• 제목/요약/키워드: Layer Defense

검색결과 253건 처리시간 0.034초

중국의 해군력 증강과 미국 해군의 대응전략 -중국 해군의 반접근/지역거부(A2/AD)전략 수행능력을 중심으로- (China's Naval Strengthening and US Navy's Counter-Forces)

  • 김덕기
    • Strategy21
    • /
    • 통권42호
    • /
    • pp.196-223
    • /
    • 2017
  • The aim of this paper is to analyze China's naval strengthening and threat reflected in submarines, aircraft, destroyers and missile capabilities and US Navy's counter-forces. China is strengthening its naval forces in accordance with its three-step naval force build-up plan, and the introduction of Russian destroyers and submarines is a foothold for China's naval enforcement. The Chinese Navy also converted the concept of the First-Second Island Chain Defense, which it had already maintained, to the concept of maritime layer defense. Currently, the Chinese Navy maintains the concept of a Three-Maritime Layer Defense which includes the South China Sea, where artificial islands are being built by China, in the First Layer Defense and the East China Sea in the Third Layer Defense. Along with the advancement of Chinese Navy's submarines, surface vessels and aircraft's operational capabilities, ballistic and cruise missile capabilities become a major threat to the US Navy. If a crisis occurs in the East China Sea or in the Taiwan Waters, the US Navy will face more difficulties in employing the Carrier Strike Group to manage the crisis. Meanwhile, if a crisis occurs on the Korean Peninsula, it will be a burden to dispatch Carrier Strike GroupS to the East and West Seas of the Korean Peninsula. For the stable future, the US Navy should develop a strategy to respond more effectively to the Chinese Navy, which is challenging new maritime supremacy in East Asia.

Selecting the Optimal Hidden Layer of Extreme Learning Machine Using Multiple Kernel Learning

  • Zhao, Wentao;Li, Pan;Liu, Qiang;Liu, Dan;Liu, Xinwang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권12호
    • /
    • pp.5765-5781
    • /
    • 2018
  • Extreme learning machine (ELM) is emerging as a powerful machine learning method in a variety of application scenarios due to its promising advantages of high accuracy, fast learning speed and easy of implementation. However, how to select the optimal hidden layer of ELM is still an open question in the ELM community. Basically, the number of hidden layer nodes is a sensitive hyperparameter that significantly affects the performance of ELM. To address this challenging problem, we propose to adopt multiple kernel learning (MKL) to design a multi-hidden-layer-kernel ELM (MHLK-ELM). Specifically, we first integrate kernel functions with random feature mapping of ELM to design a hidden-layer-kernel ELM (HLK-ELM), which serves as the base of MHLK-ELM. Then, we utilize the MKL method to propose two versions of MHLK-ELMs, called sparse and non-sparse MHLK-ELMs. Both two types of MHLK-ELMs can effectively find out the optimal linear combination of multiple HLK-ELMs for different classification and regression problems. Experimental results on seven data sets, among which three data sets are relevant to classification and four ones are relevant to regression, demonstrate that the proposed MHLK-ELM achieves superior performance compared with conventional ELM and basic HLK-ELM.

TCP/IP Layer별 공격패턴 분석에 기반한 CFC를 이용한 DDoS 방어 알고리즘 연구 (A Study on the DDoS Defense Algorithm using CFC based on Attack Pattern Analysis of TCP/IP Layers)

  • 서우석;박대우;전문석
    • 디지털산업정보학회논문지
    • /
    • 제6권4호
    • /
    • pp.117-130
    • /
    • 2010
  • Paper is on defense for so-called internet crisis, the attack of DDoS (Distributed Denial of Service) which was targeted to the central government ministries, financial sector, and portal sites of chief counties including Korea on June 7th, 2009 as its start. By conducting attack with various DDoS attacking methods in the lab environment and dividing networks targeted by the attack by layers, this paper records and analyzes the chief information for attack, destination information of packets, defense policy setting, and the flow of packet attack with the subjects of the networks separated. This study suggests CFC system using multiple firewalls applying defense policy corresponding to the target layer for ultimate attack and tests it according to the result of analyzing the attack packet information and its amount, log analysis, access recording port, and MAC and IT information, etc. by layers. This article is meaningful in that it analyzes the attack by layers, establishes firewall policy for protecting each layer, and secures accurate mechanism for detect and defense.

현대적인 관점인 내장계와 체벽계로 바라본 영기(營氣)와 위기(衛氣)에 대한 연구 (A study of Nutrient Qi(營氣) and Defense Qi(衛氣) from the modern perspective of Visceral body and Somatic body)

  • 주다현;김병수
    • 대한한의학회지
    • /
    • 제43권3호
    • /
    • pp.36-48
    • /
    • 2022
  • Objectives: The aim of this study is to modernize Nutrient Qi(營氣) and Defense Qi(衛氣) from the point of view of Visceral Body and Somatic Body. Methods: Investigate the areas of body and function of Nutrient Qi(營氣) and Defense Qi(衛氣) recorded in the 『HuangdiNeijing(黃帝內經)』 and 『Dongeuibogam(東醫寶鑑)』. And investigate Visceral Body and Somatic Body that anatomical structure is divided according to function based on the book 『Life and Rhythm』. Results: Nutrient Qi(營氣) works to nourish the body such as viscera and bowels in the meridian. Defense Qi(衛氣) works to protect the body such as skin, limb joint, eye outside the meridian. The human body is divided into Visceral Body called a vegetable organ and Somatic Body called an animal organ. Visceral body is the organ that manages "nutrition-reproductive" and is divided into the intestine(腸管), blood vessels(血管), and the nephridium(腎管). Somatic Body is an organ that manages 'sensory-motion' and is divided into a three-layer structure: the outer layer covering the body surface, the nerve layer connecting the outer layer and the muscle layer, and the muscle layer controling contraction and movement. Conclusions: It is estimated that Nutrient Qi(營氣) is similar to Visceral Body, and Defense Qi(衛氣) is similar to Somatic Body.

