• Title/Summary/Keyword: ICBM

Search Result 35, Processing Time 0.024 seconds

Research and Development Trends of a Hypersonic Glide Vehicle (HGV) (극초음속 활공 비행체(HGV)의 연구개발 동향)

  • Hwang, Ki-Young;Huh, Hwanil
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.48 no.9
    • /
    • pp.731-743
    • /
    • 2020
  • The hypersonic glide vehicle ascends to a high altitude by a rocket booster, separates it from the booster, and glides at a hypersonic speed of Mach 5 or higher at an altitude of about 30~70 km, changing its direction in the atmosphere. Since it moves on an unpredictable flight path rather than a parabolic trajectory, it is difficult to intercept with current missile defense systems. The U.S. conducted HTV-2 and AHW flight tests in the early 2010s to confirm the possibility of hypersonic gliding flights, and recently it has been developing hypersonic glide vehicle systems such as LRHW and ARRW. China has conducted several flight tests of the DF-ZF (WU-14) glide vehicle since 2014 and has been operating it with DF-17 missiles. Russia has conducted hypersonic glide vehicle research since the former Soviet Union, but it has repeatedly failed, and recently it has been successfully tested with the Avangard (Yu-71) glide vehicle mounted on the SS-19 ICBM. In this paper, the characteristics, flight test cases, and development trends of hypersonic glide vehicles developed or currently being developed in the United States, China, Russia, Japan, India, and Europe are reviewed and summarized.

The appropriate amount of Defense budget for stabilizing National security in Northeast Asia (동북아지역의 안보균형을 위한 적정수준 국방비 분석에 관한 연구)

  • Lee, Wol-Hyeong;Kim, Hyung Jae
    • International Area Studies Review
    • /
    • v.20 no.1
    • /
    • pp.277-295
    • /
    • 2016
  • It is undoubtedly true that national security in Korean peninsula is on the road to destabilization. The main factors are known to be North Korea's development and experiment on nuclear arms, especially the forth nuclear experiment on January 6th, ICBM launch February 7th, and encroachment upon the territory the NLL on the 8th along with the shutdown on Gaeseong Industrial Complex. Also, China's trouble with other nations over sovereignty over islands in the South China Sea and the fact that Japan's government is veering to the right side and having territorial dispute are making the case worse. Nations in Northeast Asia are striving to obtain the interest for the sake of their own country. In order to do so, they're walking the path to achieve national security. Until then, they are not so willing to participate foreign matters or economical race. Even in our perspective, these issues are many of the main problems which our country is currently facing. However, it is important for them to avoid making policies which may take away the citizen's happiness. The number one priority for the nation or any form of a group is to act in the best interest for the national security and the citizen's happiness. They are the main factors why a nation could exist. They are the symbols of a nation's sovereign authority. Countries outside are proving it by increasing their national defense budget even in this unprecedented economical crisis. If we are willing to stay the same as ever, the disparity in the military force will not be the same in the future. In conclusion, the study examines the problem which changes in Northeast Asia's defense environment could bring and the appropriate amount of national defense budget in order to support the nation's integration of its abilities to move toward South and North Korea's unification.

A Study on the Improvement Legal System for Next-generation Records Management (차세대 기록관리를 위한 법체계 개선방안 연구)

  • Lee, Jin Ryong;Ju, Hyun Mi;Yim, Jin Hee
    • The Korean Journal of Archival Studies
    • /
    • no.55
    • /
    • pp.275-305
    • /
    • 2018
  • The advent of e-government following the information revolution has affected public records systems. Records management should now be changed into an environment for establishing a national records management system based on the Internet of things (IoT), cloud, big data, and mobile (ICBM), and it is time to make a fresh start toward a next-generation records management system that responds to changes in the environment. Ultimately, it is time for a records management system that ensures a proper way of dealing with new environmental changes. It has been nearly 20 years since the Public Records Management Act was enacted in 1999, and its complete amendment was made in 2006 so that electronic records could be efficiently managed. When recompliance management needs to be rechecked, a full redesign is required to enable the current legal system to respond to the new circumstances in the present day. Therefore, this study is intended to suggest ways to improve the new records management legal system as the environment changes over the next generation and lay the legal groundwork for innovation in the national records management system.

