• Title/Summary/Keyword: Application Software System

Search Result 1,842, Processing Time 0.032 seconds

Implementation of An Automatic Authentication System Based on Patient's Situations and Its Performance Evaluation (환자상황 기반의 자동인증시스템 구축 및 성능평가)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.25-34
    • /
    • 2020
  • In the current medical information system, a system environment is constructed in which Biometric data generated by using IoT or medical equipment connected to a patient can be stored in a medical information server and monitored at the same time. Also, the patient's biometric data, medical information, and personal information after simple authentication using only the ID / PW via the mobile terminal of the medical staff are easily accessible. However, the method of accessing these medical information needs to be improved in the dimension of protecting patient's personal information, and provides a quick authentication system for first aid. In this paper, we implemented an automatic authentication system based on the patient's situation and evaluated its performance. Patient's situation was graded into normal and emergency situation, and the situation of the patient was determined in real time using incoming patient biometric data from the ward. If the patient's situation is an emergency, an emergency message including an emergency code is send to the mobile terminal of the medical staff, and they attempted automatic authentication to access the upper medical information of the patient. Automatic authentication is a combination of user authentication(ID/PW, emergency code) and mobile terminal authentication(medical staff's role, working hours, work location). After user authentication, mobile terminal authentication is proceeded automatically without additional intervention by medical staff. After completing all authentications, medical staffs get authorization according to the role of medical staffs and patient's situations, and can access to the patient's graded medical information and personal information through the mobile terminal. We protected the patient's medical information through limited medical information access by the medical staff according to the patient's situation, and provided an automatic authentication without additional intervention in an emergency situation. We performed performance evaluation to verify the performance of the implemented automatic authentication system.

A Study on Intuitive IoT Interface System using 3D Depth Camera (3D 깊이 카메라를 활용한 직관적인 사물인터넷 인터페이스 시스템에 관한 연구)

  • Park, Jongsub;Hong, June Seok;Kim, Wooju
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.2
    • /
    • pp.137-152
    • /
    • 2017
  • The decline in the price of IT devices and the development of the Internet have created a new field called Internet of Things (IoT). IoT, which creates new services by connecting all the objects that are in everyday life to the Internet, is pioneering new forms of business that have not been seen before in combination with Big Data. The prospect of IoT can be said to be unlimited in its utilization. In addition, studies of standardization organizations for smooth connection of these IoT devices are also active. However, there is a part of this study that we overlook. In order to control IoT equipment or acquire information, it is necessary to separately develop interworking issues (IP address, Wi-Fi, Bluetooth, NFC, etc.) and related application software or apps. In order to solve these problems, existing research methods have been conducted on augmented reality using GPS or markers. However, there is a disadvantage in that a separate marker is required and the marker is recognized only in the vicinity. In addition, in the case of a study using a GPS address using a 2D-based camera, it was difficult to implement an active interface because the distance to the target device could not be recognized. In this study, we use 3D Depth recognition camera to be installed on smartphone and calculate the space coordinates automatically by linking the distance measurement and the sensor information of the mobile phone without a separate marker. Coordination inquiry finds equipment of IoT and enables information acquisition and control of corresponding IoT equipment. Therefore, from the user's point of view, it is possible to reduce the burden on the problem of interworking of the IoT equipment and the installation of the app. Furthermore, if this technology is used in the field of public services and smart glasses, it will reduce duplication of investment in software development and increase in public services.

Recommender Systems using Structural Hole and Collaborative Filtering (구조적 공백과 협업필터링을 이용한 추천시스템)

