• 제목/요약/키워드: IT Army

검색결과 608건 처리시간 0.022초

Analysis of Iron Production Technology of Army against Japanese through Slag from Saengsoegol Iron Production Site

  • Kim, Minjae;Chung, Kwangyong
    • Journal of Conservation Science
    • /
    • 제35권4호
    • /
    • pp.317-329
    • /
    • 2019
  • Slag was collected from the iron-producing furnace site in Saengsoegol, Baegun mountain, where iron was manufactured by a righteous army against Japan in the Gwangyang region; then, the iron-manufacturing technique of the early modern period was investigated through scientific analysis. In the microstructure analysis results of the selected samples, iron bloom was mainly observed together with magnetite and fayalite. In the component analysis results of the compounds, it was confirmed that the furnace was built by using gangue of alkali feldspar or plagioclase series, and the ironmaking work was performed at a high temperature of at least 1050℃, because mullite was identified together with cristobalite and hercynite. Based on the chemical composition, it was speculated that low-grade iron ores were used as raw materials, and it seemed that the yield was low, because the total Fe content of the smelting slag samples was 37.72-49.93%. It was difficult to confirm whether a slag former was used, and it seemed that materials easily obtained nearby were used when the furnace was built, without considering the corrosion resistance. It appeared that the ironmaking work was performed at the Gwangyang Saengsoegol iron-producing furnace based on the direct ironmaking method in an environment that could escape the vigilance of the Japanese Empire to produce weapons that would be used for the resistance against Japan. It seemed that there was neither an advanced ironware production system nor a mass production system, and small-scale works were performed in short periods of time.

An Study of Information Security Observance Priority for Smartwork Activation using AHP(Analytic Hierarch Process) (계층적 분석기법(AHP)을 이용한 스마트워크 활성화를 위한 정보보호 준수사항 우선순위에 관한 연구)

  • Im, Jung-Kil;Kim, Sang-Chul;Lee, Hyeon-Uk
    • Journal of Information Technology Services
    • /
    • 제12권2호
    • /
    • pp.291-300
    • /
    • 2013
  • In this study, divide by a private enterprise and army, 2 organizations about observed priority item among administrator, service provider, user viewpoint about the information security item for smartwork activation and in 3 steps hierarchic according to AHP technique analyzed and decided priority for information security observance item. As a result, importance difference could confirm identified by administrator, service provider, user viewpoint period of about information security observance item recognizing in a private enterprise and army.

Consideration of New Convergence Security Threats and Countermeasures in the Zero-Contact Era (비대면 시대의 신 융합보안 위협과 대응 방안에 대한 고찰)

  • Yu, Dong-Hyun;Kim, Yong-Uk;Ha, Young-Jae;Ryu, Yeon-Seung
    • Journal of the Korea Convergence Society
    • /
    • 제12권1호
    • /
    • pp.1-9
    • /
    • 2021
  • Recently, new types of security crimes have been steadily occurring in Korea due to environmental changes such as the development of IT technology, and responding to these threats has become a key national task for the establishment of a safe society as well as individuals and businesses. Meanwhile, as the Zero-Contact Era has arrived since the COVID-19 Pandemics, a new convergence security threat that combines the characteristics of the Zero-Contact Era with the existing IT development is threatening our society. Research to prevent and correct these new levels of threats is continuously required in this study. Chapter 1 examined the causes of new convergence security threats and Chapter 2 discussed cybersecurity, fake news, remote voting·work and video security threats as five major threats.

Optimal Network Defense Strategy Selection Based on Markov Bayesian Game

  • Wang, Zengguang;Lu, Yu;Li, Xi;Nie, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권11호
    • /
    • pp.5631-5652
    • /
    • 2019
  • The existing defense strategy selection methods based on game theory basically select the optimal defense strategy in the form of mixed strategy. However, it is hard for network managers to understand and implement the defense strategy in this way. To address this problem, we constructed the incomplete information stochastic game model for the dynamic analysis to predict multi-stage attack-defense process by combining Bayesian game theory and the Markov decision-making method. In addition, the payoffs are quantified from the impact value of attack-defense actions. Based on previous statements, we designed an optimal defense strategy selection method. The optimal defense strategy is selected, which regards defense effectiveness as the criterion. The proposed method is feasibly verified via a representative experiment. Compared to the classical strategy selection methods based on the game theory, the proposed method can select the optimal strategy of the multi-stage attack-defense process in the form of pure strategy, which has been proved more operable than the compared ones.

A Graphical User Interface Design for Surveillance and Security Robot (감시경계 로봇의 그래픽 사용자 인터페이스 설계)

  • Choi, Duck-Kyu;Lee, Chun-Woo;Lee, Choonjoo
    • The Journal of Korea Robotics Society
    • /
    • 제10권1호
    • /
    • pp.24-32
    • /
    • 2015
  • This paper introduces a graphical user interface design that is aimed to apply to the surveillance and security robot, which is the pilot program for the army unmanned light combat vehicle. It is essential to consider the activities of robot users under the changing security environment in order to design the efficient graphical user interface between user and robot to accomplish the designated mission. The proposed design approach firstly identifies the user activities to accomplish the mission in the standardized scenarios of military surveillance and security operation and then develops the hierarchy of the interface elements that are required to execute the tasks in the surveillance and security scenarios. The developed graphical user interface includes input control component, navigation component, information display component, and accordion and verified by the potential users from the various skilled levels with the military background. The assessment said that the newly developed user interface includes all the critical elements to execute the mission and is simpler and more intuitive compared to the legacy interface design that was more focused on the technical and functional information and informative to the system developing engineers rather than field users.

