• Title/Summary/Keyword: Right to Access

Search Result 324, Processing Time 0.033 seconds

A Study on Multi-Media Contents Security Using Android Phone (안드로이드 폰을 이용한 멀티미디어 콘텐츠 보안에 관한 연구)

  • Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.1
    • /
    • pp.19-25
    • /
    • 2012
  • This paper tries to solve the problems which previous methods have such as the WCDRM(Watermark and Cryptography DRM) and the model using smart card for protecting digital contents. This study provides a contents distribution model to protect the rights of author, distributor, and user as well as user's information by using technologies such as cryptography, DRM(Digital Right Management), access control, etc. The proposed system is evaluated as the most safety model compared with previous methods because it not only solves the problems which the previous methods have, but also protects four type of risks such as use of contents which other mobile devices download, the attack on the key to decode the message, the attack on leaking the contents, and the internal attack such as an illegal reproduction.

A Study on Multi-Media Contents Security using Smart Phone (스마트 폰을 이용한 멀티미디어 콘텐츠 보안에 관한 연구)

  • Kim, Dong-Ryool;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.675-682
    • /
    • 2013
  • This paper tries to solve the problems which previous methods have the model using smart card for protecting digital contents. This study provides a contents distribution model to protect the rights of author, distributor, and user as well as user's information by using technologies such as cryptography, DRM(Digital Right Management), access control, etc. The proposed system is evaluated as the most safety model compared with previous methods because it not only solves the problems which the previous methods have, but also protects four type of risks such as use of contents which other mobile devices download, the attack on the key to decode the message, the attack on leaking the contents, and the internal attack such as an illegal reproduction.

Left-Side Surgical Approach to Mitral Valve in Dog Cadaver Study

  • Moon, Jeong-hyeon;Hwang, Byungmoon;Kim, Daesik;Jung, Sunjun;Ha, Yongsu;Lee, Kicahng;Kim, Namsoo;KIM, Min-su
    • Journal of Veterinary Clinics
    • /
    • v.35 no.1
    • /
    • pp.10-12
    • /
    • 2018
  • Mitral regurgitation is the most frequent cause of cardiac disability and death in dogs. A wide range of medical and surgical treatments have been used for mitral regurgitation. Surgical treatments for complete correction of mitral regurgitation include valve repair and valve replacement, which have the advantages of eliminating or correcting the primary cause. Surgical treatments approach the mitral valve via right- or left-side thoracotomy. Aortic root exposure is needed for cardiopulmonary bypass. To compare right-side and left-side approaches, 10 dog cadavers were used in this study. Subsequently, the left-side surgical approach was used in vivo and in conjunction with cardiopulmonary bypass and cardioplegic arrest. Based on the results, and considering ease of access to the aortic root, valve incision site, and visualization of the surgical field, a left-side approach is recommended.

Legal Regulation Of Digital Rights In Ukraine

  • Bilenko, Marianna;Ilchenko, Hanna;Herych, Anatolii;Solodka, Olena;Podolyak, Svitlana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.59-62
    • /
    • 2022
  • In the scientific research, the object of research is a complex of legal relations, which are formed by the use of modern digital technologies. The subject of this work is the novelties of Ukrainian and foreign legislation, norms of international law aimed at regulating social relations in the field of digital rights, as well as doctrinal provisions and materials of law enforcement practice. Within the framework of this work, two types of digital rights are distinguished, those that exist in the law of Ukraine, and the issues of law that apply to legal relations, regarding the turnover of each of them, are considered. Examples of law applied in foreign countries are given for comparison. On the basis of a comprehensive study of the legal framework and positions of scientists, the prospects for the development of legal regulation of digital rights were noted.

Tmr-Tree : An Efficient Spatial Index Technique in Main Memory Databases (Tmr-트리 : 주기억 데이터베이스에서 효율적인 공간 색인 기법)

  • Yun Suk-Woo;Kim Kyung-Chang
    • The KIPS Transactions:PartD
    • /
    • v.12D no.4 s.100
    • /
    • pp.543-552
    • /
    • 2005
  • As random access memory chip gets cheaper, it becomes affordable to realize main memory-based database systems. The disk-based spatial indexing techniques, however, cannot direct apply to main memory databases, because the main purpose of disk-based techniques is to reduce the number of disk accesses. In main memory-based indexing techniques, the node access time is much faster than that in disk-based indexing techniques, because all index nodes reside in a main memory. Unlike disk-based index techniques, main memory-based spatial indexing techniques must reduce key comparing time as well as node access time. In this paper, we propose an efficient spatial index structure for main memory-based databases, called Tmr-tree. Tmr-tree integrates the characteristics of R-tree and T-tree. Therefore, Nodes of Tmr-tree consist of several entries for data objects, main memory pointers to left and right child, and three additional fields. First is a MBR of a self node, which tightly encloses all data MBRs (Minimum Bounding Rectangles) in a current node, and second and third are MBRs of left and right sub-tree, respectively. Because Tmr-tree needs not to visit all leaf nodes, in terms of search time, proposed Tmr-tree outperforms R-tree in our experiments. As node size is increased, search time is drastically decreased followed by a gradual increase. However, in terms of insertion time, the performance of Tmr-tree was slightly lower than R-tree.

