• Title/Summary/Keyword: Requirement Process

Search Result 1,363, Processing Time 0.031 seconds

A Legislative Study on the Plans for its Improvements and Problems of the Lien in the Real Estate Auction (부동산경매에서 유치권의 문제점과 개선방안에 대한 입법론적 검토)

  • Jun, Jang-Hean
    • Journal of Legislation Research
    • /
    • no.41
    • /
    • pp.261-302
    • /
    • 2011
  • A lien is the right to possession the thing until receiving repayment of its bonds in some cases that the property of other person or the occupant for marketable securities receive the bond that has occurred on that property or marketable securities. This has own purpose to break 'principle of creditor equality' to protect especially the bond of the subject occupant in terms of justice. These lien on our civil law come according to the law in prepared certain requirements. However, an incomplete real rights granted by way of security that does not have a preferential performance right or seniority on the exchange value of the object suffer from the problems a lot in the real estate auction process because of the feature that is not announced in the register unlike the mortgage. In addition, the lien of real estate is not lapsed in an auction process. There is no preferential performance righ in a positive law as providing that can oppose to the buyer(a successful bidder) until received repayment the secured bond price to be compliant with the lien(Civil Case Execution Law the 91st clause of Article 5). However, as asserted the super preferential performance righ to a buyer in real terms, acts as primary cause of breaking unexpected loss and according unfair law relation to a senior mortgagee and seizor, etc. and the principles of the creditors equality to the persons concerned in other words, the principles of justice. All of these issues are the establishment of the lien and theory conflict on the effects. In spite of the fluctuations of a real right about real estate is announced as a registration by the current law, only the lien come into unclear announcement means for possession. In addition, Civil Case Execution Law argument is caused by the adoption abernahmeprinzip about the lien (Civil Case Execution Law the 91st clause of Article 5). Therefore, this paper was examined briefly the significance and purpose, history and law-making examples of each country and the valid requirements and effect of the lien that is basic principle of law about the lien system above all. And then, it will be reviewed the improvement plan for de lege ferenda to improve the issues about this after reviewing the objection, theory and judicial precedent about opposing power and preferential performance right of the lien in the real estaKey Words : Lien, Oppose Power, Mortgage right, Preferential Performance right, Seizure, Real Estate Auction, Lien who can not Opposing against Successful Bidder, Lien who can Oppose against Successful Bidder, Possessionte auction that is a fundamental problem on requirement and effect of the lien.

Recovery Support Service for Neglected Children and Their Families of Origin: Status and Suggestions (방임 및 보호 아동·청소년 원가정 회복지원 시범사업의 현황과 과제)

  • Jeong, Jeeyoung;Anh, Jinkyung;Kim, Eunhye
    • Journal of Family Resource Management and Policy Review
    • /
    • v.25 no.3
    • /
    • pp.87-102
    • /
    • 2021
  • Child abuse and neglect are recently increasing in Korea, and although the government has actively improved the child protection system, the number of abused children and the rate of cases judged as abuse have continuously risen. Given that 75% of child abusers are parents, child abuse and neglect are expected to recur. To prevent such a recurrence, various intervention programs for abused children and their parents are required. The purpose of this study were to design a recovery support service process and investigate the effectiveness of pilot program for families of origin, including neglected(protected) children, to improve the system by which these programs are operated, and formulate policy alternatives that reinforce "family preservation" principles. The pilot program was implemented from June to November 2020 in 4-local healthy family support center. The number of program participants and the frequency of participation in each other differed, because of the difference in number of confirmed coronavirus cases in each region and the requirement for social distancing. Through the program, a community-based service process was developed for neglected(protected) children and their parents, and cooperative networks between related facilities and institutions were established. The study formulated the following recommendations: First, a cooperation system among government departments mandated to provide different services to neglected(protected) children is needed. Second, wider and various channels through which abused children can avail of protective services should be developed within communities. Third, more stable environments for program operation should be cultivated, and cooperative partnerships should be sought for knowledge sharing among relevant government departments. Another necessary measure is for a center to develop its own business model, in which the duplication of services provided by involved organizations is avoided. Finally, clear guidelines, administrative standards, and specific plans for program operation should be arranged. Also regional characteristics are maintained, but services should be standardized.

