• Title/Summary/Keyword: Non-genuine part

Search Result 5, Processing Time 0.017 seconds

Latest passenger vehicle fire trend and case study based on field investigation data (차량화재 사고경향 및 사례분석)

  • Shin, Junho;Won, Eugene;Hong, Ilmin
    • Journal of Auto-vehicle Safety Association
    • /
    • v.6 no.2
    • /
    • pp.67-71
    • /
    • 2014
  • Based on the analysis of the actual passenger vehicle fire cases for recent four years (2010~2013), the passenger vehicle fire is increasing annually. Main root cause was analyzed as an electric problem as a 39%. Vehicle fire case by electric problem was mainly caused by use of Non-genuine part. Vehicle fire case by mechanical problem was mainly caused by various oil system maintenance. Vehicle fire case by smoking material was mainly caused by cigarette and disposal lighter. And external fire transition issue and towing mistake fire cases was also confirmed.

A Re-evaluation of Housing Wealth Effect in Korea (한국의 주택 부 효과에 대한 재고찰)

  • Kim, Jangryoul;Lee, Hangyong
    • KDI Journal of Economic Policy
    • /
    • v.30 no.2
    • /
    • pp.1-26
    • /
    • 2008
  • This paper attempts to re-evaluate the size of housing wealth effect in Korea. Our focus is on the size of 'genuine' housing wealth effect, i.e., the response of consumption spending by home-owners to the changes in housing wealth. Two issues show up while we estimate the 'genuine' wealth effects using aggregate time series data: the issues around home ownership and proper measure of consumption. We first argue that it is more appropriate to use non-housing consumption, because housing consumption is in large part not of the choice of home owners but the imputed rents they do not actually choose to pay. We then proceed to address the issue of home ownership, by examining how much to revise the estimates of housing wealth effect obtained from aggregate non-housing consumption data. We construct two structural models and estimate the share of home-owners' consumption in those models' context. It is found that, if properly revised in light of the estimated consumption shares of home-owners, the magnitude of resulting housing wealth effects are larger than what simple time series regressions imply.

  • PDF

Suggestion on Korean Internet governance system by multi stakeholder approach and Introduction of Korean Internet address law (한국 내 인터넷 거버넌스 형성과 인터넷주소에 관한 법률)

  • Yun, Boknam
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.3
    • /
    • pp.68-77
    • /
    • 2013
  • This article consists of 3 parts. Part I is multi stakeholder approach on Internet governance system. Part II is analysis of the Korean Internet governance system. In this part, I explain relevant laws in Korea, including Korean Internet Address Resources Act. Part III is my suggestion on Korean Internet governance system using a multi stakeholder approach. First of all, the keyword of the Internet governance system is decision making process: that is, consensus based versus top-down approach. Then who are major players in Internet governance in national level? Government, or Private sectors such as business and civil society. Korean legal system for Internet governance shows a top-down decision making process. Major players are the government (that is, Ministry of Science, ICT and Future Planning) and KISA affiliated with the government. Other players include Internet Address Policy Committee, Korea Internet Governance Alliance, and NGOs. The key statute for Internet governance in Korea is Internet Address Resources Act of 2004. Articles 3 and 5 require the Ministry of Science, ICT and Future Planning to take a proactive role in Internet governance. The government shall consult with the Internet Address Policy Deliberation Committee for Internet governance. Yet this Committee is established under the control of the Ministry of Science, ICT and Future Planning. All members of this Committee are also commissioned or nominated by the Chairman of the Ministry. Meanwhile, there are also non-official organizations, including Sub-committee on Address & Infrastructure of Korea Internet Governance Alliance. I suggest to reform decision making process of Korean Internet governance system based on BOTTOM-UP process for CONSENSUS BASED DECISION. My suggested system includes the following: (1) The government hands over a major role in Internet governance to INDEPENDENT Internet policy organization. And the government participates in such organization as ONE of the players. (2) Nomination of this committee member must be bottom-up process for a genuine multi-stakeholder model including civil society, commercial organization, end-users and experts. (3) The government should establish plan for supporting the private sector's international activity on the long-term basis.

  • PDF

Ethics for Cloned Human Beings: (<네버렛미고>를 통해본 복제 인간 윤리)

  • Kim, Mihye
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.8
    • /
    • pp.121-129
    • /
    • 2017
  • The evolution of biotechnology is no longer strange to the hypothetical scenario of cloning human genes to make cloned human beings. The characters of are cloned humans made in the laboratory by the 100-year-old life planning. They are cohabited in a school called Hailsham, where they are secretly reared. The purpose of this project is to provide healthy organs to real human patients with incurable diseases. The main characters Cathy, Tommy, and Ruth experience the growth of body and consciousness here during adolescence, and they also know the secret of identity as a clone. As adults, they move to a second residence, Cottage and are ready to begin organ donation. The second stage is also part of a program to provide more genuine-like organs to real patients. Even though they know all the plans that humans have built, they do not resist them and fatefully accept their situation. However, their non-responsiveness is not a declaration of renunciation of life, but a self-sacrificing life extension for another future that is the extension of life through their organ donation. The film emphasizes the fraternity and sacrificial attitudes of the cloned human beings and shows that it is necessary to continue the discussions on cloned human beings from a bio-ethical point of view supported by philosophical reasons.

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.