• Title/Summary/Keyword: Medical Security

Search Result 808, Processing Time 0.027 seconds

An Analysis of Impact on the Quality of Life for Chronic Patients based Big Data (빅데이터 기반 만성질환자의 삶의 질에 미치는 영향분석)

  • Kim, Min-kyoung;Cho, Young-bok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1351-1356
    • /
    • 2019
  • The purpose of this study is to investigate the effect of personal factors and community factors on the quality of life based on the presence of chronic patients based on the Big Data Platform. As a method of study, second data of 2017 community health survey and Statistics Korea by City·Gun·Gu public office were used and a multi-level analysis was conducted after separating EQ-5D index, individual factor and community factor. As a result, men, age, education level, monthly household income, having economic activity, the number of sports infrastructure were positively associated with the quality of life, and subjective health not good, extremely perceived stress were negatively associated with the quality of life. Research will continue to provide a platform independent of hardware that can utilize the cloud and open source for medical big data analysis in the future.

Development of X-Ray Array Detector Signal Processing System (X-Ray 어레이 검출 모듈 신호처리 시스템 개발)

  • Lim, Ik-Chan;Park, Jong-Won;Kim, Young-Kil;Sung, So-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1298-1304
    • /
    • 2019
  • Since the 9·11 terror attack in 2001, the Maritime Logistics Security System has been strengthened and required X-ray image for every imported cargos from manufacturing countries to United States. For scanning cargos, the container inspection systems use high energy X-rays for examination of contents of a container to check the nuclear, explosive, dangerous and illegal materials. Nowadays, the X-ray cargo scanners are established and used by global technologies for inspection of suspected cargos in the customs agency but these technologies have not been localized and developed sufficiently. In this paper, we propose the X-ray array detector system which is a core component of the container scanning system. For implementation of X-ray array detector, the analog and digital signal processing units are fabricated with integrated hardware, FPGA logics and GUI software for real-time X-ray images. The implemented system is superior in terms of resolution and power consumption compared to the existing products currently used in ports.

A study on the Establishment of a Digital Healthcare Next-Generation Information Protection System

  • Kim, Ki-Hwan;Choi, Sung-Soo;Kim, Il-Hwan;Shin, Yong-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.7
    • /
    • pp.57-64
    • /
    • 2022
  • In this paper, the definition and overview of digital health care that has emerged recently, core technology, and We would like to propose a plan to establish a next-generation information protection system that can protect digital healthcare devices and data from cyber attacks. Various vulnerabilities exist for digital healthcare devices and data, and cyber attacks are possible for those vulnerabilities. Through an attack on digital health care devices and information and communication networks, it can directly adversely affect human life and health, Since digital healthcare data contains sensitive and personal information, it is essential to safely protect it from cyber attacks. In the case of this proposal, for continuous safe management of data and cyber attacks on equipment and communication networks for digital health devices, It is expected to be able to respond more effectively and continuously through the establishment of the next-generation information protection system.

Analysis of Korea's Artificial Intelligence Competitiveness Based on Patent Data: Focusing on Patent Index and Topic Modeling (특허데이터 기반 한국의 인공지능 경쟁력 분석 : 특허지표 및 토픽모델링을 중심으로)

  • Lee, Hyun-Sang;Qiao, Xin;Shin, Sun-Young;Kim, Gyu-Ri;Oh, Se-Hwan
    • Informatization Policy
    • /
    • v.29 no.4
    • /
    • pp.43-66
    • /
    • 2022
  • With the development of artificial intelligence technology, competition for artificial intelligence technology patents around the world is intensifying. During the period 2000 ~ 2021, artificial intelligence technology patent applications at the US Patent and Trademark Office have been steadily increasing, and the growth rate has been steeper since the 2010s. As a result of analyzing Korea's artificial intelligence technology competitiveness through patent indices, it is evaluated that patent activity, impact, and marketability are superior in areas such as auditory intelligence and visual intelligence. However, compared to other countries, overall Korea's artificial intelligence technology patents are good in terms of activity and marketability, but somewhat inferior in technological impact. While noise canceling and voice recognition have recently decreased as topics for artificial intelligence, growth is expected in areas such as model learning optimization, smart sensors, and autonomous driving. In the case of Korea, efforts are required as there is a slight lack of patent applications in areas such as fraud detection/security and medical vision learning.

