• Title/Summary/Keyword: Code development

Search Result 2,643, Processing Time 0.036 seconds

A Mutual P3P Methodology for Privacy Preserving Context-Aware Systems Development (프라이버시 보호 상황인식 시스템 개발을 위한 쌍방향 P3P 방법론)

  • Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.145-162
    • /
    • 2008
  • One of the big concerns in e-society is privacy issue. In special, in developing robust ubiquitous smart space and corresponding services, user profile and preference are collected by the service providers. Privacy issue would be more critical in context-aware services simply because most of the context data themselves are private information: user's current location, current schedule, friends nearby and even her/his health data. To realize the potential of ubiquitous smart space, the systems embedded in the space should corporate personal privacy preferences. When the users invoke a set of services, they are asked to allow the service providers or smart space to make use of personal information which is related to privacy concerns. For this reason, the users unhappily provide the personal information or even deny to get served. On the other side, service provider needs personal information as rich as possible with minimal personal information to discern royal and trustworthy customers and those who are not. It would be desirable to enlarge the allowable personal information complying with the service provider's request, whereas minimizing service provider's requiring personal information which is not allowed to be submitted and user's submitting information which is of no value to the service provider. In special, if any personal information required by the service provider is not allowed, service will not be provided to the user. P3P (Platform for Privacy Preferences) has been regarded as one of the promising alternatives to preserve the personal information in the course of electronic transactions. However, P3P mainly focuses on preserving the buyers' personal information. From time to time, the service provider's business data should be protected from the unintended usage from the buyers. Moreover, even though the user's privacy preference could depend on the context happened to the user, legacy P3P does not handle the contextual change of privacy preferences. Hence, the purpose of this paper is to propose a mutual P3P-based negotiation mechanism. To do so, service provider's privacy concern is considered as well as the users'. User's privacy policy on the service provider's information also should be informed to the service providers before the service begins. Second, privacy policy is contextually designed according to the user's current context because the nomadic user's privacy concern structure may be altered contextually. Hence, the methodology includes mutual privacy policy and personalization. Overall framework of the mechanism and new code of ethics is described in section 2. Pervasive platform for mutual P3P considers user type and context field, which involves current activity, location, social context, objects nearby and physical environments. Our mutual P3P includes the privacy preference not only for the buyers but also the sellers, that is, service providers. Negotiation methodology for mutual P3P is proposed in section 3. Based on the fact that privacy concern occurs when there are needs for information access and at the same time those for information hiding. Our mechanism was implemented based on an actual shopping mall to increase the feasibility of the idea proposed in this paper. A shopping service is assumed as a context-aware service, and data groups for the service are enumerated. The privacy policy for each data group is represented as APPEL format. To examine the performance of the example service, in section 4, simulation approach is adopted in this paper. For the simulation, five data elements are considered: $\cdot$ UserID $\cdot$ User preference $\cdot$ Phone number $\cdot$ Home address $\cdot$ Product information $\cdot$ Service profile. For the negotiation, reputation is selected as a strategic value. Then the following cases are compared: $\cdot$ Legacy P3P is considered $\cdot$ Mutual P3P is considered without strategic value $\cdot$ Mutual P3P is considered with strategic value. The simulation results show that mutual P3P outperforms legacy P3P. Moreover, we could conclude that when mutual P3P is considered with strategic value, performance was better than that of mutual P3P is considered without strategic value in terms of service safety.

Preliminary Post-closure Safety Assessment of Disposal Options for Disused Sealed Radioactive Source (폐밀봉선원 처분방식별 폐쇄후 예비안전성평가)

