• Title/Summary/Keyword: Breach Process

Search Result 55, Processing Time 0.021 seconds

A Study on the Ritual of Exorcism Play and Mask Play - Based on Victor Turner's theory of social drama (굿놀이와 탈놀이의 제의성 고찰 -빅터 터너(V. Turner)의 사회극 이론을 바탕으로)

  • Yang, Jin-Young
    • (The) Research of the performance art and culture
    • /
    • no.39
    • /
    • pp.581-607
    • /
    • 2019
  • Noting that exorcism play and mask play are different in their ritual nature, this paper aims to examine their ritual through the social drama theory of Victor Turner, a cultural anthropologist. Turner views every incident in human history as a social drama and interprets it based on the four-step structural theory of breach, crisis, redressive action, and reintegration. In particular, he believes that the redressive phase takes place through a ritual solution rather than a legal or political solution in the village community. Based on such Turner's theory, Chapter 2 analyzes Yeonggamnori, Jeju's typical exorcism play, and explains the process leading to reintegration in accordance with peaceful ritual. Chapter 3 then analyzes the Puppet Play on the same principle and examines that redressive action is being resolved through a sacrificial ritual in the case of this play. Chapter 4 checks whether the results from the previous two plays show similar aspects in other traditional plays. To this end, the exorcism play will be analyzed for Jeju's Seocheon Flower Play, Junsangnori, Segyeongnori and Sanshinnori, while the mask play will include Bongsan Mask Dance, Yangju Byeonsandae Play, Goseong Ogwangdae and Hahoe Mask Dance. As a result of these studies, it is the main point of the study to prove that exorcism play and mask play are different in their ritual nature. However, this research is only in the stage of seeking differences in its ritual, and the review on the historical and social causes of differences is left as a research task at a later date.

Windows 7 Operating System Event based Visual Incident Analysis System (윈도우즈 7 운영체제 이벤트에 대한 시각적 침해사고 분석 시스템)

  • Lee, Hyung-Woo
    • Journal of Digital Convergence
    • /
    • v.10 no.5
    • /
    • pp.223-232
    • /
    • 2012
  • Recently, the leakage of personal information and privacy piracy increase. The victimized case of the malicious object rapidlies increase. Most of users use the windows operating system. Recently, the Windows 7 operating system was announced. Therefore, we need to study for the intrusion response technique at the next generation operate system circumstances. The accident response technique developed till now was mostly implemented around the Windows XP or the Windows Vista. However, a new vulnerability problem will be happen in the breach process of reaction as the Windows 7 operating system is announced. In the windows operating system, the system incident event needs to be efficiently analyzed. For this, the event information generated in a system needs to be visually analyzed around the time information or the security threat weight information. Therefore, in this research, we analyzed visually about the system event information generated in the Windows 7 operating system. And the system analyzing the system incident through the visual event information analysis process was designed and implemented. In case of using the system developed in this study the more efficient accident analysis is expected to be possible.

Preliminary Study on the Development of Alternative Methods for the Treatment of TRISO Fuels (TRISO 연료 대체 처리방법 개발에 관한 선행연구)

  • Lee Jong-Hyeon;Shim Joon-Bo;Ahn Byung-Gil;Kwon Sang-Woon;Kim Eung-Ho;Yoo Jae-Hyung;Park Seong-Won;Snyder Christine T.;Leibowitz Leonard
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.3 no.3
    • /
    • pp.201-211
    • /
    • 2005
  • In this study, conventional head-end processes of spent TRISO fuel have been reviewed to develope more effective treatment methods. The main concerns in the TRISO treatment are to effectively separate the carbon and SiC contained in the TRISO particles. The crush-burn scheme which was considered in the early stages of the development has been replaced by the crush-leach process because of $^{14}C$ problems as a second waste being generated during the process. However, there are still many obstacles to overcome in the reported processes. Hence, innovative thermomechanical concepts and a molten salt electrochemical approach to breach the coating layers of the TRISO particle with a minimized amount of second waste are proposed in this paper and their principles are described in detail.

