• Title/Summary/Keyword: National Defense

Search Result 3,420, Processing Time 0.025 seconds

Defense Strategy of Network Security based on Dynamic Classification

  • Wei, Jinxia;Zhang, Ru;Liu, Jianyi;Niu, Xinxin;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5116-5134
    • /
    • 2015
  • In this paper, due to the network security defense is mainly static defense, a dynamic classification network security defense strategy model is proposed by analyzing the security situation of complex computer network. According to the network security impact parameters, eight security elements and classification standard are obtained. At the same time, the dynamic classification algorithm based on fuzzy theory is also presented. The experimental analysis results show that the proposed model and algorithm are feasible and effective. The model is a good way to solve a safety problem that the static defense cannot cope with tactics and lack of dynamic change.

AP2/EREBP Transcription Factors in Rice

  • Kim, Yun-Ju;Jung, Eui-Whan;Hwang, Seon-Hee;Go, Seong-Joo;Hwang, Duk-Ju
    • The Plant Pathology Journal
    • /
    • v.20 no.1
    • /
    • pp.41-45
    • /
    • 2004
  • Plants have the ability to defend themselves against pathogens by activating a series of defense responses. SA is known to be a signal molecule in plant defense responses. Nevertheles, SA is not the only one signal mediating defense responses. In addition to SA, ethylene and jasmonic acid have also been known to mediate plant defense responses against pathogens. The activation of a series of plant defense responses is known to be through varieties of transcription factors. Specially AP2/EREBP transcription factors are involved in ethylene mediated defense signaling. In this review, recent progress on AP2/EREBP transcription factors in arabidopsis, tomato and tobacco and a few of AP2/ EREBP transcription factors in rice related to biotic stresses will be discussed.

A Study on a Way to Utilize Big Data Analytics in the Defense Area (국방분야 빅데이터 분석의 활용가능성에 대한 고찰)

  • Kim, Seong-Woo;Kim, Gak-Gyu;Yoon, Bong-Kyu
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.39 no.2
    • /
    • pp.1-19
    • /
    • 2014
  • Recently, one of the core keywords in information technology (IT) as well as areas such as business management is big data. Big data is a term that includes technology, personnel, and organization required to gather/manage/analyze collection of data sets so large and complex that it becomes difficult to manage and analyze using traditional tools. The military has been accumulating data for a long period due to the organization's characteristic in placing emphasis on reporting and records. Considering such characteristic of the military, this study verifies the possibility of improving the performance of the military organization through use of big data and furthermore, create scientific development of operation, strategy, and support environment. For this purpose, the study organizes general status and case studies related to big data, traces back examples of data utilization by Korean's national defense sector through US military data collection and case studies, and proposes the possibility of using and applying big data in the national defense sector.

Thinking about the training system of R.O.K. reserved force in the future (미래형 예비군 훈련체제 정립에 관한 연구)

  • Jeong, Won-Young
    • Journal of National Security and Military Science
    • /
    • s.5
    • /
    • pp.47-85
    • /
    • 2007
  • Reserved force's training(RFT) is undoubtedly the critical component to increase the national capability in case of emergency. It is because RFT plays an important role in maintaining the peace for the Korean peninsula as the key deterrence force power for more than 40 years. Considering the reserved force reform linked with the goal and the plan of Korean Defense Reform 2020', we can expect the utility of the reserved force as the potential combat power to make national defense resources more efficient and useful. In that sense, this study suggests some solutions to promote the reserved force's competency to demonstrate the ROK Armed Force's combat power as the equivalent partner with the active force as well as the future deterrence power. This study also analyzes the present training system including law and regulation, identifies some implications through the literature review, and designs the future ROK reserved force's training system by extracting new variables forecasting the future environment for national defense. In addition, this study includes its concerned systems generally without limiting the scope into the reserved force. Therefore we try to seek to prepare for mobilization readiness and to promote regional hometown defense capability in order to cope with the enemy's threat in case of emergency.

  • PDF

A Study on Developing the Acquisition Unit Cost Estimating Model of the Guided Weapon System (유도무기 획득단가 추정 모델 개발에 관한 연구)

  • Kim, Yonghyun;Lee, Yongbok;Jung, Wonil;Kim, Dongkyu;Kang, Sungjin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.5
    • /
    • pp.565-576
    • /
    • 2012
  • Cost estimates are necessary for government acquisition program to support decisions about funding, to develop annual budget requests and to validate resource requirements at key decision points. Many researches have been done about cost estimating technique recently. Parametric cost estimating models based on CERs(Cost Estimating Relationships) have been mainly used using regression method with historical data. However, there are many restrictions in developing Korean version CERs because the number of data points are too small. Specially, data collection and data management system are unstable in Korean defense environment, when developing CERs. In this research, we analyzed the historical data, and found some cost drivers in guided weapon system area. We developed the Acquisition Unit Cost CER using the regression to remove multicollinearity in the historical data. So we could overcome the restriction of the insufficient sample number. This research as a first attempt is meaningful in terms of obtaining our own Acquisition Unit Cost CER using historical cost and physical characteristic in Korean development environment.

