• Title/Summary/Keyword: Military strategy

Search Result 375, Processing Time 0.023 seconds

Identifying Differentially Expressed Genes and Screening Small Molecule Drugs for Lapatinib-resistance of Breast Cancer by a Bioinformatics Strategy

  • Zhuo, Wen-Lei;Zhang, Liang;Xie, Qi-Chao;Zhu, Bo;Chen, Zheng-Tang
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.24
    • /
    • pp.10847-10853
    • /
    • 2015
  • Background: Lapatinib, a dual tyrosine kinase inhibitor that interrupts the epidermal growth factor receptor (EGFR) and HER2/neu pathways, has been indicated to have significant efficacy in treating HER2-positive breast cancer. However, acquired drug resistance has become a very serious clinical problem that hampers the use of this agent. In this study, we aimed to screen small molecule drugs that might reverse lapatinib-resistance of breast cancer by exploring differentially expressed genes (DEGs) via a bioinformatics method. Materials and Methods: We downloaded the gene expression profile of BT474-J4 (acquired lapatinib-resistant) and BT474 (lapatinib-sensitive) cell lines from the Gene Expression Omnibus (GEO) database and selected differentially expressed genes (DEGs) using dChip software. Then, gene ontology and pathway enrichment analyses were performed with the DAVID database. Finally, a connectivity map was utilized for predicting potential chemicals that reverse lapatinib-resistance. Results: A total of 1, 657 DEGs were obtained. These DEGs were enriched in 10 pathways, including cell cycling, regulation of actin cytoskeleton and focal adhesion associate examples. In addition, several small molecules were screened as the potential therapeutic agents capable of overcoming lapatinib-resistance. Conclusions: The results of our analysis provided a novel strategy for investigating the mechanism of lapatinib-resistance and identifying potential small molecule drugs for breast cancer treatment.

Analysis and implications on Ukrainian Military Intelligence Team's Decapitation Operation (우크라이나 군사정보팀의(Military Intelligence Team) 핀셋작전 분석과 시사점)

  • Cho, Sang Keun;Zhytko, Andrii;Park, Sung Jun;Kwon, Bum June;Seo, Kanh ll;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.435-439
    • /
    • 2022
  • ROK has a lot to benchmark from how Ukraine is fighting Russia back with its tactical wins. They have taken a targeted strategy to strike Russia's top generals with high precision. To carry out this strategy, Ukraine is operating a Special Operations Force, which utilizes US/NATO forces, civilian and own resources for maximum impact. Of note, they utilize Starlink for seamless connection from detection, decision-making to strike to maximize operational efficiency. As ROK faces security threat of weapons of mass destruction, Ukraine's military intelligence organization set-up, weapons system and operations can provide some guidance on how to leverage its various SOF as well.

A Study on Zero Trust Establishment Plan for Korean Military (한국군 맞춤형 제로 트러스트(Zero Trust) 구축방안 연구)

  • Kyuyong Shin;Chongkyung Kil;Keungsik Choi;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.131-139
    • /
    • 2023
  • In recent years, there have been frequent incidents of invasion of national defense networks by insiders. This trend can be said to disprove that the physical network separation policy currently applied by the Korea Ministry of National Defense can no longer guarantee military cyber security. Therefore, stronger cybersecurity measures are needed. In this regard, Zero Trust with a philosophy of never trusting and always verifying is emerging as a new alternative security paradigm. This paper analyzes the zero trust establishment trends currently being pursued by the US Department of Defense, and based on the implications derived from this, proposes a zero trust establishment plan tailored to the Korean military. The zero trust establishment plan tailored to the Korean military proposed in this paper includes a zero trust establishment strategy, a plan to organize a dedicated organization and secure budget, and a plan to secure zero trust establishment technology. Compared to cyber security based on the existing physical network separation policy, it has several advantages in terms of cyber security.

Conditions and Strategy for Applying the Mosaic Warfare Concept to the Korean Military Force -Focusing on AI Decision-Making Support System- (한국군에 모자이크전 개념 적용을 위한 조건과 전략 -AI 의사결정지원체계를 중심으로-)

  • Ji-Hye An;Byung-Ki Min;Jung-Ho Eom
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.122-129
    • /
    • 2023
  • The paradigm of warfare is undergoing a revolutionary transformation due to the advancements in technology brought forth by the Fourth Industrial Revolution. Specifically, the U.S. military has introduced the concept of mosaic warfare as a means of military innovation, aiming to integrate diverse resources and capabilities, including various weapons, platforms, information systems, and artificial intelligence. This integration enhances the ability to conduct agile operations and respond effectively to dynamic situations. The incorporation of mosaic warfare could facilitate efficient and rapid command and control by integrating AI staff with human commanders. Ukrainian military operations have already employed mosaic warfare in response to Russian aggression. This paper focuses on the mosaic war fare concept, which is being proposed as a model for future warfare, and suggests the strategy for introducing the Korean mosaic warfare concept in light of the changing battlefield paradigm.

