• Title/Summary/Keyword: national defense strategy

Search Result 196, Processing Time 0.03 seconds

A Study on the Management of the Advanced Degree Programs Commissioned by the ROK Armed Forces (육군 전문학위 위탁교육의 성과관리에 관한 연구)

  • Kim, Choong-Kwan
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.5
    • /
    • pp.131-148
    • /
    • 2018
  • The objective of this study is to evaluate the degree programs commissioned by the ROK Armed Forces, and to search for improvements. In order to achieve the purpose of this study, a research model was designed according to the CIPP evaluation model of Daniel Stufflebeam. The researcher conducted an analysis of documents, interviews, surveys, and data associated with the commissioned degree programs. On the basis of empirical analysis, this study debated various ways of improving the programs. This study found that the object of commissioned education in the Army did not actively reflect national defense strategy nor the army strategy in cultivating talented people. Nevertheless, this study found that the educational program helped improve individual competency because the budget for the programs was sufficient and was effectively implemented. However, there are not enough personnel to administer these commissioned programs. The contents of education strongly reflected the objective of the original commission's programs. However, the research papers produced by the students did not live up to the needs of the military to some extent. Lastly, most graduate students were satisfied with this program and found the program to be very helpful to carry out their missions and cultivate their expertise.

An Automatic Testing Method for EJB Components based on In-Container Testing Strategy (컨테이너 내부 테스팅 전략 기반의 EJB 컴포넌트 테스트 자동화 방법)

  • Kuk, Seung-Hak;Kim, Hyeon Soo
    • Journal of Internet Computing and Services
    • /
    • v.16 no.2
    • /
    • pp.85-98
    • /
    • 2015
  • Component technologies which enable quickly and effectively to develop software have begun to come into the spotlight since early 1990s. Currently, a number of software development works are performed on the J2EE/EJB environment. However component testing is a very complicated task, in addition it requires more efforts than the previous Java class testing. Thus many developers do not perform sufficiently testing works. In this paper we propose an automatic testing method for EJB components based on the in-container testing strategy and implement a testing tool. Since our method builds automatically the test environment for EJB components, it is possible for developers or testers to save their time and efforts at the test preparation phase. Therefore we are convinced that the reliability of EJB components can be increased through sufficient testings with our method.

Simulation Analysis to Optimize the Management of Military Maintenance Facility (군 정비시설 운용 최적화를 위한 시뮬레이션 분석 연구)

  • Kim, Kyung-Rok;Rhee, Jong-Moon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.5
    • /
    • pp.2724-2731
    • /
    • 2014
  • As the future national defense plan of government focus on advanced weapon system, military maintenance facility becomes more important. However, military maintenance facility has been managed by director's experience and simple mathematical calculation until now. Thus, the optimization for the management of military maintenance facility is suggested by more scientistic and logical methods in this study. The study follows the procedure below. First, simulation is designed according to the analysis of military maintenance facility. Second, independent variable and dependent variable are defined for optimization. Independent Variable includes the number of maintenance machine, transportation machine, worker in the details of military maintenance facility operation, and dependent variable involves total maintenance time affected by independent variable. Third, warmup analysis is performed to get warmup period, based on the simulation model. Fourth, the optimal combination is computed with evolution strategy, meta-heuristic, to enhance military maintenance management. By the optimal combination, the management of military maintenance facility can gain the biggest effect against the limited cost. In the future, the multipurpose study, to analyze the military maintenance facility covering various weapon system equipments, will be performed.

Analysis of Strategic Priorities for Strengthening Cybersecurity Capability of Cambodia (캄보디아의 사이버보안 역량강화를 위한 전략적 우선순위 분석)

  • Heng, Mara;Hwang, Gee-Hyun
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.93-102
    • /
    • 2019
  • This paper aims to set the priorities for the cybersecurity strategy of Cambodian government. To this end, we built a AHP research model by adopting 4 factors from the ITU national interests model and selecting 7 strategies from best practices of 8 countries leading the cyber security. Using a questionnaire, 19 experts evaluated Cambodia's cybersecurity strategy priorities. The key policy factors were evaluated in the order of homeland defense, economic welfare, value promotion and favorable world order. Their strategic alternatives were identified in the order of legislation, capacity building, and cyber attack prevention for critical infrastructure. This study will contribute to setting the strategic priorities and feasible action plans to strengthen Cambodia's cybersecurity capabilities.

