• Title/Summary/Keyword: Information Security Check

Search Result 297, Processing Time 0.025 seconds

Using CR System at the Department of Radiation Oncology PACS Evaluation (방사선 종양학과에서 CR System을 이용한 PACS 유용성 평가)

  • Hong, Seung-Il;Kim, Young-Jae
    • Journal of the Korean Society of Radiology
    • /
    • v.6 no.2
    • /
    • pp.143-149
    • /
    • 2012
  • Today each hospital is trend that change rapidly by up to date, digitization and introducing newest medical treatment equipment. So, we introduce new CR system and supplement film system's shortcoming and PACS, EMR, RTP system's network that is using in hospital harmoniously and accomplish quality improvement of medical treatment and service elevation about business efficiency enlargement and patient Accordingly, we wish to introduce our case that integrate reflex that happen with radiation oncology here upon to PACS using CR system and estimate the availability. We measured that is Gantry, Collimator Star Shot, Light vs. Radiation, HDR QA(Dwell position accuracy) with Medical LINAC(MEVATRON-MX) Then, PACS was implemented on the digital images on the monitor that can be confirmed through the QA. Also, for cooperation with OCS system that is using from present source and impose code that need in treatment in each treatment, did so that Order that connect to network, input to CR may appear, did so that can solve support data mistake (active Pinacle's case supports DICOM3 file from present source but PACS does not support DICOM3 files.) of Pinacle and PACS that is Planning System and look at Planning premier in PACS. All image and data constructed integration to PACS as can refer and conduct premier in Hospital anywhere using CR system. Use Dosimetry IP in Filmless environment and QA's trial such as Light/Radition field size correspondence, gantry rotation axis' accuracy, collimator rotation axis' accuracy, brachy therapy's Dwell position check is available. Business efficiency by decrease and so on of unnecessary human strength consumption was augmented accordingly with session shortening as that integrate premier that is neted with radiation oncology using CR system to PACS. and for the future patient information security is essential.

The Changing Aspects of North Korea's Terror Crimes and Countermeasures : Focused on Power Conflict of High Ranking Officials after Kim Jong-IL Era (북한 테러범죄의 변화양상에 따른 대응방안 -김정일 정권 이후 고위층 권력 갈등을 중심으로)

  • Byoun, Chan-Ho;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.185-215
    • /
    • 2014
  • Since North Korea has used terror crime as a means of unification under communism against South Korea, South Korea has been much damaged until now. And the occurrence possibility of terror crime by North Korean authority is now higher than any other time. The North Korean terror crimes of Kim Il Sung era had been committed by the dictator's instruction with the object of securing governing fund. However, looking at the terror crimes committed for decades during Kim Jung Il authority, it is revealed that these terror crimes are expressed as a criminal behavior because of the conflict to accomplish the power and economic advantage non powerful groups target. This study focused on the power conflict in various causes of terror crimes by applying George B. Vold(1958)'s theory which explained power conflict between groups became a factor of crime, and found the aspect by ages of terror crime behavior by North Korean authority and responding plan to future North Korean terror crime. North Korean authority high-ranking officials were the Labor Party focusing on Juche Idea for decades in Kim Il Sung time. Afterwards, high-ranking officials were formed focusing on military authorities following Military First Policy at the beginning of Kim Jung Il authority, rapid power change has been done for recent 10 years. To arrange the aspect by times of terror crime following this power change, alienated party executives following the support of positive military first authority by Kim Jung Il after 1995 could not object to forcible terror crime behavior of military authority, and 1st, 2nd Yeongpyeong maritime war which happened this time was propelled by military first authority to show the power of military authority. After 2006, conservative party union enforced censorship and inspection on the trade business and foreign currency-earning of military authority while executing drastic purge. The shooting on Keumkangsan tourists that happened this time was a forcible terror crime by military authority following the pressure of conservative party. After October, 2008, first military reign union executed the launch of Gwanmyungsung No.2 long-range missile, second nuclear test, Daechung marine war, and Cheonanham attacking terror in order to highlight the importance and role of military authority. After September 2010, new reign union went through severe competition between new military authority and new mainstream and new military authority at this time executed highly professionalized terror crime such as cyber/electronic terror unlike past military authority. After July 2012, ICBM test launch, third nuclear test, cyber terror on Cheongwadae homepage of new mainstream association was the intention of Km Jung Eun to display his ability and check and adjust the power of party/military/cabinet/ public security organ, and he can attempt the unexpected terror crime in the future. North Korean terror crime has continued since 1980s when Kim Jung Il's power succession was carried out, and the power aspect by times has rapidly changed since 1994 when Kim Il Sung died and the terror crime became intense following the power combat between high-ranking officials and power conflict for right robbery. Now South Korea should install the specialized department which synthesizes and analyzes the information on North Korean high-ranking officials and reinforce the comprehensive information-collecting system through the protection and management of North Korean defectors and secret agents in order to determine the cause of North Korean terror crime and respond to it. And South Korea should participate positively in the international collaboration related to North Korean terror and make direct efforts to attract the international agreement to build the international cooperation for the response to North Korean terror crime. Also, we should try more to arrange the realistic countermeasure against North Korean cyber/electronic terror which was more diversified with the expertise terror escaping from existing forcible terror through enactment/revision of law related to cyber terror crime, organizing relevant institute and budget, training professional manpower, and technical development.

