• Title/Summary/Keyword: Medical Security

Search Result 808, Processing Time 0.053 seconds

A Study on the Service Area Planning of Elderly Care Facilities (노인요양시설 서비스 공간 계획에 관한 연구)

  • Choi, Jong-In;Lee, Nak-Woon
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.14 no.4
    • /
    • pp.11-20
    • /
    • 2008
  • The demand of the care facilities for the elderly will be increased, because of the social changes which desire well organized medical treatment service. However, they have been illogically administrating such as preparing service at living space because of lacking places which provide living service. So the side of administration, it is necessary to have a security and improvement in that kind of needed place. The studies of elderly care facilities have been placing too much emphasis on the living space of the residential facilities and their welfare facilities compare with the service providing place which is ignored just as a part of the living space. This study focus on a situation of elderly care facilities and analyze a service space using in facilities, so it can be applied to service place plan for the future.

  • PDF

Electromagnetic Actuators for Drug Delivery Mini-Pump (약물 공급 미니펌프용 전자기 액츄에이터)

  • Cho, Doo-Hee
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2006.06a
    • /
    • pp.533-534
    • /
    • 2006
  • In this paper we propose a new model of a mini-pump with peristaltic motion and present the results of the finite element analysis of an electromagnetic micro actuator. The mini-pump consists of three diaphrams made of PDMS, three permanent magnets in cylinders, printed copper coils on glass substrates, and input and output port. The size of the mini-pump is $14\;{\times}\;40\;{\times}\;5.4$ mm3 and the permanent magnet diameter 6.2 mm $\times$ thickness 2 mm. The electromagnetic force applied on the magnet was about 0.84 N when the current of coils was 1 A, then the maximum displacement of the PDMS diaphram was about 2mm.

  • PDF

Infrared Imaging for Screening Breast Cancer Metastasis Based on Abnormal Temperature Distribution

  • Ovechkin Aleck M.;Yoon Gilwon
    • Journal of the Optical Society of Korea
    • /
    • v.9 no.4
    • /
    • pp.157-161
    • /
    • 2005
  • Medical infrared imaging is obtained by measuring the self-emitted infrared radiance from the human body. Infrared emission is related to surface temperature and temperature is one of the most important physiological parameters related to health. Though recent applications such as security identification and oriental medicine have provided new fields of biomedical applications, infrared thermography has had ups and downs in its usages in cancer detection. Some of the main difficulties include finding proper applications and efficient diagnostic algorithms. In this study, infrared thermal imaging was used to detect regional metastasis of breast cancer. Our measurements were done for 110 women. From 63 individuals of a Healthy Group and a Benign Breast Disease Group, we developed algorithms for differentiating malignant regional metastasis based on temperature difference and asymmetry of temperature distribution. Testing with 47 cancer patients, we achieved a positive predictive value of $87.5\%$ and a negative predictive value of $95.6\%$. The results were better than for mammogram examination. A proper analysis of infrared imaging proved to be a highly informative and sensitive method for differentiating regional cancer metastasis from normal regions.

Research Infrastructure Foundation for Core-technology Incubation of Radiation Detection System

  • Kim, Han Soo;Ha, Jang Ho;Kim, Young Soo;Cha, Hyung Ki
    • Journal of Radiation Industry
    • /
    • v.6 no.1
    • /
    • pp.67-73
    • /
    • 2012
  • The development of radiation detection systems mainly consist of two parts-radiation detector fabrication including material development, and its appropriate electronics development. For the core-technology incubation of a radiation detection system, radiation fabrication and an evaluation facility are scheduled to be founded at the RFT (Radiation Fusion Technology) Center at KAERI (Korea Atomic Energy Research Institute) by 2015. This facility is utilized for the development and incubation of bottleneck-technologies to accelerate the industrialization of a radiation detection system in the industrial, medical, and radiation security fields. This facility is also utilized for researchers to develop next-generation radiation detection instruments. In this paper, the establishment of core-technology development is introduced and its technological mission is addressed.

A Implementation of Blockchain based Manufacturing Supply Chain Tracking System (블록체인 기반 제조 공급망 추적 시스템 구현)

  • Lee, Jae-Ho;Nam, Ho-Ki
    • Journal of the Korea Safety Management & Science
    • /
    • v.19 no.4
    • /
    • pp.183-188
    • /
    • 2017
  • Block Chain is a technology that records and shares distributed ledgers without a central authority, providing a decentralized platform for transparent transactions in the business and enhancing transparency and traceability in all transactions to ensure trust in the transaction. Despite initial doubts about this technology, it is committed to adopting, adapting and improving the technology in a wide range of industries, including finance, government, security, logistics, food, medical, legal, and real estate. This study examines this technology, its applicability and potential benefits to the manufacturing supply chain. A tracking system of manufacturing supply chain to visualize transparency and traceability is implemented, and the conditions for adopting the technology in the manufacturing supply chain and the issues to be addressed are discussed.

