• Title/Summary/Keyword: Access System

Search Result 6,608, Processing Time 0.033 seconds

Location Service Modeling of Distributed GIS for Replication Geospatial Information Object Management (중복 지리정보 객체 관리를 위한 분산 지리정보 시스템의 위치 서비스 모델링)

  • Jeong, Chang-Won;Lee, Won-Jung;Lee, Jae-Wan;Joo, Su-Chong
    • The KIPS Transactions:PartD
    • /
    • v.13D no.7 s.110
    • /
    • pp.985-996
    • /
    • 2006
  • As the internet technologies develop, the geographic information system environment is changing to the web-based service. Since geospatial information of the existing Web-GIS services were developed independently, there is no interoperability to support diverse map formats. In spite of the same geospatial information object it can be used for various proposes that is duplicated in GIS separately. It needs intelligent strategies for optimal replica selection, which is identification of replication geospatial information objects. And for management of replication objects, OMG, GLOBE and GRID computing suggested related frameworks. But these researches are not thorough going enough in case of geospatial information object. This paper presents a model of location service, which is supported for optimal selection among replication and management of replication objects. It is consist of tree main services. The first is binding service which can save names and properties of object defined by users according to service offers and enable clients to search them on the service of offers. The second is location service which can manage location information with contact records. And obtains performance information by the Load Sharing Facility on system independently with contact address. The third is intelligent selection service which can obtain basic/performance information from the binding service/location service and provide both faster access and better performance characteristics by rules as intelligent model based on rough sets. For the validity of location service model, this research presents the processes of location service execution with Graphic User Interface.

Curricula Innovation Study for the Advancement of Allied Health Sciences Education through the Current Junior College System (전문대학(專門大學)의 학제(學制) 다양화(多樣化)를 통한 보건계(保健系) 학과(學科)의 계속교육과정(繼續敎育課程) 개발(開發)에 관한 연구(硏究))

  • Choi, Jong-Hak;Whang, Sun-Chul;Rhim, Kook-Hwan;Ham, Yong-Woon;Kim, You-Hyun
    • Journal of radiological science and technology
    • /
    • v.19 no.1
    • /
    • pp.95-120
    • /
    • 1996
  • College level educational training system for the allied health manpower in the country is one of the oldest junior college education programs, and has been developed at very steady phase. Since the school years of the programs limited for 2 to 3 years by the education related law, qualification of the manpower is insufficient to meet the rapidly changing needs in the field of allied health and medicine. The system is comparable with that of developed countries where 4-year baccalaureate degree programs are basically required to be an allied health personnel. Thus, education and training background of allied health program graduates of the country confronts the barriers in competition and cooperation with the graduates of foreign countries at equal basis. Beside, junior college graduates can hardly find the way through advanced courses at 4-year colleges in their specialties except a few programs such as environmental sicience or courses in hygiene. It has long been sought to develop the education and training programs for junior college graduates. Some of them are already materilized and some show remarkable progress while some need to tackle. Wide opening of the opportunity to enroll extensive education program for the junior college graduates of allied health science majors in 4-year colleges with eventual grant of bachelor's degree for those who successfully completed the programs should soon be substantiated. The study was focused to emphasize the necessity of the extensive education and training for the junior college graduate allied health manpower, and to show possibility of the education program development in connection with the 4-year degree granting education programs. The outcome of the study can be summarized as followings. 1. A total number of graduates from eight allied health sciences related programs of junior colleges by the year of 1995 are 109,320. 2. According to the survey report analysed through questionnaires, 99.7% of respondents including administrative deans and professors of junior colleges agreed with the establishment of extensive education and training programs in junior colleges. 53.9% of administrative deans, 52.9% of professors and 47.6% of the graduates expected that it is possible to learn more about their majors, and to earn bachelor's degree through the extensive education programs. Other opinions include that the programs can provide supplementary opportunities to fortify in the area of basic life science, and development of research and technology. 3. It was also found through the survey that 91.2% of the deans, 87.8% of the professors and 68.2% of the graduates responded that the most appropriate organizations to open the extensive education and training programs for allied health manpower are junior colleges where allied health personnel are taught and trained. The majority of the respondents agreed that the acceptable number of credits offered for the previous 2-year junior college graduates are $50\sim60$, and those for the current 3-year graduates are $20\sim30$ units. 4. It was strongly suggested through the survey that baccalaureate degree should be granted for those who successfully completed the extensive courses. The suggestion was claimed by 94.1% of the deans, 89.4% of the professors and 83.4% of the graduates. 5. The model curricula for the extensive education and training programs for the allied health manpower are designed for the purpose of broad capability in practice, enrichment of knowledge and promotion of proficiency for the self access in the major areas. 6. To meet the universal standards of allied health education and training program, it is recommended that opening of the curricula for the extensive, and as well as intensive, courses within junior colleges(continuation education institute) should be materialized. The special baccalaureate degree programs within junior colleges are also recommended to accommodate the junior college graduates and to grant the degree fellowing successful completion of the courses. As a part of the education revolution in progress, the school years at junior college level should be flexible depending upon the nature of course and trend of the universe. For instance, the school years for the allied health manpower should be extended to two to four years from current two to three years.

