• Title/Summary/Keyword: recovered paper

Search Result 602, Processing Time 0.026 seconds

Patient's Permanent Lesion and Physician's Medical Malpractice (후유장해를 둘러싼 민사책임의 쟁점들 -대법원 2008.3.27. 선고 2007다76290 판결을 중심으로-)

  • Kim, Cheon-Soo
    • The Korean Society of Law and Medicine
    • /
    • v.10 no.2
    • /
    • pp.85-113
    • /
    • 2009
  • In this paper, the Judgment 2007DA76290 of the Korean Supreme Court was analysed in two points of the legal theory and litigation. The judgment arouses some issues of medical malpractice liability. They includes the concept of the complications and permanent lesion and the difference between them, some problems in a judge's applying the requirements for the physician's tort liability to the medical malpractice situations, the theory of obligation de moyens related with the burden of proof of the negligent conduct for a physician's liability for misperformance of contract, the influence of a patient's physical conditions on the physician's liability, the breach of duty to disclose in selecting the safer one of the treatment methods bringing about the complications or leaving the permanent lesion and so on. In the situations of the case referred to above, the plaintiff should have tried to establish that a reasonable physician in the specific situation of the case would have substituted the safer method of treatment for the method in the case. If the plaintiff had succeeded in establishing it, he or she could have recovered even the physical harm resulting from the permanent lesion brought about by the complications of the specific treatment in the case. The plaintiff failed to do so and recovered only the emotional distress which the patient suffered owing to the physician's breach of the duty to disclose. Therefore the legal malpractice of the counsel might be found in this case.

  • PDF

The Performance Evaluation of Parallel and Single Structure MCMA-MDD Adaptive Equalizer for 16-QAM Signal (16-QAM 신호에대한 병렬 구조와 단일 구조를 갖는 MCMA-MDD 적응 등화기의 성능 평가)

  • Lim, Seung-Gag
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.15-22
    • /
    • 2012
  • This paper deals with the performance comparison and evaluation of blind adaptive equalizer, the PMCMA-MDD and DW-MCMA, that is used for compensation of the amplitude and phase distortion which occurs in the time dispersive channel. Basically, these algorithms are modification of MCMA cost function in order to obtain the fast convergence speed and reduced residual isi by taking the parallel and serial double structured and the combination of the concept of RCA for the updating the tap coefficient. We implements the algorithm of it and compare the recovered constellation, residual isi, MSE characteristics curve and SER in the signal to noise ratio given the time dispersive channel. As a result of simulation, the PMCMA-MDD has a good in recovered constellation than DW-MCMA. But in the SER, the DW-MCMA has a good than PMCMA-MDD.

Adaptive Equalization Algorithm of Improved-CMA for Phase Compensation (위상 보상을 위한 개선된 CMA 적응 등화 알고리즘)

  • Lim, Seung-Gag
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.63-68
    • /
    • 2014
  • This paper related with the I-CMA (Improved-CMA) algorithm that is possible to compensates of phase in CMA adatpve equalizer which is used for the elemination of intersymbol interference in the multipath fading and band limit characteristics of channel. The new cost function is proposed for the eliminate the amplitude and phase simulataneous by modifying the cost fuction for get the error signal in present CMA algorithm. It has a merit to the algorithm simplicities and eliminats the PLL device for phase compensation after equalization. For proving this, the recovered signal constellation that is the output of equalizer output signal and the residual isi and Maximum Distortion charateristic learning curve that are presents the convergence performance in the equalizer and the overall frequency transfer function of channel and equalizer were used. As a result of computer simulation, the I-CMA has more good compensation capability of amplitude and phas in the recovered constellation. But the convergence time is slow due to the simultaneously phase compensation.

