• Title/Summary/Keyword: intent for defense

Search Result 9, Processing Time 0.023 seconds

Necessity of Intent for Defense in Case of Legitimate Self-defense (정당방위에 있어서 방위의사의 필요성)

  • Yoo, In-Chang
    • Journal of Digital Convergence
    • /
    • v.10 no.7
    • /
    • pp.107-114
    • /
    • 2012
  • Self-defense is defined as 'an act which is performed in order to prevent impending and unjust infringement of one's own or another person's legal interest'(Article 21, the Criminal Act). To establish such a self-defense, it is generally suggested that it requires an intent for defense as subjective element as well as objective precondition of impending and unjust infringement of one's own or another person's legal interest' and considerable reason. Intent for defense which means an awareness for objective circumstance of self-defense is recognized as objective justification element for self-defense. With regard to intent for defense, there are various discussions on not only necessity of such an intent for defense but whether it is necessary for both actor's recognition of circumstance and specific purpose or motive and which should be applied for its punishment in case of lack of the intent for defense: consummated, unconsummated or semi-consummated. However, there is no clear regulations. This article reviews the contents of intent for defense based on opinion that it is necessary for intent for defense and then examines contents on criminal effect in case of lack of intent and intent for defense in case of criminal negligence.

Intent signal generation of the exoskeletal robotics for construction workers and verification of its feasibility (건설작업자의 근력지원을 위한 외골격 모듈의 동작의지신호 생성 및 타당성 검증)

  • Lee, Seung-Hoon;Yu, Seung-Nam;Lee, Hee-Don;Jang, Jae-Ho;Han, Chang-Soo;Han, Jung-Soo
    • Proceedings of the KSME Conference
    • /
    • 2008.11a
    • /
    • pp.1603-1608
    • /
    • 2008
  • Powered robotic exoskeletons are currently under development for assisting or supporting human muscle power. Many applications using this system for the purpose of national defense system, medical support, and construction industry are now frequently introduced. In this paper, we proposed the exoskeletal wearable robotics for construction workers. First, we analyzed general work conditions at the construction site and set up target tasks through the datum. Then dominant muscles’ activity which is related with the defined target tasks was checked up. Herein, wearers’ intent signal generation methodology was introduced in order to effectively activate the proposed system. In the final part of this paper, we evaluated the capability and feasibility of the exoskeletal robotics by the electromyography (EMG) signal variance; demonstrated that robotic exoskeletons controlled by muscle activity could be useful way of assisting with construction workers.

  • PDF

A Study on the Operational Plan for Port Container Terminal Using High Level Architecture (상위체계구조를 이용한 컨테이너 터미널 운영방안 연구)

  • Lee, Sang-Heon;Lee, Chan-Woo
    • IE interfaces
    • /
    • v.17 no.1
    • /
    • pp.128-141
    • /
    • 2004
  • Although a number of container terminal simulators have been developed for various purposes, none of the existing simulators allow the system structure to reuse the system structure depending on application. Our goal is to develop highly reusable, highly inter-operable and flexible container terminal simulation system. The High Level Architecture(HLA) is an architecture for reuse and inter-operation of simulation. It is based on premise that no simulation can satisfy all use and users. An individual simulation or set of simulations developed for one purpose can be applied to another application under the HLA concept of the federation : a composable set of interacting simulations. The intent of the HLA is a structure which will support reuse of capabilities available in different simulations, ultimately reducing the cost and time required to create a synthetic environment for a new purpose, and the possibility of distributed collaborative development of complex simulation applications. In this paper, we discuss the design of a HLA-based port container terminal simulation system. Furthermore, we describe various technical motivations for HLA, the key elements of the architecture and how they are minimum and essential to the goal of reuse and interoperability.

A Study on Strategic R&D Governance for Defense Sector (국방연구개발 전략 수립을 위한 R&D 거버넌스 연구)

  • Lee, Joo-Sung;Baek, Jong-Ho;Nam, Mi-Young
    • Journal of Technology Innovation
    • /
    • v.17 no.1
    • /
    • pp.149-177
    • /
    • 2009
  • Today, the phase of modem war is very different from past war. That is, the winning of war depends on the ability to obtain information and high technology. The purposes of this research are to propose an effective R&D governance model in national defense sector and to present R&D strategy for obtaining core national defense technology. As a part of collaborative innovation, the strategy to exchange R&D results actively between the defense sector and the private sector will be discussed. The main contribution of this research is dearly defining the concept of R&D governance in national defense sector and applying it to an actual case. The national defense R&D governance model proposed in this paper is based on the characteristics of national defense R&D which are different from other industries. The analysis of business success factors for national defense R&D through the T-50 case study is presented in detail. The T-50 case study reveals the importance of strategic intent, core technology knowledge base, organizational structure, and project management.

