• Title/Summary/Keyword: Access control tool

Search Result 77, Processing Time 0.027 seconds

Digital Epidemiology: Use of Digital Data Collected for Non-epidemiological Purposes in Epidemiological Studies

  • Park, Hyeoun-Ae;Jung, Hyesil;On, Jeongah;Park, Seul Ki;Kang, Hannah
    • Healthcare Informatics Research
    • /
    • v.24 no.4
    • /
    • pp.253-262
    • /
    • 2018
  • Objectives: We reviewed digital epidemiological studies to characterize how researchers are using digital data by topic domain, study purpose, data source, and analytic method. Methods: We reviewed research articles published within the last decade that used digital data to answer epidemiological research questions. Data were abstracted from these articles using a data collection tool that we developed. Finally, we summarized the characteristics of the digital epidemiological studies. Results: We identified six main topic domains: infectious diseases (58.7%), non-communicable diseases (29.4%), mental health and substance use (8.3%), general population behavior (4.6%), environmental, dietary, and lifestyle (4.6%), and vital status (0.9%). We identified four categories for the study purpose: description (22.9%), exploration (34.9%), explanation (27.5%), and prediction and control (14.7%). We identified eight categories for the data sources: web search query (52.3%), social media posts (31.2%), web portal posts (11.9%), webpage access logs (7.3%), images (7.3%), mobile phone network data (1.8%), global positioning system data (1.8%), and others (2.8%). Of these, 50.5% used correlation analyses, 41.3% regression analyses, 25.6% machine learning, and 19.3% descriptive analyses. Conclusions: Digital data collected for non-epidemiological purposes are being used to study health phenomena in a variety of topic domains. Digital epidemiology requires access to large datasets and advanced analytics. Ensuring open access is clearly at odds with the desire to have as little personal data as possible in these large datasets to protect privacy. Establishment of data cooperatives with restricted access may be a solution to this dilemma.

New Coating Method for Sustained Drug Release: Surface Modification of ePTFE Grafts by inner coating PLGA

  • Kim, Hyeseon;Park, Seohyeon;Kim, Dae Joong;Park, Jong-Sang
    • Bulletin of the Korean Chemical Society
    • /
    • v.35 no.5
    • /
    • pp.1333-1336
    • /
    • 2014
  • Expanded polytetrafluoroethylene (ePTFE) grafts have been used as vascular access for many patients suffering from end stage renal disease. However, the vascular graft can cause significant clinical problems such as stenosis or thrombosis. For this reason, many studies have been performed to make drug eluting graft, but initial burst is major problem in almost drug eluting systems. Therefore we used biodegradable polymer to reduce initial burst and make sustained drug delivery. The ePTFE grafts were dipped into a paclitaxel-dissolved solution and then PLGA-dissolved solution was passed through the lumen of ePTFE. We analyzed whether the dose of paclitaxel is enough and the loading amount of PLGA on ePTFE graft increases according to the coating solution's concentration. Scanning electron microscope (SEM) images of various concentration of PLGA showed that the porous surface of graft was more packed with PLGA by tetrahydrofuran solution dissolved PLGA. In addition, in vitro release profiles of Ptx-PLGA graft demonstrated that early burst was gradually decreased as increasing the concentration of PLGA. These results suggest that PLGA coating of Ptx loaded graft can retard drug release, it is useful tool to control drug release of medical devices.

Development of AMIS Method (AMIS기법 개발에 관한 연구)

  • 정진혁
    • Proceedings of the KOR-KST Conference
    • /
    • 1999.10a
    • /
    • pp.47-52
    • /
    • 1999
  • The methods currently in use to evaluate traffic impacts on the transportation network involve some fundamental shortcomings. First, the methodss do not properly take into account regional and local traffic impacts on the transportation network simultaneously. Second, temporal distribution of traffic, a major contributor to transportation problems, is not accurately accounted for. Third, traffic impact studies require costly and labor-intensive efforts to collect necessary data and to establish to collect necessary data and to establish traffic impact models. In this research, a new method called AMIS is developed for congestion management, access control, and impact simulation to overcome the shortcomings involved in the current methods. The new method is designed for a variety of scenarios such as access management strategies, land use policies, traffic impacts, and other congestion management strategies. This method can effectively be used, with little modification, anywhere in the United States. It is an improvement over the current traffic impact simulation methods that produces more reliable and accurate traffic impact estimates. The case studies conducted in this research have offered evidence that the new method, AMIS, is a credible congestion management tool. Most importantly, a case study presented in this paper illustrates how the new method can be used not only to estimate regional and local impacts of alternate supply management policies in the course of a day, but virtually on an hour-by-hour basis.