Optimal Control Scheme for SEIR Model in Viral Communications (Viral 통신에서의 SEIR모델을 위한 최적제어 기법)

  • Radwan, Amr
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1487-1493
    • /
    • 2016
  • The susceptible, exposed, infectious, and recovered model (SEIR) is used extensively in the field of epidemiology. On the other hand, dissemination information among users through internet grows exponentially. This information spreading can be modeled as an epidemic. In this paper, we derive the mathematical model of SEIR in viral communication from the view of optimal control theory. Overall the methods based on classical calculus, In order to solve the optimal control problem, proved to be more efficient and accurate. According to Pontryagin's minimum principle (PMP) the Hamiltonian function must be optimized by the control variables at all points along the solution trajectory. We present our method based on the PMP and forward backward algorithm. In this algorithm, one should integrate forward in time for the state equations then integrate backward in time for the adjoint equations resulting from the optimality conditions. The problem is mathematically analyzed and numerically solved as well.

Characteristics of lost fishing gear distribution on the sea bed around gillnet fishing ground for yellow croaker in the near sea of Jeju, Korea (제주도 근해 참조기 유자망 어장의 폐어구 분포현황)

  • Kim, Byung-Yeob;Seo, Du-Ok;Choi, Chan-Moon;Lee, Chang-Heon;Chang, Dae-Soo;Oh, Taeg-Yun;Kim, Yeong-Hye;Kim, Jung-Nyun
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.46 no.4
    • /
    • pp.441-448
    • /
    • 2010
  • This paper was concentrated on the distribution and the composition of lost fishing gear on the sea bed around yellow croaker fishing ground in the near sea of Jeju, Korea from April to October 2009 in order to improve the fishery environment. Recovering lost fishing gears was carried out total 10 times with a trawlnet along the isobath. As the result, it seems reasonable to conclude that the amount of lost fishing gear has a deep connection with the dip of the sea bed as well as the fishing gear scale, fishing ground and so on. The amount of recovered lost fishing gears were in order of gillnets, dragged gears, traps and ropes. In particular, traps were recovered almost every time within the survey area.

Encryption Scheme for MPEG-4 Media Transmission Exploiting Frame Dropping

  • Shin, Dong-Kyoo;Shin, Dong-Il;Shin, Jae-Wan;Kim, Soo-Han;Kim, Seung-Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.925-938
    • /
    • 2010
  • Depending on network conditions, a communication network could be overloaded when media are transmitted. Research has been carried out to lessen network overloading, such as by filtering, load distribution, frame dropping, and other methods. Among these methods, one of the most effective is frame dropping, which reduces specified video frames for bandwidth diminution. In frame dropping, B-frames are dropped and then I- and P-frames are dropped, based on the dependency among the frames. This paper proposes a scheme for protecting copyrights by encryption, when frame dropping is applied to reduce the bandwidth of media based on the MPEG-4 file format. We designed two kinds of frame dropping: the first stores and then sends the dropped files and the other drops frames in real time when transmitting. We designed three kinds of encryption methods using the DES algorithm to encrypt MPEG-4 data: macro block encryption in I-VOP, macro block and motion vector encryption in P-VOP, and macro block and motion vector encryption in I-, P-VOP. Based on these three methods, we implemented a digital rights management solution for MPEG-4 data streaming. We compared the results of dropping, encryption, decryption, and the quality of the video sequences to select an optimal method, and found that there was no noticeable difference between the video sequences recovered after frame dropping and the ones recovered without frame dropping. The best performance in the encryption and decryption of frames was obtained when we applied the macro block and motion vector encryption in I-, P-VOP.

Conservation and Analysis of Inner Materials of a Stoneware Bottle from Incheon Ongjingun Yeongheungdo Shipwreck (인천 옹진군 영흥도선 출수 도기병의 보존처리와 내용물 분석)

  • Kim, Hyoyun;Kim, Seojin
    • Journal of Conservation Science
    • /
    • v.32 no.4
    • /
    • pp.449-457
    • /
    • 2016
  • A stoneware bottle was recovered from the Incheon Yeongheungdo Shipwreck in 2013. Primary observations showed that this object had a sealed opening and was covered with a foreign material. After it was cleaned via mechanical and chemical methods, wave patterns were observed on the outer surface of the bottle and a yellowish-brown transparent material was found within. In this paper, the process of conserving the stoneware bottle and the analysis conducted on the unknown material found within is explained. The conservation process included steps such as cleaning, desalination and restoration. After of the missing area located at the rim, the original shape of the bottle was made clear. In addition, the unknown inner material was analyzed using FT-IR and GC-MS. Results showed that the material is similar to golden lacquer. It is speculated that the Yeongheungdo Ship had wrecked during the Unified Silla period while carrying a bottle loaded with golden lacquer.

