• Title/Summary/Keyword: Defense Medical Information System

Search Result 24, Processing Time 0.024 seconds

The study on user satisfaction at Military Hospital Information System (군병원정보시스템 사용자의 만족도에 관한 연구)

  • Chung, Woo-Jin;Lee, Soo-Kyung;Shin, Seung-Ho;Cho, Woo-Hyun;Ryu, Si-Won;Lee, Sun-Mi
    • Korea Journal of Hospital Management
    • /
    • v.7 no.2
    • /
    • pp.80-98
    • /
    • 2002
  • The purpose of this study was to investigate user satisfaction at Defense Medical Information System as it has been utilized as a part of National Defense Information Strategies since Aug. 2000. The subjects of this study were nurse officers and army surgeons of a hospital with 1,000 beds. The results of this study are as follows; First, according to the characteristics of the subjects, there was statistically significant difference in system satisfaction, job satisfaction and information satisfaction at Military Hospital Information System. Second, according to the intention of participation, there was a statistically significant difference in user satisfaction at Military Hospital Information System. Third, according to a level of dexterity at Military Hospital Information System, there was statistically significant difference only in job satisfaction. Fourth, factors to influence system satisfaction were one's duty, using period of Military Hospital Information System, and a level of dexterity at Military Hospital Information System. Factors to influence job satisfaction were a level of dexterity at Military Hospital Information System, one's duty and intention of participation. Factors to influence information satisfaction were one's duty, a level of dexterity at Military Hospital Information System, and intention of participation. As the first study on user satisfaction at Military Hospital Information System, this study suggests the followings. First, a plan to inspire users with intention of participating in information system should be prepared. Second, it is necessary to provide policy activities for job standardization of Military Hospital Information System and legal system improvement.

  • PDF

Integration of Distributed Medical Information System using Staging Area (Staging 영역을 활용한 분산 의료정보시스템 통합)

  • Jeon, Young-Hee;Park, Gun-Woo;Lee, Sang-Hoon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06c
    • /
    • pp.184-188
    • /
    • 2008
  • 최근 국내 디지털 병원들이 점차 기업화 되면서 각 지역별 분산 및 독립 운영되는 의료통계 정보 활용의 중요성이 증대되고 있다. 또한 각종 연구목적 및 의료 서비스 경쟁력 향상 등을 위해 신속 정확한 의사결정지원 시스템인 데이터 웨어하우스(DW; Data Warehouse) 구축의 필요성이 대두되고 있다. 본 논문에서는 단일 병원 내의 데이터 웨어하우스가 아닌, 전국적으로 분산 운영되고 있는 병원의 다양한 의료정보를 통합하고자 한다. 따라서 Staging 영역을 활용한 분산된 의료정보시스템 통합 방안을 제시한다.

  • PDF

A Study for the design of a Mobile Medical Care System M-LIMS

  • Yang, Kyung-Sik;Koo, Kyung-Wan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.84-89
    • /
    • 2015
  • About 30% of Mongolian population is populated in the capital of the nation. Too many hospitals are concentrated in size as compared to the capital. This creates a difficult environment to provide equal distribution of medical benefit. In order to resolve this issue of medical benefit inequality, a portable/travelling medical treatment system using 'M-LIMS' is proposed for real-life application. The system with M-LIMS to be designed will include functions such as composing, sharing charts among doctors, standardizing charts. M-LIMS will be designed considering Mongol's regional characteristics, and application plans will be proposed accordingly.

A Building Method of Infrastructure Efficiency under Ad Hoc-based on Network Infrastructure for Medical Information System (Ad Hoc 기반 의료정보시스템의 네트워크 보안 효율성구조 Infrastructure 설계방법)

  • Noh, Si-Choon;Yoo, Seung-Jae
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.91-98
    • /
    • 2011
  • Medical information system based on ad hoc network designed for general information systems and information networks have different security requirements. Malicious code infiltration and security features are performed on same medical information network architecture along the route. Security domain of medical information systems is the ground of penetration and defense performed over the network architecture and it is also the traffic handling areas separated by a concept of differentiated group. Ad hoc-based medical information systems in the network security domain, set some standards about what should be the methodology of this study. In this paper, medical information system network configuration, the determining factor based on the security domain, the structure selection criteria and blocking positionings are presented according to the traffic route configuration. If you apply this methodology designed to increase security, efficiency can be possible. Health information systems in accordance with the security domain areas requires differentiated protection needs of the security mechanism that is proposed by this study.

A Study on the Explainability of Inception Network-Derived Image Classification AI Using National Defense Data (국방 데이터를 활용한 인셉션 네트워크 파생 이미지 분류 AI의 설명 가능성 연구)

  • Kangun Cho
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.2
    • /
    • pp.256-264
    • /
    • 2024
  • In the last 10 years, AI has made rapid progress, and image classification, in particular, are showing excellent performance based on deep learning. Nevertheless, due to the nature of deep learning represented by a black box, it is difficult to actually use it in critical decision-making situations such as national defense, autonomous driving, medical care, and finance due to the lack of explainability of judgement results. In order to overcome these limitations, in this study, a model description algorithm capable of local interpretation was applied to the inception network-derived AI to analyze what grounds they made when classifying national defense data. Specifically, we conduct a comparative analysis of explainability based on confidence values by performing LIME analysis from the Inception v2_resnet model and verify the similarity between human interpretations and LIME explanations. Furthermore, by comparing the LIME explanation results through the Top1 output results for Inception v3, Inception v2_resnet, and Xception models, we confirm the feasibility of comparing the efficiency and availability of deep learning networks using XAI.

