• Title/Summary/Keyword: securing

Search Result 2,951, Processing Time 0.028 seconds

Securing Inflows to Reservoir with Low Ratio of Watershed to Paddy Field Areas by Operating Outside Diversion Weir (유역외 보의 연계운영에 의한 유역배율이 작은 저수지의 유입량 확보 가능성)

  • Noh, Jae-Kyoung
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.53 no.1
    • /
    • pp.17-28
    • /
    • 2011
  • This study was performed to ascertain the possibility of securing inflows to reservoir with low ratio of watershed to paddy field areas by outside diversion weir. The case of Maengdong reservoir and Samryong diversion weir was selected. Most of inflows to Maengdong reservoir with watershed area of $7.06\;km^2$ and total storage capacity of $1,269{\times}10^4\;m^3$ are filled with intake water from outside Samryong diversion weir. Only using water storage data in Maengdong reservoir from 1991 to 2009, the range of water intake in Samryong diversion weir to Maengdong reservoir was optimized to 0.135~30 mm/d, from which water intake to Maengdong reservoir was $1,672.9{\times}10^4\;m^3$ (70.1 %) and downstream outflow to Weonnam reservoir was $714.4{\times}10^4\;m^3$ (29.9 %). The parameters of DAWAST model for reservoir inflow were determined to UMAX of 313.8 mm, LMAX 20.3 mm, FC 136.8 mm, CP 0.018, and CE 0.007. Inflows to Maengdong reservoir were $427.1{\times}10^4\;m^3$ (20.3 %) from inside watershed, and $1,672.9{\times}10^4\;m^3$ (79.7 %) from outside. Paddy irrigation water requirements were estimated to $1,549{\times}10^4\;m^3$ on annual average. Operation rule curve was drawn by using daily inflow and irrigation requirement data. By securing the amount of inflow to Maengdong reservoir to about 80 % from outside Samryong diversion weir, water supply capacity for irrigation of $1,549{\times}10^4\;m^3/yr$ was analyzed to be enough. Additional water supplies for instream flow were analyzed to $1,412\;m^3/d$ in normal reservoir operation, $36,000\;m^3/d$ in withdrawal limit operation by operation rule curve from October to March of non irrigation period.

Securing Land Rights in Myanmar Development Project : Focusing on Foreign Investment and Land System (미얀마 개발사업 추진시 토지권리 확보방안 : 외국인투자 및 토지제도를 중심으로)

  • Jeong, Yeun-Woo
    • Land and Housing Review
    • /
    • v.8 no.3
    • /
    • pp.145-159
    • /
    • 2017
  • Despite the longing for democracy of most people, Myanmar has missed opportunities for social and economic development by military dictatorship. However, since 2010, the civilian government has gained new opportunities for reform. After turning to economic reform, developed countries such as the US and EU lifted the economic sanctions that they had taken in the past. As a result, it is growing rapidly compared to neighboring countries due to attracting foreign capital, tariff benefits on export items, and expansion of industrial infrastructure. Despite the increased investment value due to economic growth and democratization, the complex and customary land system of Myanmar must be an uneasy factor in securing stable land rights when entering overseas markets. Therefore, this study sought the method of securing the land rights in the development project through the analysis of the foreign investment system in Myanmar and the investigation of joint development cases. The results of this study are as follows. First, the acquisition of land use rights at the early stage of development can be considered through the foreign investment system. Under the Foreign Investment Law and Myanmar Investment Law, the land can be used for up to 70 years, and Under the Special Economic Zone Law, the land can be used for up to 75 years. Second, in relation to land compensation, it is required to establish a detailed resettlement plan for the indigenous people as the difficulty of land acquisition is expected due to the recent democratization trend and strengthening the voice of residents. Third, land use at the operational stage can be achieved by leasing the land from developers, and this will be the most realistic plan at present. In other words, the developer can directly develop the land created under the Foreign Investment Law and the Special Economic Zone Law, or Sub-lease and transfer the land use right to a third party.