  • Lee, Seunghee;Kim, Juyoul;Kim, Sukhoon
    • Economic and Environmental Geology
    • /
    • v.49 no.4
    • /
    • pp.301-314
    • /
    • 2016
  • Disused Sealed Radioactive Sources (DSRSs) are stored temporally in the centralized storage facility of Korea Radioactive Waste Agency (KORAD) and planned to be disposed in the low- and intermediate-level radioactive waste (LILW) disposal facility in Gyeongju city. In this study, preliminary post-closure safety assessment was performed for DSRSs in order to draw up an optimum disposal plan. Two types of disposal options were considered, i.e. engineered vault type disposal and rock cavern type disposal which were planned to be constructed and operated respectively in LILW disposal facility in Gyeongju city. Assessment end-point was individual effective dose of critical group and calculated by using GoldSim code. In normal scenario, the maximum dose was estimated to be approximately $1{\times}10^{-7}mSv/yr$ for both disposal options. It meant that both options had sufficient safety margin when compared with regulatory limit (0.1 mSv/yr). Otherwise, in well scenario, the maximum dose exceeded regulatory limit of 1 mSv/yr in engineered vault type disposal and the exposure dose was mainly contributed by $^{226}Ra$, $^{210}Pb$ (daughter nuclide of $^{226}Ra$) and $^{237}Np$ (daughter nuclide of $^{241}Am$). For rock cavern type disposal, even though the peak dose satisfied regulatory limit, the exposure doses by $^{14}C$ and $^{237}Np$ were relatively high above 10% of regulatory limit. Therefore, it is necessary to exclude $^{14}C$, $^{226}Ra$ and $^{241}Am$ for two type of disposal options and additional management such as long-term storage and development of disposal container for those radionuclides should be performed before permanent disposal for conservative safety and security.

The Multi-door Courthouse: Origin, Extension, and Case Studies (멀티도어코트하우스제도: 기원, 확장과 사례분석)

  • Chung, Yongkyun
    • Journal of Arbitration Studies
    • /
    • v.28 no.2
    • /
    • pp.3-43
    • /
    • 2018
  • The emergence of a multi-door courthouse is related with a couple of reasons as follows: First, a multi-door courthouse was originally initiated by the United States government that increasingly became impatient with the pace and cost of protracted litigation clogging the courts. Second, dockets of courts are overcrowded with legal suits, making it difficult for judges to handle those legal suits in time and causing delays in responding to citizens' complaints. Third, litigation is not suitable for the disputant that has an ongoing relationship with the other party. In this case, even if winning is achieved in the short run, it may not be all that was hoped for in the long run. Fourth, international organizations such as the World Bank, UNDP, and Asia Development Bank urge to provide an increased access to women, residents, and the poor in local communities. The generic model of a multi-door courthouse consists of three stages: The first stage includes a center offering intake services, along with an array of dispute resolution services under one roof. At the second stage, the screening unit at the center would diagnose citizen disputes, then refer the disputants to the appropriate door for handling the case. At the third stage, the multi-door courthouse provides diverse kinds of dispute resolution programs such as mediation, arbitration, mediation-arbitration (med-arb), litigation, and early neutral evaluation. This study suggests the extended model of multi-door courthouse comprised of five layers: intake process, diagnosis and door-selection process, neutral-selection process, implementation process of dispute resolution, and process of training and education. One of the major characteristics of extended multi-door courthouse model is the detailed specification of individual department corresponding to each process within a multi-door courthouse. The intake department takes care of the intake process. The screening department plays the role of screening disputes, diagnosing the nature of disputes, and determining a suitable door to handle disputes. The human resources department manages experts through the construction and management of the data base of mediators, arbitrators, and judges. The administration bureau manages the implementation of each process of dispute resolution. The education and training department builds long-term planning to procure neutrals and experts dealing with various kinds of disputes within a multi-door courthouse. For this purpose, it is necessary to establish networks among courts, law schools, and associations of scholars in order to facilitate the supply of manpower in ADR neutrals, as well as judges in the long run. This study also provides six case studies of multi-door courthouses across continents in order to grasp the worldwide picture and wide spread phenomena of multi-door courthouse. For this purpose, the United States and Latin American countries including Argentina and Brazil, Middle Eastern countries, and Southeast Asian countries (such as Malaysia and Myanmar), Australia, and Nigeria were chosen. It was found that three kinds of patterns are discernible during the evolution of a multi-door courthouse model. First, the federal courts of the United States, land and environment court in Australia, and Lagos multi-door courthouse in Nigeria may maintain the prototype of a multi-door courthouse model. Second, the judicial systems in Latin American countries tend to show heterogenous patterns in terms of the adaptation of a multi-door courthouse model to their own environments. Some court systems of Latin American countries including those of Argentina and Brazil resemble the generic model of a multi-door courthouse, while other countries show their distinctive pattern of judicial system and ADR systems. Third, it was found that legal pluralism is prevalent in Middle Eastern countries and Southeast Asian countries. For example, Middle Eastern countries such as Saudi Arabia have developed various kinds of dispute resolution methods, such as sulh (mediation), tahkim (arbitration), and med-arb for many centuries, since they have been situated at the state of tribe or clan instead of nation. Accordingly, they have no unified code within the territory. In case of Southeast Asian countries such as Myanmar and Malaysia, they have preserved a strong tradition of customary laws such as Dhammthat in Burma, and Shriah and the Islamic law in Malaysia for a long time. On the other hand, they incorporated a common law system into a secular judicial system in Myanmar and Malaysia during the colonial period. Finally, this article proposes a couple of factors to strengthen or weaken a multi-door courthouse model. The first factor to strengthen a multi-door courthouse model is the maintenance of flexibility and core value of alternative dispute resolution. We also find that fund raising is important to build and maintain the multi-door courthouse model, reflecting the fact that there has been a competition surrounding the allocation of funds within the judicial system.

