• Title/Summary/Keyword: Defense Analysis

Search Result 2,928, Processing Time 0.032 seconds

A Study on the Underwater Channel Model based on a High-Order Finite Difference Method using GPUs (그래픽 프로세서를 이용한 고차 유한 차분식 기반 수중채널모델 연구)

  • Bae, Ho Seuk;Kim, Won-Ki;Son, Su-Uk;Ha, Wansoo
    • Journal of the Korea Society for Simulation
    • /
    • v.30 no.1
    • /
    • pp.11-20
    • /
    • 2021
  • As unmanned underwater systems have recently emerged, a high-speed underwater channel modeling technique, which is one of the most important techniques in the system, has received a lot of attention. In this paper, we proposed a high-speed sound propagation model and verified the applicability through quantitative performance analyses. We used a high-order finite difference method (FDM) for wave propagation modeling in the water, and a domain decomposition method was adopted using multiple general-purpose graphics processing units (GPUs) to increase the calculation efficiency. We compared the results of the model we proposed with the analytic solution in the half-infinite media and results of the Virtual Timeseries Experiment (VirTEX) model, which is based on the ray method. Finally, we analyzed the performance of the model quantitatively using numerical examples. Through quantitative analyses of the improvement in computational performance, we confirmed that the computational speed increases linearly as the number of GPUs increases. The computation times are increased by 2 times and 8 times, respectively, when the domain size of computation and the maximum frequency are doubled. We expect that the proposed high-speed underwater channel modeling technique is able to contribute to the enhancement of national defense as an underwater communication channel model and analysis tool to develop the underwater communication technique for the unmanned underwater system.

The Problem of Military Sexual Violence by Hierarchy: Focusing on the Contents of Media Articles (위계에 의한 군 성폭력의 문제점 -언론 기사 내용을 중심으로-)

  • Kim, Seon-Nyeo
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.1
    • /
    • pp.85-92
    • /
    • 2022
  • In order to identify the factors and problems in which military sexual violence is a continuous and repeated blind spot, this study conducted a content analysis focusing on articles of military sexual violence incidents covered in Internet news from January 2010 to June 15, 2021. carried out. As a result of the study, structurally unequal power relations, authoritarian and closed military organizational culture, internal military response system that is distrustful of passive responses to sexual violence, and enveloping family-friendly investigations and tolerant punishment of perpetrators are blind spots despite the Ministry of National Defense's efforts to improve. factors that exist. Underlying this, the compensatory spirit caused by the conscription system and the negative effects of the patriarchal system are embodied in the national sentiment, suggesting that the sense of crisis of division and an overly permissive attitude toward the military act as a factor that slows change. As an improvement plan according to the results, it is necessary to entail the establishment of a civilian-centered judicial institution, strong punishment of perpetrators, and limited pension payment, as well as honorable punishment such as 'class demotion' in the military culture with a clear hierarchical relationship. Taken together, we can see that most military sexual violence is caused by a hierarchy, and it strongly suggests that the main cause of sexual violence is unequal power relations.

Stiffness Improvement of Timing Belt in Power Transmission (동력전달용 타이밍벨트의 강성 개선)

  • Lee, Kyeong-Yeon;Byun, Kyung-Seok
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.23 no.1
    • /
    • pp.1-7
    • /
    • 2022
  • As a power transmission element, the timing belt is a toothed transmission belt that takes advantages of V-belts and gears. It has characteristics of non-slip and low noise. It is used as a power transmission device when transmitting power from a rotating shaft or linear motion in a mechanism. Rotation can be accurately transmitted through a belt pulley with grooves like a gear and a timing belt with grooves to precisely match with the belt pulley. In particular, in the mechanism in which the timing belt is used for the output shaft, the dynamic characteristics including the rigidity of the timing belt determine the transmission characteristics of the system, so its importance increases. In this paper, a stiffness reinforced belt that can be applied to a timing belt with a limited range of motion to increase its stiffness is proposed. To study the dynamic characteristics of the stiffness reinforced belt, the equation of motion for the stiffness reinforced belt was established, and a simulation model for the stiffness reinforced belt was created and analyzed. In order to confirm the analysis results of the motion equation and simulation model, a 1-axis rotation experimental equipment using a stiffness reinforcing belt was developed and the experiment was conducted. Through motion equations, simulation models, and experiment results, it was confirmed that the stiffness and dynamic characteristics of the timing belt could be improved by applying the proposed stiffness reinforcement belt.

