• Title/Summary/Keyword: technical code

Search Result 427, Processing Time 0.025 seconds

Liberalization of Telemedicine in Germany (독일 원격의료 합법화와 법개정 논의)

  • Kim, SooJeong
    • The Korean Society of Law and Medicine
    • /
    • v.21 no.2
    • /
    • pp.3-33
    • /
    • 2020
  • Until recently the German and the South Korean medical associations reacted cautiously to the introduction of telemedicine between doctor and patient which is exclusively on the platform conducted. But the General Assembly of German Physicians voted to lift the ban on remote treatment with the amendment to Section 7 (4) MBO-Ä(Medical Association's Professional Code of Conduct) in 2018 and the situation has been fundamentally changed in Germany. From then until now 16 of 17 rural medical associations have changed their professional code to allow telemedicine. In addition the legislature started to prepare the basis for the introduction of the electronic health card (eGK) and the telematics infrastructure. So far, various laws such as Medicinal Products Act, Drug Advertisement Act and Social Code have been changed to support legalization of telemedicine and digitalization of health care. Unlike in Germany, the social circumstances such as excessive centralization of the big hospitals in Seoul and the resulting concern of small medical practices for profitability are the main obstacles to the introduction of telemedicine. However the German approach how to legalise the telemedicine and to prepare for legal and technical infrastructure is also interesting in South Korea. The discussions for and against the changes in the law and the telematics infrastructure attempted by the German government for several years indicate that not only lifting the ban on remote treatment, but also harmonization of all the related legal system could guarantee successful implementation of telemedicine.

Changes in the Adjunct professor system of medical offices in the Joseon Dynasty (조선시대 의료관청의 겸교수 제도의 변화)

  • PARK Hun-pyeong
    • The Journal of Korean Medical History
    • /
    • v.36 no.1
    • /
    • pp.1-9
    • /
    • 2023
  • To be an adjunct professor(gyeomgyosu) literally means to act as an instructor while also holding a different position. Adjunct professors were initially introduced under Confucianism. Gradually, technical offices also appointed adjunct professors using Confucian-educated bureaucrats for the purpose of educating lower-level technical officials and cadets. This paper examines the history of the civil service system related to adjunct professors through the Code of Laws, and examines those who have been appointed to the public office described in various documents. This paper argues that changes in the medical office's adjunct professor system reflect changes in the national medical talent training policy. The main basis of specific recognizing medical personnel is to decouple the appointment of Confucian scholars from that of full-time doctors. The replacement of the role of medical educators from Confucian scholars to full-time doctors was largely accomplished during the reign of King Jungjong(中宗) and was completed during the period of King Injo(仁祖). The time when Euiyakdongcham was created and the Office of Euiyakdongcham was established coincided with the period when the adjunct professor was disrupted in the medical office. However, this change in the adjunct professor system of medical authorities is in contrast to interpretation, which is a representative technical field. In the case of interpretation, Moonshin's sayeogwon position as adjunct professor was maintained even in the late Joseon Dynasty, and apart from this, there was a hanhagmunsin in Seungmunwon. Interpreter families had institutional arrangements that prevented them from making interpretation their own monopoly. Therefore, families of medical bureaucrats had more room for institutional growth than those of bureaucratic interpreters. Of course, these institutional devices did not prevent the growth of interpreting bureaucratic families in the late Joseon Dynasty. However, the situation in which medicine was accepted only as a kind of knowledge, not as an object of full-time work for sadaebue, would have been an opportunity to rise for those in technical jobs who were full-time medicine. As medicine became more differentiated and developed in the late Joseon Dynasty, medical knowledge and the knowledge about the medical profession became more important. The politicians could not avoid the use of a philosophically oriented system in which a confucian-educated bureaucrat equipped with only Confucian knowledge might replace a full-time doctor. Thus, the contradiction between the reality and the ideal of ignoring or denying reality was reproduced like other Confucian-centered societies. These contradictions have implications for us living in the modern age. Establishing the relationship between philosophy (or belief) and technology should not end with the superiority of one side or the other.

A Novel Methodology for Extracting Core Technology and Patents by IP Mining (핵심 기술 및 특허 추출을 위한 IP 마이닝에 관한 연구)

  • Kim, Hyun Woo;Kim, Jongchan;Lee, Joonhyuck;Park, Sangsung;Jang, Dongsik
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.25 no.4
    • /
    • pp.392-397
    • /
    • 2015
  • Society has been developed through analogue, digital, and smart era. Every technology is going through consistent changes and rapid developments. In this competitive society, R&D strategy establishment is significantly useful and helpful for improving technology competitiveness. A patent document includes technical and legal rights information such as title, abstract, description, claim, and patent classification code. From the patent document, a lot of people can understand and collect legal and technical information. This unique feature of patent can be quantitatively applied for technology analysis. This research paper proposes a methodology for extracting core technology and patents based on quantitative methods. Statistical analysis and social network analysis are applied to IPC codes in order to extract core technologies with active R&D and high centralities. Then, core patents are also extracted by analyzing citation and family information.

