• Title/Summary/Keyword: operators

Search Result 4,538, Processing Time 0.035 seconds

A Study on the Revised Draft of Rome Convention on Compensation for Damage Caused by Aircraft to Third Parties - With Respect to the Draft Unlawful Interference Compensation Convention and the Draft General Risks Convention - (항공기에 의하여 발생된 제3자 손해배상에 관한 로마협약 개정안에 대한 고찰 - 불법방해배상협약안과 일반위험협약안을 중심으로 -)

  • Lee, Kang-Bin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.22 no.2
    • /
    • pp.27-51
    • /
    • 2007
  • The cumulative result of the work by the ICAO Secretariat, the Secretariat Study Group and the Council Special Group on the Modernization of the Rome Convention of 1952 are two draft Conventions, namely: "Draft Convention on Compensation for Damage Caused by Aircraft to Third Parties, in case of Unlawful Interference", and "Draft Convention on Compensation for Damage Caused by Aircraft to Third Parties" The core provisions of the former draft Convention are as follows: The liability of the operator is strict, that is, without the necessity of proof of fault. It would be liable for damage sustained by third parties on condition only that the damage was caused by an aircraft in flight(Article 3). However, such liability is caped based on the weight of the aircraft(Article 4). It is envisaged to create an independent organization called the Supplementary Compensation Mechanism, with the principle purpose to pay compensation to persons suffering damage in the territory of a State Party, and to provide financial support(Article 8). Compensation shall be paid by the SCM to the extent that the total amount of damages exceeds the Article 4 limits(Article 19). The main issues on the farmer draft Convention are relating to breaking away from Montreal Convention 1999, no limits on individual claims but a global limitation on air carrier liability, insurance coverage, cap of operators' strict liability, and Supplementary Compensation Mechanism. The core provisions of the latter draft Convention are as follows: the liability of the operator is strict, up to a certain threshold tentatively set at 250,000 to 500,000 SDRs. Beyond that, the operator is liable for all damages unless it proves that such damage were not due to its negligence or that the damages were solely due to the negligence of another person(Article 3). The provisions relating to the SCM and compensation thereunder do not operate under this Convention, as the operator is potentially for the full amount of damages caused. The main issues on the latter draft Convention are relating to liability limit of operator, and definition of general risks. In conclusion, we urge ICAO to move forward expeditiously on the draft Convention to establish a third party liability and compensation system that can stand ready to protect both third party victims and the aviation industry before another 9/11-scale event occurs.

  • PDF

A Study on the Safety Handling Method of KCG's Water Jet Propulsion Ship (해양경찰 Water Jet 추진함정의 안전 조함법 연구)

  • Yun, Chong-Gum;Pak, Chae-Hong;Park, Deuk-Jin;Jung, Cho-Yeong
    • Journal of Navigation and Port Research
    • /
    • v.41 no.6
    • /
    • pp.373-380
    • /
    • 2017
  • Operational errors caused by human factors, which is the major cause of marine accidents, include lack of knowledge, misunderstanding knowledge, and inadequate procedures. Recently, the type of propulsion mounted on KCG cutters has been diversified. In particular, the water jet propulsion unit, which was mainly installed in small boats, have been gradually expanded to medium and large size Coast Guard cutters, reaching 50% of the total. Axes types are divided into 2 to 4, and the bucket types are divided into Double Reverse Bucket(DRB) and Single Reverse Bucket(SRB); in these, the backward and steering control methods are completely different. Diversification of these operating systems can increase factors causing human error by the ships' operators. However, there is a lack of research on the maneuvering methods, considering the inherent active characteristics of each type of water jet. In this paper, we analyze the sideway method suitable for the condition of Coast Guard Exclusive wharf without assistance, based on the astern performance of each type. Then, a ship handling simulator was used for the experiment; they compared and verified through interviews of captains.

