• Title/Summary/Keyword: Medical Security

Search Result 808, Processing Time 0.059 seconds

Development of High Resolution Iris Camera Module using IoT Device (IoT 디바이스를 활용한 고해상도 홍채 카메라 모듈 개발)

  • Seo, Jin-beom;Cho, Young-bok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.3
    • /
    • pp.371-377
    • /
    • 2020
  • Currently used iris cameras are expensive and have many limitations in their use. Existing iris cameras are inconvenient in interworking with newly developed software, and light reflections generated during iris photography are inadequate for medical use. Therefore, it is impossible to utilize the existing camera to take an image by yourself. In this paper, the iris camera is newly constructed so that the iris can be photographed by ourselves and the area of interest can be seen well. Anyone can easily wear glasses-type iris cameras to acquire images using IoT devices, and the acquired images are linked to the iris analysis program and used to read genetic weak parts. The proposed iris camera module automatically provides light reflection, shake, and accurate focus when capturing images, increasing the accuracy of image analysis to 91.49%. In addition, we have proved through experiments that one image processing time is fast as 0.007ms due to accurate image input.

Socio-economic factors affecting unmet dental care in the elderly: a comparative study on the status of living alone (한국노인의 미충족치과의료 경험에 영향을 미치는 사회경제적 요인 : 독거여부에 따른 비교연구)

  • Kim, Young-Sil;Seo, Hye-Won
    • Journal of Korean society of Dental Hygiene
    • /
    • v.20 no.6
    • /
    • pp.809-817
    • /
    • 2020
  • Objectives: This study aimed to analyze the relationship between socioeconomic factors and the unmet dental care needs of the living alone and living with family elderly groups to confirm the differences in their influence. Methods: Data from the Korea Health Panel Study of 2016 were used to analyze a total of 4,987 individuals: 4,008 in living with family group and 979 in living alone group. Chi-square test and multiple logistic regression analyses were performed using SPSS Version 22 (p<0.05). Results: We observed that 16.5% and 28.3% of the participants from the living with family and living alone groups had unmet dental care needs, respectively, indicating that the living alone group had more unmet dental care needs. Income level, residential area, and healthcare security were significant factors related to the living with family group. In contrast, medical aid for healthcare security was a significant factor related to the living alone group (p<0.05). Conclusions: The results confirmed that socioeconomic factors that affect unmet dental care vary according to the living situation. Therefore, the government should identify the number of elderly individuals living alone, which is increasing annually. These individuals are vulnerable in almost all aspects, and the government should establish and implement appropriate oral healthcare policies to support them.

Information Technologies of Accounting and Analysis in Modern Companies

  • Yaremenko, Liudmyla;Hevchuk, Anna;Vuzh, Tetiana;Vashchilina, Elena;Yermolaieva, Maryna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.151-159
    • /
    • 2021
  • This article addresses the issue of finding optimal solutions using the information technologies of accounting and analysis in modern companies. The aim of the study is to reveal available information technologies for the needs of small, medium and large businesses operating in modern conditions. This goal is achieved by using systematization, comparison, and analysis of information, obtained under the survey and open management statistics. For the first time, the paper systematizes up-to-date information of 2021 about the most popular programs, online services, platforms and cloud services that are used to improve accounting and analytical processes in enterprises of various sizes. The main global trends in software development in terms of COVID-19 pandemic have been identified. In particular, the study defines the countries that occupy the leading positions in the informatization of business processes. An attempt was made to classify information technologies by their use by various volume of businesses. The analysis of research results of the Internet search query frequency regarding the use of information technologies enabled to determine the most popular software products worldwide. The peculiarities of information technologies, their advantages and disadvantages were examined and the common and distinctive features were compared. It was determined that for the new enterprises to implement information technologies, it is necessary to conduct a step-by-step study of all available software products. The software evaluation algorithm was described to help select the optimal software for the specific business processes. The paper also describes the way to solve the problem of using accounting and analysis software for the businesses of a specific kind of activity.