Verifying the Classification Accuracy for Korea's Standardized Classification System of Research F&E by using LDA(Linear Discriminant Analysis) (선형판별분석(LDA)기법을 적용한 국가연구시설장비 표준분류체계의 분류 정확도 검증)

  • Joung, Seokin;Sawng, Yeongwha;Jeong, Euhduck
    • Management & Information Systems Review
    • /
    • v.39 no.1
    • /
    • pp.35-57
    • /
    • 2020
  • Recently, research F&E(Facilities and Equipment) have become very important as tools and means to lead the development of science and technology. The government has been continuously expanding investment budgets for R&D and research F&E, and the need for efficient operation and systematic management of research F&E built up nationwide has increased. In December 2010, The government developed and completed a standardized classification system for national research F&E. However, accuracy and trust of information classification are suspected because information is collected by a method in which a user(researcher) directly selects and registers a classification code in NTIS. Therefore, in the study, we analyzed linearly using linear discriminant analysis(LDA) and analysis of variance(ANOVA), to measure the classification accuracy for the standardized classification system(8 major-classes, 54 sub-classes, 410 small-classes) of the national research facilities and equipment established in 2010, and revised in 2015. For the analysis, we collected and used the information data(50,271 cases) cumulatively registered in NTIS(National Science and Technology Service) for the past 10 years. This is the first case of scientifically verifying the standardized classification system of the national research facilities and equipment, which is based on information of similar classification systems and a few expert reviews in the in-outside of the country. As a result of this study, the discriminant accuracy of major-classes organized hierarchically by sub-classes and small-classes was 92.2 %, which was very high. However, in post hoc verification through analysis of variance, the discrimination power of two classes out of eight major-classes was rather low. It is expected that the standardized classification system of the national research facilities and equipment will be improved through this study.

PST Member Behavior Analysis Based on Three-Dimensional Finite Element Analysis According to Load Combination and Thickness of Grouting Layer (하중조합과 충전층 두께에 따른 3차원 유한요소 해석에 의한 PST 부재의 거동 분석)

  • Seo, Hyun-Su;Kim, Jin-Sup;Kwon, Min-Ho
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.22 no.6
    • /
    • pp.53-62
    • /
    • 2018
  • Follofwing the accelerating speed-up of trains and rising demand for large-volume transfer capacity, not only in Korea, but also around the world, track structures for trains have been improving consistently. Precast concrete slab track (PST), a concrete structure track, was developed as a system that can fulfil new safety and economic requirements for railroad traffic. The purpose of this study is to provide the information required for the development and design of the system in the future, by analyzing the behavior of each structural member of the PST system. The stress distribution result for different combinations of appropriate loads according to the KRL-2012 train load and KRC code was analyzed by conducting a three-dimensional finite element analysis, while the result for different thicknesses of the grouting layer is also presented. Among the structural members, the largest stress took place on the grouting layer. The stress changed sensitively following the thickness and the combination of loads. When compared with a case of applying only a vertical KRL-2012 load, the stress increased by 3.3 times and 14.1 times on a concrete panel and HSB, respectively, from the starting load and temperature load. When the thickness of the grouting layer increased from 20 mm to 80 mm, the stress generated on the concrete panel decreased by 4%, while the stress increased by 24% on the grouting layer. As for the cracking condition, tension cracking was caused locally on the grouting layer. Such a result indicates that more attention should be paid to the flexure and tension behavior from horizontal loads rather than from vertical loads when developing PST systems. In addition, the safety of each structural member must be ensured by maintaining the thickness of the grouting layer at 40 mm or more.

