• Title/Summary/Keyword: Defense IT Policy

Search Result 280, Processing Time 0.027 seconds

A Test for Nonlinear Causality and Its Application to Money, Production and Prices (통화(通貨)·생산(生産)·물가(物價)의 비선형인과관계(非線型因果關係) 검정(檢定))

  • Baek, Ehung-gi
    • KDI Journal of Economic Policy
    • /
    • v.13 no.4
    • /
    • pp.117-140
    • /
    • 1991
  • The purpose of this paper is primarily to introduce a nonparametric statistical tool developed by Baek and Brock to detect a unidirectional causal ordering between two economic variables and apply it to interesting macroeconomic relationships among money, production and prices. It can be applied to any other causal structure, for instance, defense spending and economic performance, stock market index and market interest rates etc. A key building block of the test for nonlinear Granger causality used in this paper is the correlation. The main emphasis is put on nonlinear causal structure rather than a linear one because the conventional F-test provides high power against the linear causal relationship. Based on asymptotic normality of our test statistic, the nonlinear causality test is finally derived. Size of the test is reported for some parameters. When it is applied to a money, production and prices model, some evidences of nonlinear causality are found by the corrected size of the test. For instance, nonlinear causal relationships between production and prices are demonstrated in both directions, however, these results were ignored by the conventional F-test. A similar results between money and prices are obtained at high lag variables.

  • PDF

Anti-Inflammatory Effect of Ixeris dentata on Ultraviolet B-Induced HaCaT Keratinocytes

  • Kim, Sung-Bae;Kang, Ok-Hwa;Keum, Joon-Ho;Mun, Su-Hyun;An, Hyun-Jin;Jung, Hyun-Ju;Hong, Seung-Heon;Jeong, Dong-Myong;Kweon, Kee-Tae;Kwon, Dong-Yeul
    • Natural Product Sciences
    • /
    • v.18 no.1
    • /
    • pp.60-66
    • /
    • 2012
  • Human skin is the first line of defense for the protection of the internal organs of the body from different stimuli. Ultraviolet B (UVB) irradiation induces skin damage and inflammation through the secretion of various cytokines, which are immune regulators produced by cells. To prevent the initiation of skin inflammation, keratinocytes that have been irreversibly damaged by radiation must be removed through the apoptotic mechanism. Ixeris dentata (family: Asteraceae) is a perennial medicinal herb indigenous to Korea. It has been used in Korea, China, and Japan to treat in digestion, pneumonia, diabetes, hepatitis, and tumors. To gain insight into the anti-inflammatory effects of I. dentata, we examined its influence on UVB-induced pro-inflammatory cytokine production in human keratinocytes (HaCaT cells), by observing cells that were stimulated with UVB in the presence or absence of I. dentata. In the present study, pro-inflammatory cytokine production was determined by performing enzyme-linked immunosorbent assay, reverse transcription polymerase chain reaction, and western blot analysis to measure the activation of mitogen-activated protein kinase (MAPKs). I. dentata inhibited UVBinduced production of the pro-inflammatory cytokine interleukin (IL)-6 in a dose-dependent manner. Further, I. dentata inhibited the UVB-induced expression of cyclooxygenase (COX)-2. Furthermore, I. dentata inhibited the phosphorylation of c-Jun NH2-terminal kinase and p38 MAPKs, suggesting that it inhibits the secretion of the pro-inflammatory cytokines IL-6 and IL-8, and COX-2 expression, by blocking MAPK phosphorylation. These results suggest that I. dentate can potentially protect against UVB-induced skin inflammation.

Effects of Virtual Reality Images on Body Stability : Focused on Hand Stability (VR 영상이 신체 안정성에 미치는 영향 : 손 안정성을 중심으로)

  • Han, Seung Jo;Kim, Sun-Uk;Koo, Kyo-Chan;Lee, Kyun-Joo;Cho, Min-Su
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.391-400
    • /
    • 2017
  • The purpose of this paper is to present the effect of image stimulation on body stability as a conceptual model and to investigate the effect of image stimulus(2D, VR) on body stability(hand stability) through experiments Recently, stereoscopic images such as virtual and augmented reality are combined with smart phones and exercise equipments, and the diffusion is becoming active. The possibility of a safety accident or human error is also increasing as it temporarily affects the balance of the body and hand stability after the image stimulus is removed. The conceptual model is presented based on the results of previous studies. Based on the experimental results, the conceptual model has been explained in combination with the human information processing process and cognitive resource models that take place in the brain. Twenty subjects were exposed to 2D and VR stimuli, and display fatigue was measured by cybersickness questionnaire and hand stability by hand steadiness tester. Experimental results show that VR images induce higher display fatigue and lower hand stability than 2D. In this study, it is meaningful that hand stability according to image type and display fatigue level which have not been tried yet is revealed through conceptual model and experiment.

