• Title/Summary/Keyword: 존재 증명

Search Result 529, Processing Time 0.025 seconds

A Study on Causality in Medical Civil Liability (의료민사책임에서의 인과관계에 관한 소고)

  • Baek, Kyoung-Hee
    • The Korean Society of Law and Medicine
    • /
    • v.17 no.2
    • /
    • pp.57-81
    • /
    • 2016
  • It can determine the outcome of the lawsuit whether or not there is a causality between the medical malpractice of a physician and the patient's injury when the patient is filing a lawsuit against the physician in order to pursue civil liability for a medical accident. In medical malpractice lawsuits, it is not easy to judge causality between different civil cases because of the special nature of medical care. Also, information such as medical records is concentrated on doctors and the medical knowledge of the patient is relatively insufficient compared with the doctor. Therefore, it is recognized through medical malpractice lawsuits that the burden of proof of the causality burdened by the plaintiff patient is relaxed. In this paper, I examine the legal theory on how to recognize causality in medical civil liability and then concern the attitude of the case in Korea, which is divided into the types of the causality - such as the case of general medical practice, explanation duty, no causality with medical malpractice.

  • PDF

Electron Microscopy of the Al and $UO_2$ Nanophase Particles Synthesized in Horse Spleen Ferritin (말 비장 Ferritin에서 합성된 Al과 $UO_2$ 나노 입자의 전자현미경 연구)

  • Mun, Hyang-Ran;Kim, Kyung-Suk;Lee, Jung-Hoo
    • Applied Microscopy
    • /
    • v.29 no.3
    • /
    • pp.323-329
    • /
    • 1999
  • Synthesis of inorganic nanophase particles was performed to verify and understand the binding of non-ferrous metal ions including Al and $UO_2$ to the apoferritin molecules. Reconstituted inorganic particles of Al or $UO_2$ were identified by TEM as discrete electron dense cores encapsulated within the protein shell. The corresponding EDXA spectra confirm the presence of metal ions in the reconstituted ferritin. The Al cores of ferritin has been studied by TEM for the first time. Bimetallic cores with Al/Fe and $UO_2/Al$ were also produced and examined under TEM. Mixed metal cores encapsulated in the protein shell are well formed and its corresponding EDXA spectra also confirm the presence of metal ions in the mineral cores. Therefore, the present study proves that ferritin can be used to synthesize inorganic nanophase particles of Al and $UO_2$.

  • PDF

Design and Implementation of a Secure E-Mail System using Elliptic Curve Cryptosystem (타원곡선 암호 시스템을 이용한 보안 메일 시스템의 설계 및 구현)

  • Lee, Won-Goo;Kim, Sung-Jun;Lee, Hee-Gyu;Mun, Ki-Young;Lee, Jae-Kwang
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.4
    • /
    • pp.333-345
    • /
    • 2002
  • As computers and networks become popular, distributing information on the Internet is common in our daily life. Also, the explosion of the Internet, of wireless digital communication and data exchange on Internet has rapidly changed the way we connect with other people. But secure mail is gaining popularity abroad and domestically because of their nature of providing security. That is. It has been used a variety of fields such as general mail and e-mail for advertisement. But, As the data transmitted on network can be easily opened or forged with simple operations. Most of existing e-mail system don't have any security on the transmitted information. Thus, security mail system need to provide security including message encryption, content integrity, message origin authentication, and non-repudiation. In this paper, we design and implement secure mail system with secure key agreement algorithm, non-repudiation service, and encryption capability to provide services for certification of delivery and certification of content as well as the basic security services.

A Study on the Development Processes for Digital Contents in the Animation Industry (국내 애니메이션 기업의 애니메이션 콘텐츠 개발과정에 관한 연구)

  • Lee, Han-Chul;Jung, Jai-Jin
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.2
    • /
    • pp.246-259
    • /
    • 2007
  • The animation industry, which accelerates the overall development of the Digital contents industry, is a high value-added industry that produces synergy effects in cooperation with key industries such as IT. Effectively serving as a vital energy source for the Korean economy through its positive effects, such as employment creation. In particular, there is the real prospect that the Korean animation industry will gain ground in overseas markets and thus occupy them ahead of others, by advancing overseas in uni son with the hypersonic network industry. In this regard, this study aims to suggest some concrete ways in which to Korean animation companies can enhance their competitiveness. This is accomplished by positively verifying that some major representative methods of competitiveness enhancement, whose effectiveness has been proved in existing manufacturing and production systems. a re also excellently effective for the animation enterprise. In effect, the study has positively applied and carried out such research on Korean animation enterprises.

