• Title/Summary/Keyword: national defense strategy

Search Result 198, Processing Time 0.03 seconds

Simulation of non-Gaussian stochastic processes by amplitude modulation and phase reconstruction

  • Jiang, Yu;Tao, Junyong;Wang, Dezhi
    • Wind and Structures
    • /
    • v.18 no.6
    • /
    • pp.693-715
    • /
    • 2014
  • Stochastic processes are used to represent phenomena in many diverse fields. Numerical simulation method is widely applied for the solution to stochastic problems of complex structures when alternative analytical methods are not applicable. In some practical applications the stochastic processes show non-Gaussian properties. When the stochastic processes deviate significantly from Gaussian, techniques for their accurate simulation must be available. The various existing simulation methods of non-Gaussian stochastic processes generally can only simulate super-Gaussian stochastic processes with the high-peak characteristics. And these methodologies are usually complicated and time consuming, not sufficiently intuitive. By revealing the inherent coupling effect of the phase and amplitude part of discrete Fourier representation of random time series on the non-Gaussian features (such as skewness and kurtosis) through theoretical analysis and simulation experiments, this paper presents a novel approach for the simulation of non-Gaussian stochastic processes with the prescribed amplitude probability density function (PDF) and power spectral density (PSD) by amplitude modulation and phase reconstruction. As compared to previous spectral representation method using phase modulation to obtain a non-Gaussian amplitude distribution, this non-Gaussian phase reconstruction strategy is more straightforward and efficient, capable of simulating both super-Gaussian and sub-Gaussian stochastic processes. Another attractive feature of the method is that the whole process can be implemented efficiently using the Fast Fourier Transform. Cases studies demonstrate the efficiency and accuracy of the proposed algorithm.

Study on the Energy Security Strategy of South Korea - Focused on the Innovation System Perspective - (국가 에너지안보 추진전략 분석에 관한 연구 - 혁신시스템 관점에서의 분석 및 추진전략을 중심으로 -)

  • Choi, Jeong-Hwan;Lee, Hong-Hoon
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.21 no.6
    • /
    • pp.679-688
    • /
    • 2015
  • Stability and security of energy resources are one of the most important factors for a national-development. In this research, we analyzed the Republic of Korea's policy making system on energy security and identified the problems from an innovation system perspective. In terms of the actors, they had limitations that ROK's navy do not have enough strategic plan for energy transportation. The links between innovation actors except defense area were relatively good, but links between the military area(navy) and other innovation actors had weak linkage. The infrastructure did't have enough consideration for military force development. For the institution; the role of the military area on energy security was not completely established. Therefore, participation of the defense area(navy) is required to be stated institutionally.

A Study on Management Strategy of Special Libraries in Digital Environment : on the Basis of Special Libraries in the field of Science and Technology (디지털 환경에서의 전문도서관 경영전략수립에 관한 연구 : 과학기술분야 전문도서관을 중심으로)

  • Hwang, Jae-Young;Lee, Eung-Bong
    • Journal of Information Management
    • /
    • v.37 no.3
    • /
    • pp.99-115
    • /
    • 2006
  • The purpose of this study is to build new management strategy of special libraries in the field of science and technologies. Though information service of digital libraries were developed very much due to IT technologies, management condition of special libraries is getting more worse. Immediate cause of this problem is absence of management strategies which were veiled by IT panacea. In order to overcome this problem, this study looks into the internal and external environment change which are surrounded by special libraries. And also examined procedures and method of environment analysis which is needed to build management strategies. As the result of research, this study analyze internal and external environment by SWOT analysis method, and finally propose new management strategies.

A Study on National Strategy For Countering the New Terrorism As Network War (네트워크 전쟁의 도래와 테러리즘의 새로운 흐름 - 국가대응전략을 중심으로 -)

  • Ahn, Hee-Nam;Jang, Ki-Boong
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.137-159
    • /
    • 2008
  • In the 21st century, the Information Revolution caused unpredictable kinds of complications. Human society conducts a tactical network war like Swarming. Network war simultaneously consists of merits such as global monitoring and anti-dictatorship campaign, and violent demerits like terrorism. It has been becoming a generalization of terrorism of the present time to build a brotherhood and ideology to commit terrorism. This is considered as new terrorism, a form of network war. Theses days, terror organizations including Al Qaeda establish a brotherly network to commit terrorism when and where they want. New terrorism is a novel form that harms unspecified individuals. In fact, many countries have been experiencing damage from new terrorism. It is becoming an urgent issue to every country to prepare a suitable plan that cope with new terrorism. This dissertation provides defense strategy in macro and micro aspect as a responding scheme to new terrorism.

