• Title/Summary/Keyword: BREACH

Search Result 423, Processing Time 0.024 seconds

Impact of Parameters of Nonlinear Breach Progression Curve on Outflow Rate (저수지 붕괴함수의 매개변수 결정이 유량과 침수범위에 미치는 영향)

  • Lee, Khil-Ha
    • Journal of Environmental Science International
    • /
    • v.28 no.2
    • /
    • pp.211-217
    • /
    • 2019
  • A Numerical modeling approach is usually applied to reproduce the physical phenomena of a fill dam-break. The accuracy of the dam-break model depends on the physical structure that defines input variables such as the storage volume, breach formation and progress, and the parameters of the model, which are subjective as they are prescribed by users. In this study, a sensitivity analysis was performed for the nonlinear breach progression curve that was already developed, which includes four parameters. The study focuses on the two of the parameters which control the breach forming time and peak discharge. The model is coupled with a two-dimensional flood simulation model (FLO-2D) to examine flood coverage and depth. It is generally observed that the parameter ${\beta}$ controls only the breach forming time, the parameter ${\gamma}$ is particularly sensitive to the peak flow.

The Effect of Flood Discharge due to Dam Breach on Downstream Channel (댐붕괴시 홍수가 하천하류에 미치는 영향)

  • Ahn, Sang-Jin;Lee, Jun-Geun;Yeon, In-Sung;You, Hyung-Gyu
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2006.05a
    • /
    • pp.1666-1670
    • /
    • 2006
  • The purpose of this study is to analyze how a downstream channel is affected in case of hypothetical dam failure. The object of it is Hwacheon dam basin within the basin of North Han river. This study has analyzed the influence on Pyeonghwa(Peace) dam and Hwacheon dam supposing that the Imnam dam in North Korea on the upper stream of North Han river is failed hypothetically at the MFWL(maximum flood water level) by a deluge of rain. The model applied at the main study is NWS(National Weather Service) FLDWAV(Flood Wave Routing Model). Dam breach characteristics data are analyzed by making nine hypothetical scenarios on the basis of other studies on the shape and size of dam breach, time of failure and so on. Expected peak discharge through the breach is verified to have the propriety in comparison with empirical function which is developed on the basis of the case of dam breach in the foreign countries and it is observed that peak discharge is more increasing, as the time of breach gets shorter and the breach width gets bigger. As a result of main study, even though the Imnam dam is hypothetically failed down, there has no influence on the Hwacheon dam of the downstream as the extended Pyeonghwa dam on the downstream controls the volume of discharge properly.

  • PDF

A Study on the Recent Cases of Buyer's Fundamental Breach (국제물품매매에서 매수인의 본질적 계약위반에 관한 최근의 사례 고찰)

  • Ha, Kang-Hun
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.55
    • /
    • pp.95-124
    • /
    • 2012
  • Referring to Buyer's obligations, the Buyer must pay the price for the goods and take delivery of them as required by the contract. There are vital importances to the Buyer's Fundamental Breach. The legal effects of a breach of contract do not depend on the nature of the obligation broken, but on the consequences of the breach the detriment to the other party. The obligations mentioned to Article 53 are primary obligations which are to be fulfilled in the normal performance of the contract. They include a number of different acts which could be seen as the subject-matter of different obligations. CISG gives further details for the payment of the price in Articles 54 to 59 and for taking delivery in Article 60. The buyer has to take delivery at the respective place within a reasonable period after this communication since he cannot be required to take delivery immediately. Refusing to take delivery in case of delay not constituting a ground for avoiding the contract makes no sense, since this would lead to even later delivery. For the understanding of Buyer's Fundamental Breach, We need to search the Cases referring to the breach of buyer's main obligations.