A Study on the Intrustion Tolerance System Applied To the Security System

  • Shin Seung-jung;Kim Jung-tae;Ryu Dae-hyun;Na Jong-Whoa
    • Journal of information and communication convergence engineering
    • /
    • v.3 no.1
    • /
    • pp.38-42
    • /
    • 2005
  • The cyber attacks on the computer system in nowadays are focused on works that do not operate specific application. The main key point that we protect information security system has an access control to keep an application. Most of system has a main function to protect an infrastructure such as hardware, network and operating system. In this paper, we have presented an intrusion tolerance system that can service an application in spite of cyber attacks. The proposed system is based on the middle ware integrating security mechanism and separate function of application and intrusion tolerance. The main factor we use security system in nowadays is service to keep a persistency. The proposed intrusion tolerance system is applicable to such as medical, national defense and banking system.

A Study on the Intrusion Tolerance System Applied to the Object Oriented Middleware Environment

  • Shin Seung Jung;Kim Young Soo;Kim Jung Tae;Ryu Dae Hyun;Na Jong Whoa
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.693-698
    • /
    • 2004
  • The cyber attacks on the computer system in nowadays are focused on works that do not operate specific application. The main key point that we protect information security system has an access control to keep an application. Most of system has a main function to protect an infrastructure such as hardware, network and operating system. In this paper, we have presented an intrusion tolerance system that can service an application in spite of cyber attacks. The proposed system is based on the middle ware integrating security mechanism and separate function of application and intrusion tolerance. The main factor we use security system in nowadays is service to keep a persistency. The proposed intrusion tolerance system is applicable to such as medical, national defense and banking system.

  • PDF

Designing Mutual Cooperation Security Model for IP Spoofing Attacks about Medical Cluster Basis Big Data Environment (의료클러스터 기반의 빅 데이터 환경에 대한 IP Spoofing 공격 발생시 상호협력 보안 모델 설계)

  • An, Chang Ho;Baek, Hyun Chul;Seo, Yeong Geon;Jeong, Won Chang;Park, Jae Heung
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.21-29
    • /
    • 2016
  • Our society is currently exposed to environment of various information that is exchanged real time through networks. Especially regarding medical policy, the government rushes to practice remote medical treatment to improve the quality of medical services for citizens. The remote medical practice requires establishment of medical information based on big data for customized treatment regardless of where patients are. This study suggests establishment of regional medical cluster along with defense and protection cooperation models that in case service availability is harmed, and attacks occur, the attacks can be detected, and proper measures can be taken. For this, the study suggested forming networks with nationwide local government hospitals as regional virtual medical cluster bases by the same medical information system. The study also designed a mutual cooperation security model that can real time cope with IP Spoofing attack that can occur in the medical cluster and DDoS attacks accordingly, so that the limit that sole system and sole security policy have can be overcome.

An Fingerprint Authentication Model of ERM System using Private Key Escrow Management Server (개인키 위탁관리 서버를 이용한 전자의무기록 지문인증 모델)

  • Lee, Yong-Joon;Jeon, Taeyeol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.6
    • /
    • pp.1-8
    • /
    • 2019
  • Medical information is an important personal information for patients, and it must be protected. In particular, when medical personnel approach electronic medical records, authentication for enhanced security is essential. However, the existing public certificate-based certification model did not reflect the security characteristics of the electronic medical record(EMR) due to problems such as personal key management and authority delegation. In this study, we propose a fingerprint recognition-based authentication model with enhanced security to solve problems in the approach of the existing electronic medical record system. The proposed authentication model is an EMR system based on fingerprint recognition using PEMS (Private-key Escrow Management Server), which is applied with the private key commission protocol and the private key withdrawal protocol, enabling the problem of personal key management and authority delegation to be resolved at source. The performance experiment of the proposed certification model confirmed that the performance time was improved compared to the existing public certificate-based authentication, and the user's convenience was increased by recognizing fingerprints by replacing the electronic signature password.

Drug distribution management system based on IoT

  • Liu, Zeliang;Zhang, Chunmei;Peng, Hui;Xu, Qin;Gao, Yubao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.424-444
    • /
    • 2022
  • In hospitals and pharmacies, the distribution of medicines is an important part. Any mistakes, misses, fake medicines and expired medicines can cause medical accidents. With the widespread application of the Internet of Things technology (IoT), traditional drug distribution methods need to be upgraded. This article proposes a drug distribution management scheme based on the Internet of Things technology. In the production of drugs, a flexible RFID tag was printed on the packaging box, which stored a series of information such as drug name, dosage, raw materials, efficacy, production date, expiration date, and manufacturer. The use of a drug distribution management system combined with RFID readers can identify drug information and effectively prevent the occurrence of erroneous, missed, counterfeit, and expired drugs. It can also improve management efficiency, reduce management costs, and control management risks. Through the circuit design and software system development, the test results show that this solution is effective and feasible, the proposed method can achieve the expected results.