ACA: Automatic search strategy for radioactive source

  • Jianwen Huo;Xulin Hu;Junling Wang;Li Hu
    • Nuclear Engineering and Technology
    • /
    • v.55 no.8
    • /
    • pp.3030-3038
    • /
    • 2023
  • Nowadays, mobile robots have been used to search for uncontrolled radioactive source in indoor environments to avoid radiation exposure for technicians. However, in the indoor environments, especially in the presence of obstacles, how to make the robots with limited sensing capabilities automatically search for the radioactive source remains a major challenge. Also, the source search efficiency of robots needs to be further improved to meet practical scenarios such as limited exploration time. This paper proposes an automatic source search strategy, abbreviated as ACA: the location of source is estimated by a convolutional neural network (CNN), and the path is planned by the A-star algorithm. First, the search area is represented as an occupancy grid map. Then, the radiation dose distribution of the radioactive source in the occupancy grid map is obtained by Monte Carlo (MC) method simulation, and multiple sets of radiation data are collected through the eight neighborhood self-avoiding random walk (ENSAW) algorithm as the radiation data set. Further, the radiation data set is fed into the designed CNN architecture to train the network model in advance. When the searcher enters the search area where the radioactive source exists, the location of source is estimated by the network model and the search path is planned by the A-star algorithm, and this process is iterated continuously until the searcher reaches the location of radioactive source. The experimental results show that the average number of radiometric measurements and the average number of moving steps of the ACA algorithm are only 2.1% and 33.2% of those of the gradient search (GS) algorithm in the indoor environment without obstacles. In the indoor environment shielded by concrete walls, the GS algorithm fails to search for the source, while the ACA algorithm successfully searches for the source with fewer moving steps and sparse radiometric data.

Examination of NATO's Strategic Changes After the Russia-Ukraine War and Korea's Security Strategic Implications (러-우 전쟁 이후 NATO의 전략 변화와 한국의 안보전략적 함의 고찰)

  • Kim Hyun Jin;Bae Il Soo
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.25-29
    • /
    • 2024
  • After the Russia-Ukraine War, NATO broke away from the peacekeeping strategy that it had maintained and declared that it would strengthen the multilateral security consultative body, pursue strategic stability, expand armaments, cooperate security, and strengthen dialogue and cooperation in the Indo-Pacific region. Changes in NATO's strategy directly and indirectly affect Korea's security environment. Only by clearly analyzing this and establishing policies and strategies to respond to it can the threat be suppressed and national interests protected. NATO designates China and Russia as threats. By using cooperation and solidarity with NATO as an opportunity, we will be able to strengthen security cooperation and alliances, develop and expand the defense industry market, and expand opportunities to participate in the Ukraine reconstruction project.

Conditions and Strategy for Applying the Mosaic Warfare Concept to the Korean Military Force -Focusing on AI Decision-Making Support System- (한국군에 모자이크전 개념 적용을 위한 조건과 전략 -AI 의사결정지원체계를 중심으로-)

  • Ji-Hye An;Byung-Ki Min;Jung-Ho Eom
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.122-129
    • /
    • 2023
  • The paradigm of warfare is undergoing a revolutionary transformation due to the advancements in technology brought forth by the Fourth Industrial Revolution. Specifically, the U.S. military has introduced the concept of mosaic warfare as a means of military innovation, aiming to integrate diverse resources and capabilities, including various weapons, platforms, information systems, and artificial intelligence. This integration enhances the ability to conduct agile operations and respond effectively to dynamic situations. The incorporation of mosaic warfare could facilitate efficient and rapid command and control by integrating AI staff with human commanders. Ukrainian military operations have already employed mosaic warfare in response to Russian aggression. This paper focuses on the mosaic war fare concept, which is being proposed as a model for future warfare, and suggests the strategy for introducing the Korean mosaic warfare concept in light of the changing battlefield paradigm.

