• Title/Summary/Keyword: Violation

Search Result 858, Processing Time 0.034 seconds

Deconstruction' From The Outside Expressed In the Contemporary Costume (Part I) -From 1980's to 1990's- (현대 복식에 나타난 "외부로부터의 해체"현상(제1보) -1980년대부터 1990년대를 중심으로-)

  • 김주영;양숙희
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.21 no.8
    • /
    • pp.1261-1274
    • /
    • 1997
  • Contemporary costume by the 'Deconstruction' from the outside has shown disclosure, destruction, poverty and analysis. The conclusion of this thesis as follows, 1. The Deconstruction of disclosure by infra disclosed the underwear and inner structure outside, which has deconstructed a fixed idea i.e.'underwear must be in outwear', modesty versus immodesty and disclosure versus concealment. 2. The Deconstruction of destruction originated in punk look has rejected traditional manners and utility, at the same time, it has shown the ambivalence i.e. completeness versus incompleteness, making versus destructing by slashes, rips, fringes. 3. The Deconstruction of poverty has appeared as French avangarde mode, little black dress by Chanel, second hand style by hippy, blue jean, granny look, especially Rei Kawakubo's poor look influenced by Zen Aesthetics and post punk. It has looked like old and worn out dress by doing patchwork, dye, decolor, rip, fray, which has shown the decentring by concealing the body than disclosing, rejecting snobbery. 4. The Deconstruction of analysis, seemingly partial and patched is a violation only of our expectation of clothing's unbroken entity though it has looked like a fragment. The completeness and coherence of it is made more evident by its breach, void, and bond like a poetic language. As the result, disclosed, destructed, poor, and analytical costumes has expressed as an escape from the appearance which traditional aesthetic concept had pursued.

  • PDF

A Role-Based Access Control Model of Managed Objects in Distributed System Environments (분산시스템 환경에서 관리 객체에 대한 역할기반 접근제어 모델)

  • Choi Eun-Bok
    • Journal of Internet Computing and Services
    • /
    • v.4 no.1
    • /
    • pp.75-86
    • /
    • 2003
  • In this paper, we extended hierarchial structure of managed object class to support Role-Based Access Control, and described constraint conditions that have support dynamic temporal function as well as statical temporal function established by management process. And we defined about violation notifications should report to manager when rules violate constraint conditions. Also we presented system architecture that support RBAC with MIB(Management Information Base) of ITU-T recommendation. By access control enforcement and decision function, constraint conditions and activated translation procedure of each roles are described, our system presents dynamic temporal property systematically.

  • PDF

Non-Surgical Management for Benign Vocal Fold Lesions (양성 성대 병변의 비수술적 치료)

  • Lee, Sang Hyuk
    • Journal of the Korean Society of Laryngology, Phoniatrics and Logopedics
    • /
    • v.26 no.2
    • /
    • pp.97-100
    • /
    • 2015
  • Benign vocal fold lesions, such as vocal nodules, polyps and Reinke's edema, usually result from chronic voice overuse. Conservative management such as voice therapy and pharmacotherapy are used as the primary treatment techniques. The main purpose of voice therapy is to identify and reduce voice misuse to achieve the optimal voice. But complete resolution may not be possible in all patients after voice therapy. Furthermore, some patients with voice-related occupations, voice rest and voice therapy are sometimes difficult, which makes it hard to carry out the treatment. When conservative therapy is ineffective, laryngeal microsurgery can be performed under general anesthesia. However, potential complications following laryngeal suspension and violation of the layered structure of the vocal fold during surgery should be considered before surgery. In recent decades, emerging literatures have demonstrated the potential usefulness of vocal fold steroid injection as an alternative treatment option for benign vocal fold lesions. The most advantageous feature of vocal fold steroid injection is the maintenance of regional anti-inflammatory effects while preventing the potential systemic adverse effects of the steroid. Many non-surgical treatment methods can be conducted using different approaches in the office setting. It can be applied as an alternative treatment modality for the management of various benign vocal fold lesions.