  • PDF

Impact of Net-Based Customer Service on Firm Profits and Consumer Welfare (기업의 온라인 고객 서비스가 기업의 수익 및 고객의 후생에 미치는 영향에 관한 연구)

  • Kim, Eun-Jin;Lee, Byung-Tae
    • Asia pacific journal of information systems
    • /
    • v.17 no.2
    • /
    • pp.123-137
    • /
    • 2007
  • The advent of the Internet and related Web technologies has created an easily accessible link between a firm and its customers, and has provided opportunities to a firm to use information technology to support supplementary after-sale services associated with a product or service. It has been widely recognized that supplementary services are an important source of customer value and of competitive advantage as the characteristics of the product itself. Many of these supplementary services are information-based and need not be co-located with the product, so more and more companies are delivering these services electronically. Net-based customer service, which is defined as an Internet-based computerized information system that delivers services to a customer, therefore, is the core infrastructure for supplementary service provision. The importance of net-based customer service in delivering supplementary after-sale services associated with product has been well documented. The strategic advantages of well-implemented net-based customer service are enhanced customer loyalty and higher lock-in of customers, and a resulting reduction in competition and the consequent increase in profits. However, not all customers utilize such net-based customer service. The digital divide is the phenomenon in our society that captures the observation that not all customers have equal access to computers. Socioeconomic factors such as race, gender, and education level are strongly related to Internet accessibility and ability to use. This is due to the differences in the ability to bear the cost of a computer, and the differences in self-efficacy in the use of a technology, among other reasons. This concept, applied to e-commerce, has been called the "e-commerce divide." High Internet penetration is not eradicating the digital divide and e-commerce divide as one would hope. Besides, to accommodate personalized support, a customer must often provide personal information to the firm. This personal information includes not only name and address, but also preferences information and perhaps valuation information. However, many recent studies show that consumers may not be willing to share information about themselves due to concerns about privacy online. Due to the e-commerce divide, and due to privacy and security concerns of the customer for sharing personal information with firms, limited numbers of customers adopt net-based customer service. The limited level of customer adoption of net-based customer service affects the firm profits and the customers' welfare. We use a game-theoretic model in which we model the net-based customer service system as a mechanism to enhance customers' loyalty. We model a market entry scenario where a firm (the incumbent) uses the net-based customer service system in inducing loyalty in its customer base. The firm sells one product through the traditional retailing channels and at a price set for these channels. Another firm (the entrant) enters the market, and having observed the price of the incumbent firm (and after deducing the loyalty levels in the customer base), chooses its price. The profits of the firms and the surplus of the two customers segments (the segment that utilizes net-based customer service and the segment that does not) are analyzed in the Stackelberg leader-follower model of competition between the firms. We find that an increase in adoption of net-based customer service by the customer base is not always desirable for firms. With low effectiveness in enhancing customer loyalty, firms prefer a high level of customer adoption of net-based customer service, because an increase in adoption rate decreases competition and increases profits. A firm in an industry where net-based customer service is highly effective loyalty mechanism, on the other hand, prefers a low level of adoption by customers.

