• Title/Summary/Keyword: Security control system

Search Result 1,742, Processing Time 0.029 seconds

A Study on Medical-criminal Problem of Withdrawing Life-Sustaining Treatment (치료중단행위에 대한 의료형법적 고찰 -의학적 충고에 반한 퇴원 사례를 중심으로-)

  • Cho, In-Ho
    • The Korean Society of Law and Medicine
    • /
    • v.9 no.1
    • /
    • pp.319-382
    • /
    • 2008
  • As a withdrawing care's study, the purpose of this study is searching about withdrawing care's acceptance and circumstances through Bora-mae hospital case(chapter 1). Withdrawing life-sustaining treatment has various forms. Though the meaning of euthanasia, death with dignity, natural death, physician assisted suicide are duplicated, the meaning of those are different slightly. Firstly, this study looks about the difference of the those meaning and acceptance range(condition) by withdrawing care's forms(chapter 2). Bora-mae hospital case sentenced guilty about physician who discharged incompetent patient who was after surgery by patient's wife determination. This Bora-mae case that sentenced guilty about discharge against medical advise(DAMA) that is regarded to custom has brought intensive confliction of legal, social, medical aspect, Bora-mae hospital case has many legal problems. First, as to criminal law rule 250(murder), the problem is whether discharge and withdrawing life-sustaining treatment is commission or omission. this study concluded omission(district court: omission, appeal, supreme court: commission). Because legal denounce point of discharge and medical treatment withdrawing is omission that physician who is obligatory on patient to cure. If physician's act is regarded omission, it is necessary to determine whether he has guardian status and obligation. Without guardian status and obligation, omission crime can't exist. This study decided that physician had guardian status and obligation and foundation of guardian status was pre-action or acceptance of emergency patient. Physician's medical treatment duty finished when patient(or patient's guardian) demands discharge. But when patient death is foreseen and other possible treatment does not exist, his duty of life prolonging treatment does not finish. This originate from physician's social responsibility and public status that limits patient's private liberty. This study regarded physician's action as accomplice about whether physician's discharging action is accomplice or the principal offender(district court: the principal offender, appeal, supreme court: accomplice). Though the principal offender needs criminal determination and action, there is no this common determination and functional action control of physician in Bora-mae case(chapter 3). Bora-mae hospital case partly originated from deficiency of legal, institutive system including medical security system shortage, the instruction is 1. medical security system strengthening, 2. hospital ethical committee's activity strengthening, 3. institutionalization of withdrawing life-sustaining treatment, 4. acceptance of pre-decision making system, 5. sufficient persuasion of physician for patient and faithful writing of medical paper, 6. respect for patients' self-determination and rights, 7. consciousness's changing for withdrawing life-sustaining treatment and persistent education about medical ethics(chapter 4). Considering Bora-mae case, medical sector is not the dead ground of a criminal punishment. Intervention of criminal law in medical sector give rise to ill effect, that is, excess medical examination and treatment, safeguard treatment, delay of discharge from a hospital. Because sufficient guarantee of life becomes mere empty slogan under situation that impose a burden of heavy cost to family or hospital, public and systematic solution should be given(chapter 5).

  • PDF

Innovative Technologies in Higher School Practice

  • Popovych, Oksana;Makhynia, Nataliia;Pavlyuk, Bohdan;Vytrykhovska, Oksana;Miroshnichenko, Valentina;Veremijenko, Vadym;Horvat, Marianna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.248-254
    • /
    • 2022
  • Educational innovations are first created, improved or applied educational, didactic, educative, and managerial systems and their components that significantly improve the results of educational activities. The development of pedagogical technology in the global educational space is conventionally divided into three stages. The role of innovative technologies in Higher School practice is substantiated. Factors of effectiveness of the educational process are highlighted. Technology is defined as a phenomenon and its importance is emphasized, it is indicated that it is a component of human history, a form of expression of intelligence focused on solving important problems of being, a synthesis of the mind and human abilities. The most frequently used technologies in practice are classified. Among the priority educational innovations in higher education institutions, the following are highlighted. Introduction of modular training and a rating system for knowledge control (credit-modular system) into the educational process; distance learning system; computerization of libraries using electronic catalog programs and the creation of a fund of electronic educational and methodological materials; electronic system for managing the activities of an educational institution and the educational process. In the educational process, various innovative pedagogical methods are successfully used, the basis of which is interactivity and maximum proximity to the real professional activity of the future specialist. There are simulation technologies (game and discussion forms of organization); technology "case method" (maximum proximity to reality); video training methodology (maximum proximity to reality); computer modeling; interactive technologies; technologies of collective and group training; situational modeling technologies; technologies for working out discussion issues; project technology; Information Technologies; technologies of differentiated training; text-centric training technology and others.

