• Title/Summary/Keyword: establishment

Search Result 11,055, Processing Time 0.037 seconds

Study for academic establishment of phase of Department of Security Service (경호학의 학문적 위상정립을 위한 고찰)

  • Kim, Sang Jin
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.197-205
    • /
    • 2013
  • Security Service is the study for social safety and maintenance of order. Compared with the industrial circle, it has only been 18 years, though, many-sided scholars have been interested in this field and tried. The present Security Service, however, has several problems, so it is difficult to gain recognition as the value of learning. To achieve this, several kinds of prior tasks should get solved. First, Preparation for agreement between Industry and University about the academic concept and establishment of range. Second, Set up the School Register System for the academic establishment of identity. Third, Preparation of the plan for the organization of education system. Fourth, Study Direction different from the industrial world. (Unconcern) Therefore, the alternatives centered on some prior tasks will be suggested to enhance the identity and value of Security Service as the study.

A Study of the Possibility of Legal Protection of Fashion Designs under the Copyright Law - Based on the Review of the Requisites of Works of Authorship and their types - (패션디자인의 저작권법상 보호 가능성에 대한 고찰 - 저작물의 성립요건과 보호대상 저작물의 유형 검토를 중심으로 -)

  • Cho, Kyeong Sook
    • Journal of the Korean Society of Costume
    • /
    • v.64 no.1
    • /
    • pp.123-135
    • /
    • 2014
  • The author has explored whether legal protection of fashion designs is possible under the current Korean Copyright Act with the purpose of promoting the understanding of the legal principles of the copyright law among fashion professionals. It examined the general provisions of the copyright law as well as the requisites for establishment of "works of authorship" and the types of protection stipulated by the copyright law, which are needed to understand the possibilities of legal protection for fashion designs under the law. It then analyzed several leading cases in the fashion designs sector for the interpretation of related legal principles. The Copyright Act defines "works of authorship" for protection as the creative works that express human ideas or emotions. Works to be legally protected under the law include artistic works that are equipped with the prerequisites for establishment of "works of authorship", or fashion designs that are equipped with the prerequisites for establishment of an independent applied artistic works whose originality is distinguishable from articles.

Influence of Pyrolysis Conditions and Type of Resin on the Porosity of Activated Carbon Obtained From Phenolic Resins

  • Agarwal, Damyanti;Lal, Darshan;TripathiN, V.S.;Mathur, G.N.
    • Carbon letters
    • /
    • v.4 no.2
    • /
    • pp.57-63
    • /
    • 2003
  • In polymer precursor based activated carbon, the structure of starting material is likely to have profound effect on the surface properties of end product. To investigate this aspect phenolic resins of different types were prepared using phenol, mcresol and formaldehyde as reactants and $Et_3N$ and $NH_4OH$ as catalyst. Out of these resins two resol resins PFR1 and CFR1 (prepared in excess of formaldehyde using $Et_3N$ as catalyst in the basic pH range) were used as raw materials for the preparation of activated carbons by both chemical and physical activation methods. In chemical activation process both the resins gave activated carbons with high surface areas i.e. 2384 and 2895 $m^2/g$, but pore size distribution in PFR1 resin calculated from Horvath-Kawazoe method, contributes mainly in micropore range i.e. 84.1~88.7 volume percent of pores was covered by micropores. Whereas CFR1 resin when activated with KOH for 2h time, a considerable amount (32.8%) of mesopores was introduced in activated carbon prepared. Physical activation with $CO_2$ leads to the formation of activated carbon with a wide range of surface area (503~1119 $m^2/g$) with both of these resins. The maximum pore volume percentage was obtained in 3-20 ${\AA}$ region by physical activation method.

  • PDF

Wage Differentials between Standard and Non-standard Workers: Evidence from an Establishment-worker Matched Data (정규직과 비정규직의 임금격차: 사업체-근로자 연결패널을 이용한 추정)

  • Lee, Injae
    • Journal of Labour Economics
    • /
    • v.34 no.3
    • /
    • pp.119-139
    • /
    • 2011
  • Using a establishment-worker matched data, this paper estimates wage differentials between standard and non-standard workers. Unlike previous studies, we estimate a fixed-effect model for the tree-way error-components that control for both unobserved individual heterogeneities and unobserved firm heterogeneities. The estimation results show that standard workers earn 6.5~8.4% mire than non-standard workers. This wage premium is 30~40% of the wage differential estimated from the OLS model. The results implies that a large proportion of the wage differentials between standard and non standard workers can be explained by unobserved firm and individual characteristics.

  • PDF

Cohesion Establishment Factors Stimulate Endonuclease Activity of hFen1 Independently and Cooperatively

  • Kim, Do-Hyung;Kim, Jeong-Hoon;Park, Byoung Chul;Cho, Sayeon;Park, Sung Goo
    • Journal of Microbiology and Biotechnology
    • /
    • v.25 no.10
    • /
    • pp.1768-1771
    • /
    • 2015
  • Human Fen1 protein (hFen1) plays an important role in Okazaki fragment processing by cleaving the flap structure at the junction between single-stranded (ss) DNA and doublestranded (ds) DNA, an intermediate formed during Okazaki fragment processing, resulting in ligatable nicked dsDNA. It was reported that hChlR1, a member of the cohesion establishment factor family, stimulates hFen1 nuclease activity regardless of its ATPase activity. In this study, we found that cohesion establishment factors cooperatively stimulate endonuclease activity of hFen1 in in vivo mimic condition, including replication protein-A-coated DNA and high salt. Our findings are helpful to explain how a DNA replication machinery larger than the cohesion complex goes through the cohesin ring structure on DNA during S phase in the cell cycle.

