• Title/Summary/Keyword: domain of military studies

Search Result 10, Processing Time 0.026 seconds

A Study on the Improvement of the Military Studies Curriculum at the Civilian Universities (일반대학 군사학 교육과정 개선에 관한 연구)

  • Kim, Jong Ryul
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.121-131
    • /
    • 2013
  • It has been almost 10 years since the department of military studies was opened at the civilian universities. One of the important elements for the success of these new departments would be the curriculum. This paper tries to give an realistic answer to the question of curriculum. The factors influencing the design of curriculum of military studies are analyzed, such as the curricular of the military institutes that confer the B.S. in military studies, the domain of military studies and research areas, documentation classification of military studies and military engineering, scientific knowledge versus vocational capabilities in university education, relations between the B.S. courses and the master or doctorate courses, requirements asked by the Army, and moral education needed for the military officers. As a result of the analysis, the mandatory core courses should be total of 19, including 5 general courses and 14 major courses.

A Study on the Measurement Method of Test Waveform for System-level HEMP Immunity Test (체계 수준 HEMP 내성 시험을 위한 시험파형 계측 기법 연구)

  • Yeo, Saedong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.2
    • /
    • pp.233-240
    • /
    • 2019
  • High-altitude ElectroMagnetic Pulse(HEMP) is a high-power electromagnetic pulse caused by nuclear explosions at altitudes above 30 km. This pulse can cause serious damage to the electrical/electronic device. Therefore, there are a lot of studies on the effects of HEMP in the literature. When conducting studies on the effects of HEMP, it is essential to measure the simulated HEMP. Depending on the need for measurement, this paper focuses on the HEMP measurement method. This paper proposes a measurement method using frequency domain compensation to extract the correct waveform and solves the offset problem more efficiently than the conventional methods. The proposed method is verified by experiment using HEMP simulator and measurement system in ADD.

Centralized Group Key Management Scheme for Tactical Swarming Drone Networks (전술 군집 드론 네트워크를 위한 중앙집권식 그룹키 관리 기법)

  • Lee, Jong-Kwan;Shin, Kyuyong;Kim, Kyung-Min
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.6
    • /
    • pp.817-825
    • /
    • 2018
  • Recently, drones have been used in various field to overcome time and space limitations. However, single drone still has a lot of restriction on transportation wight and travel time. Therefore many studies have been conducted to increase the utilization by swarm of drones. Many things should be additionally considered in order to operate swarming drones securely. Especially the group key management is a challenging research topic in tactical domain due to existence of adversary that has anti-drone skill. In this paper, we proposed an efficient group key management scheme for tactical swarming drone networks where an adversary equipped with anti-drone skills exists. The group key can be updated with a small number of message exchange compared to other convenience schemes. The numerical and simulation results demonstrate that the proposed scheme manages the group key efficiently and securely.

Proposal of the development plan for the ROK military data strategy and shared data model through the US military case study (미군 사례 고찰을 통한 한국군 데이터 전략 및 공유 데이터 모델 개발방안 제안)

  • Lee, Hak-rae;Kim, Wan-ju;Lim, Jae-sung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.6
    • /
    • pp.757-765
    • /
    • 2021
  • To carry out multi-domain operations included in the U.S. Department of Defense's national security strategy in 2018, timely data sharing between C4I systems is critical. Several studies of the Korean military have also raised the problems of interface and standardization between C4I systems, and it is necessary to establish a new plan to solve this problem. In this study, a solution to the problem was derived through case analysis that the U.S. Department of Defense has been pursuing for about 20 years to implement the data strategy after establishing the data strategy in 2003. and by establishing a data strategy suitable for the ROK military C4I system operating environment, developing a data model, selecting a standard for data sharing, and proposing a shared data development procedure, we intend to improve the data sharing capability between ROK military C4I systems.

