• Title/Summary/Keyword: Mutual Agreement

Search Result 256, Processing Time 0.022 seconds

Development of Hydrological Shared Vision Model for Conflict Mediation of Dam Construction (댐 건설 갈등 조정을 위한 수문학적 공영시각모형의 개발)

  • Jung, Ha Ok;Han, Jae Ik;Park, Sang Woo
    • Journal of Korea Water Resources Association
    • /
    • v.45 no.10
    • /
    • pp.1009-1022
    • /
    • 2012
  • This study approach the conflict in the process of promoting Dam construction plan from a hydrological method and comprehend the cause of conflict on conservation and flood collect all interested parties direct involvement and develop Shared Vision Model (SVM) to plan simulation and result. We forecast water for living, industrial water and agricultural water in each administrative district on conservation and simulate promptly in case that each structural alternative is formed and suggest water level deduction effect and change of area on watted surface and damage and organize the system to draw and agreement through exchanging mutual opinion. Also, it considered to contribute meditation and soften of conflict by securing accuracy of releasing information and trust of the result.

An Analysis of Supply and Demand of Construction Professional Engineers (건설분야의 기술사 인력수급 현황 및 분석)

  • Kim Sun-Kuk;Cho Yong-Hoon
    • Korean Journal of Construction Engineering and Management
    • /
    • v.6 no.3 s.25
    • /
    • pp.178-187
    • /
    • 2005
  • In order to respond the opening of technology market by the agreement with WTO, the mutual authentication of professional engineers (PEs) by nh, and the promotion and encouragement of education in technology, the preparation of robustic regulation and regal system to secure the authority of PEs and to enhance their quality is required. And a scheme to train PEs with the advanced country level of quality and secure the practical use of PE's expertise should be developed to cope with current issues after the survey of supply and demand for PEs. In this paper, the problem of supply and demand of construction PEs is surveyed under the current regal system and the idea to regulate the supply and demand with the improvement of the regal system is suggested. The result of this research is used for building the supply and demand system of quality PEs and the efficient training and practical arrangement system. Furthermore, the result would be used for the fundamental data to establish the government policy about PEs.

Development of Documentation System in Hospital-based Home Health - in one general hospital in the U.S.A. - (병원중심 가정간호 기관의 기록체계개발 - 미국 일개 종합병원을 대상으로 -)

  • Kang Chang-Hee
    • Journal of Korean Public Health Nursing
    • /
    • v.6 no.2
    • /
    • pp.58-69
    • /
    • 1992
  • The purposes of this study were 1) to assess the currunt documentation system 2) to identify the problems in communication regarding to documentation 3) to develop new documentation system 4) to suggest effective communication channel using new documentation system Research was conducted by direct observation, chart review, staffs interview and servey. Results were as follows: 1) nursing care plans were not used in ongoing care 2) documentation format was primarily narrative and charting was time consuming 3) documentation did not reflect the nursing process 4) patient records were not used as effective communication tool between case manager and part time nurse 5) difficult access to patient record for nurse manager created inefficiency in coordinating 6) documentation of patient education did not describe the precise contents of education, and the responses of the patients and evaluation To solve these problems, new documentation format was developed. With new formats nurses : 1) use standardized care plan which contains nursing diagnosis, ecpected outcome, time frame for evaluation, flow sheet for updating the plans 2) leave one copy of care plan at patient home for mutual agreement with patent and communication among nursing staffs 3) carry one copy of care plan for updating 4) document and evaluate the patient education using education check list keeping in patient's home 5) document nursing process in focus charting visit report 6) carry one copy of visit report 7) have one copy of visit report which was deligated to part time nurses 8) use documentation in direct communication with part time nurse 9) use beeper and memo to promote communication

  • PDF

Trade and environment issue in Doha Development Agenda and its policy implication (도하개발아젠다 전경협상과 환경통상정책 과제)

