• Title/Summary/Keyword: Illegal Weapon

Search Result 7, Processing Time 0.023 seconds

Similarity on Types of Illegal Weapon Self-report (불법무기 자진신고의 대상별 유사성)

  • Joo, Il-Yeob;Cho, Kwang-Rae
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.137-157
    • /
    • 2017
  • The purpose of this study was to analyze similarity on types of illegal weapon self-report such as firearms, swords, shells, bullets, explosives in 16 regions of Korea in 2011, 2015. The results of this study were as follows. First, the types of illegal weapon self-report in 2011 were divided into two clusters, such as (1) 'cluster 1' including firearms, swords, shells and explosives, (2) 'cluster 2' including bullets. Second, the multidimensional scales on the types of illegal weapon self-report in 2011 were firearms located in the lower right corner(4/4), swords located in the lower right corner(4/4), shells located in the lower right corner(4/4), bullets located in the center left corner(3/4), explosives located in the higher right corner(1/4). Third, the types of illegal weapon self-report in 2015 were divided into two clusters, such as (1) 'cluster 1' including firearms, swords, shells and explosives, (2) 'cluster 2' including bullets. Forth, the multidimensional scales on the types of illegal weapon self-report in 2015 were firearms located in the lower right corner(4/4), swords located in the higher right corner(1/4), shells located in the higher right corner(1/4), bullets located in the center left corner(2/4), explosives located in the center right corner(4/4).

  • PDF

DYNAMICS OF GUN VIOLENCE BY LEGAL AND ILLEGAL FIREARMS: A FRACTIONAL DERIVATIVE APPROACH

  • Chandrali, Baishya;P., Veeresha
    • Honam Mathematical Journal
    • /
    • v.44 no.4
    • /
    • pp.572-593
    • /
    • 2022
  • Crime committed by civilians and criminals using legal and illegal firearms and conversion of legal firearms into illegal ones has become a common practice around the world. As a result, policies to control civilian gun ownership have been debated in several countries. The issue arose because the linkages between firearm-related mortality, weapon accessibility, and violent crime data can imply diverse options for addressing criminality. In this paper, we have projected a mathematical model in terms of the Caputo fractional derivative to address the issues viz. input of legal guns, crime committed by legal and illegal guns, and strict government policies to monitor the license of legal guns, strict action against violent crime. The boundedness, existence and uniqueness of solutions and the stability of points of equilibrium are examined. It is observed that violent crime increases with the increase of crime committed by illegal guns, crime committed by legal guns and, decreases with the increase of legal guns, the deterrent effect of civilian gun ownership, and action of law against crime. Further, legal guns increase with the increase of the limitation of trade of illegal guns and decrease with the increase of conversion of legal guns into illegal guns and increase of the growth rate of illegal guns. Again, as crime is committed by legal guns also, the policy of illegal gun control does not assure a crime-free society. Weak gun control can lead to a society with less crime. Theoretical aspects are numerically verified in the present work.

Study on Biodegradable Polyurethane Foam for Non-lethal Weapon (비 살상 무기 개발을 위한 생분해성 발포 폴리우레탄에 대한 연구)

  • Lee, Hyang Moo;Kim, Young Hyun;Kim, Kyung Won;Cheong, In Woo
    • Journal of Adhesion and Interface
    • /
    • v.17 no.1
    • /
    • pp.21-28
    • /
    • 2016
  • Foam-type biodegradable polyurethane adhesives were developed as a non-lethal weapon against illegal fishing boats. The adhesives were prepared from a hardener of polymeric methylene diphenyl diisocyanate (MDI) and a base composed of polyester and/or polyether polyols. In order to accelerate biodegradability, starch, dextrin, and amylase were added into the base, and which present about 34% degradability within 4 weeks confirmed by OECD 301C method. For proper mixing and corresponding prompt foam reaction, viscosities of hardener and base compositions were investigated in the temperature ranges from 0 to $50^{\circ}C$. For fast completion of the foam forming and corresponding adhesion, rising time was recorded in the same temperature range, and the rising time of the adhesive was varied within around 1 minute. T-peel adhesion tests with cotton fabrics were performed which showed 20.78 N/cm and 11.95 N/cm as the maximum and the average values, respectively.

Technical Trends on Low-Altitude Drone Detection Technology for Countering Illegal Drones (불법 드론 대응을 위한 저고도 드론 탐지 기술 동향)

  • Lee, I.J.;Choi, S.H.;Joo, I.O.;Jeon, J.W.;Cha, J.H.;Ahn, J.Y.
    • Electronics and Telecommunications Trends
    • /
    • v.37 no.1
    • /
    • pp.10-20
    • /
    • 2022
  • A drone without attaching guns or bombs can be a dangerous weapon, since its motor speed is greater than 3000 rpm, which is similar to that of a mower powered by a LiPo battery. The anti-drone system is the only means of detecting and neutralizing drone attacks. Many defense companies around the world provide solutions using various types of equipment (for example, radar, cameras, jamming guns, and net guns). ETRI has also developed a Low-Altitude Drone Detection (LADD) system consisting of Ku-band radar and an Electro-Optical/Infra-Red (EO/IR) camera. In this paper, we summarize recent technical advances in anti-drone systems around the world and introduce the features and describe the performance of the LADD system.

