• Title/Summary/Keyword: school violation

Search Result 131, Processing Time 0.023 seconds

Analysis of periodontal data using mixed effects models

  • Cho, Young Il;Kim, Hae-Young
    • Journal of Periodontal and Implant Science
    • /
    • v.45 no.1
    • /
    • pp.2-7
    • /
    • 2015
  • A fundamental problem in analyzing complex multilevel-structured periodontal data is the violation of independency among the observations, which is an assumption in traditional statistical models (e.g., analysis of variance and ordinary least squares regression). In many cases, aggregation (i.e., mean or sum scores) has been employed to overcome this problem. However, the aggregation approach still exhibits certain limitations, such as a loss of power and detailed information, no cross-level relationship analysis, and the potential for creating an ecological fallacy. In order to handle multilevel-structured data appropriately, mixed effects models have been introduced and employed in dental research using periodontal data. The use of mixed effects models might account for the potential bias due to the violation of the independency assumption as well as provide accurate estimates.

A Study on Patient'S Obligation in Medical Cooperation and Doctor'S Medical Malpractice (환자의 진료협력의무와 의사의 의료과실)

  • Baek, Kyoung-Hee
    • The Korean Society of Law and Medicine
    • /
    • v.13 no.1
    • /
    • pp.91-123
    • /
    • 2012
  • Doctors and patients for the purpose of healing and treatment of disease through the contract will make a relationship. Doctors perform the medical practice for the state and illness of patient. Given that the patient did not cooperate in the doctor's medical practice, it is difficult to achieve the goal of disease healing. If the patient don't cooperate the medical care, and it is linked with a doctor's medical malpractice, patient's violation of obligation in medical cooperation is considered with negligence on the part of patients. However, this negligence should be limited to obvious cases that the patient's behavior is unreasonable although the doctor provides medical information to patients and induced the patient's response. Also, patient's violation of obligation in medical cooperation must result in adjusting the indemnification via a setoff of fault except the cases having causal relationship between doctor's fault and malpractice.

  • PDF

A Study on Copyright Violation and Forensic Technique applying Method for Smart Phone (저작권 위반과 포렌식 기법의 Smart Phone 적용 방법 연구)

  • Park, Dea-Woo;Yi, Jeong-Hoon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.06a
    • /
    • pp.149-153
    • /
    • 2011
  • 2010년에는 국내에 Smart Phone이 확산되면서, Smart Phone은 단순한 음성통신정보 전달 이외에 기존의 인터넷 PC가 정보를 전달 할 수 있는 전자책, 영화, 음악, 콘텐츠 영역으로 확장되고 있다. 하지만 Smart Phone 사용자들은 멀티미디어 저작권 콘텐츠를 불법으로 이용하고 있다. 또한 이동통신 단말로서 Smart Phone관련 범죄 증거의 생성, 저장된 디지털 증거는 증거의 활용도가 높아 모바일 포렌식 연구가 필요하다. 본 논문에서 Smart Phone에서 저작권 위반 내용들을 전자책, 영화, 음악, 콘텐츠 영역으로 조사한다. 저작권 위반 Smart Phone 증거자료를 추출하고 분석하기 위한 SYN 방식과 JTAG 방식을 연구한다. Smart Phone SYN 방식과 JTAG 방식으로 Smart Phone의 저작권 위반 자료를 추출하여 복원하고, 자료를 분석하였다. 본 연구 결과는 저작권위반 단속 기술 향상과 포렌식 수사 기술 발전에 기여 할 수 있을 것이다.

  • PDF

Fundamental Aspects of the Unbalance Condition for the Forces involved in Rail Gun Recoil

  • Banerjee, Arindam;Radcliffe, P.J.
    • Journal of international Conference on Electrical Machines and Systems
    • /
    • v.3 no.3
    • /
    • pp.317-324
    • /
    • 2014
  • The forces involved in the firing of the electromagnetic rail gun may be analyzed from Amperian, Maxwellian and Einsteinian approaches. This paper discusses these different paradigms with regard to rail gun performance modeling relating to the generation and balance of the forces caused by the currents and their induced magnetic fields. Recent experimental work on model rail guns, where the armature is held static, shows very little recoil upon the rails, thereby indicating a possible violation of Newton's Third Law of Motion. Dynamic testing to show this violation, as suggested by the authors in an earlier paper, has inherent technical difficulties. A purpose-built finite element C/C++ simulator that models that suspended rail gun firing action shows a net force acting upon the entire rail gun system. A new effect in physics, universal in scope, is thus indicated: a current circulating in an asymmetric and rigid circuit causes a net force to act upon the circuit for the duration of the current. This conclusion following from computer simulation based upon Maxwellian electrodynamics as opposed to the more modern relativistic quantum electrodynamics needs to be supported by unambiguous experimental validation.