Desirable Suggestions for Korean Geo-technology R&D through Analysis of the Global Grand Challenges and Moonshot Projects (글로벌 과학난제 도전연구프로젝트 분석을 통한 우리나라 지질자원기술에의 바람직한 제언)

  • Kim, Seong-Yong;Sung, Changmo
    • Economic and Environmental Geology
    • /
    • v.53 no.1
    • /
    • pp.111-120
    • /
    • 2020
  • Remarkable scientific and technological achievements are mainly shown in the 'super-convergence' or 'convergence of convergence' among cross- disciplinary fields, and advanced countries are promoting the 'high-risk, high-return research' ecosystem. Google LLC is carrying out numerous new challenges in terms of a non-failure perspective. Innovative research by the US Defense Advanced Research Projects Agency (DARPA) has produced such breakthroughs as the Internet, GPS, semiconductors, the computer mouse, autonomous vehicles, and drones. China is pioneering a 'Moon Village' and planning the world's largest nuclear fusion energy and ultra-large particle accelerator project. Japan has also launched 'the moonshot technology development research system' to promote disruptive innovation. In Korea, the government is preparing a new research program to tackle the global scientific challenges. Therefore, it is necessary to determine the reasonable geoscientific challenges to be addressed and to conduct a preliminary study on these topics. For this purpose, it is necessary to conduct long-term creative research projects centered on young researchers, select outstanding principal investigators, extract innovative topics without prior research or reference, simplify research proposal procedures, innovate the selection solely based on key ideas, and evaluate results by collective intelligence in the form of conferences.

A case study on calibration of computational model for a reasonable cost estimation of missile development program (A case of guidance & control system of X missile) (유도무기 연구개발사업의 합리적인 비용 추정을 위한 전산모델 보정방안 사례 연구 (X 유도무기 유도조종장치 사례를 중심으로))

  • Park, Chung-Hee
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.139-148
    • /
    • 2014
  • In recent years, computational models using parametric estimation method have been developed and used widely for efficient cost analysis. In this research, by applying experienced data from Guidance and Control Systems in Missile System field, the cost analysis for engineering model and commercial computational model(Price H, HL, M, S) are conducted and its result is analysed, so that the difference between two models and its grounds are apprehended. Comparing the calibrated value of computational model based on the data base of similar equipment and the cost from the engineering estimation, the two results are very close. It means that the credibility of data is enhanced through calibration. Also, for cost analysis of similar components in the future, the method for calibration of the computational models is also examined. When estimating development cost in this research, although many parts have been estimated through uncertain elements, the reliability could have been enhanced by applying computational model which secures objectivity. It is a very reasonable estimation method by utilizing calibration of the computational models based on existing accumulated development data.

North Korea's Cyber Attack Patterns and Behaviors : An Analysis Based on Cyber Power and Coercion Theory (북한의 대남 사이버공격 양상과 행태 : 사이버파워와 강압이론을 통한 분석)

  • Yoon, Taeyoung;Woo, Jeongmin
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.117-128
    • /
    • 2018
  • The purpose of this paper is to analyze the behavior of North Korea's cyber attack against South Korea since 2009 based on major international security theories and suggest South Korea's policy option. For this purpose, this paper applied the behavioral domain and characteristics of 'cyber power' and 'coercion dynamics' model, which are attracting attention in international security studies. The types of cyber attacks from North Korea are classified into the following categories: power-based incarceration, leadership attacks and intrusions, military operations interference, and social anxiety and confusion. In terms of types and means of cyber power, North Korean GPS disturbance, the Ministry of Defense server hacking and EMP are hard power with high retaliation and threat and cyber money cashing and ransomware are analyzed by force in the act of persuasion and incentive in the point of robbing or asking for a large amount of money with software pawns. North Korea 's cyber attack has the character of escape from realistic sanctions based on the second nuclear test. It is important for South Korea to clearly recognize that the aggressive cyberpower of North Korea is changing in its methods and capabilities, and to ensure that North Korea's actions result in far greater losses than can be achieved. To do this, it is necessary to strengthen the cyber security and competence to simultaneously attack and defend through institutional supplement and new establishment such as cyber psychological warfare, EMP attack preparation, and enhancement of security expertise against hacking.