A Study of Sound Expression in Webtoon (웹툰의 사운드 표현에 관한 연구)

  • Mok, Hae Jung
    • Cartoon and Animation Studies
    • /
    • s.36
    • /
    • pp.469-491
    • /
    • 2014
  • Webtoon has developed the method that makes it possible to express sound visually. Also we can also hear sound in webtoon through the development of web technology. It is natural that we analyze the sound that we can hear, but we can also analyze the sound that we can not hear. This study is based on 'dual code' in cognitive psychology. Cartoonists can make visual expression on the basis of auditive impression and memory, and readers can recall the sound through the process of memory and memory-retrieval. This study analyzes both audible sound and inaudable sound. Concise analysis owes the method to film sound theory. Three main factor, Volume, pitch, and tone are recognized by frequency in acoustics. On the other hand they are expressed by the thickness and site of line and image of sound source. The visual expression of in screen sound and off screen sound is related to the frame of comics. Generally the outside of frame means off sound, but some off sound is in the frame. In addition, horror comics use much sound for the effect of genre like horror film. When analyzing comics sound using this kinds of the method film sound analysis, we can find that webtoon has developed creative expression method comparing with simple ones of early comics. Especially arranging frames and expressing sound following and vertical moving are new ones in webtoon. Also types and arrangement of frame has been varied. BGM is the first in using audible sound and recently BGM composed mixing sound effect is being used. In addition, the program which makes it possible for readers to hear sound according to scroll moving. Especially horror genre raise the genre effects using this technology. Various methods of visualizing sound are being created, and the change shows that webtoon could be the model of convergence in contents.

Design and Implementation of IoT based Low cost, Effective Learning Mechanism for Empowering STEM Education in India

  • Simmi Chawla;Parul Tomar;Sapna Gambhir
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.163-169
    • /
    • 2024
  • India is a developing nation and has come with comprehensive way in modernizing its reducing poverty, economy and rising living standards for an outsized fragment of its residents. The STEM (Science, Technology, Engineering, and Mathematics) education plays an important role in it. STEM is an educational curriculum that emphasis on the subjects of "science, technology, engineering, and mathematics". In traditional education scenario, these subjects are taught independently, but according to the educational philosophy of STEM that teaches these subjects together in project-based lessons. STEM helps the students in his holistic development. Youth unemployment is the biggest concern due to lack of adequate skills. There is a huge skill gap behind jobless engineers and the question arises how we can prepare engineers for a better tomorrow? Now a day's Industry 4.0 is a new fourth industrial revolution which is an intelligent networking of machines and processes for industry through ICT. It is based upon the usage of cyber-physical systems and Internet of Things (IoT). Industrial revolution does not influence only production but also educational system as well. IoT in academics is a new revolution to the Internet technology, which introduced "Smartness" in the entire IT infrastructure. To improve socio-economic status of the India students must equipped with 21st century digital skills and Universities, colleges must provide individual learning kits to their students which can help them in enhancing their productivity and learning outcomes. The major goal of this paper is to present a low cost, effective learning mechanism for STEM implementation using Raspberry Pi 3+ model (Single board computer) and Node Red open source visual programming tool which is developed by IBM for wiring hardware devices together. These tools are broadly used to provide hands on experience on IoT fundamentals during teaching and learning. This paper elaborates the appropriateness and the practicality of these concepts via an example by implementing a user interface (UI) and Dashboard in Node-RED where dashboard palette is used for demonstration with switch, slider, gauge and Raspberry pi palette is used to connect with GPIO pins present on Raspberry pi board. An LED light is connected with a GPIO pin as an output pin. In this experiment, it is shown that the Node-Red dashboard is accessing on Raspberry pi and via Smartphone as well. In the final step results are shown in an elaborate manner. Conversely, inadequate Programming skills in students are the biggest challenge because without good programming skills there would be no pioneers in engineering, robotics and other areas. Coding plays an important role to increase the level of knowledge on a wide scale and to encourage the interest of students in coding. Today Python language which is Open source and most demanding languages in the industry in order to know data science and algorithms, understanding computer science would not be possible without science, technology, engineering and math. In this paper a small experiment is also done with an LED light via writing source code in python. These tiny experiments are really helpful to encourage the students and give play way to learn these advance technologies. The cost estimation is presented in tabular form for per learning kit provided to the students for Hands on experiments. Some Popular In addition, some Open source tools for experimenting with IoT Technology are described. Students can enrich their knowledge by doing lots of experiments with these freely available software's and this low cost hardware in labs or learning kits provided to them.