  • Kim, Mingun;Kim, Kyoung-Jae
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.107-120
    • /
    • 2014
  • This study proposes a novel recommender system using the structural hole analysis to reflect qualitative and emotional information in recommendation process. Although collaborative filtering (CF) is known as the most popular recommendation algorithm, it has some limitations including scalability and sparsity problems. The scalability problem arises when the volume of users and items become quite large. It means that CF cannot scale up due to large computation time for finding neighbors from the user-item matrix as the number of users and items increases in real-world e-commerce sites. Sparsity is a common problem of most recommender systems due to the fact that users generally evaluate only a small portion of the whole items. In addition, the cold-start problem is the special case of the sparsity problem when users or items newly added to the system with no ratings at all. When the user's preference evaluation data is sparse, two users or items are unlikely to have common ratings, and finally, CF will predict ratings using a very limited number of similar users. Moreover, it may produces biased recommendations because similarity weights may be estimated using only a small portion of rating data. In this study, we suggest a novel limitation of the conventional CF. The limitation is that CF does not consider qualitative and emotional information about users in the recommendation process because it only utilizes user's preference scores of the user-item matrix. To address this novel limitation, this study proposes cluster-indexing CF model with the structural hole analysis for recommendations. In general, the structural hole means a location which connects two separate actors without any redundant connections in the network. The actor who occupies the structural hole can easily access to non-redundant, various and fresh information. Therefore, the actor who occupies the structural hole may be a important person in the focal network and he or she may be the representative person in the focal subgroup in the network. Thus, his or her characteristics may represent the general characteristics of the users in the focal subgroup. In this sense, we can distinguish friends and strangers of the focal user utilizing the structural hole analysis. This study uses the structural hole analysis to select structural holes in subgroups as an initial seeds for a cluster analysis. First, we gather data about users' preference ratings for items and their social network information. For gathering research data, we develop a data collection system. Then, we perform structural hole analysis and find structural holes of social network. Next, we use these structural holes as cluster centroids for the clustering algorithm. Finally, this study makes recommendations using CF within user's cluster, and compare the recommendation performances of comparative models. For implementing experiments of the proposed model, we composite the experimental results from two experiments. The first experiment is the structural hole analysis. For the first one, this study employs a software package for the analysis of social network data - UCINET version 6. The second one is for performing modified clustering, and CF using the result of the cluster analysis. We develop an experimental system using VBA (Visual Basic for Application) of Microsoft Excel 2007 for the second one. This study designs to analyzing clustering based on a novel similarity measure - Pearson correlation between user preference rating vectors for the modified clustering experiment. In addition, this study uses 'all-but-one' approach for the CF experiment. In order to validate the effectiveness of our proposed model, we apply three comparative types of CF models to the same dataset. The experimental results show that the proposed model outperforms the other comparative models. In especial, the proposed model significantly performs better than two comparative modes with the cluster analysis from the statistical significance test. However, the difference between the proposed model and the naive model does not have statistical significance.

Design and Implementation of a Scalable Real-Time Sensor Node Platform (확장성 및 실시간성을 고려한 실시간 센서 노드 플랫폼의 설계 및 구현)

  • Jung, Kyung-Hoon;Kim, Byoung-Hoon;Lee, Dong-Geon;Kim, Chang-Soo;Tak, Sung-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8B
    • /
    • pp.509-520
    • /
    • 2007
  • In this paper, we propose a real-time sensor node platform that guarantees the real-time scheduling of periodic and aperiodic tasks through a multitask-based software decomposition technique. Since existing sensor networking operation systems available in literature are not capable of supporting the real-time scheduling of periodic and aperiodic tasks, the preemption of aperiodic task with high priority can block periodic tasks, and so periodic tasks are likely to miss their deadlines. This paper presents a comprehensive evaluation of how to structure periodic or aperiodic task decomposition in real-time sensor-networking platforms as regard to guaranteeing the deadlines of all the periodic tasks and aiming to providing aperiodic tasks with average good response time. A case study based on real system experiments is conducted to illustrate the application and efficiency of the multitask-based dynamic component execution environment in the sensor node equipped with a low-power 8-bit microcontroller, an IEEE802.15.4 compliant 2.4GHz RF transceiver, and several sensors. It shows that our periodic and aperiodic task decomposition technique yields efficient performance in terms of three significant, objective goals: deadline miss ratio of periodic tasks, average response time of aperiodic tasks, and processor utilization of periodic and aperiodic tasks.