Performance Optimization of Numerical Ocean Modeling on Cloud Systems (클라우드 시스템에서 해양수치모델 성능 최적화)

  • JUNG, KWANGWOOG;CHO, YANG-KI;TAK, YONG-JIN
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.27 no.3
    • /
    • pp.127-143
    • /
    • 2022
  • Recently, many attempts to run numerical ocean models in cloud computing environments have been tried actively. A cloud computing environment can be an effective means to implement numerical ocean models requiring a large-scale resource or quickly preparing modeling environment for global or large-scale grids. Many commercial and private cloud computing systems provide technologies such as virtualization, high-performance CPUs and instances, ether-net based high-performance-networking, and remote direct memory access for High Performance Computing (HPC). These new features facilitate ocean modeling experimentation on commercial cloud computing systems. Many scientists and engineers expect cloud computing to become mainstream in the near future. Analysis of the performance and features of commercial cloud services for numerical modeling is essential in order to select appropriate systems as this can help to minimize execution time and the amount of resources utilized. The effect of cache memory is large in the processing structure of the ocean numerical model, which processes input/output of data in a multidimensional array structure, and the speed of the network is important due to the communication characteristics through which a large amount of data moves. In this study, the performance of the Regional Ocean Modeling System (ROMS), the High Performance Linpack (HPL) benchmarking software package, and STREAM, the memory benchmark were evaluated and compared on commercial cloud systems to provide information for the transition of other ocean models into cloud computing. Through analysis of actual performance data and configuration settings obtained from virtualization-based commercial clouds, we evaluated the efficiency of the computer resources for the various model grid sizes in the virtualization-based cloud systems. We found that cache hierarchy and capacity are crucial in the performance of ROMS using huge memory. The memory latency time is also important in the performance. Increasing the number of cores to reduce the running time for numerical modeling is more effective with large grid sizes than with small grid sizes. Our analysis results will be helpful as a reference for constructing the best computing system in the cloud to minimize time and cost for numerical ocean modeling.

Term Mapping Methodology between Everyday Words and Legal Terms for Law Information Search System (법령정보 검색을 위한 생활용어와 법률용어 간의 대응관계 탐색 방법론)

  • Kim, Ji Hyun;Lee, Jong-Seo;Lee, Myungjin;Kim, Wooju;Hong, June Seok
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.3
    • /
    • pp.137-152
    • /
    • 2012
  • In the generation of Web 2.0, as many users start to make lots of web contents called user created contents by themselves, the World Wide Web is overflowing by countless information. Therefore, it becomes the key to find out meaningful information among lots of resources. Nowadays, the information retrieval is the most important thing throughout the whole field and several types of search services are developed and widely used in various fields to retrieve information that user really wants. Especially, the legal information search is one of the indispensable services in order to provide people with their convenience through searching the law necessary to their present situation as a channel getting knowledge about it. The Office of Legislation in Korea provides the Korean Law Information portal service to search the law information such as legislation, administrative rule, and judicial precedent from 2009, so people can conveniently find information related to the law. However, this service has limitation because the recent technology for search engine basically returns documents depending on whether the query is included in it or not as a search result. Therefore, it is really difficult to retrieve information related the law for general users who are not familiar with legal terms in the search engine using simple matching of keywords in spite of those kinds of efforts of the Office of Legislation in Korea, because there is a huge divergence between everyday words and legal terms which are especially from Chinese words. Generally, people try to access the law information using everyday words, so they have a difficulty to get the result that they exactly want. In this paper, we propose a term mapping methodology between everyday words and legal terms for general users who don't have sufficient background about legal terms, and we develop a search service that can provide the search results of law information from everyday words. This will be able to search the law information accurately without the knowledge of legal terminology. In other words, our research goal is to make a law information search system that general users are able to retrieval the law information with everyday words. First, this paper takes advantage of tags of internet blogs using the concept for collective intelligence to find out the term mapping relationship between everyday words and legal terms. In order to achieve our goal, we collect tags related to an everyday word from web blog posts. Generally, people add a non-hierarchical keyword or term like a synonym, especially called tag, in order to describe, classify, and manage their posts when they make any post in the internet blog. Second, the collected tags are clustered through the cluster analysis method, K-means. Then, we find a mapping relationship between an everyday word and a legal term using our estimation measure to select the fittest one that can match with an everyday word. Selected legal terms are given the definite relationship, and the relations between everyday words and legal terms are described using SKOS that is an ontology to describe the knowledge related to thesauri, classification schemes, taxonomies, and subject-heading. Thus, based on proposed mapping and searching methodologies, our legal information search system finds out a legal term mapped with user query and retrieves law information using a matched legal term, if users try to retrieve law information using an everyday word. Therefore, from our research, users can get exact results even if they do not have the knowledge related to legal terms. As a result of our research, we expect that general users who don't have professional legal background can conveniently and efficiently retrieve the legal information using everyday words.