  • PDF

A Security Module for Vehicle Network Communication (차량 네트워크 통신용 보안 모듈)

  • Kwon, Byeong-Heon;Park, Jin-Sung
    • Journal of Digital Contents Society
    • /
    • v.8 no.3
    • /
    • pp.371-376
    • /
    • 2007
  • Many modules such as controller, sensor, telematics terminal, navigation, audio and video are connected each other via vehicle network (CAN, MOST, etc). Futhermore, users can have ITS or internet services in moving by connecting to wireless mobile network. These network capabilities can cause a lots of security issues such as data hacking, privacy violation, location tracking and so on. Some possibilities which raise a breakdown or accident by hacking vehicle operation data (sensor, control data) are on the increase. In this paper, we propose a security module which has encryption functionalities and can be used for vehicle network system such as CAN, MOST, etc. This security module can provide conventional encryption algorithms and digital signature processing functionality such as DES, 3-DES, SEED, ECC, and RSA.

  • PDF

Folksonomy-based Personalized Web Search System (폭소노미 기반 개인화 웹 검색 시스템)

  • Kim, Dong-Wook;Kang, Soo-Yong;Kim, Han-Joon;Lee, Byung-Jeong
    • Journal of Digital Contents Society
    • /
    • v.11 no.1
    • /
    • pp.105-115
    • /
    • 2010
  • Search engines provide web documents that are related to user's query. However, using only the query terms that user provided, it is hard for search engines to know user's exact intention and provide the very matching web documents. To remedy this problem, search systems are needed to exploit personalized search technologies. In this paper, we propose not only a novel personalized query recommendation scheme based on folksonomy but also a new personalized search service architecture which reduces the risk of privacy violation while enabling search service providers to provide other various personalized services such as personalized advertisement.

A Study on the Indirect Expropriation in International Investment - Focused on the Requirements of Indirect Expropriation - (국제투자에 있어서 간접수용에 관한 연구 - 간접수용의 요건을 중심으로 -)

  • Kim, Yong-Il;Lee, Ki-Ok;Li, Jing-Hua
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.47
    • /
    • pp.3-24
    • /
    • 2010
  • The contours of the definition of an indirect expropriation are not precisely drawn. In some recent ICSID decision, tribunals have interpreted the concept of indirect expropriation narrowly and have preferred to find a violation of the standard of fair and equitable treatment. Thus, I analyzed the three Requirements of Indirect Expropriation basis of ICSID Cases as below. First, the effect of measure upon the economic benefit value as well as upon the control over the investment will be the key question when it comes to deciding whether an indirect expropriation has taken place. Whenever this effect is substantial and lasts for a significant period of time, it will be assumed prima facie that a taking of the property has occurred. Second, legitimate play a key role in the interpretation of the fair and equitable treatment standard. But they also found entry into the law governing indirect expropriation. Finally, the duration of a government measure affecting the interests of a foreign investor is important for the assessment of whether an expropriation has occurred.

  • PDF

Scheduling of Real-time and Nonreal-time Traffics in IEEE 802.11 Wireless LAN (무선랜에서의 실시간 및 비실시간 트래픽 스케줄링)

  • Lee, Ju-Hee;Lee, Chae Y.
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.28 no.2
    • /
    • pp.75-89
    • /
    • 2003
  • Media Access Control (MAC) Protocol in IEEE 802.11 Wireless LAN standard supports two types of services, synchronous and asynchronous. Synchronous real-time traffic is served by Point Coordination Function (PCF) that implements polling access method. Asynchronous nonreal-time traffic is provided by Distributed Coordination Function (DCF) based on Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol. Since real-time traffic is sensitive to delay, and nonreal-time traffic to error and throughput, proper traffic scheduling algorithm needs to be designed. But it is known that the standard IEEE 802.11 scheme is insufficient to serve real-time traffic. In this paper, real-time traffic scheduling and admission control algorithm is proposed. To satisfy the deadline violation probability of the real time traffic the downlink traffic is scheduled before the uplink by Earliest Due Date (EDD) rule. Admission of real-time connection is controlled to satisfy the minimum throughput of nonreal-time traffic which is estimated by exponential smoothing. Simulation is performed to have proper system capacity that satisfies the Quality of Service (QoS) requirement. Tradeoff between real-time and nonreal-time stations is demonstrated. The admission control and the EDD with downlink-first scheduling are illustrated to be effective for the real-time traffic in the wireless LAN.