Case study on the utilization of women in the Ukrainian military

  • Jong-Hoon Kim;Sang-Keun Cho;Eui-Chul Shin;In-Chan Kim;Myung-Sook Hong;Sung-Hu Kang;Sang-Hyuk Park
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.1
    • /
    • pp.153-158
    • /
    • 2023
  • Experts are concerned about the lack of troops and security vacuum due to the low birth rate in the Republic of Korea. They consider policies to expand the proportion and role of female soldiers to address these issues. In this regard, We would like to introduce the successful use of female personnel in the Ukrainian military and draw implications for the Korean military. This will provide a clue to offset the shortage of troops in the Republic of Korea.

Design and Implementation of Medical Information System using QR Code (QR 코드를 이용한 의료정보 시스템 설계 및 구현)

  • Lee, Sung-Gwon;Jeong, Chang-Won;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.2
    • /
    • pp.109-115
    • /
    • 2015
  • The new medical device technologies for bio-signal information and medical information which developed in various forms have been increasing. Information gathering techniques and the increasing of the bio-signal information device are being used as the main information of the medical service in everyday life. Hence, there is increasing in utilization of the various bio-signals, but it has a problem that does not account for security reasons. Furthermore, the medical image information and bio-signal of the patient in medical field is generated by the individual device, that make the situation cannot be managed and integrated. In order to solve that problem, in this paper we integrated the QR code signal associated with the medial image information including the finding of the doctor and the bio-signal information. bio-signal. System implementation environment for medical imaging devices and bio-signal acquisition was configured through bio-signal measurement, smart device and PC. For the ROI extraction of bio-signal and the receiving of image information that transfer from the medical equipment or bio-signal measurement, .NET Framework was used to operate the QR server module on Window Server 2008 operating system. The main function of the QR server module is to parse the DICOM file generated from the medical imaging device and extract the identified ROI information to store and manage in the database. Additionally, EMR, patient health information such as OCS, extracted ROI information needed for basic information and emergency situation is managed by QR code. QR code and ROI management and the bio-signal information file also store and manage depending on the size of receiving the bio-singnal information case with a PID (patient identification) to be used by the bio-signal device. If the receiving of information is not less than the maximum size to be converted into a QR code, the QR code and the URL information can access the bio-signal information through the server. Likewise, .Net Framework is installed to provide the information in the form of the QR code, so the client can check and find the relevant information through PC and android-based smart device. Finally, the existing medical imaging information, bio-signal information and the health information of the patient are integrated over the result of executing the application service in order to provide a medical information service which is suitable in medical field.

Design of U-Healthcare Access Authority Control Model Using Context Constrain RBAC Model (상황제한 RBAC 모델을 이용한 U-헬스케어 접근권한 제어모델 설계)

  • Kim, Chang-Bok;Kim, Nam-Il;Park, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.5
    • /
    • pp.233-242
    • /
    • 2009
  • The security of medical information need continued research about steady and flexible security model because of privacy of patient's as well as directly relation in the patient's life. In particular, u-healthcare environment is need flexible and detailed access control by variety changes of context. Control model analyzed relation of resource and authority, and analyzed authority about all accessible resource from access point using K2BASE. The context-based access control model can change flexibly authority change and role, and can obtain resource of authority granted and meaningly connected resource. As a result, this thesis can apply flexible and adaptive access control model at u-healthcare domain which context change various.

  • PDF

A Study on Conspired Insurance Fraud Detection Modeling Using Social Network Analysis

  • Kim, Tae-Ho;Lim, Jong-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.117-127
    • /
    • 2020
  • Recently, proving insurance fraud has become increasingly difficult because it occurs intentionally and secretly via organized and intelligent conspiracy by specialists such as medical personnel, maintenance companies, insurance planners, and insurance subscribers. In the case of car accidents, it is difficult to prove intentions; in particular, an insurance company with no investigation rights has practical limitations in proving the suspicions. This paper aims reveal that the detection of organized and conspired insurance fraud, which had previously been difficult, could be dramatically improved through conspiring insurance fraud detection modeling using social network analysis and visualization of the relation between suspected group entities and by seeking developmental research possibilities of data analysis techniques.

Protection Strategies Against False Data Injection Attacks with Uncertain Information on Electric Power Grids

  • Bae, Junhyung;Lee, Seonghun;Kim, Young-Woo;Kim, Jong-Hae
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.1
    • /
    • pp.19-28
    • /
    • 2017
  • False data injection attacks have recently been introduced as one of important issues related to cyber-attacks on electric power grids. These attacks aim to compromise the readings of multiple power meters in order to mislead the operation and control centers. Recent studies have shown that if a malicious attacker has complete knowledge of the power grid topology and branch admittances, s/he can adjust the false data injection attack such that the attack remains undetected and successfully passes the bad data detection tests that are used in power system state estimation. In this paper, we investigate that a practical false data injection attack is essentially a cyber-attack with uncertain information due to the attackers lack of knowledge with respect to the power grid parameters because the attacker has limited physical access to electric facilities and limited resources to compromise meters. We mathematically formulated a method of identifying the most vulnerable locations to false data injection attack. Furthermore, we suggest minimum topology changes or phasor measurement units (PMUs) installation in the given power grids for mitigating such attacks and indicate a new security metrics that can compare different power grid topologies. The proposed metrics for performance is verified in standard IEEE 30-bus system. We show that the robustness of grids can be improved dramatically with minimum topology changes and low cost.