  • PDF

An Administration Model for Causation of the Schedule Delays in Construction Projects (건설공사 공기연장사유 관리모델)

  • Kim, Jong-Han;Kim, Kyung-Rai
    • Korean Journal of Construction Engineering and Management
    • /
    • v.8 no.3
    • /
    • pp.125-133
    • /
    • 2007
  • If project time extension were required in the construction projects, either liquidated damages or extension costs should be applied according to causation of the schedule delays. However, in actual cases it is not applied so far according to the contract conditions. The reason why this situation happened Is that function of the present planning and scheduling is not working feasibly. The CPM schedule could not provide a proper solution for apportioning responsibility for the schedule delays. This situation could be considered as breach of contract and will cause potential disputes for schedule delay. Therefore, in this research process based contract administration model for construction delay claim is proposed to prevent schedule delay and solve the claims. The model is based on pro-active management for causation of delay to provide apportionment of responsibility and written evidences.

Convergence Security Technology of OPC-UA Protocol Gateway based on DPI & Self-Similarity for Smart Factory Network (스마트 팩토리 망에서 DPI와 자기 유사도 기술 기반의 OPC-UA 프로토콜 게이트웨이 융합 보안 기술)

  • Shim, Jae-Yoon;Lee, June-Kyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1305-1311
    • /
    • 2016
  • The smart factory, a combination of ICT technology to the entire production process of a product, means can you intelligent factory is to achieve such reduction and process improvement of the production cost. To implement the smart factory, inevitably must have an internal equipment connections to the external network, this is by equipment which is operated by the existing closure network is exposed to the outside network, the security vulnerability so that gender is increased. In order to solve this problem, it is possible to apply security solutions that are used in normal environments. However, it is impossible to have just completely blocking security threats that can occur in a smart factory network. Further, considering the economic damage that can occur during security breach accident, which cannot be not a serious problem. Therefore, in this paper, a look to know the security measures that can be applied to smart factory, to introduce the main fusion security technology necessary to smart factory dedicated security gateway.

A Study on the Seller's Liability under Article 42(1) of the CISG (CISG 제42조 (1)항의 매도인의 책임에 관한 소고)

  • Heo, Kwang Uk
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.60
    • /
    • pp.47-77
    • /
    • 2013
  • The way for seller to procure the goods for selling is to produce the goods at his own factory and to buy the manufactured goods from the other company. In order to produce the goods for selling the seller have to obtain the resource from the domestic company or overseas. In the middle of producing the goods to sell, seller may breach the right of a third party based on intellectual property rights. That is to say, seller may use the machine that has not itself been patented and use a process which has been patented by a third party. Seller may manufacture the goods which themselves are subject to the third party industrial property rights. Nowadays it is stressed the importance of intellectual property rights such as a patent, brand, and design. These factors consist of the core elements of the competitiveness of the goods. Many embedded software have been used in the various sector. So the disputes regarding to the intellectual property rights is gradually increasing in number. Article 42 of CISG defines the seller's delivery obligations and liabilities in respect to third party intellectual property rights and claims. It contains a special rule for this similar kind of defective in title, which tries to provide an proper solution to the complex problems caused by such rights and claims in international transactions. When seller will apply this clause to the business fields, there are several points to which seller should give attention. First, Intellectual property is general terms in intangible property rights, encompassing both copyright and industrial property. Which matter fall within the scope of intellectual property? The scope of intellectual property can be inferred from the relevant international conventions, which are based on broad international consensus. Second, Article 42 of CISG governs the relationship between the seller and the buyer, that is to say, questions of who has to bear the risk of third party intellectual property rights. The existence of such intellectual property rights, the remedies available and the question of acquiring goods free of an encumbrances in good faith are outside the scope of the CISG. The governing law regarding to the abovementioned matters is needed.

  • PDF

A Study on the ICSID Arbitration Cases for Fair and Equitable Treatment under International Investment Disputes - Focusing on the Protection of the Investor's Legitimate Expectations - (국제투자분쟁에서 공정·공평 대우에 관한 ICSID 중재사례 연구 - 외국인투자자의 정당한 기대 보호를 중심으로 -)

  • HWANG, Ji-Hyeon
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.71
    • /
    • pp.195-216
    • /
    • 2016
  • In determining the content of the FET standard, the tribunals stated protection of investor's legitimate expectations, due process and denial of justice, transparency, discrimination and arbitrariness, good faith, etc. The most major elements of the FET standard is the protection of the investor's legitimate and reasonable expectations. It is necessary to consider whether it is possible to what the expectations of investors are protected as legitimate and it is formed under any circumstances. If host state frustrate investor's legitimate expectations, it found a breach of the FET. The host state's specific assurance may reinforce investor's expectations, but such explicit statement is not always necessary. The host state must preserve a stable environment for investments. However, It must not be understood as the inalterability of the host state's legal framework. It implies that the host state's subsequent changes should be made consistently and predictably. The host state is entitled to exercise a reasonable regulatory authority to respond to changing circumstances in the public purpose. Therefore, whether the violation FET shall be determined through a balanced against the investor's legitimate expectations and the host state's reasonable regulatory exercise in the public interest. And investor should keep in mind that the principle of proportionality is applied unless host state provides stabilization clause or similar commitments to investor. Also host state should establish the basis of an argument about reasonable regulatory authority for public interest.

