• 제목/요약/키워드: Delay systems

Search Result 2,779, Processing Time 0.026 seconds

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Establishing Optimal Conditions for LED-Based Speed Breeding System in Soybean [Glycine max (L.) Merr.] (LED 기반 콩[Glycine max (L.) Merr.] 세대단축 시스템 구축을 위한 조건 설정)

  • Gyu Tae Park;Ji-Hyun Bae;Ju Seok Lee;Soo-Kwon Park;Dool-Yi Kim;Jung-Kyung Moon;Mi-Suk Seo
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.68 no.4
    • /
    • pp.304-312
    • /
    • 2023
  • Plant breeding is a time-consuming process, mainly due to the limited annual generational advancement. A speed breeding system, using LED light sources, has been applied to accelerate generational progression in various crops. However, detailed protocols applicable to soybeans are still insufficient. In this study, we report the optimized protocols for a speed breeding system comprising 12 soybean varieties with various maturity ecotypes. We investigated the effects of two light qualities (RGB ratio), three levels of light intensity (PPFD), and two soil conditions on the flowering time and development of soybeans. Our results showed that an increase in the red wavelength of the light spectrum led to a delay in flowering time. Furthermore, as light intensity increased, flowering time, average internode length, and plant height decreased, while the number of nodes, branches, and pods increased. When compared to agronomic soil, horticultural soil resulted in an increase of more than 50% in the number of nodes, branches, and pods. Consequently, the optimal conditions were determined as follows: a 10-hour short-day photoperiod, an equal RGB ratio (1:1:1), light intensity exceeding 1,300 PPFD, and the use of horticultural soil. Under these conditions, the average flowering time was found to be 27.3±2.48 days, with an average seed yield of 7.9±2.67. Thus, the speed breeding systems reduced the flowering time by more than 40 days, compared to the average flowering time of Korean soybean resources (approximately 70 days). By using a controlled growth chamber that is unaffected by external environmental conditions, up to 6 generations can be achieved per year. The use of LED illumination and streamlined facilities further contributes to cost savings. This study highlights the substantial potential of integrating modern crop breeding techniques, such as digital breeding and genetic editing, with generational shortening systems to accelerate crop improvement.

Real-Time Scheduling Scheme based on Reinforcement Learning Considering Minimizing Setup Cost (작업 준비비용 최소화를 고려한 강화학습 기반의 실시간 일정계획 수립기법)

  • Yoo, Woosik;Kim, Sungjae;Kim, Kwanho
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.2
    • /
    • pp.15-27
    • /
    • 2020
  • This study starts with the idea that the process of creating a Gantt Chart for schedule planning is similar to Tetris game with only a straight line. In Tetris games, the X axis is M machines and the Y axis is time. It is assumed that all types of orders can be worked without separation in all machines, but if the types of orders are different, setup cost will be incurred without delay. In this study, the game described above was named Gantris and the game environment was implemented. The AI-scheduling table through in-depth reinforcement learning compares the real-time scheduling table with the human-made game schedule. In the comparative study, the learning environment was studied in single order list learning environment and random order list learning environment. The two systems to be compared in this study are four machines (Machine)-two types of system (4M2T) and ten machines-six types of system (10M6T). As a performance indicator of the generated schedule, a weighted sum of setup cost, makespan and idle time in processing 100 orders were scheduled. As a result of the comparative study, in 4M2T system, regardless of the learning environment, the learned system generated schedule plan with better performance index than the experimenter. In the case of 10M6T system, the AI system generated a schedule of better performance indicators than the experimenter in a single learning environment, but showed a bad performance index than the experimenter in random learning environment. However, in comparing the number of job changes, the learning system showed better results than those of the 4M2T and 10M6T, showing excellent scheduling performance.

