• Title/Summary/Keyword: 압수

Search Result 78, Processing Time 0.029 seconds

Heat Transfer Characteristics of CO2 at Supercritical Pressure in a Vertical Circular Tube (수직원형관에서 초임계압 CO2의 열전달 특성)

  • Yoo, Tae-Ho;Bae, Yoon-Yong;Kim, Hwan-Yeol
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.35 no.1
    • /
    • pp.23-31
    • /
    • 2011
  • At supercritical pressure, the physical properties of fluid change substantially and the heat transfer at a temperature similar to the critical or pseudo-critical temperature improves considerably; however, the heat transfer may deteriorate due to a sudden increase in the wall temperature at a certain condition of a mass and heat flux. In this study, the heat transfer rates in $CO_2$ flowing vertically upward and downward in a circular tube with a diameter of 4.57 mm under various conditions were calculated by measuring the temperature of the outer wall of the tube. The published heat transfer correlations were analyzed by comparing their prediction values with 7,250 experimental data. By introducing a buoyancy parameter, a heat transfer correlation, which could be applied only to a normal heat transfer regime, was extended such that it can be applied to regime of heat transfer deterioration. The published criteria for heat transfer deterioration were evaluated against the conditions obtained from the experiment in this study.

Sexual Maturation of the Spotted Flounder Verasper variegatus (범가자미 Verasper variegatus의 성성숙)

  • Kim, Yoon;An, Cheul-Min;Kim, Kyung-Kil;Baek, Hea-Ja
    • Korean Journal of Ichthyology
    • /
    • v.10 no.2
    • /
    • pp.191-199
    • /
    • 1998
  • The ovary of the spotted flounder Verasper variegatus is a conical bag in shape and is bilateral structure develops lengthily from the posterior of the abdomen to the end of the anal fin. The testis also is bilateral in structure, usually located in small size in the abdomen. In females, the gonadosomatic index (GSI) showed very low from March to July, and then began to increase from August, thereafter reached the maximum in January through out the year. In males, the GSI reached the maximum (1.7) in January through out the year, as seen in females. Compared with the male GSI in other fishes, the maximum GSI of this species were very lower than those of other fishes. According to the distributions of egg diameter in the spawning season, it is assumed that the spotted flounder spawn four times or more in the spawning season. The total length of female and male reached 50% first sexual maturity were 42.0~44.0 and 28.0~30.0cm, respectively and total length of female and male reached 100% maturity were 44.0 and 32.0cm, respectively. The reproductive cycle could be classified into four successive developmental stages: growing stage (August~October), mature stage (November~December), ripe and spent stage (December~February), degenerative and resting stage (March~July).

  • PDF

A New Design and Implementation of Digital Evidence Container for Triage and Effective Investigation (디지털 증거 선별 조사의 효율성을 위한 Digital Evidence Container 설계 및 구현)

  • Lim, Kyung-Soo;Lee, Chang-Hoon;Lee, Sang-In
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.4
    • /
    • pp.31-41
    • /
    • 2012
  • The law enforcement agencies in the worldwide are confiscating or retaining computer systems involved in a crime/civil case, if there are any, at the preliminary investigation stage, even though the case does not involve a cyber-crime. They are collecting digital evidences from the suspects's systems and using them in the essential investigation procedure. It requires much time, though, to collect, duplicate and analyze disk images in general crime cases, especially in cases in which rapid response must be taken such as kidnapping and murder cases. The enterprise forensics, moreover, it is impossible to acquire and duplicate hard disk drives in mass storage server, database server and cloud environments. Therefore, it is efficient and effective to selectively collect only traces of the behavior of the user activities on operating systems or particular files in focus of triage investigation. On the other hand, if we acquire essential digital evidences from target computer, it is not forensically sound to collect just files. We need to use standard digital evidence container from various sources to prove integrity and probative of evidence. In this article, we describe a new digital evidence container, we called Xebeg, which is easily able to preserve collected digital evidences selectively for using general technology such as XML and PKZIP compression technology, which is satisfied with generality, integrity, unification, scalability and security.

