• Title/Summary/Keyword: Net-war

Search Result 16, Processing Time 0.022 seconds

A Study on the Defense Geospatial Intelligence Governance - Focusing on the Intelligence Community and LandWarNet (국방지리공간정보 거버넌스에 대한 연구 - 미(美) 정보공동체와 육군 랜드워넷을 중심으로)

  • Kim, Dong Hwan
    • Spatial Information Research
    • /
    • v.22 no.1
    • /
    • pp.19-26
    • /
    • 2014
  • Recently, ICT environments have been increasingly developed and the pattern of the war also has been changed to NCW. The development of communication and network technology, for example, C4I and TDL(Tactical Data Link), has been prosperous and rapid. But the geospatial intelligence field which is the basis of the network frames relatively has not been developed. The purpose of this paper is to foster the geospatial governance in terms of the defense perspective. In order to do that, this paper deals with the U.S. Intelligence Community(IC) and the U.S. Army Global Information Grid(GIG), LandWarNet and those could be good examples of roles and statuses of geospatial intelligence. IC has been produced essential intelligence which is required for policymakers and military leaders. IC has several stove-piped intelligence process systems which have been separately developed and competed. And so as to complete GIG, the U.S. Army adopted LandWarNet. The U.S. Corps of Engineers organized the Army Geospatial Center(AGC) on 1 October 2009 to support LandWarNet. In order to develop NCW, we should recognize geospatial intelligence as the basis of network framework and make a central leading organization of defense geospatial intelligence. The mission of Korea Defense Geospatial-Intelligence Agency should be changed from producing GEOINT to a strategic GEOINT agency. The Army should organize a laboratory of geospatial intelligence field. The mission of producing GEOINT should be transferred to a geospatial intelligence battalion which is newly organized.

A Study on National Strategy For Countering the New Terrorism As Network War (네트워크 전쟁의 도래와 테러리즘의 새로운 흐름 - 국가대응전략을 중심으로 -)

  • Ahn, Hee-Nam;Jang, Ki-Boong
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.137-159
    • /
    • 2008
  • In the 21st century, the Information Revolution caused unpredictable kinds of complications. Human society conducts a tactical network war like Swarming. Network war simultaneously consists of merits such as global monitoring and anti-dictatorship campaign, and violent demerits like terrorism. It has been becoming a generalization of terrorism of the present time to build a brotherhood and ideology to commit terrorism. This is considered as new terrorism, a form of network war. Theses days, terror organizations including Al Qaeda establish a brotherly network to commit terrorism when and where they want. New terrorism is a novel form that harms unspecified individuals. In fact, many countries have been experiencing damage from new terrorism. It is becoming an urgent issue to every country to prepare a suitable plan that cope with new terrorism. This dissertation provides defense strategy in macro and micro aspect as a responding scheme to new terrorism.

  • PDF

On Assuring the Interoperability in Development of Safety-Critical Weapon Systems (안전중시 무기체계 개발에서 상호운용성 확보에 관한 연구)

  • Kim, Young Min;Lee, Jae-Chon
    • Journal of the Korea Safety Management & Science
    • /
    • v.15 no.4
    • /
    • pp.37-47
    • /
    • 2013
  • Due to the evolution of war fields to the net-centric one, weapon systems have become very complex in terms of both mission capability and implementation scales. In particular, the net-centric war field is characterized by a set of interconnected and independently operable weapon systems. As such, the individual weapon systems are required to meet the interoperability and thus, assuring it has been becoming more crucial even in the early stage of development. Furthermore, the ever-growing complexity of the weapon systems has attracted a great deal of attention on the safety issues in the operation and development of weapon systems. The objective of the study is on how to assure the interoperability for safety-critical weapon systems while maintaining system complexity. To do so, the approach taken in the paper is to consider the interoperability from the early stage of the development. Specifically, the required functions to satisfy the interoperability are developed first. The functions are then analyzed in order to link the safety requirements to the reliability evaluation, which results in the study of quantifying the effects of the safety requirements on the system as a whole. As a result, we have developed a methodology and procedure on how to assure interoperability while applying the safety requirements in the weapon systems development.

Study on the Whole Crop Pelltt Making of Barley Cultivated on Paddy Land after Rice (답리작 대맥의 Whole Crop Pellt 생산이용에 관한 연구)

  • 김정갑;한민수;김건엽;한정대;진현주;이혁호
    • Journal of The Korean Society of Grassland and Forage Science
    • /
    • v.15 no.2
    • /
    • pp.146-150
    • /
    • 1995
  • The yield performance and nutrient quality of barley for pellets making from whole crop material were discussed during 1993-1994. Barley (cv. Olbori) was grown on paddy land after rice cutivation and was harvested at early stage of physiological maturity. A column type of whole crop pellets was produced by 1.5cm diameter and 2.5cm height. Barley war evaluated as a suitable materials for whole crop pellet making. Barley produced higher yield and better qualitative roughage in the utilization of pellet making than in the silage making. Dry matter yields were obtained 12.02 MTha in pellet making and 11.70 MT/ha in silage making. Net energy value of barley pellet were 6.54 MJ in net energy lactation and 635 SV in starch equivalent net energy. Feeding of barley pellet improved milk production of daily cattle Daily milk yields per head were 25.1 liter in silage feeding and 25.9 liter in pellet feeding. Production cost of pellets and silages made from whole crop barley were 169.07 won/kg and 124.15 won/kg dry matter, respectively.