  • PDF

Provision and Obligations in Policy Rules (정책규칙에서 Provision과 Obligation)

  • Kim, Su-Hee
    • Convergence Security Journal
    • /
    • v.5 no.1
    • /
    • pp.1-9
    • /
    • 2005
  • XML is the most common tool for data processing and data transmission in web applications. Policies are extensively used in all online business solutions and it is recognized that abinary decision such as 'yes/no' for access requests is not enough. In this paper, a method is developed to convert policy rules with provisions and obligations in logic formula formats into XML formats. The primary purpose is to enable security policy programmers to write flexible authorization policies in XML and to implement them easily. General syntaxes are defined to specify information for users, objects and actions in XML formats and an XML DTD is developed to specify authorization rules with these three components. To support various security features such as data transcoding and non-repudiation depending on data in addition to access control based on authorization policies, studies for specifying them in XML policy rules will be performed in the future.

  • PDF

Configuration of an IPSec VPN Testbed and Development of an Encryption Verification Tool (IOSec VPN 테스트 베드의 구성 및 암호화 식별 도구 개발)

  • 김윤희;이계상
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6C
    • /
    • pp.659-667
    • /
    • 2003
  • IPsec refers to a standardized set of security protocols and algorithms which can provide the integrity, the authentication and the confidentiality services for IP packets in the Internet. Between two security gateways, IPsec provides the access control, the connectionless Integrity, data origin authentication, the anti-replay, and the confidentiality services, not only to the IP layer but also to the upper layers. In this paper, we describe a VPN (Virtual Private Network) testbed configuration using the FreeS/WAN and analyze the ISAKMP messages exchanged between the linux security gateway during the IKE SA setup. Also, we describe our development of an IPSEC encryption verification tool which can be used conveniently by VPN administrators.

Requirements for Workflow Management Systems Supporting CITIS (CITIS 지원 워크플로우 관리 시스템 개발 요구사항)

  • Bae, Joon-Soo;Kim, Dong-Soo;Jeong, Seok-Chan;Bae, Hye-Rim;Seo, Yeong-Ho;Hur, Won-Chang;Kim, Yeong-Ho;Kang, Suk-Ho
    • IE interfaces
    • /
    • v.10 no.3
    • /
    • pp.63-73
    • /
    • 1997
  • This paper presents requirements for workflow management systems supporting CITIS. We propose an architecture of global workflow management system which aims at supporting external workflow among different organizations rather than internal one. The architecture consists of five key elements, that is process definition language, process graphic design tool, control engine, status monitoring tool, and interface models. For each of these elements, implementation requirements are presented and its major functions are described. A key concept to the CITIS standard is the integration of disparate systems in distributed environment. This leads us to place a special emphasis on the interface models that can enhance the interoperability between externally participating workflow systems. Two interface models for the global workflow management system are explained. CORBA, the most widely accepted standard for distributed object management, can be adopted to facilitate the integration. World Wide Web can be used for the underlying platform on which information is exchanged and the status of processes instances is monitored. The workflow management system can provide a ready and easy access to and management of the data for CALS environments.

