• Title/Summary/Keyword: 관리 에이전트

Search Result 699, Processing Time 0.034 seconds

Design and Implementation of IEEE 11073/HL7 Translation Gateway Based on U-Healthcare Application Service for M2M (M2M을 위한 U-헬스케어 응용 서비스 기반 IEEE 11073/HL7 변환 게이트웨이 설계 및 구현)

  • Chun, Seung-Man;Nah, Jae-Wook;Park, Jong-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.3B
    • /
    • pp.275-286
    • /
    • 2011
  • As the 21st century paradigm of healthcare service changes from post-therapeutic treatment to disease prevention and management in advance, the M2M-based u-healthcare application service is increasingly important. M2M-based u-healthcare application service uses mobile handsets equipped with sensors to measure vital information, and the medical staff in remote locations can manage the health of the patient or the public in real time. In this paper, IEEE/HL7 translation gateway, utilizing the gateway based on M2M u-healthcare application service structure, which is based on international standards, has been designed and implemented. Specifically, the gateway between ISO/IEEE 11073 standards and ANSI HL7 has been developed. The former defines the protocol for the exchange of information between the agent device and the manger devices for measuring and handling biological signal, and the latter defines the application layer protocol for the exchange of various healthcare information systems. Finally, in order to demonstrate the functionality of the proposed architecture, the M2M-based U-healthcare application service based on IEEE/HL7 translation gateway, utilizing the gateway, has been developed which can measure, collect and process a variety of vital signs such as ECG or SpO2.

Design and Implementation of Picture Archiving and Communication System Component using the RFID for Mobile Web Environments (모바일 웹 환경을 위한 의료영상저장전송시스템 컴포넌트의 설계 및 구현)

  • Kim Chang-Soo;Yim Jae-Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1124-1131
    • /
    • 2006
  • The recent medical treatment guidelines and the development of information technology make hospitals reduce the expense in surrounding environment and it requires improving the quality of medical treatment of the hospital. Moreover, MIS, PACS(Picture Archiving and Communication System), OCS, EMR are also developing. Medical Information System is evolved toward integration of medical IT and situation is changing with increasing high speed in the ICT convergence. Mobile component refers to construct wireless system of hospital which has constructed in existing environment. Through RFID development in existing system, anyone can log on easily to internet whenever and wherever. It is the core technology to implement automatic medical processing system. This paper provides a basic review of RFID model, PACS application component services. In addition, designed and implemented database server's component program and client program of mobile application that recognized RFID tag and patient data in the ubiquitous environments. This system implemented mobile PACS that performed patient data based db environments, and so reduced delay time of requisition, medical treatment, lab.

Design and Implementation of Mobile Medical Information System Based Radio Frequency IDentification (RFID 기반의 모바일 의료정보시스템의 설계 및 구현)

  • Kim, Chang-Soo;Kim, Hwa-Gon
    • Journal of radiological science and technology
    • /
    • v.28 no.4
    • /
    • pp.317-325
    • /
    • 2005
  • The recent medical treatment guidelines and the development of information technology make hospitals reduce the expense in surrounding environment and it requires improving the quality of medical treatment of the hospital. That is, with the new guidelines and technology, hospital business escapes simple fee calculation and insurance claim center. Moreover, MIS(Medical Information System), PACS(Picture Archiving and Communications System), OCS(Order Communicating System), EMR(Electronic Medical Record), DSS(Decision Support System) are also developing. Medical Information System is evolved toward integration of medical IT and situation si changing with increasing high speed in the ICT convergence. These changes and development of ubiquitous environment require fundamental change of medical information system. Mobile medical information system refers to construct wireless system of hospital which has constructed in existing environment. Through RFID development in existing system, anyone can log on easily to Internet whenever and wherever. RFID is one of the technologies for Automatic Identification and Data Capture(AIDC). It is the core technology to implement Automatic processing system. This paper provides a comprehensive basic review of RFID model in Korea and suggests the evolution direction for further advanced RFID application services. In addition, designed and implemented DB server's agent program and Client program of Mobile application that recognized RFID tag and patient data in the ubiquitous environments. This system implemented medical information system that performed patient data based EMR, HIS, PACS DB environments, and so reduced delay time of requisition, medical treatment, lab.

