• Title/Summary/Keyword: 사용자 보호

Search Result 2,737, Processing Time 0.035 seconds

Extraction of Blood Velocity Using FCM and Fuzzy Decision Trees in Doppler Ultrasound Images of Brachial Artery (상완동맥 색조 도플러 초음파 영상에서 FCM과 퍼지 의사 결정 트리를 이용한 혈류 속도 추출)

  • Kim, Kwang Baek;Jung, Young Jin;Nam, Youn Man;Lee, Jae Yeol
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.07a
    • /
    • pp.19-22
    • /
    • 2019
  • 상완동맥은 어깨에서부터 팔꿈치까지 내려오는 상완골의 내측부에 존재하며 혈압을 측정할 때 사용되는 혈관이다. 이 혈관은 골절로 인해 찢어지거나, 또는 혈액순환에 문제가 생겨 혈관이 막히는 경우가 발생한다. 이러한 경우 혈관의 상태를 확인하기 위하여 색조 도플러 초음파 검사를 사용하지만, 사용자에 따라 영상을 통한 판단 기준이 다르다는 문제점이 발생한다. 따라서 본 논문에서는 FCM과 Fuzzy Decision Tree를 이용한 영상 처리를 통해 일관성 있는 판단기준을 세우기 위한 혈류의 속도를 제안한다. 색조 도플러 초음파 영상에서의 상완 동맥을 추출하여 기울기를 이용한 FCM 알고리즘을 통해 소속도를 추출한 뒤 퍼지 룰에 적용하여 의사 결정 트리로 등급을 분류하고 결과적으로 혈류 속도를 추출한다. 색조 도플러 초음파 영상에서 환자의 개인 정보를 보호하기 위해 개인 정보 영역을 제거하여 ROI 영역을 추출하고 ROI 영역을 이진화를 통하여 상완동맥이 있는 영역을 추출한다. 이진화 된 ROI 영역에서 혈관 영상의 혈류 방향으로의 무게중심을 설정하고 각각의 픽셀과 무게중심 선과의 거리를 이용하여 소속도를 추출한 후 FCM을 사용하여 최적의 기울기를 선정한다. FCM을 통해 추출한 최종 소속도를 이용하여 퍼지 룰에 적용한 뒤 계산된 T-norm과 소속도의 분산을 이용하여 의사 결정 트리를 형성 트리의 단말 노드들은 각 픽셀을 분류한다. 분류되어진 데이터들의 노드별 소속도 평균을 구한 뒤 디퍼지화를 통해 COG(Center of Gravity)를 계산한다. 마지막으로 그 값을 이용하여 혈류 속도에 영향을 미치는 정도를 계산한 뒤 최종 혈류의 속도를 제안한다.

  • PDF

A Study on Mid to Long-term Development Strategy of National Research Network (국가 연구망 중장기 발전전략에 관한 연구)

  • Lee, Myung Sun;Cho, Bu seung;Kwon, Woo Chang
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.57-61
    • /
    • 2017
  • The National research networks exist to support advanced science and technology in each country. The national research network must meet the requirements of science and technology in each field and continuously develop around the continuously changing environment. In recent years, demand for data - oriented science and technology research forms has been increasing. To cope with this demand, advanced national research networks are establishing mid - to long - term strategies. In this paper, the status of the advanced research network and trends and requirements of the national research network are analyzed from the viewpoint of the change of the research network environment, the change of science / technology, and the change of industry and life. In order to respond to the analyzed requirements, we propose mid - to long - term development directions and plans for establishing future network backbone, providing user - centered collaborative research environment, providing global collaborative network service, and providing high - tech science and technology research data information protection service.