Performance of Uncompressed Audio Distribution System over Ethernet with a L1/L2 Hybrid Switching Scheme (L1/L2 혼합형 중계 방법을 적용한 이더넷 기반 비압축 오디오 분배 시스템의 성능 분석)

  • Nam, Wie-Jung;Yoon, Chong-Ho;Park, Pu-Sik;Jo, Nam-Hong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.12
    • /
    • pp.108-116
    • /
    • 2009
  • In this paper, we propose a Ethernet based audio distribution system with a new L1/L2 hybrid switching scheme, and evaluate its performance. The proposed scheme not only offers guaranteed low latency and jitter characteristics that are essentially required for the distribution of high-quality uncompressed audio traffic, and but also provide an efficient transmission of data traffic on the Ethernet environment. The audio distribution system with a proposed scheme consists of a master node and a number of relay nodes, and all nodes are mutually connected as a daisy-chain topology through up and downlinks. The master node generates an audio frame for each cycle of 125us, and the audio frame has 24 time slotted audio channels for carrying stereo 24 channels of 16-bit PCM sampled audio. On receiving the audio frame from its upstream node via the downlink, each intermediate node inserts its audio traffic to the reserved time slot for itself, then relays again to next node through its physical layer(L1) transmission - repeating. After reaching the end node, the audio frame is loopbacked through the uplink. On repeating through the uplink, each node makes a copy of audio slot that node has to receive, then play the audio. When the audio transmission is completed, each node works as a normal L2 switch, thus data frames are switched during the remaining period. For supporting this L1/L2 hybrid switching capability, we insert a glue logic for parsing and multiplexing audio and data frames at MII(Media Independent Interlace) between the physical and data link layers. The proposed scheme can provide a good delay performance and transmission efficiency than legacy Ethernet based audio distribution systems. For verifying the feasibility of the proposed L1/L2 hybrid switching scheme, we use OMNeT++ as a simulation tool with various parameters. From the simulation results, one can find that the proposed scheme can provides outstanding characteristics in terms of both jitter characteristic for audio traffic and transmission efficiency of data traffics.

A digital Audio Watermarking Algorithm using 2D Barcode (2차원 바코드를 이용한 오디오 워터마킹 알고리즘)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.97-107
    • /
    • 2011
  • Nowadays there are a lot of issues about copyright infringement in the Internet world because the digital content on the network can be copied and delivered easily. Indeed the copied version has same quality with the original one. So, copyright owners and content provider want a powerful solution to protect their content. The popular one of the solutions was DRM (digital rights management) that is based on encryption technology and rights control. However, DRM-free service was launched after Steve Jobs who is CEO of Apple proposed a new music service paradigm without DRM, and the DRM is disappeared at the online music market. Even though the online music service decided to not equip the DRM solution, copyright owners and content providers are still searching a solution to protect their content. A solution to replace the DRM technology is digital audio watermarking technology which can embed copyright information into the music. In this paper, the author proposed a new audio watermarking algorithm with two approaches. First, the watermark information is generated by two dimensional barcode which has error correction code. So, the information can be recovered by itself if the errors fall into the range of the error tolerance. The other one is to use chirp sequence of CDMA (code division multiple access). These make the algorithm robust to the several malicious attacks. There are many 2D barcodes. Especially, QR code which is one of the matrix barcodes can express the information and the expression is freer than that of the other matrix barcodes. QR code has the square patterns with double at the three corners and these indicate the boundary of the symbol. This feature of the QR code is proper to express the watermark information. That is, because the QR code is 2D barcodes, nonlinear code and matrix code, it can be modulated to the spread spectrum and can be used for the watermarking algorithm. The proposed algorithm assigns the different spread spectrum sequences to the individual users respectively. In the case that the assigned code sequences are orthogonal, we can identify the watermark information of the individual user from an audio content. The algorithm used the Walsh code as an orthogonal code. The watermark information is rearranged to the 1D sequence from 2D barcode and modulated by the Walsh code. The modulated watermark information is embedded into the DCT (discrete cosine transform) domain of the original audio content. For the performance evaluation, I used 3 audio samples, "Amazing Grace", "Oh! Carol" and "Take me home country roads", The attacks for the robustness test were MP3 compression, echo attack, and sub woofer boost. The MP3 compression was performed by a tool of Cool Edit Pro 2.0. The specification of MP3 was CBR(Constant Bit Rate) 128kbps, 44,100Hz, and stereo. The echo attack had the echo with initial volume 70%, decay 75%, and delay 100msec. The sub woofer boost attack was a modification attack of low frequency part in the Fourier coefficients. The test results showed the proposed algorithm is robust to the attacks. In the MP3 attack, the strength of the watermark information is not affected, and then the watermark can be detected from all of the sample audios. In the sub woofer boost attack, the watermark was detected when the strength is 0.3. Also, in the case of echo attack, the watermark can be identified if the strength is greater and equal than 0.5.

