• Title/Summary/Keyword: illegal

Search Result 1,453, Processing Time 0.028 seconds

A Study on the Extent of the Pollution of an Illegal Landfill (불량폐기물 매립지의 오염에 관한 고찰)

  • 김동우;박성원;이재영;이평구
    • Journal of Soil and Groundwater Environment
    • /
    • v.6 no.2
    • /
    • pp.31-38
    • /
    • 2001
  • An illegal landfill In Korea was evaluated in a view of environmental quality to figure out reusing the area. The sampling spots were selected at a point in the landfill and three points in it's around area(two points in a paddy soils and one in a farm field). The eleven pollutants regulated in the Korean Soil Environmental Preservation Act (KSEPA) were analysed from the soil sample with the method of the KSEPA. As the results of the analysis the level of concentration with most samples indicated the requirement of the KSEPA. The concentration of soil samples met the standard: however, some pollutants in the ground water and leachate showed higher concentration than that of the requirement. Therefore, we must consider the treatments of the pollutants in the ground water and leachate when designing this landfill area for reusing.

  • PDF

International Trend of Regulation on IUU Fishing and Countermeasures (IUU어업에 대한 국제적 규제 동향과 우리나라의 대응 방안)

  • LEE, Kwang-Nam;SEO, Byung-Kwi
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.15 no.1
    • /
    • pp.81-100
    • /
    • 2003
  • It is undeniable that IUU Fishing are threatening so many legal fishermen' economic livelihood, negatively impact on conservation and protection of the fishery stock and ecosystem itself. Especially, negative impact of IUU Fishing resulted from the increasing fishery activities on the high seas. The Korea case of Coastal and Off-shore Fisheries, difficulties in conserving and controlling the fishery stock was brought about. Simultaneously, it is the fact that there are so many damage such as the reduction of fish Stock management program's effect, dissatisfaction of legal fishermen, over-exploiting of fish stock. Related with this kind of problem, FAO had adopted "International Plan of Action to Prevent, Deter and Eliminate Illegal, Unreported and Unregulated Fishing(2001)". From this reason, Korea also needs to make actual efforts to prevent IUU Fishing. i.e. each nation should develop Korea action plan by Feb. 2004 and impliment it, report on implementation toward FAO. This Paper will review the definition of the IUU stipulated by "International Plan of Action on Illegal, Unreported and Unregulated Fishing" and study Korea cases of the IUU fishing. Finally, the analysis of Korea's implementation will be done, centering around the contents stated on the International Action Plan. The significance of this paper is to grope the political countermeasures against international movement of the IUU fishing prevention.

Content-based Video Retrieval for Illegal Copying Contents Detection using Hashing (Hashing을 이용한 불법 복제 콘텐츠 검출을 위한 내용 기반 영상 검색)

  • Son, Heusu;Byun, Sung-Woo;Lee, Soek-Pil
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.67 no.10
    • /
    • pp.1358-1363
    • /
    • 2018
  • As the usage of the Internet grows and digital media become more diversified, it has become much easier for digital contents to be distributed and shared. This makes easier to access the desired digital contents. On the other hand, there is an increasing need to protect the copyright of digital works. There are some prevalent ways to protect ownership, but they accompany several disadvantages. Among those ways, watermarking methods have the advantage of ensuring invisibility, but they also have a disadvantage that they are vulnerable to external attacks such as a noise and signal processing. In this paper, we propose the detecting method of illegal contents that is robust against external attacks to protect digital works. We extract HSV and LBP features from images and use Euclidian-based hashing techniques to shorten the searching time on high-dimensional and near-duplicate videos. According to the results, the proposed method showed higher detection rates than that of the Watermarking techniques in terms of the images with fabrications or deformations.

Analysis of Illegally Mixed Used Lube Oil in Bunker C (폐윤활유 불법혼입 C중유 물성 분석)

  • Lim, Young-Kwan;Lee, Jae-Min;Kim, Wan-Sik;Lee, Jeong-Min
    • Tribology and Lubricants
    • /
    • v.34 no.5
    • /
    • pp.191-196
    • /
    • 2018
  • Bunker C is used in heavy-lift ships, furnaces, and boilers for generating heat, and power. Bunker C has only four regulations for quality standards and is rarely inspected in Korea. For these reasons, other oils such as used lubricant oil are commonly blended with Bunker C. This illegal mixture of fuel can damage the boilers, engines and affect the environment adversely. In this study, we investigate the fuel properties and perform atomic analysis of illegal Bunker C blended with used lube oil. The test results show that higher quantities of used lube oil in Bunker C have higher flash points, total acid numbers, copper corruption, solid contamination, and metal components. Further, increasing quantities of used lube oil in Bunker C cause lower viscosity, sulfur, and V content. However, adequate sample (approximately 1 L) is needed to evaluate presence of adulterants in Bunker C, we attempted the SIMDIST analysis. In the SIMDIST chromatogram, the used engine oils are detected for longer retention times than Bunker C owing to the high boiling point. We also quantitatively analyzed the lube oil content using SIMDIST.