A Study on Developing a Model for Evaluating the Validity of New School Construction (학교(學校) 신축(新築) 타당성(妥當性) 평가(評價) 모형(模型) 개발(開發)에 관한 연구(硏究))

  • Lee, Hwa-Ryong
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.12 no.5
    • /
    • pp.47-56
    • /
    • 2005
  • Reports on population movement(2000-2030) by the National Statistical Office show that the number of elementary school age population will be decreased by 1.4million from 2005 to 2020. It will effect both school size and the policies for school facilities, which have focused on downsizing class as the high standard of OECD nations. As the unfolding evidence is emerging that a number of schools and classes will be emptied out by 2030. This study aims at developing a model for evaluating the validity of school establishment, which would help more reasonable decision-making for new school construction and the class extension in the existing schools. It classifies two different ways in founding a new school - school establishment in a residential developing site and school establishment for solving a overcrowd class. It proposes the assesment items and the methods for evaluating its validity. In the end, it suggests an assesment model which the district educational offices can use in the course of planning the student accomodations to schools and making decisions for new school construction and the class extension in the existing schools. This study would be expected to help the reasonable expenditure for school facilities and to restrict overbuilding of surplus classes.

Feasibility Analysis of Establishment of the Collaborative Repository for Public Libraries in Korea (공공도서관 공동보존서고 건립의 타당성 분석)

  • Yoon, Hee-Yoon
    • Journal of Korean Library and Information Science Society
    • /
    • v.44 no.2
    • /
    • pp.5-26
    • /
    • 2013
  • The goal of this study is to analyze the feasibility of establishment of the collaborative repository for public libraries in Korea. To that end, its feasibilities were analyzed from the sides of the relevant laws, national policy, library's recognition, and actual collection space. As a result, the feasibility of establishment of the collaborative repository was revealed by enough. Accordingly, based on the this basic research, there is a need to develop immediately the construction and operation model of the collaborative repository. And the Ministry of Culture, Sports and Tourism, and metropolitan city and province must grant priority of cultural policy in the establishment of the collaborative repository.

Communication Pattern Based Key Establishment Scheme in Heterogeneous Wireless Sensor Networks

  • Kim, Daehee;Kim, Dongwan;An, Sunshin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1249-1272
    • /
    • 2016
  • In this paper, we propose a symmetric key establishment scheme for wireless sensor networks which tries to minimize the resource usage while satisfying the security requirements. This is accomplished by taking advantage of the communication pattern of wireless sensor networks and adopting heterogeneous wireless sensor networks. By considering the unique communication pattern of wireless sensor networks due to the nature of information gathering from the physical world, the number of keys to be established is minimized and, consequently, the overhead spent for establishing keys decreases. With heterogeneous wireless sensor networks, we can build a hybrid scheme where a small number of powerful nodes do more works than a large number of resource-constrained nodes to provide enhanced security service such as broadcast authentication and reduce the burden of resource-limited nodes. In addition, an on-demand key establishment scheme is introduced to support extra communications and optimize the resource usage. Our performance analysis shows that the proposed scheme is very efficient and highly scalable in terms of storage, communication and computation overhead. Furthermore, our proposed scheme not only satisfies the security requirements but also provides resilience to several attacks.

A study on the Algorithm for Mesh Network Topology Optimization and Routing (망토폴로지 최적화와 라우팅을 위한 알고리즘에 대한 연구)

  • Kim, Dong-Choon;Na, Seung-Kwon;Pyeon, Yong-Kug
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.1
    • /
    • pp.53-59
    • /
    • 2015
  • We consider the problems that consist of designing time, establishment cost, delay time and reliability in designing a mesh network when given link costs and traffic requirements between nodes. Designing time, establishment cost and delay time are less, reliability is higher in designing a mesh network. One of the problems designing time is solved by mesh network topology optimization and routing (MENTOR) algorithm that Aaron Kershenbaum propose, but the others remain. In this paper we propose a new mesh network design algorithm with small computational complexity that the others are solved. The result of the proposed algorithm is better than MENTOR's in total establishment cost, delay time and reliability.

A Comparative Analysis of EAP Authentication/Key-Establishment Protocols (EAP 인증/키설정 프로토콜 비교분석)

  • Park DongGook;Cho Kyung-Ryong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.6
    • /
    • pp.1323-1332
    • /
    • 2005
  • EAP (Extensible authentication protocol) is a sort of general framework for authentication rather than a specific authentication protocol. An important consequence of this is that EAP can accommodate a variety of authentication/key-establishment protocols for different internet access networks possibly integrated to a common IP core network This paper tries a comparative analysis of several specific authentication/key establishment protocols for EAP, and suggest a strategic viewpoint toward the question: which one to un. In addition, we tried to make things clear about an intellectual property right issue with regard to some password-based protocols.