Development of Control Algorithm for Intersection Safety System Using the Fusion of V2X and Environmental Sensors (V2X 및 환경 센서 융합 기반 교차로 안전 시스템 알고리즘 개발)

  • Park, Manbok;Lee, Sanghyun;Jun, Sibum;Kee, Seokcheol;Kim, Jungbeom;Kee, Changdon;Kim, Kyuwon;Yi, Kyongsu
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.22 no.5
    • /
    • pp.126-135
    • /
    • 2014
  • This paper describes the development and verification of control algorithms for V2X and environmental sensor integrated intersection support and safety systems. The objective of the research is to develop core technologies for effective fusion of V2X and environmental sensors and to develop new safety function for intersection safety. One of core technologies is to achieve the improvement of GPS accuracy, and the other is to develop the algorithm of a vehicle identification which matches all data from V2X, vehicle sensors and environmental sensors to specific vehicles. A intersection optimal pass (IOP) algorithm is designed based on these core technologies. IOP recommends appropriate speed to pass the intersection in the consideration of traffic light signal and preceeding vehicle existence. Another function is developed to prevent a collision avoidance when car crash caused by traffic violation of surrounding vehicles is expected. Finally all functions are implemented and tested in three test vehicles. It is shown that IOP can support convenient and comfortable driving with recommending optimal pass speed and collision avoidance algorithm can effectively prevent collision caused by traffic sign violation of surrounding vehicles.

A Study on Data Security Control Model of the Test System in Financial Institutions (금융기관의 테스트시스템 데이터 보안통제 모델 연구)

  • Choi, Yeong-Jin;Kim, Jeong-Hwan;Lee, Kyeong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1293-1308
    • /
    • 2014
  • The cause of privacy extrusion in credit card company at 2014 is usage of the original data in test system. By Electronic banking supervision regulations of the Financial Supervisory Service and Information Security business best practices of Finance information technology (IT) sector, the data to identify the customer in the test system should be used to convert. Following this guidelines, Financial firms use converted customer identificaion data by loading in test system. However, there is some risks that may be introduced unintentionally by user mistake or lack of administrative or technical security in the process of testing. also control and risk management processes for those risks did not studied. These situations are conducive to increasing the compliance violation possibility of supervisory institution. So in this paper, we present and prove the process to eliminate the compliance violation possibility of supervisory institution by controlling and managing the unidentified conversion customer identification data and check the effectiveness of the process.

Regulatory Disclosure of Large Business Groups in Korea

  • GWON, Jae-Hyun
    • Asian Journal of Business Environment
    • /
    • v.10 no.1
    • /
    • pp.45-50
    • /
    • 2020
  • Purpose: This paper examines the theoretical grounds for the disclosure of the Korea Fair Trade Commission. Three central measures of the disclosure are scrutinized: The interconnected status of affiliate companies, the important matters of private affiliates, and the large internal transactions. Contemplating on three measures, respectively, we review the rationale and derive policy implications. Research design, data, and methodology: Collecting the data of violation rates and remedial measures, we analyze the intensity of the disclosure enforcement. These statistics are critically reviewed by the economic literature of mandatory disclosure. Results: Statistics evince that the Korea Fair Trade Commission has enforced the regulatory disclosure quite successfully. Violation rates of the disclosure has declined from the outset. It demonstrates that the Korea Fair Trade Commission has enforced those measures satisfactorily for about a decade. But we cannot ascertain empirically whether the regulatory disclosures are socially and economically beneficial. To evaluate the effect of the regulatory disclosures precisely, we need a further empirical investigation. Conclusions: Despite the lack of policy evaluation, this study suggests complementary measures for current disclosures. First, disclosure of executive compensation in privately held subsidiaries must be introduced. Second, the controlling shareholder/manager should be responsible for information disclosure on foreign subsidiaries.

