• Title/Summary/Keyword: Defensive Space

Search Result 17, Processing Time 0.022 seconds

The Relation of Three Burning Space And Nutrient & Defensive Qi (삼초(三焦)와 영위(營衛)의 상관성(相關性))

  • Mun, Seong-sik;Kang, Jung-Soo
    • Journal of Haehwa Medicine
    • /
    • v.9 no.1
    • /
    • pp.105-112
    • /
    • 2000
  • Three burning space concentrating mainly on the text of ${\ll}NeiChing{\gg}$, we got this conclusion by looking at a longitudial perspective of three burning space function, nutrient & defensive qi creation, movement and numbers. 1. Longitudial movement is the law of the universe, by looking at oriental medicine by the thought of heaven and man unity we can tell that longitudial movement concept is used to analyze the physiology of our body. And we can look at our body in a cubic movement suck as top and bottom, left and right, outside and inside, internal and external, upward and downward movement. 2. In Nei Ching the concept of three burning space is seperated in to four different types of three burning space which are three burning space as a fu, three burning space as a water metabolism and excretion organ, and three burning space by its position. 3. nutrient & defensive qi's movement in the channel is the same as the twelve regular channels movement in our body, nutrient qi circulates the yang part twenty five during the day and circulates the ying part twenty five times during the night. Since channel functions corresponds with the sun, moon, and the stars the ups and downs of nutrient & defensive qi's property varies with the difference of the periods. 4. By comparing nutrient & defensive qi's production and property with three burning space's positional property, we can see that three burning space's positional property comes out from the longitudial movement of nutrient & defensive qi.

  • PDF

A Kinematic Analysis of the Defence Types during Body Lock Technique in the Ground Wrestling (그라운드 레슬링 가로들기 공격 시 수비 유형의 운동학적 분석)

  • Hah, Chong-Ku;Ryu, Ji-Seon
    • Korean Journal of Applied Biomechanics
    • /
    • v.17 no.1
    • /
    • pp.155-164
    • /
    • 2007
  • This study is to find out effective defensive type by analysis on differences among three different defence types of the body lock technique in the ground wrestling. The subjects are 5 athletes who are in 60kg weight class. To get the kinematic analysis seven ProReflex MCU-240(Motion Capture Unit), infrared rays cameras, which was produced by Qualisys, were used to get a two-dimensional coordinate. Following are the analysis result from kinematic factors such as time element, speed element and angular element. 1. During position of ground wrestling, the average necessary time until defender's hip joint touches the mat for Phase1 was $0.34{\pm}0.14sec$ at side position was the shortest space of time out of three types, and Phase2 was $0.21{\pm}0.02sec$ at front position was the shortest space of time out of three types. Moreover, side defence position was the shortest for total average necessary time with $0.78{\pm}0.05sec$. 2. The movement change for hip joint was $57.21{\pm}20.17cm$ for front, $43.35{\pm}7.13cm$ for rear, and $18.67{\pm}10.24cm$ for side at Phase1 and $42.08{\pm}17.56cm$ for side, $16.61{\pm}6.34cm$ for front, and $1.48{\pm}1.29cm$ for rear at Phase2. 3. Movement speed of hip joint at defensive type were most effective in success and fail rate at Phase 1 and its frontal average speed was fastest with $1.01{\pm}0.23m/s$ following by $0.52{\pm}0.15m/s$ for side, and $0.62{\pm}0.15m/s$ for rear. The average for total change of speed is $0.79{\pm}0.32m/s$ for front, $0.78{\pm}0.17m/s$ for side, and $0.49{\pm}0.08m/s$ for rear. 4. The joint angle gets smaller in a order by rear, front, and side for the size of hip joint angle and knee angle for different defensive type. 5. As a result of one-way ANOVA on linear velocity for hip joint in frontal defence(phase1) was significance ($\alpha$=.05), but phase 2 was not significance. Synthetically, analyzing on differences among three different defence types which were front, rear, and side of the body lock technique in the ground wrestling, front defensive type was the most effective. In future, there should be more studies regarding on defence at not a laboratory study but a field study to help out wrestler to pertinent techniques to improve the game of wrestling.

