• Title/Summary/Keyword: Defense Systems

Search Result 2,130, Processing Time 0.029 seconds

A Study on the Symbolism of Auspicious Animal Sculptures Installed on Woldae(月臺) Stone Railing at the Geunjeongjeon(勤政殿) of Gyeongbokgung(景福宮) - Based on Twenty-eight Mansions - (경복궁 근정전 월대 석난간에 설치된 서수 조각물의 내용 및 상징적 의미 연구 -28수 관련 내용을 중심으로-)

  • Lee, Ho-Sun;Han, Dong-Soo
    • Journal of architectural history
    • /
    • v.29 no.2
    • /
    • pp.75-88
    • /
    • 2020
  • There are stone sculptures diversely shaped in several parts of Gyeongbokgung. Geunjeongjeon is a place where the stone sculptures are intensively placed among the various palace buildings of Gyeongbokgung, and it is more important because it contains the phases of the age of the dynasty and the symbolism of governing philosophy. What can be seen in the structure of auspicious animal sculptures is based on the form of instinctive thought that the heavenly and human order systems are in an organic correspondence with each other, especially with regard to astronomical events such as Samwon Sasin 12jisin 28su. The parts that have been interpreted only in Sasin and 12jisin in the interpretations such as wild dogs, Gyoryong, camels, wolves, and apes were able to clarify the contents by revealing the form of 28su. In particular, as Beopsu Ssangbeopsu at the corner may be related to the guardian deity who governs water, called Yimun, Chimi, and Chimun, it is one of Bibo's ways to protect the palace that was vulnerable to fire. In addition, the shape of the existing 28su placed Dambi, but Ha Woldae at the Geunjeongjeon was assumed to have a camel statue and a planned arrangement of double meaning with the Bibo form of Pungsu Sasinsa, and it is also a feature of the arrangement of Woldae at the Geunjeongjeon. The actual composition of auspicious animals at the Nambogye of Geunjeongjeon was in the order of Haechi, wild dogs, horses and Jujak, and the contents of "Gyeongbokgung Construction Daily Record" were in the order of Haechi, horses, wild dogs, and Jujak. As to different composition layouts, based on the contents of the "Gyeongbok palace Construction Daily Record", the composition of Samjae Cheonjiin (天地人) was interpreted differently from the conventional interpretation of the arrangement of Woldae. All of these forms are associated with defense systems in the four directions and have become animal representations of each direction. The auspicious animal statues placed on the railing of Geunjeongjeon Woldae can be seen as reflected in a single building with the three dimensional personality that includes Pungsu's Bibo personality with the symbolic meaning that reveals the centrality as Jeong Jeon, the nation's best politics let alone the ideological system of the ancient astronomical of the East called Men Heaven Unity.

A Study on the Enterprise Value Analysis using AHP and Logit Regressions (AHP와 로짓회귀분석을 활용한 기업가치 분석방법)

  • Gu, Seung-Hwan;Shin, Tack-Hyun;Yuldashev, Zafar
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.9
    • /
    • pp.5810-5818
    • /
    • 2015
  • The dissertation presents the portfolio construction method using the score sheet so that general investors can utilize it easily. This study draws the significant variables to contribute the enterprise value and suggests the combined models by applying the single methodology, which private investors can easily utilize. The results of the research can be classified into 2 areas. Firstly, the significantly affecting variables were selected for analyzing the enterprise value. The variables and the method for the enterprise value analysis were studied from the existing researches to choose the optimal variables. The variables were identified by using AHP method and the structure equation method from the investigation of the previous researches. And the critical variables were added extracted from the common denominator of variables which the 3 grue investors used for their investment. The final variables identified are dividend yield, PER, PBR, PCR, EV/EBITDA, ROE, net income, sales growth rate, net current asset, debt ratio, current ratio, rate of operating profits, ratio of operating profit to net sales, ratio of net income to net sales, net profit to total assets, EPS growth rate, inventory turnover ratio, and receivables turnover. Second, the new methodologies for forecasting enterprise value modifying the existing methods were developed. The result of the Logistic regression analysis for forecasting showed that the equation could not be suitable as the accuracy with 91.98%.

A Study on the Thermal Shock Resistance of Sintered Zirconia for Electron Beam Deposition (전자빔 증착을 위한 소결체 지르코니아의 열충격 저항성 연구)

  • Oh, Yoonsuk;Han, Yoonsoo;Chae, Jungmin;Kim, Seongwon;Lee, Sungmin;Kim, Hyungtae;Ahn, Jongkee;Kim, Taehyung;Kim, Donghoon
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.19 no.3
    • /
    • pp.83-88
    • /
    • 2015
  • Coating materials used in the electron beam (EB) deposition method, which is being studied as one of the fabrication methods of thermal barrier coating, are exposed to high power electron beam at focused area during the EB deposition. Therefore the coating source for EB process is needed to form as ingot with appropriate density and microstructure to sustain their shape and stable melts status during EB deposition. In this study, we tried to find the optimum powder condition for fabrication of ingot of 8 wt% yttria stabilized zirconia which can be used for EB irradiation. It seems that the ingot, which is fabricated through bi-modal type initial powder mixture which consists of tens of micro and nano size particles, was shown better performance than the ingot which is fabricated using monolithic nanoscale powder when exposed to high power EB.