Analysis of VoLTE Charge Reduction under VoLTE Growth (VoLTE 활성화에 따른 요금 인하 여력 분석)

  • Lee, Sang-Woo;Jeong, Seon-Hwa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.1
    • /
    • pp.92-100
    • /
    • 2016
  • It is informed that the Voice over LTE(VoLTE) which serves voice and message on IP networks is better in terms of economies of scale than the legacy voice service on 2G/3G circuit-switched networks because of its technological and cost efficiency. In addition, services of voice and data are running on a single LTE network and as a result VoLTE has the more economies of scope. But, there is no study about how much technology-efficiency VoLTE has compared to circuit-based voice service and how much voice charge can be reduced as VoLTE grows up. This paper analyzes empirically cost-efficiency of VoLTE against circuit-based voice service and quantifies the reduction of voice charge as 2G/3G voice traffic shifts to VoLTE. The results describe the first is that the average cost of the total voice traffic rises shortly just after the investment of LTE network for providing VoLTE but it will soon have a capacity available to reduce the charge due to VoLTE's outstanding cost efficiency on the assumption that voice traffic is fixed, and the second is that the charge can be cut to 60% of the current rate in case of all the voice traffic moves to VoLTE. The latter proves partially the validation of data-focusing pricing plan. Our results are expected to become basic data for network operators' establishing pricing strategies and for policy makers' inducing price cutting.

Study on elements for effective infection control at dental hospitals (효과적인 치과병원 감염관리의 구성요소에 대한 고찰)

  • Bae, Sung-Suk;Lee, Myung-Sun
    • Journal of Korean society of Dental Hygiene
    • /
    • v.11 no.4
    • /
    • pp.557-569
    • /
    • 2011
  • Objectives : Based on the system and control activity for the monitoring system made of components for infection control at dental hospitals and infection rate reporting, and the role of trained infection control staff, this study tried to understand approaches to the effective infection control program by surveying infection control at dental hospitals in Korea. Methods : The survey was conducted from December 14,2010 to January 31,2011 for 121 dental hospitals in Korea. For statistical analysis, PASW Statistic 18 was used. Results : And following conclusions were reached. 1. As for the infection control system at dental hospitals, 54.7% has an infection control committee, 58.7% infection control staff, 78.5% infection control rules, and 39.7% annual infection control plan and record. 2. As for surveillance indexes to report infection rates, 50.4% has the reporting system for staff's exposure to infectious disease and needle pricking. The average number of exposures to infectious disease was $0.28{\pm}2.23$ and that of needle pricking was $1.83{\pm}5.39$. 3. As for infection control indexes, it was reviewed whether infection control rules were implemented according to operation agents, general hospitals were more active in staff infection control, and hospitals annexed to a dental university or special legal entity were more active in microorganism control. As for use of personal protection gear, there was no significant difference among operation agents. More than 71% of operators and their assistants said they did not replace their masks between patients. 4. As for personnel indexes for effective infection control staff, most hospitals designated dental hygienists, which was followed by dental doctors (or doctors). Where their workload was reviewed, the ratio of other work such as treatment was relatively higher than that of infection control (n=71). Conclusions : These results show dental hospitals in Korea have a certain level of infection control system. As infection indexes are managed mainly for staff members, patient monitoring is needed, and trained and effective infection control staff should be designated. This study reviewed surveillance, infection control and personnel indexes. And further studies are needed in the future.

A Study on the Application of 3D Virtual Human in the prior stage of Design Works - With the emphasis on the determining design layout of a forklift truck (디자인 초기단계에서의 3차원 가상인간(Virtual Human) 활용에 관한 연구 - 지게차 레이아웃 결정 단계를 중심으로)

  • 김관명
    • Archives of design research
    • /
    • v.12 no.4
    • /
    • pp.294-303
    • /
    • 1999
  • With the breakthrough development of computing environment, the design phases have been changed a lot nowadays. In the case of prior phases of transportation design such as cars and forklift-trucks design, designers have depended on surveys and 2D line drawings for fixing a product layout and extracting ergonomic data. In this method, designers don't meet only the problem of reliability of measuring data but also, the problems of unknown situation of operators' fatigue and comfort in work situation. In these methods, it has much less creditability to have a 2D human model to check the real world motion due to the limitation of the 3 Dimension. Even though with a 2D human model, perfect layout is determined, it is still difficult to measure about comfort and fatigue for a user because it measuring an analysing method is static. The development of computer hardware and software have not only changed the flow in the social-wide range but also immerged design into Virtual Environment. In conventional design method, visualization and data transferring have been the main issues but, in virtual environment, determining of design layout and analysing ergonomic data with sophisticated feeling about comfort and fatigue are possible by using 3D virtual human. In this study, the general characteristics of virtual environment was discussed and the possibility of digital process of design was treated. For these studies, layout design for forklift-trucks was tested. Eventually, the merits of each design phase applied virtual environment are discussed.