Context Sharing Framework Based on Time Dependent Metadata for Social News Service (소셜 뉴스를 위한 시간 종속적인 메타데이터 기반의 컨텍스트 공유 프레임워크)

  • Ga, Myung-Hyun;Oh, Kyeong-Jin;Hong, Myung-Duk;Jo, Geun-Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.39-53
    • /
    • 2013
  • The emergence of the internet technology and SNS has increased the information flow and has changed the way people to communicate from one-way to two-way communication. Users not only consume and share the information, they also can create and share it among their friends across the social network service. It also changes the Social Media behavior to become one of the most important communication tools which also includes Social TV. Social TV is a form which people can watch a TV program and at the same share any information or its content with friends through Social media. Social News is getting popular and also known as a Participatory Social Media. It creates influences on user interest through Internet to represent society issues and creates news credibility based on user's reputation. However, the conventional platforms in news services only focus on the news recommendation domain. Recent development in SNS has changed this landscape to allow user to share and disseminate the news. Conventional platform does not provide any special way for news to be share. Currently, Social News Service only allows user to access the entire news. Nonetheless, they cannot access partial of the contents which related to users interest. For example user only have interested to a partial of the news and share the content, it is still hard for them to do so. In worst cases users might understand the news in different context. To solve this, Social News Service must provide a method to provide additional information. For example, Yovisto known as an academic video searching service provided time dependent metadata from the video. User can search and watch partial of video content according to time dependent metadata. They also can share content with a friend in social media. Yovisto applies a method to divide or synchronize a video based whenever the slides presentation is changed to another page. However, we are not able to employs this method on news video since the news video is not incorporating with any power point slides presentation. Segmentation method is required to separate the news video and to creating time dependent metadata. In this work, In this paper, a time dependent metadata-based framework is proposed to segment news contents and to provide time dependent metadata so that user can use context information to communicate with their friends. The transcript of the news is divided by using the proposed story segmentation method. We provide a tag to represent the entire content of the news. And provide the sub tag to indicate the segmented news which includes the starting time of the news. The time dependent metadata helps user to track the news information. It also allows them to leave a comment on each segment of the news. User also may share the news based on time metadata as segmented news or as a whole. Therefore, it helps the user to understand the shared news. To demonstrate the performance, we evaluate the story segmentation accuracy and also the tag generation. For this purpose, we measured accuracy of the story segmentation through semantic similarity and compared to the benchmark algorithm. Experimental results show that the proposed method outperforms benchmark algorithms in terms of the accuracy of story segmentation. It is important to note that sub tag accuracy is the most important as a part of the proposed framework to share the specific news context with others. To extract a more accurate sub tags, we have created stop word list that is not related to the content of the news such as name of the anchor or reporter. And we applied to framework. We have analyzed the accuracy of tags and sub tags which represent the context of news. From the analysis, it seems that proposed framework is helpful to users for sharing their opinions with context information in Social media and Social news.