An Analysis of Big Video Data with Cloud Computing in Ubiquitous City (클라우드 컴퓨팅을 이용한 유시티 비디오 빅데이터 분석)

  • Lee, Hak Geon;Yun, Chang Ho;Park, Jong Won;Lee, Yong Woo
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.45-52
    • /
    • 2014
  • The Ubiquitous-City (U-City) is a smart or intelligent city to satisfy human beings' desire to enjoy IT services with any device, anytime, anywhere. It is a future city model based on Internet of everything or things (IoE or IoT). It includes a lot of video cameras which are networked together. The networked video cameras support a lot of U-City services as one of the main input data together with sensors. They generate huge amount of video information, real big data for the U-City all the time. It is usually required that the U-City manipulates the big data in real-time. And it is not easy at all. Also, many times, it is required that the accumulated video data are analyzed to detect an event or find a figure among them. It requires a lot of computational power and usually takes a lot of time. Currently we can find researches which try to reduce the processing time of the big video data. Cloud computing can be a good solution to address this matter. There are many cloud computing methodologies which can be used to address the matter. MapReduce is an interesting and attractive methodology for it. It has many advantages and is getting popularity in many areas. Video cameras evolve day by day so that the resolution improves sharply. It leads to the exponential growth of the produced data by the networked video cameras. We are coping with real big data when we have to deal with video image data which are produced by the good quality video cameras. A video surveillance system was not useful until we find the cloud computing. But it is now being widely spread in U-Cities since we find some useful methodologies. Video data are unstructured data thus it is not easy to find a good research result of analyzing the data with MapReduce. This paper presents an analyzing system for the video surveillance system, which is a cloud-computing based video data management system. It is easy to deploy, flexible and reliable. It consists of the video manager, the video monitors, the storage for the video images, the storage client and streaming IN component. The "video monitor" for the video images consists of "video translater" and "protocol manager". The "storage" contains MapReduce analyzer. All components were designed according to the functional requirement of video surveillance system. The "streaming IN" component receives the video data from the networked video cameras and delivers them to the "storage client". It also manages the bottleneck of the network to smooth the data stream. The "storage client" receives the video data from the "streaming IN" component and stores them to the storage. It also helps other components to access the storage. The "video monitor" component transfers the video data by smoothly streaming and manages the protocol. The "video translator" sub-component enables users to manage the resolution, the codec and the frame rate of the video image. The "protocol" sub-component manages the Real Time Streaming Protocol (RTSP) and Real Time Messaging Protocol (RTMP). We use Hadoop Distributed File System(HDFS) for the storage of cloud computing. Hadoop stores the data in HDFS and provides the platform that can process data with simple MapReduce programming model. We suggest our own methodology to analyze the video images using MapReduce in this paper. That is, the workflow of video analysis is presented and detailed explanation is given in this paper. The performance evaluation was experiment and we found that our proposed system worked well. The performance evaluation results are presented in this paper with analysis. With our cluster system, we used compressed $1920{\times}1080(FHD)$ resolution video data, H.264 codec and HDFS as video storage. We measured the processing time according to the number of frame per mapper. Tracing the optimal splitting size of input data and the processing time according to the number of node, we found the linearity of the system performance.

The Present State and Solutions for Archival Arrangement and Description of National Archives & Records Service of Korea (국가기록원의 기록물 정리기술의 현황과 개선방안)

  • Yoon, Ju-Bom
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.4 no.2
    • /
    • pp.118-162
    • /
    • 2004
  • Archival description in archives has an important role in document control and reference service. Archives has made an effort to do archival description. But we have some differences and problems about a theory and practical processes comparing with advanced countries. The serious difference in a theory is that a function classification, maintenance of an original order, arrangement of multi-level description are not reflected in practical process. they are arranged in shelves after they are arranged by registration order in a unit of a volume like an arrangement of book. In addition, there are problems in history of agency change or control of index. So these can cause inconvenience for users. For improving, in this study we introduced the meaning and importance of arrangement of description, the situation and problem of arrangement of description in The National Archives, and a description guideline in other foreign countries. The next is an example for ISAD(G). This paper has chapter 8, the chapter 1 is introduction, the chapter 2 is the meaning and importance of arrangement of description, excluding the chapter 8 is conclusion we can say like this from the chapter 3 to the chapter 7. In the chapter 3, we explain GOVT we are using now and description element category in situation and problem of arrangement of description in Archives. In the chapter 4, this is about guideline from Archives in U.S.A, England and Australia. 1. Lifecycle Date Requirement Guide from NARA is introduced and of the description field, the way of the description about just one title element is introduced. 2. This is about the guideline of the description from Public Record Office. That name is National Archives Cataloguing Guidelines Introduction. We are saying "PROCAT" from this guideline and the seven procedure of description. 3. This is about Commomon Record Series from National Archives of Australia. we studied Registration & description procedures for CRS system. In the chapter 5, This is about the example which applied ISAD to. Archives introduce description of documents produced from Appeals Commission in the Ministry of Government Administration. In the chapter 6, 7. These are about the problems we pointed after using ISAD, naming for the document at procedure section in every institution, the lack of description fields category, the sort or classification of the kind or form, the reference or identified number, the absence description rule about the details, function classification, multi-level description, input format, arrangement of book shelf, authority control. The plan for improving are that problems. The best way for arrangement and description in Archives is to examine the standard, guideline, manual from archives in the advanced countries. So we suggested we need many research and study about this in the academic field.

