• Title/Summary/Keyword: 웹 기반

Search Result 7,990, Processing Time 0.042 seconds

Evaluation of the Effectiveness of Surveillance on Improving the Detection of Healthcare Associated Infections (의료관련감염에서 감시 개선을 위한 평가)

  • Park, Chang-Eun
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.51 no.1
    • /
    • pp.15-25
    • /
    • 2019
  • The development of reliable and objective definitions as well as automated processes for the detection of health care-associated infections (HAIs) is crucial; however, transformation to an automated surveillance system remains a challenge. Early outbreak identification usually requires clinicians who can recognize abnormal events as well as ongoing disease surveillance to determine the baseline rate of cases. The system screens the laboratory information system (LIS) data daily to detect candidates for health care-associated bloodstream infection (HABSI) according to well-defined detection rules. The system detects and reserves professional autonomy by requiring further confirmation. In addition, web-based HABSI surveillance and classification systems use discrete data elements obtained from the LIS, and the LIS-provided data correlates strongly with the conventional infection-control personnel surveillance system. The system was timely, acceptable, useful, and sensitive according to the prevention guidelines. The surveillance system is useful because it can help health care professionals better understand when and where the transmission of a wide range of potential pathogens may be occurring in a hospital. A national plan is needed to strengthen the main structures in HAI prevention, Healthcare Associated Prevention and Control Committee (HAIPCC), sterilization service (SS), microbiology laboratories, and hand hygiene resources, considering their impact on HAI prevention.

Investigating Opinion Mining Performance by Combining Feature Selection Methods with Word Embedding and BOW (Bag-of-Words) (속성선택방법과 워드임베딩 및 BOW (Bag-of-Words)를 결합한 오피니언 마이닝 성과에 관한 연구)

  • Eo, Kyun Sun;Lee, Kun Chang
    • Journal of Digital Convergence
    • /
    • v.17 no.2
    • /
    • pp.163-170
    • /
    • 2019
  • Over the past decade, the development of the Web explosively increased the data. Feature selection step is an important step in extracting valuable data from a large amount of data. This study proposes a novel opinion mining model based on combining feature selection (FS) methods with Word embedding to vector (Word2vec) and BOW (Bag-of-words). FS methods adopted for this study are CFS (Correlation based FS) and IG (Information Gain). To select an optimal FS method, a number of classifiers ranging from LR (logistic regression), NN (neural network), NBN (naive Bayesian network) to RF (random forest), RS (random subspace), ST (stacking). Empirical results with electronics and kitchen datasets showed that LR and ST classifiers combined with IG applied to BOW features yield best performance in opinion mining. Results with laptop and restaurant datasets revealed that the RF classifier using IG applied to Word2vec features represents best performance in opinion mining.

Design of Programming Failure Feedback System Based on Control Flow of Test Case to Support Programming Training (프로그래밍 훈련 지원을 위한 테스트케이스의 제어흐름에 기반한 프로그래밍 실패 피드백 시스템 설계)

  • Lee, Sunghee;Kim, Deok Yeop;Seo, Kang Bok;Lee, Woo Jin
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.8
    • /
    • pp.317-322
    • /
    • 2019
  • Programming judge systems for programming training support are typically built on the Web, where the examiners uploads a programming problem, which the student reads and submits an answer to the problem. The judge system executes the submitted answer of source code to provide feedback such as pass, failure, and error messages. Students who receive the feedback except for the pass continues debugging the source code until they are judged to pass. We developed an online judge system to support programming training and analyzed answers submitted by the students and found that many of the students who were not judged to pass that test did not know exactly where they were wrong but continued to solve the problem. The current judge system generally feeds runtime error messages back to students. However, with only runtime error message, it is difficult for student who train to find the wrong part of the answer. Therefore, in this paper, we propose a system that provides the feedback of programming failure by analyzing the control flow of the test cases used in the source code submitted by the student. The proposed system helps students find the wrong parts more quickly by feeding back the paths where faults in the control flow may exist. In addition, we show that this system is applicable to the answer source code that the actual student submitted.