Agent-Based Modeling and Simulation Methodology using Social-Level Characteristics: A Case Study on Self-Adaptive Smart Grid and Military Domain Systems using Tropos (사회적 특성을 활용한 에이전트 기반 모델링 및 시뮬레이션 방법: 트로포스에 기반한 자가 적응적 스마트 그리드와 군 도메인 시스템에서의 적용 사례)

  • Kim, Si-Heon;Lee, Seok-Won
    • Journal of KIISE
    • /
    • v.42 no.12
    • /
    • pp.1503-1521
    • /
    • 2015
  • Agent-based modeling and simulation (ABMS) is used to model of market and social phenomena by utilizing agents' fine-grained behaviors and interactions that cannot be implemented in a conventional simulation. However, ABMS represents irrational agents and hinders the achievement of individual or overall goals since ABMS is based on agent-based software, which follows the principle of rationality at the knowledge level [1]. This problem was solved in the agent-based software engineering (ABSE) field by using behavior laws for the social level [2]. However, they still do not propose the specific development methodology for how to develop the social level in a systematic way. Therefore, in order to propose agent-based modeling and simulation methods that reflect the behavior laws of social level characteristics, our study used the Tropos that can combine ABSE and social behavior laws for the presentation of concrete tasks and deliverables for each development step by step. In addition, the proposed method will be specified through experiments with specific application examples and case studies on the self-adaptive smart grid and the military domain system.

How to Strengthen Convergeance of Special Operations through High-Tech Intertwinement (첨단과학기술의 융복합을 통한 특수작전의 융합성 강화 방안)

  • Sang-Keun Cho;Kang-Il Seo;Min-Seop Jung;Jun-Seong Yoo;Chul-Ki Min;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.301-306
    • /
    • 2023
  • Convergeance in the military operations can be attained by simultaneously integrating effects based on sensor, C2, shooter asset in multi-domain and there is no exception to special operations. However, because of challenges from enemy, terrain, geopraphy, and weather, it's not easy to intertwine effects created from ground, sea, air, cyber and electromagnetic spectrum, and space in special operations conducted in deep area. This study presented how to intertwine high-tech such as long-rane reconnaissance·strike drone, cutting-edge sensor, jamming pod, and modular repeater in order to offset aforementioned challenges. Several new high-tech are able to strengthen convergeance of special operations in accordance with the development of the 4th industrial revolution. Therefore, follow-up studies need to be continued making an efforts to search for them.

Result Based Evaluation Model and Its Application to Peace Operation of the ROK Military Contingent to UN Mission (한국군의 UN평화활동에 대한 성과기반 평가모델개발과 적용)

  • KWON, Goosoon
    • International Area Studies Review
    • /
    • v.21 no.1
    • /
    • pp.303-324
    • /
    • 2017
  • Current methods to evaluate the performance of ROK military contingents to UN missions unnecessarily raises the issues of relevance, validity and reliability. Thus, this article aims to suggest how the result based evaluation (RBE) model which is widely adopted in the UN field missions as well as the international development community would be modified and applied to peace operation of the ROK contingent. As a result of the study, the model presents a framework that integrates the planning process and monitoring and evaluation with a logical framework, which entails a cycle of assessment of pre-deployment planning, monitoring and phased evaluation, and post-deployment evaluation. Secondly, according to measurement of RBE benchmarks to the present ROK's monitoring and evaluation system, factors in an evaluation unit and a logical framework approach are unmet or partly met to the benchmarks. In addition, ex-post impact evaluation has been rarely performed. Finally, the policy recommendations for resolution of the aforementioned challenges as well as a joint evaluation unit, participated by experts in a civilian, public, and a military domain are proposed.