  • PDF

eXtensible Rule Markup Language (XRML): Design Principles and Application (확장형 규칙 표식 언어(eXtensible Rule Markup Language) : 설계 원리 및 응용)

  • 이재규;손미애;강주영
    • Journal of Intelligence and Information Systems
    • /
    • v.8 no.1
    • /
    • pp.141-157
    • /
    • 2002
  • extensible Markup Language (XML) is a new markup language for data exchange on the Internet. In this paper, we propose a language extensible Rule Markup Language (XRML) which is an extension of XML. The implicit rules embedded in the Web pages should be identifiable, interchangeable with structured rule format, and finally accessible by various applications. It is possible to realize by using XRML. In this light, Web based Knowledge Management Systems (KMS) can be integrated with rule-based expert systems. To meet this end, we propose the six design criteria: Expressional Completeness, Relevance Linkability, Polymorphous Consistency, Applicative Universality, Knowledge Integrability and Interoperability. Furthermore, we propose three components such as RIML (Rule Identification Markup Language), RSML (Rule Structure Markup Language) and RTML (Rule Triggering Markup Language), and the Document Type Definition DTD). We have designed the XRML version 0.5 as illustrated above, and developed its prototype named Form/XRML which is an automated form processing for disbursement of the research fund in the Korea Advanced Institute of Science and Technology (KAISI). Since XRML allows both human and software agent to use the rules, there is huge application potential. We expect that XRML can contribute to the progress of Semantic Web platforms making knowledge management and e-commerce more intelligent. Since there are many emerging research groups and vendors who investigate this issue, it will not take long to see XRML commercial products. Matured XRML applications may change the way of designing information and knowledge systems in the near future.

  • PDF

A Methodology of Decision Making Condition-based Data Modeling for Constructing AI Staff (AI 참모 구축을 위한 의사결심조건의 데이터 모델링 방안)

  • Han, Changhee;Shin, Kyuyong;Choi, Sunghun;Moon, Sangwoo;Lee, Chihoon;Lee, Jong-kwan
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.237-246
    • /
    • 2020
  • this paper, a data modeling method based on decision-making conditions is proposed for making combat and battlefield management systems to be intelligent, which are also a decision-making support system. A picture of a robot seeing and perceiving like humans and arriving a point it wanted can be understood and be felt in body. However, we can't find an example of implementing a decision-making which is the most important element in human cognitive action. Although the agent arrives at a designated office instead of human, it doesn't support a decision of whether raising the market price is appropriate or doing a counter-attack is smart. After we reviewed a current situation and problem in control & command of military, in order to collect a big data for making a machine staff's advice to be possible, we propose a data modeling prototype based on decision-making conditions as a method to change a current control & command system. In addition, a decision-making tree method is applied as an example of the decision making that the reformed control & command system equipped with the proposed data modeling will do. This paper can contribute in giving us an insight of how a future AI decision-making staff approaches to us.

Cost Reduction of Location Registration Using the LiEy UBdate Strategy in Hierarchical Mobile IPv6 (계층적 이동 Ipv6환경에서 지연갱신전략을 이용한 위치등록 비용 감소)

  • Yi Myung-Kyu;Hwang Chong-Sun
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.370-381
    • /
    • 2005
  • Mobile IP provides an efficient and scalable mechanism for host mobility within the Internet. Using Mobile If, mobile nodes may change their point of attachment to the Internet without changing their If address. However, it would result in a high signaling cost. To reduce the signaling cost, we factor in the fact that mobile users will not be actively communicating much of the time. In fact, there Is no necessity to send a binding update message to the home agent when an mobile node does not communicates with others while moving. From this point of view, we propose a lazy update strategy for minimizing signaling cost using the forwarding pointer in hierarchical Mobile IPv6. In our proposal, binding updates are sent only when a mobile node is in a busy mode. If an mobile node is in a dormant mode, binding update messages are delayed until busy mode using the forwarding pointer. As a result, our proposal can reduce the total signaling cost by eliminating unnecessary binding update messages when a mobile node Is in a dormant mode. In addition to, our proposal reduces unnecessary location update cost resulting from ping-pong effect under mobile node's dormant mode. Analysis results using the discrete analytic model presented in this paper shows that our proposal can has superior performance than hierarchical Mobile nv6 when the call-to-mobility ratio is low and the length of the forwarding pointer chain K is low.

Reinforcement Mining Method for Anomaly Detection and Misuse Detection using Post-processing and Training Method (이상탐지(Anomaly Detection) 및 오용탐지(Misuse Detection) 분석의 정확도 향상을 위한 개선된 데이터마이닝 방법 연구)