APPLICATION OF FUZZY SET THEORY IN SAFEGUARDS

  • Fattah, A.;Nishiwaki, Y.
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.1051-1054
    • /
    • 1993
  • The International Atomic Energy Agency's Statute in Article III.A.5 allows it“to establish and administer safeguards designed to ensure that special fissionable and other materials, services, equipment, facilities and information made available by the Agency or at its request or under its supervision or control are not used in such a way as to further any military purpose; and to apply safeguards, at the request of the parties, to any bilateral or multilateral arrangement, or at the request of a State, to any of that State's activities in the field of atomic energy”. Safeguards are essentially a technical means of verifying the fulfilment of political obligations undertaken by States and given a legal force in international agreements relating to the peaceful uses of nuclear energy. The main political objectives are: to assure the international community that States are complying with their non-proliferation and other peaceful undertakings; and to deter (a) the diversion of afeguarded nuclear materials to the production of nuclear explosives or for military purposes and (b) the misuse of safeguarded facilities with the aim of producing unsafeguarded nuclear material. It is clear that no international safeguards system can physically prevent diversion. The IAEA safeguards system is basically a verification measure designed to provide assurance in those cases in which diversion has not occurred. Verification is accomplished by two basic means: material accountancy and containment and surveillance measures. Nuclear material accountancy is the fundamental IAEA safeguards mechanism, while containment and surveillance serve as important complementary measures. Material accountancy refers to a collection of measurements and other determinations which enable the State and the Agency to maintain a current picture of the location and movement of nuclear material into and out of material balance areas, i. e. areas where all material entering or leaving is measurab e. A containment measure is one that is designed by taking advantage of structural characteristics, such as containers, tanks or pipes, etc. To establish the physical integrity of an area or item by preventing the undetected movement of nuclear material or equipment. Such measures involve the application of tamper-indicating or surveillance devices. Surveillance refers to both human and instrumental observation aimed at indicating the movement of nuclear material. The verification process consists of three over-lapping elements: (a) Provision by the State of information such as - design information describing nuclear installations; - accounting reports listing nuclear material inventories, receipts and shipments; - documents amplifying and clarifying reports, as applicable; - notification of international transfers of nuclear material. (b) Collection by the IAEA of information through inspection activities such as - verification of design information - examination of records and repo ts - measurement of nuclear material - examination of containment and surveillance measures - follow-up activities in case of unusual findings. (c) Evaluation of the information provided by the State and of that collected by inspectors to determine the completeness, accuracy and validity of the information provided by the State and to resolve any anomalies and discrepancies. To design an effective verification system, one must identify possible ways and means by which nuclear material could be diverted from peaceful uses, including means to conceal such diversions. These theoretical ways and means, which have become known as diversion strategies, are used as one of the basic inputs for the development of safeguards procedures, equipment and instrumentation. For analysis of implementation strategy purposes, it is assumed that non-compliance cannot be excluded a priori and that consequently there is a low but non-zero probability that a diversion could be attempted in all safeguards ituations. An important element of diversion strategies is the identification of various possible diversion paths; the amount, type and location of nuclear material involved, the physical route and conversion of the material that may take place, rate of removal and concealment methods, as appropriate. With regard to the physical route and conversion of nuclear material the following main categories may be considered: - unreported removal of nuclear material from an installation or during transit - unreported introduction of nuclear material into an installation - unreported transfer of nuclear material from one material balance area to another - unreported production of nuclear material, e. g. enrichment of uranium or production of plutonium - undeclared uses of the material within the installation. With respect to the amount of nuclear material that might be diverted in a given time (the diversion rate), the continuum between the following two limiting cases is cons dered: - one significant quantity or more in a short time, often known as abrupt diversion; and - one significant quantity or more per year, for example, by accumulation of smaller amounts each time to add up to a significant quantity over a period of one year, often called protracted diversion. Concealment methods may include: - restriction of access of inspectors - falsification of records, reports and other material balance areas - replacement of nuclear material, e. g. use of dummy objects - falsification of measurements or of their evaluation - interference with IAEA installed equipment.As a result of diversion and its concealment or other actions, anomalies will occur. All reasonable diversion routes, scenarios/strategies and concealment methods have to be taken into account in designing safeguards implementation strategies so as to provide sufficient opportunities for the IAEA to observe such anomalies. The safeguards approach for each facility will make a different use of these procedures, equipment and instrumentation according to the various diversion strategies which could be applicable to that facility and according to the detection and inspection goals which are applied. Postulated pathways sets of scenarios comprise those elements of diversion strategies which might be carried out at a facility or across a State's fuel cycle with declared or undeclared activities. All such factors, however, contain a degree of fuzziness that need a human judgment to make the ultimate conclusion that all material is being used for peaceful purposes. Safeguards has been traditionally based on verification of declared material and facilities using material accountancy as a fundamental measure. The strength of material accountancy is based on the fact that it allows to detect any diversion independent of the diversion route taken. Material accountancy detects a diversion after it actually happened and thus is powerless to physically prevent it and can only deter by the risk of early detection any contemplation by State authorities to carry out a diversion. Recently the IAEA has been faced with new challenges. To deal with these, various measures are being reconsidered to strengthen the safeguards system such as enhanced assessment of the completeness of the State's initial declaration of nuclear material and installations under its jurisdiction enhanced monitoring and analysis of open information and analysis of open information that may indicate inconsistencies with the State's safeguards obligations. Precise information vital for such enhanced assessments and analyses is normally not available or, if available, difficult and expensive collection of information would be necessary. Above all, realistic appraisal of truth needs sound human judgment.

