• Title/Summary/Keyword: integrity checking

Search Result 61, Processing Time 0.03 seconds

Electroencephalography for the diagnosis of brain death

  • Lee, Seo-Young;Kim, Won-Joo;Kim, Jae Moon;Kim, Juhan;Park, Soochul;Korean Society of Clinical Neurophysiology Education Committee
    • Annals of Clinical Neurophysiology
    • /
    • v.19 no.2
    • /
    • pp.118-124
    • /
    • 2017
  • Electroencephalography (EEG) is frequently used to assist the diagnosis of brain death. However, to date there have been no guidelines in terms of EEG criteria for determining brain death in Korea, despite EEG being mandatory. The purpose of this review is to provide an update on the evidence and controversies with regarding to the utilization of EEG for determining brain death and to serve as a cornerstone for the development of future guidelines. To determine brain death, electrocerebral inactivity (ECI) should be demonstrated on EEG at a sensitivity of $2{\mu}V/mm$ using double-distance electrodes spaced 10 centimeters or more apart from each other for at least 30 minutes, with intense somatosensory or audiovisual stimuli. ECI should be also verified by checking the integrity of the system. Additional monitoring is needed if extracerebral potentials cannot be eliminated. Interpreting EEG at high sensitivities, which is required for the diagnosis of brain death, can pose a diagnostic challenge. Furthermore, EEG is affected by physiologic variables and drugs. However, no consensus exists as to the minimal requirements for blood pressure, oxygen saturation, and body temperature during the EEG recording itself, the minimal time for observation after the brain injury or rewarming from hypothermia, and how to determine brain death when the findings of ECI is equivocal. Therefore, there is a strong need to establish detailed guidelines for performing EEG to determine brain death.

WWW Security Mechanism Using Plug-in and PGP (Plug-in 기법을 이용한 PGP 기반의 Web 보안 시스템 개발)

  • 김태갑;조은경;박정수;류재철
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1996.11a
    • /
    • pp.205-218
    • /
    • 1996
  • World Wide Web(WWW) has a lot of useful charaters. Easiness of use, multi-media data supporting and interactive communication capability are typical reasons why people want to use WWW. But because WWW is based on Internet, it has some security problems which originate in plain format data transmission on physical transmission line. The unique solution fer this problems is data encryption. Since theoritically proved encryption algorithms ensure data confidentiality, a unauthorized user can not know what is transmitted on network. In this paper, we propose a cryptography system which uses public key system. In detail, our public key based web security mechanism is using PGP module. PGP is a e-mail security system implemented by Phil Zimmermann. The basic idea of our propose is data encryption and integrity checking for all data which is transmitted on Web. To implement these facilities, we. use netscape browser extension technology, plug-in. Through these technology, security mechanisms are added on netscape browser.

  • PDF

A Program Development of Life Prediction Simulation for Multi-Surface Cracks on the Finite Plate (무한 평면체에 존재하는 복수 표면균열의 성장에 대한 수명예측용 시뮬레이션 개발에 관한 연구)

  • 황남성;서창민;남승훈
    • Journal of Ocean Engineering and Technology
    • /
    • v.11 no.4
    • /
    • pp.61-75
    • /
    • 1997
  • The social demand urges us to use some equipments and structures in high temperature environment. By this occasion, the necessity of studying the fatigue crack growth is an important aspect of new materials. However, the present situation is rarely to accumulate the fatigue data. Especially, 1Cr-1Mo-0.25V steel and 304 stainless steel have been increased to be used under the severe condition of high temperature. And so, the fatigue estimation of those materials is important and appropriate. Fatigue tests have been carried out to examine the crack initiation, growth behaviour for the small fatigue crack of 1Cr-1Mo-0.25V steel and 304 stainless steel at room temperature and 538^{\circ}C$. The remote measurement system which has many merits of checking and saving the image for detailed examination was applied to closely detect the crack length. Generally, the fatigue crack initiated in the form of multiple cracks and grew each other. And then it coalesced to become a major crack. The major crack governed the rest of the fatigue life. In the growing process, each peripheral cracks interact and grow for a certain period. After then, it coalesced and fractured. On the basis of the above experimental data for the small crack, a simulation program was developed to predict the residual life time and to estimate the integrity of machine elements and structures. At the same time, the simulation was extended to 1Cr-1Mo-0.25V steel. The simulation results have shown a good agreement to those of the experimental ones for both materials of 1Cr-1Mo-0.25V steel and 304 stainless steel with small cracks. The NASCRAC has applied to compare the fatigue life with the experimental results. And so, it can be said that the simulation program is valuable tools to the industrial fields.

  • PDF

Design concept investigation for corner protection of LNG storage tank by ASME section VIII, Div. 2 (ASME section VIII div. 2에 따른 LNG저장탱크 코너프로텍션의 설계개념 고찰)

  • Kim Hyoungsik;Hong Seongho;Seo Heungseok;Yang Youngchul
    • Journal of the Korean Institute of Gas
    • /
    • v.5 no.3 s.15
    • /
    • pp.73-79
    • /
    • 2001
  • The corner protection which is consist of insulation and $9\%$ nickel liner is designed to mitigate the high hoop tension at the corner of LNG storage tank by LNG leakage. So the design loads depend on thermal and liquid pressure from leaked LNG In this paper design conditions are suggested as operating, major and minor leak conditions. And in order to check integrity of comer protection for the design conditions by appendix 4 in ASME section VIII div.2, acceptability checking process that have stress categorization and finite element analysis is explained.