Selective Encryption Algorithm for 3D Printing Model Based on Clustering and DCT Domain

  • Pham, Giao N.;Kwon, Ki-Ryong;Lee, Eung-Joo;Lee, Suk-Hwan
    • Journal of Computing Science and Engineering
    • /
    • v.11 no.4
    • /
    • pp.152-159
    • /
    • 2017
  • Three-dimensional (3D) printing is applied to many areas of life, but 3D printing models are stolen by pirates and distributed without any permission from the original providers. Moreover, some special models and anti-weapon models in 3D printing must be secured from the unauthorized user. Therefore, 3D printing models must be encrypted before being stored and transmitted to ensure access and to prevent illegal copying. This paper presents a selective encryption algorithm for 3D printing models based on clustering and the frequency domain of discrete cosine transform. All facets are extracted from 3D printing model, divided into groups by the clustering algorithm, and all vertices of facets in each group are transformed to the frequency domain of a discrete cosine transform. The proposed algorithm is based on encrypting the selected coefficients in the frequency domain of discrete cosine transform to generate the encrypted 3D printing model. Experimental results verified that the proposed algorithm is very effective for 3D printing models. The entire 3D printing model is altered after the encryption process. The decrypting error is approximated to be zero. The proposed algorithm provides a better method and more security than previous methods.

A Review of Improvements for Providing Safe and Secure Environments for Medical Treatment (안전한 진료환경 구축을 위한 정책 개선과제)

  • Choe, A Reum;Kim, Sung Eun;Baek, Kyoung Hee
    • Health Policy and Management
    • /
    • v.29 no.2
    • /
    • pp.105-111
    • /
    • 2019
  • On December 31, 2018, an incident occurred where a doctor was attacked and killed by a patient carrying a lethal weapon in the outpatients' clinic of the psychiatric department of a tertiary general hospital. The suspect was diagnosed with bipolar affective disorder (manic depressive disorder) and has been hospitalized and cared for in the psychiatric ward of this hospital. This incident illustrates the necessity of more active cures and therapeutic intervention for mental patients with intellectual developmental disorders who require treatment considering the fact that a radical outcome has been caused by such a patient. However, on the other hand, there is also a need for an approach and analysis from the perspective of crime prevention for all medical departments. The reason for this is that even a tertiary general hospital equipped with the largest human resources, medical devices, facilities, and so forth, is susceptible to violence. As for illegal actions perpetrated against health and medical service personnel in medical institutions, such as verbal abuse, assault, injury, etc. there have neither been understanding shown for the current extent of damage in detail, nor discussions of active institutional improvement related to the seriousness of the act. It can be said that violence in the field of medical treatment is a realm requiring serious discussion and appropriate remedial actions. This is because when such incidents take place, if a patient who is supposed to get treatment from the damaged health care provider is in an urgent situation or on the waiting list of serious cases, he or she could suffer serious damage caused by deprivation of treatment opportunity, or secondary damage might be caused to the patient and/or a guardian who can hardly have an opportunity to take action. Accordingly, in this review, we would like to help create the necessary conditions for both health and medical service personnel and patients/guardians, respectively, to provide and receive medical treatment in a more secure environment. Therefore, objective assessment of the institution and issues relating to this aforementioned incident and general cases of violence occurring in medical institutions, and by suggesting legal and institutional improvements and solutions.

Need for New Criteria of an Injunction in a Patent Infringement (특허침해금지청구에 대한 새로운 판단기준의 필요성)

  • Shim, Mi-Rang
    • Journal of Legislation Research
    • /
    • no.44
    • /
    • pp.571-610
    • /
    • 2013
  • The current patent system is more often used for defensive purposes to exclude others' use or as a means to hold unfair strong positions in negotiations rather than for the original purpose as the dissemination and active use of useful technology. An injunction together with a damage is an important remedy for patent infringements. However, unlike a claim for damages, injunctions do not require the subjective requirement of intent and negligence or the occurrence of loss. If the validity of the patent and the fact of infringement are confirmed, automatically injunctions are issued without consideration of other circumstances. So a patent holder would exclude others' use and have a powerful position in negotiations because of injunctions for patent infringements. Therefore, those injunctions for patent infringements should be flexibly restricted according to cases under the premise to ensure fair compensation for the patent owner, rather than absolutely admitting injunctions for patent infringements like now. If then, it would serve the use of a useful technology and industrial development as the purpose of the patent system. First of all, judgments for preliminary injunctions should be strict and by deliberate decision on the merits permanent injunctions should be determined. In addition, it is needed that court's discretion possible to considerate 'the need for an injunction'. When the courts judge 'the need for an injunction', 'whether a patent holder has implemented a patent invention, the possibility of monetary compensation and the ability of the infringer for damages, a patent holder's intent to license and whether an injunction has been used as a weapon of negotiation, the proportion of patent technology in the entire products, the characteristics of patent technology and the possibility of patent invalidity, the competitive relationship for market share, the public interests and gains and losses between the parties and so on' should be considered. After these judgements, if 'the need for an injunction' is not approved, a patent owner would be protected by post-monetary compensation. However, because damages are related to illegal conducts in the past, in the case that an injunction is restrained, measures to ensure the legal implementation in the future are needed. It is primarily desirable that reasonable royalty is estimated throughout private negotiations between parties, but if agreement between the parties does not occur, patent owner should be able to claim the royalty for future.