• Title/Summary/Keyword: Layer Defense

Search Result 253, Processing Time 0.025 seconds

China's Naval Strengthening and US Navy's Counter-Forces (중국의 해군력 증강과 미국 해군의 대응전략 -중국 해군의 반접근/지역거부(A2/AD)전략 수행능력을 중심으로-)

  • Kim, Duk-ki
    • Strategy21
    • /
    • s.42
    • /
    • pp.196-223
    • /
    • 2017
  • The aim of this paper is to analyze China's naval strengthening and threat reflected in submarines, aircraft, destroyers and missile capabilities and US Navy's counter-forces. China is strengthening its naval forces in accordance with its three-step naval force build-up plan, and the introduction of Russian destroyers and submarines is a foothold for China's naval enforcement. The Chinese Navy also converted the concept of the First-Second Island Chain Defense, which it had already maintained, to the concept of maritime layer defense. Currently, the Chinese Navy maintains the concept of a Three-Maritime Layer Defense which includes the South China Sea, where artificial islands are being built by China, in the First Layer Defense and the East China Sea in the Third Layer Defense. Along with the advancement of Chinese Navy's submarines, surface vessels and aircraft's operational capabilities, ballistic and cruise missile capabilities become a major threat to the US Navy. If a crisis occurs in the East China Sea or in the Taiwan Waters, the US Navy will face more difficulties in employing the Carrier Strike Group to manage the crisis. Meanwhile, if a crisis occurs on the Korean Peninsula, it will be a burden to dispatch Carrier Strike GroupS to the East and West Seas of the Korean Peninsula. For the stable future, the US Navy should develop a strategy to respond more effectively to the Chinese Navy, which is challenging new maritime supremacy in East Asia.

Selecting the Optimal Hidden Layer of Extreme Learning Machine Using Multiple Kernel Learning

  • Zhao, Wentao;Li, Pan;Liu, Qiang;Liu, Dan;Liu, Xinwang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5765-5781
    • /
    • 2018
  • Extreme learning machine (ELM) is emerging as a powerful machine learning method in a variety of application scenarios due to its promising advantages of high accuracy, fast learning speed and easy of implementation. However, how to select the optimal hidden layer of ELM is still an open question in the ELM community. Basically, the number of hidden layer nodes is a sensitive hyperparameter that significantly affects the performance of ELM. To address this challenging problem, we propose to adopt multiple kernel learning (MKL) to design a multi-hidden-layer-kernel ELM (MHLK-ELM). Specifically, we first integrate kernel functions with random feature mapping of ELM to design a hidden-layer-kernel ELM (HLK-ELM), which serves as the base of MHLK-ELM. Then, we utilize the MKL method to propose two versions of MHLK-ELMs, called sparse and non-sparse MHLK-ELMs. Both two types of MHLK-ELMs can effectively find out the optimal linear combination of multiple HLK-ELMs for different classification and regression problems. Experimental results on seven data sets, among which three data sets are relevant to classification and four ones are relevant to regression, demonstrate that the proposed MHLK-ELM achieves superior performance compared with conventional ELM and basic HLK-ELM.

A Study on the DDoS Defense Algorithm using CFC based on Attack Pattern Analysis of TCP/IP Layers (TCP/IP Layer별 공격패턴 분석에 기반한 CFC를 이용한 DDoS 방어 알고리즘 연구)

  • Seo, Woo Seok;Park, Dea Woo;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.117-130
    • /
    • 2010
  • Paper is on defense for so-called internet crisis, the attack of DDoS (Distributed Denial of Service) which was targeted to the central government ministries, financial sector, and portal sites of chief counties including Korea on June 7th, 2009 as its start. By conducting attack with various DDoS attacking methods in the lab environment and dividing networks targeted by the attack by layers, this paper records and analyzes the chief information for attack, destination information of packets, defense policy setting, and the flow of packet attack with the subjects of the networks separated. This study suggests CFC system using multiple firewalls applying defense policy corresponding to the target layer for ultimate attack and tests it according to the result of analyzing the attack packet information and its amount, log analysis, access recording port, and MAC and IT information, etc. by layers. This article is meaningful in that it analyzes the attack by layers, establishes firewall policy for protecting each layer, and secures accurate mechanism for detect and defense.

A study of Nutrient Qi(營氣) and Defense Qi(衛氣) from the modern perspective of Visceral body and Somatic body (현대적인 관점인 내장계와 체벽계로 바라본 영기(營氣)와 위기(衛氣)에 대한 연구)

  • Da Hyun Ju;Byoung-Soo Kim
    • The Journal of Korean Medicine
    • /
    • v.43 no.3
    • /
    • pp.36-48
    • /
    • 2022
  • Objectives: The aim of this study is to modernize Nutrient Qi(營氣) and Defense Qi(衛氣) from the point of view of Visceral Body and Somatic Body. Methods: Investigate the areas of body and function of Nutrient Qi(營氣) and Defense Qi(衛氣) recorded in the 『HuangdiNeijing(黃帝內經)』 and 『Dongeuibogam(東醫寶鑑)』. And investigate Visceral Body and Somatic Body that anatomical structure is divided according to function based on the book 『Life and Rhythm』. Results: Nutrient Qi(營氣) works to nourish the body such as viscera and bowels in the meridian. Defense Qi(衛氣) works to protect the body such as skin, limb joint, eye outside the meridian. The human body is divided into Visceral Body called a vegetable organ and Somatic Body called an animal organ. Visceral body is the organ that manages "nutrition-reproductive" and is divided into the intestine(腸管), blood vessels(血管), and the nephridium(腎管). Somatic Body is an organ that manages 'sensory-motion' and is divided into a three-layer structure: the outer layer covering the body surface, the nerve layer connecting the outer layer and the muscle layer, and the muscle layer controling contraction and movement. Conclusions: It is estimated that Nutrient Qi(營氣) is similar to Visceral Body, and Defense Qi(衛氣) is similar to Somatic Body.