A Study on National Cyber Capability Assessment Methodology (국가 사이버 역량 평가 방법론 연구)

  • Kang, JungMin;Hwang, HyunUk;Lee, JongMoon;Yun, YoungTae;Bae, ByungChul;Jung, SoonYoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1039-1055
    • /
    • 2012
  • It is required for us to enhance the national cyber capability as the worldwide countries have been doing effort to strengthen their cyber capabilities. However, we are encountering the difficulty in estimating national cyber capability due to the absence of any cyber capability assessment methodology. This paper presents the national cyber capability assessment methodology which is used for settle up national cyber policy. We also introduce the result of five major nations(US, China, Japan, Russia, Korea)' cyber capability assessment using the proposed methodology. The methodology is developed using open data and includes three areas; base capability, attack capability and defense capability. The assessment result shows the in the order of US, China, Korea, Russia, Japan. As the analysis of that result, in order to enhance the our cyber capability, we recommend that first, cyber budget and human resources for the base capability should be more invested, second, the strategy for attack capability enhancement is strongly required and lastly, the patch ratio and security monitoring level should be upgraded.

A Method for Preemptive Intrusion Detection and Protection Against DDoS Attacks (DDoS 공격에 대한 선제적 침입 탐지·차단 방안)

  • Kim, Dae Hwan;Lee, Soo Jin
    • Journal of Information Technology Services
    • /
    • v.15 no.2
    • /
    • pp.157-167
    • /
    • 2016
  • Task environment for enterprises and public institutions are moving into cyberspace-based environment and structing the LTE wireless network. The applications "App" operated in the LTE wireless network are mostly being developed with Android-based. But Android-based malwares are surging and they are the potential DDoS attacks. DDoS attack is a major information security threat and a means of cyber attacks. DDoS attacks are difficult to detect in advance and to defense effectively. To this end, a DMZ is set up in front of a network infrastructure and a particular server for defensive information security. Because There is the proliferation of mobile devices and apps, and the activation of android diversify DDoS attack methods. a DMZ is a limit to detect and to protect against DDoS attacks. This paper proposes an information security method to detect and Protect DDoS attacks from the terminal phase using a Preemptive military strategy concept. and then DDoS attack detection and protection app is implemented and proved its effectiveness by reducing web service request and memory usage. DDoS attack detection and protecting will ensure the efficiency of the mobile network resources. This method is necessary for a continuous usage of a wireless network environment for the national security and disaster control.

Preliminary Structural Design of Blast Hardened Bulkhead (The 2nd Report : Scantling Formula for Curtain Plate Type Blast Hardened Bulkhead) (폭발강화격벽의 초기구조설계에 관한 연구 (제2보 : 커튼판 방식 폭발강화격벽의 설계식 개발))

  • Nho, In Sik;Park, Man-Jae;Cho, Yun Sik
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.55 no.5
    • /
    • pp.379-384
    • /
    • 2018
  • This study showed the development process of structural design method of BHB(Blast Hardened Bulkhead) which are applicable in preliminary design stage. In the previous 1st report, the simplified structural scantling equations of BHB were formulated theoretically using the modified plastic hinge method supplemented by considering the membrane effects due to large plastic deformation. And the scantling methodology of plate thickness and section area of stiffeners of the curtain plate type BHB was dealt with. In the present 2nd report, derivation process of the correction factors which can adjust the developed scantling equations considering the uncertainties contained in the design parameters was introduced. Considering the actual BHB structures of 3 warship, the correction factors for the developed scantling equations for curtain plate type BHB were derived. Finally the applicability, validity of them and the strategy of future improvement were considered.