  • PDF

DroidVecDeep: Android Malware Detection Based on Word2Vec and Deep Belief Network

  • Chen, Tieming;Mao, Qingyu;Lv, Mingqi;Cheng, Hongbing;Li, Yinglong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.2180-2197
    • /
    • 2019
  • With the proliferation of the Android malicious applications, malware becomes more capable of hiding or confusing its malicious intent through the use of code obfuscation, which has significantly weaken the effectiveness of the conventional defense mechanisms. Therefore, in order to effectively detect unknown malicious applications on the Android platform, we propose DroidVecDeep, an Android malware detection method using deep learning technique. First, we extract various features and rank them using Mean Decrease Impurity. Second, we transform the features into compact vectors based on word2vec. Finally, we train the classifier based on deep learning model. A comprehensive experimental study on a real sample collection was performed to compare various malware detection approaches. Experimental results demonstrate that the proposed method outperforms other Android malware detection techniques.

Biomechanics of stabbing knife attack for trauma surgeons in Korea: a narrative review

  • Kun Hwang;Chan Yong Park
    • Journal of Trauma and Injury
    • /
    • v.37 no.1
    • /
    • pp.1-5
    • /
    • 2024
  • The aim of this paper was to review the biomechanics of knife injuries, including those that occur during stabbing rampages. In knife stab attacks, axial force and energy were found to be 1,885 N and 69 J, respectively. The mean velocity of a stabbing motion has been reported to range from 5 to 10 m/sec, with knife motions occurring between 0.62 and 1.07 seconds. This speed appears to surpass the defensive capabilities of unarmed, ordinarily trained law enforcement officers. Therefore, it is advisable to maintain a minimum distance of more than an arm's length from an individual visibly armed with a knife. In training for knife defense, particularly in preparation for close-quarter knife attacks, this timing should be kept in mind. Self-inflicted stab wounds exhibited a higher proportion of wounds to the neck and abdomen than assault wounds. Injuries from assault wounds presented a higher Injury Severity Score, but more procedures were performed on self-inflicted stab wounds. Wound characteristics are not different between nonsuicidal self-injury and suicidal self-wrist cutting injuries. Consequently, trauma surgeons cannot determine a patient's suicidal intent based solely on the characteristics of the wound. In Korea, percent of usage of lethal weapon is increasing. In violence as well as murders, the most frequently used weapon is knife. In the crimes using knife, 4.8% of victims are killed. Therefore, the provision of prehospital care by an emergency medical technician is crucial.

Research on Cyber Kill Chain Models for Offensive Cyber Operations (공세적 사이버 작전을 위한 사이버 킬체인 모델 연구)

  • Seong Bae Jo;Wan Ju Kim;Jae Sung Lim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.71-80
    • /
    • 2023
  • Cyberspace has emerged as the fifth domain of warfare, alongside land, sea, air, and space. It has become a crucial focus for offensive and defensive military operations. Governments worldwide have demonstrated their intent to engage in offensive cyber operations within this domain. This paper proposes an innovative offensive cyber kill chain model that integrates the existing defensive strategy, the cyber kill chain model, with the joint air tasking order (ATO) mission execution cycle and joint target processing procedure. By combining physical and cyber operations within a joint framework, this model aims to enhance national cyber operations capabilities at a strategic level. The integration of these elements seeks to address the evolving challenges in cyberspace and contribute to more effective jointness in conducting cyber operations.

Design and Implementation of Game for Learning Game Production Principles: Centering on Scratch Language (게임 제작 원리 학습을 위한 게임의 설계 및 구현 : 스크래치 언어를 중심으로)

  • Lee, Hong-Sub;Jeong, Hyung-Won;Kim, Young-Kyo
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.403-410
    • /
    • 2016
  • Computer game is a result of integration of various academic areas, and the production of computer game requires knowledge and experience from various areas. This study demonstrates a game production process using Scratch. The intent was to experience the game development process and the production principle through actually building the core functions of a game using Scratch. As such, the computer game production principle was understood and it was made possible to learn more easily and more enjoyably the functions of multimedia and programming necessary for the production process. As the result, the learning of game production principles using Scratch was found to enhance the interest of the learner, and help with the understanding of game structure and learning software/programming language.

Application for Fire Protection Regulation based on Risk-Informed and Performance-Based Analysis (위험도 및 성능기반 분석방법에 의한 원전 화재방호규정 적용 방안)

  • Jee, Moon-Hak;Lee, Byung-Kon
    • Fire Science and Engineering
    • /
    • v.20 no.3 s.63
    • /
    • pp.65-70
    • /
    • 2006
  • From the beginning of the construction stage, the fire protection regulation for the nuclear power plants conforms to the design requirements for the acquisition of the license permit. This regulation is based on the plant status of the normal operation, but it is not enough to be used as an application standard for fire protection at the transient mode of the plant and the outage time for refueling as well as for the plant decommissioning. While the advanced fire protection requirement that has been developed in America recently suggests the performance-based requirement and management rule applicable to the overall life time of the plant, it simply represents the conceptual application. It means that it can not be treated as appropriate standards because it does not deal with the qualitative and quantitative approach in specific ways. By the way, with the use of the performance-based fire risk analysis, the dynamic behavior of the heat and smoke at the fire compartment of the nuclear power plants can be analyzed and the thermal effect to the safety-related equipment and cables can be evaluated as well. At this paper, it suggests the ways to change the applicable fire protection regulations and the required evaluation items for the fire risk resulted from the plant configuration change with an intent to introduce the state-of-the-art quantitative fire risk analysis technology at the domestic nuclear power plants.