  • PDF

Analysis of Military Capability Balance on the Korean Peninsula Using the Net Assessment Methodology With a Focus on South and North Korean Naval Forces (Surface Combatants) (총괄평가 방법론을 활용한 한반도 군사력 균형분석 - 남·북한 해군력(수상함)을 중심으로 -)

  • Han, Jung-kyeong
    • Maritime Security
    • /
    • v.7 no.1
    • /
    • pp.61-96
    • /
    • 2023
  • Amidst the ongoing instability and military tensions between North and South Korea, it is essential for us to comprehend and assess North Korea's military capabilities, while preparing for potential contingencies through military reinforcement. However, to conduct a comprehensive analysis of the military balance on the Korean Peninsula, it is imperative to move beyond simplistic quantitative comparisons of combat capabilities and embrace a broader perspective, which includes qualitative comparisons of military strength, operational capabilities, and a nation's ability to wage war. To address this need, this study employs the method of "Net Assessment" to evaluate the relative combat power of South and North Korean conventional naval forces, with a particular focus on surface combatants. This evaluation involves both quantitative and qualitative comparisons of military assets (personnel and equipment) and intangible factors (naval strategies, geography, etc.). By conducting a holistic assessment, the research aims to identify and analyze strategic asymmetries that may exist between the two navies.

  • PDF

The Multi-Net Performance Evaluation of Link-16 in the L-Band Sharing with Radars (L-대역 내 레이더 주파수 공동사용 환경에서 멀티넷을 통한 Link-16 운용 가능성 성능 평가)

  • Choi, Seonjoo;Yu, Jepung;Lim, Jaesung;Baek, Hoki;Kim, Jaewon;Choi, Hyogi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.7
    • /
    • pp.738-746
    • /
    • 2016
  • As the trend of future war has been changed to network centric warfare, tactical data link should be needed for fast and accurate situation awareness. Nowadays, Korean air force conducts military operations by using aircrafts equipped with Link-16. The Link-16 can conduct multiple mission at the same time because it supports multi-net capability. Due to lack of frequency resource, the way to share the frequency with other systems has been studied and using L band with radar is considered as one of the candidates bands. However, the data link can be affected by the interference from radars when it shares the L-band because the L-band in Korea is already assigned to long-range detection radars. In this paper, we evaluate operational possibilities of tactical data link in the L-band based on Link-16.

Study on the Midwater Trawl Available in the Korean Waters - II . Horizontal Opening of the Gear - (한국 근해에 있어서의 중층 트로올의 연구 - II . 어구의 수평 전개도 -)

  • 이병기
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.22 no.4
    • /
    • pp.49-55
    • /
    • 1986
  • The authors carried out an experiment to determine the horizontal opening of the mid water trawl gear, which is the same as was used in the foreward experiment concerned to the attitude and opening efficiency of otter board. The trawl net .used in the experiment was designed to have a square sectional four-seamed body with two three-sepenlted wings. Each wing tip was rigged with a net pendant of 70 m long and the fore ends of the pendants were directly jointed to the otter pendant without inserting hand rope, and a front weight of 200 kg weigh was rigged with in front of the lowest wing tip. To determine the opening between otter boards ani between wing tips, two 50 KHz fish finders were set sideways on the otter board and on the port middle wing tip so as to detect the distance froa the finders to the starboard otter board and to the wing tip respectively, and the informations were transmitted to the indicators onboard the ship through water-tight cables. The results obtained can be summarized as follows: 1. The openings between otter borads were 43-45 m in case of the warp 100 m, 53-55 m in the war;> 150 m and 54-59 m in the warp 200 m. It was increased in linear according to the increase of towin; speed in the range of 1. 1-1. 8 mlscc. 2. The determined values of the openings between otter boards were greater than the estimated values. which were calculated by the opening between warps at the gallows of the ship and the length of tt~ warp, assuming that the warps from the top rollers to the otter boards were straight. The rates of the determined values to the estimated values were 1. 23-11. 0 in case of the warp 100 m, 1. 23-1. 12 in the warp 150 m and 1. 23-1. 15 in the warp 200 m respectively. The rates were almost the same at the slow towing speed of 1. 3 mlscc or so, then the higher the speed, the less the rate, and the longer the warp, the greater the rate. 3. The rates of the openings between otter boards to the total length of net pendant and the net (excluded cod end) showed 43-43% in case of the warp 150-200 m. It was a little smaller than th~ standard. which is 50%. in the common bottom trawl. 4. The determined openings between wing tips were 18-19 m in case of the warp 100m, 21-22 m in the warp 150 rn, They showed that the higher the speed, the greater the openings even though its range was no more than 1 m or so. 5. The rates of openings between otter boards to th~ openings betwee:l wing tips were almost invariably 38%. 6. The rates of openigs b2tween otter boards to the lenth of h~ad rope were 60-65% in cas': of th~ warp lOa-150m. It were much larg2r than th~ standard. which is 50%. in the common botto:n trawl.

