• Title/Summary/Keyword: Supervisory

Search Result 626, Processing Time 0.024 seconds

Problems of Shariah Governance Framework and Different Bodies: An Empirical Investigation of Islamic Banks in Bangladesh

  • ALAM, Md. Kausar;MUSTAFA, Hasri;UDDIN, Md. Salah;ISLAM, Md. Jahirul;MOHUA, Marjea Jannat;HASSAN, Md. Farjin
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.3
    • /
    • pp.265-276
    • /
    • 2020
  • The study aims to explore the problems of the existing Shariah Governance Framework (SGF) and its concerned authorities in the context of Bangladesh. Thus, according to responses from 17 respondents, this study outlines that Bangladesh has an absence of a shortage of experts, experienced, knowledgeable, and qualified Shariah people at all levels (i.e., the central bank, Islamic banks, Shariah Supervisory Boards (SSBs), and regulators). Therefore, Bangladesh does not have a separate Islamic banking act, Shariah audit firm, Shariah index institutions, and comprehensive SGF. The existing guideline has a limitation concerning its comprehensiveness, accountability, responsibility, and structure of SSBs. Islamic banks do not follow the instruction of the central bank in the formation of SSBs. As a result, there is an absence of competent and qualified SSB, which also results in the functions of Shariah departments as well as Shariah applications. Usually, the Board of Directors (BOD), management, executives, customers, and the public also have the conceptual gap about Islamic banks, SGF, and banking system compared to the regular prayers, faith, and belief. Concisely, Bangladesh requisites a comprehensive SGF, Islamic banking act, a standard accounting system, and a robust Shariah audit system for the overall development of Islamic banks and SGF.

An intelligent planner of processing equipment for CSCW-based shop floor control in agile manufacturing

  • Kim, Hwajin;Cho, Hyunbo;Jung, Mooyoung
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1995.04a
    • /
    • pp.185-192
    • /
    • 1995
  • A common control model used to implement computer integrated manufacturing(CIM) is based on the hierarchical decomposition of the shop floor activities, in which supervisory controllers are responsible for all the interactions among subordinates. Although the hierarchical control philosophy provides for easy understanding of complex systems, an emerging manufacturing paradigm, agile manufacturing, requires a new control structure necessary to accommodate the rapid development of a shop floor controller. This is what is called CSCW(computer supported cooperative work)-based control or component-based heterarchical control. As computing resources and communication network on the shop floor become increasingly intelligent and powerful, the new control architecture is about to come true in a modern CIM system. In this paper, CSCW-based control is adopted and investigated, in which a controller for a unit of device performs 3 main functions - planning, scheduling and execution. In this paper, attention is paid to a planning function and all the detailed planning activities for CSCW-based shop floor control are identified. Interactions with other functions are also addressed. Generally speaking, planning determines tasks to be scheduled in the future. In other words, planning analyzes process plans and transforms process plans into detailed plans adequate for shop floor control. Planning is also responsible for updating the process plan and identifying/resolving replanning activities whether they come from scheduling or execution.

  • PDF

A Development of Cipher Device based on Embedded Linux for Serial Communication in SCADA (임베디드 리눅스 기반의 SCADA 직렬통신 구간 암호화 장치 개발)

  • Lee, Jong-Joo;Kim, Seog-Joo;Kang, Dong-Joo
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.24 no.4
    • /
    • pp.25-32
    • /
    • 2010
  • The Supervisory Control and Data Acquisition Systems (SCADA) system provides monitoring, data gathering, analysis, and control of the equipment used to manage most infrastructure. The SCADA Network is implemented in a various manner for larger utilities, and multiple types of protocol and communication interfaces are used to network the control center to remote sites. The existing SCADA equipment and protocols were designed and implemented with availability and efficiency, and as a result security was not a consideration. So, performance, reliability, flexibility and safety of SCADA systems are robust, while the security of these systems is often weak. This makes some SCADA networks potentially vulnerable to disruption of service, process redirection, or manipulation of operational data that could result in public safety concerns and/or serious disruptions to the infrastructure. To reduce the risks, therefore, there is a need to have a security device such as cipher devices or cryptographic modules for security solutions. In this paper we develop an embedded cipher device for the SCADA equipment. This paper presents a cipher device designed to improve the security of its networks, especially in the serial communication.

