• Title/Summary/Keyword: Data Paper

Search Result 56,237, Processing Time 0.067 seconds

Comparison of Classification Rules Regarding SaMD Between the Regulation EU 2017/745 and the Directive 93/42/EEC

  • Ryu, Gyuha;Lee, Jiyoon
    • Journal of Biomedical Engineering Research
    • /
    • v.42 no.6
    • /
    • pp.277-286
    • /
    • 2021
  • The global market size of AI based SaMD for medical image in 2023 will be anticipated to reach around 620 billion won (518 million dollars). In order for Korean manufacturers to efficiently obtain CE marking for marketing in the EU countries, the paper is to introduce the recommendation and suggestion of how to reclassify SaMD based on classification rules of MDR because, after introducing the Regulation EU 2017/745, classification rules are quite modified and newly added compared to the Directive 93/42/EEC. In addition, the paper is to provide several rules of MDR that may be applicable to decide the classification of SaMD. Lastly, the paper is to examine and demonstrate various secondary data supported by qualitative data because the paper focuses on the suggestion and recommendation with a public trust on the basis of various secondary data conducted by the analysis of field data. In conclusion, the paper found that the previous classification of SaMD followed by the rule of MDD should be reclassified based on the Regulation EU 2017/745. Therefore, the suggestion and recommendation are useful for Korean manufacturers to comprehend the classification of SaMD for marketing in the EU countries.

A Design of SNS and Web Data Analysis System for Company Marketing Strategy (기업 마케팅 전략을 위한 SNS 및 Web 데이터 분석 시스템 설계)

  • Lee, ByungKwan;Jeong, EunHee;Jung, YiNa
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.6 no.4
    • /
    • pp.195-200
    • /
    • 2013
  • This paper proposes an SNS and Web Data Analytics System which can utilize a business marketing strategy by analyzing negative SNS and Web Data that can do great damage to a business image. It consists of the Data Collection Module collecting SNS and Web Data, the Hbase Module storing the collected data, the Data Analysis Module estimating and classifying the meaning of data after an semantic analysis of the collected data, and the PHS Module accomplishing an optimized Map Reduce by using SNS and Web data involved a Businesse. This paper can utilize this analysis result for a business marketing strategy by efficiently managing SNS and Web data with these modules.

A Quantitative Assessment Model for Data Governance (Data Governance 정량평가 모델 개발방법의 제안)

  • Jang, Kyoung-Ae;Kim, Woo-Je
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.42 no.1
    • /
    • pp.53-63
    • /
    • 2017
  • Managing the quantitative measurement of the data control activities in enterprise wide is important to secure management of data governance. However, research on data governance is limited to concept definitions and components, and data governance research on evaluation models is lacking. In this study, we developed a model of quantitative assessment for data governance including the assessment area, evaluation index and evaluation matrix. We also, proposed a method of developing the model of quantitative assessment for data governance. For this purpose, we used previous studies and expert opinion analysis such as the Delphi technique, KJ method in this paper. This study contributes to literature by developing a quantitative evaluation model for data governance at the early stage of the study. This paper can be used for the base line data in objective evidence of performance in the companies and agencies of operating data governance.

A Study on Data Sharing Scheme using ECP-ABSC that Provides Data User Traceability in the Cloud

  • Hwang, Yong-Woon;Kim, Taehoon;Seo, Daehee;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.12
    • /
    • pp.4042-4061
    • /
    • 2022
  • Recently, various security threats such as data leakage and data forgery have been possible in the communication and storage of data shared in the cloud environment. This paper conducted a study on the CP-ABSC scheme to solve these security threats. In the existing CP-ABSC scheme, if the data is obtained by the unsigncryption of the data user incorrectly, the identity of the data owner who uploaded the ciphertext cannot be known. Also, when verifying the leaked secret key, the identity information of the data user who leaked the secret key cannot be known. In terms of efficiency, the number of attributes can affect the ciphertext. In addition, a large amount of computation is required for the user to unsigncrypt the ciphertext. In this paper, we propose ECP-ABSC that provides data user traceability, and use it in a cloud environment to provide an efficient and secure data sharing scheme. The proposed ECP-ABSC scheme can trace and verify the identity of the data owner who uploaded the ciphertext incorrectly and the data user who leaked the secret key for the first time. In addition, the ciphertext of a constant size is output and the efficiency of the user's unsigncryption computation were improved.

Development of Big Data System for Energy Big Data (에너지 빅데이터를 수용하는 빅데이터 시스템 개발)

  • Song, Mingoo
    • KIISE Transactions on Computing Practices
    • /
    • v.24 no.1
    • /
    • pp.24-32
    • /
    • 2018
  • This paper proposes a Big Data system for energy Big Data which is aggregated in real-time from industrial and public sources. The constructed Big Data system is based on Hadoop and the Spark framework is simultaneously applied on Big Data processing, which supports in-memory distributed computing. In the paper, we focus on Big Data, in the form of heat energy for district heating, and deal with methodologies for storing, managing, processing and analyzing aggregated Big Data in real-time while considering properties of energy input and output. At present, the Big Data influx is stored and managed in accordance with the designed relational database schema inside the system and the stored Big Data is processed and analyzed as to set objectives. The paper exemplifies a number of heat demand plants, concerned with district heating, as industrial sources of heat energy Big Data gathered in real-time as well as the proposed system.