"Peaceful Uses" of Outer Space and Japan' s Space Policy

  • Takai, Susumu
    • The Korean Journal of Air & Space Law and Policy
    • /
    • no.spc
    • /
    • pp.247-270
    • /
    • 2007
  • Space development and utilization must be conducted within a framework of "peaceful uses" principle under Space Treaty. Japan ratified the treaty in 1967, and interpreted "peaceful uses" as "non-military uses" then. A ghost of "peaceful uses" principle has been hung over Japan up to the moment. Japan's space development and utilization has been conducted with genuine academic interest, and therefore Japan did not introduce space infrastructures to national security policy and did not facilitate growth of space industry. When the Cold War ended, Northeast Asian security environment makes Japan difficult to maintain an interpretation as "non-military uses". Besides the change of external security environment, the domestic industry situation and a series of rocket launching failure needed reexamination of Japan's space policy. Japan is gradually changing its space policy, and introducing space infrastructure in a national security policy under a "generalization" theory that gave a broad interpretation of "peaceful uses" principle. Council for Science and Technology Policy (CSTP) adopted a basic strategy of Japan's space policy in 2004. Since then, a long-term report of Japan Aerospace Exploration Agency (JAXA), an investigation report of Society of Japanese Aerospace Companies (SJAC) and a proposal of Japan Business Federation (JSF) were followed. Japan will promote space development and utilization in national security policy with a "strictly defensive defense" strategy and "non-aggressive uses"principle for protection of life and property of Japanese people and stabilization of East Asian countries.

  • PDF

A Study on the Resident Recognition of Common Space in Apartment (공동주택 거주자의 공유공간 인식에 대한 조사 연구)

  • Han, Min-Seung;Whang, Hee-Joon
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.35 no.4
    • /
    • pp.45-52
    • /
    • 2019
  • The most ordinary form of residential type in Korea is a plate-type apartment, and the common space in these apartment is attracting as an important factor for enhancing social exchanges among neighbors and forming community consciousness. In addition, it provides a sense of psychological security by enabling natural exchanges and communication in contemporary society. It is desirable to plan the flow of space in such a way that private, semi-private, semi-public, and public spaces are linked. Semi-private and semi-public spaces can be defined as common spaces. Semi-private spaces are strongly recognized in the order of unit household entrance, main entrance, elevator, corridor, staircase, playground, bench, trail, walkway and parking lot, exercise space, main/back gate, the ability to gratify is increased sense of belonging, ownership consciousness formation, defensive function. Semi-public space is strongly recognized in the order of playground, bench, exercise space, trail, main entrance, walkway and parking lot, unit household entrance, main/back gate, corridor, staircase, elevator, the ability to gratify is increase of social contact, Secondary activity space function. In addition, the function to gratify in the common space differs according to gender and age group among resident characteristics, and differs according to corridor type, parking lot type and main entrance type. Therefore, differentiated planning of common space is needed in consideration of these differences in the design of common space in future.

Research on Cyber Kill Chain Models for Offensive Cyber Operations (공세적 사이버 작전을 위한 사이버 킬체인 모델 연구)

  • Seong Bae Jo;Wan Ju Kim;Jae Sung Lim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.71-80
    • /
    • 2023
  • Cyberspace has emerged as the fifth domain of warfare, alongside land, sea, air, and space. It has become a crucial focus for offensive and defensive military operations. Governments worldwide have demonstrated their intent to engage in offensive cyber operations within this domain. This paper proposes an innovative offensive cyber kill chain model that integrates the existing defensive strategy, the cyber kill chain model, with the joint air tasking order (ATO) mission execution cycle and joint target processing procedure. By combining physical and cyber operations within a joint framework, this model aims to enhance national cyber operations capabilities at a strategic level. The integration of these elements seeks to address the evolving challenges in cyberspace and contribute to more effective jointness in conducting cyber operations.