Countermeasure against MITM attack Integrity Violation in a BLE Network (BLE 네트워크에서 무결성 침해 중간자 공격에 대한 대응기법)

  • Han, Hyegyeon;Lee, Byung Mun
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.2
    • /
    • pp.221-236
    • /
    • 2022
  • BLE protocol prevents MITM attacks with user interaction through some input/output devices such as keyboard or display. Therefore, If it use a device which has no input/output facility, it can be vulnerable to MITM attack. If messages to be sent to a control device is forged by MITM attack, the device can be abnormally operated by malicious attack from attacker. Therefore, we describes a scenario which has the vulnerabilities of the BLE network in this paper and propose countermeasure method against MITM attacks integrity violations. Its mechanism provides data confidentiality and integrity with MD5 and security key distribution of Diffie Helman's method. In order to verify the effectiveness of the countermeasure method proposed in this paper, we have conducted the experiments. ​As experiments, the message was sent 200 times and all of them successfully detected whether there was MITM attack or not. In addition, it took at most about 4.2ms delay time with proposed countermeasure method between devices even attacking was going on. It is expected that more secure data transmission can be achieved between IoT devices on a BLE network through the method proposed.

Using play-back image sequence to detect a vehicle cutting in a line automatically (역방향 영상재생을 이용한 끼어들기 차량 자동추적)

  • Rheu, Jee-Hyung;Kim, Young-Mo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.2
    • /
    • pp.95-101
    • /
    • 2014
  • This paper explains effective tracking method for a vehicle cutting in a line on the road automatically. The method employs KLT based on optical flow using play-back image sequence. Main contribution of this paper is play-back image sequence that is in order image frames for rewind direction from a reference point in time. The moment when recognizing camera can read a license plate very well can usually be the reference point in time. The biggest images of object traced can usually be obtained at this moment also. When optic flow is applied, the bigger image of the object traced can be obtained, the more feature points can be obtained. More many feature points bring good result of tracking object. After the recognizing cameras read a license plate on the vehicle suspected of cut-in-line violation, and then the system extracts the play-back image sequence from the tracking cameras for watching wide range. This paper compares using play-back image sequence as normal method for tracking to using play-forward image sequence as suggested method on the results of the experiment and also shows the suggested algorithm has a good performance that can be applied to the unmanned system for watching cut-in-line violation.

Clinical and Neuropsychological Characteristics of Adult Alcohol Use Disorder Patients with or without Attention-Deficit Hyperactivity Symptom (성인 알코올사용장애 환자에서 주의력결핍 과잉행동 증상 유무에 따른 임상적 및 신경심리학적 특성)

  • Jo, Jung Min;Lee, Dong Jun;Jung, Kyung Hi;Oh, Song In;Ahn, Dong Hyun
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.25 no.4
    • /
    • pp.209-216
    • /
    • 2014
  • Objectives : Alcohol use disorder (AUD) is often comorbid with adult attention-deficit hyperactivity disorder (ADHD) and other psychiatric illnesses. When associated with other mental problems, the prognosis of the AUD can be more serious. This study shows research on the clinical and neuropsychological characteristics according to whether or not ADHD symptoms and AUD were comorbid. Methods : A total of 64 adult inpatients who completed AUD scales about adult ADHD, alcohol dependence, depression, anxiety, and impulsiveness. They also completed neuropsychological tests about attention and executive function. According to the Adult ADHD Self-Report Scale score, patients were categorized into two groups (ADHD symptom positive/negative group). Results : Fourteen among the 64 subjects were part of the ADHD symptom positive group (21.9%). They had statistically significant shorter abstinence periods and a higher rate of history of 'rule violation during school' and 'physical damage in childhood' compared to the ADHD symptom negative group. Conclusion : The comorbidity rate with ADHD symptom in adult AUD is higher than the general population. The ADHD symptom positive group suffered from more severe and refractory AUD. Considering the more frequent history of rule violation during school in the ADHD symptom positive group, the association between ADHD and AUD may be mediated by conduct disorder. Therefore we suggest the necessity of careful evaluation and intervention in children and adolescents with ADHD and conduct disorder.