  • PDF

Intelligent Brand Positioning Visualization System Based on Web Search Traffic Information : Focusing on Tablet PC (웹검색 트래픽 정보를 활용한 지능형 브랜드 포지셔닝 시스템 : 태블릿 PC 사례를 중심으로)

  • Jun, Seung-Pyo;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.93-111
    • /
    • 2013
  • As Internet and information technology (IT) continues to develop and evolve, the issue of big data has emerged at the foreground of scholarly and industrial attention. Big data is generally defined as data that exceed the range that can be collected, stored, managed and analyzed by existing conventional information systems and it also refers to the new technologies designed to effectively extract values from such data. With the widespread dissemination of IT systems, continual efforts have been made in various fields of industry such as R&D, manufacturing, and finance to collect and analyze immense quantities of data in order to extract meaningful information and to use this information to solve various problems. Since IT has converged with various industries in many aspects, digital data are now being generated at a remarkably accelerating rate while developments in state-of-the-art technology have led to continual enhancements in system performance. The types of big data that are currently receiving the most attention include information available within companies, such as information on consumer characteristics, information on purchase records, logistics information and log information indicating the usage of products and services by consumers, as well as information accumulated outside companies, such as information on the web search traffic of online users, social network information, and patent information. Among these various types of big data, web searches performed by online users constitute one of the most effective and important sources of information for marketing purposes because consumers search for information on the internet in order to make efficient and rational choices. Recently, Google has provided public access to its information on the web search traffic of online users through a service named Google Trends. Research that uses this web search traffic information to analyze the information search behavior of online users is now receiving much attention in academia and in fields of industry. Studies using web search traffic information can be broadly classified into two fields. The first field consists of empirical demonstrations that show how web search information can be used to forecast social phenomena, the purchasing power of consumers, the outcomes of political elections, etc. The other field focuses on using web search traffic information to observe consumer behavior, identifying the attributes of a product that consumers regard as important or tracking changes on consumers' expectations, for example, but relatively less research has been completed in this field. In particular, to the extent of our knowledge, hardly any studies related to brands have yet attempted to use web search traffic information to analyze the factors that influence consumers' purchasing activities. This study aims to demonstrate that consumers' web search traffic information can be used to derive the relations among brands and the relations between an individual brand and product attributes. When consumers input their search words on the web, they may use a single keyword for the search, but they also often input multiple keywords to seek related information (this is referred to as simultaneous searching). A consumer performs a simultaneous search either to simultaneously compare two product brands to obtain information on their similarities and differences, or to acquire more in-depth information about a specific attribute in a specific brand. Web search traffic information shows that the quantity of simultaneous searches using certain keywords increases when the relation is closer in the consumer's mind and it will be possible to derive the relations between each of the keywords by collecting this relational data and subjecting it to network analysis. Accordingly, this study proposes a method of analyzing how brands are positioned by consumers and what relationships exist between product attributes and an individual brand, using simultaneous search traffic information. It also presents case studies demonstrating the actual application of this method, with a focus on tablets, belonging to innovative product groups.