Slit Ventricle Syndrome in Children : Clinical Presentation and Treatment (소아에서 틈새뇌실 증후군 : 임상 양상 및 치료)

  • Shin, Beom-Sik;Yang, Kook-Hee;Kim, Dong-Seok;Choi, Joong-Uhn
    • Journal of Korean Neurosurgical Society
    • /
    • v.30 no.sup2
    • /
    • pp.309-315
    • /
    • 2001
  • The term slit ventricle syndrome(SVS) refers to an episodic occurrence of headache, vomiting, and possibly some degree of impaired consciousness in shunted hydrocephalic children in whom slit-like ventricles are seen on CT scan or MRI. Authors present 6 cases with SVS who were treated at our institute for last 10 years. From 1986 to 1996, 821 patients underwent shunt surgery for hydrocephalus. The etiology of hydrocephalus included brain tumor(140 patients), post-hemorrhagic(62 patients), idiopathic normotensive hydrocephalus(64 patients), post-meningitic( 58 patients), post-traumatic(54 patients), congenital(48 patients), neurocysticercosis(31 patients), and unknown etiology(364 patients). During the mean follow-up duration of 68 months, 232 shunt revisions were performed by a revision rate of 1.28 per patient. The incidence of SVS was 0.7%(6 patients). Most of them have been operated on in infancy. Time interval from the first operation to the development of slit-ventricle syndrome ranged from 4 to 8 years, the mean was 6 years. Shuntogram showed patent shunt in all patients. Two patients with less severe clinical symptoms improved with conservative treatment. These patients were not measured ICP because of good hospital course. One patient showed high ICP and needed only revision with same pressure valve as previous shunt. Low ICP was noted in 3 patients. Pressure augmentation using an anti-siphon device(ASD) or upgrading valve system were necessary in these patients. The authors stress that determining type of SVS is the first step in treatment planning and that the best treatment is a strategy aimed at resolving the specific type of SVS responsible for the symptoms.

  • PDF

A Study on the Policy Measures for the Prevention of Industrial Secret Leakage in the Metaverse (메타버스 내 산업기밀 유출 대응을 위한 정책 및 제도에 관한 연구)

  • Jeon, So-Eun;Oh, Ye-Sol;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.377-388
    • /
    • 2022
  • Metaverse, realistic virtual space technology has become a hot topic. However, due to the lack of an institutional system to the metaverse environment, concerns are rising over the leakage of industrial confidentiality, including digital assets produced, stored, processed, and transferred within the metaverse. Digital forensics, a technology to defend against hacking attacks in cyberspace, cannot be used in metaverse space, and there is no basis for calculating the extent of damage and tracking responsibility, making it difficult to respond to human resources leakage and cyberhacking effectively. In this paper, we define the scope of industrial confidentiality information and leakage scenario and propose policy and institutional measures based on problems in each metaverse scenario. As a result of the study, it was necessary to prepare a standardized law on Extra-territorial search and seizure issues and a system for collecting cryptocurrency evidence to respond to industrial confidentiality leaks in the metaverse. The study expects to contribute to industrial technology development by preparing in advance for problems that may arise in metaverse technology.

Australian Case Study in Regulatory Techniques to the Security Industry Reform and Policy Implications (호주 민간경비산업 고품질 규제수단 검토 및 시사점)

  • Kim, Dae-Woon
    • Korean Security Journal
    • /
    • no.47
    • /
    • pp.7-36
    • /
    • 2016
  • The security providers industry, often referred to as an industry with unconfined growth ceiling, has entered a remarkable mass-growth phase since the 1980. In the modern era, private-sector security increasingly cover functions relating to general security awareness (including counter-terrorism) in partnership with State bodies, and the scale of operations continue to accelerate, relative to the expanding roles. In the era of pluralisation of policing, there has been widening efforts pursued to develop a range of regulatory strategies internationally in order to manage such growth and development. To date, in South Korea, a diverse set of industry review studies have been conducted. However, the analyses have been conventionally confined to North America, Britain, Germany and Japan, while developments in other world regions remain unassessed. This article is intended to inform the drivers and determinants of regulatory reforms in Australia, and examine the effectiveness of the main pillars of licensing innovations. Over the past decades, the Australian regime has undergone a wave of reforms in response to emerging issues, and in recognition of the industry as a 'public good' due to underpopulation density and the resulting security challenges. The focus of review in this study was on providing a detailed review of the regulatory approach taken by Australia that has expanded police-private security co-operation since the 1980s. The emphasis was on examining the core pillars of risk management strategies and oversight practices progressed to date and evaluating areas of possible improvement in regulation relative to South Korea. Overall, this study has identified three key features of Australian regime: (1) close checks on questionable close associates (including fingerprinting), (2) power of inspection and seizure without search warrant, (3) the 'three strikes' scheme. The rise of the private security presence in day-to-day policing operations means that industry warrant some intervening government-sponsored initiative. The overall lessons learnt from the Australian case was taken into account in determining the following checks and balances that would provide the ideal setting for the best-practice arrangement: (1) regulatory measure should be evaluated against a set of well-defined indicators, such as the merits of different enforcement tools for each given risk, (2) information about regulatory impacts should be analysed by a specialist research institute, (3) regulators should be innovative in applying a range of strategies available to them by employing a mixture of compliance promotional strategies, and adjust the mix as required.