Relationship between Access to Lewd Internet Contents by Middle School Students and Their Awareness of Sex (중학생의 인터넷음란물 접속과 성 의식의 관계)

  • Lim, Jong-In;Choi, In-Sook
    • The Journal of Korean Society for School & Community Health Education
    • /
    • v.4
    • /
    • pp.117-139
    • /
    • 2003
  • The purpose of this research lies in presenting logical viability for the measures that curtail access to lewd Internet contents by middle school students amidst the reality in which lewd contents are circulated freely through the Internet, a medium that the middle school students find most easy to access. In order to establish right form of awareness towards sex, this research identified the ways they access the lewd Internet contents, their reaction after the exposure to those contents, their knowledge of sex, their concerns regarding sex and their accessibility to sexual activities in order to conduct a comparative analysis on the relationship between lewd Internet contents and their awareness of sex. First, realities of accessing lewd Internet contents and reactions according to the demographics of middle school students There isa significant difference in the experience of accessing lewd Internet contents in terms of gender. Mostly, male students tend to access the contents more. As for the way they access the lewd Internet contents, both male and female students replied that they access through spam mail of lewd nature. Thus, measures to address this problem are needed urgently. As to when they first accessed the lewd contents, most of the research subjects replied that they accessed either in elementary school period or in the early middle school period. This shows that most of the students got exposed to lewd contents even before they could establish positive, correct awareness of sex. Thus, there is a risk that they may formulate wrong kind of sexual awareness. Accordingly, it is necessary to develop measures through focused sex education. Students are divided into two groups according to the time they spend on the contents averagely: those who spend over one hour and those who spend less than an hour on the lewd contents. If the students spending longer hours are not to be checked and properly guided, it may lead to increasing cases of sexual delinquencies due to their wrongly formed awareness of sex. When the question of existence(non-existence) of guardian was addressed, students with both parents tend to access the lewd Internet contents in a more diverse manner and tend to access more compared to those students from single parent or no-parent families. Accordingly, guardians need to pay attention to how their children are using the Internet. Second, awareness of sex depending on the middle school students' demographics In case of sexual knowledge, middle school students shows relatively high level of knowledge. In particular, female students are found more knowledgeable than male students, and the students in upper years are more knowledgeable as well. As a result, this research recommends that the students in lower years should be guided with more basc and detailed information, while those in upper years need to be taught to form and express their own thoughts and attitudes and to build up independence on this matter. In case of worries about sex, both male and female students don't worry too much about it. However, male students are more concerned about sex than female students in a more diverse ways. As for the differences by academic year, concerns for sex increase, as students get older. Accordingly, sex education that helps establish sound perception of the opposite sex and that focuses on the etiquettes that one must adhere to at the presence of the opposite sex need to be conducted against middle school students. In case of accessibility to sex, male students manifest higher tendency than female students. As for the differences by academic year, those in the first and second years show higher accessibility than those in their third year. In general, younger students tend to be more open-minded toward sex. Accordingly, students in lower academic years need to undergo basic knowledge oriented sex education, whereas those in upper academic years need to undergo discussion centered sex education where they subject to questions regarding their attitude and opinion. Third, relationship between the reactions after the exposure to the lewd Internet contents and their awareness of sex As the frequency of contact with lewd Internet contents increases, awareness of sex increases as well. Thus, the lewd Internet contents contribute to the increase in students' concern for sex as well as increase in accessibility to sex, which eventually become barriers to students' establishment of a healthy perception of sex. Reactions to sex after the exposure to lewd Internet contents and awareness of sex indicate a significant correlation. However, negative correlation is manifested with knowledge of sex. Thus, it is possible to know that the greater access to lewd Internet contents does not necessarily translate into increase in knowledge of sex. However, the study showed there is a correlation between concerns for sex and the level of accessibility to sex. In more detail, the more reactions to the contents they show, the more concerns for sex they have and the more positively they take acceptability to sex. Moreover, it is necessary to develop necessary measures since textbooks today do not include measures needed to address the lewd Internet contents. Given the above findings, it is necessary to continue to complement structural measures in order to prevent easy access of lewd Internet contents by middle school students. Moreover, it is necessary to be considerate of the students so that they themselves can form a healthy Internet culture and grow up within positive framework for the sex education.