  • PDF

A Study on the Chinese Minority Dai's tattoo culture (중국 태족 문신 문화에 관한 연구)

  • Huo, Tao;Lim, Hee-Kyung
    • Journal of Digital Convergence
    • /
    • v.19 no.3
    • /
    • pp.379-385
    • /
    • 2021
  • Tattoo, which has been 5000 years' history is the symbol of the collective society. It was used as one of the methods not only to defense and camouflage but also to decorate themselves. In modern society, tattoo culture is either limited to ethnic minorities or be used as a decorative element of personal preference. Among them, the Chinese ethnic minority, the Dai, is still maintaining its tattoo culture, but gradually faded. Hence, the necessity of protecting the tattoo culture of the Dai is essential. The procedures and methods of this study were conducted by analyzing an antique book, explore residential areas, data research, and data collection through interviews. According to research, the tattoo culture of the Dai has been consistently passed down through traditional tattoo pictorial books, the memories of tattooists, and the stories of people who got tattoos. However, the Dai's traditional culture and customs are influenced by the China political reform between 1952 and 1956, confirming that the size of tattoo culture was reduced than before and evanesces. As a result, in order to inherit the ethnic minorities Dai's tattoo heritage, records of tattoo culture are required. Besides, it is considered that the records of tattoo culture and interpretations of tattoo culture by tattooists and the people who got a tattoo due to aging in the future should be studied.

An Investigation on the Periodical Transition of News related to North Korea using Text Mining (텍스트마이닝을 활용한 북한 관련 뉴스의 기간별 변화과정 고찰)

  • Park, Chul-Soo
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.3
    • /
    • pp.63-88
    • /
    • 2019
  • The goal of this paper is to investigate changes in North Korea's domestic and foreign policies through automated text analysis over North Korea represented in South Korean mass media. Based on that data, we then analyze the status of text mining research, using a text mining technique to find the topics, methods, and trends of text mining research. We also investigate the characteristics and method of analysis of the text mining techniques, confirmed by analysis of the data. In this study, R program was used to apply the text mining technique. R program is free software for statistical computing and graphics. Also, Text mining methods allow to highlight the most frequently used keywords in a paragraph of texts. One can create a word cloud, also referred as text cloud or tag cloud. This study proposes a procedure to find meaningful tendencies based on a combination of word cloud, and co-occurrence networks. This study aims to more objectively explore the images of North Korea represented in South Korean newspapers by quantitatively reviewing the patterns of language use related to North Korea from 2016. 11. 1 to 2019. 5. 23 newspaper big data. In this study, we divided into three periods considering recent inter - Korean relations. Before January 1, 2018, it was set as a Before Phase of Peace Building. From January 1, 2018 to February 24, 2019, we have set up a Peace Building Phase. The New Year's message of Kim Jong-un and the Olympics of Pyeong Chang formed an atmosphere of peace on the Korean peninsula. After the Hanoi Pease summit, the third period was the silence of the relationship between North Korea and the United States. Therefore, it was called Depression Phase of Peace Building. This study analyzes news articles related to North Korea of the Korea Press Foundation database(www.bigkinds.or.kr) through text mining, to investigate characteristics of the Kim Jong-un regime's South Korea policy and unification discourse. The main results of this study show that trends in the North Korean national policy agenda can be discovered based on clustering and visualization algorithms. In particular, it examines the changes in the international circumstances, domestic conflicts, the living conditions of North Korea, the South's Aid project for the North, the conflicts of the two Koreas, North Korean nuclear issue, and the North Korean refugee problem through the co-occurrence word analysis. It also offers an analysis of South Korean mentality toward North Korea in terms of the semantic prosody. In the Before Phase of Peace Building, the results of the analysis showed the order of 'Missiles', 'North Korea Nuclear', 'Diplomacy', 'Unification', and ' South-North Korean'. The results of Peace Building Phase are extracted the order of 'Panmunjom', 'Unification', 'North Korea Nuclear', 'Diplomacy', and 'Military'. The results of Depression Phase of Peace Building derived the order of 'North Korea Nuclear', 'North and South Korea', 'Missile', 'State Department', and 'International'. There are 16 words adopted in all three periods. The order is as follows: 'missile', 'North Korea Nuclear', 'Diplomacy', 'Unification', 'North and South Korea', 'Military', 'Kaesong Industrial Complex', 'Defense', 'Sanctions', 'Denuclearization', 'Peace', 'Exchange and Cooperation', and 'South Korea'. We expect that the results of this study will contribute to analyze the trends of news content of North Korea associated with North Korea's provocations. And future research on North Korean trends will be conducted based on the results of this study. We will continue to study the model development for North Korea risk measurement that can anticipate and respond to North Korea's behavior in advance. We expect that the text mining analysis method and the scientific data analysis technique will be applied to North Korea and unification research field. Through these academic studies, I hope to see a lot of studies that make important contributions to the nation.