Influencing Factors of University Research Grant: Focusing on the Management Capability of Industry-University Collaboration Foundation (대학 연구비 규모의 영향 요인 분석: 산학협력단의 연구비 관리 역량을 중심으로)

  • Jung, Hyejin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.2
    • /
    • pp.483-491
    • /
    • 2019
  • The aim of this study is to shed light on factors that influence securing of university research grants. For this purpose, this study emphasizes the role of management capability of industry-university cooperation foundation in securing research grants. We analyze whether the potential capabilities influence research grants using panel data from 194 universities during 2016 to 2018. The results obtained from the Driscoll & Kraay standard errors (DKSE) indicate that a number of variables including the portion of industry-university collaboration professors, academic performance of professors, and the number of paid researchers are positively associated with the amount of external research grant approved. However, the percentage of employees employed for less than two years is negatively related with securing external research grants. Once the dependent variable is measured by the total university research grants, the negative coefficient of employees with short-term career disappears. Instead, the percentage of employees who are in charge of research planning and management and the total number of employees involved in industry-university collaboration foundations are negatively related with the total university research grant amounts.

A Economic Feasibility Study on Environmental Ecology Flow Supply Plan using Agricultural Reservoir - Focused on Dongbok River - (농업용저수지를 이용한 환경생태유량 확보방안 경제성 비교 연구 - 동복천을 중심으로 -)

  • Park, Jin-hyeon;Ko, Jae han;Sung, Mu-hong;Jung, Hyoung-mo;Park, Tae-sun;Kwak, Yeong Cheol;Choi, Woo-young;Boem, Jina;Jeung, Minhyuk;Yoo, Seung-hwan;Yoon, Kwang-sik
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.61 no.5
    • /
    • pp.33-47
    • /
    • 2019
  • The environmental ecological flow (EEF) of stream or river will be designated according to the enforcement of the Water Environment Preservation Act. Previous researches by Ministry of Environment have proposed agricultural reservoirs as alternative resources to secure river flow where multi-purpose dam does not exist. However, agricultural reservoirs are constructed for the supply of agricultural water, and in fact, there is not a sufficient amount of water to be supplied to rivers as EEF. Therefore, this study examines the economic feasibility of securing EEF through the remodeling or construction of agricultural reservoirs. We investigated water balance of reservoir through simulation of three types of water supply demands such as agricultural water, agricultural water and river maintenance flow, and agricultural water and environmental ecology flow. The economics analysis was conducted on water supply demands and corresponding remodeling or construction of reservoirs. As a result, it was found that the method of securing through heightening existing reservoir enhancement is economically feasible. However, it was not possible to secure all the amount of the EEF due to the size limitation of existing reservoirs or constrain of the watershed for newly built reservoir. Therefore, in order to secure all of the EEF, the utilization of other alternatives as well as agricultural reservoirs should be considered. This study demonstrated the method of economical feasibility study of securing river maintenace flow and EEF using agricultural reservoirs and other considerations.

A Secure Active Packet Transfer using Cryptographic Techniques (암호 기술을 이용한 안전한 능동 패킷 전송)

  • 김영수;나중찬;손승원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.135-145
    • /
    • 2002
  • Active networks represent a new approach to network architecture. Nodes(routers, switches, etc.) can perform computations on user data, while packets can carry programs to be executed on nodes and potentially change the state of them. While active networks provide a flexible network iufrastructure, they are more complex than traditional networks and raise considerable security problems. Nodes are Public resources and are essential to the proper and contract running of many important systems. Therefore, security requirements placed upon the computational environment where the code of packets will be executed must be very strict. Trends of research for active network security are divided into two categories: securing active nodes and securing active packets. For example, packet authentication or monitoring/control methods are for securing active node, but some cryptographic techniques are for the latter. This paper is for transferring active packets securely between active nodes. We propose a new method that can transfer active packets to neighboring active nodes securely, and execute executable code included in those packets in each active node. We use both public key cryptosystem and symmetric key cryptosystem in our scheme

Web Monitoring based Encryption Web Traffic Attack Detection System (웹 모니터링 기반 암호화 웹트래픽 공격 탐지 시스템)

  • Lee, Seokwoo;Park, Soonmo;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.3
    • /
    • pp.449-455
    • /
    • 2021
  • This paper proposes an encryption web transaction attack detection system based on the existing web application monitoring system. Although there was difficulty in detecting attacks on the encrypted web traffic because the existing web traffic security systems detect and defend attacks based on encrypted packets in the network area of the encryption section between the client and server, by utilizing the technology of the web application monitoring system, it is possible to detect various intelligent cyber-attacks based on information that is already decrypted in the memory of the web application server. In addition, since user identification is possible through the application session ID, statistical detection of attacks such as IP tampering attacks, mass web transaction call users, and DDoS attacks are also possible. Thus, it can be considered that it is possible to respond to various intelligent cyber attacks hidden in the encrypted traffic by collecting and detecting information in the non-encrypted section of the encrypted web traffic.

