• Title/Summary/Keyword: future war

Search Result 353, Processing Time 0.022 seconds

Analysis of SEAD Mission Procedures for Manned-Unmanned Aerial Vehicles Teaming (유무인기 협업 기반의 SEAD 임무 수행절차 분석)

  • Kim, Jeong-Hun;Seo, Wonik;Choi, Keeyoung;Ryoo, Chang-Kyung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.47 no.9
    • /
    • pp.678-685
    • /
    • 2019
  • Due to the changes in future war environment and the technological development of the aviation weapon system, it is required to carry out on the analysis of the Manned-Unmanned aerial vehicles Teaming(MUM-T). Conventional manned-unmanned aerial vehicles operate according to the air strategy missions and vehicles' performance. In this paper, we analyze conventional aerial vehicle's mission to derive various kinds of missions of MUM-T after analyzing the unmanned aircraft systems roadmap issued by US DoD and the air strategy of US Air Force. Next, we identify the basic operations of the vehicles to carry out the missions, select the MUM-T based Suppression of Enemy Air Defense missions(SEAD), and analyze the procedure for performing the missions step by step. In this paper, we propose a procedure of the mission in the context of physical space and timeline for the realization of the concept of MUM-T.

A Study on Vulnerability of Cyber Electronic Warfare and Analysis of Countermeasures for swarm flight of the NBC Reconnaissance Drones (화생방 정찰 드론의 군집비행 시 사이버전자전 취약점 및 대응방안 분석)

  • Kim, Jee-won;Park, Sang-jun;Lee, Kwang-ho;Jung, Chan-gi
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.133-139
    • /
    • 2018
  • The 5 Game changer means the concepts of the army's operation against the enemy's asymmetric threats so that minimize damage to the public and leads to victory in war in the shortest time. A study of network architecture of Dronebot operation is a key study to carry out integrated operation with integrated C4I system by organically linking several drones battle groups through ICT. The NBC reconnaissance drones can be used instead of vehicles and humans to detect NBC materials and share situations quickly. However, there is still a lack of research on the swarm flight of the NBC reconnaissance drones and the weaknesses of cyber electronic warfare. In this study, we present weaknesses and countermeasures of CBRNs in swarm flight operations and provide a basis for future research.

  • PDF

US-China Hegemony Competition and Gray-Zone Conflict in the Post-Coronavirus Era: Response strategies of the Korean Navy and Coast Guard (포스트 코로나시대 미중 패권경쟁과 회색지대갈등: 한국 해군·해경의 대응전략)

  • Lee, Shin-wha;Pyo, Kwang-min
    • Maritime Security
    • /
    • v.1 no.1
    • /
    • pp.149-173
    • /
    • 2020
  • While the United States and other Western states are in trouble with COVID-19 crisis, China is continuing its aggressive ocean expansion with its Gray-zone strategy. The Gray-zone strategy, which China uses around the South China Sea, refers to a strategy that promotes a change in international politics by creating an unclear state, neither war or peace. China, which is trying to expand its influence across East Asia, will also try to project a Gray zone strategy on the Korean Peninsula. The possible scenarios are as follows: 1) South Korea is accidentally involved in a dispute in the South China Sea, 2) Military conflicts between South Korea and China is caused by illegal fishing of Chinese boats in Yellow Sea, 3) China tries to interfere with Socotra Rock, 4) Unlikely, but possible in the future that China induce the military conflicts between Korea and Japan on the Dokdo issue. In order to cope with these scenarios, Korea should prepare the following measures from a long-term perspective: the creation of an Asian maritime safety fleet, the integ rated operation of the navy and the coast guard in the framework of the national fleet, and strengthening the conflict control system for China's provocations.