A Study on the System of Aircraft Investigation (항공기(航空機) 사고조사제도(事故調査制度)에 관한 연구(硏究))

  • Kim, Doo-Hwan
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.9
    • /
    • pp.85-143
    • /
    • 1997
  • The main purpose of the investigation of an accident caused by aircraft is to be prevented the sudden and casual accidents caused by wilful misconduct and fault from pilots, air traffic controllers, hijack, trouble of engine and machinery of aircraft, turbulence during the bad weather, collision between birds and aircraft, near miss flight by aircrafts etc. It is not the purpose of this activity to apportion blame or liability for offender of aircraft accidents. Accidents to aircraft, especially those involving the general public and their property, are a matter of great concern to the aviation community. The system of international regulation exists to improve safety and minimize, as far as possible, the risk of accidents but when they do occur there is a web of systems and procedures to investigate and respond to them. I would like to trace the general line of regulation from an international source in the Chicago Convention of 1944. Article 26 of the Convention lays down the basic principle for the investigation of the aircraft accident. Where there has been an accident to an aircraft of a contracting state which occurs in the territory of another contracting state and which involves death or serious injury or indicates serious technical defect in the aircraft or air navigation facilities, the state in which the accident occurs must institute an inquiry into the circumstances of the accident. That inquiry will be in accordance, in so far as its law permits, with the procedure which may be recommended from time to time by the International Civil Aviation Organization ICAO). There are very general provisions but they state two essential principles: first, in certain circumstances there must be an investigation, and second, who is to be responsible for undertaking that investigation. The latter is an important point to establish otherwise there could be at least two states claiming jurisdiction on the inquiry. The Chicago Convention also provides that the state where the aircraft is registered is to be given the opportunity to appoint observers to be present at the inquiry and the state holding the inquiry must communicate the report and findings in the matter to that other state. It is worth noting that the Chicago Convention (Article 25) also makes provision for assisting aircraft in distress. Each contracting state undertakes to provide such measures of assistance to aircraft in distress in its territory as it may find practicable and to permit (subject to control by its own authorities) the owner of the aircraft or authorities of the state in which the aircraft is registered, to provide such measures of assistance as may be necessitated by circumstances. Significantly, the undertaking can only be given by contracting state but the duty to provide assistance is not limited to aircraft registered in another contracting state, but presumably any aircraft in distress in the territory of the contracting state. Finally, the Convention envisages further regulations (normally to be produced under the auspices of ICAO). In this case the Convention provides that each contracting state, when undertaking a search for missing aircraft, will collaborate in co-ordinated measures which may be recommended from time to time pursuant to the Convention. Since 1944 further international regulations relating to safety and investigation of accidents have been made, both pursuant to Chicago Convention and, in particular, through the vehicle of the ICAO which has, for example, set up an accident and reporting system. By requiring the reporting of certain accidents and incidents it is building up an information service for the benefit of member states. However, Chicago Convention provides that each contracting state undertakes collaborate in securing the highest practicable degree of uniformity in regulations, standards, procedures and organization in relation to aircraft, personnel, airways and auxiliary services in all matters in which such uniformity will facilitate and improve air navigation. To this end, ICAO is to adopt and amend from time to time, as may be necessary, international standards and recommended practices and procedures dealing with, among other things, aircraft in distress and investigation of accidents. Standards and Recommended Practices for Aircraft Accident Injuries were first adopted by the ICAO Council on 11 April 1951 pursuant to Article 37 of the Chicago Convention on International Civil Aviation and were designated as Annex 13 to the Convention. The Standards Recommended Practices were based on Recommendations of the Accident Investigation Division at its first Session in February 1946 which were further developed at the Second Session of the Division in February 1947. The 2nd Edition (1966), 3rd Edition, (1973), 4th Edition (1976), 5th Edition (1979), 6th Edition (1981), 7th Edition (1988), 8th Edition (1992) of the Annex 13 (Aircraft Accident and Incident Investigation) of the Chicago Convention was amended eight times by the ICAO Council since 1966. Annex 13 sets out in detail the international standards and recommended practices to be adopted by contracting states in dealing with a serious accident to an aircraft of a contracting state occurring in the territory of another contracting state, known as the state of occurrence. It provides, principally, that the state in which the aircraft is registered is to be given the opportunity to appoint an accredited representative to be present at the inquiry conducted by the state in which the serious aircraft accident occurs. Article 26 of the Chicago Convention does not indicate what the accredited representative is to do but Annex 13 amplifies his rights and duties. In particular, the accredited representative participates in the inquiry by visiting the scene of the accident, examining the wreckage, questioning witnesses, having full access to all relevant evidence, receiving copies of all pertinent documents and making submissions in respect of the various elements of the inquiry. The main shortcomings of the present system for aircraft accident investigation are that some contracting sates are not applying Annex 13 within its express terms, although they are contracting states. Further, and much more important in practice, there are many countries which apply the letter of Annex 13 in such a way as to sterilise its spirit. This appears to be due to a number of causes often found in combination. Firstly, the requirements of the local law and of the local procedures are interpreted and applied so as preclude a more efficient investigation under Annex 13 in favour of a legalistic and sterile interpretation of its terms. Sometimes this results from a distrust of the motives of persons and bodies wishing to participate or from commercial or related to matters of liability and bodies. These may be political, commercial or related to matters of liability and insurance. Secondly, there is said to be a conscious desire to conduct the investigation in some contracting states in such a way as to absolve from any possibility of blame the authorities or nationals, whether manufacturers, operators or air traffic controllers, of the country in which the inquiry is held. The EEC has also had an input into accidents and investigations. In particular, a directive was issued in December 1980 encouraging the uniformity of standards within the EEC by means of joint co-operation of accident investigation. The sharing of and assisting with technical facilities and information was considered an important means of achieving these goals. It has since been proposed that a European accident investigation committee should be set up by the EEC (Council Directive 80/1266 of 1 December 1980). After I would like to introduce the summary of the legislation examples and system for aircraft accidents investigation of the United States, the United Kingdom, Canada, Germany, The Netherlands, Sweden, Swiss, New Zealand and Japan, and I am going to mention the present system, regulations and aviation act for the aircraft accident investigation in Korea. Furthermore I would like to point out the shortcomings of the present system and regulations and aviation act for the aircraft accident investigation and then I will suggest my personal opinion on the new and dramatic innovation on the system for aircraft accident investigation in Korea. I propose that it is necessary and desirable for us to make a new legislation or to revise the existing aviation act in order to establish the standing and independent Committee of Aircraft Accident Investigation under the Korean Government.