Vibration characteristics of an ultrasonic waveguide for cooling (냉각용 초음파 웨이브가이드의 진동 특성)

  • Kim, Hyunse;Lim, Euisu
    • The Journal of the Acoustical Society of Korea
    • /
    • v.39 no.6
    • /
    • pp.568-575
    • /
    • 2020
  • Ultrasound has been widely used in various industrial fields. One of challenging application areas is cooling microelectronics. Ultrasonic cooling systems can work with air, argon (Ar) and nitrogen (N2) instead of conventional refrigerant such as freon gas, which can cause global warming. Furthermore, ultrasonic systems do not have moving parts, thus high durability can be obtained. So it is necessary to develop ultrasonic cooling systems due to environmental issues and durability points. In this paper, the design and fabrication processes are explained. When designing the system, a feasibility test was performed with a prototype cooler. Based on the result, finite element analysis with ANSYS software was performed. The predicted anti-resonance frequency for a piezoelectric actuator was 34.8 kHz, which was in good agreement with the experimental result of 34.6 kHz with 0.6% error. In addition, the predicted anti-resonance frequency for the ultrasonic waveguide was 39.4 kHz, which also agreed well with the experimental value of 39.8 kHz with 1.0% error. Based on these results, the developed ultrasonic waveguide might be applicable in microchip cooling.

BIM-based Repair&Replacement (R&R) Cost Estimating Process (BIM기반 건축물 수선교체비 산정 프로세스)

  • Park, Jieun;Yu, Jungho
    • Korean Journal of Construction Engineering and Management
    • /
    • v.17 no.2
    • /
    • pp.31-38
    • /
    • 2016
  • In a construction project, the portion for maintenance costs for a building is considerable compared to the initial construction cost. As such, Life Cycle Cost (LCC) analysis is being increasingly utilized to assess the design value of engineering work in Korea. Additionally, the Public Procurement Service in Korea announced that it will be mandatory for all domestic construction projects to adopt BIM. Furthermore, the paradigm for architectural design has shifted from 2D to 3D, and to BIM, which includes a data management system. Within this background, however, there is currently no adequate BIM-based LCC analysis software and the requirements of cost estimation for repair and replacement cost for a building is not completely adequate in BIM tools such as Revit and Archicad. Therefore, this study suggests a process of cost estimation for repair and replacement (R&R) cost based on IFC data. First, we analyzed existing R&R criteria and defined BIM-based requirements when calculating R&R costs. These requirements were extracted from relevant IFC data. Subsequently, this was saved to a database and a BIM-based database was built for R&R cost estimation. Finally, this database was connected with external databases such as R&R Criteria DB and Cost Information DB to calculate R&R costs. This process is expected to improve upon the traditional process of cost estimation of R&R cost by applying a BIM model. The proposed process can contribute to a further standardizing of BIM-based LCC analysis thru application to initial construction costs, energy costs, and other maintenance costs.

Authentication and classification of strawberry varieties by analysis of their leaves using near infrared spectroscopy.

  • Lopez, Mercedes G.
    • Proceedings of the Korean Society of Near Infrared Spectroscopy Conference
    • /
    • 2001.06a
    • /
    • pp.1617-1617
    • /
    • 2001
  • It is well known now that near infrared spectroscopy (NIRS) is a fast, no destructive, and inexpensive analytical technique that could be used to classify, identify, and authenticate a wide range of foods and food items. Therefore, the main aims of this study were to provide a new insight into the authentication of five strawberry (Fragaria x ananassa) varieties and to correlate them with geographical zones and the propagating methods used. Three weeks plants of five different strawberry varieties (F. x ananassa Duch. cv Camarosa, Seascape, Chandler, F. Chiloensis, and F. Virginiana) were cultivated in vitro first and then transferred to pots with special soil, and grown in a greenhouse at CINVESTAV, all varieties were acquired from California (USA). After 18 months, ten leaves from each variety were collected. Transmission spectra from each leave were recorded over a range of 10, 000-4, 000 cm$-^{1}$, 32 scans of each strawberry leave were collected using a resolution of 4 cm$-^{1}$ with a Paragon IdentiCheck FT-NIR System Spectrometer. Triplicates of each strawberry leave were used. All spectra were analyzed using principal component analysis (PCA) and soft independent modeling class analogy (SIMCA). The optimum number of components to be used in the regression was automatically determined by the software. Camarosa was the only variety grown from the same shoot but propagated by a different method (direct or in vitro). Five different classes (varieties) or clusters were observed among samples, however, larger inter class distances were presented by the two wildtype samples (F. Chiloensis and F. Virginiana). Camarosa direct and Camarosa in vitro displayed a small overlapping region between them. On the other hand, Seascape variety presented the smallest rejection percentage among all varieties (more similarities with the rest of the samples). Therefore, it can be concluded that the application of NIRS technique allowed the authentication of all strawberry varieties and geographical origin as well. It was also possible to form subclasses of the same materials. The results presented here demonstrate that NIRS is a very powerful and promising analytical tool since all materials were authenticated and classified based on their variety, origin, and treatment. This is of a tremendous relevance since the variety and origin of a plant material can be established even before it gives its typical fruit or flower.

