• Title/Summary/Keyword: Information Systems

Search Result 42,906, Processing Time 0.064 seconds

Current Status of Ophthalmic Optometry Laboratory Personnel in Korea, Japan, and the United States (한국, 일본, 미국 안과검사인력의 현황)

  • Okhwan, Jeon;Junbeom, Park;Dae Jin, Kim;Dae Eun, Kim;Cheol, Moon;Bon-Kyeong, Koo
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.54 no.4
    • /
    • pp.285-292
    • /
    • 2022
  • The education and training system, the ISCO (International Standard Classification of Occupations), and the legal systems of Japan and the United States consider all ophthalmic optometry laboratory personnel as ophthalmologists. They encompass optometrists, orthoptists, optometric technicians, and ophthalmic medical technicians. Data retrieved from the KOSIS (Korean Statistical Information Service) revealed that the number of opticians associated with the department of ophthalmology in 2022 could be appraised by classifying their medical institutions; contrarily, the number of clinical laboratory technologists could not be assessed. However, the current research investigated a general tertiary hospital and determined that clinical laboratory technologists outnumber opticians. Classification in Korea is based on ophthalmic optometry laboratory personnel, ISCO, ISCED (International Standard Classification of Education), the medical service act, the act on medical service technologists, and the higher education act. These results cannot be compared to the optometrists evaluated in the United States. Ophthalmology is a suitable profession for optometric technologists and technicians who perform under the instructions of ophthalmologists and optometrists. The field of eye healthcare would be benefitted by assigning the management based on their qualification according to the requirement of the job title, such as 'Clinical Optometry Technologist' to be given to clinical laboratory technologists and opticians who work in the ophthalmic optometry laboratories after obtaining a private qualification endowed by the Korean Ophthalmological Society and the Korean Optometry Society.

Post-Quantum Security Strength Evaluation through Implementation of Quantum Circuit for SIMECK (SIMEC 경량암호에 대한 양자회로 구현 및 Post-Quantum 보안 강도 평가)

  • Song Gyeong Ju;Jang Kyung Bae;Sim Min Joo;Seo Hwa Jeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.6
    • /
    • pp.181-188
    • /
    • 2023
  • Block cipher is not expected to be safe for quantum computer, as Grover's algorithm reduces the security strength by accelerating brute-force attacks on symmetric key ciphers. So it is necessary to check the post-quantum security strength by implementing quantum circuit for the target cipher. In this paper, we propose the optimal quantum circuit implementation result designed as a technique to minimize the use of quantum resources (qubits, quantum gates) for SIMECK lightweight cryptography, and explain the operation of each quantum circuit. The implemented SIMECK quantum circuit is used to check the estimation result of quantum resources and calculate the Grover attack cost. Finally, the post-quantum strength of SIMECK lightweight cryptography is evaluated. As a result of post-quantum security strength evaluation, all SIMECK family cipher failed to reach NIST security strength. Therefore, it is expected that the safety of SIMECK cipher is unclear when large-scale quantum computers appear. About this, it is judged that it would be appropriate to increase the block size, the number of rounds, and the key length to increase the security strength.

Developing an Occupants Count Methodology in Buildings Using Virtual Lines of Interest in a Multi-Camera Network (다중 카메라 네트워크 가상의 관심선(Line of Interest)을 활용한 건물 내 재실자 인원 계수 방법론 개발)

  • Chun, Hwikyung;Park, Chanhyuk;Chi, Seokho;Roh, Myungil;Susilawati, Connie
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.43 no.5
    • /
    • pp.667-674
    • /
    • 2023
  • In the event of a disaster occurring within a building, the prompt and efficient evacuation and rescue of occupants within the building becomes the foremost priority to minimize casualties. For the purpose of such rescue operations, it is essential to ascertain the distribution of individuals within the building. Nevertheless, there is a primary dependence on accounts provided by pertinent individuals like building proprietors or security staff, alongside fundamental data encompassing floor dimensions and maximum capacity. Consequently, accurate determination of the number of occupants within the building holds paramount significance in reducing uncertainties at the site and facilitating effective rescue activities during the golden hour. This research introduces a methodology employing computer vision algorithms to count the number of occupants within distinct building locations based on images captured by installed multiple CCTV cameras. The counting methodology consists of three stages: (1) establishing virtual Lines of Interest (LOI) for each camera to construct a multi-camera network environment, (2) detecting and tracking people within the monitoring area using deep learning, and (3) aggregating counts across the multi-camera network. The proposed methodology was validated through experiments conducted in a five-story building with the average accurary of 89.9% and the average MAE of 0.178 and RMSE of 0.339, and the advantages of using multiple cameras for occupant counting were explained. This paper showed the potential of the proposed methodology for more effective and timely disaster management through common surveillance systems by providing prompt occupancy information.