A Study of Relationship Derivation Technique using object extraction Technique (개체추출기법을 이용한 관계성 도출기법)

  • Kim, Jong-hee;Lee, Eun-seok;Kim, Jeong-su;Park, Jong-kook;Kim, Jong-bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.309-311
    • /
    • 2014
  • Despite increasing demands for big data application based on the analysis of scattered unstructured data, few relevant studies have been reported. Accordingly, the present study suggests a technique enabling a sentence-based semantic analysis by extracting objects from collected web information and automatically analyzing the relationships between such objects with collective intelligence and language processing technology. To be specific, collected information is stored in DBMS in a structured form, and then morpheme and feature information is analyzed. Obtained morphemes are classified into objects of interest, marginal objects and objects of non-interest. Then, with an inter-object attribute recognition technique, the relationships between objects are analyzed in terms of the degree, scope and nature of such relationships. As a result, the analysis of relevance between the information was based on certain keywords and used an inter-object relationship extraction technique that can determine positivity and negativity. Also, the present study suggested a method to design a system fit for real-time large-capacity processing and applicable to high value-added services.

  • PDF

A study on user authentication method using speaker authentication mechanism in login process (로그인 과정에서의 화자인증 메커니즘을 이용한 사용자인증 방안 연구)

  • Kim, Nam-Ho;Choi, Ji-Young
    • Smart Media Journal
    • /
    • v.8 no.3
    • /
    • pp.23-30
    • /
    • 2019
  • With the popularization of the Internet and smartphone uses, people in the modern era are living in a multi-channel environment in which they access the information system freely through various methods and media. In the process of utilizing such services, users must authenticate themselves, the typical of which is ID & password authentication. It is considered the most convenient method as it can be authenticated only through the keyboard after remembering its own credentials. On the other hand, modern web services only allow passwords to be set with high complexity by different combinations. Passwords consisting of these complex strings also increase proportionally, since the more services users want to use, the more user authentication information they need to remember is recommended periodically to prevent personal information leakage. It is difficult for the blind, the disabled, or the elderly to remember the authentication information of users with such high entropy values and to use it through keyboard input. Therefore, this paper proposes a user authentication method using Google Assistant, MFCC and DTW algorithms and speaker authentication to provide the handicapped users with an easy user authentication method in the login process.

A Study on the Improvement Method for Efficient Service of E-GEN AED using Time and Spatial Data (시·공간 데이터를 활용한 E-GEN AED의 효율적 서비스를 위한 개선방안)

  • Beak, Seong Ryul;Kim, Jun Hyun
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.37 no.4
    • /
    • pp.253-265
    • /
    • 2019
  • In this study were analyzed the errors on the registration of details information, location of E-GEN (Emergency medical-GEN) AED (Automated External Defibrillator) installation site and the adequacy of spatial arrangement, which suggests an improvement methods of constructing an app or web based on time and space data for efficient operation of considering accessibility and usability. As a result of this study, first, it was not equal to each other for locations of each installation point of AED, that confirmed some area were dense or requiring additional installation. Second, it confirmed the inaccuracies in inputting and registering information about the installed location, such as the actual installation location information and the attribute information of the AED. Third, the main access node and the main address node were connected to a straight line that was found not be connected to the back door, the straight line, the stairs. Also, the opening times of AED installation sites varied according to the week and the season, the entrance was managed by the apartment management office in a separate place, it needs to be established on this information. In conclusion, it proposed a method to improve spatial equity and accessibility, a method to provide accurate distance and time according to actual movement routes in case of emergency, and a possibility of using each facility considering day and time.

An Application and Educational Outcomes of e-PBL (e-Project-based Learning) to University Forest Education (대학 산림교육의 웹기반 프로젝트 학습법(e-PBL) 적용 사례와 학습성과)

  • Lee, Songhee;Lee, Jaeeun;Kang, Hoduck;Yoon, Tae Kyung
    • Journal of Korean Society of Forest Science
    • /
    • v.110 no.2
    • /
    • pp.266-279
    • /
    • 2021
  • This study applied the e-PBL (e-Project-based learning) method for "Urban Forest Management" courses in the Department of Forest Science at S University to progress in university forest education. e-PBL effectively motivates self-directed learning, problem-solving, communication skills, and learners' responsibility by enabling them to choose, design, and perform their projects. Due to the COVID-19 pandemic in 2020, learners were encouraged to use online media to carry out projects and submit presentations for the campus forest. Learners' educational effects were subsequently investigated through a five-point Likert scale. This study discovered a positive effect on learners' motivation and interest (4.17) through e-PBL. Learners responded that e-PBL also helped their understanding regarding the subject (4.17). In addition, this study provided evidence that the e-PBL method was helpful in problem-solving (4.25), communication (4.33), and decision-making skills (4.21). According to learners' responses, there are positive indications that learners were satisfied with e-PBL. Learners responded that interactions and communications with team members could improve their understanding of the subject. Hence, there is scope for improving an efficient and successful e-PBL model suitable for university forest education by providing more efficient instructional time management, e-PBL method guidelines, and institutional support.

