• Title/Summary/Keyword: Military Power

Search Result 817, Processing Time 0.025 seconds

The Development of Electromagnetic pulse Protection Capability in the Main System of a Tank Battalion (전차대대 주요체계의 EMP 방호능력 발전방안에 관한 연구)

  • Choi, Hokab;Han, Jaeduk;Son, Sangwoo;Kim, Sungkon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.40 no.6
    • /
    • pp.623-631
    • /
    • 2020
  • An electromagnetic pulse (EMP) attack on a nuclear weapon or the airlift of an electronic bomb affects weapons systems, information devices, wired and wireless communication equipment, and power supply equipment. It can lead to confusion on the battlefield. The current standards for EMP protection when applied to the military are centered on fixed and mobile facilities and equipment. It is, however, important to study EMP protection for a single tactical unit centered on the weapon system. In this study, EMP protection standards were established for command and control, maneuvering and firepower systems vulnerable to EMPs, focusing on battle tanks with mobility, firepower, and shock force. Also, specific development plans for EMP protection capabilities are proposed, including the shielding and blocking of EMPs. Through the study, the Korean government intends to ensure a unit's command and control under an EMP attack as well as preserve the viability of a unit's personnel and guarantee the conditions for the execution of a mission.

A study on Lee Gyubo's Poems Composed before his Travelling to Gangnam (이규보(李奎報)의 강남 유람 이전 한시 연구 - 내면의식을 중심으로 -)

  • Lee, Hee Young
    • (The)Study of the Eastern Classic
    • /
    • no.59
    • /
    • pp.33-56
    • /
    • 2015
  • This paper examines how Lee Gyubo expressed his inner consciousness in his poems, confining chiefly to the works that he composed before his travelling to Gangnam. Criticism of his poems during that period should be subjected to the fact that he was critical-minded about social issues and was eager to succeed as well. He was spending his unlucky life as an intellectual while the military group seized political power. He could not overcome the prejudice of others and expressed his solitude in his lyrics in which he described things around him in detail. By doing this he tried to preserve his inner purity away from dusty world. On the other way he was very sensitive to the passing of time as he was always eager to succeed. Lee Gyubo edited Gangnam-jip after his travelling to Gangnam. After his travel, he sought a government post continuously, and lived a tough life until he was appointed to Jikhallim. What is remarkable is that he seldom expressed his solitude or frustration after his travel in spite of his tough life. It is presumed that he changed his mind to go with the times during his travel and there we can find the meaning of his travel to Gangnam.

Measurement and Analysis of Antenna Induced Voltage for Tactical Mobile Wireless Communication System under HEMP Environment (HEMP 상황 하 전술기동무선통신체계 안테나 유도전압 측정 및 분석)

  • Park, Kyoung-Je;Jeong, Kil-Soo;Kim, Jung-Sup;Park, Yong-Woo;Park, Jae-Hyun
    • Journal of the Korea Society for Simulation
    • /
    • v.30 no.2
    • /
    • pp.33-40
    • /
    • 2021
  • The situation of high-altitude electromagnetic pulses (HEMP) arises from high-altitude nuclear explosions. The HEMP situation can be simulated through the threat level investigation (TLI). In this paper, the induced voltage according to the antenna type of the tactical mobile radio communication system was measured and analyzed by TLI. Under the influence of HEMP, electronic equipment can be paralyzed or damaged. HEMP protection filters are commercially available for power lines and signal lines. However, commercialization of HEMP filters for antennas is insufficient, and even some of them exist for lightning protection. In order to make an appropriate HEMP protection filter according to the frequency and type of the antenna, the induced voltage was measured and the maximum induced voltage was analyzed through extrapolation. It was found that the measured induced voltage decreased as the frequency increased, such as in the HF, VHF and UHF bands of the measurement results.

Cyber threat Detection and Response Time Modeling (사이버 위협 탐지대응시간 모델링)

  • Han, Choong-Hee;Han, ChangHee
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.53-58
    • /
    • 2021
  • There is little research on actual business activities in the field of security control. Therefore, in this paper, we intend to present a practical research methodology that can contribute to the calculation of the size of the appropriate input personnel through the modeling of the threat information detection response time of the security control and to analyze the effectiveness of the latest security solutions. The total threat information detection response time performed by the security control center is defined as TIDRT (Total Intelligence Detection & Response Time). The total threat information detection response time (TIDRT) is composed of the sum of the internal intelligence detection & response time (IIDRT) and the external intelligence detection & response time (EIDRT). The internal threat information detection response time (IIDRT) can be calculated as the sum of the five steps required. The ultimate goal of this study is to model the major business activities of the security control center with an equation to calculate the cyber threat information detection response time calculation formula of the security control center. In Chapter 2, previous studies are examined, and in Chapter 3, the calculation formula of the total threat information detection response time is modeled. Chapter 4 concludes with a conclusion.

Hacking attack and vulnerability analysis for unmanned reconnaissance Tankrobot (무인정찰 탱크로봇에 대한 해킹 공격 및 취약점 분석에 관한 연구)

  • Kim, Seung-woo;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.9
    • /
    • pp.1187-1192
    • /
    • 2020
  • The dronebot combat system is a representative model of the future battlefield in the 4th industrial revolution. In dronebot, unmanned reconnaissance tankrobot can minimize human damage and reduce cost with higher combat power than humans. However, since the battlefield environment is very complex such as obstacles and enemy situations, it is also necessary for the pilot to control the tankrobot. Tankrobot are robots with new ICT technology, capable of hacking attacks, and if there is an abnormality in control, it can pose a threat to manipulation and control. A Bluetooth sniffing attack was performed on the communication section of the tankrobot and the controller to introduce a vulnerability to Bluetooth, and a countermeasure using MAC address exposure prevention and communication section encryption was proposed as a security measure. This paper first presented the vulnerability of tankrobot to be operated in future military operations, and will be the basic data that can be used for defense dronebot units.

