• Title/Summary/Keyword: 의료정보 기술

Search Result 1,499, Processing Time 0.029 seconds

Design and Implementation of an Ethereum-Based Deliverables Management System for Public Information Software Project (이더리움 기반 공공정보 소프트웨어 사업산출물 관리 시스템 설계 및 구현)

  • Lee, Eun Ju;Kim, Jin Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.6
    • /
    • pp.175-184
    • /
    • 2022
  • Blockchain is being studied in various fields such as logistics, fintech, medical care, and the public sector. In the public information software project, some deliverables are omitted because the developed deliverables and the deliverables requested by the project management methodology do not match, and an additional process is required for payment. In this paper, we propose the deliverables management system for public information software project which is configured a distributed environment using the Ethereum blockchain and which has an automatic payment system only when all deliverables are approved. This system can keep the service available in case of system failure, provide transparency and traceability of deliverables management, and can reduce conflicts between the ordering company and the contractor through automatic payment. In this system, the information of deliverables is stored in the blockchain, and the deliverables that their file name is the hash value calculated by using the version information and the hash value of the previous version deliverable, are stored in the SFTP server. Experimental results show that the hash value of the deliverables registered by the contractor is correct, the file name of the deliverables stored in the SFTP server is the same as the hash value registered in the Ethereum blockchain, and the payment is made automatically to the Ethereum address of the contractor when all deliverables are approved.

A Study on Big Data Based Method of Patient Care Analysis (빅데이터 기반 환자 간병 방법 분석 연구)

  • Park, Ji-Hun;Hwang, Seung-Yeon;Yun, Bum-Sik;Choe, Su-Gil;Lee, Don-Hee;Kim, Jeong-Joon;Moon, Jin-Yong;Park, Kyung-won
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.3
    • /
    • pp.163-170
    • /
    • 2020
  • With the development of information and communication technologies, the growing volume of data is increasing exponentially, raising interest in big data. As technologies related to big data have developed, big data is being collected, stored, processed, analyzed, and utilized in many fields. Big data analytics in the health care sector, in particular, is receiving much attention because they can also have a huge social and economic impact. It is predicted that it will be able to use Big Data technology to analyze patients' diagnostic data and reduce the amount of money that is spent on simple hospital care. Therefore, in this thesis, patient data is analyzed to present to patients who are unable to go to the hospital or caregivers who do not have medical expertise with close care guidelines. First, the collected patient data is stored in HDFS and the data is processed and classified using R, a big data processing and analysis tool, in the Hadoop environment. Visualize to a web server using R Shiny, which is used to implement various functions of R on the web.

A Study on the Implementation of Urban Senior Multi-Carezon for the Elderly (고령화에 따른 도시형 노인 시니어 멀티 케어존 실효성에 관한연구)

  • Lee, Jong-Sik
    • Journal of the Korea Knowledge Information Technology Society
    • /
    • v.13 no.2
    • /
    • pp.273-286
    • /
    • 2018
  • Korean government has taken various population policy so far According to demographic results, The aging population is rapidly aging and it is expected to deepen in the future. However, many senior citizens are also exposed to poor economic conditions and inconsistent health care risks Most seniors suffer from mental illness and chronic diseases. seniors in traditional cities feel very alienated as they change from large family to small family. As the number of elderly people living alone grows, social problems increase. At present, the health care for the elderly who live alone is not being taken properly, and they are under a very poor management system, both physically and mentally. Every human being has to be old, and we aim to spend our old age processes physically and mentally healthy. As the basic age of the elderly increases, it is necessary to consider various aspects of the welfare policies and medical policies that are followed. In this study, 100 elderly people over the age of 65 were surveyed for economic situations and physical and mental health conditions, and specially performed study on utility of 'urban senior multi care zone' to prove the necessity of introducing the latest digital devices to resolve these problems more effectively by analyzing serious feelings of alienation, loneliness, and emotional situations. Lastly, We conducted this research to find ways to help the elderly through customized health care.

