• Title/Summary/Keyword: Military Strategy

Search Result 396, Processing Time 0.026 seconds

Analysis of the Operation of China Air Defense Identification Zone (CADIZ) corresponding to the PRC's maritime strategy and the ROK's response measures (중국의 해양전략과 연계한 중국방공식별구역(CADIZ) 운영 분석과 우리의 대응방안)

  • Kim, Dongsoo;Chong, Mangseok;Hong, Sungpyo
    • Journal of Aerospace System Engineering
    • /
    • v.11 no.2
    • /
    • pp.35-42
    • /
    • 2017
  • This paper analyzes the intention of the PRC (People's Republic of China) to establish and operate CADIZ to implement the government's maritime policy and strategy and to project its air power in preparation for maritime provocation and contingency, especially over the area where East Asia countries have claimed to have maritime jurisdiction over one another. This paper is also intended to guide the Republic of Korea's response measures for coping with the maritime intention and threat of China by such measures as reinforcing military power, constructing the strategic air base in Jeju, and expanding the present KADIZ.

A Study on Establishing of the Future Development Strategy for National Cyber Terror Response (국가 사이버테러대응 미래 발전전략 수립에 관한 연구)

  • Kim, MinSu;Yang, Jeongmo
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.15-24
    • /
    • 2020
  • Cyber terror and cyberwarfare are no longer virtual, but real, and as an actual security situation, it is necessary to have new understanding through expanding the concept of war to neutralize not only the other country's military command system, but also the country's main functions such as telecommunications, energy, finance, and transport systems, and it also needs to establish the future development strategy of cyber terror response at the national level. Through analysis of cyberwarfare trends in each country and current status of cyberwarfare in Korea, it will systematically explore the demand of new policy based on laws and systems, including the strategies of cyber security technology development, industry promotion, and manpower training and existing information protection policies. through this, it effectively manages a sustainable national crisis, and it suggests to establish a future strategy for the medium and long term cyber security that can effectively and actively respond to cyberwarfare.

An Effective ESICD Verification Strategy: A case study of Military Satellite Communications System II

  • Lee, Kee-Sung;Choi, Jun-Ho;Shin, Jeong-Jin;Yoon, Hye-Jin;Kim, Seung-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.9
    • /
    • pp.105-114
    • /
    • 2021
  • ESICD(Electrical Signal Interface Control Document) refers to a document that describes protocols and data for communication between components consist of a system. Each component developer gathers at a specific place to conduct an integrated test for ESICD verification. In this case, it often happens that the integration test is delayed due to a simple mistake of software developers. There are two reasons for this situation: First, software developers do not perform sufficient verification because it is difficult to configure the system environment in a Lab, and second, they do not immediately find the cause of errors occurred during integration tests. Therefore, in this paper, we propose a strategy to effectively perform ESICD verification, which takes a lot of time between the production and implementation stage of the weapon system development stage and the system integration test stage.

Threats in the space domain and policy recommendations for national security (우주영역의 위협과 국가안보 차원 정책제언)

  • Il Soo Bae;Jung Geun Chin;Hee Tae Jeong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.6
    • /
    • pp.131-136
    • /
    • 2024
  • As the Russo-Japanese War and the Li-Xia War demonstrate, influence in space is increasingly being exercised militarily rather than peacefully. In the era of Newspace, not only states but also private companies have emerged as actors in space warfare. Although international law stipulates that outer space is to be used for peaceful purposes, it is imperative for the survival and prosperity of the nation to establish a national security policy regarding the dangers and threats that arise from outer space, as military use is clear. Threats that may occur in the space domain can be divided into kinetic and non-kinetic threats. Kinetic threats include anti-satellite missiles, collisions between space satellites and debris, and laser attack weapons. Non-kinetic threats include electronic and cyberattacks, and space radiation. A space strategy that is harmonious and balanced is needed to avoid imbalances in policies to respond to risks and threats in space. From a national security perspective, it was suggested to develop independent space assets, expand space assets to the private sector, and prepare for space wars.