A Study on the Development of Korean Defense Standards through Text Mining-Based Trend Analysis of United States Defense Standards (텍스트 마이닝 기반의 미국 국방 표준 동향 분석을 통한 한국 국방 표준의 발전 방안 연구)

  • Chae, Soohwan;Shim, Bohyun;Yeom, Seulki;Hong, Seongdon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.651-660
    • /
    • 2021
  • This study examined the trend of standards established in the United States and to find points that can be applied to Korean defense standards. The titles of various United States defense standard documents registered on the web were selected for this research. The wordcloud was created after analyzing the frequency of words appearing in the title using text mining. The trend of words appearing in MIL-STD by era was obtained. This study identified words that appear often due to the format of the document itself, words that appear regularly throughout the era, words that are used frequently in the past but are not used much in the present, and words that did not receive attention in the past but appeared recurrently in the present. In addition, the characteristics of each document were derived through the wordcloud produced for various defense documents. In conclusion, Korean defense standards also require a consideration of safe and efficient management, transport, and load design of hazardous materials. Furthermore, the quality of defense standards can be expected to improve if the defense standard document system can be established, focusing on efficient management.

An Access Control Model for Privacy Protection using Purpose Classification (사용목적 분류를 통한 프라이버시 보호를 위한 접근제어 모델)

  • Na Seok-Hyun;Park Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.39-52
    • /
    • 2006
  • Recently purpose is used by an crucial part to security management when collecting data about privacy. The W3C(World Wide Web Consortium) describes a standard spec to control personal data that is provided by data providers who visit the web site. But they don't say anymore about security management about personal data in transit after data collection. Recently several researches, such as Hippocratic Databases, Purpose Based Access Control and Hippocratic in Databases, are dealing with security management using purpose concept and access control mechanism after data collection a W3C's standard spec about data collection mechanism but they couldn't suggest an efficient mechanism for privacy protection about personal data because they couldn't represent purpose expression and management of purposes sufficiently. In this paper we suggest a mechanism to improve the purpose expression. And then we suggest an accesscontrol mechanism that is under least privilege principle using the purpose classification for privacy protection. We classify purpose into Along purpose structure, Inheritance purpose structure and Stream purpose structure. We suggest different mechanisms to deal with then We use the role hierarchy structure of RBAC(Role-Based Access Control) for flexibility about access control and suggest mechanisms that provide the least privilege for processing the task in case that is satisfying using several features of purpose to get least privilege of a task that is a nit of business process.

Establishment and service of user analysis environment related to computational science and engineering simulation platform

  • Kwon, Yejin;Jeon, Inho;On, Noori;Seo, Jerry H.;Lee, Jongsuk R.
    • Journal of Internet Computing and Services
    • /
    • v.21 no.6
    • /
    • pp.123-132
    • /
    • 2020
  • The EDucation-research Integration through Simulation On the Net (EDISON) platform, which is a web-based platform that provides computational science and engineering simulation execution environments, can offer various analysis environments to students, general users, as well as computational science and engineering researchers. To expand the user base of the simulation environment services, the EDISON platform holds a challenge every year and attempts to increase the competitiveness and excellence of the platform by analyzing the user requirements of the various simulation environment offered. The challenge platform system in the field of computational science and engineering is provided to users in relation to the simulation service used in the existing EDISON platform. Previously, EDISON challenge servicesoperated independently from simulation services, and hence, services such as end-user review and intermediate simulation results could not be linked. To meet these user requirements, the currently in-service challenge platform for computational science and engineering is linked to the existing computational science and engineering service. In addition, it was possible to increase the efficiency of service resources by providing limited services through various analyses of all users participating in the challenge. In this study, by analyzing the simulation and usage environments of users, we provide an improved challenge platform; we also analyze ways to improve the simulation execution environment.