  • PDF

User Authentication and Key Distribution on Open IPTV System (개방형 IPTV 환경에서의 사용자 인증 및 키 분배 메커니즘)

  • Jung, Ji-Yeon;Doh, In-Shil;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.227-236
    • /
    • 2011
  • IPTV(Internet Protocol Television) is one of the typical businesses which are the convergence of Broadcast and Communication. It provides broadcasting service using IP networks. Recently, IPTV service is developed to Mobile IPTV or Open IPTV. Especially, Open IPTV uses open platform so not only service providers but also general users can provide contents to other users. Open IPTV system has many content providers, so existing security solution of IPTV cannot be adopted. In this paper, we suggest user authentication and key distribution mechanism on Open IPTV. Our proposed mechanism is based on Kerberos, so it can support distribution environment such as Open IPTV. We demonstrate that proposed mechanism can guarantee secure transmission of contents and reduce the delay of user authentication on Open IPTV system compared to other authentication mechanisms. We also compare our proposal and other mechanisms in various aspects, and analyze efficiency and safety of proposed mechanism. As a result, we insist that this mechanism satisfies the security requirements for IPTV.

Study on the Application of Airworthiness Standard for the e-VTOL (e-VTOL 항공기의 감항기술기준 적용 연구)

  • Choi, Joo-Won;Hwang, Chang-Jeon;Suk, Jin-Young
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.7
    • /
    • pp.593-599
    • /
    • 2021
  • The demand for e-VTOL aircraft is expected to be increased rapidly in the future as a means of urban transportation due to operating cost reduction, eco-friendliness and convenience of vertical take-off and landing using pilot-aids automation system. However, there are many technical hurdles to be solved in securing safety and certification which are essential for commercialization and urban operation. So far, there is no e-VTOL aircraft that has received type certificate and standard airworthiness certificate due to the technical problems and safety requirement differences with conventional aircraft. The e-VTOL aircraft certification should also meet the equivalent level of safety required by the current airworthiness standards, but there are existing problems in securing safety and meeting current standards. In this study, the e-VTOL's certification problems and technical limitations in satisfying the current standards are presented.

Implications and numerical application of the asymptotical shock wave model (점진적 충격파모형의 함축적 의미와 검산)

  • Cho, Seong-Kil
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.4
    • /
    • pp.51-62
    • /
    • 2012
  • According to the Lighthill and Whitham's shock wave model, a shock wave exists even in a homogeneous speed condition. They referred this wave as unobservable- analogous to a radio wave that cannot be seen. Recent research has attempted to identify how such a counterintuitive conclusion results from the Lighthill and Whitham's shock wave model, and derive a new asymptotical shock wave model. The asymptotical model showed that the shock wave in a homogenous speed traffic stream is identical to the ambient vehicle speed. Thus, no radio wave-like shock wave exists. However, performance tests of the asymptotical model using numerical values have not yet been performed. We investigated the new asymptotical model by examining the implications of the new model, and tested it using numerical values based on a test scenario. Our investigation showed that the only difference between both models is in the third term of the equations, and that this difference has a crucial role in the model output. Incorporation of model parameter${\alpha}$ is another distinctive feature of the asymptotical model. This parameter makes the asymptotical model more flexible. In addition, due to various choices of ${\alpha}$ values, model calibration to accommodate various traffic flow situations is achievable. In Lighthill and Whitham's model, this is not possible. Our numerical test results showed that the new model yields significantly different outputs: the predicted shock wave speeds of the asymptotical model tend to lean toward the downstream direction in most cases compared to the shock wave speeds of Lighthill and Whitham's model for the same test environment. Statistical tests of significance also indicate that the outputs of the new model are significantly different than the corresponding outputs of Lighthill and Whitham's model.

