• Title/Summary/Keyword: Digitally Vulnerable

Search Result 7, Processing Time 0.021 seconds

An User-Friendly Kiosk System Based on Deep Learning (딥러닝 기반 사용자 친화형 키오스크 시스템)

  • Su Yeon Kang;Yu Jin Lee;Hyun Ah Jung;Seung A Cho;Hyung Gyu Lee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.29 no.1
    • /
    • pp.1-13
    • /
    • 2024
  • This study aims to provide a customized dynamic kiosk screen that considers user characteristics to cope with changes caused by increased use of kiosks. In order to optimize the screen composition according to the characteristics of the digital vulnerable group such as the visually impaired, the elderly, children, and wheelchair users, etc., users are classified into nine categories based on real-time analysis of user characteristics (wheelchair use, visual impairment, age, etc.). The kiosk screen is dynamically adjusted according to the characteristics of the user to provide efficient services. This study shows that the system communication and operation were performed in the embedded environment, and the used object detection, gait recognition, and speech recognition technologies showed accuracy of 74%, 98.9%, and 96%, respectively. The proposed technology was verified for its effectiveness by implementing a prototype, and through this, this study showed the possibility of reducing the digital gap and providing user-friendly "barrier-free kiosk" services.

A Study on Integrity Protection of Edge Computing Application Based on Container Technology (컨테이너 기술을 활용한 엣지 컴퓨팅 환경 어플리케이션 무결성 보호에 대한 연구)

  • Lee, Changhoon;Shin, Youngjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1205-1214
    • /
    • 2021
  • Edge Computing is used as a solution to the cost problem and transmission delay problem caused by network bandwidth consumption that occurs when IoT/CPS devices are integrated into the cloud by performing artificial intelligence (AI) in an environment close to the data source. Since edge computing runs on devices that provide high-performance computation and network connectivity located in the real world, it is necessary to consider application integrity so that it is not exploited by cyber terrorism that can cause human and material damage. In this paper, we propose a technique to protect the integrity of edge computing applications implemented in a script language that is vulnerable to tampering, such as Python, which is used for implementing artificial intelligence, as container images and then digitally signed. The proposed method is based on the integrity protection technology (Docker Contents Trust) provided by the open source container technology. The Docker Client was modified and used to utilize the whitelist for container signature information so that only containers allowed on edge computing devices can be operated.

App Development and Usability Evaluation for Caregivers (돌봄 제공자를 위한 디지털 돌봄 앱 개발 및 사용성 평가)

  • Jongchan, Park;Jaegook Kim;Euijae Chung;Changsun Ahn;Bongsu Jung;Youngjoo Kim
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.11
    • /
    • pp.337-346
    • /
    • 2023
  • There is a need to develop an app for a caregiver health management that can provide continuous management in response to changes over time, because elderly people have low digital utilization capabilities, difficulty maintaining regular and continuous self-management. Based on this need, this study designed an app with a user-friendly UI and simple structure for the elderly. The app developed in this study supports regular management of health data such as blood pressure, blood sugar, and heart rate, as well as specific information on physical, disease, cognitive, communication, and environment in the care field. The app developed in this study supports care services by automatically entering data through integration with health management devices, automatically analyzing and visually representing recorded data to understand trends and volatility, and adding scalability to connect with various health management and medical support platforms. The effectiveness and satisfaction of the developed app were confirmed to be significant in the field verification results.

The Evaluation of Crime Prevention Environment for Cultural Heritage using the 3D Visual Exposure Index (3D 시각노출도를 이용한 문화재 범죄예방환경의 평가)