Improvement of Satellite Ocean Information Service for Offshore Marine Industry (연근해 해양산업을 위한 위성해양 정보 서비스 개선방안)

  • Cho, Bo-Hyun;Lee, Gun-Wook;Kim, Dong-Chun;Yang, Keum-Cheol;Kim, SG;Yo, Seung-jae
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.85-91
    • /
    • 2018
  • In this study, we design a marine environmental information service system with satellite images based on satellite images to reduce the damage caused by changes in the marine environment. The system provides satellite oceanographic information such as water temperature, chlorophyll, float, etc. as hierarchical texts, which is implemented as a unit module Web service so that it can be expanded in OpenAPI environment. And stability of system plug-in portability, service hours, data extraction precision and speed are used as a basis for diagnosing service stability. By securing the function and performance of the service system implemented in this study, it can be expanded to a complex technology that can customize the users by group by adding not only general services of existing systems operated by location but also information about a specific interested areas. Especially, various other items of interest including marine environment information are developed in modules, so we expect to be able to expand and service the system by plugging into the system and to spread it in technical linkage with the related institution information system.

  • PDF

A Study on the Security Enhancement for Personal Healthcare Information of CloudHIS (CloudHIS의 개인 의료정보를 위한 보안강화에 관한 연구)

  • Cho, Young-Sung;Chung, Ji-Moon;Na, Won-Shik
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.27-32
    • /
    • 2019
  • Along with the growth of u-Healthcare, we propose a security enhancement based on network separation for CloudHIS with for handling healthcare information to cope with cyber attack. To protect against all security threats and to establish clear data security policies, we apply desktop computing servers to cloud computing services for CloudHIS. Use two PCs with a hypervisor architecture to apply physical network isolation and select the network using KVM switched controller. The other is a logical network separation using one PC with two OSs, but the network is divided through virtualization. Physical network separation is the physical connection of a PC to each network to block the access path from both the Internet and the business network. The proposed system is an independent desktop used to access an intranet or the Internet through server virtualization technology on a user's physical desktop computer. We can implement an adaptive solution to prevent hacking by configuring the CloudHIS, a cloud system that handles medical hospital information, through network separation for handling security enhancement.

A Study on Security Requirments Analysis through Security Threat Modeling of Home IoT Appliance (Home IoT 가전의 보안위협모델링을 통한 보안요구사항 분석에 관한 연구)

  • Yun, Suk-Jin;Kim, Jungduk
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.2
    • /
    • pp.113-124
    • /
    • 2019
  • Today many companies are offering IoT-enabled products and place emphasis on security from the planning stage to protect their products and user information from external threats. The present security levels, however, remain low because the time and resources invested in developing security requirements for each device are far from enough to meet the needs of a wide range of IoT products. Nevertheless, vulnerabilities of IoT devices have been reported continuously, which calls for more detailed security requirements for home IoT devices. In this context, this research identified threats of home IoT systems by using Microsoft Threat Modeling Tool. It then suggested measures to enhance the security of home IoT devices by developing security assessment items through comparative analysis of the identified threats, domestic and global vulnerability assessment standards and related research. It also verified the effectiveness of the developed security requirements by testing them against the existing ones, and the results revealed the security requirements developed in this research proved to be more effective in identifying vulnerabilities.

Consortium Blockchain based Forgery Android APK Discrimination DApp using Hyperledger Composer (Hyperledger Composer 기반 컨소시움 블록체인을 이용한 위조 모바일 APK 검출 DApp)

  • Lee, Hyung-Woo;Lee, Hanseong
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.9-18
    • /
    • 2019
  • Android Application Package (APK) is vulnerable to repackaging attacks. Therefore, obfuscation technology was applied inside the Android APK file to cope with repackaging attack. However, as more advanced reverse engineering techniques continue to be developed, fake Android APK files to be released. A new approach is needed to solve this problem. A blockchain is a continuously growing list of records, called blocks, which are linked and secured using cryptography. Each block typically contains a cryptographic hash of theprevious block, a timestamp and transaction data. Once recorded, the data inany given block cannot be altered retroactively without the alteration of all subsequent blocks. Therefore, it is possible to check whether or not theAndroid Mobile APK is forged by applying the blockchain technology. In this paper, we construct a discrimination DApp (Decentralized Application) against forgery Android Mobile APK by recording and maintaining the legitimate APK in the consortium blockchain framework like Hyperledger Fabric by Composer. With proposed DApp, we can prevent the forgery and modification of the appfrom being installed on the user's Smartphone, and normal and legitimate apps will be widely used.