Prospect of Sustainable Organic Tea Farming in Lwang, Kaski, Nepa (네팔 르왕지역의 지속적 유기농차 재배 방향)

  • Chang, K.J.;Huang, D.S.;Park, C.H.;Jeon, U.S.;Jeon, S.H.;Binod, Basnet.
    • Journal of Practical Agriculture & Fisheries Research
    • /
    • v.12 no.1
    • /
    • pp.137-150
    • /
    • 2010
  • Traditionally, like many people in mountain region of the Himalaya, the Lwang communities depend on mix of subsistence agriculture, animal husbandry, and seasonal migrant labor for their livelihoods. These traditional systems are characterized by low productivity, diverse use of available natural resources (largely for home consumption), limited markets, and some aversion for innovation. The potential to generate wealth through commerce has largely been untapped by these mountain residents and thus is undervalued in local and national economies. Introduction of organic tea farming is a part of Lwang community's several initiatives to break the vicious poverty cycle Annapurna Conservation Area Project (ACAP) played facilitating roles in all their efforts since beginning. In five years, the tea plantation emerged as a new means for secured a livelihood. This study aims to analyze the current practices in tea farming both in terms of farm management and soil nutrient status(technical) and the prosperity of the tea farmers (social). The technical aspect covers the soil and tea leaf analysis of various nutrients contents in the soil and tea leaf. Originally, the technical aspect of the study was not planned but later during the consultation with the advisor it was taken into consideration which added value to the research study. The sample were collected from different locations and analyzed on the field itself. The other part of the study i.e. the social aspect was done through questionnaire survey and focus group discussion. the tea farming provided them not only a new opportunity but also earned an identity in the region. This initiative was undertaken as a piloting measure. Now that the tea is in production with processing unit established locally, more serious consideration has to be given for better yield and economic prosperity. This research finding will help the community to analyze their efforts and make correction measures in tea garden management and application of fertilizer. It is also expected to fill up the gaps of knowledge and information required to reduce economic stresses and enhance capacity of farmers to make the tea farming a sustainable and beneficial business. The findings are expected to Sustainability of organic tea farming has direct impacts on biodiversity conservation compared to the other traditional farming practices that are more resource intensive. The study will also contribute to identify key action points required for reducing poverty while conserving environment and enhancing livelihoods

On the Analysis of Transportation System in Mokpo Port (목포항 운송시스템의 분석에 관한 연구)