A Study on Power Trading Methods for in a Hydrogen Residential Model (수소주거모델의 전력 거래 참여 방안 고찰)

  • KISEOK JEONG;TAEYOUNG JYUNG
    • Transactions of the Korean hydrogen and new energy society
    • /
    • v.34 no.2
    • /
    • pp.91-99
    • /
    • 2023
  • Participation in power trading using surplus power is considered a business model active in the domestic energy trade market, but it is limited only if the legal requirements according to the type, capacity, and use of the facilities to be applied for are satisfied. The hydrogen residential demonstration model presented in this paper includes solar power, energy storage system (ESS), fuel cell, and water electrolysis facilities in electrical facilities for private use with low-voltage power receiving system. The concept of operations strategy for this model focuses on securing the energy self-sufficiency ratio of the entire system, securing economic feasibility through the optimal operation module installed in the energy management system (EMS), and securing the stability of the internal power balancing issue during the stand-alone mode. An electric facility configuration method of a hydrogen residential complex demonstrated to achieve this operational goal has a structure in which individual energy sources are electrically connected to the main bus, and ESS is also directly connected to the main bus instead of a renewable connection type to perform charging/discharging operation for energy balancing management in the complex. If surplus power exists after scheduling, participation in power trading through reverse transmission parallel operation can be considered to solve the energy balancing problem and ensure profitability. Consequentially, this paper reviews the legal regulations on participation in electric power trading using surplus power from hydrogen residential models that can produce and consume power, gas, and thermal energy including hybrid distributed power sources, and suggests action plans.

A Study on Reorganization of System of Assistant Police Officer (치안보조인력 제도의 개편에 관한 연구)

  • Kim, Moon-Kwi
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.255-276
    • /
    • 2020
  • The mandatory police system, which plays a pivotal role in securing security and securing social safety as a security assistant, is expected to face difficulties in supplying the mandatory police manpower and securing absolute police manpower in the future according to the Ministry of Defense's abolition of the conversion service system. In this situation, this study intends to provide a concrete plan to replace the mandatory police officers as security assistants, recruiting contractors from civilians who are not military service resources or regular police officers, and using them for security assistance. More ultimately, this study goes beyond securing obligatory police to reduce or abolish mandatory police, which has been dealt with in previous studies. It aims to present the rescue and operation directions so that the police can provide quality public security services. In order to achieve the purpose of this study, this study 1) analyzes the current situation of police personnel, derives the necessity and justification of securing the police personnel or increasing the number of police personnel due to changes in security demand and security environment, and 2) After discussing the necessity and direction of reorganization, 3) deriving policy implications through analysis of foreign cases operating similar systems to derive specific plans for the introduction of security contractors for private contract workers in Korea. This study reviewed the specific operation plan and legal and institutional maintenance plan of private contract workers. In order to achieve these research objectives, this study 1) analyzes the current status of the police manpower and derives the necessity and justification of securing an absolute police manpower or increasing the manpower of the police in response to changes in security demand and security environment, and the current security aid system. 2) After discussing the necessity and orientation of reorganization of exinsting system of assistant police officer, 3) derive policy implications through analysis of foreign cases utilizing security aids similar to Korea, and 4) The specific operation plan and legal and institutional maintenance plan were presented. including security aids for private contract workers in Korea, from recruitment procedures to activities.