Data Modeling for Cyber Security of IoT in Artificial Intelligence Technology (인공지능기술의 IoT 통합보안관제를 위한 데이터모델링)

  • Oh, Young-Taek;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.12
    • /
    • pp.57-65
    • /
    • 2021
  • A hyper-connected intelligence information society is emerging that creates new value by converging IoT, AI, and Bigdata, which are new technologies of the fourth industrial revolution, in all industrial fields. Everything is connected to the network and data is exploding, and artificial intelligence can learn on its own and even intellectual judgment functions are possible. In particular, the Internet of Things provides a new communication environment that can be connected to anything, anytime, anywhere, enabling super-connections where everything is connected. Artificial intelligence technology is implemented so that computers can execute human perceptions, learning, reasoning, and natural language processing. Artificial intelligence is developing advanced technologies such as machine learning, deep learning, natural language processing, voice recognition, and visual recognition, and includes software, machine learning, and cloud technologies specialized in various applications such as safety, medical, defense, finance, and welfare. Through this, it is utilized in various fields throughout the industry to provide human convenience and new values. However, on the contrary, it is time to respond as intelligent and sophisticated cyber threats are increasing and accompanied by potential adverse functions such as securing the technical safety of new technologies. In this paper, we propose a new data modeling method to enable IoT integrated security control by utilizing artificial intelligence technology as a way to solve these adverse functions.

An Energy Consumption Model using Two-Tier Clustering in Mobile Sensor Networks (모바일 센서 네트워크에서 2계층 클러스터링을 이용한 에너지 소비 모델)

  • Kim, Jin-Su
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.12
    • /
    • pp.9-16
    • /
    • 2016
  • Wireless sensor networks (WSN) are composed of sensor nodes and a base station. The sensor nodes deploy a non-accessible area, receive critical information, and transmit it to the base station. The information received is applied to real-time monitoring, distribution, medical service, etc.. Recently, the WSN was extended to mobile wireless sensor networks (MWSN). The MWSN has been applied to wild animal tracking, marine ecology, etc.. The important issues are mobility and energy consumption in MWSN. Because of the limited energy of the sensor nodes, the energy consumption for data transmission affects the lifetime of the network. Therefore, efficient data transmission from the sensor nodes to the base station is necessary for sensing data. This paper, proposes an energy consumption model using two-tier clustering in mobile sensor networks (TTCM). This method divides the entire network into two layers. The mobility problem was considered, whole energy consumption was decreased and clustering methods of recent researches were analyzed for the proposed energy consumption model. Through analysis and simulation, the proposed TTCM was found to be better than the previous clustering method in mobile sensor networks at point of the network energy efficiency.

Model Verification of a Safe Security Authentication Protocol Applicable to RFID System (RFID 시스템에 적용시 안전한 보안인증 프로토콜의 모델검증)

  • Bae, WooSik;Jung, SukYong;Han, KunHee
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.221-227
    • /
    • 2013
  • RFID is an automatic identification technology that can control a range of information via IC chips and radio communication. Also known as electronic tags, smart tags or electronic labels, RFID technology enables embedding the overall process from production to sales in an ultra-small IC chip and tracking down such information using radio frequencies. Currently, RFID-based application and development is in progress in such fields as health care, national defense, logistics and security. RFID structure consists of a reader that reads tag information, a tag that provides information and the database that manages data. Yet, the wireless section between the reader and the tag is vulnerable to security issues. To sort out the vulnerability, studies on security protocols have been conducted actively. However, due to difficulties in implementation, most suggestions are concerned with theorem proving, which is prone to vulnerability found by other investigators later on, ending up in many troubles with applicability in practice. To experimentally test the security of the protocol proposed here, the formal verification tool, CasperFDR was used. To sum up, the proposed protocol was found to be secure against diverse attacks. That is, the proposed protocol meets the safety standard against new types of attacks and ensures security when applied to real tags in the future.

XOR-based High Quality Information Hiding Technique Utilizing Self-Referencing Virtual Parity Bit (자기참조 가상 패리티 비트를 이용한 XOR기반의 고화질 정보은닉 기술)

  • Choi, YongSoo;Kim, HyoungJoong;Lee, DalHo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.12
    • /
    • pp.156-163
    • /
    • 2012
  • Recently, Information Hiding Technology are becoming increasingly demanding in the field of international security, military and medical image This paper proposes data hiding technique utilizing parity checker for gray level image. many researches have been adopted LSB substitution and XOR operation in the field of steganography for the low complexity, high embedding capacity and high image quality. But, LSB substitution methods are not secure through it's naive mechanism even though it achieves high embedding capacity. Proposed method replaces LSB of each pixel with XOR(between the parity check bit of other 7 MSBs and 1 Secret bit) within one pixel. As a result, stego-image(that is, steganogram) doesn't result in high image degradation. Eavesdropper couldn't easily detect the message embedding. This approach is applying the concept of symmetric-key encryption protocol onto steganography. Furthermore, 1bit of symmetric-key is generated by the self-reference of each pixel. Proposed method provide more 25% embedding rate against existing XOR operation-based methods and show the effect of the reversal rate of LSB about 2% improvement.