Model-Based Design and Enhancement of Operational Procedure for Guided Missile Flight Test System (유도무기 비행시험 시스템을 위한 모델 기반 운용절차의 설계 및 개선)

  • Park, Woong;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.479-488
    • /
    • 2019
  • The flight test operational procedure artifact includes mission planning, execution methods, and safety measures for each step of test progress. As the development of guided missiles has become more advanced and strategic, flight test has become increasingly complex and broadened. Therefore, increased reliability of the flight test operation procedures was required to ensure test safety. Particularly, the design of the flight test operational procedures required verification through M&S to predict and prepare for the uncertainty in a new test. The relevant studies have published the optimal framework development for flight tests and the model-based improvements of flight test processes, but they lacked the specificity to be applied directly to the flight test operational procedures. In addition, the flight test operational procedures, which consist of document bases, have caused problems such as limitations of analysis capabilities, insensitive expressions, and lack of scalability for the behavior and performance analysis of test resources. To improve these problems, this paper proposes how to design operational procedure of guided missile flight test system by applying MBSE(Model-based Systems Engineering). This research has improved reliability by increasing the ability to analyze the behavior and performance of test resources, and increased efficiency with the scalability applicable to multiple flight tests. That can be also used continuously for the guided missile flight tests that will be developed in the future.

RDP-based Lateral Movement Detection using PageRank and Interpretable System using SHAP (PageRank 특징을 활용한 RDP기반 내부전파경로 탐지 및 SHAP를 이용한 설명가능한 시스템)

  • Yun, Jiyoung;Kim, Dong-Wook;Shin, Gun-Yoon;Kim, Sang-Soo;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.4
    • /
    • pp.1-11
    • /
    • 2021
  • As the Internet developed, various and complex cyber attacks began to emerge. Various detection systems were used outside the network to defend against attacks, but systems and studies to detect attackers inside were remarkably rare, causing great problems because they could not detect attackers inside. To solve this problem, studies on the lateral movement detection system that tracks and detects the attacker's movements have begun to emerge. Especially, the method of using the Remote Desktop Protocol (RDP) is simple but shows very good results. Nevertheless, previous studies did not consider the effects and relationships of each logon host itself, and the features presented also provided very low results in some models. There was also a problem that the model could not explain why it predicts that way, which resulted in reliability and robustness problems of the model. To address this problem, this study proposes an interpretable RDP-based lateral movement detection system using page rank algorithm and SHAP(Shapley Additive Explanations). Using page rank algorithms and various statistical techniques, we create features that can be used in various models and we provide explanations for model prediction using SHAP. In this study, we generated features that show higher performance in most models than previous studies and explained them using SHAP.

A study on Deep Operations Effect Analysis for Realization of Simultaneous Offense-Defence Integrated Operations (공방동시통합작전 구현을 위한 종심작전 효과분석 연구)

  • Cho, Jung Keun;Yoo, Byung Joo;Han, Do Heon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.116-126
    • /
    • 2021
  • Ground Component Command (GCC) has been developing operational planning and execution systems to implement "Decisive Integrated Operations", which is the concept of ground operations execution, and achieved remarkable results. In particular, "Simultaneous Offense-Defense Integrated Operations" is developed mainly to neutralize enemies in deep areas and develop favorable conditions for the allies early by simultaneously attacking and defending from the beginning of the war. On the other hand, it is limited to providing scientific and reasonable support for the commander's decision-making process because analyzing the effects of the deep operation with existing M&S systems is impossible. This study developed a model for analyzing the effects of deep operations that can be used in the KJCCS. Previous research was conducted on the effects of surveillance, physical strike, and non-physical strike, which are components of deep operations to find the characteristics and limitations and suggest a research direction. A methodology for analyzing the effects of deep operations reflecting the interactions of components using data was then developed by the GCC, and input data for each field was calculated through combat experiments and a literature review. Finally, the Deep operations Effect CAlculating Model(DECAM) was developed and distributed to the GCC and Corps battle staff during the ROK-US Combined Exercise. Through this study, the effectiveness of the methodology and the developed model were confirmed and contribute to the development of the GCC and Corps' abilities to perform deep operations.