  • Kim, Choong-Sik
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.35 no.1
    • /
    • pp.68-82
    • /
    • 2017
  • Strengthening surveillance, one of the most important factors in the crime prevention environment of cultural heritages, has difficulty in evaluating and diagnosing the site. For this reasons, surveillance enhancement has been assessed by modelling the shape of cultural heritage, topography, and trees digitally. The purpose of this study is to develop the evaluation method of crime prevention environment for cultural heritage by using the 3D visual exposure index (3DVE) which can quantitatively evaluate the surveillance enhancement in three dimensions. For the study, the evaluation factors were divided into natural, organizational, mechanical, and integrated surveillance. To conduct the analysis, the buildings, terrain, walls, and trees of the study site were modeled in three dimensions and the analysis program was developed by using the Unity 3D. Considering the working area of the person, it is possible to analyze the surveillance point by dividing it into the head and the waist position. In order to verify the feasibility of the 3DVE as the analysis program, we assessed the crime prevention environment by digitally modeling the Donam Seowon(Historic Site No. 383) located in Nonsan. As a result of the study, it was possible to figure out the problems of patrol circulation, the blind spot, and the weak point in natural, mechanical, and organizational surveillance of Donam Seowon. The results of the 3DVE were displayed in 3D drawings, so that the position and object could be identified clearly. Surveillance during the daytime is higher in the order of natural, mechanical, and organizational surveillance, while surveillance during the night is higher in the order of organizational, mechanical, and natural surveillance. The more the position of the work area becomes low, the more it is easy to be shielded, so it is necessary to evaluate the waist position. It is possible to find out and display the blind spot by calculating the surveillance range according to the specification, installation location and height of CCTV. Organizational surveillance, which has been found to be complementary to mechanical surveillance, needs to be analyzed at the vulnerable time when crime might happen. Furthermore, it is note that the analysis of integrated surveillance can be effective in examining security light, CCTV, patrol circulation, and other factors. This study was able to diagnose the crime prevention environment by simulating the actual situation. Based on this study, consecutive researches should be conducted to evaluate and compare alternatives to design the crime prevention environment.

Digital Stress of Consumers in Using Digital Goods (디지털 제품 관련 소비자 스트레스에 관한 연구)

  • Kim, Jung-Eun;Yeo, Jung-Sung
    • Journal of Families and Better Life
    • /
    • v.25 no.3 s.87
    • /
    • pp.119-135
    • /
    • 2007
  • The purpose of this study is to find out the level of digital stress that people experience and to investigate the effects of socio-economic variables on that. To collect data, structured questionnaire was developed and 1,200 questionnaires were distributed through internet. There were 2 dimensions in this study to examine digital stress. First dimension was about the devices themselves: computers and the other digital goods. Second dimension was about the time digital stress occurring in consumers' decision-making process: purchasing and using. Based on Yeo&Kim(2004), sub-dimensions of purchasing and using aspects were chosen. 5 sub-dimensions in purchasing side were new technology, cost, variety of alternatives, warranty service, and informational problem 6 sub-dimensions in using field were mal(or impaired)-functioning. physical aspects, immaturity in use, pressure to use, addiction to use, and informational problem. As independent variables, sex, age, educational level, digitalization acceptability and computer usability were used. The overall level of digital stress was around the average point which was not as high as expected. Digital stress of purchasing was higher than that of using. First, in purchasing aspects, the level of digital stress was relatively high in cost, variety of alternatives and warranty service. Hence, clear communications with consumers about the distinctive aspects and cost of digital devices in market are needed. Secondly, in using side, mal-functioning and physical aspects were relatively more powerful stressors. In the other words, the more serious problems were not from the characteristics of individual consumers but from those of products. Producers should put their best efforts to reduce imperfection (defectiveness) and develop user-friendly digital devices. Also, users' individual efforts to overcome the problems that can be solved privately are necessary. Finally, it was discovered that sex and computer usability were very important variables on digital stress. To extend computer usability of consumers and get over digital illiteracy, it is essential to expand the paths to give chances for people to contact with computers and other digital goods. Still there are lots of people whore computer-illiterate or low-skilled at computers. In policies or educational programs made by government, communities, or schools, more attention should be paid to the digitally vulnerable groups.