On Listening, Reflection and Meditation in Vedānta (베단따의 '듣기·숙고하기·명상하기'(문·사·수)에 관하여)

  • Park, Hyo-yeop
    • Journal of Korean Philosophical Society
    • /
    • v.116
    • /
    • pp.155-180
    • /
    • 2010
  • The three means of listening, reflection and meditation (${\acute{s}}raava{\d{n}}a$, manana and $nididhy{\bar{a}}sana$) which are central devices of practice in $Ved{\bar{a}}nta$ philosophy should be understood not as a continuative step but as a methodological extension on condition of having one and the same purpose. In other words, the three means should be interpreted in a listening-oriented manner, in which the process has to be methodologically extended to reflection and meditation only when the direct knowledge on the reality is not gained in listening. This kind of interpretation can be more justified by displaying significant characteristics of Indian philosophy implied in the three means. It can be easily said that $Ved{\bar{a}}nta$ belonging to the liberation-centric tradition is a project of 'regaining essential self' through which the self becomes essential self by knowing that self. In this case the listening-oriented interpretation coincides with the basic teachings of $Ved{\bar{a}}nta$, since listening alone can be a sufficient means for obtaining knowledge of the original self. Further, as the project of 'regaining essential self' is carried out by the three means, these can be called a sort of 'event' that is carried out according to the scenario of $Ved{\bar{a}}ntic$ metaphysics. In this case listening is a course of comprehending the scenario of event participated by oneself, and that participant can accomplish the project by way of listening the scenario alone judged as somewhat more effective for liberation. However, in the later $Ved{\bar{a}}nta$ there arises a meditation-oriented interpretation of which three means are regarded not as a methodological extension but as a continuative step, because of the emphasis on meditation under the lasting influence of other philosophical systems. This is a result of epistemic desire that tries to convert what is heard to what is specially perceived or what is given to what is accepted. It may be said that this interpretation emphasizing the phased transition from the indirect to the direct of knowledge is an attempt to rationalize the repetitive delay of event as the actual failure of project. Furthermore, an assertion of the later $Ved{\bar{a}}nta$ which refers the fourth means called $sam{\bar{a}}dhi$ is based on the logic that the self-realization is possible apart from and outside the text, and accordingly it is incompatible with an assertion of the early $Ved{\bar{a}}nta$ that the self-realization is a reproduction as it is of the scenario guided by the absolute text. After all, the standard interpretation on the three means in $Ved{\bar{a}}nta$ have to be the listening-oriented, but not be the meditation-oriented or the $sam{\bar{a}}dhi$-oriented.

The Records and Archives Administrative Reform in China in 1930s (1930년대 중국 문서당안 행정개혁론의 이해)