The Study Application of Identification Based on Small Units USN(Ubiquitous Sensor Network) (소부대급 USN 기반 전장감시체계 적용 방안)

  • Kim, Do-Heon;Kim, Do-Yeob
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.2
    • /
    • pp.283-295
    • /
    • 2010
  • Although some large units, upper than division, have a identification system, most of them depend on US military. Especially, the company unit can not but execute GOP(General OutPost) guidance and battles inefficiently because they apply the method of conventional identification system. urrently, North Korea causes the high tension of peninsular by experimenting nuclear weapons and launching ICBM(Intercontinental Ballistic Missile). In addition, ROK military will reduce the number of personnel and division through reorganizing the structure into NCW (Network Centric Warfare) until 2020. These unstable situation and future tendency require the high technical identification system based on USN(Ubiquitous Sensor Network) in company unit level. his study suggests the method that the company unit apply the identification system based on USN which distinguish between friend and foe in the warfare. The identification system concludes the results through experiment of military analysis model (AWAM; Army Weapon effectiveness Analysis Model). After analyzing the experiment results, it indicates the budget requirement and operational operability of identification system. This will be able to improves battle efficiency and to prevent damages of friendly forces.

A Study on Education system for nurturing Intelligent Information Technology practitioners in College (지능정보기술 실무인재 양성을 위한 전문대학 교육체계 구축 방안)

  • Kim, SungRim;Yeo, MinWoo;Cho, EunSook;Hong, YuNa;Heo, YoungJun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.17 no.4
    • /
    • pp.63-75
    • /
    • 2021
  • It is necessary to respond to rapid technological changes such as the 4th industrial revolution and digital transformation across industries. And, a change in the university education system is necessary in a crisis situation of universities due to the rapid decrease of the school-age population. This study is aimed at practical competency with the ability to apply intelligent information technology to their job fields based on a basic understanding of intelligent information technology rather than advanced competency centered on theory and research. Instead of presenting the curriculum system diagram so that it can be flexibly applied to the design and development of the curriculum for intelligent information technology, training modules according to job and level were presented. In relation to intelligent information technology, a questionnaire was conducted for college professors, and industry experts were conducted on the derived educational modules to reflect the opinions of the industry. Industry experts said that collaboration with PBL, Capstone, and industry is necessary to improve problem-solving and communication skills.

A Study on Heterogenous Big Data Processing Platforms for Smart Factory (스마트 공장을 위한 이기종 빅데이터 처리 플랫폼에 대한 연구)

  • Song, Je-O;Cho, Jung-Hyun;Kwon, Jin-Gwan;Lee, Sang-Moon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.07a
    • /
    • pp.335-336
    • /
    • 2019
  • 5G를 비롯한 무선 네트워크의 발달과 인터넷의 보급이 보편화되어 가고 있다. 또한, 스마트폰 등의 모바일 기기 등이 일상화됨에 따라 방대하고 다양한 유형의 데이터들이 발생되고 있다. 이와 같은 범람하기 시작한 정보와 데이터들을 연결하여 새로운 가치를 창출하는 초지능 연결의 4차 산업혁명 시대가 도래하였다. 이러한 4차 산업혁명은 ICBM(IoT, Cloud, Big data, Mobile) 기술이 발달함에 따라 가능했으며. 그중 빅데이터는 초지능 연결의 근간이 되고 있다. 하지만, 빅데이터에서의 데이터는 다양한 목적에 의해 다양한 유형의 데이터를 모두 포함하고 있음에도 데이터 포맷 및 데이터 셋 등의 불일치에 의해 즉각적인 연결은 불가능하다. 본 논문에서는 스마트 공장을 중심으로 서로 다른 형태의 이기종 데이터를 통합하여 처리할 수 있는 빅데이터 처리 플랫폼을 제안한다.