A Comparative Analysis of Research Trends in the Information and Communication Technology Field of South and North Korea Using Data Mining

  • Jiwan Kim;Hyunkyoo Choi;Jeonghoon Mo
    • Journal of Information Science Theory and Practice
    • /
    • v.11 no.1
    • /
    • pp.14-30
    • /
    • 2023
  • The purpose of this study is to compare research trends in the information and communication technology (ICT) field between North and South Korea and analyze the differences by using data mining. Frequency analysis, clustering, and network analysis were performed using keywords from seven South Korean and two North Korean ICT academic journals published for five years (2015-2019). In the case of South Korea (S. Korea), the frequency of research on image processing and wireless communication was high at 16.7% and 16.3%, respectively. North Korea (N. Korea) had a high frequency of research, in the order of 18.2% for image processing, 16.9% for computer/Internet applications/security, and 16.4% for industrial technology. N. Korea's natural language processing (NLP) sector was 11.9%, far higher than S. Korea's 0.7 percent. Student education is a unique subject that is not clustered in S. Korea. In order to promote exchanges between the two Koreas in the ICT field, the following specific policies are proposed. Joint research will be easily possible in the image processing sector, with the highest research rate in both Koreas. Technical cooperation of medical images is required. If S. Korea's high-quality image source is provided free of charge to N. Korea, research materials can be enriched. In the field of NLP, it calls for proposing exchanges such as holding a Korean language information conference, developing a Korean computer operating system. The field of student education encourages support for remote education contents and management know-how, as well as joint research on student remote evaluation.

Stacked Sparse Autoencoder-DeepCNN Model Trained on CICIDS2017 Dataset for Network Intrusion Detection (네트워크 침입 탐지를 위해 CICIDS2017 데이터셋으로 학습한 Stacked Sparse Autoencoder-DeepCNN 모델)

  • Lee, Jong-Hwa;Kim, Jong-Wouk;Choi, Mi-Jung
    • KNOM Review
    • /
    • v.24 no.2
    • /
    • pp.24-34
    • /
    • 2021
  • Service providers using edge computing provide a high level of service. As a result, devices store important information in inner storage and have become a target of the latest cyberattacks, which are more difficult to detect. Although experts use a security system such as intrusion detection systems, the existing intrusion systems have low detection accuracy. Therefore, in this paper, we proposed a machine learning model for more accurate intrusion detections of devices in edge computing. The proposed model is a hybrid model that combines a stacked sparse autoencoder (SSAE) and a convolutional neural network (CNN) to extract important feature vectors from the input data using sparsity constraints. To find the optimal model, we compared and analyzed the performance as adjusting the sparsity coefficient of SSAE. As a result, the model showed the highest accuracy as a 96.9% using the sparsity constraints. Therefore, the model showed the highest performance when model trains only important features.

Performance Comparison for Exercise Motion classification using Deep Learing-based OpenPose (OpenPose기반 딥러닝을 이용한 운동동작분류 성능 비교)

  • Nam Rye Son;Min A Jung
    • Smart Media Journal
    • /
    • v.12 no.7
    • /
    • pp.59-67
    • /
    • 2023
  • Recently, research on behavior analysis tracking human posture and movement has been actively conducted. In particular, OpenPose, an open-source software developed by CMU in 2017, is a representative method for estimating human appearance and behavior. OpenPose can detect and estimate various body parts of a person, such as height, face, and hands in real-time, making it applicable to various fields such as smart healthcare, exercise training, security systems, and medical fields. In this paper, we propose a method for classifying four exercise movements - Squat, Walk, Wave, and Fall-down - which are most commonly performed by users in the gym, using OpenPose-based deep learning models, DNN and CNN. The training data is collected by capturing the user's movements through recorded videos and real-time camera captures. The collected dataset undergoes preprocessing using OpenPose. The preprocessed dataset is then used to train the proposed DNN and CNN models for exercise movement classification. The performance errors of the proposed models are evaluated using MSE, RMSE, and MAE. The performance evaluation results showed that the proposed DNN model outperformed the proposed CNN model.