  • PDF

A Study on the effect of Spectrum difference between Cellular and PCS from Mobile Telecommunication Customer's perspective

  • Youn, Young-Seog;Cho, Byung-Sun;Ha, Young-Wook
    • Journal of Korea Technology Innovation Society
    • /
    • v.9 no.4
    • /
    • pp.627-653
    • /
    • 2006
  • The purpose of this study lies in understanding how the spectrum assigned for each mobile operator affects the consumers of mobile service. For this purpose, we have observed the change of path coefficient in the structural equation, using control variables. However, the structure of the mobile service market in Korea has become fixed. Considering this tendency and the conclusion of this study, the 'lock-in effect' occurs seriously in the mobile service market in Korea. It can be explained by the fact that CS(Customer Satisfaction) of the cellular subscribers little affects customer loyalty but the market dominance of the cellular service in the actual market has continued for a long time. In this study, we figured out a strong prejudice about call quality, which is caused by spectrum difference among competitors. Cellular subscribers tends to believe that call quality of their cellular service is better than that of PCS. In addition, we found that PCS operators can catch customer's retention by investment into network in order to increase call quality.

  • PDF

INFLUENCE OF APPLICATION METHODS OF A DENTIN ADHESIVE ON SHEAR BOND STRENGTH AND ADHESIVE PATTERN (상이질 접착제의 적용방법에 따른 전단결합강도와 접착양상에 관한 연구)

  • Park, Sung-Taek;Moon, Joo-Hoon;Cho, Young-Gon;Ohn, Yeong-Suck
    • Restorative Dentistry and Endodontics
    • /
    • v.24 no.2
    • /
    • pp.381-391
    • /
    • 1999
  • A new 5th generation adhesive system(ONE-STEP) has been supplied which operators can apply to conditioned tooth surfaces by one simplified step. The purpose of this study was to determine whether different methods of adhesive application and various air drying duration after applying adhesive affect the shear bond strength of composite resin to dentin, and to evaluate the adhesive pattern of composite resin and dentin under SEM. Seventy-seven extracted human molar teeth were cleaned and mounted in palstic test tubes. The occlusal dentin surfaces were exposed with Diamond Wheel Saw and smoothed with Lapping and Polishing Machine (South Bay Technology Co., U.S.A.). Teeth were randomly divided into 7 groups (n=11), In experimental A group, adhesive was applied to dentin with agitation for 20 sec. In experimental N-A group, adhesive were continuously applied to dentin for 20 sec. Also control and experimental 1, 2, 3, 4 groups were dried for 10, 0, 5, 20, 30 seconds after applying adhesive, respectively, Adhesives were light cured for 10 sec. A gelatin capsule 5mm in diameter was filled with Aelitefil$^{TM}$ composite resin, placed on the treated dentin surface and light cured for 40 see, from three sides, All specimens were stored in distilled water at room temperature for 24 hours. The shear bond strengths were measured using a universal testing machine(AGS-1000 4D, Japan) at a crosshead speed of 5mm/min. An one-way ANOVA and LSD test were used for statistical analysis of the data. For SEM evaluation, seven specimens were made and sectioned. Representive postfracture and seven specimens were mounted on brass stubs, sputter-coated with gold and observed under SEM. The results were as follows : 1. The shear bond strength of experimental A group which adhesive were applied to dentin with agitation was higher than that of experimental N-A group (continuous application), and there was significant difference between two groups (p<0.01). 2. The interface between composite and dentin according to different application methods showed close adaptation in experimental A group and showed tinny gap in experimental N-A group. 3. The shear bond strength accoding to various air drying duration was the lowest value(7.57${\pm}$2.60 MPa) in experimental 1 group, so there was significant difference between experimental 1 group and other four groups (p<0.05). But there was no significant difference of shear bond strength between four groups (p>0.05). 4. The interface between composite and dentin according to various air drying duration showed close adaptation in control group and tinny gap in experimental 3 and 4 groups. But experimental 1 and 2 groups showed $30{\mu}$ and 6 - $10{\mu}m$ thick gaps, respectively.