  • PDF

The Daily Us (vs. Them) from Online to Offline: Japan's Media Manipulation and Cultural Transcoding of Collective Memories

  • Ogasawara, Midori
    • Journal of Contemporary Eastern Asia
    • /
    • v.18 no.2
    • /
    • pp.49-67
    • /
    • 2019
  • Since returning to power in 2012, the second Abe administration has pressured Japanese mainstream media in various ways, from creating the Secrecy Act to forming close relationships with media executives and promoting anti-journalism voices on social media. This article focuses on the growth of a jingoist group called the 'Net-rightists' ('Neto-uyo' in the Japanese abbreviation) on the Internet, which has been supporting the right-wing government and amplifying its historical revisionist views of Japanese colonialism. These heavy Internet users deny Japan's war crimes against neighboring Asian countries and disseminate fake news about the past, which justifies Prime Minister Shinzo Abe's hostile diplomatic policies against South Korea and China. Over the past years, the rightist online discourses have become powerful to such an extent that the editorials of major newspapers and TV reports shifted to more nationalist tones. Who are the Neto-uyo? Why have they emerged from the online world and proliferated to the offline world? Two significant characteristics of new media are discussed to analyze their successful media manipulation: cultural transcoding and perpetual rewriting of collective memories. These characteristics have resulted in constructing and reinforcing the data loops of the 'Daily Us' versus Them, technologically raising current diplomatic tensions in East Asia.

Efficient countermeasures against e-terrorism (e-테러리즘의 효율적 통제방안)

  • Lee, Yoon-Ho;Kim, Dae-Kwon
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.271-289
    • /
    • 2009
  • In e-terrorism, terrorists use cyber spaces including the internet in order to strike terror into the heart of a nation. It is revealed that recently happening terror cases use cyber spaces as a strategic tool. This research aims to investigate efficient countermeasures against various types of terror attacks made by terrorists and their cyber networking, in order to contribute to the prevention of terrors from a modern standpoint. Based on the results of the investigation, relevant problems are suggested such that terrors are not cases happening in a specific country only because they take place in cyber spaces, that hacking incidents frequently happen in Korea which is used as a footstool by foreign hackers, and that Korea has poor professional security manpower and foundational facilities in comparison with other advanced countries. Answers to the problems include cultivating cyber information manpower to cope with e-terrorism, making an appropriate budget, setting up networks to integrate and systematize anti-e-terrorism organizations, and intensifying the collection of information of cyber attacks and the analysis of the information.

  • PDF

A Study on the Middle Age Costume Expression of France (프랑스 <마카이요프스키 성경(Maciejowski Bible)>의 중세복식 표현에 관한 연구)

  • Kim, Hee-Jung
    • The Research Journal of the Costume Culture
    • /
    • v.16 no.2
    • /
    • pp.263-277
    • /
    • 2008
  • In picture bible, the picture is helpful for showing story more vividly and specifically and it is helpful for finding the meaning of bible hidden behind familiarity. It plays the role of the most powerful testimony and expression, with which human provides himself. The purpose of study was to grasp the relation among historical background of the middle age, human's characteristic and symbolic color by considering the fact that the costume expressed in Maciejowski Bible, which is a picture bible of the middle age and observing type, color and decoration of costume. Among 46 folios organizing Maciejowski Bible, 129 pictures explaining the Book of Genesis, the Book of Exodus, the Book of Leviticus, the Book of Numbers, the Book of Deuteronomy, the Book of Joshua and the Book of Judges, which belong to the former 400 years of the old Testament, were analyzed for people's costumes. The pictures shown in Maciejowski Bible portrays object, costume and behavior on the background of France of the 13th century so we can find out the precious natures of middle age's costume, weapon and armor. Especially, the portrait about finger armor of chain mail attached in hauberk becomes the outstanding evidence that can encroach the discussion over whether it was used in the end of 1300s. Regarding costumes of main characters, they wore chemise and braies as underwear, wore tunic or cotte having various lengths from the length reaching knee to the length reaching 8round as basic costume and wore mantle with different-colored lining and hose with various colors. In the war picture, we can see hauberk made with chain mail and cyclas with long slit, which was worn over hauberk, barrel helmet, norman helmet and steel school cap. Regarding cap. man usually wore coif, beret, shade-shaped cap, straw hat and woman wore the decoration using veil and hairlace and used the method to wrap whole hair with net. As the colors used in the costume of the picture bible, scarlet, blue, green and brown were usually used in order. They usually wore costumes decorated splendidly with the colors haying hish brightness and chroma.

  • PDF