• Title/Summary/Keyword: pirates

Search Result 39, Processing Time 0.029 seconds

A Critical Review and Legislative Direction for Criminal Constitution of Piracy (해적행위의 범죄구성요건에 대한 비판적 고찰과 입법 방향)

  • Baeg, Sang-Jin
    • Journal of Legislation Research
    • /
    • no.55
    • /
    • pp.167-191
    • /
    • 2018
  • Despite international cooperation, piracy has not yet been eradicated in major waters around the world. From the perspective of South Korea, which is absolutely dependent on exporting and importing, it's a lifeline for us to secure safe maritime traffic so it is a situation we have to be vigilant about maritime safety and security. However, criminal law on punishment of piracy is still insufficient and legislative consideration is needed. Since pirates are regarded as enemies of humankind, all nations can punish pirates regardless of their damage. The international community has done its best in cooperation from hundreds of years ago to secure maritime trade through this universal jurisdiction and marine transportation in international waters which is an essential space for military activities, particularly in the Gulf of Aden, the advanced nations have dispatched fleets to combat maritime security threats through joint operations to crack down on Somali pirates. Even if universal jurisdiction is allowed for piracy in accordance with the International Convention on Human Rights and the United Nations Convention on the Law of the Sea, it is difficult to effectively deal with piracy if it not fully complied with a domestic legal system for this purpose or is stipulated as different from international regulations. In other words, universal jurisdiction corresponding to international norms and constitution of piracy should be defined in criminal law in accordance with criminal statutory law. If the punishment of pirates by unreasonably applying our criminal law without prejudice to such work can lead to diplomatic disputes in violation of the Universal Declaration of Human Rights or other international norms. In South Korea, there is no provision to explicitly prescribe piracy as a crime, but punish similar acts like piracy in criminal law and maritime safety law. However, there is a limit to effective piracy punishment because we are not fully involved in internationally accepted piracy. In this study, we critically examine the proposals of the constitutional elements of piracy, propose the legislative direction, and insist on the introduction of globalism to pirate sins.

Selective Encryption Algorithm Using Hybrid Transform for GIS Vector Map

  • Van, Bang Nguyen;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.68-82
    • /
    • 2017
  • Nowadays, geographic information system (GIS) is developed and implemented in many areas. A huge volume of vector map data has been accessed unlawfully by hackers, pirates, or unauthorized users. For this reason, we need the methods that help to protect GIS data for storage, multimedia applications, and transmission. In our paper, a selective encryption method is presented based on vertex randomization and hybrid transform in the GIS vector map. In the proposed algorithm, polylines and polygons are focused as the targets for encryption. Objects are classified in each layer, and all coordinates of the significant objects are encrypted by the key sets generated by using chaotic map before changing them in DWT, DFT domain. Experimental results verify the high efficiency visualization by low complexity, high security performance by random processes.

Selective Encryption Algorithm for 3D Printing Model Based on Clustering and DCT Domain

  • Pham, Giao N.;Kwon, Ki-Ryong;Lee, Eung-Joo;Lee, Suk-Hwan
    • Journal of Computing Science and Engineering
    • /
    • v.11 no.4
    • /
    • pp.152-159
    • /
    • 2017
  • Three-dimensional (3D) printing is applied to many areas of life, but 3D printing models are stolen by pirates and distributed without any permission from the original providers. Moreover, some special models and anti-weapon models in 3D printing must be secured from the unauthorized user. Therefore, 3D printing models must be encrypted before being stored and transmitted to ensure access and to prevent illegal copying. This paper presents a selective encryption algorithm for 3D printing models based on clustering and the frequency domain of discrete cosine transform. All facets are extracted from 3D printing model, divided into groups by the clustering algorithm, and all vertices of facets in each group are transformed to the frequency domain of a discrete cosine transform. The proposed algorithm is based on encrypting the selected coefficients in the frequency domain of discrete cosine transform to generate the encrypted 3D printing model. Experimental results verified that the proposed algorithm is very effective for 3D printing models. The entire 3D printing model is altered after the encryption process. The decrypting error is approximated to be zero. The proposed algorithm provides a better method and more security than previous methods.