  • Kang, Sang-In
    • Journal of Environmental Policy
    • /
    • v.1 no.1
    • /
    • pp.111-128
    • /
    • 2002
  • The Ministerial Declaration of the 4th WTO Ministerial Meeting at Doha in November 2001 announced the launch of the New Round and a completion date of January 1st, 2005. It agreed to eventually negotiate trade and environment linkage issues, such as the relationship between the WTO rules and Multilateral Environment Agreements and the reduction or elimination of tariff and non-tariff barriers to environmental goods and services. The Committee on Trade and Environment was instructed to pursue work on all items on its agenda within the current terms of reference and to give particular attention to the effects of environmental measures on market access, relevant provisions of the TRTPS Agreement, and labelling requirements for environmental purposes. This means that far the first time, the members of the WTO will discuss and negotiate trade and environment linkage in the framework of multilateral trade negotiation. Korea, from the standpoint of a smaller open economy heavily dependent on international trade, is obliged to overcome the challenges imposed by the environment agenda in the Doha declaration. This study examined the linkage among environment, economic growth and international trade in order to review the possible trade and environment policy implications in Korea. Mutual supportiveness of trade and environment depends much on the effectiveness of trade and environment policy coordination. In this regard, we conclude that the Korean government should provide an appropriate institutional framework to promote closer cooperation among policy makers engaged in negotiations. Trade and environment policy review and environmental impact assessment of trade negotiation should be considered as a work programme of this institutional policy coordination framework.

  • PDF

Improving the Performance of Mutual Authentication and Session Key Agreement Protocols for Mobile Communication (이동 통신 환경에서의 상호인증 및 세션키 공유 프로토콜의 성능 향상)

  • Lee, Seung-Won;Hong, Seong-Min;Yun, Hyeon-Su;Jo, Yu
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.11
    • /
    • pp.1391-1400
    • /
    • 1999
  • 이동 통신은 대기를 전달매체로 하고 이동단말기를 사용하기 때문에 가로채기나 불법사용과 같은 공격에 취약하다. 이를 극복하기 위해, 이동 통신 환경에서 이동단말기와 기지국 사이에 안전한 통신을 제공하기 위한 많은 프로토콜들이 제안되어왔다. 그러나 이동단말기의 부족한 계산능력과 전력량 때문에 공개키를 이용한 프로토콜들은 많은 장점에도 불구하고 충분히 활용되지 못했다. 본 논문에서는 이동 통신 환경에서 기지국과 이동단말기 사이의 상호인증 및 세션키 공유 프로토콜들의 성능을 향상시킬 수 있는 기법을 제안한다. 본 논문에서 제안하는 기법은 이동단말기의 비밀 정보를 기지국에게 드러나게 하지 않으면서 많은 계산을 기지국으로 하여금 대신 수행하도록 하는 것이다. 제안된 기법은 기존의 프로토콜들을 최대 5배까지 성능을 향상시키며 해당하는 만큼 이동단말기의 전력량 소모를 감소시킬 수있다.Abstract Mobile communication is more vulnerable to security attacks such as interception and unauthorized access than fixed network communication. To overcome these problems, many protocols have been proposed to provide a secure channel between a mobile station and a base station. However, these public-key based protocols have not been fully utilized due to the poor computing power and small battery capacity of mobile stations. In this paper, we propose techniques for accelerating public-key based key establishment protocols between a mobile station and a base station. The proposed techniques enable a mobile station to borrow computing power from a base station without revealing its secret information. The proposed schemes accelerate the previous protocols up to five times and reduce the amount of power consumption of mobile stations.

High-Altitude Environment Simulation of Space Launch Vehicle Including a Thruster Module (추력기 모듈을 포함한 우주발사체 고공환경모사)

  • Lee, Sungmin;Oh, Bum-Seok;Kim, YoungJun;Park, Gisu
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.46 no.10
    • /
    • pp.791-797
    • /
    • 2018
  • In this work, the high-altitude environment simulation study was carried out at an altitude of 65 km exceeding Mach number of 6 after the launch of Korean Space Launch Vehicle using a shock tunnel. To minimize the flow disturbance due to the strut support of test model as much as possible, a few different types of strut configurations were considered. Using the configuration with minimum disturbance, the high-altitude environment simulation experiment including a propulsion system with a single-plume, was conducted. From the thruster test through flow visualization, not only a shockwave pattern, but a general flow-field pattern from the mutual interaction between the exhaust plume and the free-stream undisturbed flow, was experimentally observed. The comparison with the computation fluid dynamic(CFD) results, showed a good agreement in the forebody whereas in the afterbody and the nozzle the disagreement was about ${\pm}7%$ due to unwanted shockwave formation emanated from the nozzle-exit.