A Study on Measures for Preventing Credit Card Fraud (신용카드 부정사용 방지 방안에 관한 연구)

  • Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.33-40
    • /
    • 2016
  • Credit card is means of payment used like cash in terms of function and its users have increased consistently. With development of Internet and electronic commerce a role as payment method of credit card has been growing. But as the risk which results from centralized information and online increases, credit card fraud is also growing. Card theft and loss are decreasing due to countermeasure of card companies and financial supervisory authorities, while card forge and identity theft are increasing. Recently because of frequent personal information leakage and deregulation of financial security following easy-to-use payment enforcement, customer's anxiety about card fraud is growing. And the increase of card fraud lowers trust on credit system as well as causes social costs. In this paper, the security problems of card operating system are addressed in depth and the measures such as immediate switch to IC card terminals, introduction of new security technology, supervision reinforcement of the authorities are proposed.

Meanings and Tasks of the Three Revised Bills which Ease Regulations on the Use of Personal Information (데이터 3법 개정의 의미와 추후 과제)

  • Kim, Seo-An
    • Convergence Security Journal
    • /
    • v.20 no.2
    • /
    • pp.59-68
    • /
    • 2020
  • In January 2020, the National Assembly passed the revisions of three bills which ease regulations on the use of personal information. The revised laws include the launch of an independent supervisory body, the arrangement of redundant regulations, and regulations for the development of the data economy. This paper analyzes the content and meaning of each law of the Three Revised Bills that Ease Regulations on the Use of Personal Information. And the future challenges outline three aspects: the establishment of a system to ensure the right to informational self-determination of privacy concerns, the establishment of a certification system and the presentation of reasonable guidelines, and the expectation of professional performance by the Personal Information Protection Commission.

A Design of Power Management and Control System using Digital Protective Relay for Motor Protection, Fault Diagnosis and Control (모터 보호, 고장진단 및 제어를 위한 디지털 보호계전기 활용 전력감시제어 시스템 설계)

  • Lee, Sung-Hwan;Ahn, Ihn-Seok
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.49 no.10
    • /
    • pp.516-523
    • /
    • 2000
  • In this paper, intelligent methods using digital protective relay in power supervisory control system is developed in order to protect power systems by means of timely fault detection and diagnosis during operation for induction motor which has various load environments and capacities in power systems. The spectrum pattern of input currents was used to monitor to state of induction motors, and by clustering the spectrum pattern of input currents, the newly occurrence of spectrums pattern caused by faults were detected. For diagnosis of the fault detected, the fuzzy fault tree was derived, and the fuzzy relation equation representing the relation between an induction motor fault and each fault type, was solved. The solution of the fuzzy relation equation shows the possibility of each fault's occurring. The results obtained are summarized as follows: 1) The test result on the basis of KEMC1120 and IEC60255, show that the operation time error of the digital motor protective relay is improved within ${\pm}5%$. 2) Using clustering algorithm by unsupervisory learning, an on-line fault detection method, not affected by the characteristics of loads and rates, was implemented, and the degree of dependency by experts during fault detection was reduced. 3) With the fuzzy fault tree, fault diagnosis process became systematic and expandable to the whole system, and the diagnosis for sub-systems can be made as an object-oriented module.

  • PDF

Implementation and application of remote control system using LACC(Local Area Control Center) (LACC를 이용한 원격제어 시스템 구현 및 적용)

  • Park Tae-Jin;Jang Myung-Kee;Chung Seung-Ryul
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.4 s.310
    • /
    • pp.15-22
    • /
    • 2006
  • Nowadays, there is called energy saving, that it is accomplished with a lot study and application development as according to demand of all around world. It is using to network device of wire or wireless such as internet, lan, plc, and zigbee and that we should be accomplished to study about method that spending a little cost to fatal error in control system that be expected of frequent occurrence on network, and that have method to do construction a little bit tried out. Also, in that such a embedded system with network function case, there is important thing that it is remote management to network node and control methods to trust because firmware upgrade have the advantage of more than the other device. In this paper, we have verified through a result of experiment for efficient remote management and control method as previously stated in this paper, that it is area of the PLC for sensor node and doing management to relay, and implementation of the LACC which is core part of the ESS, and in order to get a result to trust from doing analysis of capacity and test.