Development of Distributed Drone Logistics Support Strategy for Modern Battlefield Environments (현대 전장 환경에 대응하는 분산형 드론 군수 지원 전략 개발)

  • Kyoung-Haing Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.5
    • /
    • pp.209-217
    • /
    • 2024
  • This study aims to develop a distributed drone logistics support strategy to address the rapid changes and increasing complexity of modern battlefield environments. By analyzing the vulnerabilities and limitations of existing centralized logistics systems, this research proposes a new paradigm of distributed logistics support utilizing drone technology. The study presents a comprehensive approach, including the design of a distributed network-based drone logistics support model, development of dynamic route planning and mission reassignment algorithms, and operational strategies incorporating concealment and deception techniques. Furthermore, it proposes methods for verifying the effectiveness of the strategy through simulation and outlines the technical and human resource requirements for practical implementation. The results of this study are expected to significantly enhance the survivability and efficiency of logistics support systems in future battlefields and provide an innovative model applicable to civilian logistics sectors.

Roles and strategic functions of the Jeju Naval Base (제주 해군기지의 역할과 전망)

  • Lee, Choon Kun
    • Strategy21
    • /
    • s.39
    • /
    • pp.140-162
    • /
    • 2016
  • The construction of Jeju Naval Base was finally completed and donated to the Republic of Korea Navy on February 26th this year. There is no doubt that the new base will contribute to the substantial augmentation of Korea's naval power and maritime security. However, we should note that the new naval base took a long and hard twenty-three years to be completed. In the 21st century, Korea should adopt a new strategy that can fulfill the security requirements of Korea for the new age of international relations. The 21st century is characterized by globalization, and in the world of globalization, a national boarder has become meaningless. In the late 20th century, after the Cold War, trade between countries have greatly increased and so did the importance of the seas. Having transformed from an agricultural country into a commercial country, Korea went from a continental state to a maritime state. Korea has become the 9th largest trading state, and obviously, the importance of the sea has become significant. Korea's national strategic focus needs to be on the sea for national survival. Thus, since the 1990s, the Korean Navy has planned to build the Jeju Naval Base. Jeju, due to its geopolitical characteristics, is extremely important to the 21st century Korea's economy and national security. Jeju is the starting point of the sea route that reaches out to the world, and at the same time, the ending point of the sea route that heads towards Korea. Jeju is located in the center of Northeast Asia and thus, Jeju Naval Base is extremely important for the area's security and order. Jeju Naval Base will be very useful not only for the maritime security of Korea, but also for keeping peace and order in Northeast Asia. Jeju Naval Base was the minimal effort against the six sea route security threats towards Korea. The six sea route threats are: 1) Threat from North Korea; 2) China's Threat towards Korea's sovereignty; 3) China's treat towards Korea's fishery; 4) Threat from Japan; 5) Threat towards Korea's sea routes; 6) Threat from recent phenomena of isolationism of the United States. Jeju Naval Base is built for both warships and civilian ships--such as cruise ships--to use. Just like the United States' Pearl Harbor, Jeju Naval Base will become not only the largest military base, but a beautiful tourist site.

A Review on the Change in Submarine Roles in Naval Warfare: Based on Warfare Paradigm (전쟁 패러다임의 전환에 따른 잠수함의 역할 변화에 대한 고찰)