Application of Spatial Data Integration Based on the Likelihood Ratio Function nad Bayesian Rule for Landslide Hazard Mapping (우도비 함수와 베이지안 결합을 이용한 공간통합의 산사태 취약성 분석에의 적용)

  • Chi, Kwang-Hoon;Chung, Chang-Jo F.;Kwon, Byung-Doo;Park, No-Wook
    • Journal of the Korean earth science society
    • /
    • v.24 no.5
    • /
    • pp.428-439
    • /
    • 2003
  • Landslides, as a geological hazard, have caused extensive damage to property and sometimes result in loss of life. Thus, it is necessary to assess vulnerable areas for future possible landslides in order to mitigate the damage they cause. For this purpose, spatial data integration has been developed and applied to landslide hazard mapping. Among various models, this paper investigates and discusses the effectiveness of the Bayesian spatial data integration approach to landslide hazard mapping. In this study, several data sets related to landslide occurrences in Jangheung, Korea were constructed using GIS and then digitally represented using the likelihood ratio function. By computing the likelihood ratio, we obtained quantitative relationships between input data and landslide occurrences. The likelihood ratio functions were combined using the Bayesian combination rule. In order for predicted results to provide meaningful interpretations with respect to future landslides, we carried out validation based on the spatial partitioning of the landslide distribution. As a result, the Bayesian approach based on a likelihood ratio function can effectively integrate various spatial data for landslide hazard mapping, and it is expected that some suggestions in this study will be helpful to further applications including integration and interpretation stages in order to obtain a decision-support layer.

Lung Biopsy after Localization of Pulmonary Nodules with Hook Wire (Hook Wire를 이용한 폐결절의 위치선정 및 생검)

  • Kim, Jin-Sik;Hwang, Jae-Joon;Lee, Song-Am;Lee, Woo-Surng;Kim, Yo-Han;Kim, Jun-Seok;Chee, Hyun-Keun;Yi, Jeong-Geun
    • Journal of Chest Surgery
    • /
    • v.43 no.6
    • /
    • pp.681-686
    • /
    • 2010
  • Background: A chest computed-tomography has become more prevalent so that it is more common to detect small sized pulmonary nodules that have not been found in previous simple chest x-ray. If those detected nodules are undersized or located in pulmonary parenchyma, it is difficult to accomplish a biopsy since it is vulnerable to explore them either grossly or digitally. Thus, in our hospital, a thoracoscopic pulmonary wedge resection was performed after locating a lesion by means of hook wire with CT-guided. Material and Method: 31 patients (17 males and 14 female patients) from December in 2006 to June in 2010 became our subjects; their 34 pulmonary nodules were subjected to the thoracoscopic pulmonary wedge resection after locating a lesion by means of hook wire with CT-guided. Also we analyzed a possibility of hook wire dislocation, a frequency of conversion to open thoracotomy, time consumed to operation after location of a lesion, operation time, post operation complication, and histological diagnosis of the lesion. Result: 12 of 34 cases were ground glass lesion, whereas 22 cases of them were solitary pulmonary lesion. The median value of the lesion was 8mm in size (range: 3 to 23 mm), while the median value was 12.5 mm in depth (range: 1 to 34 mm). The median value of time consumed from location of the lesion to anesthetic induction was 86.5 minutes (41~473 minutes); furthermore the mean value of operation time was 103 minutes (25~345 minutes). Intrathoracic wire dislocation was found in one case, but a target lesion was successfully excised. Open thoracotomy was performed in four cases due to pleural adhesion. However, there was no case of conversion to open thoracotomy due to failure to detect a target lesion. In histological diagnosis, metastatic cancer were found in 15 cases, which were the most common, primary lung cancer were in 9 cases, non-specific inflammation were in 3 cases, tuberculosis inflammation were in 2 cases, lymph nodes were in 2 cases, active tuberculosis were in 1 case, atypical adenomatous hyperplasia was in 1 case and normal lung parenchymal finding was in 1 case, respectively. Conclusion: In our hospital, in order to accomplish a precise histological diagnosis of ground-glass lesion and pulmonary nodules in lung parenchyma, location of pulmonary nodules were exactly located with hook wire under chest computed-tomography, which was followed by lung biopsy. We concluded that this was an accurate, minimally invasive and valuable method to minimize the complications and increase of cost of medical service provided.