Strategy for Development of HSE Management Framework for Offshore CCS Project in Korea (국내 해양 CCS 사업의 HSE 관리 프레임워크 구축 전략)

  • Noh, Hyonjeong;Kang, Kwangu;Kang, Seong-Gil;Lee, Jong-Gap
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.20 no.1
    • /
    • pp.26-36
    • /
    • 2017
  • Korea is preparing an offshore carbon capture, transport and storage (CCS) demonstration project which is recognized as one of important $CO_2$ reduction technologies to mitigate climate change. The offshore CCS project aims to transport, inject and store large amount of $CO_2$ into offshore geologic formation, and has a potential risk of leakage which might cause disastrous damage to human health, environment and property. Therefore, in order to ensure the safety of the offshore CCS project, a strict HSE (health, safety and environment) management plan and its implementation are required throughout the project life cycle. However, there are no HSE domestic laws or regulations applicable to CCS projects, and the related research is insufficient in Korea. For the derivation of the essential and urgent requirement in HSE management framework applicable to the offshore CCS project in Korea, we analysed the HSE management methodologies and foreign CCS HSE management guidelines and cases. First, this paper has analyzed ISO 31000, a generalized risk management principles. Second, we have investigated the HSE management practices of CCS projects in Norway and UK. Based on the analyses, we suggested the necessity of developing the HSE Philosophy and the HSE management process through the whole life cycle. Application of HSE management in early phase of an offshore CCS project will promote systematic and successful project implementation in a cost-effective and safe way.

Critical Analyses of '2nd Science Inquiry Experiment Contest' (과학탐구 실험대회의 문제점 분석)

  • Paik, Seoung-Hey
    • Journal of The Korean Association For Science Education
    • /
    • v.15 no.2
    • /
    • pp.173-184
    • /
    • 1995
  • The purpose of this study was to analyse the problems of 'Science Inquiry Experiment Contest(SIEC)' which was one of 8 programs of 'The 2nd Student Science Inquiry Olympic Meet(SSIOM)'. The results and conclusions of this study were as follows: 1. It needs to reconsider the role of practical work within science experiment because practical work skills form one of the mainstays in current science. But the assessment of students' laboratory skills in the contest was made little account of. It is necessary to remind of what it means to be 'good at science'. There are two aspects: knowing and doing. Both are important and, in certain respects, quite distinct. Doing science is more of a craft activity, relying more on craft skill and tacit knowledge than on the conscious application of explicit knowledge. Doing science is also divided into two aspects, 'process' and 'skill' by many science educators. 2. The report's and checklist's assessment items were overlapped. Therefore it was suggested that the checklist assessment items were set limit to the students' acts which can't be found in reports. It is important to identify those activities which produce a permanent assessable product, and those which do not. Skills connected with recording and reporting are likely to produce permanent evidence which can be evaluated after the experiment. Those connected with manipulative skills involving processes are more ephemeral and need to be assessed as they occur. The division of student's experimental skills will contribute to the accurate assess of student's scientific inquiry experimental ability. 3. There was a wide difference among the scores of one participant recorded by three evaluators. This means that there was no concrete discussion among the evaluators before the contest. Despite the items of the checklists were set by preparers of the contest experiments, the concrete discussions before the contest were necessary because students' experimental acts were very diverse. There is a variety of scientific skills. So it is necessary to assess the performance of individual students in a range of skills. But the most of the difficulties in the assessment of skills arise from the interaction between measurement and the use. To overcome the difficulties, not only must the mark needed for each skill be recorded, something which all examination groups obviously need, but also a description of the work that the student did when the skill was assessed must also be given, and not all groups need this. Fuller details must also be available for the purposes of moderation. This is a requirement for all students that there must be provision for samples of any end-product or other tangible form of evidence of candidates' work to be submitted for inspection. This is rather important if one is to be as fair as possible to students because, not only can this work be made available to moderators if necessary, but also it can be used to help in arriving at common standards among several evaluators, and in ensuring consistent standards from one evaluator over the assessment period. This need arises because there are problems associated with assessing different students on the same skill in different activities. 4. Most of the students' reports were assessed intuitively by the evaluators despite the assessment items were established concretely by preparers of the experiment. This result means that the evaluators were new to grasp the essence of the established assessment items of the experiment report and that the students' assessment scores were short of objectivity. Lastly, there are suggestions from the results and the conclusions. The students' experimental acts which were difficult to observe because they occur in a flash and which can be easily imitated should be excluded from the assessment items. Evaluators are likely to miss the time to observe the acts, and the students who are assessed later have more opportunity to practise the skill which is being assessed. It is necessary to be aware of these problems and try to reduce their influence or remove them. The skills and processes analysis has made a very useful checklist for scientific inquiry experiment assessment. But in itself it is of little value. It must be seen alongside the other vital attributes needed in the making of a good scientist, the affective aspects of commitment and confidence, the personal insights which come both through formal and informal learning, and the tacit knowledge that comes through experience, both structured and acquired in play. These four aspects must be continually interacting, in a flexible and individualistic way, throughout the scientific education of students. An increasing ability to be good at science, to be good at doing investigational practical work, will be gained through continually, successively, but often unpredictably, developing more experience, developing more insights, developing more skills, and producing more confidence and commitment.