  • PDF

Factors Affecting Information Breach Intention: Based on General Deterrence Theory and Rational Choice Theory (정보유출의도에 대한 영향요인: 일반 억제 이론 및 합리적 선택 이론을 기반으로)

  • Kim, June-Young;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1507-1517
    • /
    • 2017
  • Generally, information breach incidents are thought to be caused by external hackers. However, both direct and indirect information breach incidents by insiders are more frequent than by external hackers. It also accounts for more than half of the total information breach, so it should be prepared against insider breach. In this study, based on General Deterrence Theory(GDT) and Rational Choice Theory(RCT), we integrated the risk sensitivity and situational anxiety, which were studied in the field of traffic psychology to construct research model. Result of analysis shows that the impact of risk perceptions on the severity and certainty of perceived punishment was not statistically significant, but perceived benefits, situational anxiety, and severity and certainty of perceived punishment were found to influence the information breach intention.

PEDIATRIC NUCLEAR CARDIOLOGY: CURRENT TRENDS IN A DEVELOPING TROPICAL COUNTRY

  • DaCosta, Homai;Bagwe, B.;Ahire, B.;Sewatkar, A.
    • The Korean Journal of Nuclear Medicine
    • /
    • v.19 no.1
    • /
    • pp.45-47
    • /
    • 1985
  • We conclude that Nuclear Medicine technology has much to offer in the diagnosis of cardiovascular pathologies. Its potnetials have yet to be fully appreciated by those who have access to the facility, as also by those who practise speciality with resigned pessimism.

  • PDF

A Comparative Analysis on the General Principles of the Liability for Damages (손해배상책임(損害賠償責任)의 일반원칙(一般原則)에 관한 비교연구(比較硏究))

  • Bae, Jun-Il
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.15
    • /
    • pp.7-31
    • /
    • 2001
  • All legal systems set out the principle of full compensation of damages, which aims to fulfil the plaintiff's expectations by putting him into as good a position as he would have been in if the contract had been performed. On the other hand, they place some limitations on the full recoverability of damages for breach of contract. In Civil Law systems, 'fault' is a necessary requirement for liability for damages, and the extent of recoverable damages is directly related to the degree of the dependent's fault. This principle, however, is not adopted by Common Law systems, in which the dependent would be liable in damages for breach of contract even though the breach was not due to his fault. The CISG is in a similar position to the latter systems. In Common Law systems as well as CISG, the extent of liability of the party in breach for damages depends on whether he foresaw or could have foreseen the damages at the time of contracting. Unlike the position in Civil Law systems, foreseeability seems to be the most effective principle to decide the extent. The tests for remoteness centre on reasonable foreseeability or contemplation of the loss. The party in breach is liable even for loss indirectly caused to the other party provided that this loss was foreseeable or contemplated by the party in breach. However, this manner to decide remoteness may lead to unreasonable results in some cases. If the party in breach were the inveterate pessimist who foresaw all sorts of possible damages, he could foresee damages too remote from the breach of duty. If this fact were revealed in the course of trial, he should be liable for such indirect damages. This is really undesirable result. Therefore, as to the remoteness test, the criterion of whether the loss is foreseen or contemplated must not be adopted. Foreseeability by reasonable person must be the only available criterion.

  • PDF

The effect of techno-overload and techno-invasion on emotional exhaustion: mediating effect of psychological contract breach and moderating effect of voice behavior (테크노 과중과 테크노 침해가 정서적 소진에 미치는 영향: 심리적 계약 위반의 매개 효과 및 발언행동의 조절 효과를 중심으로)

  • Sae-Ha-Neul Kang;Hyun-Sun Chung
    • Korean Journal of Culture and Social Issue
    • /
    • v.25 no.1
    • /
    • pp.27-53
    • /
    • 2019
  • The purpose of this study is to investigate the influence of techno-overload and techno-invasion on emotional exhaustion and the mediating role of psychological contract breach. In addition, this study examines the moderating role of voice behavior in the relationship between techno-overload, techno-invasion and psychological contract breach. The results from 296 participants provided evidence that (1) techno-overload and techno-invasion are positively related to psychological contract breach, (2) psychological contract breach is positively related to emotional exhaustion, (3) psychological contract breach partially mediates the relationship between techno-overload, techno-invasion and emotional exhaustion, (4) voice behavior moderates the relationship between techno-overload, techno-invasion and psychological contract breach. Based on the results, implications of these findings, limitations, and future research are discussed in general discussion.