Gesture based Input Device: An All Inertial Approach

  • Chang Wook;Bang Won-Chul;Choi Eun-Seok;Yang Jing;Cho Sung-Jung;Cho Joon-Kee;Oh Jong-Koo;Kim Dong-Yoon
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.5 no.3
    • /
    • pp.230-245
    • /
    • 2005
  • In this paper, we develop a gesture-based input device equipped with accelerometers and gyroscopes. The sensors measure the inertial measurements, i.e., accelerations and angular velocities produced by the movement of the system when a user is inputting gestures on a plane surface or in a 3D space. The gyroscope measurements are integrated to give orientation of the device and consequently used to compensate the accelerations. The compensated accelerations are doubly integrated to yield the position of the device. With this approach, a user's gesture input trajectories can be recovered without any external sensors. Three versions of motion tracking algorithms are provided to cope with wide spectrum of applications. Then, a Bayesian network based recognition system processes the recovered trajectories to identify the gesture class. Experimental results convincingly show the feasibility and effectiveness of the proposed gesture input device. In order to show practical use of the proposed input method, we implemented a prototype system, which is a gesture-based remote controller (Magic Wand).

An Improvement of Image Encryption using Binary Phase Computer Generated Hologram and Multi XOR Operations (이진위상 컴퓨터형성홀로그램과 다중 XOR 연산을 이용한 영상 암호화의 개선)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.3
    • /
    • pp.110-116
    • /
    • 2008
  • In this paper, we proposed an improvement technique of image encryption using binary phase computer generated hologram(BPCGH) and multi exclusive-OR(XOR) operations. For the encryption process, a BPCGH that reconstructs the original image is designed, using an iterative algorithm, and the resulting hologram is regarded as the image to be encrypted. The BPCGH is encrypted through the exclusive-OR operation with the random generated phase key image. Then the encrypted image is divided into several slide images using XOR operations. So, the performance of encryption for the image is improved. For the decryption process, we cascade the encrypted slide images and phase key image and interfere with reference wave. Then decrypted hologram image is transformed into phase information. Finally, the original image is recovered by an inverse Fourier transformation of the phase information. If the slide images are changed, we can get various decrypted BPCGH images. In the proposed security system, without a random generated key image, the original image can not be recovered. And we recover another hologram pattern according to the slide images, so it can be used in the differentiated authorization system.

  • PDF

Post-fire Repair of Concrete Structural Members: A Review on Fire Conditions and Recovered Performance

  • Qiu, Jin;Jiang, Liming;Usmani, Asif
    • International Journal of High-Rise Buildings
    • /
    • v.10 no.4
    • /
    • pp.323-334
    • /
    • 2021
  • Concrete structures may rarely collapse in fire incidents but fire induced damage to structural members is inevitable as a result of material degradation and thermal expansion. This requires certain repairing measures to be applied to restore the performance of post-fire members. A brief review on investigation of post-fire damage of concrete material and concrete structural members is presented in this paper, followed by a review of post-fire repair research regarding various types of repairing techniques (FRP, steel plate, and concrete section enlargement) and different type of structural members including columns, beams, and slabs. Particularly, the fire scenarios adopted in these studies leading to damage are categorized as three levels according to the duration of gas-phase temperature above 600℃ (t600). The repair effectiveness in terms of recovered performance of concrete structural members compared to the initial undamaged performance has been summarized and compared regarding the repairing techniques and fire intensity levels. The complied results have shown that recovering the ultimate strength is achievable but the stiffness recovery is difficult. Moreover, the current fire loading scenarios adopted in the post-fire repair research are mostly idealized as constant heating rates or standard fire curves, which may have produced unrealistic fire damage patterns and the associated repairing techniques may be not practical. For future studies, the realistic fire impact and the system-level structural damage investigation are necessary.