• Title/Summary/Keyword: self-defense

Search Result 296, Processing Time 0.025 seconds

A Study on the Physical Training for the Security Agents of the Security Headquaters in the North Korea (북한 호위사령부의 경호요원 체육교육에 관한 연구)

  • Kim, Jung-Hyun
    • Korean Security Journal
    • /
    • no.8
    • /
    • pp.45-64
    • /
    • 2004
  • The pivotal emphasis of the physical training for the security agents of the security headquarters in the North Korea is to inspire them with the defense physical training-centered ideology and the war spirit. Their special martial arts is the protectee-centered offensive arts rather than the self-centered arts. It puts emphasis on training black belt-holders in diverse martial arts rather than in a certain martial art. Thus, the physical training for security agents in the South Korea should be also developed into the ways to rear them as black belt-holders in diverse martial arts rather than to foster them as high grade-holders in a certain martial art. And also, professors majoring in security and physical science have to develop jointly the measures to improve the physical and mental agility and the basic physical strength to inspire rapid handling and perseverance, to develop the physical training program to reduce mental and physical stress of security guards, to develop the standard for the examination of physical strength suitable for the body figures of Korean people and the regular evaluation with the standard and to apply traditional folk-games such as the swing and the seesaw to the physical training for security guards.

  • PDF

Study on the Self-Aligned HgTe Nanocrystallites Induced by Controlled Precipitation Technique in HgTe-PbTe Quasi-Binary Semiconductor System: Part I. TEM Study

  • Lee, Man-Jong
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2002.07a
    • /
    • pp.226-231
    • /
    • 2002
  • The present study discusses the results of the controlled precipitation of HgTe nanocrystals in a PbTe semiconductor matrix and demonstrates its effectiveness in producing well-organized and crystallographically aligned semiconductor nanocrystals. Following the similar procedure used in metallic alloys, the semiconductor alloys are treated at 600$^{\circ}C$ for 48 hours, quenched and aged up to 500 hours at 300$^{\circ}C$ and 450$^{\circ}C$ to induce homogeneous nucleation and growth of HgTe nanocrystalline precipitates. Examination of the resulting precipitates using transmission electron microscopy (TEM) and high resolution TEM (HRTEM) reveals that the coherent HgTe precipitates form as thin discs along the {100} habit planes making a crystallographic relation of {100}$\sub$HgTe///{100}$\sub$PbTe/ and [100]$\sub$HgTe///[100]$\sub$PbTe/. It is also found that the nato-disc undergoes a gradual thickening and a faceting under isothermal aging up to 500 hours without any noticeable coarsening. These results, combined with the extreme dimension of the precipitates (4 nm in length and sub-nanometer in thickness) and the simplicity of the formation process, leads to the conclusion that controlled precipitation is an effective method for the preparation of the desirable quantum-dot nanostructures.

  • PDF

A Study on the Costume of Knight in the Cinema with the Background of the Middle Age -Focused on the 11$\sim$15th Century- (중세배경 영화에 나타난 기사복에 관한 연구 -l1$\sim$15세기를 중심으로-)

  • Kim, Hee-Jung
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.9 no.1
    • /
    • pp.71-87
    • /
    • 2007
  • Main role to expand the fashion in the middle age was played by aristocracy and knight. They contributed to the fashion of the middle age regardless of aesthetic sense. First, in any age, there was a self-display design using splendid decoration or material in the costume of high-class people. Aristocracy, especially, knight in the middle age classified themselves from others by wearing the costume suitable for their statuses. Second, the Crusade knight appearing all over the cinema gathered various peoples and caused acute optic angle about specialty of costume. Therefore the trend preferring foreign costumes was changed to new fashion while it was connected to desire searching for a change. Third, although armor of knight was created because of protection in the war, in the 13th century, its character of motion and defense was emphasized and it became splendid style. More over, the costume of knight was developed to more emphasize masculine beauty with heavy upper body and light lower body so it caused sexual difference of costume in the middle age. Fourth, As knight searched effective defensive weapon, chain mail was relegated by plate armor. The order of armor that the hight wore in 1350 was as follows. First, he wears adhesive shirts, braies, hose and wears metal protector on arm and leg. He wears padded undercoat called gambeson, hauberk, plate armor and surcoat on them.