Needs for Changing Accident Investigation from Blaming to Systems Approach

  • Kee, Dohyung
    • Journal of the Ergonomics Society of Korea
    • /
    • v.35 no.3
    • /
    • pp.143-153
    • /
    • 2016
  • Objective: The purposes of this study are to survey needs for changing accident investigation from blaming to systems approach and to briefly summarize systems-based accident analysis techniques. Background: In modern complex socio-technical systems, accidents are caused by a variety of contributing factors including human, technical, organizational, social factors, not by just a single violation or error of a specific actor, but accidents investigation used to be focused on the incorrect action of individuals. A new approach investigating causes of accidents as a symptom of a deficient system is required. Method: This study was mainly based on survey of literatures related to accidents, accidents investigation, which included academic journals, newspapers, etc. Results: This study showed that accidents investigation of Korea focusing on blaming is problematic. This was confirmed by two concepts of migration and hindsight bias frequently found in accident causation studies, and an attribute of accidents having varying causes. This was illustrated with an example of Sewol ferry capsizing accident. Representative systems-based accident analysis models including Swiss cheese model, AcciMap, HFACS, FRAM and STAMP were briefly introduced, which can be used in systematic accidents investigations. Finally, this study proposed a procedure for establishing preventive measures of accidents, which was composed of two steps: public inquiry and devising preventive measures. Conclusion: A new approach considering how safety-critical components such as technical and social elements, and their interactions lead to accidents is needed for preventing reoccurrence of similar accidents in complex socio-technical systems. Application: The results would be used as a reference or guideline when the safety relevant governmental organizations investigate accidents.

Violence Victimization of Visiting Nurses and Prevention Strategies Adopted by Public Institutions in Korea (방문간호사가 경험하는 폭력의 특성과 예방대책)

  • Kim, Hee Gerl;Nam, Hye Kyung
    • Journal of Korean Academic Society of Home Health Care Nursing
    • /
    • v.24 no.3
    • /
    • pp.243-254
    • /
    • 2017
  • Purpose: This study aims to reveal violence victimization of visiting nurses and investigate the coping and prevention strategies adopted by public institutions. Method: The data were collected over three weeks in 2017 using self-report questionnaires from 237 visiting nurses. Data were collected between August 23 and September 15, 2017. Result: Among the respondents, 74.7% had experienced some types of work-related violence during the past year. Verbal abuse (65.4%) was most common, followed by physical threat (46.8%), sexual abuse (43.9%), and physical violence (5.5%). The nurses perceived the most common cause of violation as socio-economic frustration of the offenders vented out on the nurses. Besides, most reported offenders had mental health problems. The two most effective measures to prevent violence faced by the nurses are terminating visiting services for the offenders and implementing the buddy system, which has rarely been used in practice. Conclusion: These findings show that visiting nurses are exposed to a risk of serious abuse in everyday work life, and the nurses themselves or institutions have failed to handle the violence, showing shaky responses at best. Therefore, it is necessary to establish internal regulations and systems at the institutional level that can help prevent violence against visiting nurses.

Analysis of Traffic Accident Severity by Aging Level (고령화 수준별 교통사고 심각성 분석)

  • Kim, Tae Yang;Park, Byung Ho
    • Journal of the Korean Society of Safety
    • /
    • v.33 no.4
    • /
    • pp.105-110
    • /
    • 2018
  • Korea has entered to 'aged society', which the elderly people over 65 years old is over 14% of total population. This paper aims to analyze the traffic accident by aging level. In pursuing the above, this paper focuses on modeling the traffic accident severity based on three aging levels. The main results are as follows. First, the ratio of fatal and serious injured persons (FSI) is judged to increase according to increasing aging level. Second, the null hypothesis that there is no difference in FSI among three aging levels (aging, aged, and super-aged) is rejected. Four accident severity generalized linear models which are all statistically significant have been developed. Third, the common variables are analyzed to be median age, the number of hospital beds per persons, and turn signal usage ratio. Fourth, the differentiated traffic safety policies fitted to aging levels are required. The enforcement of traffic law violation and safety enhancement of motorcycle in the region of 'aging society', improvement of traffic facilities in the region of 'aged society', and expansion of transportation facilities in the region of 'super-aged society' are evaluated to be indispensable.