China's Hegemony (중국의 패권주의)

  • Lee, Dae Sung
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.81-88
    • /
    • 2020
  • China, since the early days, according to their ideology, neighboring countries and their citizens were under their sphere of power. This means that only the Hanzu are real native Chinese and the other minor ethics groups are technically immigrants. The People's republic of china, part of the chinese communist party, has had rapid economic growth after Deng Xioping took over and implemented various expansionist policies and reforms, opening china to the world. Internally, the minority ethnic groups were forcibly relocated to specific regions, prohibited from using their native languages, and their culture was absorbed or incorporated into the Hanzu culture in an attempt to internally suppress or erase them. Externally, various projects such as the 'Xia-Shang-Zhou Chronology Project', 'Origins of Chinese Civilization Project', 'Northeast Project', 'Northwest Project', and the 'Southwest Project' were implemented to spread their culture and history to neighboring countries in an attempt to expand their territory. In addition, as capitalism spreads throughout china through reforms and its expansion, it has pioneered the one belt one road aiming to secure as safe transit and raw materials, expand their military facilities, and expand their export market. By doing so, China is infringing on other countries' politics, economy, and borders, and as a result there is a need for Korea to also reexamine its policies in all fields related to china such as politics, economy, history, and culture.

Design and Fabrication of Ka-band Waveguide Combiner with High Efficiency and High Isolation Characteristics (고효율 및 높은 격리 특성을 갖는 Ka 대역 도파관 결합기 설계 및 제작)

  • Kim, Hyo-Chul;Cho, Heung-Rae;Lee, Ju-Heun;Lee, Deok-Jae;An, Se-Hwan;Lee, Man-Hee;Joo, Ji-Han;Kim, Hong-Rak
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.2
    • /
    • pp.35-42
    • /
    • 2022
  • In this paper, a method to increase the combining efficiency and isolation of the combiner, the core module of SSPA (solid state amplifier), was studied. Specifically, the isolation was secured by matching the common port and the isolation port in the waveguide combiner. The matching structure for matching is in the form of a circular disk and is engraved inside the waveguide combiner. The structure is very simple, so it is possible to secure stable performance. And this structure showed more than 60 times higher critical power performance compared to previous studies, confirming that it is suitable for high output. And by combining 1-stage T-junction and 2, 3 stage MagicT combiner, miniaturization was achieved and the combining efficiency was optimized by reducing the insertion loss. The fabricated waveguide coupler obtained an isolation of 16dB or more and a coupling efficiency of 86.2%.

GPS Accuracy Revision Using RSSI and AoA in Wireless Sensor Network (무선 센서 네트워크에서 RSSI와 AoA를 활용한 GPS 정밀도 향상 방안)

  • Cho, Hae-Min;Kwon, Tae-Wook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.5
    • /
    • pp.889-896
    • /
    • 2022
  • Data required in a wireless sensor network environment requires more accurate figures as technology advances and its complexity increases. However, in the case of operating a large number of sensor nodes in a large area, the balance between the power consumed and the data quality that can be acquired accordingly should be considered for that purpose. In particular, in complex, densely populated urban areas or military operations with specific goals, location data requires increasingly detailed and high accuracy over a wide range. In this paper, we propose a method of mounting a Global Positioning System(: GPS) only on some of the sensor nodes deployed in the wireless sensor network and improving the error of GPS location data measured on that sensor node through Angle of Arrival(: AoA) and Received Signal Strength Indicator(: RSSI).

Phase Jitter Analysis of Overlapped Signals for All-to-All TWSTFT Operation

  • Juhyun Lee;Ju-Ik Oh;Joon Hyo Rhee;Gyeong Won Choi;Young Kyu Lee;Jong Koo Lee;Sung-hoon Yang
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.3
    • /
    • pp.245-255
    • /
    • 2023
  • Time comparison techniques are necessary for generating and keeping Coordinated Universal Time (UTC) and distributing standard time clocks. Global Navigation Satellite System (GNSS) Common View, GNSS All-in-View, Two-Way Satellite Time and Frequency Transfer (TWSTFT), Very Long Baseline Interferometry (VLBI), optical fiber, and Network Time Protocol (NTP) based methods have been used for time comparison. In these methods, GNSS based time comparison techniques are widely used for time synchronization in critical national infrastructures and in common areas of application such as finance, military, and wireless communication. However, GNSS-based time comparison techniques are vulnerable to jamming or interference environments and it is difficult to respond to GNSS signal disconnection according to the international situation. In response, in this paper, Code-Division Multiple Access (CDMA) based All-to-All TWSTFT operation method is proposed. A software-based simulation platform also was designed for performance analysis in multi-TWSTFT signal environments. Furthermore, code and carrier measurement jitters were calculated in multi-signal environments using the designed simulation platform. By using the technique proposed in this paper, it is anticipated that the TWSTFT-based time comparison method will be used in various fields and satisfy high-performance requirements such as those of a GNSS master station and power plant network reference station.