[학술논문] 자유민주주의의 위기: 이석기 내란음모사건의 의미
...to equipping itself with such constitutional apparatuses as the Supreme Federal Constitutional Court (SFCC) armed with the right to dissolve unconstitutional political parties, the constitutional protection agencies, both federal and local, authorized to monitor, even allowing wire-tappings, activities of suspected unconstitutional activities and authorization of both federal and local governments to...
[학술논문] 북한 민법의 빌리기계약의 특징과 평가
...liability of rental payment and obligation to return the object after using it. Also it is another similar points that is lender’s liability for warranty, a lessee’s claim of occupation protection, Concurrent Performance between lesser’s the return of lease deposits and lessee’s the return of the object. All the similar points between South Korean Civil Law and North Korean Civil...
[학술논문] China’s Dilemma on the Korean Peninsula
...South and North Korea. However, in fact, these bilateral relations face challenges and China is distrusted by both. The distrust from the North mainly originates from the uncertainty about security protection. While the distrust from the South is mainly due to the China-North Korea military alliance. China is facing a dilemma on the Korean peninsula: no matter how it strengthens or weakens its alliance...
[학술논문] The Responsibility to Protect (R2P) after Libya: Practical Implication for North Korea
...of human protection in the face of mass atrocity crimes. Just as in humanitarian intervention, however, the R2P faces several dilemmas: How serious should humanitarian emergencies be to warrant international intervention? Why did we need intervention in Libya while not in Syria where the situation seems to have been more serious than Libya in terms of the necessity of civilian protection? How can...
[학술논문] 전술적 운용과 무기체계 획득을 위한 대화력전 모델링과 분석
...overcome numerical inferiority and defend against the mine artillery. We develop a simulation model for counterfire warfare and analyze effectiveness of our counterfire weapon systems and operations based on various counterfire warfare scenarios. Finally, we propose methods of tactical operations and acquisition strategies of counterfire weapon systems, including detaction, firing, and protection assets.