  • PDF

Modified SDIE MLFMM Method for Inhomogeneous Impedance Material Containing PEC or PMC Region (PEC 또는 PMC 영역을 포함하는 불균일 임피던스 매질의 산란 해석을 위한 수정된 SDIE MLFMM 방법)

  • Lee, Hyunsoo;Koh, Il-Suek;Yoo, Ji Hee
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.29 no.10
    • /
    • pp.805-810
    • /
    • 2018
  • A coated perfect electric conductor(PEC) interface to reduce scattered fields can be efficiently modeled by using the impedance boundary condition. The self-dual integral equation(SDIE) proposed by Yan et al. may be an efficient multi-level fast multipole method (MLFMM) formulation for the impedance object. This equation can be applied to an inhomogeneous impedance material, but its accuracy can be degenerated when the material contains a PEC or perfect magnetic conductor(PMC) region. In this paper, we modify the original SDIE formulation for an inhomogeneous object containing a PEC or PMC region and numerically verify its accuracy.

Internet Worm Propagation Modeling using a Statistical Method (통계적 방법을 이용한 웜 전파 모델링)

  • Woo, Kyung-Moon;Kim, Chong-Kwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.3B
    • /
    • pp.212-218
    • /
    • 2012
  • An Internet worm is a self-replicating malware program which uses a computer network. As the network connectivity among computers increases, Internet worms have become widespread and are still big threats. There are many approaches to model the propagation of Internet worms such as Code Red, Nimda, and Slammer to get the insight of their behaviors and to devise possible defense methods to suppress worms' propagation activities. The influence of the network characteristics on the worm propagation has usually been modeled by medical epidemic model, named SI model, due to its simplicity and the similarity of propagation patterns. So far, SI model is still dominant and new variations of the SI model, called SI-style models, are being proposed for the modeling of new Internet worms. In this paper, we elaborate the problems of SI-style models and then propose a new accurate stochastic model using an occupancy problem.

New Players in the BRCA1-mediated DNA Damage Responsive Pathway

  • Kim, Hongtae;Chen Junjie
    • Molecules and Cells
    • /
    • v.25 no.4
    • /
    • pp.457-461
    • /
    • 2008
  • DNA damage checkpoint is an important self-defense mechanism for the maintenance of genome stability. Defects in DNA damage signaling and repair lead to various disorders and increase tumor incidence in humans. In the past 10 years, we have identified many components involved in the DNA damage-signaling pathway, including the product of breast cancer susceptibility gene 1 (BRCA1). Mutations in BRCA1 are associated with increased risk of breast and ovarian cancers, highlighting the importance of this DNA damage-signaling pathway in tumor suppression. While it becomes clear that BRCA1 plays a crucial role in the DNA damage responsive pathway, exactly how BRCA1 receives DNA damage signals and exerts its checkpoint function has not been fully addressed. A series of recent studies reported the discovery of many novel components involved in DNA damage-signaling pathway. These newly identified checkpoint proteins, including RNF8, RAP80 and CCDC98, work in concern in recruiting BRCA1 to DNA damage sites and thus regulate BRCA1 function in G2/M checkpoint control. This review will summarize these recent findings and provide an updated view of the regulation of BRCA1 in response to DNA damage.

A situation-Flexible and Action-Oriented Cyber Response Mechanism against Intelligent Cyber Attack (지능형 사이버공격 대비 상황 탄력적 / 실행 중심의 사이버 대응 메커니즘)

  • Kim, Namuk;Eom, Jungho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.3
    • /
    • pp.37-47
    • /
    • 2020
  • The In the 4th industrial revolution, cyber space will evolve into hyper-connectivity, super-convergence, and super-intelligence due to the development of advanced information and communication technologies, which will connect the nation's core infrastructure into a single network. As applying the 4th industrial revolution technology to the cyber attack technique, it is evolving in an intelligent and sophisticate method. In order to response intelligent cyber attacks, it is difficult to guarantee self-defense in cyberspace by policy-oriented, preplanned-centric and hierarchical cyber response strategies. Therefore, this research aims to propose a situation-flexible & action-oriented cyber response mechanism that can respond flexibly by selecting the most optimal smart security solution according to changes in the cyber attack steps. The proposed cyber response mechanism operates the smart security solutions according to the action-oriented detailed strategies. In addition, artificial intelligence-based decision-making systems are used to select the smart security technology with the best responsiveness.