Improvement of a Verified Secure Key Distribution Protocol Between RFID and Readers (RFID와 리더간의 안전성이 검증된 키 분배 프로토콜의 개선)

  • Bae, Woo-Sik;Lee, Jong-Yun
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.331-338
    • /
    • 2011
  • The RFID system includes a section of wireless communication between the readers and the tags. Because of its vulnerability in terms of security, this part is always targeted by attackers and causes various security problems including the leakage of secret and the invasion of privacy. In response to these problems, various protocols have been proposed, but because many of them have been hardly implementable they have been limited to theoretical description and theorem proving without the accurate verification of their safety. Thus, this study tested whether the protocol proposed by Kenji et al. satisfies security requirements, and identified its vulnerabilities such as the exposure of IDs and messages. In addition, we proposed an improved RFID security protocol that reduced the number of public keys and random numbers. As one of its main characteristics, the proposed protocol was designed to avoid unnecessary calculations and to remove vulnerabilities in terms of security. In order to develop and verify a safe protocol, we tested the protocol using Casper and FDR(Failure Divergence Refinements) and confirmed that the proposed protocol is safe in terms of security. Furthermore, the academic contributions of this study are summarized as follows. First, this study tested the safety of a security protocol through model checking, going beyond theorem proving. Second, this study suggested a more effective method for protocol development through verification using FDR.

Evaluation of Introducing Feasibility of Blockchain Technology to Food Safety Management Network (식품안전관리망 강화를 위한 블록체인 기술 도입의 적절성 평가)

  • Kwon, So-Young;Min, Kyong-Se;Cho, Seung Yong
    • Journal of Food Hygiene and Safety
    • /
    • v.34 no.5
    • /
    • pp.489-494
    • /
    • 2019
  • The appropriateness of introducing blockchain technology into food safety management systems was evaluated by conducting a survey of experts on the effectiveness and constraint evaluation indicators, and a portfolio analysis was conducted to set the priorities of blockchain application. The food safety management activities considered in this study were issuing documents on food import/export, food hygiene rating scheme, civil complaint management in the food sector, food- related certification, risk information management, and food traceability systems. The sectors that can be expected to be effective in the introduction of blockchain technology were food- related certification, food hygiene rating scheme, risk information management, and issuing documents on food import/export. In the case of food traceability systems and civil complaint management, the introduction of blockchain technology was not recommended due to ineffectiveness. From the evaluation of the constraints (e.g., technical limits, cost, legal amendment, personal information disclosure, timeliness, and ease of connection) to be overcome when introducing blockchain into food safety management, it was found that there are more than average constraints in all six areas. In particular, the food traceability system was evaluated to have the most constraints. Issuing documents on food import/export is very effective with the introduction of blockchain technology, but due to high cost and legal restrictions, it is necessary to improve the institutional system in order to introduce blockchain. Among the evaluation sectors, food- related certification, food hygiene rating scheme, and risk information management on foods were suitable for preferentially adopting blockchain technology since these areas might experience greatly improved reliability and transparency through the introduction of blockchain, with relatively low constraints.

A Dominating Set Algorithm (지배집합 알고리즘)

  • Lee, Sang-Un
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.9
    • /
    • pp.121-129
    • /
    • 2013
  • This paper proposes a linear-time algorithm that has been designed to obtain an accurate solution for Dominating Set (DS) problem, which is known to be NP-complete due to the deficiency of polynomial-time algorithms that successfully derive an accurate solution to it. The proposed algorithm does so by repeatedly assigning vertex v with maximum degree ${\Delta}(G)$among vertices adjacent to the vertex v with minimum degree ${\delta}(G)$ to Minimum Independent DS (MIDS) as its element and removing all the incident edges until no edges remain in the graph. This algorithm finally transforms MIDS into Minimum DS (MDS) and again into Minimum Connected DS (MCDS) so as to obtain the accurate solution to all DS-related problems. When applied to ten different graphs, it has successfully obtained accurate solutions with linear time complexity O(n). It has therefore proven that Dominating Set problem is rather a P-problem.