  • PDF

Comparative Analysis of Evaluation and Recognition for Refugees' Qualification in Netherlands and Norway (네덜란드와 노르웨이의 난민 학위·자격 평가인정제도 비교 분석)

  • Chae, Jae-Eun
    • Journal of Digital Convergence
    • /
    • v.19 no.3
    • /
    • pp.37-45
    • /
    • 2021
  • Since the Syrian Civil War in 2011, the number of refugees has been on the rise in Korea as well as worldwide. In addition to recognition of legal status for refugees, employment and education support, and qualification recognition are emerging as social issues. In this context, this study aims to compare the cases of Netherlands and Norway in terms of evaluation and recognition of refugees' qualifications. The findings of the study show that although there were concerns about the lack of official documents to verify the qualifications of refugees, the two countries have developed a special process for the evaluation and recognition for refugees respectively according to the Lisbon Recognition Convention. In addition, both countries have developed a recognition of prior learning system which has made the qualification recognition process flexible from a point of refugees. These experiences could be used as benchmarks for the Korean government which has a responsibility to develop its own qualification recognition system for refugees in the near future.

Forecasting LNG Freight rate with Artificial Neural Networks

  • Lim, Sangseop;Ahn, Young-Joong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.7
    • /
    • pp.187-194
    • /
    • 2022
  • LNG is known as the transitional energy source for the future eco-friendly, attracting enormous market attention due to global eco-friendly regulations, Covid-19 Pandemic, Russia-Ukraine War. In addition, since new LNG suppliers such as the U.S. and Australia are also diversifying, the LNG spot market is expected to grow. On the other hand, research on the LNG transportation market has been marginalized. Therefore, this study attempted to predict short-term LNG 160K spot rates and compared the prediction performance between artificial neural networks and the ARIMA model. As a result of this paper, while it was difficult to determine the superiority and superiority of ARIMA and artificial neural networks, considering the relative free of ANN's contraints, we confirmed the feasibility of ANN in LNG 160K spot rate prediction. This study has academic significance as the first attempt to apply an artificial neural network to forecasting LNG 160K spot rates and are expected to contribute significantly in practice in that they can improve the quality of short-term investment decisions by market participants by increasing the accuracy of short-term prediction.

A Media Archaeological Analysis on the Origins of Korean Broadcasting

  • Yoon, Sangkil
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.8
    • /
    • pp.91-101
    • /
    • 2022
  • This study started with the awareness that the review of the historical origins of Korean broadcasting will be of great significance in exploring the future of Korean broadcasting, and examined the various "origins" of Korean broadcasting - colonial, Cold War, totalitarian, neoliberal. Based on the theoretical background of "media archaeology", the historical 'origin' of Korean broadcasting was applied to track the origin of Hallyu(the Korean Wave) in the 21st century by comprehensively examining the political and economic motives of the time, the state's situational awareness of problems, major broadcasting policies and broadcasting realities. As a result of the study, it came to the tentative conclusion that the historical origin of the Hallyu, which began to be formed in the 1980s, originated from the three origins of Korean broadcasting and the "synthetic mixture" in the subsequent development process.

Extending Plans of the Role of ROK Navy vis-'a-vis the Expansion of Maritime Security Threats (해양안보위협의 확산에 따른 한국해군의 역할 확대방안)

  • Kil, Byung-ok
    • Strategy21
    • /
    • s.30
    • /
    • pp.63-98
    • /
    • 2012
  • Northeast Asia has a multi-layered security structure within which major economic and military powers both confront one another and cooperate at the same time. Major regional powers maintain mutually cooperative activities in the economic sphere while competing one another in order to secure a dominant position in the politico-military arena. The multifarious threats, posed by the North Korea's nuclear development, territorial disputes, and maritime demarcation line issues demonstrate that Northeast Asia suffers more from military conflicts and strifes than any other region in the world. Specifically, major maritime security threats include North Korea's nuclear proliferation and missile launching problems as well as military provocations nearby the Northern Limit Line(NLL) as witnessed in the Cheonan naval ship and Yeonpyong incidents. The ROK Navy has been supplementing its firm military readiness posture in consideration of North Korea's threats on the NLL. It has performed superb roles in defending the nation and establishing the Navy advanced and best picked. It also has been conducive to defend the nation from external military threats and invasion, secure the sea lanes of communications, and establish regional stability and world peace. In order to effectively cope with the strategic environment and future warfares, the ROK Navy needs to shift its military structure to one that is more information and technology intensive. In addition, it should consolidate the ROK-US alliance and extend military cooperative measures with neighboring countries in the Asia-Pacific region. Evolved steadily for the last 60 years, the ROK-US alliance format has contributed to peace and security on the Korean peninsula and in the Northeast Asian region. In conclusion, this manuscript contends that the ROK Navy should strive for the establishment of the following: (1) Construction of Jeju Naval Base; (2) Strategic Navy Equipped with War Deterrence Capabilities; (3) Korean-type of System of Systems; (4) Structure, Budget and Human Resources of the Naval Forces Similar to the Advanced Countries; and (5) Strategic Maritime Alliance and Alignment System as well as Domestic Governance Network for the Naval Families.