Development of Predictive Models for Rights Issues Using Financial Analysis Indices and Decision Tree Technique (경영분석지표와 의사결정나무기법을 이용한 유상증자 예측모형 개발)

  • Kim, Myeong-Kyun;Cho, Yoonho
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.4
    • /
    • pp.59-77
    • /
    • 2012
  • This study focuses on predicting which firms will increase capital by issuing new stocks in the near future. Many stakeholders, including banks, credit rating agencies and investors, performs a variety of analyses for firms' growth, profitability, stability, activity, productivity, etc., and regularly report the firms' financial analysis indices. In the paper, we develop predictive models for rights issues using these financial analysis indices and data mining techniques. This study approaches to building the predictive models from the perspective of two different analyses. The first is the analysis period. We divide the analysis period into before and after the IMF financial crisis, and examine whether there is the difference between the two periods. The second is the prediction time. In order to predict when firms increase capital by issuing new stocks, the prediction time is categorized as one year, two years and three years later. Therefore Total six prediction models are developed and analyzed. In this paper, we employ the decision tree technique to build the prediction models for rights issues. The decision tree is the most widely used prediction method which builds decision trees to label or categorize cases into a set of known classes. In contrast to neural networks, logistic regression and SVM, decision tree techniques are well suited for high-dimensional applications and have strong explanation capabilities. There are well-known decision tree induction algorithms such as CHAID, CART, QUEST, C5.0, etc. Among them, we use C5.0 algorithm which is the most recently developed algorithm and yields performance better than other algorithms. We obtained data for the rights issue and financial analysis from TS2000 of Korea Listed Companies Association. A record of financial analysis data is consisted of 89 variables which include 9 growth indices, 30 profitability indices, 23 stability indices, 6 activity indices and 8 productivity indices. For the model building and test, we used 10,925 financial analysis data of total 658 listed firms. PASW Modeler 13 was used to build C5.0 decision trees for the six prediction models. Total 84 variables among financial analysis data are selected as the input variables of each model, and the rights issue status (issued or not issued) is defined as the output variable. To develop prediction models using C5.0 node (Node Options: Output type = Rule set, Use boosting = false, Cross-validate = false, Mode = Simple, Favor = Generality), we used 60% of data for model building and 40% of data for model test. The results of experimental analysis show that the prediction accuracies of data after the IMF financial crisis (59.04% to 60.43%) are about 10 percent higher than ones before IMF financial crisis (68.78% to 71.41%). These results indicate that since the IMF financial crisis, the reliability of financial analysis indices has increased and the firm intention of rights issue has been more obvious. The experiment results also show that the stability-related indices have a major impact on conducting rights issue in the case of short-term prediction. On the other hand, the long-term prediction of conducting rights issue is affected by financial analysis indices on profitability, stability, activity and productivity. All the prediction models include the industry code as one of significant variables. This means that companies in different types of industries show their different types of patterns for rights issue. We conclude that it is desirable for stakeholders to take into account stability-related indices and more various financial analysis indices for short-term prediction and long-term prediction, respectively. The current study has several limitations. First, we need to compare the differences in accuracy by using different data mining techniques such as neural networks, logistic regression and SVM. Second, we are required to develop and to evaluate new prediction models including variables which research in the theory of capital structure has mentioned about the relevance to rights issue.

A Study of The Medical Classics in the '$\bar{A}yurveda$' ('아유르베다'($\bar{A}yurveda$)의 의경(醫經)에 관한 연구)

