• Title/Summary/Keyword: illegal

Search Result 1,448, Processing Time 0.027 seconds

Chemical Residues in Edible Tissues of Animals and Control Measures (축산식품의 유해물질 잔류와 그 관리방안)

  • 박종명;박근식
    • Journal of Food Hygiene and Safety
    • /
    • v.6 no.2
    • /
    • pp.17-22
    • /
    • 1991
  • Great attention form a public health aspect has centered on the safety of tissues residues of veterinary drugs and environmental contaminants, with intensification of animal husbandry, the use of veterinary drugs will become increasingly important. Heavy responsibility is placed on the veterinarian and livestock producer to observe the period for withdrawal of drug prior to slaughter to assure that illegal concentrations of drug residues in meat, milk and egg do not occur. Every nation has their own regulations in relation to the residues and the guidelines on the use of veterinary drugs to fulfil the regulations, and their own national residue programs to monitoring and eliminate illegal products. Good practice of veterinary drug by users and governmental surveillance programs are very important to ensure animal food safety.

  • PDF

A Study of Current Conditions and Future Tasks of One-room Housing (원룸주거의 현실과 과제에 관한 연구)

  • Kim, Han-Su
    • Journal of the Korean housing association
    • /
    • v.24 no.1
    • /
    • pp.61-68
    • /
    • 2013
  • This study tries to provide fundamental policy information for one-room housing by analyzing current living conditions of one-room housing near a university. For this purpose, this study conducts on-site survey as well as residents' survey. The main findings are follows. First, some one-room houses have been converted from single-family houses. Pilotis are often used as parking lots in newly built one-room houses. There are illegal equipments and illegal parkings around one-room village. Second, residents satisfy with proximity to workplace. However, they show strong dissatisfaction with physical environment such as noise, air flow, waste disposals. In particular, they feel very uncomfortable with gloomy lights and fear about potential crime. Third, residents like their independent lives, but complain about narrow living space and unprotected privacy. In addition, many of them feel lonely due to lack of public space in which residents can communicate.

A Study of User Recognition of the Copyright in Academic Libraries (대학도서관 이용자의 저작권인식에 관한 연구)

  • You, Yang-Keun
    • Journal of Korean Library and Information Science Society
    • /
    • v.39 no.1
    • /
    • pp.355-375
    • /
    • 2008
  • Copyrights have threatened by some people even though information transfer methods are various and users can change information with others rapidly through the improvement of digital technology. The purpose of this study is to identify illegal actions against academic library users and to propose a solution to the copyright problem. Through understanding general concepts of copyrights and illegal cases against copyrights, collected essential cases were analysed. The results show that library users have copied and transferred illegally some materials with knowing unlawful actions.

  • PDF

A Study of the Administrative Tribunal Cases about Violation of Law of Housing Projects (주거건축과 관련된 건축위법행위 행정심판판례 연구)

  • 김진욱;성기용
    • Journal of the Korean housing association
    • /
    • v.14 no.6
    • /
    • pp.33-40
    • /
    • 2003
  • The purpose of this study was to analyze the architect's Administrative Tribunal cases related to housing projects. We collected the 271 decisions of Administrative Tribunal cases from 1985 to 2001 through the Ministry of Legislation data base. As a conclusion of research, most of cases are caused during design process and supervision of construction which are major roles of architects. We can find out that the number of cases of Administrative Tribunal about housing is 10% more than other types of building. And this situation is more serious in supervision building phase. It proves that housing project has more possibility of violation of law than other types. Because it belong to an economic problems. In Korea, clients of housing project tend to take more profits by taking an illegal acts; like enlargement of a building, construction border violation. illegal construction balcony and so on. And architect who roles to be a supervisor is liable to these problems but he has not much authority and economical benefits. Through this research we can analyze this situation and make know what is problem.

Design of document security to maximize knowledge value (지식가치를 극대화하기 위한 다큐먼트 보안 디자인)

  • Jang, Deok-Seong
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2003.12a
    • /
    • pp.161-170
    • /
    • 2003
  • Knowledge management system building knowledge acquisition, knowledge share, and knowledge maintenance for the member of corporation is expanded throughout whole industry to cope with rapid business environment. Electronic document basing knowledge management system can copy, print, and transfer knowledge to another party, so it is being regarded as a essential infrastructure to share knowledge. However, considering most of information leakage is sprung up by insider of organization, it is considered to provide countermeasure to protect illegal use from information leakage. The purpose of this paper is to establish digital information security system through design of document and manage digital information assets safely through electronic document security system protecting illegal leakage of digital information assets.