  • PDF

A Comparative Study on the Effective Deep Learning for Fingerprint Recognition with Scar and Wrinkle (상처와 주름이 있는 지문 판별에 효율적인 심층 학습 비교연구)

  • Kim, JunSeob;Rim, BeanBonyka;Sung, Nak-Jun;Hong, Min
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.17-23
    • /
    • 2020
  • Biometric information indicating measurement items related to human characteristics has attracted great attention as security technology with high reliability since there is no fear of theft or loss. Among these biometric information, fingerprints are mainly used in fields such as identity verification and identification. If there is a problem such as a wound, wrinkle, or moisture that is difficult to authenticate to the fingerprint image when identifying the identity, the fingerprint expert can identify the problem with the fingerprint directly through the preprocessing step, and apply the image processing algorithm appropriate to the problem. Solve the problem. In this case, by implementing artificial intelligence software that distinguishes fingerprint images with cuts and wrinkles on the fingerprint, it is easy to check whether there are cuts or wrinkles, and by selecting an appropriate algorithm, the fingerprint image can be easily improved. In this study, we developed a total of 17,080 fingerprint databases by acquiring all finger prints of 1,010 students from the Royal University of Cambodia, 600 Sokoto open data sets, and 98 Korean students. In order to determine if there are any injuries or wrinkles in the built database, criteria were established, and the data were validated by experts. The training and test datasets consisted of Cambodian data and Sokoto data, and the ratio was set to 8: 2. The data of 98 Korean students were set up as a validation data set. Using the constructed data set, five CNN-based architectures such as Classic CNN, AlexNet, VGG-16, Resnet50, and Yolo v3 were implemented. A study was conducted to find the model that performed best on the readings. Among the five architectures, ResNet50 showed the best performance with 81.51%.

Performance Status of Sanitary Management of School Food Service in the Jeonnam Area (전남지역 학교급식의 위생관리 실태)

