• Title/Summary/Keyword: Enforcement System

Search Result 741, Processing Time 0.024 seconds

The Enforcement Scheme of the Overspeeding vehicle by Travel Speed (구간과속단속시스템의 도입 방안 연구)

  • Han, Won-Seop;Kim, Man-Bae;Hyeon, Cheol-Seung;Yu, Seong-Jun
    • Journal of Korean Society of Transportation
    • /
    • v.23 no.1
    • /
    • pp.21-32
    • /
    • 2005
  • At present automated speed enforcement system in Korea control overspeed vehicle only in the specific spot. Because the drivers generally recognize the previous stated fact, they reduce a speed only in the establishment location of systems and increase rapidly again as soon as it passes the location. we have known that the rate of traffic risk at the tunnel, bridge and curve road segment is higher than other road section. Therefore, it needs speed control in them. In such a case, it is necessary to establish the automated traffic enforcement system based on the travel time speed of an individual vehicle over a pre defined stretch of road. In this study, the application limit of existing spot overspeed enforcement system was studied through an analysis of traffic flow characteristics in the tunnel, bridge and curve section. Also we found out the optimal distance of segment and the most suitable location to an application of the overspeed vehicle by travel time speed through an analysis of the road structure, traffic condition and accident numbers in the road.

A Survey on the Visitor's Cognition of Visitor Reservation System in National Park - The Case Study of Soraksan National Park - (국립공원 탐방예약제 시행에 대한 탐방객 의식 조사 - 설악산국립공원 탐방객을 대상으로-)

  • 이주수;조중현;김용근
    • Korean Journal of Environment and Ecology
    • /
    • v.17 no.1
    • /
    • pp.92-100
    • /
    • 2003
  • The purpose of this study is to survey and analyze of the visitor's cognition of Visitor-Reservation System in Soraksan National Park. To accomplish the purpose, a questionnaire survey was employed in Soraksan National Park. The contents of questionnaire consist of the socioeconomic characteristics and the types of visiting, the activity, the cognition of Visitor-Reservation System. 166 samples of total 170 respondents were used for final analysis. As a result of the analysis, the socioeconomic characteristics and the type of visiting were showed similar trends with results from other National Park visitor survey Most of respondents recognized the enforcement Visitor-Reservation System and A majority of respondents affirmatively recognized the introduction Visitor-Reservation System. Most of respondents wanted an easy method reservation and cancel in enforcement Visitor-Reservation System. Besides Most of respondents recognized negative conception on regulation(nature-rest system, facility-reservation system etc) of National Park Authority(N.P.A). About expanding enforcement Visitor-Reservation System of National Park's preservation, 'Agree Group' was almost equal with 'Disagree Group'. About more effect operate the Visitor-Reservation System Most of respondents were agree to introduce penalty.

A Scalable and Robust Approach to Collaboration Enforcement in Mobile Ad-Hoc Networks

  • Jiang Ning;Hua Kien A.;Liu, Danzhou
    • Journal of Communications and Networks
    • /
    • v.9 no.1
    • /
    • pp.56-66
    • /
    • 2007
  • Mobile ad-hoc networks (MANETs) have attracted great research interest in recent years. Among many issues, lack of motivation for participating nodes to collaborate forms a major obstacle to the adoption of MANETs. Many contemporary collaboration enforcement techniques employ reputation mechanisms for nodes to avoid and penalize malicious participants. Reputation information is propagated among participants and updated based on complicated trust relationships to thwart false accusation of benign nodes. The aforementioned strategy suffers from low scalability and is likely to be exploited by adversaries. In this paper, we propose a novel approach to address these problems. With the proposed technique, no reputation information is propagated in the network and malicious nodes cannot cause false penalty to benign hosts. Nodes classify their one-hop neighbors through direct observation and misbehaving nodes are penalized within their localities. Data packets are dynamically rerouted to circumvent selfish nodes. As a result, overall network performance is greatly enhanced. This approach significantly simplifies the collaboration enforcement process, incurs low overhead, and is robust against various malicious behaviors. Simulation results based on different system configurations indicate that the proposed technique can significantly improve network performance with very low communication cost.

Public Policy Exception under Russian Law as a Ground for Refusing Recognition and Enforcement of Foreign Arbitral Awards

  • Andreevskikh, Liliia;Park, Eun-ok
    • Journal of Arbitration Studies
    • /
    • v.32 no.3
    • /
    • pp.47-70
    • /
    • 2022
  • This paper studies legal regulation of the public policy exception in the Russian Federation and domestic judicial practice on the issue. It reviews current legislation and analyzes a number of recent court cases where an arbitral award rendered by a foreign arbitration body was refused recognition and enforcement based on public policy violation. By doing so, it contributes to the knowledge on the concept of public policy in the Russian legal system and how public policy can affect the process of recognition and enforcement of foreign arbitral awards on its territory. The review of court cases demonstrates different aspects of how the public policy exception can be applied by Russian arbitrazh courts. Such decisions can provide a clearer picture of the kinds of situation that can lead to invoking the public policy clause by the court. Also, it is of practical value as persons preparing to file a claim or to be a defendant in a Russian court can be required to present existing court decisions in support of their claim or defence.