Developing an Embedded Method to Recognize Human Pilot Intentions In an Intelligent Cockpit Aids for the Pilot Decision Support System

  • Cha, U-Chang
    • Journal of the Ergonomics Society of Korea
    • /
    • v.17 no.3
    • /
    • pp.23-39
    • /
    • 1998
  • Several recent aircraft accidents occurred due to goal conflicts between human and machine actors. To facilitate the management of the cockpit activities considering these observations. a computational aid. the Agenda Manager (AM) has been developed for use in simulated cockpit environments. It is important to know pilot intentions performing cockpit operations accurately to improve AM performance. Without accurate knowledge of pilot goals or intentions, the information from AM may lead to the wrong direction to the pilot who is using the information. To provide a reliable flight simulation environment regarding goal conflicts. a pilot goal communication method (GCM) was developed to facilitate accurate recognition of pilot goals. Embedded within AM, the GCM was used to recognize pilot goals and to declare them to the AM. Two approaches to the recognition of pilots goals were considered: (1) The use of an Automatic Speech Recognition (ASR) system to recognize overtly or explicitly declared pilot goals. and (2) inference of covertly or implicitly declared pilot goals via the use of an intent inferencing mechanism. The integrated mode of these two methods could overcome the covert goal mis-understanding by use of overt GCM. And also could it overcome workload concern with overt mode by the use of covert GCM. Through simulated flight environment experimentation with real pilot subjects, the proposed GCM has demonstrated its capability to recognize pilot intentions with a certain degree of accuracy and to handle incorrectly declared goals. and was validated in terms of subjective workload and pilot flight control performance. The GCM communicating pilot goals were implemented within the AM to provide a rich environment for the study of human-machine interactions in the supervisory control of complex dynamic systems.

  • PDF

Legal Review of Similar Medical Practice (유사의료행위에 관한 법적 검토)

  • Kim, Han-Nah;Kim, Kye-Hyun
    • The Korean Society of Law and Medicine
    • /
    • v.10 no.2
    • /
    • pp.427-453
    • /
    • 2009
  • This study aims to review legal problems of similar medical practice and suggest methods of improvement. Similar medical practice refers to all medical practices conducted in the state that human qualification is not fulfilled. It may cause serious damages on health and lives of national people. Currently, similar medical practices are recognized as unlicensed medical practices and prohibited based on the Medical law and additionally punished by then special law in Korea. However, the current Medical Law does not provide clear and accurate concept of medical practices so that it is difficult to regulate similar medical practices. The issue of complementary and alternative therapy related to similar medical practices is also in special state different from other countries. In addition, since similar medical practices lack of evidences in terms of safety, the dangerousness of accidents is high and it may affect badly on health of national people and health care policies. Methods of improvement in order to resolve problems regarding similar medical practices are: first, concept and scope of medical practice should be clear, accurate and concrete. Second, complementary and alternative therapies related to similar medical practices need to be strictly examined and the supervisory right should be given to doctors should be given even though a part of it is allowed. Third, research institutes specialized in the field should be established for scientific examination of complementary and alternative therapy and objective research results should be open to the public. Finally, since damage cases caused by similar medical practices by non-medical personnel, national management and supervision for similar medical practices should be reinforced.

  • PDF

Evaluation of Provider Skills in Performing Visual Inspection with Acetic Acid in the Cervical Cancer Screening Program in the Meknes-Tafilalet Region of Morocco

  • Selmouni, Farida;Sauvaget, Catherine;Zidouh, Ahmed;Plaza, Consuelo Alvarez;Muwonge, Richard;Rhazi, Karima El;Basu, Partha;Sankaranarayanan, Rengaswamy
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.9
    • /
    • pp.4313-4318
    • /
    • 2016
  • Background: This study documented the performance of providers of visual inspection with acetic acid (VIA) at primary health centers, assessing their compliance with the VIA skills checklist and determinants of non-compliance, and exploring their perceptions of VIA training sessions. Materials and Methods: A cross-sectional study was conducted among VIA providers in the $Mekn\grave{e}s$-Tafilalet region of Morocco. Structured observation of their performance was conducted through supervisory visits and multiple focus group discussions (FGDs). Results: Performance of all the recommended steps for effective communication was observed in a low proportion of procedures (36.4%). Midwives/nurses had higher compliance than general practitioners (GPs) (p<0.001). All recommended steps for VIA examination were performed for a high proportion of procedures (82.5%). Compliance was higher among midwives/nurses than among GPs (p<0.001) and among providers in rural areas than those in urban areas (p<0.001). For pre-VIA counselling, all recommended steps were performed for only 36.8% of procedures. For post-VIA counseling, all recommended steps were performed in a high proportion (85.5% for VIA-negative and 85.1% for VIA-positive women). Midwives/nurses had higher compliance than GPs when advising VIA-positive women (p=0.009). All infection prevention practices were followed for only 14.2% of procedures, and compliance was higher among providers in rural areas than those in urban areas (p<0.001). Most FGD participants were satisfied with the content of VIA training sessions. However, they suggested periodic refresher training and supportive supervision. Conclusions: Quality assurance of a cervical cancer screening program is a key element to ensure that the providers perform VIA correctly and confidently.