The Effect of Ratee Accountability on Behavioral Change Intention in Multi-Rater Performance Appraisal System (피평가자의 외적책임감이 행위변화 의도에 미치는 영향: 다면평가 상황을 중심으로)

  • Rhee, Seung-Yoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.4
    • /
    • pp.99-107
    • /
    • 2021
  • To establish an effective performance appraisal system, ratee accountability is essential because it increases the likelihood of meaningful utilization of performance appraisal feedback. In the context of a multi-rater performance appraisal system, this study examines the effect of the ratee general accountability and accountability to the supervisor and peers on the ratee's intention to change behavior based on the performance appraisal feedback. This study further explored the moderating effect of perceived feedback specificity on the relationship between the ratee accountability and behavioral change intention. Hierarchical multiple regression analysis was conducted using the survey data from 153 employees in eight firms with multi-rater performance appraisal systems. The results showed that ratee general accountability was positively associated with the intention to change behavior. Furthermore, perceived feedback specificity attenuated the positive relationship between the ratee general accountability and behavioral change intention, which was the opposite of the hypothesized direction. The findings indicate the importance of managing and facilitating ratee accountability for implementing a multi-rater performance appraisal system. The result also emphasizes the critical role that performance appraisal feedback plays in motivating performance improvement by providing flexible, constructive advice and behavioral change strategies instead of inducing self-defense or justification.

A phenomenological study on the dream insight process of intern counselor -Based on Dream Integrated Art Therapy- (인턴상담자의 꿈 통찰 과정에 관한 현상학적 연구 -꿈통합예술치료를 기반으로-)

  • Kwon, Hye-Jin;Shin, Dong-Yeol
    • Industry Promotion Research
    • /
    • v.7 no.4
    • /
    • pp.53-61
    • /
    • 2022
  • This study is a phenomenological study on the dream insight process of intern counselors. The purpose of this study is to promote growth as a professional counselor based on the process of giving meaning to and recognizing their experiences through insight into the unconscious. Therefore, we used dream-integrated art therapy to have a process of recognizing unconscious dreams that clearly express expectations for oneself, others, and the world, and to explore this process more flexibly. The research participants selected three students enrolled in the master's and doctor's courses from among the applicants who applied through public relations and adopted the phenomenological Giorgi research method for data collection and analysis through in-depth interviews with the research participants. The main research results are as First, the intern counselors had a motive for wanting their own unconscious insight through dream-integrated art therapy and were able to gain insight into the problems revealed in their unconscious through dreams, music, and art media. Second, it was found that the intern counselors felt a deepening of concentration and comfort through recent dreams, music, and art media in common. Third, as a defense mechanism that was revealed without the combination of dream integrated art therapy, the avoidance tendency of not wanting to reveal oneself was common, but this showed a gradual decrease. Fourth, it was reported that intern counselors gained flexibility for themselves about the future growth direction had an opportunity to accept themselves, and had a plan for the future direction to become professional counselors. Therefore, it is suggested that follow-up studies using various media, studies to verify the effectiveness of the dream integration program, and various case studies are necessary.

Study on Dimension Reduction algorithm for unsupervised clustering of the DMR's RF-fingerprinting features (무선단말기 RF-fingerprinting 특징의 비지도 클러스터링을 위한 차원축소 알고리즘 연구)

  • Young-Giu Jung;Hak-Chul Shin;Sun-Phil Nah
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.83-89
    • /
    • 2023
  • The clustering technique using RF fingerprint extracts the characteristic signature of the transmitters which are embedded in the transmission waveforms. The output of the RF-Fingerprint feature extraction algorithm for clustering identical DMR(Digital Mobile Radios) is a high-dimensional feature, typically consisting of 512 or more dimensions. While such high-dimensional features may be effective for the classifiers, they are not suitable to be used as inputs for the clustering algorithms. Therefore, this paper proposes a dimension reduction algorithm that effectively reduces the dimensionality of the multidimensional RF-Fingerprint features while maintaining the fingerprinting characteristics of the DMRs. Additionally, it proposes a clustering algorithm that can effectively cluster the reduced dimensions. The proposed clustering algorithm reduces the multi-dimensional RF-Fingerprint features using t-SNE, based on KL Divergence, and performs clustering using Density Peaks Clustering (DPC). The performance analysis of the DMR clustering algorithm uses a dataset of 3000 samples collected from 10 Motorola XiR and 10 Wintech N-Series DMRs. The results of the RF-Fingerprinting-based clustering algorithm showed the formation of 20 clusters, and all performance metrics including Homogeneity, Completeness, and V-measure, demonstrated a performance of 99.4%.

Study on security framework for cyber-hacking control facilities (제어시설 사이버공격 대응을 위한 사이버보안 프레임워크 (Framework) 연구)

  • Lee, Sang-Do;Shin, Yongtae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.4
    • /
    • pp.285-296
    • /
    • 2018
  • Among many hacking attempts carried out in the past few years, the cyber-attacks that could have caused a national-level disaster were the attacks against nuclear facilities including nuclear power plants. The most typical one was the Stuxnet attack against Iranian nuclear facility and the cyber threat targeting one of the facilities operated by Korea Hydro and Nuclear Power Co., Ltd (Republic of Korea; ROK). Although the latter was just a threat, it made many Korean people anxious while the former showed that the operation of nuclear plant can be actually stopped by direct cyber-attacks. After these incidents, the possibility of cyber-attacks against industrial control systems has become a reality and the security for these systems has been tightened based on the idea that the operations by network-isolated systems are no longer safe from the cyber terrorism. The ROK government has established a realistic control systems defense concept and in the US, the relevant authorities have set up several security frameworks to prepare for the threats. This paper presented various cyber security attack cases and their scenarios against control systems, along with the analysis of countermeasures for them. Though this task, we attempt to identify the items that need to be considered when designing a domestic security framework to improve security and secure stability.