  • PDF

A Study on the Production of Animation Using Slow motion and Sculpture Object: Focused on the (슬로 모션과 조형물 오브제를 이용한 애니메이션 제작 연구 : <숭고한 희생>을 중심으로)

  • Chang, Wook-Sang;Kim, Junghyun
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.8
    • /
    • pp.211-226
    • /
    • 2022
  • The 3D animation is designed to announce the sacrifices of soldiers who sacrificed their lives to protect the country in the middle of the vast ocean and to commemorate their souls, and contains tense moments during the battle through 3D objects and slow motion. In this paper, I examined the use of slow motion using characters and sculptures in the video and the characteristics of commemorative sculptures commemorating the war, and described in detail the animation process using slow motion and sculpture objects expressed in . I hope this study will be help to animation and video producers who want to produce slow motion animation using sculptures in the future.

Social Engineering Attack Characteristics and Countermeasure Strategies of Major Threat Countries (주요 위협국의 사회공학 공격특징과 대응전략)

  • Jeewon Kim
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.165-172
    • /
    • 2023
  • Nation-state social engineering attacks are steadily being carried out as they are highly effective attacks, primarily to gain an advantage over secret information, diplomatic negotiations or future policy changes. As The Ukraine-Russia war prolongs, the activities of global hacking organizations are steadily increasing, and large-scale cyberattack attempts against major infrastructure or global companies continue, so a countermeasure strategy is needed. To this end, we determined that the social engineering attack cycle excluding physical contact among various social engineering models is the most suitable model, and analyzed the preferred social engineering attack method by comparing it with geopolitical tactics through case analysis. AS a result China favors phishing attacks, which prefer quantity over quality, such as man-made tactics, Russia prefers covert and complex spear phishing reminiscent of espionage warfare, and North Korea uses geopolitical tactics such as spear phishing and watering holes for attacks on the US and South Korea Most of the other countries aimed to secure funds with ransomware. Accordingly, a Clean Pass policy for China, periodic compulsory education in Russia, and international sanctions against North Korea were presented as countermeasure strategies.

Practical suggestions for development of 『manned & unmanned complex combat performance plan』 (drone operation) (『유·무인복합전투수행방안』 발전을 위한 현실적 제언(드론 운용))

  • Cheol-jung Kim;Bo-Ram, Kim;Min-Youn Kim;Jae-Seok Lim
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.137-146
    • /
    • 2024
  • drones are used in a variety of fields, including business, leisure, lifesaving, and war. Various research using drones is being conducted in the military. In particular, the use of drones in 『Manned-Unmanned Complex combat performance plan』, powered by various unmanned vehicles deployed in the Army TIGER system, is expected to be a major factor realizing the Army's future combat performance that minimizes damage to ally combat troops while causing maximum damage to the enemy. As the deployment of various systems progresses, combat performance methods utilizing each system are evolving, but there is a lack of research to identify and resolve limitations in the perspective of unmanned vehicle operators. Based on the Ukrainian military's FPV drone combat case, we would like to make suggestions from the operator's perspective on overcoming perspective limitations through the introduction of FPV and the designation of military drone frequency.