Development of Evaluation Factors for Selecting Operator of Rail Traffic-Control (철도 관제권 운영주체 선정을 위한 평가항목 개발)

  • Oh, Jae Kyoung;Chung, Sung Bong;Kim, Ji Yeon;Kim, Sigon
    • Journal of Korean Society of Transportation
    • /
    • v.32 no.4
    • /
    • pp.327-335
    • /
    • 2014
  • The Korean government, as of last year, is attempting to introduce a competitive system in the rail-market. However there are some pertinent issues which need to be addressed in order to select the best possible organization for optimum railway traffic control. As there are no standard guidelines in selecting an agency, objective evaluation factors need to be properly applied to ensure the best possible decision is made. Through literature review and various interviews with experts, appropriate criteria were selected to evaluate the suitability of each potential operator. As generally mentioned, both safety and efficiency play vital roles in the selection process but in addition, there are other factors such as security and fairness, which also need to be considered. The individual weight of these factors were calculated by the AHP, in which three groups of experts were interviewed to acquire their expertise. According to the results, as a potential operator, the score of a railway operating company and the management cooperation of railway is 2.75 and 3.85, respectively. In the future, in preparation towards becoming a competitive rail-market, this research is expected to assist in choosing the best party to control the rail traffic system.

Intermediate-Representation Translation Techniques to Improve Vulnerability Analysis Efficiency for Binary Files in Embedded Devices (임베디드 기기 바이너리 취약점 분석 효율성 제고를 위한 중간어 변환 기술)

  • Jeoung, Byeoung Ho;Kim, Yong Hyuk;Bae, Sung il;Im, Eul Gyu
    • Smart Media Journal
    • /
    • v.7 no.1
    • /
    • pp.37-44
    • /
    • 2018
  • Utilizing sequence control and numerical computing, embedded devices are used in a variety of automated systems, including those at industrial sites, in accordance with their control program. Since embedded devices are used as a control system in corporate industrial complexes, nuclear power plants and public transport infrastructure nowadays, deliberate attacks on them can cause significant economic and social damages. Most attacks aimed at embedded devices are data-coded, code-modulated, and control-programmed. The control programs for industry-automated embedded devices are designed to represent circuit structures, unlike common programming languages, and most industrial automation control programs are designed with a graphical language, LAD, which is difficult to process static analysis. Because of these characteristics, the vulnerability analysis and security related studies for industry automation control programs have only progressed up to the formal verification, real-time monitoring levels. Furthermore, the static analysis of industrial automation control programs, which can detect vulnerabilities in advance and prepare for attacks, stays poorly researched. Therefore, this study suggests a method to present a discussion on an industry automation control program designed to represent the circuit structure to increase the efficiency of static analysis of embedded industrial automation programs. It also proposes a medium term translation technology exploiting LLVM IR to comprehensively analyze the industrial automation control programs of various manufacturers. By using LLVM IR, it is possible to perform integrated analysis on dynamic analysis. In this study, a prototype program that converts to a logical expression type of medium language was developed with regards to the S company's control program in order to verify our method.

Greedy Technique for Smart Grid Demand Response Systems (스마트 그리드 수요반응 시스템을 위한 그리디 스케줄링 기법)

  • Park, Laihyuk;Eom, Jaehyeon;Kim, Joongheon;Cho, Sungrae
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.2 no.3
    • /
    • pp.391-395
    • /
    • 2016
  • In the last few decades, global electricity consumption has dramatically increased and has become drastically fluctuating and uncertain causing blackout. Due to the unexpected peak electricity demand, we need significant electricity supply. The solutions to these problems are smart grid system which is envisioned as future power system. Smart grid system can reduce electricity peak demand and induce effective electricity consumption through various price policies, demand response (DR) control methodologies, and state-of-the-art smart equipments in order to optimize electricity resource usage in an intelligent fashion. Demand response (DR) is one of the key technologies to enable smart grid. In this paper, we propose greedy technique for demand response smart grid system. The proposed scheme focuses on minimizing electricity bills, preventing system blackout and sacrificing user convenience.

Anomaly Detection Performance Analysis of Neural Networks using Soundex Algorithm and N-gram Techniques based on System Calls (시스템 호출 기반의 사운덱스 알고리즘을 이용한 신경망과 N-gram 기법에 대한 이상 탐지 성능 분석)

  • Park, Bong-Goo
    • Journal of Internet Computing and Services
    • /
    • v.6 no.5
    • /
    • pp.45-56
    • /
    • 2005
  • The weak foundation of the computing environment caused information leakage and hacking to be uncontrollable, Therefore, dynamic control of security threats and real-time reaction to identical or similar types of accidents after intrusion are considered to be important, h one of the solutions to solve the problem, studies on intrusion detection systems are actively being conducted. To improve the anomaly IDS using system calls, this study focuses on neural networks learning using the soundex algorithm which is designed to change feature selection and variable length data into a fixed length learning pattern, That Is, by changing variable length sequential system call data into a fixed iength behavior pattern using the soundex algorithm, this study conducted neural networks learning by using a backpropagation algorithm. The backpropagation neural networks technique is applied for anomaly detection of system calls using Sendmail Data of UNM to demonstrate its performance.

