• Title/Summary/Keyword: current war

Search Result 229, Processing Time 0.028 seconds

Crossing the "Great Fire Wall": A Study with Grounded Theory Examining How China Uses Twitter as a New Battlefield for Public Diplomacy

  • Guo, Jing
    • Journal of Public Diplomacy
    • /
    • v.1 no.2
    • /
    • pp.49-74
    • /
    • 2021
  • In this paper, I applied grounded theory in exploring how Twitter became the battlefield for China's public diplomacy campaign. China's new move to global social media platforms, such as Twitter and Facebook, has been a controversial strategy in public diplomacy. This study analyzes Chinese Foreign Spokesperson Zhao Lijian's Twitter posts and comments. It models China's recent diplomatic move to Twitter as a "war of words" model, with features including "leadership," "polarization," and "aggression," while exerting possible effects as "resistance," "hatred," and "sarcasm" to the global community. Our findings show that by failing to gage public opinion and promote the country's positive image, China's current digital diplomacy strategy reflected by Zhao Lijian's tweets has instead constructed a polarized political public sphere, contradictory to the country's promoted "shared human destiny." The "war of words" model extends our understanding of China's new digital diplomacy move as a hybrid of state propaganda and self-performance. Such a strategy could spread hate speech and accelerate political polarization in cyberspace, despite improvements to China's homogenous network building on Twitter.

A Study on the Diagnostic Techniques of Leakage Current for Switch-Gear Based on LabVIEW (LabVIEW 기반의 수배전반 누설전류 진단기법 연구)

  • Kim, Yong-Seong;Jang, Sung-Il;Choi, Jung-Hwan;Kim, Kwang-Ho
    • Journal of Industrial Technology
    • /
    • v.34
    • /
    • pp.61-66
    • /
    • 2014
  • Recently, Because the consumption of electricity is increased, having stable electricity supply and diagnosis of the power device is important. In this paper, I propose a diagnostic techniques of the leakage current for switchgear based on LabVIEW NI's. Using the data obtained from the leakage current sensor installed in switchgear panels, in performed continuously diagnosis, notifications and warnings can be the administrator immediately results. It is expected accordingly, the administrator will be able to take prompt action. Using the virtual switchgear with a PXI NI's, war tested the proposed techniques.

  • PDF

A Study on the international legality issues of armed attack by drone (무인항공기의 무력공격을 둘러싼 국제법상 쟁점에 관한 연구)

  • Shin, Hong-Kyun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.28 no.2
    • /
    • pp.37-61
    • /
    • 2013
  • In modern international law, the absence of legal definition regarding drone(Unmanned Aerial Vehicle) has made legal scholars work on an typical analogy between aircraft codified in the international document and drone. The wording of the Convention on International Civil Aviation is limited to two categories of aircraft, such as civil aircraft and state aircraft, whereas military aircraft is not legally defined. As such it is, the current practices of the State regarding the drone flight over foreign territory have proven a hypothese that drone is being deemed as military aircraft. Principal usage of drone lies in reconnaissance and surveillance mission as well as so-called targeted killing, which is prohibited if the killing is treacherous. Claimed war against terrorism, however, is providing a legal rationale that targeted killing is not treacherous, and that the targeted person is not civilian but combatant. In such context, armed attack of drone is deemed legal and justified. Consequently, such attack is legal in the general context of the war. The rules that govern targeting do not turn on the type of weapon system used, and there is no prohibition under the laws of war on the use of technologically advanced weapons systems in armed conflict so long as they are employed in conformity with applicable laws of war. Drones may present interesting new challenges because of their sophistication and the technological advantage they convey to their operators.

  • PDF

The Current Trend to the Policy of Telecommunication Inter-connection Charge in Japan and Its Implication (일본의 통신상호접속 요금정책 동향 및 시사점)

  • 김방룡
    • Journal of Korea Technology Innovation Society
    • /
    • v.2 no.3
    • /
    • pp.129-144
    • /
    • 1999
  • In recent an official announcement of NTT about a report of LRIC Model Study Group in the end of July 1999 has evoked a tough tug-of-the -war among relevant parties pertaining to the lowering problem of iner-connectino charge in Japan. This paper mainly introduces diverse response from all relevant parties about a report of LRIC Model Study Group in Japan and sort out their significant implications to our telecommunication industry.

  • PDF

Current Trends in Chinese Fashion Markets - Characteristics of Chinese Fashion Markets and Launching Strategies to Success -

  • Chung, Cheng Chung
    • Journal of Fashion Business
    • /
    • v.7 no.3
    • /
    • pp.45-53
    • /
    • 2003
  • In the face of trade opportunity of Chinese reformation and opening and the future largest single market, global or multinational companies and Korean, Japanese, Chinese, Hong Kong's and Taiwan's companies will go all out to catch hold of one quotient. One trading war is about to start for funds, elitists, technique, and management in China now. It might be difficult to get profits in Chinese markets. However, risks can bring challenges, and competition can make progress. It's time to prepare for the challenges in the golden opportunity laid in front of us all.