  • Jang, Jun-Seop
    • Strategy21
    • /
    • s.46
    • /
    • pp.89-122
    • /
    • 2020
  • The longing for submarine manufacture and the fear of her power had exited for a long time, but submarine that could submerge and attack was built from 20th century by science technology development. The question, 'Submarine can exercise her power in naval warfare?' had exited before World War I, but the effective value of submarine was shown in the procedure of a chain of naval warfare during World War I and World War II. Germany and the United States made the best use of submarines at that time. The submarines of these nations mounted fierce attack on the enemy's battleships and merchant ships and blocked the sea lanes for war material. These fierce attack on ships became impossible After World War II, and the major powers reduced and coordinated the defence budget, so they considered the role of submarine. However, submarine is still powerful weapon system because she can secretly navigate under the water, and one of the most important force in the navy. The aim of this thesis is analyzing submarine roles in each naval warfare and integrating maritime strategy and weapon system technology into her roles. First, the research about represent submarine roles like anti-surfaceship warfare, anti-submarine warfare, intelligence gathering, land attack, supporting special operation and mine landing warfare will be presented, then the major naval warfare where submarine participated(during ex-World War I, World War I, World War II, The Cold War Era and post Cold War) and the analyzing of submarine roles by time will be presented. Submarine was developed for anti-surfaceship warfare during ex-World War I but could not make remarkable military gain in naval warfare because her performance and weapon was inadequate. However, the effective value of submarine in the procedure of a chain of naval warfare was shown during World War I and World War II. The major powers put battleships into naval warfare undiscriminatingly to command the sea power and submarines did massive damage to enemy navy power, so put a restraint the maritime power of enemy, and blocked the sea lanes for war material. After World War II, the battlefield situation changed rapidly and the concept of preemption became difficult to apply in naval warfare. Therefore, the submarine was unable to concentrate on anti-surfaceship mission. Especially during the Cold War era, nuclear submarine came to appear and her weapon system developed rapidly. These development gave submarines special missions: anti-submarine warfare and intelligence gathering. At that time, United States and Soviet submarines tracked other nation's submarines loaded with nuclear weapons and departing from naval their base. The submarines also collected information on the volume of ships and a coastal missile launching site in company with this mission. After Cold War, the major powers despatched forces to major troubled regions to maintain world peace, their submarines approached the shores of these regions and attacked key enemy installations with cruise missiles. At that time, the United States eased the concept of preemption and made the concept of Bush doctrine because of possible 911 terrorism. The missiles fired from submarines and surface battleships accurately attacked key enemy installations. Many nations be strategically successful depending on what kind of mission a submarine is assigned. The patterns of future naval warfare that my country will provide against will be military power projection and coalition/joint operations. These suggest much more about what future missions we should assign to submarines.

The Effects of Microcomputer Networking on the Perception of Threats to Security : the Military User크s Case (마이크로컴퓨터의 네트워크화 여부가 보안 위협 인식에 미치는 영향 : 군조직을 대상으로)

  • 이찬희;김준석;서길수
    • The Journal of Information Technology and Database
    • /
    • v.6 no.2
    • /
    • pp.1-18
    • /
    • 1999
  • The purpose of this study was to identify the effect of microcomputer networking on user perception of potential threats to security employing user attitudes as a moderating variable. A research model consisting of microcomputer networking as the independent variable, user perception of potential threats to security as the dependent variable, and user attitude toward security control as the moderating variable was developed through literature review. The results of this study provide an empirical evidence of the importance of environmental change(information systems networking) on user perception of potential threats to security. Further-more the result imply that in order to improve security performance through the reinforcement of user perception of threats to security in the organization, user attitudes should be made favorable.

  • PDF

A Study on the Evolutionary Process of Aircraft Production Quality Management System - Comparison of Characteristics of Domestic and Foreign Companies (항공기생산 품질경영시스템 발전 과정 연구 - 국내외 업체간 특징 비교)

  • Lee Sung Ju;Byun Jai-Hyun
    • Journal of Korean Society for Quality Management
    • /
    • v.32 no.3
    • /
    • pp.166-181
    • /
    • 2004
  • The aircraft production quality management system in Korea has been implemented to support the developmental phase of Korean aircraft industries, from overhaul of the aircraft and engines to development of military trainer aircraft. After the deletion of the Mil-Q-9858A standard in 1996, Korean aerospace companies established ISO 9001 and AS 9100 as their basic aerospace quality management system specifications. These quality standards were adopted in the same period of time by other leading international aircraft manufacturing companies. This paper presents a future direction on the improvement of quality management systems for Korean aircraft production company by considering (1) Korean governments strategy for the development of Korean aircraft Production industries, (2) short and long term business plan of Korean aerospace industries, and (3) benchmarking leading international company's quality management systems.

Iterative Regression Optimization of Two-Parameters in Micellar Liquid Chromatography (미셀 액체 크로마토그래피에서 두 가지 파라미터의 반복 회귀 최적화)

  • Kim, In-Whan;Kim, Sang-Tae
    • Analytical Science and Technology
    • /
    • v.6 no.3
    • /
    • pp.267-274
    • /
    • 1993
  • The iterative regression optimization strategy using two parameters is described and applied to the separation of amino acids and peptides by means of micellar liquid chromatography. The parameters examined are concentration of surfactant and 2-propanol. This approach results in a efficient optimization using a small number of initial experiments.

  • PDF