  • PDF

Safety Evaluation on Real Time Operating Systems for Safety-Critical Systems (안전필수(Safety-Critical) 시스템의 실시간 운영체제에 대한 안전성 평가)

  • Kang, Young-Doo;Chong, Kil-To
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.10
    • /
    • pp.3885-3892
    • /
    • 2010
  • Safety-Critical systems, such as Plant Protection Systems in nuclear power plant, plays a key role that the facilities can be operated without undue risk to the health and safety of public and environment, and those systems shall be designed, fabricated, installed, and tested to quality standards commensurate with the importance of the functions to be performed. Computer-based Instrumentation and Control Systems to perform the safety-critical function have Real Time Operating Systems to control and monitoring the sub-system and executing the application software. The safety-critical Real Time Operating Systems shall be designed, analyzed, tested and evaluated to have capability to maintain a high integrity and quality. However, local nuclear power plants have applied the real time operating systems on safety critical systems through Commercial Grade Item Dedication method, and this is the reason of lack of detailed methodology on assessing the safety of real time operating systems, expecially to the new developed one. This paper presents the methodology and experiences of safety evaluation on safety-critical Real Time Operating Systems based upon design requirements. This paper may useful to develop and evaluate the safety-critical Real Time Operating Systems in other industry to ensure the safety of public and environment.

Wavelet based Fuzzy Integral System for 3D Face Recognition (퍼지적분을 이용한 웨이블릿 기반의 3차원 얼굴 인식)

  • Lee, Yeung-Hak;Shim, Jae-Chang
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.10
    • /
    • pp.616-626
    • /
    • 2008
  • The face shape extracted by the depth values has different appearance as the most important facial feature information and the face images decomposed into frequency subband are signified personal features in detail. In this paper, we develop a method for recognizing the range face images by combining the multiple frequency domains for each depth image and depth fusion using fuzzy integral. For the proposed approach, the first step tries to find the nose tip that has a protrusion shape on the face from the extracted face area. It is used as the reference point to normalize for orientated facial pose and extract multiple areas by the depth threshold values. In the second step, we adopt as features for the authentication problem the wavelet coefficient extracted from some wavelet subband to use feature information. The third step of approach concerns the application of eigenface and Linear Discriminant Analysis (LDA) method to reduce the dimension and classify. In the last step, the aggregation of the individual classifiers using the fuzzy integral is explained for extracted coefficient at each resolution level. In the experimental results, using the depth threshold value 60 (DT60) show the highest recognition rate among the regions, and the depth fusion method achieves 98.6% recognition rate, incase of fuzzy integral.

A Study on Applying Information Framework for BIM Based WBS -Focusing on Civil Construction- (BIM기반의 WBS 구축을 위한 정보프레임워크 도입방안 연구 -토목사업의 적용을 중심으로-)

  • Nam, Jeong-Yong;Jo, Chan-Won;Park, So-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.770-777
    • /
    • 2017
  • Building information modeling (BIM) has been receiving attention as an integrated information model instead of CAD since the 2000s. BIM technology was first used in the architectural field and was later introduced to the civil engineering field. However, the government announced a plan for the application of BIM to 20% of all SOC projects from 2020, so the adoption of BIM technology is expected to accelerate. In order to successfully adopt BIM, a systematic structure should be supported for integrated design information and implementation technology. Also, it is important to establish the relationship between information systems because many complicated factors are intertwined in the construction industry. In this study, we propose a framework for constructing integrated information through identifying the information relations for introducing BIM in the civil engineering industry. We applied this framework to a bridge project to confirm its effectiveness. This study can be applied to the integrated management of the construction process and costs by introduction of a work breakdown structure (WBS) to BIM. In addition, this study is expected to contribute to the adoption of BIM in the civil engineering field through the proposal of information system standardization in this field.