• Title/Summary/Keyword: Concept of Protection

Search Result 529, Processing Time 0.022 seconds

Computations of Forest Road Density considering for Forest Terrain and Characteristics (산지 지형 및 특성을 고려한 임도밀도 산정)

  • Jung, Do Hyun;Cha, Du Song;Park, Chong Min;Lee, Joon Woo;Ji, Byoung Yun;Chun, Kwon Suk;Kim, Jong Yoon
    • Journal of Korean Society of Forest Science
    • /
    • v.94 no.3 s.160
    • /
    • pp.168-177
    • /
    • 2005
  • To provide the basic policy informations for environment-friendly and economical construction of green forest road, forest road density considering for the forest terrain and characteristics was computed. As results, designing the effective forest management and protection, standard forest road density as a social overhead capital (SOC) concept was computed to 8.57 m/ha. Considering as based facilities for forest management, we also optimal forest road density for preparing the sustainable forest management system was computed to 14.01 m/ha.

The Characteristics of Dynamic Behaviors for Geosynthetic-soil Interface Considering Chemical Influence Factors (화학적 영향인자를 고려한 토목섬유-흙 접촉면 동적거동 특성)

  • Park, Innjoon;Kwak, Changwon;Kim, Jaekeun
    • Journal of the Korean GEO-environmental Society
    • /
    • v.11 no.11
    • /
    • pp.47-54
    • /
    • 2010
  • Nowadays, geosynthetics for reinforcement and protection are widely applied to the waste landfill site. Current research indicates the potential for progressive failure in geosynthetic-soil system depends on the interface shear strength governed by several intrinsic factors such as moisture, normal stress, chemical, etc. In particular, the effect of the acidity and basicity from the leachate is intensively reviewed to assess the chemical reaction mechanism of interface shear strength under the cyclic loading condition. New multi-purpose interface apparatus(M-PIA) has been manufactured and the cyclic direct shear tests using submerged geosynthetics and soils under the different chemical conditions have been performed, consequently, the thickness of interface and shear stress degradation are verified. The basic schematic of the Disturbed State Concept(DSC) is employed to estimate the shear stress degradation in the interface, then, normalized disturbed function is obtained and analyzed to describe the shear stress degradation of geosynthetic-soil interface with chemical influence factors under dynamic condition.

A Case Study on the Establishment of Cloud Management System in Data Centers: Focusing onG-Cloud Application Case (데이터센터 클라우드관리시스템 구축 사례 연구 : G-Cloud 적용사례 중심으로)

  • Jang, Hee-Don;Kim, Seung-Cheon
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.33-37
    • /
    • 2019
  • According to the enforcement of the Cloud Computing Development and User Protection Act, a new paradigm called as Cloud Computing is coming to the fore among public and private domestic enterprises. Therefore, domestic companies should develop SaaS products specialized for the domestic market and try to preempt the IaaS market ahead of global companies. Now we are facing a necessity to combine all the cloud systems in Korean government to operate seamlessly in a harmony. In this paper, we will look at the prospect of future development of related industry through cloud computing concept and G-cloud's cloud management system (G-CMS). G-CMS can be seen as the first system to comprehensively manage heterogeneous Unix virtualization systems. G-CMS can also save costs by managing heterogeneous virtualization systems in data centers.

An Analysis on Channel Sensing Overhead in IEEE 802.22 Cognitive Radio Networks (IEEE 802.22 인지 라디오 네트워크에서 채널 센싱 오버헤드 분석)

  • Park, Keun-Mo;Kim, Chong-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.3
    • /
    • pp.249-253
    • /
    • 2010
  • Resource of wireless frequency bandwidth is gradually going to be deficient due to explosive increase of traffic and saturated non-licensed frequency band such as ISM. In the contrary, many licensed frequency bands are revealed to be low in utilization by several measurement based researches. To alleviate this inefficiency, a concept of cognitive radio is suggested. Cognitive radio lets non-licensed user exploit the licensed frequency band as long as non-licensed user does not interfere licensed user and as a result, it is possible to harness wireless frequency more efficiently. IEEE 802.22 is the first standard network with cognitive radio technology and it employs Two-Stage channel sensing mechanism to accomplish both enough licensed user protection and efficient channel utilization. In this paper, we analyze the overhead of Two-Stage channel sensing mechanism and identify the influence of channel sensing time to the overhead.

Hazard Prevention Using Multi-Level Debris Flow Barriers (다단식(多段式) 유연성 토석류 방지시설에 관한 적용성 검토 연구)

  • Baek, Yong;Choi, Youngchul;Kwon, Oil;Choi, Seungil
    • Journal of the Korean GEO-environmental Society
    • /
    • v.11 no.8
    • /
    • pp.15-23
    • /
    • 2010
  • Debris flows are a natural hazard which looks like a combination of flood, land and rock slide. Large rainfall in July 2006 produced several large scale debris flows and many small debris flows that resulted in loss of life and considerable property and railway damage, as was widely reported in the national media. The hazard "debris flow" is still insufficiently researched. Furthermore debris flows are very hard to predict. Flexible Ring net barriers are multi-functional mitigation devices commonly applied to rock fall or floating wood protection in floods, snow avalanches and also mud flows or granular debris flows, if properly dimensioned for the process or processes for which they are intended. Overtopping of the barriers by debris flows and sediment transport is possible, supporting the design concept that a series of barriers may be used to stop volumes of debris larger than are possible using only one barrier. The future for these barrier concepts looks promising because these barriers represent the state of art for such applications and are superior to many other available options.