  • PDF

An investigation of the User Research Techniques in the User-Centered Design Framework - Focused on the on-line community services development for 13-18 Young Adults (사용자 중심 디자인 프레임워크에서 사용자 조사기법의 역할에 관한 연구 - 13-18 청소년용 온라인 커뮤니티 컨텐트 개발 프로젝트를 중심으로)

  • 이종호
    • Archives of design research
    • /
    • v.17 no.2
    • /
    • pp.77-86
    • /
    • 2004
  • User-Centered Design Approach plays important role in dealing with usability issues for developing modern technology products. Yet it is still questionable whether the User-Centered approach is enough for the development of successful consumer contents since the User-Centered Design is originated from the software engineering field where meeting customers' functional requirement is the most critical aspect in developing a software. However, modern consumer market is already saturated and in order to meet ever increasing consumer requirements, the User-Centered Design approach needs to be expanded. As a way of incorporating the User-Centered Approach into the consumer product development, Jordan suggested the 'Pleasure-based Approach' in industrial design field, which usually generates multi-dimensional user requirements: 1)physical, 2)cognitive, 3)identity and 4) social. It is the current tendency that many portal and community service providers focus on fulfilling both functional and emotional needs for users when developing new items, contents and services. Previously fulfilling consumers' emotional needs solely depend on visual designer's graphical sense and capability. However, taking the customer-centered approach on withdrawing consumers' unknown needs is getting critical in the competitive market environment. This paper reviews different types of user research techniques and categorized into 6 ways based on Kano(1992)'s product quality model. Based on his theory, only performance factors, such as suability, can be identified through the user-centered design approach. The user-centered design approach has to be expanded to include factors include personality, sociability, pleasure, and so on. In order to identify performance as well as excellent factors through user research, a user-research framework was established and tested through the case study, which is ' the development of new online service for teens '. The results of the user research were summarized at the end of the paper and the pros and cons of each research techniques were analyzed.

  • PDF

Effects of Manufacturing Methods of Broiler Litter and Bakery By-product Ration for Ruminants on Physico-chemical Properties (육계분과 제과부산물을 이용한 반추가축용 완전혼합사료(TMR) 제조 시 가공처리 방법이 물리화학적 특성에 미치는 영향)

  • Kwak, W.S.;Yoon, J.S.;Jung, K.K.
    • Journal of Animal Science and Technology
    • /
    • v.45 no.4
    • /
    • pp.593-606
    • /
    • 2003
  • This study was conducted to develop effective manufacturing methods of a total mixed ration(TMR) composed of broiler litter(BL) and bakery by-product(BB) for ruminants. Five experiments included a small-scaled manufacture of TMR using a deepstacking method(Exp. 1), its pelletization(Exp. 2), its field-scaled manufacture(Exp. 3), a field-scaled manufacture using an ensiling method(Exp. 4), and a mixing process of deepstacked BL and BB prior to feeding(Exp. 5). BL and BB were mixed at a ratio which makes total digestible nutrients of the TMR 69%. For each experiment, temperature, appearance and physico-chemical properties were recorded and analyzed. The chemical composition data revealed that the mixture of BL and BB showed nutritionally additive balance which resulted from a considerable increase(P<0.05) of organic matter and a desirable decrease(P<0.05) of protein and fiber up to the requirement level for growing ‘Hanwoo’ steers. Deepstacking of BL and BB in Exp. 1 and 3 resulted in a sufficient increase of stack temperature for pasteurization, little chemical losses, appearance of white fungi on the surface, and partial charring due to excess stack temperature. For Exp. 2, its pelleting, which was successful using a simple, small-scaled pelletizer, resulted in a little loss(P<0.05) of organic matter and an increase(P<0.05) of indigestible protein(ADF-CP). Ensiling the mixture in Exp. 4 made little effect on chemical composition; however, one month of the ensiling period was not enough for favorable silage parameters. Deepstacking BL alone in Exp. 5 tended(P<0.1) to decrease true protein : NPN ratio and hemicellulose content and increase ADF-CP content due to the heat damage occurred. Deepstacking or ensiling of BL-BB mixtures and simple incorporating of BB into deepstacked BL prior to feeding could be practical and nutrients-preservative methods in TMR manufacture for beef cattle, although ensiling needed further hygienic evaluation.