  • Lee, Won-Kyu
    • The Korean Journal of Archival Studies
    • /
    • no.10
    • /
    • pp.276-322
    • /
    • 2004
  • Historical interest in China in 1930s has been mostly focused on political characteristic of the National Government(國民政府) which was established by the KMT(中國國民黨) as a result of national unification. It is certain that China had a chance to construct a modern country by the establishment of the very unified revolutionary government. But, it was the time of expanding national crises that threatened the existence of the country such as the Manchurian Incident and the Chinese-Japanese War as well as the chaos of the domestic situation, too. So it has a good reason to examine the characteristic and pattern of the response of the political powers of those days. But, as shown in the recent studies, the manifestation method of political power by the revolutionary regime catches our attention through the understanding of internal operating system. Though this writing started from the fact that the Nationalist Government executed the administrative reform which aimed at "administrative efficiency" in the middle of 1930s, but it put stress on the seriousness of the problem and its solution rather than political background or results. "Committee on Administrative Efficiency(行政效率委員會)", the center of administrative reform movement which was established in 1934, examined the plan to execute the reform through legislation by the Executive Council(行政院) on the basis of the results of relevant studies. They claimed that the construction of a modern country should be performed by not political revolution anymore but by gradual improvement and daily reform, and that the operation of the government should become modern, scientific and efficient. There were many fields of administrative reform subjects, but especially, the field of records and archives adminstration(文書檔案行政) was studied intensively from the initial stage because that subject had already been discussed intensively. They recognized that records and archives were the basic tool of work performance and general activity but an inefficient field in spite of many input staff members, and most of all, archival reform bring about less conflicts than the fields of finance, organization and personnel. When it comes to the field of records adminstration, the key subjects that records should be written simply, the process of record treatment should be clear and the delay of that should be prevented were already presented in a records administrative meeting in 1922. That is, the unified law about record management was not established, so each government organization followed a conventional custom or performed independent improvement. It was through the other records administrative workshop of the Nationalist Government in 1933 when the new trend was appeared as the unified system improvement. They decided to unify the format of official records, to use marker and section, to unify the registration of receipt records and dispatch records and to strengthen the examination of records treatment. But, the method of records treatment was not unified yet, so the key point of records administrative reform was to establish a unified and standard record management system for preventing repetition by simplifying the treatment procedure and for intensive treatment by exclusive organizations. From the foundation of the Republic of China to 1930s, there was not big change in the field of archives administration, and archives management methods were prescribed differently even in the same section as well as same department. Therefore, the point at issue was to centralize scattered management systems that were performed in each section, to establish unified standard about filing and retention period allowance and to improve searching system through classification and proper number allowance. Especially, the problem was that each number system and classification system bring about different result due to dual operation of record registration and archives registration, and that strict management through mutual contrast, searching and application are impossible. Besides, various problems such as filing tools, arrangement method, preservation facilities & equipment, lending service and use method were raised also. In the process this study for the system improvement of records and archives management, they recognized that records and archives are the identical thing and reached to create a successive management method of records and archives called "Records and Archives Chain Management Method(文書檔案連鎖法)" as a potential alternative. Several principles that records and archives management should be performed unitedly in each organization by the general record recipient section and the general archives section under the principle of task centralization, a consistent classification system should be used by classification method decided in advance according to organizational constitution and work functions and an identical number system should be used in the process of record management stage and archive management stage by using a card-type register were established. Though, this "Records and Archives Chain Management Method" was developed to the stage of test application in several organizations, but it was not adopted as a regular system and discontinued. That was because the administrative reform of the Nationalist Government was discontinued by the outbreak of the Chinese-Japanese War. Even though the administrative reform in the middle of 1930s didn't produce practical results but merely an experimentation, it was verified that the reform against tradition and custom conducted by the Nationalist Government that aimed for the construction of a modern country was not only a field of politics, but on the other hand, the weak basis of the government operation became the obstacle to the realization of the political power of the revolutionary regime. Though the subject of records and archives administrative reform was postponed to the future, it should be understood that the consciousness of modern records and archives administration and overall studies began through this examination of administrative reform.

Analysis of Munitions Contract Work Using Process Mining (프로세스 마이닝을 이용한 군수품 계약업무 분석 : 공군 군수사 계약업무를 중심으로)

  • Joo, Yong Seon;Kim, Su Hwan
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.4
    • /
    • pp.41-59
    • /
    • 2022
  • The timely procurement of military supplies is essential to maintain the military's operational capabilities, and contract work is the first step toward timely procurement. In addition, rapid signing of a contract enables consumers to set a leisurely delivery date and increases the possibility of budget execution, so it is essential to improve the contract process to prevent early execution of the budget and transfer or disuse. Recently, research using big data has been actively conducted in various fields, and process analysis using big data and process mining, an improvement technique, are also widely used in the private sector. However, the analysis of contract work in the military is limited to the level of individual analysis such as identifying the cause of each problem case of budget transfer and disuse contracts using the experience and fragmentary information of the person in charge. In order to improve the contract process, this study analyzed using the process mining technique with data on a total of 560 contract tasks directly contracted by the Department of Finance of the Air Force Logistics Command for about one year from November 2019. Process maps were derived by synthesizing distributed data, and process flow, execution time analysis, bottleneck analysis, and additional detailed analysis were conducted. As a result of the analysis, it was found that review/modification occurred repeatedly after request in a number of contracts. Repeated reviews/modifications have a significant impact on the delay in the number of days to complete the cost calculation, which has also been clearly revealed through bottleneck visualization. Review/modification occurs in more than 60% of the top 5 departments with many contract requests, and it usually occurs in the first half of the year when requests are concentrated, which means that a thorough review is required before requesting contracts from the required departments. In addition, the contract work of the Department of Finance was carried out in accordance with the procedures according to laws and regulations, but it was found that it was necessary to adjust the order of some tasks. This study is the first case of using process mining for the analysis of contract work in the military. Based on this, if further research is conducted to apply process mining to various tasks in the military, it is expected that the efficiency of various tasks can be derived.