Design and Implementation of Side-Type Finger Vein Recognizer (측면형 지정맥 인식기 설계 및 구현)

  • Kim, Kyeong-Rae;Choi, Hong-Rak;Kim, Kyung-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.3
    • /
    • pp.159-168
    • /
    • 2021
  • As the information age enters, the use of biometrics using the body is gradually increasing because it is very important to accurately recognize and authenticate each individual's identity for information protection. Among them, finger vein authentication technology is receiving a lot of attention because it is difficult to forge and demodulate, so it has high security, high precision, and easy user acceptance. However, the accuracy may be degraded depending on the algorithm for identification or the surrounding light environment. In this paper, we designed and manufactured a side-type finger vein recognizer that is highly versatile among finger vein measuring devices, and authenticated using the deep learning model of DenseNet-201 for high accuracy and recognition rate. The performance of finger vein authentication technology according to the influence of the infrared light source used and the surrounding visible light was analyzed through simulation. The simulations used data from MMCBNU_6000 of Jeonbuk National University and finger vein images taken directly were used, and the performance were compared and analyzed using the EER.

Intrinsic and Extrinsic Factors Affecting Use of Sharing Economy Services and the Moderating Effect of Benefits (공유경제 서비스 사용에 영향을 미치는 사용자의 내외적 요인과 이익의 조절효과)

  • Kim, Sanghyun;Park, Hyunsun;Lim, Jeongtaek
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.12
    • /
    • pp.482-491
    • /
    • 2020
  • This study proposed a research model based on self-determination theory and unified theory of acceptance and use of technology to explain the factors influencing intention to use sharing economy services. A total of 392 responses were collected, and structural equation analysis was performed with AMOS 22.0. The results are summarized as follows. First, self-technological aptness and trust had a positive effect on intention to use sharing economy services. Second, access bigger market and environmental friendliness had a positive effect on intention to use sharing economy services. Third, intention to use sharing economy services had a positive effect on actual usage of sharing economy services. Finally, benefits was found to strengthen the relationship between intention to use sharing economy services and actual usage of sharing economy services. The findings of this study would provide a theoretical framework for sharing economy services and important information for understanding individuals using the sharing economy services.

Analysis of User Interface (UI) Color Design of Children's Education Game (아동 교육용 게임의 사용자 인터페이스(UI) 색채 디자인 분석)

  • Zheng, LingJing;Lee, Dong-Lyeor
    • Journal of Digital Convergence
    • /
    • v.18 no.12
    • /
    • pp.577-583
    • /
    • 2020
  • The learning and cognition of preschool children begins with the color of the object, and the game interface is the child's first impression of the game, so reasonable color design is needed. This article selects 10 educational mobile game for preschool children, extracts colors from the game interface and startup icons, and puts them into Photoshop to analyze the three elements of color hue, lightness, and saturation. Finally, three suggestions are put forward for the color design of game UI. 1.Choose a color similar to the actual color of the thing. 2. Choose warm colors according to your child's preferences. 3. When using contrasting colors, please reduce the brightness or purity of the colors. It is hoped that the research conclusions can provide reference materials for the color design of educational game UI for preschool children.

A Message Communication for Secure Data Communication in Smart Home Environment Based Cloud Service (클라우드 서비스 기반 스마트 홈 환경에서 안전한 데이터 통신을 위한 메시지 통신 프로토콜 설계)

  • Park, Jung-Oh
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.7
    • /
    • pp.21-30
    • /
    • 2021
  • With the development of IoT technology, various cloud computing-based services such as smart cars, smart healthcare, smart homes, and smart farms are expanding. With the advent of a new environment, various problems continue to occur, such as the possibility of exposure of important information such as personal information or company secrets, financial damage cases due to hacking, and human casualties due to malicious attack techniques. In this paper, we propose a message communication protocol for smart home-based secure communication and user data protection. As a detailed process, secure device registration, message authentication protocol, and renewal protocol were newly designed in the smart home environment. By referring to the security requirements related to the smart home service, the stability of the representative attack technique was verified, and as a result of performing a comparative analysis of the performance, the efficiency of about 50% in the communication aspect and 25% in the signature verification aspect was confirmed.