A Study on the Cases of Seller's Fundamental Breach (근본적(根本的) 계약위반(契約違反) 조항(條項)의 적용(適用) 사례(事例)에 관한 고찰(考察) - 매도인(賣渡人)의 의무위반(義務違反)을 중심(中心)으로-)

  • Ha, Kang-Hun
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.19
    • /
    • pp.67-93
    • /
    • 2003
  • The CISG approach was intended to make the remedial system clear, but produced ambiguity, and complexity. The CISG does not differentiate between main, auxiliary and participatory obligations. There is no distinction between breaches of main or breaches of auxiliary obligations, rather, a distinction is made between fundamental and other breaches of contract. Articles 25 gives the definition of fundamental breach of contract. This concept is the essential of avoidance and remedial system in the CISG. This concept, however, is ambiguous. The fact that the fundamentality of a breach of contract in many cases is the condition for an avoidance of contract, is expression of the trend of the CISG to preserve contracts, which I consider as essential in international trade. The elements which define a substantial detriment are extremely complex. It will become obvious that the relevant detriment is not a static element, but in many instances occurs only when the breach of contract continues. It should be added that it is the circumstances of each individual case which are relevant. It is to be stressed that a fundamental breach of contract must constitute also a non-fulfillment of a contractual obligation.

  • PDF

Volatility clustering in data breach counts

  • Shim, Hyunoo;Kim, Changki;Choi, Yang Ho
    • Communications for Statistical Applications and Methods
    • /
    • v.27 no.4
    • /
    • pp.487-500
    • /
    • 2020
  • Insurers face increasing demands for cyber liability; entailed in part by a variety of new forms of risk of data breaches. As data breach occurrences develop, our understanding of the volatility in data breach counts has also become important as well as its expected occurrences. Volatility clustering, the tendency of large changes in a random variable to cluster together in time, are frequently observed in many financial asset prices, asset returns, and it is questioned whether the volatility of data breach occurrences are also clustered in time. We now present volatility analysis based on INGARCH models, i.e., integer-valued generalized autoregressive conditional heteroskedasticity time series model for frequency counts due to data breaches. Using the INGARCH(1, 1) model with data breach samples, we show evidence of temporal volatility clustering for data breaches. In addition, we present that the firms' volatilities are correlated between some they belong to and that such a clustering effect remains even after excluding the effect of financial covariates such as the VIX and the stock return of S&P500 that have their own volatility clustering.

Analysis of Breach Mitigation Effect on Levee made with New Substance by Overtopping (신소재 활용 제방의 월류 붕괴 경감 효과 분석)

  • Ko, Dong-Woo;Kang, Joon-Gu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.2
    • /
    • pp.1-8
    • /
    • 2018
  • Levee breaches can result from flooding due to torrential rainfalls, which are linked with recent abnormal climates and the aging of river levees. Breaches have caused enormous property damage and human casualties in lowland areas. Overtopping was found to be the cause for approximately 40% of all cases of breach. In this study, the reasons and mechanisms behind levee breaches were analyzed using hydraulic model testing. The overtopping stability and time delay effect of breaches were assessed for levees made with a new environmentally friendly substance. Image analysis revealed that the total breach time of the levees made with the new substance was about 2.25 times greater than that of an earthen levee. The initial breach rate of a general earthen levee was about 1.43 times higher than that of levees covered with the new substance, and the body collapsed rapidly. The breach mechanisms of levees covered with the new substance were completely different, and it is possible to prevent rapid breaches by mitigation of the breach speed on the slope by resisting overtopping.