Implementation of Rule Management System for Validating Spatial Object Integrity (공간 객체 무결성 검증을 위한 규칙 관리 시스템의 구현)

  • Go, Goeng-Uk;Yu, Sang-Bong;Kim, Gi-Chang;Cha, Sang-Gyun
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.12
    • /
    • pp.1393-1403
    • /
    • 1999
  • 공간 데이타베이스 시스템을 통하여 공유되는 공간 데이타는 무결성이 적절하게 유지되지 않는 한 전체 응용 시스템의 행위를 예측할 수 없게 되므로 데이타의 무결성 확인 및 유지는 필수적이다. 특히 공공 GIS에 저장된 공간 데이타는 토지 이용도 평가, 도시 계획, 자원 관리, 시설물 관리, 안전 관리, 국방 등 국가 전체 및 지역의 중요한 정책 결정을 위한 다양한 응용 시스템들에 의해 이용되므로 적절한 공간 객체의 무결성 확인이 더욱 더 필요하다. 본 논문에서는 능동(active) DBMS의 능동 규칙(active rule) 기법을 이용하여 공간 객체의 무결성 확인을 지원하기 위한 규칙 관리 시스템을 제시한다. 능동 규칙을 이용한 공간 객체의 무결성 확인은 응용 프로그래머를 무결성 확인에 대한 부담으로부터 자유롭게 할 수 있다. 본 시스템은 특정 DBMS에 종속되지 않는 독립적인 외부 시스템으로 존재하며, 능동 규칙 관리기, 규칙 베이스, 그리고 활성규칙 생성기의 3 부분으로 구성된다. 사용자가 공간 데이타베이스 응용 프로그램을 통해 공간 객체를 조작하고자 할 때, 본 시스템은 데이타베이스 트랜잭션을 단위로 조작되는 모든 공간 객체의 무결성 확인을 위해 응용 프로그램에 삽입될 무결성 제약조건 규칙들을 효율적으로 관리하는 역할을 한다.Abstract It is necessary that the integrity of spatial data shared through the spatial database system is validated and appropriately maintained, otherwise the activity of whole application system is unpredictable. Specially, the integrity of spatial data stored in public GIS has to be validated, because those data are used by various applications which make a decision on an important policy of the region and/or whole nation such as evaluation of land use, city planning, resource management, facility management, risk management/safety supervision, national defense. In this paper, we propose rule management system to support validating the integrity of spatial object, using the technique of active rule technique from active DBMS. Validating data integrity using active rules allows database application programmer to be free from a burden on validation of the data integrity. This system is an independent, external system that is not subject to specific DBMS and consists of three parts, which are the active rule manager, the rule base, and the triggered rule generator. When an user tries to manipulate spatial objects through a spatial database application program, this system serves to efficiently manage integrity rules to be inserted into the application program to validate the integrity constraints of all the spatial objects manipulated by database transactions.

A Critical Review of the Transfer of Presidential Security Work to the Police (대통령경호업무 경찰 이관에 대한 비판적 소고)

  • Jo, Sung-gu
    • Korean Security Journal
    • /
    • no.58
    • /
    • pp.177-194
    • /
    • 2019
  • Last year, the Moon Jae-In administration made an attempt to abolish the presidential security office overseeing the presidential security and to transfer the work to the presidential security service under the National Police Agency. Currently, all of the G7 nations maintain a security system spearheaded by the police, so the policy of transferring the presidential security to the National Police Agency may be discussed. However, it is necessary to focus on the following reality. First, the current presidential security system is consisted of the overlapping security organizations classified into (1) inner ring of the presidential security agency, (2) middle ring of the police agency, and (3) outer ring of the capital defense command. If the presidential security agency is abolished, a vacuum will result as per the principle of class. Second, for the efficient security guard of the President, currently, the presidential security agency at the Presidential Security Safety Measure Committee plays the role of coordinating the tasks. If the National Police Agency becomes the control tower of the presidential security, whether command will be available for the military and diplomatic aspects of the presidential security work should also be considered. Third, Korea is currently in a truce with North Korea, so there is a big difference in terms of the security environment with such G7 nations as the UK, Germany, France, and Japan.