Homogenization of Plastic Behavior of Metallic Particle/Epoxy Composite Adhesive for Cold Spray Deposition (저온 분사 공정을 위한 금속입자/에폭시 복합재료 접착제의 소성 거동의 균질화 기법 연구)

  • Yong-Jun Cho;Jae-An Jeon;Kinal Kim;Po-Lun Feng;Steven Nutt;Sang-Eui Lee
    • Composites Research
    • /
    • v.36 no.3
    • /
    • pp.199-204
    • /
    • 2023
  • A combination of a metallic mesh and an adhesive layer of metallic particle/epoxy composite was introduced as an intermediate layer to enhance the adhesion between cold-sprayed particles and fiber-reinforced composites (FRCs). Aluminum was considered for both the metallic particles in the adhesive and the metallic mesh. To predict the mechanical characteristics of the intermediate bond layer under a high strain rate, the properties of the adhesive layer needed to be calculated or measured. Therefore, in this study, the Al particle/epoxy adhesive was homogenized by using a rule of mixture. To verify the homogenization, the penetration depth, and the thickness decrease after the cold spray deposition from the undeformed surface, was monitored with FE analysis and compared with experimental observation. The comparison displayed that the penetration depth was comparable to the diameters of one cold spray particle, and thus the homogenization approach can be reasonable for the prediction of the stress level of particulate polymer composite interlayer under a high strain rate for cold spray processing.

A Study on the Analysis and the Direction of Improvement of the Korean Military C4I System for the Application of the 4th Industrial Revolution Technology (4차 산업혁명 기술 적용을 위한 한국군 C4I 체계 분석 및 성능개선 방향에 관한 연구)

  • Sangjun Park;Jee-won Kim;Jungho Kang
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.131-141
    • /
    • 2022
  • Future battlefield domains are expanding to ground, sea, air, space, and cyber, so future military operations are expected to be carried out simultaneously and complexly in various battlefield domains. In addition, the application of convergence technologies that create innovations in all fields of economy, society, and defense, such as artificial intelligence, IoT, and big data, is being promoted. However, since the current Korean military C4I system manages warfighting function DBs in one DB server, the efficiency of combat performance is reduced utilization and distribution speed of data and operation response time. To solve this problem, research is needed on how to apply the 4th industrial revolution technologies such as AI, IoT, 5G, big data, and cloud to the Korean military C4I system, but research on this is insufficient. Therefore, this paper analyzes the problems of the current Korean military C4I system and proposes to apply the 4th industrial revolution technology in terms of operational mission, network and data link, computing environment, cyber operation, interoperability and interlocking capabilities.

Transcriptomic Profile in Pear Leave with Resistance Against Venturia nashicola Infection (배 검은별무늬병 감염과 저항성 방어반응 연관 전사체 프로파일)

  • Il Sheob Shin;Jaean Chun;Sehee Kim;Kanghee Cho;Kyungho Won;Haewon Jung;Keumsun Kim
    • Proceedings of the Plant Resources Society of Korea Conference
    • /
    • 2022.09a
    • /
    • pp.36-36
    • /
    • 2022
  • The molecular understanding of resistance and susceptibility of host plants to scab, a most threatful disease to pome fruit production worldwide, is very limited. Comparing resistant line '93-3-98' to susceptible one 'Sweet Skin' at seven time points of 0, 0.5, 1, 2, 3, 4, 8 days post inoculation, RNA-sequencing data derived from infected and mock-inoculated young leaves were analyzed to evaluate the tolerant response and to mine candidate genes of pear to the scab pathogen Venturia nashicola. Analysis of the mapped reads showed that the infection of V. nashicola led to significant differential expression of 17,827 transcripts with more than 3-fold change in the seven pairs of libraries, of which 9,672 (54%) are up- and 8,155(46%) are down-regulated. These included mainly receptor (NB-ARC domains-containing, CC-NBS-LRR, TIR-NBS-LRR, seven transmembrane MLO family protein) and transcription factor (ethylene responsive element binding, WRKY DNA-binding protein) related gene. An arsenal of defense response of highly resistant pear accessions derived from European pear was probably supposed no sooner had V. nashicola infected its host than host genes related to disease suppression like Polyketide cyclase/dehydrase and lipid transport protein, WRKY family transcription factor, lectin protein kinase, cystein-rich RLK, calcium-dependent phospholipid-binding copine protein were greatly boosted and eradicated cascade reaction induced by pathogen within 24 hours. To identify transcripts specifically expressed in response to V. nashicola, RT-PCRs were conducted and compare to the expression patterns of seven cultivars with a range of highly resistant to highly susceptible symptom. A DEG belonging to the PR protein family genes that were higher expressed in response to V. nashicola suggesting extraordinary role in the resistance response were led to the identification. This study provides the first transcriptional profile by RNA-seq of the host plant during scab disease and insights into the response of tolerant pear plants to V. nashicola.

  • PDF