  • 고무석;정난희;이전옥
    • Korean Journal of Human Ecology
    • /
    • v.7 no.1
    • /
    • pp.51-67
    • /
    • 2004
  • This study analyzed the effects of nutrition technicians' hygiene education on cooking workers' performance of hygiene management in order to ensure the security of school meals. The situation of cooking workers' disposition in subject schools was elementary school(51.1%) and middle school(48.9%) and the type of meals was rural area type(54.2%), urban type(36.5%). and island and isolated area type(9.3%). The methods of meals management were single cooking(88.2%) and joint cooking and management(11.8%). The type of distributing meals was distributing in a dining room(93.5%), in a classroom(3.7%), and in both dining room and classroom(2.8%). Nutrition technicians' employment form included regular(53.5%) and daily(88.2%). Their education was junior college graduate(50.2%), university graduate(44.8%). and graduate school students(5.0%). Cooking workers' employment form included daily(88.2%) and regular (11.1%). suggesting that most were regular. Most cooking workers(77.4%) had at least high school certificate. Regarding the situation of cooking workers' disposition in subject schools, the number of student per one cooking worker was found as 91-120(37.2%), 61-90(22.6%). 60 and under(21.l %). 121-15006.7%). and 151 and over(2.5%). Cooking workers' level of performance of hygiene management was post-working stage(66.37/75 marks), pre-working stage(64.22/75 marks). and working stage(20.34/25 marks), The counting of meals articles in a pre-working stage(20.34/25 marks). temperature and required time in a working stage(18.78/25 marks), and machinery equipment and hygiene in a pre-working stage(21.40/25 marks) showed lowest of performance, which suggest poor service of hygiene. Cooking workers' performance of hygiene management by working stage showed the significant difference with school class(p<.001), type of schools with meals(p<.05). state of cooking workers' employment(p<.001), and cooking worker's disposition(p<.05). A working stage showed the significant difference with type of schools with meals(p<.05). A post-working stage showed the significant difference according to type of schools with meals(p<.05), and the methods of meals management(p<.05), and cooking workers' disposition(p<.05). In the execution of hygiene education, individual hygiene was highest(94.8%), followed by the management of machinery equipment and tools(89.7%), food poisoning and microorganism(94.7%), and the method of food treatment(76.4%). A yearly plan of hygiene education included established(83.9%) and not established(l6.1%). Regular education included not executed(25.1%), 2-3 times a month(l6.1%), and more than 4 a month(4.0%) and occasional education was not executed(57.0%), 1-3 times a month(26.3%), and more than 4 a month(l5.7%). In the methods for hygiene education, oral education(95.7%) was used most, followed by demonstration(10.5%), poster/photo(10.5%), video/slide(3.7%), and computer(3.7%). Frequency of improvement and complement of hygiene education included once a month(56.3%), once a year(20.7%), by quarter(l1.5%), and every six months(1l.5%). Newspaper was used most in materials of hygiene education, followed by internet, TV, nutrition technician's reeducation, information exchange between members, educational office's training, and reference book, and educational office's material. and symposium. Cooking workers' assessment of the effect of hygiene education was conducted through observation(56.8%), check table(l5.2%), question(l4.0%), and examination(14.0%). The reason of cooking workers' low level of performance included habitual custom(53.9%), lack of understanding(20.4%), overwork(l4.6%), and lack of knowledge(l1.l%) and the reason of difficulty in hygiene education included lack of time(55.3%), lack of understanding(27.6%), lack of knowledge and information(8.7%), and lack of budget(48.0%).

  • PDF

Multi-Category Sentiment Analysis for Social Opinion Related to Artificial Intelligence on Social Media (소셜 미디어 상에서의 인공지능 관련 사회적 여론에 대한 다 범주 감성 분석)

  • Lee, Sang Won;Choi, Chang Wook;Kim, Dong Sung;Yeo, Woon Young;Kim, Jong Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.4
    • /
    • pp.51-66
    • /
    • 2018
  • As AI (Artificial Intelligence) technologies have been swiftly evolved, a lot of products and services are under development in various fields for better users' experience. On this technology advance, negative effects of AI technologies also have been discussed actively while there exists positive expectation on them at the same time. For instance, many social issues such as trolley dilemma and system security issues are being debated, whereas autonomous vehicles based on artificial intelligence have had attention in terms of stability increase. Therefore, it needs to check and analyse major social issues on artificial intelligence for their development and societal acceptance. In this paper, multi-categorical sentiment analysis is conducted over online public opinion on artificial intelligence after identifying the trending topics related to artificial intelligence for two years from January 2016 to December 2017, which include the event, match between Lee Sedol and AlphaGo. Using the largest web portal in South Korea, online news, news headlines and news comments were crawled. Considering the importance of trending topics, online public opinion was analysed into seven multiple sentimental categories comprised of anger, dislike, fear, happiness, neutrality, sadness, and surprise by topics, not only two simple positive or negative sentiment. As a result, it was found that the top sentiment is "happiness" in most events and yet sentiments on each keyword are different. In addition, when the research period was divided into four periods, the first half of 2016, the second half of the year, the first half of 2017, and the second half of the year, it is confirmed that the sentiment of 'anger' decreases as goes by time. Based on the results of this analysis, it is possible to grasp various topics and trends currently discussed on artificial intelligence, and it can be used to prepare countermeasures. We hope that we can improve to measure public opinion more precisely in the future by integrating empathy level of news comments.