An Improved High-Performance Protocol for Security Vulnerability of GSM based on SIM Card (SIM 카드 기반 보안 취약성을 개선한 고성능 GSM 보안 프로토콜)

  • Kim, Hee-Jung;Jeon, Ha-Yong;Lee, Ju-Hwa;Jung, Min-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.7
    • /
    • pp.902-911
    • /
    • 2007
  • GSM platform is a hugely successful wireless technology and an unprecedented story of global achievement. In less than ten years since the first GSM network was commercially launched, it became the world's leading and fastest growing mobile standard, using over 1 billion GSM subscribers across more than 200 countries of the world. GSM platform evolved into 3th generation mobile communication which includes not only voice call services but also the international roaming and various kinds of the multimedia services. GSM is an essential element techniques a safe data transmission and a personal private protection while support services. However, a crypto algorithm and a secure protocol for a safe data communication using GSM are indicating various kinds of problems. In this paper, we propose a more safer and more efficient authentication protocol in 3th generation network through analysis of GSM security mechanism of 2th/2.5th generation. This security protocol offers enforced security efficiency by using user verification between SIM/ME and reduction of authentication and key agreement step between SIM/ME/AuC.

  • PDF

A Study on the Comparative Method of Arbitration Law of China and Arbitration Law of Mongolia (중국의 중재법과 몽골의 중재법에 대한 비교법적 고찰)

  • Kim, Yong-Kil
    • Journal of Arbitration Studies
    • /
    • v.26 no.4
    • /
    • pp.83-109
    • /
    • 2016
  • Recently, China has brought many political, economical, and ideological changes in order to complete the "socialistic market economy." In terms of legal system, they make much effort to seek compatibility and stability of law and order. China recognizes that the breakdown of corruption, which is rampant in society, is an essential short-cut for national development. To realize anti-corruption reformation, it strengthens the supervision of relatives and close officials of high-ranking government officials. Recently, China has suffered from expanded trade disputes internationally and has also experienced severe management-labor conflicts domestically due to economic recession. From 2012 onward, civil lawsuit and other litigations have increased sharply. Also, they face severe conflicts in the land system. It is expected that many disputes arise due to speculation on rural housing. Meanwhile, Mongolia expands the size of trade with Korea in mutual cooperation since their diplomatic relation in 1990 by entering more than 20 treaties and agreements. As Mongolia has rich natural resources and Korea is equipped with advanced science and technology, the two countries have opportunities to develop mutually beneficial cooperative relations. Recently, the arbitration system has attracted attention instead of litigation as a means of dispute settlement in line with the expansion of trade between Korea and Mongolia. This study would be helpful to figure out desirable methods for dispute settlements in case of trade disputes among Korean companies that would advance into China and Mongolia.

An Analysis of Reciprocal Borrowing Programs in the U.S. (미국의 통합대출서비스 사례 조사 및 분석)

  • Chung, Jin-Soo
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.21 no.2
    • /
    • pp.5-13
    • /
    • 2010
  • As today's information environment changes rapidly with the development of information technology, users expect a variety of the library services that meet their emerging needs. This paper reports the concept of reciprocal borrowing and analyzes the cases of reciprocal borrowing programs in the US. Particularly, this paper introduces (1) three cases of state-wide library cards such as Georgia's PINES card, Maryland's MPower card, and Michigan's Michi card. (2) Public library systems in the U.S. also are introduced as a type of reciprocal borrowing. Another type of reciprocal borrowing mentioned in this paper was (3) an mutual agreement between and among libraries. The author sought the deeper understanding of reciprocal borrowing by mapping the cases described in this paper into three models of reciprocal borrowing Kwak et al.(2010) suggested. This paper concludes with a few important considerations in implementing reciprocal borrowing services in Korea.

Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks

  • Lu, Yanrong;Li, Lixiang;Peng, Haipeng;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1273-1288
    • /
    • 2016
  • With the swift growth of wireless technologies, an increasing number of users rely on the mobile services which can exchange information in mobile networks. Security is of key issue when a user tries to access those services in this network environment. Many authentication schemes have been presented with the purpose of authenticating entities and wishing to communicate securely. Recently, Chou et al. and Farash-Attari presented two ID authentication schemes. They both claimed that their scheme could withstand various attacks. However, we find that the two authentication schemes are vulnerable to trace attack while having a problem of clock synchronization. Additionally, we show that Farash-Attari's scheme is still susceptible to key-compromise impersonation attack. Therefore, we present an enhanced scheme to remedy the security weaknesses which are troubled in these schemes. We also demonstrate the completeness of the enhanced scheme through the Burrow-Abadi-Needham (BAN) logic. Security analysis shows that our scheme prevents the drawbacks found in the two authentication schemes while supporting better secure attributes. In addition, our scheme owns low computation overheads compared with other related schemes. As a result, our enhanced scheme seems to be more practical and suitable for resource-constrained mobile devices in mobile networks.