• Title/Summary/Keyword: Data Convergence Management

Search Result 4,724, Processing Time 0.032 seconds

U-healthcare Service Management Scheme for Big Data of Patient Infomation (환자 정보를 빅 데이터화 하기 위한 유헬스케어 서비스 관리기법)

  • Jeong, Yoon-Su
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.1
    • /
    • pp.1-6
    • /
    • 2015
  • Recently the disease by eating of the modern prevention, management, and trends in the u-healthcare service that provides healthcare services including health promotion is changing rapidly. However, u-healthcare service is a healthcare information that provides users of the disease can not be analyzed even if the service is stored or not stored in the management server status is giving the inconvenience caused to users of the health services. In this paper, we propose a management method of health care services and a big data formation information that provides users of the disease to facilitate the users of health care services through the use magazine big data information regardless of time and place. The proposed method has the user's bio-information and the measured health information and transmits data through a wired or wireless communication to the medical institution and the user's health information data formation by the big user of the analysis of the health information and the disease of the user feedback to the user.

  • PDF

Solution for Efficient Vital Data Transmission and Storing in m-Health Environment (m-Health 환경에서 효율적인 생체 데이터 전송 및 보관을 위한 방안)

  • Lee, Seo-Joon;Cho, Gyoun-Yon;Song, Seung-Hwan;Jang, Jin-Soo;Lee, Kwang-In;Lee, Tae-Ro
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.227-235
    • /
    • 2015
  • In order to tackle healthcare expenditure problems that affects a crucial part of government finances world-wide, m-Health emerged as a solution. However, recent poor outcomes of m-Health led to the need for reform in m-Health services. Therefore the purpose of this research is to propose a solution for efficient vital data transmission and storing in m-Health environment as part of such initiative. Methods included development of an efficient system and algorithm for vital data. For results, the compression ratio of the proposed solution was compared and evaluated. Results showed a compression ratio of 30.4. The proposed system is envisioned to contribute to the future vital data monitoring system in m-Health.

An Efficient Cloud Service Quality Performance Management Method Using a Time Series Framework (시계열 프레임워크를 이용한 효율적인 클라우드서비스 품질·성능 관리 방법)

  • Jung, Hyun Chul;Seo, Kwang-Kyu
    • Journal of the Semiconductor & Display Technology
    • /
    • v.20 no.2
    • /
    • pp.121-125
    • /
    • 2021
  • Cloud service has the characteristic that it must be always available and that it must be able to respond immediately to user requests. This study suggests a method for constructing a proactive and autonomous quality and performance management system to meet these characteristics of cloud services. To this end, we identify quantitative measurement factors for cloud service quality and performance management, define a structure for applying a time series framework to cloud service application quality and performance management for proactive management, and then use big data and artificial intelligence for autonomous management. The flow of data processing and the configuration and flow of big data and artificial intelligence platforms were defined to combine intelligent technologies. In addition, the effectiveness was confirmed by applying it to the cloud service quality and performance management system through a case study. Using the methodology presented in this study, it is possible to improve the service management system that has been managed artificially and retrospectively through various convergence. However, since it requires the collection, processing, and processing of various types of data, it also has limitations in that data standardization must be prioritized in each technology and industry.

A Study on the Correlation between Job performance and Vocational abilities of People with developmental disabilities (발달장애인의 직무수행도와 직업능력의 상관관계 연구)

  • Kim, Mi-Jung
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.12
    • /
    • pp.427-434
    • /
    • 2021
  • This study was conducted to investigate the job-performance of manual wheelchair post-management and to find out the relationship between job-performance and vocational ability of people with developmental disabilities. In this study, situational evaluation and vocational evaluation were conducted for 9 subjects participated in the vocational training program about manual wheelchair post-management. The data was analyzed by non-parametric statistical processing. As a result, the job-performance was an average of 80.87%. The job-performance had a positive correlations with visual closure, kinesthetic integration, and basic concepts(p<.05). The relationship between job-performance and vocational abilities can be used as basic data for vocational training program and job assignment. It is expected to be useful of spreading the post-management job for assistive technology devices in the local community activated through the convergence of assistive technology and vocational rehabilitation.

Multi-Attribute based on Data Management Scheme in Big Data Environment (빅 데이터 환경에서 다중 속성 기반의 데이터 관리 기법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.263-268
    • /
    • 2015
  • Put your information in the object-based sensors and mobile networks has been developed that correlate with ubiquitous information technology as the development of IT technology. However, a security solution is to have the data stored in the server, what minimal conditions. In this paper, we propose a data management method is applied to a hash chain of the properties of the multiple techniques to the data used by the big user and the data services to ensure safe handling large amounts of data being provided in the big data services. Improves the safety of the data tied to the hash chain for the classification to classify the attributes of the data attribute information according to the type of data used for the big data services, functions and characteristics of the proposed method. Also, the distributed processing of big data by utilizing the access control information of the hash chain to connect the data attribute information to a geographically dispersed data easily accessible techniques are proposed.

