• Title/Summary/Keyword: violations

Search Result 356, Processing Time 0.031 seconds

Analysis of Accident Severity by the Level of Traffic Culture (교통문화 수준별 교통사고 심각도 분석)

  • Kim, Tae Yang;Park, Byung Ho
    • Journal of the Korean Society of Safety
    • /
    • v.33 no.1
    • /
    • pp.142-147
    • /
    • 2018
  • This study aims to analyze and discuss the accidents based on the level of traffic culture (LOT). In pursuing the above, LOT are divided into three categories based on the standardized index of traffic culture. Also, this study focuses on developing the accident models using GLM (generalized linear model). The main results are as follows. First, the null hypotheses that the ratios of fatal and serious injured persons (FSI) are the same over categories are rejected. Second, as the common variables, the ratio of turn signal usage and elderly population are analysed to be impacted to the ratio of FSI. Third, the traffic culture indicators among 5 accident factors which give impact to 'high level' are judged to affect the reduction of FSI. Fourth, compared to other levels, the traffic law violations among 7 accident factors of 'medium level' are estimated to influence the increase of FSI. Finally, in 'low level', the increasing ratio of traffic culture index compared to that of previous year and the number of hospital beds per person are evaluated to be significant to reducing the ratio of FSI. This study can be expected to give some policy implications to regional traffic safety policy-making.

Consideration of Voluntary Company by Police to Legality of Criminal Investigation (경찰의 임의동행에 의한 수사의 적법성에 대한 고찰)

  • Son, Bong-Son
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.12
    • /
    • pp.105-113
    • /
    • 2007
  • Company without voluntary agreement(nature) of police, violation on the reason of company, violation on identification state, Violations on duties to notify the party's family members and to allow the party have a chance to be notified. Violation on duty to notify the party to have the right to call an investigation authority, Violation on the time of company, Violation on the place of company, and Violation on using force such as compulsory during the process of voluntary company in state of illegal voluntary company. It also has to decide whether the evidences are illegal and eliminated by these two requisites even in probative value and evidence admissibility on confession of the party under the illegal voluntary company.

Secure and Privacy Preserving Protocol for Traffic Violation Reporting in Vehicular Cloud Environment

  • Nkenyereye, Lewis;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.7
    • /
    • pp.1159-1165
    • /
    • 2016
  • Traffic violations such as moving while the traffic lights are red have come from a simple omission to a premeditated act. The traffic control center cannot timely monitor all the cameras installed on the roads to trace and pursue those traffic violators. Modern vehicles are equipped and controlled by several sensors in order to support monitoring and reporting those kind of behaviors which some time end up in severe causalities. However, such applications within the vehicle environment need to provide security guaranties. In this paper, we address the limitation of previous work and present a secure and privacy preserving protocol for traffic violation reporting system in vehicular cloud environment which enables the vehicles to report the traffic violators, thus the roadside clouds collect those information which can be used as evidence to pursue the traffic violators. Particularly, we provide the unlinkability security property within the proposed protocol which also offers lightweight computational overhead compared to previous protocol. We consider the concept of conditional privacy preserving authentication without pairing operations to provide security and privacy for the reporting vehicles.

Design and Estimation of a Session Key based Access Control Scheme for Secure Communications in IoT Environments (IoT 환경에서 안전한 통신을 위한 세션 키 기반 접근 제어 기법의 설계 및 평가)

  • Jin, Byungwook;Jung, Dongwoog;Cha, Siho;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.35-41
    • /
    • 2016
  • Internet of Things (IoT) services are widely used in appliances of daily life and industries. IoT services also provide various conveniences to users and are expected to affect value added of all industries and national competitiveness. However, a variety of security threats are increased in IoT environments and lowers reliability of IoT devices and services that make some obstacles for commercialization. The attacks arising in IoT environments are making industrial and normal life accidents unlike existing information leak and monetary damages, and can expand damage scale of leakage of personal information and privacy more than existing them. To solve these problems, we design a session key based access control scheme for secure communications in IoT environments. The proposed scheme reinforces message security by generating session key between device and access control network system. We analyzed the stability of the proposed access scheme in terms of data forgery and corruption, unauthorized access, information disclosure, privacy violations, and denial of service attacks. And we also evaluated the proposed scheme in terms of permission settings, privacy indemnity, data confidentiality and integrity, authentication, and access control.

The Possibility of Investor-State Dispute under Korea US FTA in relation to Korean Environmental Impact Assessment: A Lesson from Bilcon v. Canada Case under NAFTA (환경영향평가제도를 둘러싼 한미FTA 투자분쟁의 가능성: Bilcon 대 캐나다 투자자-국가 간 소송 사례를 통한 교훈)

  • Lee, Taehwa
    • Journal of Environmental Impact Assessment
    • /
    • v.21 no.4
    • /
    • pp.525-541
    • /
    • 2012
  • This study aims to investigate the possibility of Investor-State Dispute under Korea US FTA in relation to Korean environmental impact assessment scheme. The study analyzes the Investor-State Dispute case between Bilcon of Delaware and the government of Canada. The case study shows that Bilcon challenged Canada with violations of NAFTA 1102, 1103 and 1105, arguing that Canada treated Bilcon in an arbitrary and discriminatory manner. The study analyzes two different scenarios that Korea could face with arbitration for alleged breach of its obligations under the Korea US FTA in relation to EIA scheme. From analyzing the case study in relation to two different scenarios, the study finds that problems previously identified and associated with EIA scheme in Korea could directly or indirectly cause Investor-State Dispute Settlement process between Korea and American investors. The study concludes that the risk of violating Korea US FTA related with Korean EIA could be reduced by creating Korean EIA scheme in a transparent and unarbitrary manner which guarantees fair public participation and elaborating the concrete meaning of sustainable development in EIA law.

