• Title/Summary/Keyword: 통지

Search Result 181, Processing Time 0.033 seconds

A Study on Triggering the Implication for the Revision of UCP600 (UCP600 운용상의 문제점과 합리적 개정방안의 모색)

  • CHO, Sung-Ran;KIM, KI-Sun
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.70
    • /
    • pp.1-20
    • /
    • 2016
  • This study is to find the accurate interpretations for the UCP600 by integrating, ISBP745, Official Opinions of ICC Banking Commission and some Case Laws suggesting the reasonable implication for the upcoming UCP. Major results analyzed by this study are as follows. First, The preclusion rule, UCP600 Article 16(c), is closely connected with the doctrine of documentary cure, so the banks requirement of Single Notice must state all the discrepancies of the documents presented. Exceptionally if the cured documents by the presenter are happened to be inconsistent the initial notice the bank can require the presenter to re-tender within the expiry date or the last day for presentation. Secondly, The Issuing Bank can utilize the right of seeking a waiver of documentary discrepancies from the applicant with the time limit of 5 banking days. If the bank wants to require an applicant to report discrepancies promptly, he may include a provision in the reimbursement engagement limiting the time limit within which the applicant must give notice of facial discrepancies. Thirdly, if a credit contains a non-documentary condition, banks will deem such condition as not states and will disregard it. According to the principle of private autonony if a credit contains a non-documentary condition to be consistent with by the parties concerned in a credit the non-documentary condition can be treated, as an effective condition itself. Fourthly, according to the Korean Supreme Court's decision, negotiation includes the method of crediting the credit amount and then transfers such funds into a special account and controls the account. Finally, UCP600 Article 33 states a bank has no obligation to accept a presentation outside of its banking hours. However, there is no rule in UCP600 in regard to a presentation after the close of business. Hopefully the upcoming UCP has to stipulates a sort of definite article to determine such ambiguous.

  • PDF

Architecture of SIP-based Effective Hybrid-type Multimedia Conference (SIP 기반의 효율적인 혼성형 멀티미디어 컨퍼런스 구조)

  • Lee, Ki-Soo;Jang, Choon-Seo;Jo, Hyun-Gyu
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.3
    • /
    • pp.17-24
    • /
    • 2007
  • SIP-based tightly coupled conference, which has a centrally located conference server for controlling and management, can be classified several models according to location of focus and mixer. These are centralized server model, endpoint server model, media server component model and distributed mixing model. However each model has its strength and weakness. In this paper, we propose and implement a SIP-based effective hybrid-type conference model which decreases amount of SIP signaling messages, lowers load of server media mixer, and can be easily expandable to large scale conference. In this model, when the number of participants exceeds a pre-defined limit, the conference server selects some participants which posses specific functions and let them share functions of notifications of conference state event package and media mixing. When each participant subscribes conference state event package to the server, it can indicates its possession of such functions by a specific header message. The server stores the indication to the conference information database, and later uses it to select participants for load sharing. The performance of our proposed model is evaluated by experiments.

Study on abnormal behavior prediction models using flexible multi-level regression (유연성 다중 회귀 모델을 활용한 보행자 이상 행동 예측 모델 연구)

  • Jung, Yu Jin;Yoon, Yong Ik
    • Journal of the Korean Data and Information Science Society
    • /
    • v.27 no.1
    • /
    • pp.1-8
    • /
    • 2016
  • In the recently, violent crime and accidental crime has been generated continuously. Consequently, people anxiety has been heightened. The Closed Circuit Television (CCTV) has been used to ensure the security and evidence for the crimes. However, the video captured from CCTV has being used in the post-processing to apply to the evidence. In this paper, we propose a flexible multi-level models for estimating whether dangerous behavior and the environment and context for pedestrians. The situation analysis builds the knowledge for the pedestrians tracking. Finally, the decision step decides and notifies the threat situation when the behavior observed object is determined to abnormal behavior. Thereby, tracking the behavior of objects in a multi-region, it can be seen that the risk of the object behavior. It can be predicted by the behavior prediction of crime.

A Method of Efficient Conference Event Package Processing in Distributed Conference Environment (분산형 컨퍼런스 환경에서의 효율적인 컨퍼런스 이벤트 패키지 처리 방식)

  • Jang, Choon-Seo;Jo, Hyun-Gyu;Lee, Ky-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.199-205
    • /
    • 2008
  • The centralized conference model has advantage of conference management and control. however it's scalability has been limited as performance degrades largely with increasing number of conference users. So new distributed conference models which improve scalability of centralized conference model have been suggested recently. In the distributed conference model. as conference users exceed a predefined maximum number, a new conference server is added to the conference dynamically. In this paper, We have proposed a new method which increases efficiency of conference event package processing that primary conference server should charge in the distributed conference environment. The primary conference server exchanges informations with each secondary conference servers and conference users by using conference event package. And from the conference information database it selects SIP(Session Initiation Protocol) UA(User Agent) which will share notification to the conference users, and transfers lists to each conference servers. The conference servers make the selected UAs share processing of conference event package, so loads of SIP signal processing decrease, and improve scalability of distributed conference model. The performance of our proposed model is evaluated by experiments.

  • PDF

Development of Security Audit Agent for the Safety in School Network (학내전산망의 안전성 확보를 위한 보안진단 에이전트 개발)

  • Park, Jong-O;Lee, Chul-Hyun;Kim, Seong-Sik
    • The Journal of Korean Association of Computer Education
    • /
    • v.5 no.1
    • /
    • pp.27-34
    • /
    • 2002
  • Internet has being grown explosively in recent years, hence it becomes easy to search and access information. But it is happening frequently to access illegally into the systems and data, there are many damage caused by them. So, it is very important that we construct security plan for the systems and data. It is not exception on school network being diffused to all schools. But, we have weakness about security to manage server and network safely. So it is causing much anxieties. In this paper, we searched security points make sure of safety of school network, and developed security audit agent helping management of security. Through simple registration process, this agent is able to audit basic and important security problems about not only server systems but also pc systems, and notify to administrator automatically. It is expected to provide efficiency in managing school network.