A Study on Establishing of the Future Development Strategy for National Cyber Terror Response (국가 사이버테러대응 미래 발전전략 수립에 관한 연구)

  • Kim, MinSu;Yang, Jeongmo
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.15-24
    • /
    • 2020
  • Cyber terror and cyberwarfare are no longer virtual, but real, and as an actual security situation, it is necessary to have new understanding through expanding the concept of war to neutralize not only the other country's military command system, but also the country's main functions such as telecommunications, energy, finance, and transport systems, and it also needs to establish the future development strategy of cyber terror response at the national level. Through analysis of cyberwarfare trends in each country and current status of cyberwarfare in Korea, it will systematically explore the demand of new policy based on laws and systems, including the strategies of cyber security technology development, industry promotion, and manpower training and existing information protection policies. through this, it effectively manages a sustainable national crisis, and it suggests to establish a future strategy for the medium and long term cyber security that can effectively and actively respond to cyberwarfare.

Analysis of dCollection License System based on the Case Study of Digital Rights Management System for Open Access (오픈액세스를 위한 저작권관리시스템 사례 연구를 통한 dCollection 라이선스관리시스템 분석)

  • Park Mi-Sung
    • Journal of Korean Library and Information Science Society
    • /
    • v.36 no.4
    • /
    • pp.255-284
    • /
    • 2005
  • In this paper, we have made an analysis of dCollection license system and have presented the development subject based on various case study of digital rights Management( DRM ) under domestic and abroad Open Access circumstances. For this study, fist we made an investigation into the concept and the technical component of the copyright, license and DRM that act as obstacle to open access. It is hoped that the first study will be able to help people better understand the relationship between the related technique and Open Access System. Second we analyzed Creative Commons, RoMEO, Dspace system as abroad cases and Kyungpook National University's DRM system and Seoul National University's DRM system as domestic cases for copyright protection under open access circumstances. finally we will face up to the domestic open access reality and plan the future by presenting the development subject through dCollection license system analysis.

  • PDF

International Legislative Trends on Responsible Business Conduct (RBC) and its Implications on Policy (기업책임경영(RBC)의 국제입법동향과 정책적 시사점)

  • AHN, Keon-Hyung;JOE, In-Ho;KWON, Hee-Hwan
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.75
    • /
    • pp.199-224
    • /
    • 2017
  • As Multi-National Enterprises expanded their investments to foreign countries, numerous controversies and disputes arose from their negative impacts, such as violations of human rights and damage to the environment of the host countries. In response, International Organizations such as the OECD have considered various ways to prevent these negative impacts and search for more efficient dispute resolution methods. It is recognized that the OECD Guideline is one of the tools they created for this purpose. The OECD Guideline is contrastable from Corporate Social Responsibility (CSR) initiatives which are regarded as a corporation's charity activities apart from their core business functions. However, Responsible Business Conduct (RBC) like the OECD Guideline can be understood as a concept moving forward from CSR, due to its requirements that corporations carry out their duties in a responsible manner within the field of their core business, such as tax, global supply chain or consumer protection. RBC which is binding in nature, has even been implemented through legislation in developed countries such as the USA, France, Switzerland, and the UK. The discussion in Korea, however, has not reached that level. Discussions for legislation center singularly on CSR efforts, with a dialogue only recently forming around the topic of legislation concerning RBC. Small and medium sized enterprises (SMEs) who lack certain financial and other resources to adequately develop RBC initiatives may find this more obstacles to implementation through legislated RBC, than if it were presented in Korea through other means. It's necessary to admit that RBC is a critical issue in international business. However, time is required to consider its application directly to SMEs.

  • PDF

A Building Method of Infrastructure Efficiency under Ad Hoc-based on Network Infrastructure for Medical Information System (Ad Hoc 기반 의료정보시스템의 네트워크 보안 효율성구조 Infrastructure 설계방법)

  • Noh, Si-Choon;Yoo, Seung-Jae
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.91-98
    • /
    • 2011
  • Medical information system based on ad hoc network designed for general information systems and information networks have different security requirements. Malicious code infiltration and security features are performed on same medical information network architecture along the route. Security domain of medical information systems is the ground of penetration and defense performed over the network architecture and it is also the traffic handling areas separated by a concept of differentiated group. Ad hoc-based medical information systems in the network security domain, set some standards about what should be the methodology of this study. In this paper, medical information system network configuration, the determining factor based on the security domain, the structure selection criteria and blocking positionings are presented according to the traffic route configuration. If you apply this methodology designed to increase security, efficiency can be possible. Health information systems in accordance with the security domain areas requires differentiated protection needs of the security mechanism that is proposed by this study.

Improvement and evaluation of flood control safety utilizing a flood risk map - Yeong-Seomjin River Basin - (홍수위험지도를 활용한 치수안전도 방법 개선 및 평가 - 영·섬진강 유역중심으로 -)

  • Eo, Gyu;Lee, Sung Hyun;Lim In Gyu;Lee, Gyu Won;Kim, Ji Sung
    • Journal of Korea Water Resources Association
    • /
    • v.57 no.1
    • /
    • pp.21-33
    • /
    • 2024
  • Recently, the patterns of climate change-induced disasters have become more diverse and extensive. To develop an effective flood control plan, Korea has incorporated the concept of Potential Flood Damage (PFD) into the Long-Term Comprehensive Water Resources Plan to assess flood risk. However, concerns regarding the PFD have prompted numerous studies. Previous research primarily focused on modifying and augmenting the PFD index or introducing new indices. This study aims to enhance the existing flood control safety evaluation method by utilizing a flood risk map that incorporates risk indices, specifically focusing on the Yeong-Seomjin river basin. The study introduces three main evaluation approaches: risk and potential analysis, PFD and flood management level analysis, and flood control safety evaluation. The proposed improved evaluation method is expected to be instrumental in evaluating various flood control safety measures and formulating flood control plans.