• Title/Summary/Keyword: Witness

검색결과 202건 처리시간 0.024초

홍화약침(CF)의 부작용에 관한 임상적 고찰 (The clinical studies on the cased of side effect of CF Herbal Acupuncture)

  • 강계성;이진선;권기록
    • 대한약침학회지
    • /
    • 제4권2호
    • /
    • pp.65-71
    • /
    • 2001
  • Objectives : This study was performed to examine the patterns and to prevent the side effects of CF Herbal Acupuncture treatment Methods : We observed 10 patients who complained the side effects of Herbal acupuncture CF and 2 healthy men for the sake of examine the cause from the August 17 to 24, 2001. Results 1. All of the patients complained severe pain, redish, and edema on the side of injections 2. We were able to witness decrease in pain, redish, and edema, after 2days of injection. After 4days, we were unable to any side effects. 3. According to the clinical studies, we came to determine that the CF herbal abstract which caused the side effects were manufactured between 4 to 13 days, August 4. We assume these side effects were caused by minute quantity of toxin remaining in the screw pressor mixed with the CF herbal abstract.

The Impact of the Canada-Korea Free Trade Agreement as Negotiated

  • Ciuriak, Dan;Xiao, Jingliang
    • East Asian Economic Review
    • /
    • 제18권4호
    • /
    • pp.425-461
    • /
    • 2014
  • This paper analyzes the impact of the Canada-Korea Free Trade Agreement on the basis of the published text and agreed schedule of commitments. We find that the Agreement reinforces existing patterns of comparative advantage between Canada (agriculture and resource-based sectors) and Korea (autos and other industries). The sensitive sectors that held up the deal for years - autos into Canada and beef into Korea - witness major trade gains, but are not unduly disrupted. In both economies, the major output gains otherwise come in non-traded services sectors, driven by income effects. We find that trade diversion effects are quite significant; this lends support for the domino theory of major free trade agreements - since the Korea-EU agreement broke the ice, the pressure has intensified on third parties to re-level playing fields by striking their own deals. The study breaks new ground in modelling services trade by developing policy impacts based on the extent to which the text of the Agreement modifies Korea's and Canada's scores on the OECD's Services Trade Restrictiveness Index and by providing estimates of Mode 3 Services trade impacts. The analysis of the Agreement as negotiated, the present study, in our view, is a step forward in understanding the impact of modern free trade agreements.

볼트액션 작동방식 단발형 소총의 비정상 작동에 관한 개선 연구 (A Study on Improvement of the Abnormal Operation of a One-shot Rifle with Bolt-action Operating System)

  • 신재원;정찬만;최시영;이호준;신태성;서현수
    • 품질경영학회지
    • /
    • 제47권3호
    • /
    • pp.417-424
    • /
    • 2019
  • Purpose: In this study, the goal is to analyze this case to prevent the same accidents when using one-shot rifle. Methods: Detailed analysis of damaged parts must first be made in order to determine the cause of the abnormal explosion. The cause of abnormal operation can be determined by analyzing the information of damaged components and the firing mechanism of the weapon step by step. Also we can refer to a statement of shooter, witness and accident scene situation. Based on this theory, cause of abnormal firing can be narrow down. Results: Fracture of pin for fixing firing and latch is cause of abnormal operation of firing. Conclusion: It is deemed that periodic inspection and fundamental improvement of the structure are required to prevent the same accident as this.

Zero-knowledge proof algorithm for Data Privacy

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권2호
    • /
    • pp.67-75
    • /
    • 2021
  • As pass the three revised bills, the Personal Information Protection Act was revised to have a larger application for personal information. For an industrial development through an efficient and secure usage of personal information, there is a need to revise the existing anonymity processing method. This paper modifies the Zero Knowledge Proofs algorithm among the anonymity processing methods to modify the anonymity process calculations by taking into account the reliability of the used service company. More detail, the formula of ZKP (Zero Knowledge Proof) used by ZK-SNAKE is used to modify the personal information for pseudonymization processing. The core function of the proposed algorithm is the addition of user variables and adjustment of the difficulty level according to the reliability of the data user organization and the scope of use. Through Setup_p, the additional variable γ can be selectively applied according to the reliability of the user institution, and the degree of agreement of Witness is adjusted according to the reliability of the institution entered through Prove_p. The difficulty of the verification process is adjusted by considering the reliability of the institution entered through Verify_p. SimProve, a simulator, also refers to the scope of use and the reliability of the input authority. With this suggestion, it is possible to increase reliability and security of anonymity processing and distribution of personal information.