  • PDF

System Safety Application for the Weapon System (무기체계 시스템안전 적용방안)

  • Park, Suncheol;Kim, Jinsung;Jin, Jonghoon;Yoon, Donghwan
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.4
    • /
    • pp.106-112
    • /
    • 2021
  • In the early 1960s, US Air Force lost missile launch bases during ICBM development by a defect in the missile design and operation plan. U.S. DoD realized the limitation of the existing accident prevention method. Therefore, the weapon development required system safety activity, and procurement projects of U.S. DoD applied MIL-STD-882(System Safety). Development projects of U.S. DoD more emphasized the importance of system safety after the space shuttle Challenger exploded in 1986. Currently, Airworthiness certification for military aircraft uses system safety to minimize accidents. The domestic defense aviation R&D projects also use the system safety for the airworthiness certification. However, non-aviation weapon R&D projects rarely applied system safety. This paper presents a system safety application method for domestic weapon R&D projects by studying the U.S. military standards/organizations and domestic defense aviation projects.

Increased Expression of P2RY2, CD248 and EphB1 in Gastric Cancers from Chilean Patients

  • Aquea, Gisela;Bresky, Gustavo;Lancellotti, Domingo;Madariaga, Juan Andres;Zaffiri, Vittorio;Urzua, Ulises;Haberle, Sergio;Bernal, Giuliano
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.5
    • /
    • pp.1931-1936
    • /
    • 2014
  • Background: Gastric cancer (GC) ranks as one of the major causes of mortality due to cancer worldwide. In Chile, it is currently the leading cause of cancer death. Identification of novel molecular markers that may help to improve disease diagnosis at early stages is imperative. Materials and Methods: Using whole-genome DNA microarrays we determined differential mRNA levels in fresh human GC samples compared to adjacent healthy mucosa from the same patients. Genes significantly overexpressed in GC were validated by RT-PCR in a group of 14 GC cases. Results: The genes CD248, NSD1, RAB17, ABCG8, Ephb1 and P2RY2 were detected as the top overexpressed in GC biopsies. P2RY2, Ephb1 and CD248 showed the best sensitivity for GC detection with values of 92.9%, 85.7% and 64.3% (p<0.05), respectively. Specificity was 85.7%, 71.4% and 71.4% (p<0.05), for each respectively.

A study on measure of North Korea's nuclear terror threat; Focusing on the guarantee of 'anticipatory self-defense' (북한 핵테러 위협 대비방안 연구; '선제적 자위권' 보장을 중심으로)

  • Kim, Yeon Jun
    • Convergence Security Journal
    • /
    • v.16 no.3_2
    • /
    • pp.13-23
    • /
    • 2016
  • North Korea had recently conducted the fourth nuclear test and ICBM tests, dared nuclear provocation targeting the Korea and the international community. It is determined based on experiments of nuclear and missile in progress in North Korea that the technical level of nuclear force reached the completion stage of standardization, lightweight, and variation. It is expected to become reality that North Korea executes the nuclear provocation targeting the Korea and the international community in the near future. Nuclear bomb is an absolute weapon that the logic of counterattack after allowing the first strike of the other party cannot be applied due to its tremendous destructive power. Therefore, as the opponent to North Korea that it decided to hold the nuclear, the exercise of anticipatory self-defense in order to guarantee a minimum of right to life is not a choice, but the only essential correspondence concept. At the moment that the North Korean nuclear provocation is expected in the near future, it shall be provided with competence to strike the origin region of provocation by forming a national consensus of preemptive strike enforcement. Also, in preparation for the fifth nuclear test of North Korea, which is anticipated, the national competence must be mobilize to be able to ensure the 'Nuclear Option' from the international community.

The Study of System Visibility of Universal Middleware Pervasive Memorial Engine (시스템가시성평가를 위한 유니버설미들웨어기반 Pervasive Memorial Engine 연구)

  • Lee, Hae-Jun;Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.335-338
    • /
    • 2017
  • Presently, the collaboration hardware system and software technology that promoted commercializing ICBMS for integrated system visibility evaluation. This variation will move on the next pervasive period that mixed with cultural and technology convergence. There is possibility for the period system can invoke unpredictable confusing blank state. The blank state systems have ecosystem characteristics that are supplied, maintained and operated through the complex interactions of technology and culture. Using universal middleware can support the life-cycle model and increase the visibility of complex systems and prepare for confusing situations. In this study, based on universal middleware, data and service dynamic standardized modules were evaluated to support stable system visibility platform. The system visibility module consists of Intelligent Pervasive Cloud module, Memorial Service module and Life Cycler connection module. each module reflects various requirements of system visibility requested by external system. In addition, the analysis results are supported by various network application service standards through platform independent system and architecture.

  • PDF