A Study on the Causes of Injury Codes by Case-Based Injury Code of External Causes Frequency Analysis (사례 중심의 손상코드 별 손상외인코드 빈도수 분석에 따른 손상코드 발생 원인에 관한 연구)

  • Eun-Mee Choi;Hye-Eun Jin;Jin-Hyoung Jeong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.1
    • /
    • pp.50-59
    • /
    • 2023
  • The purpose of this study was to analyze the patients hospitalized with damage by injury code based on data for two years in 2020 and 2021 of A institution located in Gangneung, Gangwon-do. Analyzed the injury codes with a large number of occurrences per year, and analyzed the injury codes of external causes accordingly. The cause of the injury code was analyzed by analyzing the frequency of the injury code of external causes. Injury code S0650 had the highest frequency of injury code of external causes W189 and X5999, which was judged to be the cause of traumatic subdural hemorrhage without open intracranial wounds when falling in an unspecified place or toilet. Injury code S72120 had the highest frequency of injury code of external causes W010 and W180, and it was judged to be the cause of obstructive femoral intertrochanteric fracture that occurs when falling in the residence. The injury code S32090 had a high frequency of X5999, and it was analyzed that it caused the obstructive fracture of the lumbar region due to an accident caused by exposure in an unspecified place, and the injury code S72.090 had a high frequency of W010 and W180. It was confirmed that the cause of the obstructive fracture of the femoral neck was mainly caused by slipping or slipping in the residence, and the injury code S0220 had a high frequency of the injury code of external causes Y049, and it was confirmed that the fibula was fractured mainly by the force or fist. As such, the cause of the injury code was analyzed by analyzing the frequency of the injury code for each injury code of external causes.

Test and Analysis for Improving the Service Quality of Korean Medicine Knowledge Portal (한의 지식 포털 서비스 고도화를 위한 테스트 및 유관 사이트 분석)

  • Nam, Bo-Ryeong;Lee, Hwan-Soo;Kim, Sang-Kyun
    • Journal of the Korea Knowledge Information Technology Society
    • /
    • v.12 no.1
    • /
    • pp.69-78
    • /
    • 2017
  • KOIN (Korean medicine 人, http://www.koin.re.kr) is a Korean medicine knowledge portal developed for users who are interested in Korean medicine to share relevant information. The purpose of the present study is to seek methods for advancing the quality of the contents and services of KOIN to secure future users of the portal services before fully initiating the KOIN service. The crowd testing method was applied to test the functionality and usability of the current KOIN service, and domestic and international websites providing similar services were investigated and analyzed. About 150 errors were found in this functional testing procedure, but the identified functional problems were all corrected. An average score of 3.33 was calculated in the usability test, in which the reliability and the playfulness showed the highest and lowest score, respectively. We in this paper surveyed the 15 relevant websites with respect to KOIN in the traditional medicine and the modern medicine fields. The strengths and weaknesses of similar websites were analyzed to improve the KOIN services. In particular, it is shown that the evidence-based Korean medicine knowledge is KOIN's biggest strength. Users' needs and demand for the KOIN services will be continuously gathered to provide the Korean medicine knowledge services that the users require.

Explicating Personal Health Informatics Experience (퍼스널 헬스케어 디바이스 사용자 경험 연구)

  • Shin, Dong-Hee;Cho, Hoyoun
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.1
    • /
    • pp.550-566
    • /
    • 2017
  • Recent advances in wearable devices and quantified-self movement increase the number of personal informatics application that may cause an concern to health industry and user. In this light, the goal of this study is to identify more effective ways of design and evaluation of personal informatics application for self-tracking and delivering health information to users. For this goal, this study conducted areal-world study that processes such that user can assess, be aware of, and self-reflect on their data and behavior activity. In doing so, this study aims to determine the psychological effects of forms of health feedback (comparative vs. non-comparative) and presentation modes (text vs. image) on users' tendencies toward health conservation. Results from a between-subjects experiment revealed that health information in a comparative and textual format was more effective in encouraging health conservation in participants than identical information presented in a non-comparative and image format. In addition, participants' level of health consciousness emerged as a significant predictor. Through this analysis of quantitative data and inferences, this study make a number of contributions to the user affordance research and its methodology of health informatics study and designing personal informatics application that support user's behavior change in various contexts.