Development of Cloud-Based Telemedicine Platform for Acute Intracerebral Hemorrhage in Gangwon-do : Concept and Protocol

  • Hyo Sub Jun;Kuhyun Yang;Jongyeon Kim;Jin Pyeong Jeon;Jun Hyong Ahn;Seung Jin Lee;Hyuk Jai Choi;Jong Wook Choi;Sung Min Cho;Jong-Kook Rhim
    • Journal of Korean Neurosurgical Society
    • /
    • v.66 no.5
    • /
    • pp.488-493
    • /
    • 2023
  • We aimed to develop a cloud-based telemedicine platform for patients with intracerebral hemorrhage (ICH) at local hospitals in rural and underserved areas in Gangwon-do using artificial intelligence and non-face-to-face collaboration treatment technology. This is a prospective and multi-center development project in which neurosurgeons from four university hospitals in Gangwon-do will participate. Information technology experts will verify and improve the performance of the cloud-based telemedicine collaboration platform while treating ICH patients in the actual medical field. Problems identified will be resolved, and the function, performance, security, and safety of the telemedicine platform will be checked through an accredited certification authority. The project will be carried out over 4 years and consists of two phases. The first phase will be from April 2022 to December 2023, and the second phase will be from April 2024 to December 2025. The platform will be developed by dividing the work of the neurosurgeons and information technology experts by setting the order of items through mutual feedback. This article provides information on a project to develop a cloud-based telemedicine platform for acute ICH patients in Gangwon-do.

Study on the Improvement of the Radiation Work Field Classification System in Republic of Korea (국내 방사선종사자 피폭 분류체계 개선에 관한 연구)

  • Su-Hui Park;Ji-Young Han;Yong-Min Kim
    • Journal of the Korean Society of Radiology
    • /
    • v.17 no.2
    • /
    • pp.267-275
    • /
    • 2023
  • Occupational exposure records are subject of global interest, and analysis of radiation workers in work categories is being conducted. In Rep. of Korea, according to relevant ministries, the MOHW(Ministry of Health and Welfare), the MAFRA(Ministry of Agriculture, Food and Rural Affairs), and the NSSC(Nuclear Safety and Security Commission) collect and analyze records of occupational exposure by dividing them into 11 work categories. However, this classification system lacks consistency with the systems of major countries, including the UNSCEAR(United Nations Scientific Committee on the Effects of Atomic Radiation). The domestic radiation work field classification system does not have clear classification criteria and does not reflect the characteristics of the radiation work field. Through the analysis of the classification system of the UNSCEAR, we suggested the five main categories(nuclear cycle, medical, industrial, others(education/research, military/public) field and several sub-categories according to each radiation work field.

Energy-efficient intrusion detection system for secure acoustic communication in under water sensor networks

  • N. Nithiyanandam;C. Mahesh;S.P. Raja;S. Jeyapriyanga;T. Selva Banu Priya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1706-1727
    • /
    • 2023
  • Under Water Sensor Networks (UWSN) has gained attraction among various communities for its potential applications like acoustic monitoring, 3D mapping, tsunami detection, oil spill monitoring, and target tracking. Unlike terrestrial sensor networks, it performs an acoustic mode of communication to carry out collaborative tasks. Typically, surface sink nodes are deployed for aggregating acoustic phenomena collected from the underwater sensors through the multi-hop path. In this context, UWSN is constrained by factors such as lower bandwidth, high propagation delay, and limited battery power. Also, the vulnerabilities to compromise the aquatic environment are in growing numbers. The paper proposes an Energy-Efficient standalone Intrusion Detection System (EEIDS) to entail the acoustic environment against malicious attacks and improve the network lifetime. In EEIDS, attributes such as node ID, residual energy, and depth value are verified for forwarding the data packets in a secured path and stabilizing the nodes' energy levels. Initially, for each node, three agents are modeled to perform the assigned responsibilities. For instance, ID agent verifies the node's authentication of the node, EN agent checks for the residual energy of the node, and D agent substantiates the depth value of each node. Next, the classification of normal and malevolent nodes is performed by determining the score for each node. Furthermore, the proposed system utilizes the sheep-flock heredity algorithm to validate the input attributes using the optimized probability values stored in the training dataset. This assists in finding out the best-fit motes in the UWSN. Significantly, the proposed system detects and isolates the malicious nodes with tampered credentials and nodes with lower residual energy in minimal time. The parameters such as the time taken for malicious node detection, network lifetime, energy consumption, and delivery ratio are investigated using simulation tools. Comparison results show that the proposed EEIDS outperforms the existing acoustic security systems.