  • PDF

Epigenetic Control of Oxidative Stresses by Histone Acetyltransferases in Candida albicans

  • Kim, Jueun;Park, Shinae;Lee, Jung-Shin
    • Journal of Microbiology and Biotechnology
    • /
    • v.28 no.2
    • /
    • pp.181-189
    • /
    • 2018
  • Candida albicans is a major pathogenic fungus in humans, and meets at first the innate immune cells, such as macrophages, in its host. One important strategy of the host cell to kill C. albicans is to produce reactive oxygen species (ROS) by the macrophages. In response to ROS produced by the macrophages, C. albicans operates its defense mechanisms against them by expressing its oxidative stress response genes. Although there have been many research studies explaining the specific transcription factors and the expression of the oxidative stress genes in C. albicans, the regulation of the oxidative stress genes by chromatin structure is little known. Epigenetic regulation by the chromatin structure is very important for the regulation of eukaryotic gene expression, including the chromatin structure dynamics by histone modifications. Among various histone modifications, histone acetylation is reported for its direct relationship to the regulation of gene expression. Recent studies reported that histone acetyltransferases regulate genes to respond to the oxidative stress in C. albicans. In this review, we introduce all histone acetyltransferases that C. albicans contains and some papers that explain how histone acetyltransferases participate in the oxidative stress response in C. albicans.

A Study on North Korea's Cyber Attacks and Countermeasures (북한의 사이버공격과 대응방안에 관한 연구)

  • Chung, Min Kyung;Lim, Jong In;Kwon, Hun Yeong
    • Journal of Information Technology Services
    • /
    • v.15 no.1
    • /
    • pp.67-79
    • /
    • 2016
  • This study aims to present the necessary elements that should be part of South Korea's National Defense Strategy against the recent North Korean cyber-attacks. The elements proposed in this study also reflect the recent trend of cyber-attack incidents that are happening in the Unites States and other countries and have been classified into the three levels of cyber incidents: cyberwarfare, cyberterrorism and cybercrime. As such, the elements proposed are presented in accordance with this classification system. In order to properly take into account the recent trend of cyber-attacks perpetrated by North Korea, this paper analyzed the characteristics of recent North Korean cyber-attacks as well as the countermeasures and responses of South Korea. Moreover, by making use of case studies of cyber-attack incidents by foreign nations that threaten national security, the response measures at a national level can be deduced and applied as in this study. Thus, the authors of this study hope that the newly proposed elements here within will help to strengthen the level of Korea's cyber security against foreign attacks, specifically that of North Korea such as the KHNP hacking incidents and so on. It is hoped that further damage such as leakage of confidential information, invasion of privacy and physical intimidation can be mitigated.

China's Diplomatic Challenges and Prospect in the Xi Jinping Era (시진핑 시대 중국의 외교적 과제와 전망)

  • Cho, Young Nam
    • Strategy21
    • /
    • s.33
    • /
    • pp.5-36
    • /
    • 2014
  • This article aims to analyze the diplomatic challenges currently facing China as well as the foreign policy the Xi Jinping administration is adopting to address them. With these purposes in mind, it will look into three areas: first, diplomatic tasks confronting the Xi leadership; second, foreign policy that the Xi administration has implemented since the 18th Party Congress in 2012; and third, the prospects for China's foreign policy under the Xi leadership. As the Xi Jinping administration entered into office, it has encountered two major diplomatic challenges. One is the searching for a new foreign policy, and the other the restructuring of the existing foreign affairs and national security systems. The Xi administration, during its first year in office, has responded actively to tackle these issues. To begin with, it has attempted to make some adjustments on foreign policy while maintaining the Deng Xiaoping line of foreign policy. One of these modifications is placing emphasis on national "core interest," as illustrated by changes in guideline for maritime conflicts, pushing for building maritime power, and proclamation of Air Defense Identification Zone in the East China Sea. Second is the decision on the new guideline for peripheral diplomacy. That is, the administration regarded creating peaceful and stable environments to realize "Chinese Dream" as an important goal of foreign policy, and proposed such new guiding ideology as "familiarity, integrity, benefit, and accommodation." In additoin, the Xi administration restructured the existing foreign affairs and national security systems. Establishing the Central State Security Committee and the Internet Leading Small Group (LSG) are cases in point. As comprehensive organizations for policy coordination that encompass party, government, and military, the two LSGs are in charge of enacting related policies and fine-tuning policy implementation, based upon leadership consisting of chiefs of each relevant organs. Moreover, since Xi himself became the chief of these two newly-found organs, the conditions under which these LSGs could demonstrate unified leadership and adjusting role in its implementation of military, diplomatic, and security policies were developed. The future Chinese diplomacy will be characterized with three main trends. First, peripheral diplomacy will be reinforced. The peripheral diplomacy has become far more important since the Work Conference on Peripheral Diplomacy in October 2013. Second, economic diplomacy will be strengthened with an eye on reducing the "China Threat Theory," which still exists in Asia. Third, the policies to isolate the Philippines and Japan will continue in regard to maritime disputes. All in all, Chinese diplomacy in the Xi Jinping era is likely to feature practical diplomacy which combines both hard and soft approaches to best realize Chinese national interest.