The influence of Chinese multi-polarization strategy on the security of Korean peninsula (중국의 다극화 전략이 한반도 안보에 미치는 영향)

  • Choe, Gyeong-Sik
    • Journal of National Security and Military Science
    • /
    • s.4
    • /
    • pp.241-287
    • /
    • 2006
  • 16th CPC National Party Congress established multi-polarization strategy as an external strategy, and 'The Great Reinvigoration of Chinese Nation' as the aim of The Great Strategy of China. It is required to maintain stabilized and peaceful surrounding circumstance in order to make it possible. The ideal surrounding circumstance that China is aiming for is to achieve multi-polarization of international society while maintaining strategic deterrence. Multi-polarization now in 'One super Multi powers' is that 'Multi powers' deter 'One super' to prevent predominance of USA and to decentralize the power. China wishes to realign international order as it accomplishes multi-polarization. China who wants 'Peace and Stabilization' emphasizes autonomy, peace and unification of Korean peninsula. Autonomy means the restraint intervention of foreign power, that is, American influence in Korean peninsula. Multi-polarization strategy of China will be used in Korean peninsula to solve nuclear issue of North Korea, to support neutral unification and to keep balance of power with USA, Japan and Russia as it renders economic advantages to South Korea and security engagement to North Korea, based on special geographical, cultural and historical relationship with two Koreas. The nuclear issue of North Korea will be a stage to test multi-polarization of China. When it deduces positive solution of nuclear issue due to successful six-party talks, and advances to security talks of Northeast Asia, it will contribute a lot to power and elevation of national stature of China in international society. Thus, the Chinese strategy will be an accommodative condition for the security of South Korea, and it requires wise decision of South Korea to make hay while the sun shine.

  • PDF

The Trend and Implications of the Publication of China's Defense and Security White Papers (중국의 국방·안보백서 발간의 추이와 함의)

  • Kim, Kang-nyeong
    • Korea and Global Affairs
    • /
    • v.3 no.1
    • /
    • pp.39-76
    • /
    • 2019
  • This paper is to analyze the trend and implications of the publication of China's defense and security white papers. To this end the paper is composed of 5 chapters titled instruction; publication details and composition of China's defense and security white paper; the gist of the white paper on national defense and security during the Chinese president Xi Jinping era; the implications of Chinese white paper on national defense and security during the Chinese president Xi Jinping era; and conclusion. The Chinese Ministry of National Defense had published seven books every two years since 1998 to 2010. In 1995, the ministry published a white paper titled 'China's arms control and disarmament' for the first time. In 2013, it published a white paper titled 'The Diversified Employment of China's Armed Forces' and 'China's Military Strategy' in 2015. All have the common characteristic of being a propaganda policy reflecting China's strategic calculations. It seems that China has began to publish defense white papers in a proactive manner, due to the following factors: (1)pressure on China to demand military transparency from neighboring countries such as the United States; (2)the erosion of the 'China threat.' and (3)confidence in the achievement of China's military modernization. The 'active defensive strategy' and the 'strong defense strategy' of Si Jinping are implied in the words "China's dream is a dream of a powerful country and dream of a strong nation is essential to construct a strong nation." His these strategies have raised security concerns for neighboring countries. We need to maintain and reinforce strong ROK-US security cooperation, and hedging strategies to harmoniously promote ROK-China economic cooperation.