Haewon-sangsaeng as a Religio-Ethical Metaphor

  • HUANG, Pochi
    • 대순사상과 동아시아종교
    • /
    • 제1권1호
    • /
    • pp.103-125
    • /
    • 2021
  • This paper deals with figurative meanings of Haewon-sangsaeng. It is an investigation which is both semantic and diachronic. In the first part, important implications of sangsaeng (or xiangsheng in Chinese) in the context of correlative cosmology are extensively explored. Among others, saeng (in Chinese sheng) as a powerful metaphor and its related Chinese compounds are broadly discussed. In the second part, the evolution of ideas of yuan (or won in Korean) in Chinese history is explicated. Above all, in the traditional Chinese cultural milieu, wrongful treatments which make victims feel themselves aggrieved are socio-politically orientated. The Scripture on Great Peace (Taiping Jing) is used as reference point to elucidate the essential points of yuan and its knots. However, the advent of Buddhism in East Asia adds a new dimension to the understanding of yuan (won). Accumulated yuan as karmic bond thus gives a new identity of yuan as predetermined animosity. Widely recognized idioms like "adverse relatives and karmic debtors" and indigenous Chinese Buddhist rituals like Repentance Ritual of the Emperor Liang bear witness to this transformation of the meaning of yuan in East Asia. The fruitful yet correlated meanings of yuan also make the endeavor of untying yuan deeply significant and important to human society. Haewon-sangsaeng, as a religio-ethical ideal, brings out an amicable and harmonious relationship among myriad beings in the cosmos.

Variation in wind load and flow of a low-rise building during progressive damage scenario

  • Elshaer, Ahmed;Bitsuamlak, Girma;Abdallah, Hadil
    • Wind and Structures
    • /
    • 제28권6호
    • /
    • pp.389-404
    • /
    • 2019
  • In coastal regions, it is common to witness significant damages on low-rise buildings caused by hurricanes and other extreme wind events. These damages start at high pressure zones or weak building components, and then cascade to other building parts. The state-of-the-art in experimental and numerical aerodynamic load evaluation is to assume buildings with intact envelopes where wind acts only on the external walls and correct for internal pressure through separate aerodynamic studies. This approach fails to explain the effect of openings on (i) the external pressure, (ii) internal partition walls; and (iii) the load sharing between internal and external walls. During extreme events, non-structural components (e.g., windows, doors or rooftiles) could fail allowing the wind flow to enter the building, which can subject the internal walls to lateral loads that potentially can exceed their load capacities. Internal walls are typically designed for lower capacities compared to external walls. In the present work, an anticipated damage development scenario is modelled for a four-story building with a stepped gable roof. LES is used to examine the change in the internal and external wind flows for different level of assumed damages (starting from an intact building up to a case with failure in most windows and doors are observed). This study demonstrates that damages in non-structural components can increase the wind risk on the structural elements due to changes in the loading patterns. It also highlights the load sharing mechanisms in low rise buildings.

An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography

  • Qiu, Shuming;Xu, Guosheng;Ahmad, Haseeb;Xu, Guoai;Qiu, Xinping;Xu, Hong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권2호
    • /
    • pp.978-1002
    • /
    • 2019
  • With the rapid development of the Internet of Things, the problem of privacy protection has been paid great attention. Recently, Nikooghadam et al. pointed out that Kumari et al.'s protocol can neither resist off-line guessing attack nor preserve user anonymity. Moreover, the authors also proposed an authentication supportive session initial protocol, claiming to resist various vulnerability attacks. Unfortunately, this paper proves that the authentication protocols of Kumari et al. and Nikooghadam et al. have neither the ability to preserve perfect forward secrecy nor the ability to resist key-compromise impersonation attack. In order to remedy such flaws in their protocols, we design a lightweight authentication protocol using elliptic curve cryptography. By way of informal security analysis, it is shown that the proposed protocol can both resist a variety of attacks and provide more security. Afterward, it is also proved that the protocol is resistant against active and passive attacks under Dolev-Yao model by means of Burrows-Abadi-Needham logic (BAN-Logic), and fulfills mutual authentication using Automated Validation of Internet Security Protocols and Applications (AVISPA) software. Subsequently, we compare the protocol with the related scheme in terms of computational complexity and security. The comparative analytics witness that the proposed protocol is more suitable for practical application scenarios.