A study on the event processing methods for ubiquitous sensor network (유비쿼터스 센서 네트워크를 위한 이벤트 처리 기법에 관한 연구)

  • Cho, Yang-Hyun;Park, Yong-Min;Kim, Hyeon-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.1
    • /
    • pp.137-147
    • /
    • 2013
  • The RFID(Radio Frequency Identification) and the WSN(Wireless Sensor Network) have technical similarities and mutual effects, they have been recognized to be studied separately, and sufficient studies have not been conducted on the technical integration of the RFID and the WSN. Therefore, EPC global which realized the issue proposed the EPC(Electronic Produce Code) Sensor Network to efficiently integrate and interoperate the RFID and WSN technologies based on the international standard EPC global network. The proposed EPC Sensor Network technology uses the Complex Event Processing method in the middleware to integrate data occurring through the RFID and the WSN in a single environment and to interoperate the events based on the EPC global network. However, as the EPC Sensor Network technology continuously performs its operation even in the case that the minimum conditions are not to be met to find complex events in the middleware, its operation cost rises. Therefore, to address the problems of the existing system, we defined the minimum conditions of the complex events to detect unnecessary complex events in the middleware, and proposed an algorithm that can extract complex events only when the minimum conditions are to be met. To examine the minimum conditions, a index and a query index are used to extract complex events. To evaluate the performance of the proposed methods, In the case of the method of extracting complex events based on a bitmap index, we used the existing extraction method and NS2 simulation to evaluate its performance and thus to show its good performance in terms of the number of operation and the processing time for the complex events.

Study on the On-Board Test of After-Treatment Systems to Reduce PM-NOx in Low-Speed Marine Diesel Engine (선박용 저속디젤엔진 적용을 위한 PM-NOx 동시저감 배출저감설비 해상실증 연구)

  • Dong-Kyun Ko;Suk-Young Jeong;In-Seob Kim;Gye-Won An;Youn-Woo Nam
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.5
    • /
    • pp.497-504
    • /
    • 2023
  • In this study, Selective catalytic reduction (SCR) + Diesel particulate filter (DPF) system was installed on a ship with a low-speed engine to conduct the on-board test. The target ship (2,881 gross tons, rated power 1,470 kW@240 rpm ×1) is a general cargo ship sailing in the coastal area. Drawing development, approvals and temporary survey of the ship were performed for the installation of the after-treatment system. For performance evaluation, the gaseous emission analyzer was used according to the NOx technical code and ISO-8178 method of measurement. The particulate matter analyzer used a smoke meter to measure black carbon, as discussed by the International Maritime Organization (IMO). Tests were conducted using MGO (0.043%) and LSFO (0.42%) fuels according to the sulfur content. The test conditions were selected by considering the engine rpm (130, 160 and 180). Gaseous emission and particulate matter (smoke) were measured according to the test conditions to confirm the reduction efficiency of the after treatment system. The results of NOx emission and particulate matter (smoke) revealed that reduction efficiency was more than 90%. The exhaust pressure met the allowable back pressure (less than 50 mbar). This study confirms the importance of the on-board test and the potential of SCR + DPF systems as a response technology for reducing nitrogen oxides and particulate matter.

Development of Map-Based Engine Control Logic for DME Fuel (MAP 기반 DME용 엔진 제어로직 개발)

  • Park, Young-Kug;Chung, Jae-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.7
    • /
    • pp.3127-3134
    • /
    • 2013
  • This paper presents the verified results from the examination of the control algorithm, logic composition, and vehicle condition of the engine that has been adapted for DME fuel. It introduces the development process of the control structure and the logic control based on control map and auto-code generation, and finally verifies the reliability and performance of the overall control. The control structure largely consists of the injection control part that implements driver demand into an engine net torque and the air control system part that satisfies characteristics of exhaust gas and power performance. The control logic is designed with feedforward and feedback control for each of its control functions for an enhanced response. Moreover, the control map of the feedforward controller is created by the use of an engine model created by test data of mass product diesel engine, and it was subsequently calibrated in the test process of the engine and vehicle state. A test mode was completed by attaching the developed controller to the vehicle, and a reduction in gas emission is confirmed by the calibration of EGR, VGT, and injection times.