Experiences of Interpersonal Relationships among Head Nurses in General Hospital Settings (종합병원 수간호사들의 대인관계 경험)

  • Yi, Myung-Sun;Kang, Hyun-Sook;Kim, Dong-Oak;Kim, Won-Ock;Kim, Joo-Hyun;Lee, Byoung-Sook
    • Korean Journal of Adult Nursing
    • /
    • v.21 no.3
    • /
    • pp.324-338
    • /
    • 2009
  • Purpose: The purpose of this study was to understand the experiences of interpersonal relationships of head nurses in interacting with others in general hospital settings. Methods: The data were collected by individual in-depth interviews from seven head nurses and were analyzed using qualitative content analysis. Results: Five major categories emerged and they represent a major strategy according to five different groups of interacting people. 'Establishing trust' was identified as the key strategy in dealing with patients and family members. 'Embracing with sisterly love' and 'helping with self-defense' were major strategies for subordinate nurses and physicians, respectively. 'Respecting and recognizing' was the main approach for other professionals such as dietitians and 'emphasizing rules and educating' were a major one for non-professionals. Head nurses paid more attention and made efforts in dealing with their subordinate nurses than with other groups of people, because they felt the most difficulty in their relationship with subordinate nurses. Conclusion: The results of the study showed that head nurses employ unique strategies in interacting with different groups of people to increase the efficiency of communication. This study would help nurse administrators establish an effective program for improving interpersonal relationships of head nurse.

  • PDF

Effects of Essential Companywide Components of PL Response System on Company's PL Performance (전사적 PL 대응시스템의 핵심요인이 기업 성과에 미치는 영향)

  • Seo, Jun Hyeok;Bae, Sung Min
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.2
    • /
    • pp.22-30
    • /
    • 2017
  • PL (Product Liability) refers to the legal responsibility of a manufacturer or seller for bodily injuries or property losses caused by product defects. Therefore, it is important for companies to construct a product liability response system that strategically manage and effectively adapt to product liability. A PL response system refers to companywide operations of PL prevention (PLP) measures, product safety (PS) measures, and PL defense (PLD) measures appropriate for a company's scale and environment. To establish an enterprise product liability response system, each essential component of corporations should be systematically operated and maintained considering the scale and characteristics of the corporations. Essential components of PL response system is Strategy, Organization, Training, Technology, Investment, and Awareness. Role of essential components is that companies need specific strategies to secure product safety and protect customers from product defects, and appropriate organizations must be composed for effective operation of such strategies. The objective of this paper seeks to examine the relationships among the essential components of the product liability response system and PL performance. PL performance consists of positive performance and negative performance. In particular, positive performance include increased efforts in product or process innovation such as strengthening research and development (R&D) to produce safer products without defects. In order to carry out this research we obtained 98 questionnaire of manufacturing company. A summary of the analyses is as follows: First, the awareness and technology among essential components affect significantly to the positive performance. Second, the awareness and strategy among essential components negative affect to the negative performance.

The Model to Implement the Cyber Security Policy and Strategy for Azerbaijan Information System (아제르바이잔 정보시스템에 대한 사이버보안 정책과 전략의 실행모델 구축)

  • Aliyeva, Leyla Mehdi;Hwang, Gee-Hyun
    • Journal of Digital Convergence
    • /
    • v.17 no.5
    • /
    • pp.23-31
    • /
    • 2019
  • This study aims to build an AHP model that evaluates the priority of cyber security policies for the Azerbaijan information system. For this, 4 factors were constructed from components of ITU National Interest Model, whereas 5 alternatives were based on the best practices of the eight developed countries leading the cyber security field. Using the questionnaire, 24 security experts evaluated the strategic priority of such factors or alternatives. The analysis results using the AHP software showed that homeland defense and economic well-being were the dominant aspects of cyber security policy, whereas capacity building and infrastructure were the main concern of cyber security elements for Azerbaijan. This study presents the strategic priority of cyber security policies that can be adopted by Azerbaijan government. This study can contribute to developing the national cyber security guide of Azerbaijan.