• Title/Summary/Keyword: Defense Science Technology

Search Result 1,866, Processing Time 0.03 seconds

Selective Oxidation of Single Crystalline AlAs layer on GaAs substrate and XPS(X-ray photoelectron spectroscopy) Analysis (GaAs 기판위에 성장된 단결정 AlAs층의 선택적 산화 및 XPS (X-ray photonelectron spectroscopy) 분석)

  • Lee, Suk-Hun;Lee, Young-Soo;Tae, Heung-Sik;Lee, Young-Hyun;Lee, Jung-Hee
    • Journal of Sensor Science and Technology
    • /
    • v.5 no.5
    • /
    • pp.79-84
    • /
    • 1996
  • A $1\;{\mu}m$ thick n-type GaAs layer with Si doping density of $1{\times}10^{17}/cm^{3}$ and a $500{\AA}$ thick undoped single crystalline AlAs layer were subsequently grown by molecular beam epitaxy on the $n^{+}$ GaAs substrate. The AlAs/GaAs layer was oxidized in $N_{2}$ bubbled $H_{2}O$ vapor($95^{\circ}C$) ambient at $400^{\circ}C$ for 2 and 3 hours. From the result of XPS analysis, small amounts of $As_{2}O_{3}$, AlAs, and elemental As were found in the samples oxidized up to 2 hours. After 3 hours oxidation, however, various oxides related to As were dissolved and As atoms were diffused out toward the oxide surface. The as-grown AlAs/GaAs layer was selectively converted to $Al_{2}O_{3}/GaAs$ at the oxidation temperature $400^{\circ}C$ for 3 hours. The oxidation temperature and time is very critical to stop the oxidation at the AlAs/GaAs interface and to form a defect-free surface layer.

  • PDF

Changes of antioxidant enzyme activities subjected to water stress in soybean leaves (대두(大豆)에서 분석(水分)스트레스에 의(依)한 항산화효소(抗酸化酵素)의 활성도(活性度) 변화(變化))

  • Kim, Tae-Sung;Kang, Sang-Jae;Park, Woo-Churl
    • Current Research on Agriculture and Life Sciences
    • /
    • v.16
    • /
    • pp.24-30
    • /
    • 1998
  • This experiment was carried out to elucidate and study about plant defense mechanism subjected to water stress(drought, flooding). We measured water content, total soluble protein content as stress marker and superoxide dismutase(SOD), catalase (CAT) as antioxidant enzymes subjected to water stress(drought, flooding) and recovery in soybean leaves. The results obtained were as follows; Two soybean lines(keonolkong, euhakong)leaves exposed to water stress (drought, flooding) showed premature senescence as evidence by the decrease in water content, and total soluble protein content, but those of soybean leaves subject to water stress recovery for 3 days were recovered. Visual damage was much worse at drought stress than flooding stress and was worse keunolkong than enhakong. The activity of superoxide dismutase, catalase subjected to water stress(drought, flooding)was on the decrease, but degree of decrease was different from a sort of soybean lines, drought and flooding stress.

  • PDF

Enabling Environment for Participation in Information Storage Media Export and Digital Evidence Search Process using IPA (정보저장매체 반출 및 디지털 증거탐색 과정에서의 참여권 보장 환경에 대한 중요도-이행도 분석)

  • Yang, Sang Hee;Lee, Choong C.;Yun, Haejung
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.3
    • /
    • pp.129-143
    • /
    • 2018
  • Recently, the use of digital media such as computers and smart devices has been rapidly increasing, The vast and diverse information contained in the warrant of the investigating agency also includes the one irrelevant to the crime. Therefore, when confiscating the information, the basic rights, defense rights and privacy invasion of the person to be seized have been the center of criticism. Although the investigation agency guarantees the right to participate, it does not have specific guidelines, so they are various by the contexts and environments. In this process, the abuse of the participation right is detrimental to the speed and integrity of the investigation, and there is a side effect that the digital evidence might be destroyed by remote initialization. In this study, we conducted surveys of digital evidence analysts across the country based on four domains and thirty measurement items for enabling environment for participation in information storage media export and digital evidence search process. The difference between the level of importance and the performance was analyzed by the IPA matrix based on process, location, people, and technology dimensions. Seven items belonging to "concentrate here" area are one process-related, three location-related, and three people-related items. This study is meaningful to be a basis for establishing the proper policies and strategies for ensuring participation right, as well as for minimizing the side effects.