  • Nam, M.U.;Lee, C.Y.
    • Journal of Korean Port Research
    • /
    • v.11 no.2
    • /
    • pp.321-337
    • /
    • 1997
  • Rapid change in the technological environment of marine transportation and the development of the ocean shipping industry have fostered a revolution in the port system. This in turn has caused major changes in the function and use of port in Korea. Aside from this. Mokpo Port, however continues to decline, because the existing port facilities and related subsystem are already obsolete with no chance of regaining operational effectiveness and treatment for proper implementation. Although a few studies have been done on the Mokpo Port, has not been found, any reseach for the analytical approach to the transportation system of it. This paper aims to make an extensive analysis of the physical distribution system in Mokpo Port focusing on the coordination of subsystems such as navigational aids system, quay handling and transfer system, storage system and inland transport system. The base of introduced simulation tool here is the queueing theory. The overall findings are as follows; 1. Among those vessels called at Mokpo Port in 1994, the average size of oceangoing vessels is 4,922.1 G/T, and the domestic is 317.8 G/T. The average arrival interval and service time of the domestic vessels are 6.0 hours and 24.1 hours respectively marking the berth occupation rate over 100%. Those for oceangoing vessels are 34.5 hours, 120.0 hours and 37.2%. In order to maintainin the berth occupation rate to 70% the capacity considering the 1994 of domestic piers must be extended to 145% and oceangoing vessels must be increased to 165% year called. 2. The capacity of approaching channel is enough to handle the total traffic volume. 3. Tugs are sufficiently being provided to handle all ships requiring their services 4. The capacity of storage and inland transportation systems are sufficient to handle the throughput and the yard stroage utilization rate of No.1 $\cdots$ No.5 is 4.5% and No.6 1S 30% of 1993's. 5. The utilization rate of LLc(Level Looping Crane) and PNT(PNeumaTic) are 2.7% and 18.8%, respectively. Practical solution and proposal for improvement of Transportation System in Mokpo Port are as follows; 1. To avoid the congestion in domestic pier introduction of a new port operation system is necessary allowing the domestic vessel to use the oceangoing pier. 2. To establish the port management information system to improve the efficiency of port operation. 3. To build a new storage system for high valued cargos including modernization of the present storage and handling system. 4. To insure the safety of navigation in approaching channel, The Vessel Traffic System including separation scheme is introduced. 5. To interest enormously on public relation to ship owner's association, shippers and consignees by showing that they can save cost and ship turnaround time in order to promote the call to Mokpo Port. At last, to be strategically change the function of Mokpo Port to the Leisure, Fishing & Ferry as well as Maritime port.

  • PDF

Understanding User Perception of Generative AI and Copyright of AI-Generated Outputs: focusing on differences by user group (생성 AI와 AI 창작물 저작권에 대한 사용자의 인식 연구: 사용자 그룹의 차이를 중심으로)

  • Dahye Choi;Jungyong Kim;Daeun Han;Changhoon Oh
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.777-786
    • /
    • 2023
  • Generative AI systems are expected to be more widely utilized. However, relatively little attention has been paid to understanding how users perceive and accept generative AI results. To identify strategies for increasing the future use of generative AI and prepare for potential issues, we organized design workshop for the general user group and the designer group. They created artwork utilizing Novel AI and semi-structured interview was followed to evaluate their attitudes toward generative AI and its copyright. Results indicate that the general public views generative AI positively, while the design-related group views it quite negatively. The participants expressed concerns as to the misuse the system, specifically related to copyright issues. People who are likely to utilize generative AI outcomes have insisted more strongly that copyrights should be their own. Those working in the design field highly evaluated the possibility of using generative AI in their work. Copyright perceptions were not significantly influenced by users' satisfaction or their level of involvement in the creation process. We discuss design implications for interfaces using generative AI based on the findings.

Preprocessing Technique for Malicious Comments Detection Considering the Form of Comments Used in the Online Community (온라인 커뮤니티에서 사용되는 댓글의 형태를 고려한 악플 탐지를 위한 전처리 기법)

  • Kim Hae Soo;Kim Mi Hui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.3
    • /
    • pp.103-110
    • /
    • 2023
  • With the spread of the Internet, anonymous communities emerged along with the activation of communities for communication between people, and many users are doing harm to others, such as posting aggressive posts and leaving comments using anonymity. In the past, administrators directly checked posts and comments, then deleted and blocked them, but as the number of community users increased, they reached a level that managers could not continue to monitor. Initially, word filtering techniques were used to prevent malicious writing from being posted in a form that could not post or comment if a specific word was included, but they avoided filtering in a bypassed form, such as using similar words. As a way to solve this problem, deep learning was used to monitor posts posted by users in real-time, but recently, the community uses words that can only be understood by the community or from a human perspective, not from a general Korean word. There are various types and forms of characters, making it difficult to learn everything in the artificial intelligence model. Therefore, in this paper, we proposes a preprocessing technique in which each character of a sentence is imaged using a CNN model that learns the consonants, vowel and spacing images of Korean word and converts characters that can only be understood from a human perspective into characters predicted by the CNN model. As a result of the experiment, it was confirmed that the performance of the LSTM, BiLSTM and CNN-BiLSTM models increased by 3.2%, 3.3%, and 4.88%, respectively, through the proposed preprocessing technique.