Reversible Data Hiding Technique using Encryption Technique and Spatial Encryption Technique (암호화 기법 및 공간적인 암호화 기법을 사용한 가역 데이터 은닉기법)

  • Jung, Soo-Mok
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.632-639
    • /
    • 2021
  • In this paper, we proposed a reversible data hiding technique that greatly enhances the security of confidential data by encrypting confidential data and then spatially encrypting the encrypted confidential data and hiding it in the cover image. When a result image is generated by hiding the encrypted confidential data in the cover image using a spatial encryption technique, the quality of the result image is very good, and the original cover image and the result image cannot be visually distinguished. Since the encrypted confidential data is spatially encrypted and concealed, it is not possible to know where the encrypted confidential data is concealed in the result image, and the encrypted confidential data cannot be extracted from the result image. Even if the encrypted confidential data is extracted, the original confidential data is not known because the confidential data is encrypted. Therefore, if confidential data is concealed in images using the proposed technique, the security of confidential data is greatly improved. The proposed technique can be effectively used in medical and military applications.

A Case Study of the Implementation and Verification of VLAN-applied Network Based on a Five-step Scenario (5단계 시나리오에 기반한 VLAN이 적용된 네트워크 구현 및 검증 사례연구)

  • Kim, No-Whan;Park, Jin-Seob
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.1
    • /
    • pp.25-36
    • /
    • 2021
  • This paper presents a topology based on packet tracer and a five-step scenario model to make it easier for students to understand the network on which VLANs are applied. Virtual LAN (VLAN), developed as an alternative solution to the Routers that distribute broadcast traffic, is a virtual local area network that logically configured regardless of the physical network. The VLAN prevents the network performance degradation resulting from the broadcast traffic by dividing the broadcast domain so that the bandwidth can be used more efficiently. In addition, it enhances the security because on communication between the devices belonging to different VLANs is impossible. The five-step scenarios in this paper presented an efficient implementation case for students to understand and validate the various functions of VLANs through ping/telnet/tracert test and simulation, after setting up each step of programming switches and routers in the virtual network.

The Mechanism of the Investment Resources Involvement in Order to Introduce Innovations at Enterprises in the Conditions of Digitalization

  • Karpenko, Oksana;Bonyar, Svitlana;Tytykalo, Volodymyr;Belianska, Yuliia;Savchenko, Serhii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.81-88
    • /
    • 2021
  • The presented scientific research substantiates the principles of the mechanism of the investment resources involvement in order to introduce innovations at enterprises in the context of digitalization using a resource-functional approach. The importance of attracting investment resources, which contributes to the modernization of production systems, the creation of a stable economic field of development of economic entities, is justified. The expediency of application of the resource-functional approach on research of the mechanism of attraction of investment resources for introduction of innovations at the enterprises in the conditions of digitalization is proved. The investment process is presented in the form of a chain of interdependent processes which include: attraction of investment resources, investments, increase of investment value, profit. It is proved that the mechanism of attracting investment resources for the introduction of innovations in enterprises in the context of digitalization cannot be considered in isolation from the process, due to the fact that the mechanism is aimed at performing specific functions. The functions of the mechanism include management, complex, coordination, monitoring, performance and control functions. Functions of the mechanism of attraction of investment resources for introduction of innovations at the enterprises in the conditions of digitalization are caused by the purposes of attraction of investment resources for innovative development; the presence of an objective nature; relative independence and homogeneity; implementation of functions in the process of investing in innovative activities of the enterprise.

Information Support of the Educational Process in the Development of Leadership Potential of Modern University in the Conditions of Distance Learning

  • Viznyuk, Inessa;Rokosovyk, Nataliia;Vytrykhovska, Oksana;Paslawska, Alla;Bielikova, Olena;Radziievska, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.209-216
    • /
    • 2022
  • The modern development of higher education in Ukraine is the result of two main factors. One of them - the factor of social progress - reflects the transformations inherent in modern Ukrainian society. These include, first of all, the processes of democratization and the development of civic responsibility. European the choice of Ukraine, the integration of our state into the European space determine accordingly, the second factor influencing the development of domestic higher education - the trends that guide the progress of the European Higher Education Area (European Higher Education Area (hereinafter - EHEA) and the European Research Area Research Area, hereinafter - ERA). The strategy of information support of the educational process (approved by the European Commission in 2010) recognizes the leading role of higher education as a driver of social progress, accordingly states the priority - the development of free economic education and identifies indicators of such progress - the achievement and international attractiveness of European free economic education. The information support of modernization challenges in higher education are aimed at the educational process, the leadership position of students, in particular through promotion and implementation of leading achievements and best practices in the context of globalization.