A Model of Military Helicopter Pilot Scheduling (군용 헬리콥터 조종사 스케줄링 모형)

  • Kim, Joo An;Lee, Moon Gul
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • 제43권4호
    • /
    • pp.150-160
    • /
    • 2020
  • In this paper, we introduce a pilot's scheduling model which is able to maintain and balance their capabilities for each relevant skill level in military helicopter squadron. Flight scheduler has to consider many factors related pilot's flight information and spends a lot of times and efforts for flight planning without scientific process depending on his/her own capability and experience. This model reflected overall characteristics that include pilot's progression by basis monthly and cumulative flight hours, operational recent flight data and quickly find out a pinpoint areas of concern with respect to their mission subjects etc. There also include essential several constraints, such as personnel qualifications, and Army helicopter training policy's constraints such as regulations and guidelines. We presented binary Integer Programming (IP) mathematical formulation for optimization and demonstrated its effectiveness by comparisons of real schedule versus model's solution to several cases experimental scenarios and greedy random simulation model. The model made the schedule in less than 30 minutes, including the data preprocessing process, and the results of the allocation were more equal than the actual one. This makes it possible to reduce the workload of the scheduler and effectively manages the pilot's skills. We expect to set up and improve better flight planning and combat readiness in Korea Army aviation.

Implementation of the Tactical Data Link System of Helicopters-Ground Units Using SEP (SEP를 이용한 헬기와 지상부대 간 전술데이터링크체계 구현)

  • Jeong, Jaehyung;Kwon, Taehwan;Kwon, Yongsoo
    • Journal of the Korean Society of Systems Engineering
    • /
    • 제1권1호
    • /
    • pp.46-52
    • /
    • 2005
  • The Tactical Data Link System(TDLS) is a standardized communication link to exchange and interface positional, situational information, command and control in real time. It has been evalua ted that the link would play an important role for tactical interoperability, situation awareness, and execution of joint operations in the future war. But considering the rapidly changing war situations, even though being admitted the necessity of the TDLS of Army helicopter, one of superpowers in the Army, it is not yet built the detailed operational concept. Therefore, this work presents how to embody the TDLS through the systems engineering approach based on the TDLS operating concept analysis of helicopters-ground units.

  • PDF

A Genetic Algorithm Approach to the Frequency Assignment Problem on VHF Network of SPIDER System

  • Kwon, O-Jeong
    • Journal of the military operations research society of Korea
    • /
    • 제26권1호
    • /
    • pp.56-69
    • /
    • 2000
  • A frequency assignment problem on time division duplex system is considered. Republic of Korea Army (ROKA) has been establishing an infrastructure of tactical communication (SPIDER) system for next generation and it will be a core network structure of system. VHF system is the backbone network of SPIDER, that performs transmission of data such as voice, text and images. So, it is a significant problem finding the frequency assignment with no interference under very restricted resource environment. With a given arbitrary configuration of communications network, we find a feasible solution that guarantees communication without interference between sites and relay stations. We formulate a frequency assignment problem as an Integer Programming model, which has NP-hard complexity. To find the assignment results within a reasonable time, we take a genetic algorithm approach which represents the solution structure with available frequency order, and develop a genetic operation strategies. Computational result shows that the network configuration of SPIDER can be solved efficiently within a very short time.

  • PDF

A Study on the successful model of the e-business for management renovation (경영혁신을 이한 e-비즈니스의 성공모델에 대한 연구)

  • Jo, Jae-Wan
    • Journal of Digital Convergence
    • /
    • 제4권2호
    • /
    • pp.109-126
    • /
    • 2006
  • The United States Intel company and these enterprises which Andy Grove President talks exception are without coming out at the Internet enterprise and the hereafter 5 year back side separately it means the necessity which will write the word which is a Internet enterprise will lose. When that time about, it puts upper volume from the Internet territory which is will open the competition where the relation enterprises are keen the winner will be undertaken the existing enterprises and the place where it receives the footlights where the e-business is many in this recent times which it talks, the reason the whole world becomes connection with the Internet, the frame of the social whole changes and the arrival result completeness sincerity pursuit of information comes to be possible simultaneously, it is changing as the product army which is complicatedly diversified from the product army where the craving of the customer becomes simplification. The consequently quick doctor decision and efficient manufacturing environment construction are demanded and Product Life cycle becomes shortening, the e-Business from the digital management environment which changes suddenly the necessity is plentifully raising its head with plan of competitive power security of the enterprise and management renovation. Successful of the e-business model and failure instances there is a depth from the research which it sees and after trying to investigate, it originated to the advancement of digital environment the strategies and to sleep against the successful model of the e-business for a new management renovation presentation it tries it does.

  • PDF

A study on improving leadership of reserve officers' training corps (ROTC) (학군장교 (ROTC) 리더십 향상 방안 연구)

  • Kim, Jung-Su
    • Journal of the Korean Data and Information Science Society
    • /
    • 제27권6호
    • /
    • pp.1525-1536
    • /
    • 2016
  • ROTC is the system that selects the best students in university and implements the military training of two years and uses them as beginning commander of the army by commissioning as officers. ROTC makes up a very large portion of the army and society in Korea in terms of the size and role. Therefore, it is very important to enhance intangible combat power of the Korean army by improving leadership of primary grade officer from ROTC. The purpose of this paper is to investigate whether or not ROTC candidate training program is providing the right training, so as to improve ROTC's leadership and present improvement plan. First, we divide ROTC candidate training program into three areas and take the 1st and 2nd survey. Then we compare and analyze the actual condition and recognition of investigation using statistical analysis methods such as chi-square test, ANOVA and Duncan's multiple range test. Also, we analyze the element affecting the army leader's three qualities formation which are basic elements of ROTC cadet's leadership using multiple regression analysis.