  • PDF

Designing an Emotional Intelligent Controller for IPFC to Improve the Transient Stability Based on Energy Function

  • Jafari, Ehsan;Marjanian, Ali;Solaymani, Soodabeh;Shahgholian, Ghazanfar
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.3
    • /
    • pp.478-489
    • /
    • 2013
  • The controllability and stability of power systems can be increased by Flexible AC Transmission Devices (FACTs). One of the FACTs devices is Interline Power-Flow Controller (IPFC) by which the voltage stability, dynamic stability and transient stability of power systems can be improved. In the present paper, the convenient operation and control of IPFC for transient stability improvement are considered. Considering that the system's Lyapunov energy function is a relevant tool to study the stability affair. IPFC energy function optimization has been used in order to access the maximum of transient stability margin. In order to control IPFC, a Brain Emotional Learning Based Intelligent Controller (BELBIC) and PI controller have been used. The utilization of the new controller is based on the emotion-processing mechanism in the brain and is essentially an action selection, which is based on sensory inputs and emotional cues. This intelligent control is based on the limbic system of the mammalian brain. Simulation confirms the ability of BELBIC controller compared with conventional PI controller. The designing results have been studied by the simulation of a single-machine system with infinite bus (SMIB) and another standard 9-buses system (Anderson and Fouad, 1977).

Soil Volume Computation Technique at Slope Failure Using Photogrammetric Information (영상정보를 활용한 사면 붕괴 토사량 산정 기법)

  • Bibek, Tamang;Lim, Hyuntaek;Jin, Jihuan;Jang, Sukhyun;Kim, Yongseong
    • Journal of the Korean GEO-environmental Society
    • /
    • v.19 no.12
    • /
    • pp.65-72
    • /
    • 2018
  • The uses of unmanned aerial vehicles (UAV) have been expanding in agriculture surveys, obtaining real time updates of dangerous facilities where human access is difficult, disaster monitoring, and 3D modeling. In reality, there is an upsurge in the application of UAVs in fields like, construction, infrastructure, imaging, surveying, surveillance and transportation. Especially, when the slope failure such as landslide occurs, the uses of UAVs are increasing. Since, the UAVs can fly in three dimensions, they are able to obtain spatial data in places where human access is nearly impossible. Despite of these advantages, however, the uses of UAVs are still limited during slope failure. In order to overcome these limitations, this study computes the soil volume change during slope failure through the computation technique using photogrammetric information obtained from UAV system. Through this study, it was found that photogrammetric information from UAV can be used to acquire information on amount of earthworks required for repair works when slope collapse occurs in mountainous areas, where human access in difficult.

Analysis of Business Process in the SCM Sector Using Data Mining (데이터마이닝을 활용한 SCM 부문에서의 비즈니스 프로세스 분석)

  • Lee, Sang-Young;Lee, Yun-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.59-67
    • /
    • 2006
  • If apply BPM that is a business process management tool to SCM sector, efficient process management and control are available. Also, BPM can execute integrating process that compose SCM effectively. These access method does to manage progress process of SCM process more efficiently and do monitoring. Also, It is can be establish plan about improvement of process analyzing process achievement result. Thus, in this paper, introduce this BPM into SCM environment. Also, SCM process presents plan that executes integration and improves business process effectively applying data mining technique.

  • PDF

Verification Methodology of Security S/W using Security Formal Verification Tool (보안 정형 검증 도구를 이용한 보안 S/W 검증 방안)

  • Kim, Gi-Hwan;Jang, Seung-Ju;Prak, Il-Hwan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1091-1094
    • /
    • 2005
  • 보안 소프트웨어 개발을 위한 정형 기법은 소프트웨어의 안정성과 신뢰성을 보장할 수 있는 기반을 마련해 준다. 정형화 기법에는 정형 명세와 정형 검증으로 분류할 수 있으며, 이를 위해 여러 도구가 제공되고 있다. 본 논문에서는 보안 소프트웨어 개발을 위한 RoZ 정형 명세 도구를 이용하여 ACS(Access Control System)의 UML 모델을 통한 Z 명세 자동 생성 과정을 살펴본다. 그리고, 정형 검증 도구인 Z/EVES를 이용하여 ACS 의 특정 기능의 명세에 대한 검증 과정을 수행함으로써, 소프트웨어 설계에 따른 보안 소프트웨어의 안정성을 보장할 수 있는 개발 방안을 제시하였다.

  • PDF