  • Kim, Ki-Wook;Park, Hyun-Kuk;Seo, Ji-Young
    • Journal of Korean Medical classics
    • /
    • v.20 no.4
    • /
    • pp.91-117
    • /
    • 2007
  • Through a simple study of the medical classics in the '$\bar{A}yurveda$', we have summarized them as follows. 1) Traditional Indian medicine started in the Ganges river area at about 1500 B. C. E. and traces of medical science can be found in the "Rigveda" and "Atharvaveda". 2) The "Charaka" and "$Su\acute{s}hruta$(妙聞集)", ancient texts from India, are not the work of one person, but the result of the work and errors of different doctors and philosophers. Due to the lack of historical records, the time of Charaka or $Su\acute{s}hruta$(妙聞)s' lives are not exactly known. So the completion of the "Charaka" is estimated at 1st${\sim}$2nd century C. E. in northwestern India, and the "$Su\acute{s}hruta$" is estimated to have been completed in 3rd${\sim}$4th century C. E. in central India. Also, the "Charaka" contains details on internal medicine, while the "$Su\acute{s}hruta$" contains more details on surgery by comparison. 3) '$V\bar{a}gbhata$', one of the revered Vriddha Trayi(triad of the ancients, 三醫聖) of the '$\bar{A}yurveda$', lived and worked in about the 7th century and wrote the "$A\d{s}\d{t}\bar{a}nga$ $A\d{s}\d{t}\bar{a}nga$ $h\d{r}daya$ $sa\d{m}hit\bar{a}$ $samhit\bar{a}$(八支集)" and "$A\d{s}\d{t}\bar{a}nga$ Sangraha $samhit\bar{a}$(八心集)", where he tried to compromise and unify the "Charaka" and "$Su\acute{s}hruta$". The "$A\d{s}\d{t}\bar{a}nga$ Sangraha $samhit\bar{a}$" was translated into Tibetan and Arabic at about the 8th${\sim}$9th century, and if we generalize the medicinal plants recorded in each the "Charaka", "$Su\acute{s}hruta$" and the "$A\d{s}\d{t}\bar{a}nga$ Sangraha $samhit\bar{a}$", there are 240, 370, 240 types each. 4) The 'Madhava' focused on one of the subjects of Indian medicine, '$Nid\bar{a}na$' ie meaning "the cause of diseases(病因論)", and in one of the copies found by Bower in 4th century C. E. we can see that it uses prescriptions from the "BuHaLaJi(布哈拉集)", "Charaka", "$Su\acute{s}hruta$". 5) According to the "Charaka", there were 8 branches of ancient medicine in India : treatment of the body(kayacikitsa), special surgery(salakya), removal of alien substances(salyapahartka), treatment of poison or mis-combined medicines(visagaravairodhikaprasamana), the study of ghosts(bhutavidya), pediatrics(kaumarabhrtya), perennial youth and long life(rasayana), and the strengthening of the essence of the body(vajikarana). 6) The '$\bar{A}yurveda$', which originated from ancient experience, was recorded in Sanskrit, which was a theorization of knowledge, and also was written in verses to make memorizing easy, and made medicine the exclusive possession of the Brahmin. The first annotations were 1060 for the "Charaka", 1200 for the "$Su\acute{s}hruta$", 1150 for the "$A\d{s}\d{t}\bar{a}nga$ Sangraha $samhit\bar{a}$", and 1100 for the "$Nid\bar{a}na$", The use of various mineral medicines in the "Charaka" or the use of mercury as internal medicine in the "$A\d{s}\d{t}\bar{a}nga$ Sangraha $samhit\bar{a}$", and the palpation of the pulse for diagnosing in the '$\bar{A}yurveda$' and 'XiZhang(西藏)' medicine are similar to TCM's pulse diagnostics. The coexistence with Arabian 'Unani' medicine, compromise with western medicine and the reactionism trend restored the '$\bar{A}yurveda$' today. 7) The "Charaka" is a book inclined to internal medicine that investigates the origin of human disease which used the dualism of the 'Samkhya', the natural philosophy of the 'Vaisesika' and the logic of the 'Nyaya' in medical theories, and its structure has 16 syllables per line, 2 lines per poem and is recorded in poetry and prose. Also, the "Charaka" can be summarized into the introduction, cause, judgement, body, sensory organs, treatment, pharmaceuticals, and end, and can be seen as a work that strongly reflects the moral code of Brahmin and Aryans. 8) In extracting bloody pus, the "Charaka" introduces a 'sharp tool' bloodletting treatment, while the "$Su\scute{s}hruta$" introduces many surgical methods such as the use of gourd dippers, horns, sucking the blood with leeches. Also the "$Su\acute{s}hruta$" has 19 chapters specializing in ophthalmology, and shows 76 types of eye diseases and their treatments. 9) Since anatomy did not develop in Indian medicine, the inner structure of the human body was not well known. The only exception is 'GuXiangXue(骨相學)' which developed from 'Atharvaveda' times and the "$A\d{s}\d{t}\bar{a}nga$ Sangraha $samhit\bar{a}$". In the "$A\d{s}\d{t}\bar{a}nga$ Sangraha $samhit\bar{a}$"'s 'ShenTiLun(身體論)' there is a thorough listing of the development of a child from pregnancy to birth. The '$\bar{A}yurveda$' is not just an ancient traditional medical system but is being called alternative medicine in the west because of its ability to supplement western medicine and, as its effects are being proved scientifically it is gaining attention worldwide. We would like to say that what we have researched is just a small fragment and a limited view, and would like to correct and supplement any insufficient parts through more research of new records.