소나 음향창의 설계 인자가 난류 유동 유기 자체 소음의 전달 함수에 미치는 영향 해석 (The Influence of Design Factors of Sonar Acoustic Window on Transfer Function of Self Noise due to Turbulent Boundary Layer)

  • 신구균;서영수;강명환;전재진
    • 한국소음진동공학회논문집
    • /
    • 제23권1호
    • /
    • pp.56-64
    • /
    • 2013
  • Turbulent boundary layer noise is already a significant contributor to sonar self noise. For developing acoustic window of sonar system to reduce self noise, a parametric study of design factors of acoustic window is presented. Distance of sensor array from acoustic window, materials of acoustic window and characteristics of damping layer are studied as design factors to influence in the characteristics of the transfer function of self noise. As the result, these design factors make change the characteristics of transfer function slightly. Among design factors the location of sensor array is most important parameter in the self noise reduction

Cr-Mo-V강의 친환경 염욕질화처리에 의한 표면특성 연구 (A Study on Surface properties of Cr-Mo-V Steel by Eco-friendly Salt Bath Nitriding Treatment)

  • 정길봉
    • 한국군사과학기술학회지
    • /
    • 제13권2호
    • /
    • pp.275-282
    • /
    • 2010
  • The improved properties of surface layer can be achieved by so-called "new salt bath nitriding(NSBN)", which has been developed by a domestic company. This process based upon modified traditional salt bath nitriding process, increased hardenability with minimum toughness deterioration. This process also offers not only less white layer surfaces but also more eco-friendly one. That is, NSBN is the new eco-friendly surface treatment technology removing harmful $CN^-$ and toxic gas. According to the research of applying NSBN to Cr-Mo-V steel which has been used in defense industry, showed the improved result of wear resistance and surface hardening than non-coated condition. In further, we expect NSBN to curtail expenses and productivity improvement applied to the various defense industry parts.

사이버 방어를 위한 적응형 다중계층 보호체제 (Adaptive Multi-Layer Security Approach for Cyber Defense)

  • 이성기;강태인
    • 인터넷정보학회논문지
    • /
    • 제16권5호
    • /
    • pp.1-9
    • /
    • 2015
  • 사이버 공간에서 첨예화, 복잡화되고 있는 공격을 일대일 방식으로 방어하는데 한계가 있으므로 보다 효과적인 방어 방법이 필요하다. 본 고에서는 내외부의 공격에 대해 자산을 체계적 적응적으로 방어할 수 있는 다중계층 보안체제 구축 방안을 제시한다. 방어지역(Defense Zone)을 중심으로 한 다중계층 보안체제의 구조를 고안하고, 사이버 위협분석과 방어기술 자동할당 등 구현에 필요한 기술요소들에 대해 논의한다. 또한, 다중계층 보안체제에 대한 효과와 적용성을 보인다. 향후, 제시된 방안의 구체화를 위해 방어지역에 대한 상세구조설계, 최적 방어기술 자동선택방법, 위협 탐지를 위한 정상상태 모델링 기술 등에 대한 연구가 필요하다.

Estimation of Physical Layer Scrambling Code Sequence of DVB-S2

  • Wu, Hao;Xie, Hui;Huang, Zhi-Tao;Zhou, Yi-Yu
    • ETRI Journal
    • /
    • 제36권2호
    • /
    • pp.329-332
    • /
    • 2014
  • In this letter, the problem of estimating the physical layer (PL) scrambling code sequence of DVB-S2 is studied. We present the first ever scheme to estimate the scrambling sequence. The scheme is based on hypothesis testing. By analyzing the PL scrambling process, we construct a new sequence equivalent to the scrambling sequence. We then use hypothesis testing to estimate the new sequence. The threshold for the hypothesis testing is also discussed. The experiment results show that the performance of our estimation scheme can work even under high BER.

Design of stepwise foam claddings subjected to air-blast based on Voronoi model

  • Liang, Minzu;Lu, Fangyun;Zhang, Guodong;Li, Xiangyu
    • Steel and Composite Structures
    • /
    • 제23권1호
    • /
    • pp.107-114
    • /
    • 2017
  • Design of stepwise foam claddings subjected to air-blast is performed based on random Voronoialgorithm. FE models are constructed using the random Voronoialgorithm, and numerical analysis is carried out to simulate deformation mode and energy absorption of the cladding by the ABAQUS/Explicit software. The FE model is validated by test result, and good agreement is achieved. The deformation patterns are presented to give an insight into the influences of distribution on deformation mechanisms. The energy absorbed by the stepwise foam cladding is examined, and the parameter effects, including layer number, gradient, and blast loading, are discussed. Results indicate that the energy absorption capacity increases with the number of layer, gradient degree, and blast pressure increasing.