  • PDF

The Legal Study of Prohibited Items on Aeroplane for the Aircraft Safety and Security (항공안전보장.질서유지를 위한 항공기반입금지 물품 관리.감독에 관한 입법적 개선방안)

  • Chang, In-Ho
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.29 no.1
    • /
    • pp.33-66
    • /
    • 2014
  • While the numbers of overseas travelers has been increased rapidly each year, the numbers of passengers in the aircraft also has continued to be increased gradually. In the mist of these increasing numbers, such accidents as threatening an aircraft safety like riot, aircraft hijacking and terrorism have happened constantly. In these circumstances, South Korean government has prescribed "Aviation on Security Act" in accordance with the Convention on International Civil Aviation and other international agreements. This act aims to prevent illegal activities and illegal items on the aircraft to ensure the safety and security of civil aviation. However, this act is not sufficiently regulating all the illegal crimes and illegal items on the flight. For the worse, there is a lack of effective supervisory capacity. Likewise, the inherent problems of the current laws relating to the prevention of the illegal items on the aircraft are appearing on the surface continually. Above all, illegal items on the aircraft are directly connected to the issue of aviation safety and security as well as a safe utilization of the flight service. Thus, when there occurs a serious accident on board, it surely would be led to a huge economic loss not mentioning the loss of lives following the accident. Therefore safety of the flight passengers cannot be guaranteed without ensuring the safety of aircraft facilities and good supervisory mechanism of illegal items on the aircraft. Accordingly, establishing a safe operation order tends to influence economy and tourism of a country in no small measure. Therefore, it is an urgent issue to settle down a reasonable and adequate supervisory regulations regarding the prevention of the illegal items on the aircraft. Consequently, in this article, I studied on a reasonal and effective mechanism to control the prevention of the illegal items and illegal acts on the aircraft in order to ensure a safety and security of civil aircraft.

A Study on the Florence Renaissance and the Medici's Libraries (피렌체 르네상스와 메디치가 도서관 연구)

  • Yoon, Hee-Yoon
    • Journal of Korean Library and Information Science Society
    • /
    • v.53 no.3
    • /
    • pp.73-94
    • /
    • 2022
  • Florence is the cradle of the Italian Renaissance. It is the result of a combination of medieval humanists' exploration of ancient Greek and Roman knowledge and culture, the leadership of great monarchs and priests, patronage of the Medici family, etc., free-thinking and creativity of artists, and critical consciousness and cultural needs of citizens. However, the Florentine Renaissance could not have blossomed unless the Medici family had collected ancient manuscripts and translations, and built libraries to preserve and provide literature. Based on this logical basis, this study outlined the Florentine renaissance and historic libraries, analyzed the collection and composition of favorite books of the Medici family, and traced the architectural characteristics and metaphors of the Medici libraries, The San Marco Library (Michelozzo Library), Library of Badia Fiesolana, and the San Lorenzo Library (Laurentian Library) were the priming and birthplace of the Florentine Renaissance despite of many difficulties, including earthquake, fire, restoration, transfer, seizure, and closure. In particular, the San Marco Library, which was opened in 1444 based on the financial support of Cosimo de' Medici, Michelozzo's design, and Niccoli's private collections was the first common library in the Renaissance period. And the architectural highlight of the Laurentian Library, which opened in 1571 under the leadership of Giulio (Papa Clemente VII), is Michelangelo's staircase, which symbolizes 'from ignorance to wisdom', and the real value of the content is the ancient manuscripts and early printed books, which were collected by the humanist Niccoli and the Medici family. In short, when discussing the Florentine Renaissance, Medici's collection and historic libraries are very important points. The reason is that the ancient collections were not stuffed products, but syntactic semiotics, and the libraries are telescopes that view the history of human knowledge and culture and microscopes that create knowledge and wisdom. If records dominate memories, libraries accumulate records. Therefore, long breathing and time capsule strategies are also required for the development and preservation of retroactive books in domestic libraries with a relatively long history.