The effect of crack length on SIF and elastic COD for elbow with circumferential through wall crack

  • Kim, Min Kyu;Jeon, Jun Hyeok;Choi, Jae Boong;Kim, Moon Ki
    • Nuclear Engineering and Technology
    • /
    • v.52 no.9
    • /
    • pp.2092-2099
    • /
    • 2020
  • Many damages due to flow-accelerated corrosion and cracking have been observed during recent in-service inspections of nuclear power plants. To determine the operability or repair for damaged pipes, an integrity evaluation related to the damaged piping system should be performed by using already proven code and standards. One of them, the ASME Code Case is most popularly used to integrity assessment in nuclear power plants. However, the recent version of CC N-513 still recommends the simplified method which means a damaged elbow is assumed as an equivalent straight pipe. In addition, to enhance the accuracy integrity assessment in elbow, several previous studies recommend that the SIF and elastic COD values for an elbow with relatively large crack could be predicted by an interpolation technique. However, those estimates for elbow with relatively large crack might be derived to inaccurate results for crack growth analysis, such as for the allowable crack size and life estimation. Therefore, in this paper, the effect of crack length (0.3≤θ1/π≤0.5) on SIF and elastic COD for elbow is systematically investigated. Then, for large crack in elbow, accurate estimates for SIF and elastic COD, which are widely used to assess the integrity of elbows, are proposed. Those proposed solutions are expected to be the technical basis for revisions of CC N-513-4 through the validation.

Development of u-Pamphlet based on PDA and Two Dimensional Barcode for Festival Marketing (축제 홍보를 위한 PDA와 2차원 바코드 기반의 u-팜플렛 개발)

  • Park, Chan-Jung;Moon, Young-Ho;Lee, Hyun-Soo;Cho, Kyu-Bum;Lee, Hyun-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.7
    • /
    • pp.93-102
    • /
    • 2008
  • With the advance of ubiquitous environment, a lot of changes occur in various kinds of applications. The marketing for festivals is not an exception. Due to the needs for changes in the festival marketing, researches about active marketing suitable for ubiquitous environment are increasing. The purpose of this paper is to develop a u-pamphlet based on PDA and QR code. In this paper, we focus on Jeju Jeongweol Daeboreum Fire Festival, shortly Jeju Fire Festival, as a pamphlet content, which is one of the best domestic festivals. When tourists attend Jeju Fire Festival, the proposed u-pamphlet provides various forms of Jeju Fire Festival information either by accessing digital content stored in PDA directly or by interpreting QR code in the Festival area and connecting remote digital content indirectly. In addition, in order to analyze the necessity, the usefulness, the functionality, and the technical barriers of the u-pamphlet, we make a questionnaire after we exhibit our u-pamphlet.

A Study on Enterprise and Government Information Security Enhancement with Information Security Management System (정보보호관리체계를 통한 기업 및 정부 정보보안 강화 방안에 관한 연구)

  • Park, Chung-Soo;Lee, Dong-Bum;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.6
    • /
    • pp.1220-1227
    • /
    • 2011
  • According to the development of IT technology, life itself is becoming the change to Knowledge-based systems or information-based systems. However, the development of IT technology, the cyber attack techniques are improving. And DDoS a crisis occurs frequently, such as cyber terrorism has become a major data leakage. In addition, the various paths of attack from malicious code entering information in the system to work for your company for loss and damage to information assets is increasing. In this environment, the need to preserve the organization and users of information assets to perform ongoing inspections risk management processes within the organization should be established. Processes and managerial, technical, and physical systems by establishing an information security management system should be based. Also, we should be introduced information security product for protecting internal assets from the threat of malicious code incoming to inside except system and process establishment. Therefore we proposed enterprise and government information security enhancement scheme through the introduction of information security management system and information security product in this paper.

Automatic malware variant generation framework using Disassembly and Code Modification

  • Lee, Jong-Lark;Won, Il-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.131-138
    • /
    • 2020
  • Malware is generally recognized as a computer program that penetrates another computer system and causes malicious behavior intended by the developer. In cyberspace, it is also used as a cyber weapon to attack adversary. The most important factor that a malware must have as a cyber weapon is that it must achieve its intended purpose before being detected by the other's detection system. It requires a lot of time and expertise to create a single malware to avoid the other's detection system. We propose the framework that automatically generates variant malware when a binary code type malware is input using the DCM technique. In this framework, the sample malware was automatically converted into variant malware, and it was confirmed that this variant malware was not detected in the signature-based malware detection system.