A Study on the Practice of Performance Assessment in the Elementary School Mathematics - Focussing on Self-assessment and Peer-observation - (초등학교 수학과 수행평가 실천에 관한 연구 - 자기평가.동료평가.관찰평가를 중심으로 -)

  • Kim Song-Ja;Choi Chang-Woo
    • Journal of Elementary Mathematics Education in Korea
    • /
    • v.10 no.1
    • /
    • pp.67-87
    • /
    • 2006
  • This study is to recognize a problem in the practice of performance assessment in elementary school, and to find out some suggestive points for improvement of teaching·learning method in elementary mathematics through assessment by reducing time restriction according to assessment through the practice of self-assessment, peer-assessment and observation, and then by reflecting the results of assessment on teaching learning plan. For that, the questions of study set up are as follows ; 1. How should self-assessment and peer-assessment be applied to in elementary mathematics assessment? 2. How should the time for 'let's play an interesting game' be managed for assessment of elementary mathematics? 3. How should the results of assessment be reflected on the Process of teaching and learning of mathematics? To solve these problems, a researcher of this thesis performed self-assessment, peer-assessment on 40 students of second grade under her charge as a class teacher, and applied observation in the time management process for 'let's play an interesting game' for a semester. self-assessment was made by mathematics journal, self-assessment chart, peer-assessment was by the analysis of conversation record among students in the situations of assessment, and observation was by observation of activity when playing with the results data of play analyzed. the concrete methods of application as follows ; First, mathematics journal was applied $1{\sim}2$ times by each unit with reconstruction into the level of second grade on the basis of the preceding-study models. Second, peer-assessment was applied to the unit-assessment time and the play-activities time by the method of recording·analyzing the contents of conversation among students in the process of assessment. Third, mathematical attitude & dispositions of students making use of the self- assessment table were examined referring to the teaching learning plan. Fourth, the time management for 'let's play an interesting game' was made through the prior recognition of play method and the joyful play-activities by use of the play-plate. Assessment depended on analysis of play-activities results of students making use of an observation form. Fifth, the results of self-assessment, peer-assessment, and observation were analyzed, and then they were made use of as self-observation data, of teacher her/his self, or teaching·learning improvement data. Students' self-assessment datum (mathematics diary, self-assessment sheets, conversation contents in the process of assessment) and observation materials (check lists, Play-activity result materials, conversation contents in the process of play) obtained in the process of application was analyzed as follows ; 1. From the practice of self-assessment in form of mathematics journal, I could obtain not only datum showing how much students was understanding the learning aims by unit time and to any degree they reached but also information about their response to learning datum and favorable type of learning. 2. Assessment by self-assessment chart was useful in planning the mathematics teaching learning process because it helps ascertain mathematical attitude & dispositions of students. 3. Through the application of peer-assessment, students had the opportunity of communicating with other students looking back on his/her explaining process, and teachers could obtain basic materials for assessment of students. 4, In case of time management for 'let's play an interesting game', there was natural extension of play made through time-security by prior looking into the method of play-activity, and then, for a remained time, by making children play a new game. 5, I could easily record the activities of students by use of the observation. form, and make use of it as basic data for descriptive assessment. 6, Each kinds of data obtained from the results of assessment was helpful for securing self-observation materials in the process of teaching learning and for their betterment in mathematics subject. However, because they were in the second grade of elementary school and there was an individual difference, some students could not make use of mathematics diary or self-assessment form properly. In case of these students, assessment data would be obtained through interview or observation. And for effective operation of play, its purpose & method and matters that demand special attention when play-acting should be clearly guided. Also, when applying an effective play in addition to play activities in textbook, to lessons, interesting mathematics lessons could be guided.