Internet Governance in the light of Human Rights (인권적 관점에서 본 인터넷 거버넌스)

  • Park, Seong Hoon
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.3
    • /
    • pp.52-57
    • /
    • 2013
  • Information and Communication Technologies(ICTs) have substantially enlarged both the opportunities to realize one's human rights but have also resulted in the emergence of new challenges. ICTs are so deeply embedded and cental to almost all aspects of human activity. And ICTs are assuming an increasingly central role in all aspects of human and societal development across the world. But this is especially true of the right to privacy, which faces challenges such as profiling and data mining for public(including national security) and private purposes. ICTs access is a fundamental right for all humans in the information age. So we have need for regulation based on human rights in the digital age. And governments have a responsibility to protect individuals against violations of human rights and data protection by public authorities, but also by private entities. In addition, internet governance and multi-stakeholder principle have to be stressed on all of the internet issues because internet governance is included in the principle of democracy which have bottom-up communication and equality. So it is very importance that Internet Governance Forum is the space for a meaningful discussion on public policy issues relating to the internet.

  • PDF

Super Cluster based Routing Protocol in Sensor Network

  • Noh Jae-hwan;Lee Byeong-jik;Kim Kyung-jun;Lee Ick-soo;Lee Suk-gyu;Han Ki-jun
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.193-198
    • /
    • 2004
  • In variety of environments for applications, wireless sensor networks have received increasing attention in the recent few years. But, sensor nodes have many limitations including battery power and communication range. These networks require robust wireless communicant protocols that are energy efficient and provide low latency. In this paper, we propose new protocol as is defined SCP. The key idea of SCP is that only one node which is defined as a Super-Cluster Header sends the combined data to the BS. We evaluated the effectiveness of SCP through experiments which have several parameter violations. Simulation results shows that performance of SCP is through better than other legacy protocol within the framework of energy cost, life time of the sensor network and fair distribution of the energy consumption.

  • PDF

A Study on the Actual conditions and Solutions of the Multicultural Family Problems in Terms of Social Issues (사회문제의 측면에서 본 다문화가족문제의 실태분석 및 해결방안 연구)

  • Kim, Hyun-Mi
    • Industry Promotion Research
    • /
    • v.3 no.1
    • /
    • pp.61-72
    • /
    • 2018
  • This study is to find out solutions to the problems of multicultural families which are becoming social problems. The results of this study are as follows : First, it is necessary to change government and public perception about multicultural families and society. Second, it is necessary to consider expanding and operating a counseling center for the support of multicultural families' human rights violations, labor issues, and life problems. Third, the efforts of related organizations and organizations including the government to diversify contents, subjects and programs of multicultural education are needed. Fourth, there is a need for a separate district development such as multicultural special zones.

A Multi-level Optimal Power Flow Algorithm for Constrained Power Economic Dispatch Control (제약조건을 고려한 경제급전 제어를 위한 다단계 최적조류계산 알고리즘)

  • Song, Gyeong-Bin
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.50 no.9
    • /
    • pp.424-430
    • /
    • 2001
  • A multi-level optimal power flow(OPF) algorithm has been evolved from a simple two stage optimal Power flow algorithm for constrained power economic dispatch control. In the proposed algorithm, we consider various constraints such as ower balance, generation capacity, transmission line capacity, transmission losses, security equality, and security inequality constraints. The proposed algorithm consists of four stages. At the first stage, we solve the aggregated problem that is the crude classical economic dispatch problem without considering transmission losses. An initial solution is obtained by the aggregation concept in which the solution satisfies the power balance equations and generation capacity constraints. Then, after load flow analysis, the transmission losses of an initial generation setting are matched by the slack bus generator that produces power with the cheapest cost. At the second stage we consider transmission losses. Formulation of the second stage becomes classical economic dispatch problem involving the transmission losses, which are distributed to all generators. Once a feasible solution is obtained from the second stage, transmission capacity and other violations are checked and corrected locally and quickly at the third stage. The fourth stage fine tunes the solution of the third stage to reach a real minimum. The proposed approach speeds up the two stage optimization method to an average gain of 2.99 for IEEE 30, 57, and 118 bus systems and EPRI Scenario systems A through D testings.

  • PDF

A Fast Optimization Algorithm for Optimal Real Power Flow (고속의 유효전력 최적조류계산 알고리즘)

  • Song, Kyung-Bin;Kim, Hong-Rae
    • Proceedings of the KIEE Conference
    • /
    • 1998.07c
    • /
    • pp.926-928
    • /
    • 1998
  • A fast optimization algorithm has been evolved from a simple two stage optimal power flow(OPF) algorithm for constrained power economic dispatch. In the proposed algorithm, we consider various constraints such as power balance, generation capacity, transmission line capacity, transmission losses, security equality, and security inequality constraints. The proposed algorithm consists of four stages. At the first stage, we solve the aggregated problem that is the crude classical economic dispatch problem without considering transmission losses. An initial solution is obtained by the aggregation concept in which the solution satisfies the power balance equations and generation capacity constraints. Then, after load flow analysis, the transmission losses of an initial generation setting are matched by the slack bus generator that produces power with the cheapest cost. At the second stage we consider transmission losses. Formulation of the second stage becomes classical economic dispatch problem involving the transmission losses, which are distributed to all generators. Once a feasible solution is obtained from the second stage, transmission capacity and other violations are checked and corrected locally and quickly at the third stage. The fourth stage fine tunes the solution of the third stage to reach a real minimum. The proposed approach speeds up the coupled LP based OPF method to an average gain of 53.13 for IEEE 30, 57, and 118 bus systems and EPRI Scenario systems A through D testings.

  • PDF