  • PDF

Proposals On The Designe, Construction, Management Maintenance standardization Method Of Mechanical Field Fire Protection System By NFSC (화재안전기준(NFSC)에 따른 기계분야 소방설비 설계, 시공, 감리 유지관리 업무 표준화 방안에 대한 제안)

  • Kim, Sung-Il;Kang, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.19 no.3
    • /
    • pp.11-17
    • /
    • 2017
  • The study seeks to cooperate with the investigation of a fire investigation based on public-private partnership. Fire protection systems provide a wide variety of viewpoints from the perspectives of design, construction, management, maintenance, maintenance and maintenance systems at a particular point in time, construction, management, and maintenance systems. What is controversial is that there are illegal activities such as illegal activities of the Patent Office, misconduct of construction work and unreasonable construction of construction works.As a theoretical framework, the present study identified the four key elements of a successful disaster response system : responsiveness, control, professionalism, and bias.

A Case of Nonthrombotic Pulmonary Embolism after Facial Injection of Hyaluronic Acid in an Illegal Cosmetic Procedure

  • Jang, Jong Geol;Hong, Kyung Soo;Choi, Eun Young
    • Tuberculosis and Respiratory Diseases
    • /
    • v.77 no.2
    • /
    • pp.90-93
    • /
    • 2014
  • Hyaluronic acid is widely used in medical procedures, particularly in cosmetic procedures administered by physicians or nonmedical personnel. The materials used for cosmetic procedures by physicians as well as illegally by non-medical personnel can cause nonthrombotic pulmonary embolism (NTPE). We report the case of a woman with acute respiratory failure, neurologic symptoms and petechiae after an illegal procedure of hyaluronic acid dermal filler performed by an unlicensed medical practitioner 3 days before symptom onset. Although a few cases of NTPE after injection of hyaluronic acid have been reported yet, this is the first typical case showing a NTPE manifestation after the facial injection of hyaluronic acid.

Imaging Device Identification using Sensor Pattern Noise Based on Wiener Filtering (Wiener 필터링에 기반하는 센서 패턴 노이즈를 활용한 영상 장치 식별 기술 연구)

  • Lee, Hae-Yeoun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.12
    • /
    • pp.2153-2158
    • /
    • 2016
  • Multimedia such as image, audio, and video is easy to create and distribute with the advance of IT. Since novice uses them for illegal purposes, multimedia forensics are required to protect contents and block illegal usage. This paper presents a multimedia forensic algorithm for video to identify the device used for acquiring unknown video files. First, the way to calculate a sensor pattern noise using Wiener filter (W-SPN) is presented, which comes from the imperfection of photon detectors against light. Then, the way to identify the device is explained after estimating W-SPNs from the reference device and the unknown video. For the experiment, 30 devices including DSLR, compact camera, smartphone, and camcorder are tested and analyzed quantitatively. Based on the results, the presented algorithm can achieve the 96.0% identification accuracy.

A case study on the industrial wastes illegally in Teshima (산업폐기물의 불법투기 사례에 대한 연구(일본의 테시마 사건을 중심으로))

  • Lee, Hyeon-Yong;Song, Jun-Yeop;Lee, Seung-U;Ryu, Byeong-Sun
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2007.04a
    • /
    • pp.197-203
    • /
    • 2007
  • Teshima has been a quiet and beautiful island, but started to be imaged as an "island of wastes" because of the 600,000 tons of industrial wastes thrown there illegally. Now it symbolizes the problem of industrial wastes in Japan. Teshima development company, an industrial waste disposer, started to dispose industrial wastes illegally in the west side of the island, since the late 1970s. Hyogo Police Station exposed this illegal act, and arrested 6 persons of the company, including its president, in charge of having violated the Waste Disposal and Public Cleansing Law in 1991. This illegal disposition has continued for 13years until it was exposed by the police. Teshima case of industrial wastes are introduced in this paper.

  • PDF

Security Problems and Protection Methods in Remote Control Communication for Mobile Robots Using Wireless IP Network

  • Mizoguchi, Hiroshi;Teshiba, Masashi;Goto, Yoshiyasu;Hidai, Ken-Ichi;Shigehara, Takaomi;Mishima, Taketoshi
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1998.10a
    • /
    • pp.401-406
    • /
    • 1998
  • If a mobile robot can be controlled remotely via the internet using wireless IP protocol network, it becomes much useful and convenient. However risk of illegal access is also increased. This paper discusses problems of the illegal access and proposes protection methods against the access.

  • PDF