A Study on Gyeolseong-Eupseong of the Joseon Dynasty Period (조선시대 결성읍성(結城邑城) 연구)

  • Kim, Hoe-Jung;Lee, Jeong-Soo
    • Journal of architectural history
    • /
    • v.19 no.6
    • /
    • pp.7-22
    • /
    • 2010
  • This study includes a review of the relevant literature and data on the Gyeolseong Eupseong, a coastal castle town of the Joseon Period. During the process of building the Gyeolseong Eupseong, Eupchi(administrative office) was transferred to several different locations for the following reasons:. first, to strengthen defensive capabilities by utilizing the locational advantages of the Seokdang Mountain Fortress, second, to secure sufficient space for holding the castle and have access to water in times of emergencies, third, to strengthen coastal defence by utilizing geographical advantages. Most of the Gyeolseong Eupseong was damaged during the Japanese colonial period. At present, there remain only part of the castle's facilities and some facilities that were restored later in modern times; 4 building sites have been identified. Remaining and destructed buildings can be identified through old maps(the local maps of 1872) and Zirizi and Eupzi(geography books). Also identified were 2 castle gate sites where a 1,500m-long stone castle wall and an ongseong(a crescent-shaped defensive structure), 5 chiseongs, and a most were constructed. The Gyeolseong area is assumed to have been a strategic foothold to defend the west coast from the days before the Three Kingdom Period. However it is very difficult to find any records created before the Joseon Period. Therefore, the time of the restoration of the Eupchi should be determined based on records created in the late Joseon Period. Finally, excavation work needs to be done to identify the locations of the castle's facilities.

Future Direction of ROK Navy's Maritime Strategy based on the Recognition and Expansion of Maritime Sphere (해양공간 인식과 확장의 관점에서 본 한국 해양전략의 발전 방향)

  • Jung, Gwang-Ho
    • Strategy21
    • /
    • s.44
    • /
    • pp.142-176
    • /
    • 2018
  • So far, the main threat to South Korea was North Korea. That is why South Korea established a strategy based on the threat of North Korea and most of the budget on defense was used to deter North Korea. Even though the neighboring countries(China, Japan, and Russia) are growing as a real threat with abilities and intentions based on their powerful naval forces, South Korea has not yet been able to establish a strategy that regards neighboring countries as a threat. But the decades-old structural mechanism of the Korean security environment is undergoing a radical change on April 27, 2018, through the South-North summit and the Panmunjom Declaration. Under the changing security environment, South Korea was placed in a complicated dilemma that had to deal with threats of two axes(China), three axes(China, Japan), and four axes(Japan, Russia). If the one axis threat(North Korea) is dominated by land threats, the second, third and fourth axis threats are threats from the sea. This paper analyzed the maritime strategy of Korea within the framework of maritime-geopolitics, in other words recognition and expansion of the sphere of maritime. I have designed that the maritime defense space that we can deny from threats is divided into three lines of defense: 1 line (radius 3,000km), 2 lines (2,000km), and 3 lines (1,000km). The three defense zones of the three lines were defined as an active defense(1 line), defensive offense(2 line), active offense(3 line). The three defense zones of the three lines were defined as the sphere of core maritime, As a power to deny the sphere of core maritime, it was analyzed as a maneuvering unit, a nuclear-powered submarine, the establishment of missile strategy, and the fortification of islands station. The marine strategy of South Korea with these concepts and means was defined as 'Offensive Maritime Denial Strategy'.