Liability of the Compensation for Damage Caused by the International Passenger's Carrier by Air in Montreal Convention (몬트리올조약에 있어 국제항공여객운송인의 손해배상책임)

  • Kim, Doo-Hwan
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.18
    • /
    • pp.9-39
    • /
    • 2003
  • The rule of the Warsaw Convention of 1929 are well known and still being all over the world. The Warsaw Convention is undoubtedly the most widely accepted private international air law treaty with some 140 countries. In the international legal system for air transportation, the Warsaw Convention has played a major role for more than half century, and has been revised many times in consideration of the rapid developments of air high technology, changes of social and economic circumstances, need for the protection of passengers. Some amendments became effective, but others are still not effective. As a result, the whole international legal system for air transportation is at past so complicated and tangled. However, the 'Warsaw system' consists of the Warsaw Convention of 1929 the Guadalajara Convention of 1961, a supplementary convention, and the following six protocols: (1) the Hague Protocol of 1955, (2) the Guatemala Protocol of 1971, (3) the Montreal Additional Protocols, No.1, (4) the Montreal Additional Protocol No.2, (5) the Montreal Additional Protocol No.3, and (6) the Montreal Additional Protocol No.4. of 1975. As a fundamental principle of the air carrier's liability in the international convention and protocols, for instance in the Warsaw Convention and the Hague Protocol, the principle of limited liability and a presumed fault system has been adopted. Subsequently, the Montreal Inter-carrier Agreement of 1966, the Guatemala City Protocol, the Montreal Additional Protocol No.3, and the Montreal Additional Protocol No. 4 of 1975 maintained the limited liability, but substituted the presumed liability system by an absolute liability, that is, strict liability system. The Warsaw System, which sets relatively low compensation limits for victims of aircraft accidents and regulates the limited liability for death and injury of air passengers, had become increasingly outdated. Japanese Airlines and Inter-carrier Agreement of International Air Transport Association in 1995 has been adopted the unlimited liability of air carrier in international flight. The IATA Inter-Carrier Agreement, in which airlines in international air transportation agree to waive the limit of damages, was long and hard in coming, but it was remarkable achievement given the political and economic realities of the world. IATA deserves enormous credit for bringing it about. The Warsaw System is controversial and questionable. In order to find rational solution to disputes between nations which adopted differing liability systems in international air transportation, we need to reform the liability of air carriers the 'Warsaw system' and fundamentally, to unify the liability system among the nations. The International Civil Aviation Organization(ICAO) will therefore reinforce its efforts to further promote a legal environment that adequately reflects the public interest and the needs of the parties involved. The ICAO Study Group met in April, 1998, together with the Drafting Committee. The time between the "Special Group on the Modernization and Consolidation of the 'Warsaw system'(SGMW)" and the Diplomatic Conference must be actively utilized to arrange for profound studies of the outstanding issues and for wide international consultations with a view to narrowing the scope of differences and preparing for a global international consensus. From 11 to 28 May 1999 the ICAO Headquarters at Montreal hosted a Diplomatic Conference convened to consider, with a view to adoption, a draft Convention intended to modernize and to integrate replace the instruments of the Warsaw system. The Council of ICAO convened this Conference under the Procedure for the Adoption of International Conventions. Some 525 participants from 121 Contracting States of ICAO attended, one non-contracting State, 11 observer delegations from international organizations, a total of 544 registered participants took part in the historic three-week conference which began on 10 May. The Conference was a success since it adopted a new Convention for the Unification of Certain Rules for International Carriage by Air. The 1999 Montreal Convention, created and signed by representatives of 52 countries at an international conference convened by ICAO at Montreal on May 28, 1999, came into effect on November 4, 2003. Representatives of 30 countries have now formally ratified the Convention under their respective national procedures and ratification of the United States, which was the 30th country to ratify, took place on September 5, 2003. Under Article 53.6 of the Montreal Convention, it enters into force on the 60th day following the deposit of the 30th instrument of ratification or acceptation. The United States' ratification was deposited with ICAO on September 5, 2003. The ICAO have succeeded in modernizing and consolidating a 70-year old system of international instruments of private international law into one legal instrument that will provide, for years to come, an adequate level of compensation for those involved in international aircraft accidents. An international diplomatic conference on air law by ICAO of 1999 