China and Central Asia : Soft Balancing Strategy against the U.S. (중국과 중앙아시아 관계 : 미국에 대한 소프트밸런싱 전략을 중심으로)

  • Kang, Teak Goo;Kim, Yei kyoung
    • Journal of International Area Studies (JIAS)
    • /
    • v.16 no.2
    • /
    • pp.121-146
    • /
    • 2012
  • The purpose of this paper is to study on China's emergence and its influence on international society against the U.S. hegemony. Recently, China's influence has proliferated in Central Asia as well as East Asia at a rapid rate. China, through its soft balancing strategy, increased its influence in Central Asia in response to the U.S. power and behavior. This study analyzes the relationship among China and Central Asia with the view of soft balancing theory. In order to determine whether China's strategy on Central Asia is soft balancing, this paper presents three indicators: 1) Second-tier major power is willing to take a strategy that increase diplomatic cost of hegemony or counter the hegemony influence through using regional and global multilateral cooperation. 2) Second-tier major power is willing to not only increase its influence by strengthening regional economic cooperation, but also check the extension of the hegemony economic influence into its boundary. 3) Second-tier major power intends to prevent expanding hegemony military influence into the region through limited military cooperation and increasing military spending, and denying territory. This paper analyze China's multi-polar strategy, economic and energy cooperation with Central Asia countries, and the military and security cooperation with multilateral organizations such as SCO.

Analysis of the factors of the failure of the North Korean Army's Great Bypass Maneuver to Honam during the Korea War from an indirect approach strategy: Focusing on the Naval and Marine Corps' Tongyeong Amphibious Operation to Stop the "Dislocation" (간접접근전략으로 본 6·25전쟁기 북한군의 호남 방면 대우회기동 실패 요인 분석 -'교란'을 저지한 해군·해병대의 통영상륙작전을 중심으로-)

  • Choi, Ho-jae
    • Maritime Security
    • /
    • v.6 no.1
    • /
    • pp.109-135
    • /
    • 2023
  • The North Korean military's maneuver toward Honam was the fastest maneuver the North Korean army had demonstrated during the Korean War, and it was a threatening attack that forced the Korean and Allied forces to fully adjust the defenses of the Nakdong River. However, when this study analyzed the North Korean military's maneuver toward Honam in terms of indirect approach strategy, there were a number of factors that inevitably led to its failure. In terms of implementing the indirect approach strategy, the North Korean military cited a number of failure factors, including the dispersion of combat forces, the inflexibility of changing the line of operation, the maneuvering of ground forces, and the lack of psychological distaction. However, the North Koreans were preparing for a final "surprise attack," in which the 7th Division, which was following the North Korean 6th Division, took another diversion and attempted to attack in the direction of Tongyeong. With this, the North Koreans intended to break through the Nakdong River defenses and head for Pusan. However, the North Korean attack was ultimately thwarted by the Korean Navy and Marine Corps' Tongyeong Amphibious Operation. With a swift maneuver using the sea as a maneuvering space, the Navy and Marine Corps occupied key points first, creating an advantageous situation and fending off an attack by the North Korean 7th Division. The Navy and Marine Corps' Tongyeong Amphibious Operation finally thwarted the North Korean military's maneuver toward Honam, thus maintaining the Nakdong River defenses.

  • PDF

Object Detection Accuracy Improvements of Mobility Equipments through Substitution Augmentation of Similar Objects (유사물체 치환증강을 통한 기동장비 물체 인식 성능 향상)

  • Heo, Jiseong;Park, Jihun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.3
    • /
    • pp.300-310
    • /
    • 2022
  • A vast amount of labeled data is required for deep neural network training. A typical strategy to improve the performance of a neural network given a training data set is to use data augmentation technique. The goal of this work is to offer a novel image augmentation method for improving object detection accuracy. An object in an image is removed, and a similar object from the training data set is placed in its area. An in-painting algorithm fills the space that is eliminated but not filled by a similar object. Our technique shows at most 2.32 percent improvements on mAP in our testing on a military vehicle dataset using the YOLOv4 object detector.

Development and Application of Effect Measurement Tool for Victory Factors in Offensive Operations Using Big Data Analytics (빅데이터를 통한 공격작전 승리요인 효과측정도구 개발 및 분석 : KCTC 훈련사례를 중심으로)

  • Kim, Gak-Gyu;Kim, Dae-Sung
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.39 no.2
    • /
    • pp.111-130
    • /
    • 2014
  • For the key factors determining victory of combat, many works have been focusing on qualitative analyses in the past. As military training paradigm changes along with technology developments, demands for scientific analysis to prepare future military strength increase regarding military training results, and big data analysis has opened such possibility. We analyze the data from KCTC (Korea Combat Training Center) training to investigate the factors affected victory in offensive operations. In this context, we develop a way to measure the victory and the factors related to it from existing studies and military doctrines. We first identify Independent variables that affect offensive operations through variable selection and propose a mathematical model to explain combat victory by performing multiple regression analysis. We also verify our results with battalion-level live training data as well as previous studies on victory factors in the military doctrines.