  • PDF

MOLTEN CORIUM DISPERSION DURING HYPOTHETICAL HIGH-PRESSURE ACCIDENTS IN A NUCLEAR POWER PLANT (원자로 노심 용융물의 고압분출 및 비산 현상에 대한 수치해석적 연구)

  • Kim, Jong-Tae;Kim, Sang-Baik;Kim, Hee-Dong;Jeong, Jae-Sik
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2009.11a
    • /
    • pp.121-128
    • /
    • 2009
  • During a hypothetical high-pressure accident in a nuclear power plant (NPP), molten corium can be ejected through a breach of a reactor pressure vessel (RPV) and dispersed by a following jet of a high-pressure steam in the RPV. The dispersed corium is fragmented into smaller droplets in a reactor cavity of the NPP by the steam jet and released into other compartments of the NPP by a overpressure in the cavity. The fragments of the corium transfer thermal energy to the ambient air in the containment or interact chemically with steam and generate hydrogen which may be burnt in the containment. The thermal loads from the ejected molten corium on the containment which is called direct containment heating (DCH) can threaten the integrity of the containment. DCH in a NPP containment is related to many physical phenomena such as multi-phase hydrodynamics, thermodynamics and chemical process. In the evaluation of the DCH load, the melt dispersion rates depending on the RPV pressure are the most important parameter. Mostly, DCH was evaluated by using lumped-analysis codes with some correlations obtained from experiments for the dispersion rates. In this study, MC3D code was used to evaluate the dispersion rates in the APR1400 NPP during the high-pressure accidents. MC3D is a two-phase analysis code based on Eulerian four-fields for melt jet, melt droplets, gas and water. The dispersion rates of the corium melt depending on the RPV pressure were obtained from the MC3D analyses and the values specific to the APR1400 cavity geometry were compared to a currently available correlation.

  • PDF

A Study on Countermeasures for Personal Data Breach and Security Threats of Social Network Game (소셜 네트워크 게임(SNG) 서비스의 개인정보 유출 및 보안위협 대응방안에 관한 연구)

  • Lee, Sang Won;Kim, Huy Kang;Kim, Eun Jin
    • Journal of Korea Game Society
    • /
    • v.15 no.1
    • /
    • pp.77-88
    • /
    • 2015
  • As the smart phone market is drastically expanding, there is a steady growth of recent vicious activities such as data manipulation, billing fraud, identity theft, and leakage of personal information that are security threats to Social Network Games(SNG). Due to the threats, Strong development standard is required for security enhancement of SNG. Nonetheless, short life-spans, additional expenses, and the necessities to provide a sound game service hinders developers from reaching their security goals. Therefore, this research investigates the weak points of SNG through memory manipulation experiments based on the currently provided SNG services. In addition, the research presents counter measures and security enforcements that are light in service load and simplistic which can be applied in the developing process.

A Study on the Liability of the Builder in the Shipbuilding Contract and Products Liability (선박건조자의 책임과 제조물책임에 관한 연구)

  • Jeong, Seon-Cheol
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.2
    • /
    • pp.21-26
    • /
    • 2006
  • A contract for shipbuilding is usually a complicated process and involves a statement of rights, and obligations and responsibilities to which each party agrees vis-a vis the other. Most countries are now well settled with regard to liability of a manufacturer in tort for physical injury and on the other hand, for pure economic loss to remote owners of chattels. Where there is a breach of either contractual warranty or an implied warranty, there may be admiralty jurisdiction, depending once again on the situs of the event and its relationship to traditional maritime activity. First of all, this thesis deals with the contents of contract under English Law. Secondly, this thesis analyse ' s the liability of shipbuilders in Products Liability under English, United States, German and korean Law comparisons. In conclusion, the author gives some suggestions as countermeasures to Products Liability for the shipbuilders in Korea.

  • PDF