  • PDF

A Study on the Improvement of the Unconditional Right to Informational Self-Access Based on the Status of Domestic and Foreign Legislation and It's Application to Domestic Corporations (무조건적 자기정보접근권 부여에 대한 국내외 규제현황 및 사례분석을 통한 개선방안 연구)

  • Bae, Jin-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.591-605
    • /
    • 2017
  • The right to informational self-determination refers to the constitutional right for an individual, which is approved by the constitutional court, to decide what contents the collected information comprises and to control the circulation of information relation to oneself. It contains claim for inspection of personal information(The right to informational self-access) as a right for individual to review information of current state and processing history which information holders have. To assure the right to informational self-access, individual must be notified of the processing history of information by information holders regardless of individual's request(The unconditional right to informational self-access). This study will analyse current status of domestic and foreign legislation and global regulation which are related to the unconditional right to informational self-access. In addition, the action of domestic corporations will be introduced. Finally, it will be concluded with relevant problems and solutions to solve the problems.

A Spatio-Temporal Geocasting Protocol Using Regional Caching in Vehicular Ad-Hoc Networks (VANET 망에서 지역적 캐싱을 이용하는 시공간 지오캐스팅 프로토콜)

  • Lee, Hyunkyu;Shin, Yongje;Choi, Hyunsuk;Lee, Euisin;Park, Soochang
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.6
    • /
    • pp.137-144
    • /
    • 2018
  • Vehicular Ad-hoc Networks (VANETS) have enabled to provide a variety of applications such as accident notification, content usage, etc. These applications have spatio-temporal data which have an interesting region and a lifetime according to their properties. However, geocasting protocols to deliver data to an interesting region can provide data to all vehicles in the region through a single transmission only at the current time, but cannot provide data to vehicles passing through the region during the lifetime of the data. Thus, we propose a spatio-temporal geocasting protocol called STGP using a regional caching scheme to send data to vehicles in an interesting region during a data lifetime in VANETs. For efficient and reliable regional caching, the proposed protocol uses the beacon-based data sharing, the extra caching elimination, and the distance-based caching exchange. Simulation results verify that the proposed protocol achieves more reliable and efficient data delivery compared with the existing protocol.

Design and Implementation of CORBA based on Multi-Threaded in Open Network Environments (개방형 네트워크 환경을 위한 멀티쓰레드 기반 코바 설계 및 구현)

  • Jang, Jong-Hyeon;Lee, Dong-Gil;Han, Chi-Mun
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.213-220
    • /
    • 2002
  • Distributed competing system gives a new system architecture to be taken into consideration for solving the problems of interoperability of heterogeneous systems. In the present paper, CORBA based on multi-threaded interoperates with software blocks at physically isolated hardware. We show how archives optimal CORBA system from analysis of required functions, implementations of protocols and benchmarking of system performance in the Open Multi-service Network System Environment. The core features of our CORBA system are restricted Quality of Service based on priority, timeout service and exception status information notify to the related software blocks. And the objectives are design and implementation of high performance multi-threaded middleware and satisfied with extendibility, flexibility and stability of CORBA platform.

Design of a Privacy-based Confirmed Case Contact Notification System in the With-Corona Era (With-Corona 시대에 프라이버시 보호 기반의 확진자 접촉 여부 알림 시스템 설계)

  • Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.138-143
    • /
    • 2021
  • As of this moment, we are tracing people who are closed contact with Covid-19 patients and trying to block the spread of Covid-19 through diagnostic tests. However, the incubation period of the confirmed case is two weeks, and it takes a lot of human resources, time, and money to trace the routes of the confirmed case. In particular, as the number of confirmed cases have been increasing, the cost for finding closed contacts and blocking them in advance exponentially have almost reached the limitation of the budget. In finding closed contacts, all citizens must record an electronic access list every time they visit an amenities such as a store or a restaurant. This is likely the invasion of the privacy of personal location information. In this study, we designed a system that keeps one's location in real time, it will download the movement information of the confirmed case which is collected by KDCA, and it will notify the user when there is an overlap. Moreover, then guide for diagnostic test in advance will be used. The proposed method can solve the difficulty of recording in an electronic access list when visiting a store, and it can block infringement of privacy without providing personal information from KDCA.

Research on technical protection measures through risk analysis of pseudonym information for life-cycle (가명정보 Life-Cycle에 대한 위험 분석을 통한 관리적/기술적 보호조치 방안에 대한 연구)

  • Cha, Gun-Sang
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.53-63
    • /
    • 2020
  • In accordance with the revision of the Data 3 Act, such as the Personal Information Protection Act, it is possible to process pseudonym information without the consent of the information subject for statistical creation, scientific research, and preservation of public records, and unlike personal information, it is legal for personal information leakage notification and personal information destruction There are exceptions. It is necessary to revise the pseudonym information in that the standard for the pseudonym processing differs by country and the identification guidelines and anonymization are identified in the guidelines for non-identification of personal information in Korea. In this paper, we focus on the use of personal information in accordance with the 4th Industrial Revolution, examine the concept of pseudonym information for safe use of newly introduced pseudonym information, and generate / use / provide / destroy domestic and foreign non-identification measures standards and pseudonym information. At this stage, through the review of the main contents of the law or the enforcement ordinance (draft), I would like to make suggestions on future management / technical protection measures.