  • Choi Yun-Jeong;Park Seung-Soo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06b
    • /
    • pp.238-240
    • /
    • 2006
  • 네트워크상에서 발생하는 다양한 형태의 대량의 데이터를 정확하고 효율적으로 분석하기 위해 설계되고 있는 마이닝 시스템들은 목표지향적으로 훈련데이터들을 어떻게 구축하여 다룰 것인지에 대한 문제보다는 대부분 얼마나 많은 데이터 마이닝 기법을 지원하고 이를 적용할 수 있는지 등의 기법에 초점을 두고 있다. 따라서, 점점 더 에이전트화, 분산화, 자동화 및 은닉화 되는 최근의 보안공격기법을 정확하게 탐지하기 위한 방법은 미흡한 실정이다. 본 연구에서는 유비쿼터스 환경 내에서 발생 가능한 문제 중 복잡하고 지능화된 침입패턴의 탐지를 위해 데이터 마이닝 기법과 결함허용방법을 이용하는 개선된 학습알고리즘과 후처리 방법에 의한 RTPID(Refinement Training and Post-processing for Intrusion Detection)시스템을 제안한다. 본 논문에서의 RTPID 시스템은 active learning과 post-processing을 이용하여, 네트워크 내에서 발생 가능한 침입형태들을 정확하고 효율적으로 다루어 분석하고 있다. 이는 기법에만 초점을 맞춘 기존의 데이터마이닝 분석을 개선하고 있으며, 특히 제안된 분석 프로세스를 진행하는 동안 능동학습방법의 장점을 수용하여 학습효과는 높이며 비용을 감소시킬 수 있는 자가학습방법(self learning)방법의 효과를 기대할 수 있다. 이는 관리자의 개입을 최소화하는 학습방법이면서 동시에 False Positive와 False Negative 의 오류를 매우 효율적으로 개선하는 방법으로 기대된다. 본 논문의 제안방법은 분석도구나 시스템에 의존하지 않기 때문에, 유사한 문제를 안고 있는 여러 분야의 네트웍 환경에 적용될 수 있다.더욱 높은성능을 가짐을 알 수 있다.의 각 노드의 전력이 위험할 때 에러 패킷을 발생하는 기법을 추가하였다. NS-2 시뮬레이터를 이용하여 실험을 한 결과, 제안한 기법이 AOMDV에 비해 경로 탐색 횟수가 최대 36.57% 까지 감소되었음을 알 수 있었다.의 작용보다 더 강력함을 시사하고 있다.TEX>로 최고값을 나타내었으며 그 후 감소하여 담금 10일에는 $1.61{\sim}2.34%$였다. 시험구간에는 KKR, SKR이 비교적 높은 값을 나타내었다. 무기질 함량은 발효기간이 경과할수록 증하였고 Ca는 $2.95{\sim}36.76$, Cu는 $0.01{\sim}0.14$, Fe는 $0.71{\sim}3.23$, K는 $110.89{\sim}517.33$, Mg는 $34.78{\sim}122.40$, Mn은 $0.56{\sim}5.98$, Na는 $0.19{\sim}14.36$, Zn은 $0.90{\sim}5.71ppm$을 나타내었으며, 시험구별로 보면 WNR, BNR구가 Na만 제외한 다른 무기성분 함량이 가장 높았다.O to reduce I/O cost by reusing data already present in the memory of other nodes. Finally, chunking and on-line compression mechanisms are included in both models. We demonstrate that we can obtain significantly high-performanc

  • PDF

Energy Efficient Distributed Intrusion Detection Architecture using mHEED on Sensor Networks (센서 네트워크에서 mHEED를 이용한 에너지 효율적인 분산 침입탐지 구조)

  • Kim, Mi-Hui;Kim, Ji-Sun;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.151-164
    • /
    • 2009
  • The importance of sensor networks as a base of ubiquitous computing realization is being highlighted, and espicially the security is recognized as an important research isuue, because of their characteristics.Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop security Intrusion Detection System (IDS) that can survive malicious attacks from "insiders" who have access to keying materials or the full control of some nodes, taking their charateristics into consideration. In this perper, we design a distributed and adaptive IDS architecture on sensor networks, respecting both of energy efficiency and IDS efficiency. Utilizing a modified HEED algorithm, a clustering algorithm, distributed IDS nodes (dIDS) are selected according to node's residual energy and degree. Then the monitoring results of dIDSswith detection codes are transferred to dIDSs in next round, in order to perform consecutive and integrated IDS process and urgent report are sent through high priority messages. With the simulation we show that the superiorities of our architecture in the the efficiency, overhead, and detection capability view, in comparison with a recent existent research, adaptive IDS.

A Study on the Activation Plan for Professional Sport League through Exploration of Inducing Factors of Match Fixing (승부조작 유발요인 탐색을 통한 프로스포츠 활성화 방안)

  • Bang, Shin-Woong;Park, In-Sil;Kim, Wook-Ki
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.3
    • /
    • pp.153-170
    • /
    • 2021
  • This study was attempted to derive strategic implications for activating professional sports by conducting in-depth interviews with professional sports officials such as players, teams, federations, agencies, etc., by searching for factors that cause match fixing and deriving preventive strategies based on them. Eight people with more than 3 years of experience working in professional sports were selected using the snowball sampling technique. Data were collected and analyzed by applying a semi-structured in-depth interview method for them. As a result of the analysis, five core categories (the learning effect from the cartel for entering university, the culture learned in a camp training, the manifestation of the latent learning effect, the negative effect of the human network, the personal disposition) were derived as factors causing match-fixing. As for the strategy to prevent match fixing, first, improving the college entrance examination system oriented on individual capability, second, improving the education system for student athlete, third, establishing a prevention system, fourth, continuing education, fifth, and activating the agent system as the core categories. Implications for the derived research results and future research directions were discussed.