Comparison of North Korea's Military Strategy before and after Nuclear Arming (핵무장 전.후 북한의 대남 군사전략 비교)

  • Nam, Man-Kwon
    • Journal of National Security and Military Science
    • /
    • s.5
    • /
    • pp.173-202
    • /
    • 2007
  • After successful nuclear tests Pakistan launched a more severe surprise attack toward India than before. It is highly possible that North Korea will adopt this Pakistan military strategy if it is armed with nuclear weapons. The North Korean forces armed, with nuclear bombs could make double its war capability through strengthening aggressive force structure and come into effect on blocking reinforcement of the US forces at the initial phase of war time. Therefore we may regard that Pyongyang's nuclear arming is a major one of various factors which increase possibility of waging a conventional warfare or a nuclear war. North Korea's high self-confidence after nuclear arming will heighten tension on the Korean Peninsula via aggressive military threat or terror toward South Korea, and endeavor to accomplish its political purpose via low-intensity conflicts. For instance, nuclear arming of the Pyongyang regime enforces the North Korean forces to invade the Northern Limit Line(NLL), provoke naval battles at the West Sea, and occupy one or two among the Five Islands at the West Sea. In that case, the South Korean forces will be faced with a serious dilemma. In order to recapture the islands, Seoul should be ready for escalating a war. However it is hard to imagine that South Korea fights with North Korea armed with nuclear weapons. This paper concludes that the Pyongyang regime after nuclear arming strongly tends to occupy superiority of military strategy and wage military provocations on the Korean Peninsula.

  • PDF

Unethical Network Attack Detection and Prevention using Fuzzy based Decision System in Mobile Ad-hoc Networks

  • Thanuja, R.;Umamakeswari, A.
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.5
    • /
    • pp.2086-2098
    • /
    • 2018
  • Security plays a vital role and is the key challenge in Mobile Ad-hoc Networks (MANET). Infrastructure-less nature of MANET makes it arduous to envisage the genre of topology. Due to its inexhaustible access, information disseminated by roaming nodes to other nodes is susceptible to many hazardous attacks. Intrusion Detection and Prevention System (IDPS) is undoubtedly a defense structure to address threats in MANET. Many IDPS methods have been developed to ascertain the exceptional behavior in these networks. Key issue in such IDPS is lack of fast self-organized learning engine that facilitates comprehensive situation awareness for optimum decision making. Proposed "Intelligent Behavioral Hybridized Intrusion Detection and Prevention System (IBH_IDPS)" is built with computational intelligence to detect complex multistage attacks making the system robust and reliable. The System comprises of an Intelligent Client Agent and a Smart Server empowered with fuzzy inference rule-based service engine to ensure confidentiality and integrity of network. Distributed Intelligent Client Agents incorporated with centralized Smart Server makes it capable of analyzing and categorizing unethical incidents appropriately through unsupervised learning mechanism. Experimental analysis proves the proposed model is highly attack resistant, reliable and secure on devices and shows promising gains with assured delivery ratio, low end-to-end delay compared to existing approach.

Radiometric Calibration of FTIR Spectrometer For Passive Remote Sensing Application (수동형 원격탐지 FTIR 분광계의 Radiometric Calibration)

  • Kim, Dae-Sung;Park, Do-Hyun;Choi, Seung-Ki;Ra, Sung-Woong
    • Korean Journal of Optics and Photonics
    • /
    • v.17 no.5
    • /
    • pp.391-395
    • /
    • 2006
  • In this paper, radiometric calibration of a FTIR spectrometer for passive remote sensing application was introduced and verified. Radiometric calibration is a significant signal processing procedure to retrieve the object radiance from the measured spectrum. The object radiance is measured and registered distorted by the detector's responsivity dependent on wavelength and instrument self-emission. Radiance of two temperature points, hot temperature and cold temperature, from a well-controlled blackbody was measured and used to obtain the scale factor and offset factor which are required for radiometric calibration. For gas phase C2H5OH. radiometric calibration was done and verified through comparison of its emission line width and intensity with the standard spectrum.