The Role of Education Information in Training Specialists at Universities in the USA, Great Britain and Ukraine

  • Mamchych, Olena;Chornobryva, Natalia;Karskanova, Svitlana;Vlasenko, Karina;Syroiezhko, Olha;Zorochkina, Tetiana;Chychuk, Antonina
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.43-50
    • /
    • 2022
  • A comparative analysis of the state and results of the functioning of the education system of Ukraine with the national educational systems of the USA and Great Britain was carried out. Based on which we found out similar and different in the process of developing the system of training specialists in higher education institutions of the USA, Great Britain, and Ukraine. Describing the main quantitative indicators of education in the UK, USA and Ukraine, we found common features and distinctive features. Consideration in the comparative aspect of trends in the development of higher teacher education in the United States, Great Britain and in Ukraine gives grounds for conclusion. For these countries, such groups of norms as types of educational institutions, forms of Education; introduction of a unified system of credit units in order to create conditions for broad mobility of students; availability of different levels of training; study of the best experience of educational activities of other states and its introduction into the educational process in combination with the cultural traditions of Ukraine coincide. Describing the main quantitative indicators of education in the analyzed countries, we found distinctive features.Teacher development systems in the UK, USA and Ukraine are compared. It was found out that the use of methods of Great Britain and the United States on the organization of independent work in the process of professional development of teachers will have a positive impact on training in the system of advanced training of teachers in Ukraine. The article examines the information culture of future specialists, which is based on knowledge about the information environment, the laws of its functioning and development, and the perfect ability to navigate the limitless modern world of information.

The Development of a Dormitory Management System Using the Ubiquitous and Automation Technology (유비쿼터스와 자동화 기술을 이용한 기숙사 관리 시스템 개발)

  • Jang, Jae-Hyuk;Sim, Gab-Sig
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.2
    • /
    • pp.1-8
    • /
    • 2009
  • Today the use of RFID is extended in medical. circulation market, manufacture, security field, etc. Besides, the book-lending and the attendance management system are on an increasing trend in the use of RFID The developed dormitory management system is composed of a support program, a room management program, a manager program, and a mobile program etc.. In the support program a student(or a manager) can see his(or all member's) entrance and exit history. The room management program decides whether a student can enter the dormitory or not and manages the use of the power after or inquiring a RFID's input tag information into database server. The manager program is able to input and modify a room state and the fixtures information in the room required to operate the room management program, to set up and retrieve a student's entrance and exit information and a room state information. The mobile program enables a manager to check student's identity whether he is in or out, and the manager can know the personal information of being out in detail.

A Deep Learning Approach for Covid-19 Detection in Chest X-Rays

  • Sk. Shalauddin Kabir;Syed Galib;Hazrat Ali;Fee Faysal Ahmed;Mohammad Farhad Bulbul
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.125-134
    • /
    • 2024
  • The novel coronavirus 2019 is called COVID-19 has outspread swiftly worldwide. An early diagnosis is more important to control its quick spread. Medical imaging mechanics, chest calculated tomography or chest X-ray, are playing a vital character in the identification and testing of COVID-19 in this present epidemic. Chest X-ray is cost effective method for Covid-19 detection however the manual process of x-ray analysis is time consuming given that the number of infected individuals keep growing rapidly. For this reason, it is very important to develop an automated COVID-19 detection process to control this pandemic. In this study, we address the task of automatic detection of Covid-19 by using a popular deep learning model namely the VGG19 model. We used 1300 healthy and 1300 confirmed COVID-19 chest X-ray images in this experiment. We performed three experiments by freezing different blocks and layers of VGG19 and finally, we used a machine learning classifier SVM for detecting COVID-19. In every experiment, we used a five-fold cross-validation method to train and validated the model and finally achieved 98.1% overall classification accuracy. Experimental results show that our proposed method using the deep learning-based VGG19 model can be used as a tool to aid radiologists and play a crucial role in the timely diagnosis of Covid-19.