High-Rate Phosphorous Removal by PAC (Poly Aluminum Chloride) Coagulation of A2O Effluent (생물공정 처리수의 PAC (Poly Aluminum Chloride) 응집에 의한 고효율 인 제거 특성)

  • Hwang, Eung-Ju;Cheon, Hyo-Chang
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.31 no.8
    • /
    • pp.673-678
    • /
    • 2009
  • High-rate phosphorous removal by PAC (poly aluminum chloride) coagulation of A2O effluent was investigate to meet the stringent requirement of wastewater discharge from municipal wastewater treatment plant. A series of jar tests were conducted to find optimum coagulation condition and to enhance removal efficiency. The optimum volumetric concentration of PAC was 30 ppm (2.81mol Al/mol P by mol ratio). Only 17.2% of soluble P was removed for 30 minutes' settling without PAC addition, while this increased to 30.3% by dosing 10ppm PAC. It even increased conspicuously from 49.3% to 88.4% by increasing PAC dose from 20 ppm to 30 ppm. 92.4% of total P was removed by 30 ppm PAC, and the effluent concentration (0.3 mg/L) was acceptable for discharge. The optimum value of coagulation time, settling time, and pH were 4minutes, 20 minutes, and 7.0, respectively. It was not necessary to control pH of raw sample whose pH was 7.0. Soluble P removal was remarkably enhanced at pH 7.0. This implied that sweep floc formation by $Al(OH)_3$ was the main mechanism of coagulation for soluble P removal. Influent and effluent of secondary clarifier were tested for coagulation, and the effluent was better for high-rate P removal. It resulted in 0.18 mg/L of P and 95.4% of P removal by coagulation. It was favorable to recycle the treated water to coagulation tank and the optimum recycle ratio was 0.3.

An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost (비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형)

  • Lee, Hyeon-Uk;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.157-173
    • /
    • 2011
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. This means the fatal damage can be caused by these intrusions in the government agency, public office, and company operating various systems. For such reasons, there are growing interests and demand about the intrusion detection systems (IDS)-the security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. The intrusion detection models that have been applied in conventional IDS are generally designed by modeling the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. These kinds of intrusion detection models perform well under the normal situations. However, they show poor performance when they meet a new or unknown pattern of the network attacks. For this reason, several recent studies try to adopt various artificial intelligence techniques, which can proactively respond to the unknown threats. Especially, artificial neural networks (ANNs) have popularly been applied in the prior studies because of its superior prediction accuracy. However, ANNs have some intrinsic limitations such as the risk of overfitting, the requirement of the large sample size, and the lack of understanding the prediction process (i.e. black box theory). As a result, the most recent studies on IDS have started to adopt support vector machine (SVM), the classification technique that is more stable and powerful compared to ANNs. SVM is known as a relatively high predictive power and generalization capability. Under this background, this study proposes a novel intelligent intrusion detection model that uses SVM as the classification model in order to improve the predictive ability of IDS. Also, our model is designed to consider the asymmetric error cost by optimizing the classification threshold. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, when considering total cost of misclassification in IDS, it is more reasonable to assign heavier weights on FNE rather than FPE. Therefore, we designed our proposed intrusion detection model to optimize the classification threshold in order to minimize the total misclassification cost. In this case, conventional SVM cannot be applied because it is designed to generate discrete output (i.e. a class). To resolve this problem, we used the revised SVM technique proposed by Platt(2000), which is able to generate the probability estimate. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 1,000 samples from them by using random sampling method. In addition, the SVM model was compared with the logistic regression (LOGIT), decision trees (DT), and ANN to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell 4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on SVM outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that our model reduced the total misclassification cost compared to the ANN-based intrusion detection model. As a result, it is expected that the intrusion detection model proposed in this paper would not only enhance the performance of IDS, but also lead to better management of FNE.