  • PDF

An Overview of Readjustment Measures Against the Banking Industry's Non-Performing Loans (은행부실채권(銀行不實債權) 정리방안(整理方案)에 대한 고찰(考察))

  • Kim, Joon-kyung
    • KDI Journal of Economic Policy
    • /
    • v.13 no.1
    • /
    • pp.35-63
    • /
    • 1991
  • Currently, Korea's banking industry holds a sizable amount of non-performing loans which stem from the government-led bailout of many troubled firms in the 1980s. Although this burden was somewhat relieved with the aid of banks' recapitalization in the booming securities market between 1986-88, the insolvent credits still resulted in low profitability in the banking sector and have been detrimental to the progress of financial liberalization and internationalization. This paper surveys the corporate bailout experiences of major advanced countries and Korea in the past and derives a rationale for readjustment measures against non-performing loans, in which rescue plans depend on the nature of the financial system. Considering the features of Korea's financial system and the banking sector's recent performance, it discusses possible means of liquidation in keeping with the rationale. The conflict of interests among parties involved in non-performing loans is widely known as one of the major constraints in writing off the loans. Specifically, in the case of Korea, the government's excessive intervention in allocating credits has preempted the legitimate role of the banking sector, which now only passively manages its past loans, and has implicitly confused private with public risk. This paper argues that to minimize the incidence of insolvent loan readjustment, the government's role should be reduced and that the correspondent banks should be more active in the liquidation process, through the market mechanism, reflecting their access to detailed information on the troubled firms. One solution is that banks, after classifying the insolvent loans by the lateness or possibility of repayment, would swap the relatively sound loans for preferred stock and gradually write off the bad ones by expanding the banks' retained earnings and revaluing the banks' assets. Specifically, the debt-equity swap can benefit both creditors and debtors in the sense that it raises the liquidity and profitability of bank assets and strengthens the debtor's financial structure by easing the debt service burden. Such a creditor-led or market-led solution improves the financial strength and autonomy of the banking sector, thereby fostering more efficient resource allocation and risk sharing.

  • PDF