  • PDF

Cash Flow Statement Preparation Using Accounts Reconciliation Method for IACF (계정조정 방식에 의한 산학협력단 현금흐름표 작성)

  • Kang, Jinhwa;Ahn, Jaekyoung
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.41 no.2
    • /
    • pp.47-55
    • /
    • 2018
  • The Korean Ministry of Education (MOE) required cash flow statements, instead of fund statements, as a component of the financial statements of the Industry-Academic Cooperation Foundations (IACF) when it revised IACF accounting rules in 2012. While the fund statements were aligned its accounts to the operating statements' accounts level, the newly adopted cash flow statements' accounts retreated to two levels higher than those of the operating statements. It may be resulted from the consideration that IACFs' burden of preparing cash flow statements especially in direct method. To help IACFs prepare the cash flow statements, MOE's guidance on IACF accounting rules introduced cash flow statement preparation method and presented a practical example, but it did not check whether the accounts of the cash flow statement were reconciled to the accounts of corresponding balance sheet and operating statement. That means that the guidance still lacks how to assure it was accurately prepared. Our study proposed cash flow statement preparation using reconciliation method which reconciles cash flow statement accounts' amounts to balance sheet and operating statement accounts' amounts with integrity checking and also provided a practical example by using the same case in MOE's guidance on IACF accounting rules to help IACF accounting personnel to prepare a cash flow statement efficiently.

Implementation and Static Verification Methodology of Discrete Event Simulation Software based on the DEVS Diagram: A Practical Approach (DEVS 다이어그램 기반 이산사건 시뮬레이션 소프트웨어 구현 및 정적 검증기법: 실용적 접근방법)

  • Song, Hae Sang
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.3
    • /
    • pp.23-36
    • /
    • 2018
  • Discrete Event System Specification (DEVS) has been used for decades as it provides sound semantics for hierarchical modular specification of discrete event systems. Instead of the mathematical specification, the DEVS diagram, based on the structured DEVS formalism, has provided more intuitive and convenient representation of complex DEVS models. This paper proposes a clean room process for implementation and verification of a DEVS diagram model specification into a simulation software source code. Specifically, it underlies a sequence of transformation steps from conformance and integrity checking of a given diagram model, translation into a corresponding tabular model, and finally conversion to a simulation source code, with each step being inversely verifiable for traceability. A simple example helps developers to understand the proposed process with associated transformation methods; a case study shows that the proposed process is effective for and adaptable to practical simulation software development.

Proposal of Detection Module for Fighter Aircraft Data Modulation Attack (전투기 데이터 변조 공격행위에 대한 탐지모듈 제안)

  • Hong, Byoung-jin;Kim, Wan-ju;Kim, Ho-keun;Lim, Jae-sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.5-16
    • /
    • 2019
  • Modern state-of-the-art military aviation assets are operated with independent embedded real-time operating systems(RTOS). These embedded systems are made with a high level of information assurance. However, once the systems are introduced and installed on individual platforms for sustaining operational employment, the systems are not actively managed and as a result the platforms become exposed to serious threats. In this paper, we analyzed vulnerability factors in the processing of mission planning data and maintenance-related data for fighter aircraft. We defined the method and form of cyber attacks that modulate air data using these vulnerabilities. We then proposed a detection module for integrity detection. The designed module can preemptively respond to potential cyber threats targeting high - value aviation assets by checking and preemptively responding to malware infection during flight data processing of fighter aircraft.

Applying Novelty Detection for Checking the Integrity of BIM Entity to IFC Class Associations (Novelty detection을 이용한 BIM객체와 IFC 클래스 간 매핑의 무결성 검토에 관한 연구)

  • Koo, Bonsang;Shin, Byungjin
    • Korean Journal of Construction Engineering and Management
    • /
    • v.18 no.6
    • /
    • pp.78-88
    • /
    • 2017
  • With the growing use of BIM in the AEC industry, various new applications are being developed to meet these specific needs. Such developments have increased the importance of Industry Foundation Classes, which is the international standard for sharing BIM data and thus ensuring interoperability. However, mapping individual BIM objects to IFC entities is still a manual task, and is a main cause for errors or omissions during data transfers. This research focused on addressing this issue by applying novelty detection, which is a technique for detecting anomalies in data. By training the algorithm to learn the geometry of IFC entities, misclassifications (i.e., outliers) can be detected automatically. Two IFC classes (ifcWall, ifcDoor) were trained using objects from three BIM models. The results showed that the algorithm was able to correctly identify 141 of 160 outliers. Novelty detection is thus suggested as a competent solution to resolve the mapping issue, mainly due to its ability to create multiple inlier boundaries and ex ante training of element geometry.