Selective Encryption Algorithm Based on DCT for GIS Vector Map

  • Giao, Pham Ngoc;Kwon, Gi-Chang;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.7
    • /
    • pp.769-777
    • /
    • 2014
  • With the rapid interest in Geographic Information System (GIS) contents, a large volume of valuable GIS dataset has been distributed illegally by pirates, hackers, or unauthorized users. Therefore the problem focus on how to protect the copyright of GIS vector map data for storage and transmission. At this point, GIS security techniques focusing on secure network and data encryption have been studied and developed to solve the copyright protection and illegal copy prevention for GIS digital map. But GIS vector map data is very large and current data encryption techniques often encrypt all components of data. That means we have encrypted large amount of data lead to the long encrypting time and high complexity computation. This paper presents a novel selective encryption scheme for GIS vector map data protection to store, transmit or distribute to authorized users using K-means algorithm. The proposed algorithm only encrypts a small part of data based on properties of polylines and polygons in GIS vector map but it can change whole data of GIS vector map. Experimental results verified the proposed algorithm effectively and error in decryption is approximately zero.

A study on the Optimum Capacity of Citadel (선원대피처의 적정규모에 관한 연구)

  • Kim, Won-Ouk;Kim, Chang-Jae;Chae, Yang-Bum
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2011.11a
    • /
    • pp.142-143
    • /
    • 2011
  • As mentioned above, various safety measures are considered and discussed as hijacking of Korean vessels by pirates is increasing. Thus, the standard for ship's facilities has been partially revised and setting up an evacuation shelter on all vessels sailing dangerous zone has been reinforced. This research aims to discuss crew Citadel set up that has to sail long haul. In addition, measures against potential gas flow have to be taken due to recent pirate armed and portable rocket attacks. There is also a possibility of fire outbreak within the vessel due to its nature. Thus, this research assesses the relevant number of crew Citadel theoretically. It will also make a model by estimating the relevant number of shelters in the event of fire outbreak and implement simulation using FDS.

  • PDF

A Study on Piracy and the Liability of the Insurer based on Somali Pirates (소말리아 해적사건을 통한 해적행위와 해상보험자의 책임에 관한 연구)

  • Choi, Byoung Kwon
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.59
    • /
    • pp.113-135
    • /
    • 2013
  • Piracy has been an ongoing and serious problem in international shipping industry. Somalia is often in the news these days. Somalia has been in a state of unrest for more than two centuries. In recent times, the situation has remained unstable. The persistent unrest is the major driver behind the piracy epidemic in Somalia waters. By the MIA 1906, s.78(1), the expenses in order to be recoverable must have been "properly incurred". The underwriter is also liable in certain circumstances for expenses incurred by the assured in an attempt to avert or diminish loss covered by the policy, under provisions. This class of expenditure is commonly referred to as sue and labour expenses, or suing and labouring expenses; less commonly, as particular charges. The standard marine policy(the S.G.Form) contained what was invariably called the sue and labour clause, which has been replaced in the current Institute Clauses by the "Duty of Assured(Sue and Labour)" Clause in the Hull Clauses, and the "Duty of Assured" Clause, headed "Minimizing losses", in the Cargo Clauses. Sue and labour charges are not confined to expenditure on the part of the assured and his agents, but can include quantified loss consequent upon a sacrifice properly and reasonably made to avert or minimize an insured loss.

  • PDF

Selective Encryption Scheme for Vector Map Data using Chaotic Map

  • Bang, N.V.;Moon, Kwang-Seok;Lim, Sanghun;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.7
    • /
    • pp.818-826
    • /
    • 2015
  • With the rapid interest in Geographic Information System (GIS) contents, a large volume of valuable GIS dataset has been distributed illegally by pirates, hackers, or unauthorized users. Therefore the problem focus on how to protect the copyright of GIS vector map data for storage and transmission. But GIS vector map data is very large and current data encryption techniques often encrypt all components of data. That means we have encrypted large amount of data lead to the long encrypting time and high complexity computation. This paper presents the selective encryption scheme using hybrid transform for GIS vector map data protection to store, transmit or distribute to authorized users. In proposed scheme, polylines and polygons in vector map are targets of selective encryption. We select the significant objects in polyline/polygon layer, and then they are encrypted by the key sets generated by using Chaotic map before changing them in DWT, DFT domain. Experimental results verified the proposed algorithm effectively and error in decryption is approximately zero.