Between Regime Change and Political Development: Myanmar's Defective Democracy and the Task for the Political Development (체제 전환과 정치발전의 사이에서: 미얀마의 결손민주주의와 정치발전의 과제)

  • JANG, Junyoung
    • The Southeast Asian review
    • /
    • v.28 no.4
    • /
    • pp.161-196
    • /
    • 2018
  • The major object of this study is to analyze the political development of Myanmar's civilian government on the concept of defective democracy, and to investigate the main actors who delayed or stymied political development and their interrelation. In doing so, this study suggests the tasks required for political development overcoming the current political structure and behavior. The civilian government, which was launched in 2016, failed to achieve positive political development by following the behavior of military authoritarianism in terms of exercise of power and decision making structure. On the perspective of the government, delegative democracy and domain democracy have been strengthening since one person has taken over all political power and hesitate to take horizontal accountability for each power organizations. The military, which is responsible for national defence and security seeks illiberal democracy and exclusive democracy, keeping on an undemocratic constitution by the military and Burman ethnocentrism. The reasons why defective democracy has been occurred are that the lack of a group to run a democratic institutions and the limitation of power structure that fails to adhere to the principle of civilian control to the military due to long-term military rule. Therefore, there is a need for military's come back to barracks and transform the power structure to democratic of the civilian government which is tamed an authoritarian order for the political development in Myanmar. In order to achieve this, this study concludes that setting up a empowered democratic government is required.

Object Detection Performance Analysis between On-GPU and On-Board Analysis for Military Domain Images

  • Du-Hwan Hur;Dae-Hyeon Park;Deok-Woong Kim;Jae-Yong Baek;Jun-Hyeong Bak;Seung-Hwan Bae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.8
    • /
    • pp.157-164
    • /
    • 2024
  • In this paper, we propose a discussion that the feasibility of deploying a deep learning-based detector on the resource-limited board. Although many studies evaluate the detector on machines with high-performed GPUs, evaluation on the board with limited computation resources is still insufficient. Therefore, in this work, we implement the deep-learning detectors and deploy them on the compact board by parsing and optimizing a detector. To figure out the performance of deep learning based detectors on limited resources, we monitor the performance of several detectors with different H/W resource. On COCO detection datasets, we compare and analyze the evaluation results of detection model in On-Board and the detection model in On-GPU in terms of several metrics with mAP, power consumption, and execution speed (FPS). To demonstrate the effect of applying our detector for the military area, we evaluate them on our dataset consisting of thermal images considering the flight battle scenarios. As a results, we investigate the strength of deep learning-based on-board detector, and show that deep learning-based vision models can contribute in the flight battle scenarios.

North Korea's Cyber Attack Patterns and Behaviors : An Analysis Based on Cyber Power and Coercion Theory (북한의 대남 사이버공격 양상과 행태 : 사이버파워와 강압이론을 통한 분석)

  • Yoon, Taeyoung;Woo, Jeongmin
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.117-128
    • /
    • 2018
  • The purpose of this paper is to analyze the behavior of North Korea's cyber attack against South Korea since 2009 based on major international security theories and suggest South Korea's policy option. For this purpose, this paper applied the behavioral domain and characteristics of 'cyber power' and 'coercion dynamics' model, which are attracting attention in international security studies. The types of cyber attacks from North Korea are classified into the following categories: power-based incarceration, leadership attacks and intrusions, military operations interference, and social anxiety and confusion. In terms of types and means of cyber power, North Korean GPS disturbance, the Ministry of Defense server hacking and EMP are hard power with high retaliation and threat and cyber money cashing and ransomware are analyzed by force in the act of persuasion and incentive in the point of robbing or asking for a large amount of money with software pawns. North Korea 's cyber attack has the character of escape from realistic sanctions based on the second nuclear test. It is important for South Korea to clearly recognize that the aggressive cyberpower of North Korea is changing in its methods and capabilities, and to ensure that North Korea's actions result in far greater losses than can be achieved. To do this, it is necessary to strengthen the cyber security and competence to simultaneously attack and defend through institutional supplement and new establishment such as cyber psychological warfare, EMP attack preparation, and enhancement of security expertise against hacking.

  • PDF