legal judgment. To search real-time information with Deep Learning, Big data Analysis and Deep Learning Algorithm are required. In this paper, we try to predict the entrance rate to high-ranking universities using a Deep Learning model, RNN(Recurrent Neural Network). First, we analyzed the current status of private academies in administrative districts and the number of students by age in administrative districts, and established a socially accepted hypothesis that students residing in areas with a high educational fever have a high rate of enrollment in high-ranking universities. This is to verify based on the data analyzed using the predicted hypothesis and the government's public data. The predictive model uses data from 2015 to 2017 to learn to predict the top enrollment rate, and the trained model predicts the top enrollment rate in 2018. A prediction experiment was performed using RNN, a Deep Learning model, for the high-ranking enrollment rate in the special education zone. In this paper, we define the correlation between the high-ranking enrollment rate by analyzing the household income and the participation rate of private education about the current status of private institutes in regions with high education fever and the effect on the number of students by age.