A Study on the Important Factors for Accounting Information Quality Impact on AIS Data Quality Outcomes (회계정보 품질에 영향을 미치는 요인이 회계정보시스템 데이터 품질에 미치는 영향)

  • Kim, Kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.12
    • /
    • pp.24-29
    • /
    • 2019
  • AIS is one of the most critical systems in any organization. Data quality plays a critical role in a knowledge-based economy. The objective of this study is to identify the most important factors for accounting information quality and their impact on AIS data quality outcomes. This study includes an extensive literature review to identify a set of CSF for data quality. The study uses empirical data to test the research hypothesis and resluts show that the top three most important factors that affect AIS's data quality are toop management commitmentm the nature of the AIS and input controls. The study further uses regression analysis to test the effect of those factors on AIS data quality, finding that there is a significant positive relationship between the perceived performance of the three factors and AIS data quality putcomes. To be develop to AIS data quality further study for CSF's control methodology is necessary.

Automation technology for analyzing 3D point cloud data of construction sites

  • Park, Suyeul;Kim, Younggun;Choi, Yungjun;Kim, Seok
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.1100-1105
    • /
    • 2022
  • Denoising, registering, and detecting changes of 3D digital map are generally conducted by skilled technicians, which leads to inefficiency and the intervention of individual judgment. The manual post-processing for analyzing 3D point cloud data of construction sites requires a long time and sufficient resources. This study develops automation technology for analyzing 3D point cloud data for construction sites. Scanned data are automatically denoised, and the denoised data are stored in a specific storage. The stored data set is automatically registrated when the data set to be registrated is prepared. In addition, regions with non-homogeneous densities will be converted into homogeneous data. The change detection function is developed to automatically analyze the degree of terrain change occurred between time series data.

  • PDF

Design and Implementation of Dynamic Multicast Group Key Management Protocol for Multicast Information Security (멀티캐스트 정보 보안을 위한 동적 그룹 키 관리 프로토콜 설계 및 구현)

  • 홍종준;김태우
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.19-27
    • /
    • 2002
  • This paper proposes a group key management protocol for a secure of all the multicast user in PIM-SM multicast group communication. Each subgroup manager gives a secure key to it's own transmitter and the transmitter compress the data with it's own secure key from the subgroup manager. Before the transmitter send the data to receiver, the transmitter prepares to encrypt a user's service by sending a encryption key to the receiver though the secure channel, after checking the user's validity through the secure channel. As the transmitter sending a data after then, the architecture is designed that the receiver will decode the received data with the transmitter's group key. Therefore, transmission time is shortened because there is no need to data translation by the group key on data sending and the data transmition is possible without new key distribution at path change to shortest path of the router characteristic.

  • PDF

Design and Implementation of Dynamic Group Key Management Protocol for Multicast Information Security (전자상거래를 위한 멀티캐스트 그를 키 관리 프로토콜 설계 및 구현)

  • 홍종준;김태우
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.99-107
    • /
    • 2002
  • This paper proposes a group key management protocol for a secure of all the multicast user in PIM-SM multicast group communication under electronic commerce. Each subgroup manager gives a secure key to it's own transmitter and the transmitter compress the data with it's own secure key from the subgroup manager. Before the transmitter send the data to receiver, the transmitter prepares to encrypt a user's service by sending a encryption key to the receiver though the secure channel, after checking the user's validity through the secure channel. As the transmitter sending a data after then, the architecture is designed that the receiver will decode the received data with the transmitter's group key. Therefore, transmission time is shortened because there is no need to data translation by the group key on data sending and the data transmition is possible without new key distribution at path change to shortest path of the router characteristic.

  • PDF

Identify Management System with improved security based working time supervising (근태관리 중심으로 보안성을 향상시킨 2-Factor 인증 계정관리시스템)

  • Choi, Kyong-Ho;Kim, Jongmin;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.71-76
    • /
    • 2017
  • Today, it is an information society where a large number of users access and view important data in a large number of information assets as needed. In this complexity, techniques related Identify Management are being applied, in order to verify authorized user access to important information assets and manage of history. But, the ability access to sensitive information using account has the disadvantage of being able to open the way for information to the attacker when it is hijacked. Thus, in this paper, we propose a secure Identify Management System that can control the use of accounts based on the attitude of the account holder, but also enhances the security and does not hinder the convenience.