The Finality of Arbitral Awards: The U.S. Practices

  • Ha, Choong-Lyong
    • Journal of Arbitration Studies
    • /
    • v.30 no.3
    • /
    • pp.3-19
    • /
    • 2020
  • With the advent of the Free Trade Agreement between Korea and the U.S. and an increase in trade volume between the two countries, the possibility of commercial disputes has escalated among international merchants. It has been well-known that arbitration as an alternative dispute resolution is an efficient way to resolve international commercial disputes. When arbitral awards are enforced in the judicial system, the court will inevitably have to be involved with the enforcement procedures. The court is a typical legal entity to confirm arbitral awards. Through a confirmation process, the winning party obtains the same legal status of final judgment rendered by the court. However, a winning party in arbitration will have to overcome a legal hurdle in the enforcement process of arbitral awards. This article aims to investigate how the courts control the arbitration practices and what the basic legal issues in the enforcement of arbitral awards are. The US Federal Arbitration Act is investigated, while relevant cases are reviewed and updated for legal analysis.

Comparing the ICT industries of Silicon Valley and Route 128: What's law got to do with it?

  • Timberman, Alex;Seol, Sung-Soo
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2014.10a
    • /
    • pp.189-203
    • /
    • 2014
  • Silicon Valley's legal foundation in recent years has surfaced on the radar of policy planners who model Silicon Valley's ICT industry. Precisely, the prohibition of covenants not to compete is linked to firm to firm knowledge spillovers by way of mobile workers positioned as nodes in a system of innovation. Meanwhile, traditional frameworks support enforcement of covenants not to compete as a way to encourage R&D into the worker and to prevent the worker's tacit knowledge and know-how from fleeing. This article examines the ICT industry in Silicon Valley and Route 128 to argue that California's unique law is a key factor in the success of Silicon Valley firms. Theoretically, we reconcile the ostensible strife between enforcement and prohibition frameworks by presenting an industrial approach. We contend that selective enforcement by industry can maximize the policy tools of discorded planners.

  • PDF

Fuzzy-Enforced Complementarity Constraints in Nonlinear Interior Point Method-Based Optimization

  • Song, Hwachang
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.13 no.3
    • /
    • pp.171-177
    • /
    • 2013
  • This paper presents a fuzzy set method to enforce complementarity constraints (CCs) in a nonlinear interior point method (NIPM)-based optimization. NIPM is a Newton-type approach to nonlinear programming problems, but it adopts log-barrier functions to deal with the obstacle of managing inequality constraints. The fuzzy-enforcement method has been implemented for CCs, which can be incorporated in optimization problems for real-world applications. In this paper, numerical simulations that apply this method to power system optimal power flow problems are included.

Development of an Improved Inspection System for Slopes adjacent to Educational Facilities (개선된 교육시설 인접 사면 점검체계 구축)

  • Ko, Jun-Young;Lee, Joon-Kyu;Park, Ku-Byoung;Lee, Byoung-Ho;Kim, Jae-Young
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.28 no.4
    • /
    • pp.3-10
    • /
    • 2021
  • This study presents an improved inspection system for slopes adjacent to educational facilities. For this, field investigations for 5 schools and 3 universities were performed to analyze the engineering stability of infrastructures, which ensure the safety of students and educational officers. Educational laws and the relevant enforcement are reviewed to understand the problems of current laws and enforcement. The results reveal that the engineering measures and reinforcement are required for the slopes of 36%. Also, the improvement of social awareness and regular inspection is needed to maintain the educational infrastructures. The suggested inspection system includes the fundamental and detailed checklists and guidance for non-engineering specialists.

Implementation of Analyzer of the Alert Data using Data Mining (데이타마이닝 기법을 이용한 경보데이타 분석기 구현)

  • 신문선;김은희;문호성;류근호;김기영
    • Journal of KIISE:Databases
    • /
    • v.31 no.1
    • /
    • pp.1-12
    • /
    • 2004
  • As network systems are developed rapidly and network architectures are more complex than before, it needs to use PBNM(Policy-Based Network Management) in network system. Generally, architecture of the PBNM consists of two hierarchical layers: management layer and enforcement layer. A security policy server in the management layer should be able to generate new policy, delete, update the existing policy and decide the policy when security policy is requested. And the security policy server should be able to analyze and manage the alert messages received from Policy enforcement system in the enforcement layer for the available information. In this paper, we propose an alert analyzer using data mining. First, in the framework of the policy-based network security management, we design and implement an alert analyzes that analyzes alert data stored in DBMS. The alert analyzer is a helpful system to manage the fault users or hosts. Second, we implement a data mining system for analyzing alert data. The implemented mining system can support alert analyzer and the high level analyzer efficiently for the security policy management. Finally, the proposed system is evaluated with performance parameter, and is able to find out new alert sequences and similar alert patterns.