The Current Situation of Mining and Smelting and the Mineral Policy of Japan

  • Shiga, Yoshihide
    • Proceedings of the KSEEG Conference
    • /
    • 2003.04a
    • /
    • pp.32-36
    • /
    • 2003
  • The mining industry of Japan had rapidly grown after the World War II with the economic growth. There existed more than 350 mines all over Japan in the 1960’s. The mines however had been closed one after another under the influence of the world and domestic economic events such as the mining-related pollution in Japan after the middle of the 60’s, the Oil Crisises in 73 and 79 and the Strong Yen in 85 (Fig. 1). (omitted)

  • PDF

A Study on Application of u-Learning System in Network Centric Warfare Environment (네트워크중심전 환경에서의 u-러닝 시스템 적용방안에 관한 연구)

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Ryou, Hwang-Bin;Jo, Yong-Gun
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.43-49
    • /
    • 2010
  • With the development of information and communications technology(ICT), the concept of ubiquitous that we can communicate regardless of time and place appears. Due to the development of the technology delivering information, current society is called intellectualization society developed from informatization society. The intellectualization society is based on knowledge accumulated by processing information. The education methods are also developed into a concept of u-Learning applying the concept of ubiquitous from the concept of e-Learning using a computer. The military also points out education as a key policy. The aspect of war is changing to NCW(Network Centric Warfare) from platform centric warfare. Therefore, collecting and managing the war situations in real time is a key to controlling command. To this end, it needs to maximize individuals and groups' ability to cultivate the military with cutting-edge knowledge. Therefore, this study aims to look into methods to apply u-learning system in training and military actions according to changes in war environments and ICT.

Electroanalytical Measurement of TEDA (Triethylenediamine) in the Masks of War

  • Ariani, Zahra;Honarmand, Ebrahim;Mostaanzadeh, Hossein;Motaghedifard, Mohammadhassan;Behpour, Mohsen
    • Journal of Electrochemical Science and Technology
    • /
    • v.8 no.1
    • /
    • pp.43-52
    • /
    • 2017
  • In this paper, for the first time, the electroanalytical study of Triethylenediamine, TEDA was done on a typically graphene modified carbon paste electrode (Gr/CPE) in pH=10.5 of phosphate buffer solutions (PBS). The surface morphology of the bare and modified electrodes was characterized by scanning electron microscopy (SEM), electrochemical impedance spectroscopy (EIS) and cyclic voltammetry (CV). The electro-oxidation of TEDA was investigated at the surface of modified electrode. The results revealed that the oxidation peak current of TEDA at the surface of Gr/CPE is 2.70 times than that shown at bare-CPE. A linear calibration plot was observed in the range of 1.0 to 202.0 ppm. In this way, the detection limit was found to be 0.18 ppm. The method was then successfully applied to determination of TEDA in aqueous samples obtained from two kinds of activated carbon from the masks of war. On the other hand, density functional theory (DFT) method at B3LYP/6-311++G** level of theory and a conductor-like Polarizable Continuum Model (CPCM) was used to calculate the $pK_a$ values of TEDA. The energies of lowest unoccupied molecular orbital ($E_{LUMO}$) and highest occupied molecular orbital ($E_{HOMO}$), gap energy (${\Delta}E$) and some thermodynamic parameters such as Gibbs free energy of TEDA and its conjugate acid ($HT^+$) were calculated. The results of calculated $pK_a$ were found to be in good agreement with the experimental values.

Design and Implementation of Security System for Wargame Simulation System (워게임 시뮬레이션 시스템을 위한 보안시스템 설계 및 구현)

  • Song Jong Seok;Kim Jin Soo;Shin Moon Sun;Ryu Keun Ho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.369-378
    • /
    • 2005
  • War simulation system is a virtual space that my tactical simulation exercise is held. The data used in this system are considered sensitive and needs to be protected. But suity vulnerabilities and possible security loopholes were not considered when designing the war game simulation system. So currently the systemis highly vulnerable against hackers and data leakages. This paper proposed a security system for war game simulation system based on considering the currently vulunerabilities and possible suity leakages. The proposed security system supports security patches. In this paper, we analyze vulunerabilities of the running environment of current system and we design and implement the security system that is consisted of three components : Authentication System, Encryption System and Network Security System. The security patches are safe and there are no negative effects on the system's performance. The patches are proved to be effective and very reliable towards solving the security vulnerabilities.

A Modeling of Information Process Concept for Analyzing Information Effect in Combat Simulation (전투 시뮬레이션에서 정보효과 분석을 위한 정보처리 개념 모델링)

  • Noh, Hyunil;Lee, Youngwoo;Lee, Taesik
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.6
    • /
    • pp.730-743
    • /
    • 2016
  • Network-Centric Warfare is a forthcoming military revolution paradigm for maximizing combat effectiveness in terms of information superiority. However, quantitative assessment of information effect is a challenging issue. Among the many approaches, war-game is a well known method to evaluate combat effectiveness. However, previous researches and current models have a limited function or logic to simulate information process, which is core concept of NCW. So this research suggests a concept of simulation modeling method to describe the information process as defining of combat information process based on probability decision model. In addition, we suggest a simple scenario to represent proposed concept modelling method. This results can be used in designing war-game analysis model for enhanced information effectiveness.