  • PDF

Access Control of XML Documents Including Update Operators (갱신 연산을 고려한 XML문서의 접근제어)

  • Lim Chung-Hwan;Park Seog
    • Journal of KIISE:Databases
    • /
    • v.31 no.6
    • /
    • pp.567-584
    • /
    • 2004
  • As XML becomes popular as the way of presenting information on the web, how to secure XML data becomes an important issue. So far study on XML security has focused on security of data communications by using digital sign or encryption technology. But, it now requires not just to communicate secure XML data on communication but also to manage query process to access XML data since XML data becomes more complicated and bigger. We can manage XML data queries by access control technique. Right now current XML data access control only deals with read operation. This approach has no option to process update XML queries. In this paper, we present XML access control model and technique that can support both read and update operations. In this paper, we will propose the operation for XML document update. Also, We will define action type as a new concept to manage authorization information and process update queries. It results in both minimizing access control steps and reducing memory cost. In addition, we can filter queries that have no access rights at the XML data, which it can reduce unnecessary tasks for processing unauthorized query. As a result of the performance evaluation, we show our access control model is proved to be better than other access control model in update query. But it has a little overhead to decide action type in select query.

The Design of a Complex Event Model for Effective Service Monitoring in Enterprise Systems (엔터프라이즈 시스템에서 효과적인 서비스 모니터링을 위한 복합 이벤트 모델의 설계)

  • Kum, Deuk-Kyu;Lee, Nam-Yong
    • The KIPS Transactions:PartD
    • /
    • v.18D no.4
    • /
    • pp.261-274
    • /
    • 2011
  • In recent competitive business environment each enterprise has to be agile and flexible. For these purposes run-time monitoring ofservices provided by an enterprise and early decision making through this becomes core competition of the enterprise. In addition, in order to process various innumerable events which are generated on enterprise systems techniques which make filtering of meaningful data are needed. However, the existing study related with this is nothing but discovering of service faults by monitoring depending upon API of BPEL engine or middleware, or is nothing but processing of simple events based on low-level events. Accordingly, there would be limitations to provide useful business information. In this paper, through situation detection an extended complex event model is presented, which is possible to provide more valuable and useful business information. Concretely, first of all an event processing architecture in an enterprise system is proposed, and event meta-model which is suitable to the proposed architecture is going to be defined. Based on the defined meta-model, It is presented that syntax and semantics of constructs in our event processing language including various and progressive event operators, complex event pattern, key, etc. In addition, an event context mechanism is proposed to analyze more delicate events. Finally, through application studies application possibility of this study would be shown and merits of this event model would be present through comparison with other event model.

A Study on the Perception of the Subjects about Automated Container Terminal (컨테이너터미널 자동화에 대한 관련 주체별 인식연구)

  • You, Ji-Won;Kim, Yul-Seong
    • Journal of Navigation and Port Research
    • /
    • v.44 no.3
    • /
    • pp.195-202
    • /
    • 2020
  • The production of larger of ships is a survival strategy for global shipping companies to pursue the economics of scale. According to this strategy, to respond to this situation, many containers are loading/unloading simultaneously in the hub port. Additionally, the container terminals are promoting the introduction of automation to expand the terminal facilities and increase efficiency/productivity of the container yards. European ports have introduced automation to address rising labor costs and shortages of labor. Recently, the construction of fully automated container terminals is increasing in the United States and China to resolve problems such as the slow growth of the global economy, the emergence of large ships, air pollution, and safety accidents. Domestic ports are at an early stage compared to the world's advanced container terminals, and countermeasures are being prepared to respond to the changing ports. However, research on the recognition difference analysis that examines the opinions of stakeholders is insufficient. As a result of analyzing the recognition among the groups, it was found that container terminal operators reduced labor costs, improved shipping services for shipping companies, prevented safety accidents for port union labor, and increased service for port authority and government agencies. Thus, to closely examine the perception among the groups, one-way ANOVA was performed, and then the implications were deduced as the basic data for the smooth introduction of automation.