A Study on the Safe Transportation of a Non-Standardized Cargo (Steel Box) for General Cargo Ships (일반화물선에서 비표준화물(철재상자)의 안전한 운송을 위한 고찰)

  • Kim, Ji-Hong
    • Journal of Navigation and Port Research
    • /
    • v.43 no.6
    • /
    • pp.444-449
    • /
    • 2019
  • The "Standard on Cargo Stowage and Securing" implemented to safely stow and secure the cargo of international shipping vessels and domestic car ferries, has also been applied to general cargo ships transported between domestic ports since J anuary 2018. As a result, a new type of cargo, such as a non-standardized steel box transported by general cargo ships to major ports in Korea from Jeju Island in Korea, must be factored as the method of safe stowage and securing according to the legal classification of cargo. This study analyzed the legal status of a steel box by analyzing the actual size, shape of steel box through field verification, collection of data from relevant agencies and finally proposed the methods of safe stowage and securing for a steel box in the cargo holds of general cargo ships. According to the relevant domestic laws and international regulations, steel boxes could be classified as pallette boxes with protective outer packing, a type of non-standardized cargo. Additionally, when a steel box is loaded into the cargo hold of general cargo ships, a method of loading and transporting them must be factored so that there is no gap in the cargo hold of ships. Verification of the safety of the tightly loading and transportation measures in the reviewed cargo hold was verified through safety of the hull structure and securing of the ship's stability. As a result of verification of the safety of the hull structure, the value of the structural strength on both sides and the floor of the cargo hold for the total weight of cargo that can be loaded in the cargo hold was satisfied, and the value of the ship's stability was satisfied with the value of GoM and the restoration of the three cross-sectional stability curve areas.

농식품안전 정책방향

  • Jo, Jang-Yong
    • 한국환경농학회:학술대회논문집
    • /
    • 2009.07a
    • /
    • pp.3-18
    • /
    • 2009
  • It is difficult for consumers to satisfy high safety request with post-management method such as inspection and surveillance, as various changes in-and-out of the country associated with food safety. In terms of food safety problems related to foods, it is crucial to recognize public health and consumer protection and construct pre-preventive Food Control System. A joint committee, FAO/WHO made the following consultations to the National Food Safety System. ${\circ}$ Approach entirely from farm to table ${\circ}$ Get ready for Risk Analysis System ${\circ}$ Secure transparency ${\circ}$ Establish the optimal policy by evaluating the effect of regulation When it comes to summarizing the consultation, it would be accumulated as two key words; "Efficiency" and "Credibility". Whereas the problem of efficiency focuses on precaution rather than post-management, it requires policy option to maximize consumer's benefit by evaluating the cost for the Food Safety Management and its benefit. Also, analyzing risk's character and amount, demanding an optimal means, and introducing scientific analysis system put much value on the stakeholder's communications are procedure's security which can satisfy both "Efficiency" and "Credibility" simultaneously. Especially, it is emphasized here that Risk Assessment need to be separated from Risk Management. This action is a valid means of credibility security throughout improving transparency. A number of nations and organizations have reformed the method of food management passing through reflection and examination of the prior National Food Safety Management since BSE occurred in Britain, 1996. FSA; Food Standard Agency, AFFSA, EFSA, BfR, and FSC are Risk Assessment Organization functionally separated from Risk Management Organization, JECFA, JMCFA, JMPR, JEMRA in Codex charge Risk Assessment internationally. In case of advanced countries excluding several those such as The U.S. and so forth, though these Risk Assessment Organizations are either separated functionally within Risk Management Organization or operated as apart organ, common factors are in which it has independence as Science Base. While securing independence of Risk Assessment Function, it is a tendency Risk Management should be functionally unified into efficiency as well. Though Germany constructs integral Risk Management System of diverse ways according to social and political conditions of each country such as GFOCP, DVFA, SNFA, CFIS and AQIS, there is a key word in the center, "Securing efficiency of Food Safety Management". However our nation has a representative plural;diversified system with The U.S., we took a step forward for unification as empowering policy's generalization;adjustment and Risk Assessment Function by means of enacting the "Food Safety Fundamental Law" in 2008 and establishing the "Food Safety Policy Commission" with private and governmental sectors in the Prime Minister's office. Even though the unification of Risk Management hereby increased, there is the lack of strengthening function of Risk Assessment and securing independence. It needs to be required for the professional committee in Food Safety Policy Commission to develop as a exclusive office of Risk Assessment by separating from a policy decision. Administrative Branches should reinforce feeble functions such as fundamental investigation;research for carrying out Risk Assessment with securing efficiency throughout reassessment of prior Risk Management Means.

  • PDF