A Study on IP Camera Security Issues and Mitigation Strategies (IP 카메라 보안의 문제점 분석 및 보완 방안 연구)

  • Seungjin Shin;Jungheum Park;Sangjin Lee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.3
    • /
    • pp.111-118
    • /
    • 2023
  • Cyber attacks are increasing worldwide, and attacks on personal privacy such as CCTV and IP camera hacking are also increasing. If you search for IP camera hacking methods in spaces such as YouTube, SNS, and the dark web, you can easily get data and hacking programs are also on sale. If you use an IP camera that has vulnerabilities used by hacking programs, you easily get hacked even if you change your password regularly or use a complex password including special characters, uppercase and lowercase letters, and numbers. Although news and media have raised concerns about the security of IP cameras and suggested measures to prevent damage, hacking incidents continue to occur. In order to prevent such hacking damage, it is necessary to identify the cause of the hacking incident and take concrete measures. First, we analyzed weak account settings and web server vulnerabilities of IP cameras, which are the causes of IP camera hacking, and suggested solutions. In addition, as a specific countermeasure against hacking, it is proposed to add a function to receive a notification when an IP camera is connected and a function to save the connection history. If there is such a function, the fact of damage can be recognized immediately, and important data can be left in arresting criminals. Therefore, in this paper, we propose a method to increase the safety from hacking by using the connection notification function and logging function of the IP camera.

Development and Validation of AI Image Segmentation Model for CT Image-Based Sarcopenia Diagnosis (CT 영상 기반 근감소증 진단을 위한 AI 영상분할 모델 개발 및 검증)

  • Lee Chung-Sub;Lim Dong-Wook;Noh Si-Hyeong;Kim Tae-Hoon;Ko Yousun;Kim Kyung Won;Jeong Chang-Won
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.3
    • /
    • pp.119-126
    • /
    • 2023
  • Sarcopenia is not well known enough to be classified as a disease in 2021 in Korea, but it is recognized as a social problem in developed countries that have entered an aging society. The diagnosis of sarcopenia follows the international standard guidelines presented by the European Working Group for Sarcopenia in Older People (EWGSOP) and the d Asian Working Group for Sarcopenia (AWGS). Recently, it is recommended to evaluate muscle function by using physical performance evaluation, walking speed measurement, and standing test in addition to absolute muscle mass as a diagnostic method. As a representative method for measuring muscle mass, the body composition analysis method using DEXA has been formally implemented in clinical practice. In addition, various studies for measuring muscle mass using abdominal images of MRI or CT are being actively conducted. In this paper, we develop an AI image segmentation model based on abdominal images of CT with a relatively short imaging time for the diagnosis of sarcopenia and describe the multicenter validation. We developed an artificial intelligence model using U-Net that can automatically segment muscle, subcutaneous fat, and visceral fat by selecting the L3 region from the CT image. Also, to evaluate the performance of the model, internal verification was performed by calculating the intersection over union (IOU) of the partitioned area, and the results of external verification using data from other hospitals are shown. Based on the verification results, we tried to review and supplement the problems and solutions.

An Improvement of Kubernetes Auto-Scaling Based on Multivariate Time Series Analysis (다변량 시계열 분석에 기반한 쿠버네티스 오토-스케일링 개선)

  • Kim, Yong Hae;Kim, Young Han
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.3
    • /
    • pp.73-82
    • /
    • 2022
  • Auto-scaling is one of the most important functions for cloud computing technology. Even if the number of users or service requests is explosively increased or decreased, system resources and service instances can be appropriately expanded or reduced to provide services suitable for the situation and it can improves stability and cost-effectiveness. However, since the policy is performed based on a single metric data at the time of monitoring a specific system resource, there is a problem that the service is already affected or the service instance that is actually needed cannot be managed in detail. To solve this problem, in this paper, we propose a method to predict system resource and service response time using a multivariate time series analysis model and establish an auto-scaling policy based on this. To verify this, implement it as a custom scheduler in the Kubernetes environment and compare it with the Kubernetes default auto-scaling method through experiments. The proposed method utilizes predictive data based on the impact between system resources and response time to preemptively execute auto-scaling for expected situations, thereby securing system stability and providing as much as necessary within the scope of not degrading service quality. It shows results that allow you to manage instances in detail.