  • PDF

Is Transradial Cerebral Angiography Feasible and Safe? A Single Center's Experience

  • Jo, Kwang-Wook;Park, Sung-Man;Kim, Sang-Don;Kim, Seong-Rim;Baik, Min-Woo;Kim, Young-Woo
    • Journal of Korean Neurosurgical Society
    • /
    • v.47 no.5
    • /
    • pp.332-337
    • /
    • 2010
  • Objective : Although a transradial angiography is accepted as the gold standard for cardiovascular procedures, cerebral angiography has been performed via transfemoral approach in most institutions. The purpose of this study is to present our experience concerning the feasibility, efficacy, and safety of a transradial approach to cerebral angiography as an alternative to a transfemoral approach. Methods : Between February 2007 and October 2009, a total of 1,240 cerebral angiographies were performed via a transradial approach in a single center. The right radial approach was used as an initial access route. The procedure continued only after the ulnar artery was proven to provide satisfactory collateral perfusion according to two tests (a modified Allen's test and forearm angiography). Results : The procedural success rate was 94.8% with a mean duration of 28 minutes. All supra-aortic vessels were successfully catheterized with a success rate of 100%. The success rates of selective catheterization to the right vertebral artery, right internal carotid artery, left internal carotid artery, and left vertebral artery were 96.1%, 98.6%, 82.6% and 52.2%, respectively. The procedure was performed more than twice in 73 patients (5.9%), including up to 4 times in 2 patients. The radial artery occlusion was found in 4 patients (5.4%) on follow-up cerebral angiography, but no ischemic symptoms were observed in any of the cases. Conclusion : This study suggests that cerebral angiography using a transradial approach can be performed with minimal risk of morbidity. In particular, this procedure might be useful for follow-up angiographies and place less stress on patients.

Smartphone Camera Control System in connection with Personnel Access Rights (인원 출입 권한과 연계한 스마트폰 카메라 제어 시스템)

  • Jeon, Byung-Jin;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.93-101
    • /
    • 2017
  • The purpose of this paper is to investigate the effect of the smart phone camera on the company's employees or employees of partner companies, we want to block things in advance. In this paper, we propose a smart phone camera control system which is connected with the personnel access right which enables to share the photographed image of the authorized user and the data shot only within the enterprise. To this end, we have developed the installation status of smart phone control program (MCS: Mobile Camera Control System) of employees, employees and visitors of company, and experimented and analyzed whether the smart phone control program installed in the authorized area. In addition, when visitors visited the company, the effect of prevention of photograph shooting through smart phone camera and the cost of seal sticker attached to the smart phone camera lens part were reduced.

Deep Vein Thrombosis Due to Hematoma as a Rare Complication after Femoral Arterial Catheterization

  • Kim, Minsoo;Lee, Jong-Young;Lee, Cheol Whan;Lee, Seung-Whan;Kang, Soo-Jin;Yoon, Yong Hoon;Om, Sang Yong;Kim, Young-Hak
    • Journal of Yeungnam Medical Science
    • /
    • v.30 no.1
    • /
    • pp.31-35
    • /
    • 2013
  • Hematoma is quite a common complication of femoral arterial catheterization. However, to the best of our knowledge, there have been no previous studies regarding deep vein thrombosis (DVT) caused by compression of a vein due to a hematoma. We report a case of a hematoma developing after femoral arterial catheterization and causing extensive symptomatic DVT. A 59-year-old male was seen in our Emergency Department with right lower leg swelling 15 days after coronary stent implantation performed using right femoral artery access. Computed tomographic (CT) scanning revealed a large hematoma (45 mm in its longest diameter) compressing the common femoral vein and with DVT from the right external iliac vein to the popliteal vein. Due to the extensive DVT involvement, we decided to release the compressed common femoral vein by surgical evacuation of the large hematoma. However, even following evacuation of the hematoma, as the DVT did not resolve soon, further mechanical thrombectomy and catheter-directed thrombolysis were performed. Angiography then showed nearly resolved DVT, and the leg swelling was improved. The patient was discharged with the anticoagulation medication, warfarin.

Dynamic Right Sizing of Maximum-windows for Efficient Bandwidth Allocation on EPON (EPON에서 효율적 대역폭 할당을 위한 최대전송윈도우 크기의 동적변화기법)

  • Lee, Sang-Ho;Lee, Tae-Jin;Chung, Min-Young;Lee, You-Ho;Choo, Hyun-Seung
    • Journal of Internet Computing and Services
    • /
    • v.8 no.4
    • /
    • pp.41-49
    • /
    • 2007
  • Ethernet passive optical network(EPON) is the next-generation technology for supporting services of high-quality at low-cost. In the EPON, all optical network units(ONUs) have to share a limited uplink channel for upstream data. In order to satisfy bandwidth demands of users on high-capacity local access networks(LANs), the optical line terminal(OLT) efficiently divides and allocates time slots of uplink channel to all ONUs. We discuss previous schemes for dynamic bandwidth allocation(DBA), such as interleaved polling with adaptive cycle time(IPACT) and sliding cycle time(SLICT). In this paper, dynamic right sizing of maximum-windows(DRSM), as a novel bandwidth allocation service, is proposed for more effective and efficient time slot allocation of the uplink channel. DRSM which is based on past information of bandwidth allocated by OLT calculates maximum available bandwidth and dynamically alters the maximum window size for the next ONU. This scheme does not only exert every effort to meet bandwidth demands of ONUs with the possible scope, it also seeks fairness of bandwidth allocation among ONUs.

  • PDF