A Study on the Methodology for Combat Experimental Testing of Future Infantry Units using Simulation (시뮬레이션을 활용한 미래 보병부대 전투실험)

  • Lim, Jong-Won;Choi, Bong-Wan;Yim, Dong-Soon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.429-438
    • /
    • 2021
  • Owing to the development of science technology, particularly the smart concept and defense policy factors of the 4th industry, military weapon systems are advanced, and the scientific and operational force is reduced dramatically. The aspect of the future war is characterized by the operation of troops with reduced forces from advanced and scientific weapon systems in an operational area that has expanded more than four times compared to the present. Reflecting on these situational factors, it is necessary to improve combat methods based on the changes in the battlefield environment and advanced weapon systems. In this study, to find a more efficient future combat method in a changing war pattern, this study applied the battle experiment methodology using Vision21 war game model, which is an analytical model used by the army. Finally, this study aimed to verify the future combat method and unit structure. Therefore, the scenario composition and experiment method that reflect the change in the ground operational environment and weapon system was first composed. Subsequently, an analysis method based on the combat effectiveness was applied to verify the effective combat performance method and unit structure of future infantry units.

Research on the Necessity of Building the Second Space Rocket Launching Sites for Breakthrough Development of R.O.K National Space Power (도약적 국가 우주력 발전을 선도할 제2 우주센터 구축 필요성 연구)

  • Park, Ki-tae
    • Journal of Space Technology and Applications
    • /
    • v.2 no.2
    • /
    • pp.146-168
    • /
    • 2022
  • Witnessing current military conflicts in South China Sea and Eastern Europe, most defense analysts evaluate one of the most serious security threat toward the US is coming from the superpower competitions with Russia and China. The main means for such super power hegemonic competitions is military power and space power is a key enabler to maximize the efficiency and effectiveness of military employment. Reflecting above circumstances, the space hegemonic competition between the Unites States and China is spreading into all aspects of national powers. Under such an environment, R.O.K needs to significantly develop national space power to preserve life and assets of people in space. On the other hand, the R.O.K has a lot of limitations in launching space assets into orbits by land-based space rockets due to its geographic locations. The limitation of rocket launching direction, the failure to secure a significant area enough to secure safety and the limitation to secure open area enough to build associated facilities are among them. On this paper, I will suggest the need to build the 2nd space rocket launching site after analyzing a lot of short-falls the current 'Naro' space center face, compared to those of advanced space powers around the world.

Study on security framework for cyber-hacking control facilities (제어시설 사이버공격 대응을 위한 사이버보안 프레임워크 (Framework) 연구)

  • Lee, Sang-Do;Shin, Yongtae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.4
    • /
    • pp.285-296
    • /
    • 2018
  • Among many hacking attempts carried out in the past few years, the cyber-attacks that could have caused a national-level disaster were the attacks against nuclear facilities including nuclear power plants. The most typical one was the Stuxnet attack against Iranian nuclear facility and the cyber threat targeting one of the facilities operated by Korea Hydro and Nuclear Power Co., Ltd (Republic of Korea; ROK). Although the latter was just a threat, it made many Korean people anxious while the former showed that the operation of nuclear plant can be actually stopped by direct cyber-attacks. After these incidents, the possibility of cyber-attacks against industrial control systems has become a reality and the security for these systems has been tightened based on the idea that the operations by network-isolated systems are no longer safe from the cyber terrorism. The ROK government has established a realistic control systems defense concept and in the US, the relevant authorities have set up several security frameworks to prepare for the threats. This paper presented various cyber security attack cases and their scenarios against control systems, along with the analysis of countermeasures for them. Though this task, we attempt to identify the items that need to be considered when designing a domestic security framework to improve security and secure stability.

Developing of latent fingerprint on human skin (생체피부에서의 잠재지문 현출)

  • Lee, Hee-Il;Choi, Mi-Jung;Kim, Jai-Hoon;Park, Sung-Woo
    • Analytical Science and Technology
    • /
    • v.21 no.3
    • /
    • pp.222-228
    • /
    • 2008
  • On living skin the chances of a successfully developing latent fingerprint are very limited. This is due to the fact that continual perspiration and rapid absorption diffuse into the lipophillic layer on skin. A study was conducted to investigate effectively developing method of latent fingerprints on human skin surfaces and pig skin likely corpse's skin. We used commercial fingerprint powder, black powders, black magnetic powder, fluorescence magnetic powder, Cyanoacrylate fuming (CA) and direct lifting methods (lifting paper, glasses and photo glossy paper). Developing of fresh fingerprints on living skin was achieved with S-powderblack, CA fuming and CA fuming following S-powder, fluorescence powder. The other powder tends to overwhelm the latent print and the background. But, latent fingerprint residue was disappeared with time after deposit on a living surface. In case of pig skin likely corpse's skin, latent fingerprint detection was achieved with CA fuming following S-powder and deposited print during 6 hr at $25^{\circ}C$, 40% relative moisture yielded excellent fingerprints with clear ridge details using 1 min CA fuming. And enhancement of fingerprint detection image using forensic light source was achieved.