  • PDF

Performance Analysis of SDR Communication System Based on MTD Technology (MTD 기법이 적용된 SDR 통신 시스템의 성능 분석)

  • Ki, Jang-Geun;Lee, Kyu-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.2
    • /
    • pp.51-56
    • /
    • 2017
  • With the rapid increase in the number of mobile terminals, demand for wireless technologies has sharply increased these days. While wireless communication provides advantages such as ease of deployment, mobility of terminals, continuity of session, and almost comparable transmission bandwidth to the wired communication, it has vulnerability to malicious radio attacks such as eavesdropping, denial of service, session hijacking, and jamming. Among a variety of methods of preventing wireless attacks, the MTD(Moving Target Defense) is the technique for improving the security capability of the defense system by constantly changing the ability of the system to be attacked. In this paper, in order to develop a resilient software defined radio communication testbed system, we present a novel MTD approach to change dynamically and randomly the radio parameters such as modulation scheme, operating frequency, packet size. The probability of successful attack on the developed MTD-based SDR communication system has been analysed in a mathematical way and verified through simulation.

A Study on Integrated Management System of Researcher Identifiers based on the ISNI (International Standard Name Identifier) (국제표준이름식별자(ISNI)를 중심으로 한 연구자 식별자의 통합관리체계 연구)

  • Byeon, Hoi-Kyun;Oh, Bok-hee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.29 no.3
    • /
    • pp.139-155
    • /
    • 2018
  • This study proposed an integrated management system model of researcher identifiers using the ISNI(International Standard Name Identifier) that can prevent duplicate issuance of identifiers and can be used to reorganize the authors' information. We looked at the metadata structure and management system of the ISNI that can be applied in various fields among identifiers. And we have designed the integrated ID system and system model that can manage the identifiers issued by each institute based on the ISNI. This model consists of data structure layer, platform layer, application layer, management and security layer (4 layers) and we have presented some of the key features and issues to consider when managing the integrations.

Efficient Scheduling of Sensor-based Elevator Systems in Smart Buildings (스마트 빌딩을 위한 센서 기반의 효율적인 엘리베이터 스케줄링)

  • Bahn, Hyokyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.10
    • /
    • pp.367-372
    • /
    • 2016
  • In a modern smart building, sensors can detect various physical conditions, such as temperature, humidity, sound, motion, and light, which can be used in medical services and security, and for energy savings. This paper presents an efficient elevator scheduling system that utilizes smart sensor technologies with radio-frequency identification, video, and floor sensors to detect the arrival of elevator users in advance. The detected information is then delivered to the elevator scheduling system via building networks. By using this information, the proposed system makes a reservation call for efficient control of the elevator's direction and time. Experiments under a spectrum of traffic conditions show that the proposed system performs better than a legacy system with respect to average wait time, maximum wait time, and energy consumption.

The Trend of Aviation Terrorism in the 4th Industrial Revolution Period and the Development Direction for Domestic Counter Terrorism of Aviation (제4차 산업혁명 시대의 항공 테러리즘 양상 및 국내 항공테러 대응체계 발전방향)

  • Hwang, Ho-Won;Kim, Seung-Woo
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.2
    • /
    • pp.155-188
    • /
    • 2017
  • On the one hand, the 4th Industrial Revolution provides a positive opportunity to build a new civilization paradigm for mankind. However, on the other hand, due to the 4th Industrial Revolution, artificial intelligence such as 'Goggle Alpha Go' revolutionized and even the human ability was replaced with a 'Silicon Chip' as the opportunity to communicate decreases, the existence of human beings is weakened. And there is a growing concern that the number of violent crimes, such as psychopath, which hunts humans as games, will increase. Moreover, recent international terrorism is being developed in a form similar to 'Psychopathic Violent-Crime' that indiscriminately attacks innocent people. So, the probability that terrorist organizations abuse the positive effects provided by the Fourth Industrial Revolution as means of terrorism is increasing. Therefore, the paradigm of aviation terrorism is expected to change in a way that attacks airport facilities and users rather than aircraft. Because airport facilities are crowded, and psychopathic terrorists are easily accessible. From this point of view, our counter terrorism system of aviation has many weak points in various aspects such as: (1) limitations of counter-terrorism center (2) inefficient on-site command and control system (3) separated organization for aviation security consultation (4) dispersed information collection function in government (5) vulnerable to cyber attack (6) lack of international cooperation network for aviation terrorism. Consequently, it is necessary to improve the domestic counter terrorism system of aviation so as to preemptively respond to the international terrorism. This study propose the following measures to improve the aviation security system by (1) create 'Aviation Special Judicial Police' (2) revise the anti-terrorism law and aviation security law (3) Strengthening the ability respond to terrorism in cyberspace (4) building an international cooperation network for aviation terrorism.

  • PDF