The Forms of Man's Wig in Seventeen-Eighteen Century Focused on the movie "Pirates Of The Caribbean: The Curse of the Black Pearl" (17, 18세기 남성의 가발형태 영화 "캐리비안의 해적-블랙펄의 저주-"을 중심으로)

  • Choi, Mi-Ouk;Kim, Sung-Nam
    • Journal of the Korean Society of Fashion and Beauty
    • /
    • v.5 no.3
    • /
    • pp.105-110
    • /
    • 2007
  • With the beginning of seventeenth century, the men in France royal palace began to wear wigs and by eighteenth century wig became sole possession of men. Then, it had been become a satire thing filling one side of the era with the pouf that had been for women. All these things were closely related with the unstable social situation. The bourgeoisie expressed the anger for the privilege that come from the disparity of class consciousness. The reaction against the discriminative treatment by the illuminists stimulated the outbreak of the French Revolution on 14th, July in 1789. This paved way of characterizing the wig styles of the time. The symbolism of cultural-historical meaning in the west is not confined only in Europe. The worship of hair that is different from one cultural area to another had started with their own unique taboo consciousness and had developed to the form speaking for the expression of masculine, the symbol of man power and the extravagance of the privileged class.

  • PDF

A Study on the Social Phenomena of the Ming Dynasty from the Description of Characters' images in the Work of "Piao Hai Lu" (从 《漂海录》 中人物形象看明朝社会现象)

  • Choi, Chang-Won
    • Industry Promotion Research
    • /
    • v.3 no.1
    • /
    • pp.73-77
    • /
    • 2018
  • This paper written by Choi Bu based on "Piaohailu". This book consists of 3 volumes and it is his travelogue; Choi Bu has departed from Jeju Island to Naju, Jeolla province in the end of 1487, but it drifted on his way, so arrived to Zhejiang Province, China(Mid-Ming Dynasty) in early 1488. In this place, he interrogated with a reason for Japan pirates, but he released soon. And his waterway journey from Hangzhou to Beijing, he had received the award in Beijing which is the grace of the Emperor;and his land route journey from Beijing through Liaodong to Uiju, Pingan Province. Afterwards, this book had been translated in Japanese, English etc; and it had been awarded an alias of 'Chaoxian's Marco Polo'.From the description of the characters in the Mid-Ming Dynasty in the work of Pyohae-rok, the essay makes a study on the knowledge of ancient Korean scholars to China, and looks at the different social and political aspects and characteristics of the Ming Dynasty from the eyes of Korean scholars. It summarizes that when we face history squarely, it is important to refer to and draw on the foreign works recorded by ancient Korean scholars.

A Study on the Characteristics of Housing Environment at Namdo Castle in Chindo (진도 남도석성의 주거환경특성에 관한 기초조사연구)

  • 임만택
    • Journal of the Korean housing association
    • /
    • v.15 no.1
    • /
    • pp.15-23
    • /
    • 2004
  • Namdo castle located in Namdong-ri, Imhoi-myon, Chindo-kun Cholla South Province is 610 meters long 5.3 meters high, and 20,000 square meters wide. This castle hasn't an accurate built year record. But there is still a great possibility of its having been built in the Sam-kuk (Three Kingdoms) era (around A.D. 300∼700). This castle seems to have been enlarged after 1438 because Manho-pu (lower unit of government office in Chosun dynasty) in Namdopo first appeared in the 20th year of King Sejong's reign. The main office, guest rooms, official residency of the castle were removed during the Japanese colonial rule and the land of the castle was sold separately for housing in the name of liquidation of Korean history. Thus, the Namdo castle that served as a naval base to defeat the Japan-based pirates' invasions throughout the Chosun period disappeared. As of Oct. 2000. 28 houses including a town hall occupy the site of the castle and are expected to be removed according to the restoration program of the castle. In this thesis, I'd like to study about the characteristics of housing in the site of the castle. To figure out the direction of the restoration program. I interviewed a few relating public officials in Chindo County Office. To examine the characteristics of housing, I surveyed the residents for the surrounding of housing.