Data Fusion Algorithm based on Inference for Anomaly Detection in the Next-Generation Intrusion Detection (차세대 침입탐지에서 이상탐지를 위한 추론 기반 데이터 융합 알고리즘)

  • Kim, Dong-Wook;Han, Myung-Mook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.3
    • /
    • pp.233-238
    • /
    • 2016
  • In this paper, we propose the algorithms of processing the uncertainty data using data fusion for the next generation intrusion detection. In the next generation intrusion detection, a lot of data are collected by many of network sensors to discover knowledge from generating information in cyber space. It is necessary the data fusion process to extract knowledge from collected sensors data. In this paper, we have proposed method to represent the uncertainty data, by classifying where is a confidence interval in interval of uncertainty data through feature analysis of different data using inference method with Dempster-Shafer Evidence Theory. In this paper, we have implemented a detection experiment that is classified by the confidence interval using IRIS plant Data Set for anomaly detection of uncertainty data. As a result, we found that it is possible to classify data by confidence interval.

Data Analytics in Education : Current and Future Directions (빅데이터를 활용한 맞춤형 교육 서비스 활성화 방안연구)

  • Kwon, Young Ok
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.2
    • /
    • pp.87-99
    • /
    • 2013
  • Massive increases in data available to an organization are creating a new opportunity for competitive advantage. In this era of big data, developing analytics capabilities, therefore, becomes critical to take advantage of internal and external data and gain insights for data-driven decision making. However, the use of data in education is in its infancy, in comparison with business and government, and the potential for data analytics to impact education services is growing. In this paper, I survey how universities are currently using education data to improve students' performance and administrative efficiency, and propose new ways of extending the current use. In addition, with the so-called data scientist shortage, universities should be able to train professionals with data analytics skills. This paper discusses which skills are valuable to data scientists and introduces various training and certification programs offered by universities and industry. I finally conclude the paper by exploring new curriculums where students, by themselves, can learn how to find and use relevant data even in any courses.

Privacy-Preserving Traffic Volume Estimation by Leveraging Local Differential Privacy

  • Oh, Yang-Taek;Kim, Jong Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.19-27
    • /
    • 2021
  • In this paper, we present a method for effectively predicting traffic volume based on vehicle location data that are collected by using LDP (Local Differential Privacy). The proposed solution in this paper consists of two phases: the process of collecting vehicle location data in a privacy-presering manner and the process of predicting traffic volume using the collected location data. In the first phase, the vehicle's location data is collected by using LDP to prevent privacy issues that may arise during the data collection process. LDP adds random noise to the original data when collecting data to prevent the data owner's sensitive information from being exposed to the outside. This allows the collection of vehicle location data, while preserving the driver's privacy. In the second phase, the traffic volume is predicted by applying deep learning techniques to the data collected in the first stage. Experimental results with real data sets demonstrate that the method proposed in this paper can effectively predict the traffic volume using the location data that are collected in a privacy-preserving manner.

Adjustment of Korean Birth Weight Data (한국 신생아의 출생체중 데이터 보정)

  • Shin, Hyungsik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.259-264
    • /
    • 2017
  • Birth weight of a new born baby provides very important information in evaluating many clinical issues such as fetal growth restriction. This paper analyzes birth weight data of babies born in Korea from 2011 to 2013, and it shows that there is a biologically implausible distribution of birth weights in the data. This implies that some errors may be generated in the data collection process. In particular, this paper analyzes the relationship between gestational period and birth weight, and it is shown that the birth weight data mostly of gestational periods from 28 to 32 weeks have noticeable errors. Therefore, this paper employs the finite Gaussian mixture model to classify the collected data points into two classes: non-corrupted and corrupted. After the classification the paper removes data points that have been predicted to be corrupted. This adjustment scheme provides more natural and medically plausible percentile values of birth weights for all the gestational periods.

The prevent method of data loss due to differences in bit rate between heterogeneous IoT devices (이기종 IoT 장치간의 데이터 전송 속도 차이로 인한 데이터 손실 방지 기법)

  • Seo, Hyungyoon;Park, Jung Kyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.7
    • /
    • pp.829-836
    • /
    • 2019
  • IoT devices are widely used in network construction and are increasing. If necessary, heterogeneous IoT devices are used for data transmission. This paper proposes to prevent the method of data loss due to differences in throughput when the local network is constructed by Bluetooth 5 and long range network does by LoRa(Long Range). Data loss occur when the data transmits through LoRa, due to the throughputs of Bluetooth 5 faster than that of LoRa. The prevent method proposed by this paper can apply not only Bluetooth 5 and LoRa but heterogeneous IoT devices and expect to prevent data loss due to differences in throughput between heterogeneous IoT devices. Also, this paper shows the simulation result by applying the proposed avoid method. In this paper, two way to the preventive method shows the data transmission ratio and amount of memory that of necessity.