An Audio Comparison Technique for Verifying Flash Memories Mounted on MP3 Devices (MP3 장치용 플래시 메모리의 오류 검출을 위한 음원 비교 기법)

  • Kim, Kwang-Jung;Park, Chang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.5
    • /
    • pp.41-49
    • /
    • 2010
  • Being popularized the use of portable entertainment/information devices, the demand on flash memory has been also increased radically. In general, flash memory reveals various error patterns by the devices it is mounted, and thus the memory makers are trying to minimize error ratio in the final process through not only the electric test but also the data integrity test under the same condition as real application devices. This process is called an application-level memory test. Though currently various flash memory testing devices have been used in the production lines, most of the works related to memory test depend on the sensual abilities of human testers. In case of testing the flash memory for MP3 devices, the human testers are checking if the memory has some errors by hearing the audio played on the memory testing device. The memory testing process like this has become a bottleneck in the flash memory production line. In this paper, we propose an audio comparison technique to support the efficient flash memory test for MP3 devices. The technique proposed in this paper compares the variance change rate between the source binary file and the decoded analog signal and checks automatically if the memory errors are occurred or not.

An Analysis of Referrals, Nursing Diagnosis, and Nursing Interventions in Home Care - Wonju Christian Hospital Community Health Nursing Service - (가정간호 기록지 분석 - 원주기독병원 가정간호 보건활동을 중심으로 -)

  • Suh, Mi-Hae;Huh, Hae-Kyung
    • Journal of Home Health Care Nursing
    • /
    • v.3
    • /
    • pp.53-66
    • /
    • 1996
  • Home Health Care is one part of the total health care system. It includes health care services that link the hospital to the community. While it is important for early discharge patients, home care is also important for people with chronic illnesses or handicapping conditions. In 1989 the Korean government passed a law that opened the way for formal development of home health care services beginning with education programs to certify nurses for home care, and then demonstration home care services. Part of the mandate of the demonstration projects was evaluation of home care services. This study was done in order to provide basic data that would contribute to the development of records that could be used for evaluation through a retrospective audit and to examine the care that had been given in Home Care at Wonju Christian Hospital over a twenty year period from 1974 to 1994. The purposes of the study were : to identify to characteristics of the clients who had received home care, to identify the reasons for client referrals, to identify the nursing problems of these clients, to identify the nursing care provided to these clients, and to identify differences in these areas over the twenty year period. The study was a descriptive study involving a retrospective audit of the client records. Demographic data on all clients were included : 4,171 clients from 2,564 families. Data on referrals, nursing diagnosis and nursing interventions were from even numbered records which had a patient problem list included in the record, 2,801 clients, Frequencies and ANOVA were used in the analysis. The results of the study showed that the majority of the clients were from Wonju city /county. There were more women than men related to the high number of postpartum clients(1,300). The high number of postparttum clients and newborns was also evident in the age distribution. An the number of maternal-child clients decreased over the 20 years, the mean age of the clients increased significantly. Other factors also contributed to this change ; as increasing number of clients with brain injuries or with cancer, and fewer children with burns, osteomyelitis and tuberculosis. There was a decrease in the mean number of visits and mean length of coverage, reflecting a movement towards a short term acute care model. The number of new clents dropped sharply after 1985. The reasons for this are : the development of other treatment alternatives for clients, the establishment of an active wellbaby clinic, many more options plus a decreasing number of new cases of Hansen's Disase, and insurance that allows people with burns to be kept in hospital until skin grafts are healed. Socioeconomic changes have resulted in an increase in the number of cases of cancer, stroke, head injuries following car accidents, and of diabetes. Of the 2,801 client records, 2,541(60.9%) contained a written referral but for 1,802 it contained only the medical diagnosis. The number of records with a referral requesting specific nursing care was 739(29.1%). Many family members who were identified as in need of nursing care had no written referral. Analysis of the patient problem list showed that 41.9% of the enteries were nursing diagnoses. Others incuded medical diagnosis, symptoms, and plans. The most frequently used diagnoses were alteration in nutrition, less than body requirements(115 entries), alteration in skin integrity(114), knowledge deficit(111), pain(78), self-care deficit(66), and alteration in pattern of urinary elimination(50). These are reflected in the NANDA categories for which the highest number of diagnosis was in the Exchanging pattern(446), followed by Moving(178), Feeling(136) and Knowing (115). Analysis of the frequency of interventions showed that exercise and teaching about exercise was the most frequent intervention, followed by teaching concering the need for follow-up care, checking vital signs, managing nutritional problems, managing catheters, giving emotional support, changing dressings, teaching about medication, teaching (subject not specified), teaching about diet, IM and IV medications or fluid, and skin care, in that order. Recommendations included: development of a record that would allow for efficient recording of frequently used nursing diagnoses and nursing interventions: expansion of the catchment area for Home Care at Wonju Christian Hospital ; expansion of the service to provide complication prevention, rehabilitation services, and support to increase the health maintenance /health promotion of the people being served as well as providing client dentered care ; and development of a clinical record that will allow efficient data collection from records, even though the recording is done by a variety of health care providers.

  • PDF