  • PDF

The Role of the Soft Law for Space Debris Mitigation in International Law (국제법상 우주폐기물감축 연성법의 역할에 관한 연구)

  • Kim, Han-Taek
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.30 no.2
    • /
    • pp.469-497
    • /
    • 2015
  • In 2009 Iridium 33, a satellite owned by the American Iridium Communications Inc. and Kosmos-2251, a satellite owned by the Russian Space Forces, collided at a speed of 42,120 km/h and an altitude of 789 kilometers above the Taymyr Peninsula in Siberia. NASA estimated that the satellite collision had created approximately 1,000 pieces of debris larger than 10 centimeters, in addition to many smaller ones. By July 2011, the U.S. Space Surveillance Network(SSN) had catalogued over 2,000 large debris fragments. On January 11, 2007 China conducted a test on its anti-satellite missile. A Chinese weather satellite, the FY-1C polar orbit satellite, was destroyed by the missile that was launched using a multistage solid-fuel. The test was unprecedented for having created a record amount of debris. At least 2,317 pieces of trackable size (i.e. of golf ball size or larger) and an estimated 150,000 particles were generated as a result. As far as the Space Treaties such as 1967 Outer Space Treaty, 1968 Rescue Agreement, 1972 Liability Convention, 1975 Registration Convention and 1979 Moon Agreement are concerned, few provisions addressing the space environment and debris in space can be found. In the early years of space exploration dating back to the late 1950s, the focus of international law was on the establishment of a basic set of rules on the activities undertaken by various states in outer space.. Consequently environmental issues, including those of space debris, did not receive the priority they deserve when international space law was originally drafted. As shown in the case of the 1978 "Cosmos 954 Incident" between Canada and USSR, the two parties settled it by the memorandum between two nations not by the Space Treaties to which they are parties. In 1994 the 66th conference of International Law Association(ILA) adopted "International Instrument on the Protection of the Environment from Damage Caused by Space Debris". The Inter-Agency Space Debris Coordination Committee(IADC) issued some guidelines for the space debris which were the basis of "the UN Space Debris Mitigation Guidelines" which had been approved by the Committee on the Peaceful Uses of Outer Space(COPUOS) in its 527th meeting. On December 21 2007 this guideline was approved by UNGA Resolution 62/217. The EU has proposed an "International Code of Conduct for Outer Space Activities" as a transparency and confidence-building measure. It was only in 2010 that the Scientific and Technical Subcommittee began considering as an agenda item the long-term sustainability of outer space. A Working Group on the Long-term Sustainability of Outer Space Activities was established, the objectives of which include identifying areas of concern for the long-term sustainability of outer space activities, proposing measures that could enhance sustainability, and producing voluntary guidelines to reduce risks to long-term sustainability. By this effort "Guidelines on the Long-term Sustainability of Outer Space Activities" are being under consideration. In the case of "Declaration of Legal Principles Governing the Activities of States in the Exp1oration and Use of Outer Space" adopted by UNGA Resolution 1962(XVIII), December 13 1963, the 9 principles proclaimed in that Declaration, although all of them incorporated in the Space Treaties, could be regarded as customary international law binding all states considering the time and opinio juris by the responses of the world. Although the soft law such as resolutions, guidelines are not binding law, there are some provisions which have a fundamentally norm-creating character and customary international law. In November 12 1974 UN General Assembly recalled through a Resolution 3232(XXIX) "Review of the role of International Court of Justice" that the development of international law may be reflected, inter alia, by the declarations and resolutions of the General Assembly which may to that extend be taken into consideration by the judgements of the International Court of Justice. We are expecting COPUOS which gave birth 5 Space Treaties that it could give us binding space debris mitigation measures to be implemented based on space debris mitigation soft law in the near future.