Fault Detection Technique for PVDF Sensor Based on Support Vector Machine (서포트벡터머신 기반 PVDF 센서의 결함 예측 기법)

  • Seung-Wook Kim;Sang-Min Lee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.5
    • /
    • pp.785-796
    • /
    • 2023
  • In this study, a methodology for real-time classification and prediction of defects that may appear in PVDF(Polyvinylidene fluoride) sensors, which are widely used for structural integrity monitoring, is proposed. The types of sensor defects appearing according to the sensor attachment environment were classified, and an impact test using an impact hammer was performed to obtain an output signal according to the defect type. In order to cleary identify the difference between the output signal according to the defect types, the time domain statistical features were extracted and a data set was constructed. Among the machine learning based classification algorithms, the learning of the acquired data set and the result were analyzed to select the most suitable algorithm for detecting sensor defect types, and among them, it was confirmed that the highest optimization was performed to show SVM(Support Vector Machine). As a result, sensor defect types were classified with an accuracy of 92.5%, which was up to 13.95% higher than other classification algorithms. It is believed that the sensor defect prediction technique proposed in this study can be used as a base technology to secure the reliability of not only PVDF sensors but also various sensors for real time structural health monitoring.

Control Policy for the Land Remote Sensing Industry (미국(美國)의 지상원격탐사(地上遠隔探査) 통제제탁(統制制度))

  • Suh, Young-Duk
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.20 no.1
    • /
    • pp.87-107
    • /
    • 2005
  • Land Remote Sensing' is defined as the science (and to some extent, art) of acquiring information about the Earth's surface without actually being in contact with it. Narrowly speaking, this is done by sensing and recording reflected or emitted energy and processing, analyzing, and applying that information. Remote sensing technology was initially developed with certain purposes in mind ie. military and environmental observation. However, after 1970s, as these high-technologies were taught to private industries, remote sensing began to be more commercialized. Recently, we are witnessing a 0.61-meter high-resolution satellite image on a free market. While privatization of land remote sensing has enabled one to use this information for disaster prevention, map creation, resource exploration and more, it can also create serious threat to a sensed nation's national security, if such high resolution images fall into a hostile group ie. terrorists. The United States, a leading nation for land remote sensing technology, has been preparing and developing legislative control measures against the remote sensing industry, and has successfully created various policies to do so. Through the National Oceanic and Atmospheric Administration's authority under the Land Remote Sensing Policy Act, the US can restrict sensing and recording of resolution of 0.5 meter or better, and prohibit distributing/circulating any images for the first 24 hours. In 1994, Presidential Decision Directive 23 ordered a 'Shutter Control' policy that details heightened level of restriction from sensing to commercializing such sensitive data. The Directive 23 was even more strengthened in 2003 when the Congress passed US Commercial Remote Sensing Policy. These policies allow Secretary of Defense and Secretary of State to set up guidelines in authorizing land remote sensing, and to limit sensing and distributing satellite images in the name of the national security - US government can use the civilian remote sensing systems when needed for the national security purpose. The fact that the world's leading aerospace technology country acknowledged the magnitude of land remote sensing in the context of national security, and it has made and is making much effort to create necessary legislative measures to control the powerful technology gives much suggestions to our divided Korean peninsula. We, too, must continue working on the Korea National Space Development Act and laws to develop the necessary policies to ensure not only the development of space industry, but also to ensure the national security.

  • PDF

Analyzing Research Trends in Blockchain Studies in South Korea Using Dynamic Topic Modeling and Network Analysis (다이나믹 토픽모델링 및 네트워크 분석 기법을 통한 블록체인 관련 국내 연구 동향 분석)

  • Kim, Donghun;Oh, Chanhee;Zhu, Yongjun
    • Journal of the Korean Society for information Management
    • /
    • v.38 no.3
    • /
    • pp.23-39
    • /
    • 2021
  • This study aims to explore research trends in Blockchain studies in South Korea using dynamic topic modeling and network analysis. To achieve this goal, we conducted the university & institute collaboration network analysis, the keyword co-occurrence network analysis, and times series topic analysis using dynamic topic modeling. Through the university & institute collaboration network analysis, we found major universities such as Soongsil University, Soonchunhyang University, Korea University, Korea Advanced Institute of Science and Technology (KAIST) and major institutes such as Ministry of National Defense, Korea Railroad Research Institute, Samil PricewaterhouseCoopers, Electronics and Telecommunications Research Institute that led collaborative research. Next, through the analysis of the keyword co-occurrence network, we found major research keywords including virtual assets (Cryptocurrency, Bitcoin, Ethereum, Virtual currency), blockchain technology (Distributed ledger, Distributed ledger technology), finance (Smart contract), and information security (Security, privacy, Personal information). Smart contracts showed the highest scores in all network centrality measures showing its importance in the field. Finally, through the time series topic analysis, we identified five major topics including blockchain technology, blockchain ecosystem, blockchain application 1 (trade, online voting, real estate), blockchain application 2 (food, tourism, distribution, media), and blockchain application 3 (economy, finance). Changes of topics were also investigated by exploring proportions of representative keywords for each topic. The study is the first of its kind to attempt to conduct university & institute collaboration networks analysis and dynamic topic modeling-based times series topic analysis for exploring research trends in Blockchain studies in South Korea. Our results can be used by government agencies, universities, and research institutes to develop effective strategies of promoting university & institutes collaboration and interdisciplinary research in the field.