  • PDF

A Study on the Establishment of Comparison System between the Statement of Military Reports and Related Laws (군(軍) 보고서 등장 문장과 관련 법령 간 비교 시스템 구축 방안 연구)

  • Jung, Jiin;Kim, Mintae;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.109-125
    • /
    • 2020
  • The Ministry of National Defense is pushing for the Defense Acquisition Program to build strong defense capabilities, and it spends more than 10 trillion won annually on defense improvement. As the Defense Acquisition Program is directly related to the security of the nation as well as the lives and property of the people, it must be carried out very transparently and efficiently by experts. However, the excessive diversification of laws and regulations related to the Defense Acquisition Program has made it challenging for many working-level officials to carry out the Defense Acquisition Program smoothly. It is even known that many people realize that there are related regulations that they were unaware of until they push ahead with their work. In addition, the statutory statements related to the Defense Acquisition Program have the tendency to cause serious issues even if only a single expression is wrong within the sentence. Despite this, efforts to establish a sentence comparison system to correct this issue in real time have been minimal. Therefore, this paper tries to propose a "Comparison System between the Statement of Military Reports and Related Laws" implementation plan that uses the Siamese Network-based artificial neural network, a model in the field of natural language processing (NLP), to observe the similarity between sentences that are likely to appear in the Defense Acquisition Program related documents and those from related statutory provisions to determine and classify the risk of illegality and to make users aware of the consequences. Various artificial neural network models (Bi-LSTM, Self-Attention, D_Bi-LSTM) were studied using 3,442 pairs of "Original Sentence"(described in actual statutes) and "Edited Sentence"(edited sentences derived from "Original Sentence"). Among many Defense Acquisition Program related statutes, DEFENSE ACQUISITION PROGRAM ACT, ENFORCEMENT RULE OF THE DEFENSE ACQUISITION PROGRAM ACT, and ENFORCEMENT DECREE OF THE DEFENSE ACQUISITION PROGRAM ACT were selected. Furthermore, "Original Sentence" has the 83 provisions that actually appear in the Act. "Original Sentence" has the main 83 clauses most accessible to working-level officials in their work. "Edited Sentence" is comprised of 30 to 50 similar sentences that are likely to appear modified in the county report for each clause("Original Sentence"). During the creation of the edited sentences, the original sentences were modified using 12 certain rules, and these sentences were produced in proportion to the number of such rules, as it was the case for the original sentences. After conducting 1 : 1 sentence similarity performance evaluation experiments, it was possible to classify each "Edited Sentence" as legal or illegal with considerable accuracy. In addition, the "Edited Sentence" dataset used to train the neural network models contains a variety of actual statutory statements("Original Sentence"), which are characterized by the 12 rules. On the other hand, the models are not able to effectively classify other sentences, which appear in actual military reports, when only the "Original Sentence" and "Edited Sentence" dataset have been fed to them. The dataset is not ample enough for the model to recognize other incoming new sentences. Hence, the performance of the model was reassessed by writing an additional 120 new sentences that have better resemblance to those in the actual military report and still have association with the original sentences. Thereafter, we were able to check that the models' performances surpassed a certain level even when they were trained merely with "Original Sentence" and "Edited Sentence" data. If sufficient model learning is achieved through the improvement and expansion of the full set of learning data with the addition of the actual report appearance sentences, the models will be able to better classify other sentences coming from military reports as legal or illegal. Based on the experimental results, this study confirms the possibility and value of building "Real-Time Automated Comparison System Between Military Documents and Related Laws". The research conducted in this experiment can verify which specific clause, of several that appear in related law clause is most similar to the sentence that appears in the Defense Acquisition Program-related military reports. This helps determine whether the contents in the military report sentences are at the risk of illegality when they are compared with those in the law clauses.