A Comparative Study of Machine Learning Algorithms Using LID-DS DataSet (LID-DS 데이터 세트를 사용한 기계학습 알고리즘 비교 연구)

  • Park, DaeKyeong;Ryu, KyungJoon;Shin, DongIl;Shin, DongKyoo;Park, JeongChan;Kim, JinGoog
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.3
    • /
    • pp.91-98
    • /
    • 2021
  • Today's information and communication technology is rapidly developing, the security of IT infrastructure is becoming more important, and at the same time, cyber attacks of various forms are becoming more advanced and sophisticated like intelligent persistent attacks (Advanced Persistent Threat). Early defense or prediction of increasingly sophisticated cyber attacks is extremely important, and in many cases, the analysis of network-based intrusion detection systems (NIDS) related data alone cannot prevent rapidly changing cyber attacks. Therefore, we are currently using data generated by intrusion detection systems to protect against cyber attacks described above through Host-based Intrusion Detection System (HIDS) data analysis. In this paper, we conducted a comparative study on machine learning algorithms using LID-DS (Leipzig Intrusion Detection-Data Set) host-based intrusion detection data including thread information, metadata, and buffer data missing from previously used data sets. The algorithms used were Decision Tree, Naive Bayes, MLP (Multi-Layer Perceptron), Logistic Regression, LSTM (Long Short-Term Memory model), and RNN (Recurrent Neural Network). Accuracy, accuracy, recall, F1-Score indicators and error rates were measured for evaluation. As a result, the LSTM algorithm had the highest accuracy.

Cost Education Effectiveness Analysis of Immersion-type and Simulator-type Virtual Reality Training Systems -Focusing on The ROK Army Virtual Reality Training System- (몰입형과 시뮬레이터형 가상현실 훈련체계 비용 대 교육효과 분석 -육군 가상현실 훈련체계를 중심으로-)

  • Kim, Do-heon;Min, Seung-hee;Kim, Yeek-hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.4
    • /
    • pp.345-352
    • /
    • 2021
  • The Republic of Korea Army (ROK Army) is trying to improve the effectiveness of education and training. On the other hand, there are many restrictions in actual training, limiting their practical education and training. Virtual reality technology is being used to overcome these limitations. Virtual reality technology is developing in various types, and the ROK Army needs to introduce a virtual reality training system for cost-effective education. The ROK Army mainly uses high-cost simulator-types that are similar to real equipment. Recently, a low-cost immersive-type virtual reality training system wearing an HMD is also being used. This study analyzed the cost education effectiveness of simulator-type and immersive-type virtual reality training systems in operation at the ROK Army air defense school. First, the research method used AHP to analyze the educational effects. Second, the cost was applied to the production cost of the virtual reality training system to analyze the cost-effectiveness of the education. The immersion-type was 3.4 times higher than the simulator-type in terms of cost effectiveness. These results can be used as basic data for analyzing the cost-effectiveness of a virtual reality training system.

Methodology of Test for sUAV Navigation System Error (소형무인항공기 항법시스템오차 시험평가 방법)

  • SungKwan Ku;HyoJung Ahn;Yo-han Ju;Seokmin Hong
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.6
    • /
    • pp.510-516
    • /
    • 2021
  • Recently, the range of utilization and demand for unmanned aerial vehicle (UAV) has been continuously increasing, and research on the construction of a separate operating system for low-altitude UAV is underway through the development of a management system separate from manned aircraft. Since low-altitude UAVs also fly in the airspace, it is essential to establish technical standards and certification systems necessary for the operation of the aircraft, and research on this is also in progress. If the operating standards and certification requirements of the aircraft are presented, a test method to confirm this should also be presented. In particular, the accuracy of small UAV's navigation required during flight is required to be more precise than that of a manned aircraft or a large UAV. It was necessary to calculate a separate navigation error. In this study, we presented a test method for deriving navigation errors that can be applied to UAVs that have difficulty in acquiring long-term operational data, which is different from existing manned aircraft, and conducted verification tests.

A Study on the Threat of North Korean Small Drones (북한 소형 드론 위협 사례에 대한 연구)

  • Kwang-Jae Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.397-403
    • /
    • 2024
  • North Korea's rapidly advancing drone development and operational capabilities have become a significant threat to South Korea's security. The drone incursions by North Korea in 2014, 2017, and 2022 demonstrate the technological advancement and provocative potential of North Korean drones. This study aims to closely analyze the military threats posed by North Korean drones and seek effective countermeasures. The research examines the development level of North Korean drone technology, its military applications, the characteristics and patterns of recent drone incursions, the adequacy and limitations of South Korea's current response systems, and future countermeasures. For this purpose, domestic and international research literature and media reports were reviewed, and specific North Korean drone incursion cases were analyzed. The results indicate that North Korea's small drones possess technological features such as small size, low altitude, low-speed flight, long-duration flight, and reconnaissance equipment. These drones pose threats that can be utilized for reconnaissance, surveillance, surprise attacks, and terrorism. Additionally, South Korea's current response systems reveal limitations such as inadequate detection and identification capabilities, low interception success rates, lack of an integrated response system, and insufficient specialized personnel and equipment. Therefore, this study suggests various technical, policy, and international cooperative countermeasures, including the development of drone detection and identification technologies, the utilization of diverse drone neutralization technologies, the establishment of legal and institutional foundations, the construction of a cooperative framework among relevant agencies, and the strengthening of international cooperation. The study particularly emphasizes the importance of raising awareness of the North Korean drone threat across South Korean society and unifying national efforts to respond to these threats.