The Influence of Design Factors of Sonar Acoustic Window on Transfer Function of Self Noise due to Turbulent Boundary Layer (소나 음향창의 설계 인자가 난류 유동 유기 자체 소음의 전달 함수에 미치는 영향 해석)

  • Shin, Ku-Kyun;Seo, Youngsoo;Kang, Myengwhan;Jeon, Jaejin
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.23 no.1
    • /
    • pp.56-64
    • /
    • 2013
  • Turbulent boundary layer noise is already a significant contributor to sonar self noise. For developing acoustic window of sonar system to reduce self noise, a parametric study of design factors of acoustic window is presented. Distance of sensor array from acoustic window, materials of acoustic window and characteristics of damping layer are studied as design factors to influence in the characteristics of the transfer function of self noise. As the result, these design factors make change the characteristics of transfer function slightly. Among design factors the location of sensor array is most important parameter in the self noise reduction

A Study on Surface properties of Cr-Mo-V Steel by Eco-friendly Salt Bath Nitriding Treatment (Cr-Mo-V강의 친환경 염욕질화처리에 의한 표면특성 연구)

  • Jung, Gil-Bong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.2
    • /
    • pp.275-282
    • /
    • 2010
  • The improved properties of surface layer can be achieved by so-called "new salt bath nitriding(NSBN)", which has been developed by a domestic company. This process based upon modified traditional salt bath nitriding process, increased hardenability with minimum toughness deterioration. This process also offers not only less white layer surfaces but also more eco-friendly one. That is, NSBN is the new eco-friendly surface treatment technology removing harmful $CN^-$ and toxic gas. According to the research of applying NSBN to Cr-Mo-V steel which has been used in defense industry, showed the improved result of wear resistance and surface hardening than non-coated condition. In further, we expect NSBN to curtail expenses and productivity improvement applied to the various defense industry parts.

Adaptive Multi-Layer Security Approach for Cyber Defense (사이버 방어를 위한 적응형 다중계층 보호체제)

  • Lee, Seong-kee;Kang, Tae-in
    • Journal of Internet Computing and Services
    • /
    • v.16 no.5
    • /
    • pp.1-9
    • /
    • 2015
  • As attacks in cyber space become advanced and complex, monotonous defense approach of one-one matching manner between attack and defense may be limited to defend them. More efficient defense method is required. This paper proposes multi layers security scheme that can support to defend assets against diverse cyber attacks in systematical and adaptive. We model multi layers security scheme based on Defense Zone including several defense layers and also discuss essential technical elements necessary to realize multi layers security scheme such as cyber threats analysis and automated assignment of defense techniques. Also effects of multi layers security scheme and its applicability are explained. In future, for embodiment of multi layers security scheme, researches about detailed architecture design for Defense Zone, automated method to select the best defense technique against attack and modeling normal state of asset for attack detection are needed.

Estimation of Physical Layer Scrambling Code Sequence of DVB-S2

  • Wu, Hao;Xie, Hui;Huang, Zhi-Tao;Zhou, Yi-Yu
    • ETRI Journal
    • /
    • v.36 no.2
    • /
    • pp.329-332
    • /
    • 2014
  • In this letter, the problem of estimating the physical layer (PL) scrambling code sequence of DVB-S2 is studied. We present the first ever scheme to estimate the scrambling sequence. The scheme is based on hypothesis testing. By analyzing the PL scrambling process, we construct a new sequence equivalent to the scrambling sequence. We then use hypothesis testing to estimate the new sequence. The threshold for the hypothesis testing is also discussed. The experiment results show that the performance of our estimation scheme can work even under high BER.

Design of stepwise foam claddings subjected to air-blast based on Voronoi model

  • Liang, Minzu;Lu, Fangyun;Zhang, Guodong;Li, Xiangyu
    • Steel and Composite Structures
    • /
    • v.23 no.1
    • /
    • pp.107-114
    • /
    • 2017
  • Design of stepwise foam claddings subjected to air-blast is performed based on random Voronoialgorithm. FE models are constructed using the random Voronoialgorithm, and numerical analysis is carried out to simulate deformation mode and energy absorption of the cladding by the ABAQUS/Explicit software. The FE model is validated by test result, and good agreement is achieved. The deformation patterns are presented to give an insight into the influences of distribution on deformation mechanisms. The energy absorbed by the stepwise foam cladding is examined, and the parameter effects, including layer number, gradient, and blast loading, are discussed. Results indicate that the energy absorption capacity increases with the number of layer, gradient degree, and blast pressure increasing.