Resaerch Trend and Cocentualization of Defense Industry Security From Convergence Security Perspective (융합보안 관점에서 방위산업보안 개념 정립과 연구동향 분석)

  • Woo, Kwang Jea
    • Convergence Security Journal
    • /
    • v.15 no.6_1
    • /
    • pp.69-78
    • /
    • 2015
  • Methods that industrial spies use to smuggle core technology out are becoming more intelligent, technological, and complex, thus resulting in more serious damages. In particular, defense industries in which involve national core technology as well as institutions including labor force are industries that are in a greater need of the convergence security. Defense Industry develops, experiments, and produces defense security supplies for national security protection. Defense industry involves a number of security elements such as military secret, industrial secret, core technology labor force, defense industry supply, critical national facility, and information communication system. Defense industry security is a complex of military security and industrial security which is convergence security that integrates all security elements of defense industry. Therefore, defense industry security is a typical ideal model for convergence security. Research on defense industry security is relatively insufficient compared to research of security in other industrial fields. In order to prevent core technology of denfese industry from leaking and to protect technical professionals and institutions, research and action on defense industry security from convergence security perspective are therefore essential at this point of time.

Innate immune response in insects: recognition of bacterial peptidoglycan and amplification of its recognition signal

  • Kim, Chan-Hee;Park, Ji-Won;Ha, Nam-Chul;Kang, Hee-Jung;Lee, Bok-Luel
    • BMB Reports
    • /
    • v.41 no.2
    • /
    • pp.93-101
    • /
    • 2008
  • The major cell wall components of bacteria are lipopolysaccharide, peptidoglycan, and teichoic acid. These molecules are known to trigger strong innate immune responses in the host. The molecular mechanisms by which the host recognizes the peptidoglycan of Gram-positive bacteria and amplifies this peptidoglycan recognition signals to mount an immune response remain largely unclear. Recent, elegant genetic and biochemical studies are revealing details of the molecular recognition mechanism and the signalling pathways triggered by bacterial peptidoglycan. Here we review recent progress in elucidating the molecular details of peptidoglycan recognition and its signalling pathways in insects. We also attempt to evaluate the importance of this issue for understanding innate immunity.

China's National Defense Mobilization Law (중국의 국방동원법)

  • Lee, Dae Sung;Kim, Sang Kyum
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.223-230
    • /
    • 2023
  • The People's Republic of China's influence in the international community is growing in political, economic, military, and diplomatic spheres. The "reform and opening-up" policy proposed and implemented at the 11th Plenary Session of the CPC Central Committee in December 1978 under Deng Xiaoping led to the rapid growth of China's economic and military power. The establishment of the National Defense Mobilization Commission in 1994 during Jiang Zemin's presidency also promoted defense mobilization, and the Standing Committees of the 9th, 10th, and 11th National People's Congresses, held since December 1998, formulated plans for defense mobilization legislation, and the first draft of the Defense Mobilization Law was approved in August 2008. In November 2005, under the leadership of President Hu Jintao, the draft Defense Mobilization Law passed the Standing Committee of the State Council, and in February 2010, the Standing Committee of the National People's Congress passed it after several rounds of deliberation and amendment, and the Defense Mobilization Law has been promulgated and implemented since July 1, 2010. The People's Republic of China is ruled by the one-party dictatorship of the Communist Party of China and the People's Liberation Army, the armed forces of the Communist Party of China. In this paper, it reviews the contents of the Defense Mobilization Law of China, a totalitarian state, analyzes and evaluates the issues.

The Improvement on Proposal Evaluation System of National Defense Core Technology R&D Projects (국방핵심기술 연구개발과제의 선정평가 개선 연구)

  • Kim, Chan-Soo;Cho, Kyu-Kab
    • Journal of Technology Innovation
    • /
    • v.15 no.2
    • /
    • pp.123-152
    • /
    • 2007
  • The striking characteristic of the contemporary global security environment is that the nature of threats has become diverse and complex. For example, transnational and non-military threats including terrorism and proliferation of weapon of mass destruction has increased. In this security environment, Advanced countries funnel their investments for defense budgets into the assurance of key force capability and R&D of cutting-edge core technologies, in consideration of future battlefield environments so as to get an edge on not only defense science and technology but also intelligence capabilities. As shown by past practices of the korea's defense acquisition, the ministry of national defense has tried to enhance its force capabilities in the short-term by purchasing foreign weapon systems rather than by investing in domestic R&D. Accordingly, the technological gaps between the korea and advanced countries were widened due to both insufficient investment in development of domestic technologies and avoidance of technological transfer by advanced countries. Thus, for the effective execution of the R&D budget and the successful performance of the projects, the importance of selection, management and evaluation of the R&D projects is emphasized. So, The objective of this study is that the analysis of the proposal-selection evaluation system for the realization of the successful defense core technology R&D projects. This study focused on the improvement of the proposal-selection evaluation model which can be applicable to the national defense core R&D projects. Using the improved proposal-selection evaluation system, we propose a model to enhance the reliability of the national defense core technology R&D project evaluation system.

  • PDF

Study on Improving the Data Efficiency in National Defense Financial Information (국방통합재정정보 데이터 효율성 향상 방안 연구)

  • Moon, Jaehun;Kang, Seokjoong;Kim, Dokyoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1764-1776
    • /
    • 2014
  • This study is the context about an introduction of a bookkeeping by double entry & accrual base accounting which is the turning point of National Accounting and defense integrated financial management which is delivered following system Digital Budget Accounting system, in other words about something to do with the improvement of efficiency of financial information data. National defense Integration Financial Information system (NDIFIS) facilitates Project program management and makes the whole process of Defense financial Business manageable in one system. Also, there is a purpose to increase the credibility and transparency of National defense finances by providing internal and external information users with credible financial statements and cost materials. By using data envelopment analysis (DEA) which is a useful method to measuring the efficiency of organization, this study aims to improve the financial information data efficiency by comparing the efficiency of the same type troops and when it comes to the inefficient troops, by offering the certain objective of efficiency.