http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Acetic acid수용액을 포함한 4성분계의 액-액평형
장윤식(Jang Yoon Sik),박동원(Park Dong Won) 동아대학교 해양자원연구소 1999 동아대학교 해양자원연구소 연구논문집 Vol.12 No.-
25℃에서 Acetic acid-water-binary solvent를 포함한 4성분 액-액추출계의 상평형에 대하여 연구하였다. methyl iso-butyl ketone(MIBK)-ethyl acetate을 혼합용매로 사용하였으며, 수용액으로부터 Acetic acid을 추출함에 있어서 혼합용매 사용의 효과를 고찰하기 위하여 각 4성분계에 대한 용해도곡선, tie-line, 분배도와 선택도를 측정하였다. 또한 실험에 의한 상평형 데이터를 UNIFAC 모델식으로 부터 계산된 값들과 비교하였으며, 4성분계 액-액평형에 대한 UNIFAC 모델의 적용 가능성을 확인하였다. We studied on the phase equilibria of quaternary liquid-liquid extraction system containing Acetic acid-water-binary solvent at 25℃. MIBK- ethyl acetate were used as binary solvents. Binodal curve, tie-line, distribution and selectivity for each quaternary system have been determined in order to investigate the effect of using binary solvent in extracting Acetic acid from aqueous solution.<BR> And these experimental equilibrium data were also compared with the values predicted by UNIFAC model. UNIFAC model was successfully used to predict quaternary liquid-liquid equilibria.
장윤식(Jang Yun Sik),김수정(Kim Soo Jung),정진성(Cheong Jin Seong) 경찰대학 경찰학연구편집위원회 2014 경찰학연구 Vol.14 No.3
This study aimed to test the effect of crime victimization and fear of crime on quality of life. To this end, a path analysis model was constructed using survey data of 440 residents in Busan and Daejeon. The analysis result showed that neither crime victimization nor fear of crime had a significant effect on quality of life. Among the variables that were hypothesized to have a direct and indirect influence on quality of life (i.e., sex, indirect crime victimization, physical disorder, social disorder), only physical disorder had a negative direct effect on the dependent variable. It was an outcome contrary to the common sense (myth), and also very much different from that of Rho's research(2013) on juvenile subjects. Although this study was limited to certain neighborhoods in metropolitan areas, it could find its own meaning in that it was the first empirical attempt in Korea to discover the causal relationship between crime and quality of life utilizing general sample of citizens. It was suggested that future research be more general in research areas and more specific in types of crime. Also, a plausible causal model was expected to have a great contribution to this research topic that includes depression, anger, low self-esteem, and PTSD (Posttraumatic stress disorder) as a mediating factor.
장윤식(Jang Yun Sik),김기범(Kim Gi Bum),이관희(Lee Kwan Hee) 경찰대학 경찰학연구편집위원회 2014 경찰학연구 Vol.14 No.4
This paper proposes legislative adjustment to the current Act on Promotion of Information and Communications Network Utilization and Information Protection, ect(hereafter Act on ICN) after discussing several interpretative problems regarding so called ‘hacking’, that is, intrusive acts on information and communications network prescribed on article 48 - (1) of Act on ICN. The necessity of criminal punishment against intrusive acts on information and communications network has arisen more severely as cyber security matters to a great extent in our daily lives. Criminal punishment against hacking has been more extensive since 1987 when the name of the offence was ‘intrusive and destructive acts on computer networks’ - the origin of the offense. Throughout this process, a number of problems occurred in relation to legal interest protected by the code and corpus delicti as follows;First, legal interest is not properly described in the article. Initially the article seems to protect information and communications networks owned by provider of information and communications services. However, interpretation of legal interest has gradually become blurred due to the rise of personal PC and especially smart phones. Although the extent of protection can expand by interpretational flexibility of the article considering the purpose of enactment, this interpretational measure cannot completely cover substantial difference between the extent of damage caused by infringement on computer systems of service providers and those of individuals. Second, the definition of information and communications network is not clear enough. When originally enacted, the act seemed to describe individual computer or communication network limited to specific orientations. These days, however, ‘Internet’ connects all the computers all at once, therefore, the information and communications network can easily stretches out indefinitely. Under these circumstances, the term ‘network’ in the code goes against the rule of clarity; the code cannot simply specify which network was compromised from a perpetrator’s end of the rink all the way to a victim’s. The legal statutes of the U.S., Germany and the Council of Europe(Convention on Cybercrime) use the term ‘computer’ or ‘system’ instead of ‘network’, which provides many legislative implications. Third, the concepts of access and intrusion are ambiguous. While the subject of intrusion is clearly stipulated as information and communications network, the subject of access does not exist. It could mean both: the network, the same as intrusion, and a specific piece of information within the network. Legal appraisal varies according to which approach is taken; if the subject of access is the network itself, access is the prior step to intrusion, so it can be treated as ‘attempted crime’. If it is the letter, access failure to targeted information within the network can still constitute an intrusion to network. In particular, the concept of access should be more clearly defined since it is essential to interpretation of a normative term, ’authority for access’. In order to solve aforementioned interpretative problems, several legislative amendments should be put in place. First of all, legal interest and corpus delicti ought to be set down in a more detailed matter; the article should clarify whether to protect individual PCs and smart phones. It is possible that the Act on ICN only prescribes the protection of networks owned by service providers and the others - personal gadgets - shall be covered by penal code. Or a new legislation can be enacted so as to include both subjects. Secondly, the extent of network in the article should be narrowly interpreted, and eventually the code should incorporate the terms like ‘computer’ and ‘system’ in the light of overseas cases. Finally, by clarifying the concept of access and intrusion, the same act should be treated equally in any circumstances no matter who interprets it legally.