Palliates the Attack by Hacker of Android Application through UID and Antimalware Cloud Computing

  • Zamani, Abu Sarwar;Ahmad, Sultan;Uddin, Mohammed Yousuf;Ansari, Asrar Ahmad;Akhtar, Shagufta
    • International Journal of Computer Science & Network Security
    • /
    • 제21권8호
    • /
    • pp.182-186
    • /
    • 2021
  • The market for smart phones has been booming in the past few years. There are now over 400,000 applications on the Android market. Over 10 billion Android applications have been downloaded from the Android market. Due to the Android popularity, there are now a large number of malicious vendors targeting the platform. Many honest end users are being successfully hacked on a regular basis. In this work, a cloud based reputation security model has been proposed as a solution which greatly mitigates the malicious attacks targeting the Android market. Our security solution takes advantage of the fact that each application in the android platform is assigned a unique user id (UID). Our solution stores the reputation of Android applications in an anti-malware providers' cloud (AM Cloud). The experimental results witness that the proposed model could well identify the reputation index of a given application and hence its potential of being risky or not.

중소병원 간호사의 인권감수성과 간호근무환경이 직장 내 괴롭힘 피해에 미치는 영향 (The Influence of Human Rights Sensitivity and the Nursing Work Environment on Workplace Bullying Victimization among Nurses in Small- and Medium-Sized Hospitals)

  • 조은경;김문정
    • 보건의료산업학회지
    • /
    • 제13권3호
    • /
    • pp.27-38
    • /
    • 2019
  • Objectives: The purpose of this study was to examine the influence of human rights sensitivity and nursing work environment on workplace bullying victimization among nurses in small- and medium-sized hospitals. Methods: The participants were 255 nurses from 5 general hospitals in Busan. A dataset was collected using a structured self-reporting questionnaire during the month of July 2018. The data were analyzed with SPSS WIN 23.0 software (IBM Corp., Armonk, NY, USA) using independent t-test, one-way analysis of variance, Pearson's correlation coefficient, and multiple regression analysis. Results: Nursing work environment showed negative correlation with workplace bullying victimization. Being a witness to bullying, organizational support, head nurse's leadership, and relationships with peers were found to influence workplace bullying victimization, and these 4 variables explained 37% of workplace bullying victimization. Conclusions: Formal procedures for cases of bullying and improvements in the leadership of head nurses and peer relationships are crucial to reducing workplace bullying victimization among nurses in small- and medium-sized hospitals. Hospital executives' efforts to provide sufficient physical and human resources for nursing services and to improve the welfare of nurses are also needed.

Cyberbullying Detection in Twitter Using Sentiment Analysis

  • Theng, Chong Poh;Othman, Nur Fadzilah;Abdullah, Raihana Syahirah;Anawar, Syarulnaziah;Ayop, Zakiah;Ramli, Sofia Najwa
    • International Journal of Computer Science & Network Security
    • /
    • 제21권11호
    • /
    • pp.1-10
    • /
    • 2021
  • Cyberbullying has become a severe issue and brought a powerful impact on the cyber world. Due to the low cost and fast spreading of news, social media has become a tool that helps spread insult, offensive, and hate messages or opinions in a community. Detecting cyberbullying from social media is an intriguing research topic because it is vital for law enforcement agencies to witness how social media broadcast hate messages. Twitter is one of the famous social media and a platform for users to tell stories, give views, express feelings, and even spread news, whether true or false. Hence, it becomes an excellent resource for sentiment analysis. This paper aims to detect cyberbully threats based on Naïve Bayes, support vector machine (SVM), and k-nearest neighbour (k-NN) classifier model. Sentiment analysis will be applied based on people's opinions on social media and distribute polarity to them as positive, neutral, or negative. The accuracy for each classifier will be evaluated.