A Study on the Characteristics of Youth Gambling Addiction (청소년 도박중독의 특성에 관한 연구)

  • Ryu, Hwang-Gun;Choi, Yi-Soon;Jang, Hyo-Kang;Kim, Jeong-Eun
    • The Korean Journal of Health Service Management
    • /
    • v.6 no.1
    • /
    • pp.153-161
    • /
    • 2012
  • The purpose of this study is to investigate the factors on the characteristics of youth gambling addiction to develop the youth gambling prevention program. The data was collected by using questionnaire, from Oct 2010 to Dec 2011. Of the 2,400 surveys distributed, 2,301 were collected and 2,286 of those were used for analysis after eliminating 15 with insufficient responses. The major findings of this study can be summarized as follows. First, there were some differences on the future gambling intention and the internet addiction by gender, grade, pocket money, experience in the illegal gambling site visits and gambling experience. Students who experience in the illegal gambling site visits were represented relatively higher on the future gambling intention and the internet addiction. Second, the overall experience in the illegal gambling site visits is 6.9%, while 23.2% of the total respondents were found to be the experience of gambling. Third, the future gambling intention, irrational gambling beliefs and the internet addiction were found have positive correlation with each other.

Climate change effect on storm drainage networks by storm water management model

  • Hassan, Waqed Hammed;Nile, Basim Khalil;Al-Masody, Batul Abdullah
    • Environmental Engineering Research
    • /
    • v.22 no.4
    • /
    • pp.393-400
    • /
    • 2017
  • One of the big problems facing municipalities is the management and control of urban flooding where urban drainage systems are under growing pressure due to increases in urbanization, population and changes in the climate. Urban flooding causes environmental and infrastructure damage, especially to roads, this damage increasing maintenance costs. The aim of the present study is to develop a decision support tool to identify the performance of storm networks to address future risks associated with climate change in the Middle East region and specifically, illegal sewer connections in the storm networks of Karbala city, Iraq. The storm water management model has been used to simulate Karbala's storm drainage network using continuous hourly rainfall intensity data from 2008 to 2016. The results indicate that the system is sufficient as designed before consideration of extra sewage due to an illegal sewer connection. Due to climate changes in recent years, rainfall intensity has increased reaching 33.54 mm/h, this change led to flooding in 47% of manholes. Illegal sewage will increase flooding in the storm system at this rainfall intensity from between 39% to 52%.

A Study on the Chemical Characteristics for the Leachate of Open(Illegal) Dumping Waste Landfill Mixing with Bentonite (벤토나이트 첨가시 불량폐기물매립지의 침출수에 미치는 화학적 특성에 관한 연구)

  • 이재영;노회정
    • Journal of Korea Soil Environment Society
    • /
    • v.4 no.1
    • /
    • pp.75-83
    • /
    • 1999
  • The purpose of this study is to investigate the chemical characteristics of the leachate for the open(illegal) dumping waste. In this study, the open dumping waste were mixed with 0, 5, 10, 15% of bentonite in each Iysimeter as a rate of weight. The simulation was evaluated by CODcr, ${NO_3}^-$, ${SO_4}^{2-}$, $Cl^-$ and heavy metals in leachate. As a result, the mixed waste with bentonite in all Iysimeters showed the reduction of CODcr and heavy metals were hardly detected. The removal rate of ${NO_3}^-$, ${SO_4}^{2-}$, $Cl^-$ was increased with the mixing rate of bentonite.

  • PDF

Methodology of Log Analysis for Intrusion Prevention based on LINUX (리눅스 기반 침입 방지를 위한 로그 분석 방법 연구)

  • Lim, Sung-Hwa;Lee, Do Hyeon;Kim, Jeom Goo
    • Convergence Security Journal
    • /
    • v.15 no.2
    • /
    • pp.33-41
    • /
    • 2015
  • A safe Linux system for security enhancement should have an audit ability that prohibits an illegal access and alternation of data as well as trace ability of illegal activities. In addition, construction of the log management and monitoring system is a necessity to clearly categorize the responsibility of the system manager or administrator and the users' activities. In this paper, the Linux system's Security Log is analyzed to utilize it on prohibition and detection of an illegal protrusion converting the analyzed security log into a database. The proposed analysis allows a safe management of the security log. This system will contribute to the enhancement of the system reliability by allowing quick response to the system malfunctions.

Based PKI System for Secure Authentication on IPTV (IPTV에서 PKI기반의 안전한 인증시스템)

  • Shuai, Wang;Jo, In-June
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.5
    • /
    • pp.899-905
    • /
    • 2009
  • IPTV service is one of the representatives for the integration of broadcasting industry and communication industry, which also can meet users' various demands and provide efficient service. As the increasing number of IPTV users and contents servers, it is necessary to provide the safety authority system to prevent the illegal audio-visual, incorrect audio-visual authority, and illegal authority control. This thesis puts forward PKI(public Key Infrastructure) as the foundation key production mechanism. Through this mechanism, the key can be transferred safely to users and authenticate the ID of users and contents servers. In a word, our system can provide safe and efficient service for mutual authentication.

Design of AOD System for MP3 Copyright Protection (MP3 저작권 보호를 위한 AOD 시스템의 설계)

  • Kim, Yeong-Jun;Kim, Tae-Yun
    • The KIPS Transactions:PartD
    • /
    • v.9D no.2
    • /
    • pp.323-328
    • /
    • 2002
  • In recent years, e-Commerce is very active on the Internet, especially the World Wide Web alone: with the popularization of Internet using high-speed networks. Especially, Circulation of Multimedia Contents like MP3 data if widely being focused as one of the popular researches. However, the existing models of AOD (Audio On Demand) System lack substantial illegal copy protection or copyright protection. In this paper, we propose an AOD System that guarantees substantial illegal copy protection and copyright protection based on the PKI (Public Key Infrastructure). As transmitting MP3 data using the user's public key, the proposed .method prevents the attack of dropper during transmitting data. Also, it guarantees the right of users and distributors by prohibiting illegal users from using MP3 data.