succeeded in adopting a new regime for air carrier liability, replacing the Warsaw Convention and five other related legal instruments with a single convention that provided for unlimited liability in relation to passengers. Victims of international air accidents and their families will be better protected and compensated under the new Montreal Convention, which modernizes and consolidates a seventy-five year old system of international instruments of private international law into one legal instrument. A major feature of the new legal instrument is the concept of unlimited liability. Whereas the Warsaw Convention set a limit of 125,000 Gold Francs (approximately US$ 8,300) in case of death or injury to passengers, the Montreal Convention introduces a two-tier system. The first tier includes strict liability up to l00,000 Special Drawing Rights (SDR: approximately US$ 135,000), irrespective of a carrier's fault. The second tier is based on presumption of fault of a carrier and has no limit of liability. The 1999 Montreal Convention also includes the following main elements; 1. In cases of aircraft accidents, air carriers are called upon to provide advance payments, without delay, to assist entitled persons in meeting immediate economic needs; the amount of this initial payment will be subject to national law and will be deductable from the final settlement; 2. Air carriers must submit proof of insurance, thereby ensuring the availability of financial resources in cases of automatic payments or litigation; 3. The legal action for damages resulting from the death or injury of a passenger may be filed in the country where, at the time of the accident, the passenger had his or her principal and permanent residence, subject to certain conditions. The new Montreal Convention of 1999 included the 5th jurisdiction - the place of residence of the claimant. The acceptance of the 5th jurisdiction is a diplomatic victory for the US and it can be realistically expected that claimants' lawyers will use every opportunity to file the claim in the US jurisdiction - it brings advantages in the liberal system of discovery, much wider scope of compensable non-economic damages than anywhere else in the world and the jury system prone to very generous awards. 4. The facilitation in the recovery of damages without the need for lengthy litigation, and simplification and modernization of documentation related to passengers. In developing this new Montreal Convention, we were able to reach a delicate balance between the needs and interests of all partners in international civil aviation, States, the travelling public, air carriers and the transport industry. Unlike the Warsaw Convention, the threshold of l00,000 SDR specified by the Montreal Convention, as well as remaining liability limits in relation to air passengers and delay, are subject to periodic review and may be revised once every five years. The primary aim of unification of private law as well as the new Montreal Convention is not only to remove or to minimize the conflict of laws but also to avoid conflict of jurisdictions. In order to find a rational solution to disputes between nations which have adopted differing liability systems in international air transport, we need fundamentally to reform their countries's domestic air law based on the new Montreal Convention. It is a desirable and necessary for us to ratify rapidly the new Montreal Convention by the contracting states of lCAO including the Republic of Korea. According to the Korean and Japanese ideas, airlines should not only pay compensation to passengers immediately after the accident, but also the so-called 'condolence' money to the next of kin. Condolence money is a gift to help a dead person's spirit in the hereafter : it is given on account of the grief and sorrow suffered by the next of kin, and it has risen considerably over the years. The total amount of the Korean and Japanese claims in the case of death is calculated on the basis of the loss of earned income, funeral expenses and material demage (baggage etc.), plus condolence money. The economic and social change will be occurred continuously after conclusion of the new Montreal Convention. In addition, the real value of life and human right will be enhanced substantially. The amount of compensation for damage caused by aircraft accident has increased in dollar amount as well as in volume. All air carrier's liability should extend to loss of expectation of leisure activities, as well as to damage to property, and mental and physical injuries. When victims are not satisfied with the amount of the compensation for damage caused by aircraft accident for which an airline corporation is liable under the current liability system. I also would like to propose my opinion that it is reasonable and necessary for us to interpret broadly the meaning of the bodily injury on Article 17 of the new Montreal Convention so as to be included the mental injury and condolence. Furthermore, Korea and Japan has not existed the Air Transport Act regulated the civil liability of air carrier such as Air Transport Act (Luftverkehrsgestz) in Germany. It is necessary for us to enact "the Korean Air Transport Contract Act (provisional title)" in order to regulate the civil liability of air carrier including the protection of the victims and injured persons caused by aircraft accident.

  • PDF