An Historical and Cultural Analysis on the Eastern and Western Moat (동·서양 해자(垓字)의 역사와 문화적 해석)

  • Jung, Yong-Jo;Sim, Woo-Kyung
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.29 no.1
    • /
    • pp.105-120
    • /
    • 2011
  • A moat is a pond or waterway paved on the outside of a fortress that is one of the facilities to prevent enemy from approaching the fortress wall or classify it as the boundary space, moats had existed in Europe, Asia and the America from ancient times to medieval times. however it is has been disappeared in modem society. In addition, a moat is a great value in historical and cultural sense such as offering a variety of cultural activities and habitats for animals, but unfortunately there is little consideration of its restoration plan. This research is aimed to investigate historical and cultural meaning and significance of moats which had been existing from ancient times to medieval times in the Eastern and Western. For this purpose, this research analyzed concepts and functions in consideration with times and ideological backgrounds of moats in Korea, China, and Japan. Results were as follows: 1. Moats in Korea existed not only in the castle towns of Goguryeo but also in ancient castle towns of Baekje and Silla. Natural moats and artificial moats existed around castles that were built to prevent and disconnect accessibility of enemies In Goryeo Dynasty and Chosun Dynasty, moats were also used as a defensive function. 2. A moat was generally installed by digging in the ground deep and wide at regular intervals from the ramparts, A moat was installed not only around a castle but also in its interiors. Moats outside castles played an important role in stomping the ground hard besides enhancing its defensive power. In addition, water bodies around a facility often discouraged people's access and walls or fences segregated space physically, but a moat with its open space had an alert and defensive means while pertaining its visual characteristics. 3. The moat found at Nagan Eupseong rumor has it that a village officials' strength was extremely tough due to strong energy of the blue dragon[Dongcheon] in Pungsujiri aspects, so such worries could be eliminated by letting the stream of the blue dragon flow in the form of 'S'. 4. The rampart of the Forbidden City of China is 7.9 meters high, and 3,428 meters long in circumference. It was built with 15 layers of bricks which were tamped down after being mixed with glutinous rice and earth, so it is really solid. The moat of the Forbidden City is 52 meters in width and 6 meters in depth, which surrounds the rampart of the Forbidden City, possibly blocking off enemies' approach. 5. Japan moats functioned as waterways due to their location in cities, further, with the arrangement of leisure facilities nearby, such as boating, fishing from boats, and restaurants, it helped relieve city dwellers' stress and functions as a lively city space. 6. Korean moats are smaller in scale than those of the Forbidden City of China, and Edo, and Osaka castles in Japan, Moats were mostly installed to protect royal palaces or castles in the Eastern Asia whereas moats were installed to protect kings, lords, or properties of wealthy people in the west.

A Study on the characteristics of architecture of GUNTER BEHNISCH's works (귄터 베니쉬의 건축공간 특성에 관한 연구)

  • 이호중
    • Korean Institute of Interior Design Journal
    • /
    • no.25
    • /
    • pp.3-10
    • /
    • 2000
  • In a word, Behnischs architecture can be said to be the architecture of humanism based on an interpretation of the human being. The architecture of Behnisch in which it is not space but people that becomes the subject in architecture is newness or novelty, which is proceeding to position itself as one architectural style representing the times. He refrain from the environment that is defensive and oppressive, and destructive and disruptive in composing his architecture and instead is directed towards the continuos, creative and open environment. With such an architectural language, he is pursuing a minimum of the best rather than quantity based on trust and respecting for man and nature as his unchanged theme. That is, he is seeking for the purpose of architecture that does not disregard individuality such as consumers wants and needs. As can be seen from it, his architectural work has aroused freshness and stimulus to the architectural environment that can not be boring, allowed us to look back on the architectural world and triggered our interest. His architecture has the human energy that moves us.

  • PDF

A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions

  • Liu, Yuhong;Sun, Yan Lindsay;Ryoo, Jungwoo;Rizvi, Syed;Vasilakos, Athanasios V.
    • Journal of Computing Science and Engineering
    • /
    • v.9 no.3
    • /
    • pp.119-133
    • /
    • 2015
  • While cloud computing is gaining popularity, diverse security and privacy issues are emerging that hinder the rapid adoption of this new computing paradigm. And the development of defensive solutions is lagging behind. To ensure a secure and trustworthy cloud environment it is essential to identify the limitations of existing solutions and envision directions for future research. In this paper, we have surveyed critical security and privacy challenges in cloud computing, categorized diverse existing solutions, compared their strengths and limitations, and envisioned future research directions.