• Title/Summary/Keyword: Method of Operation

Search Result 12,478, Processing Time 0.043 seconds

Development of Web Service for Liver Cirrhosis Diagnosis Based on Machine Learning (머신러닝기반 간 경화증 진단을 위한 웹 서비스 개발)

  • Noh, Si-Hyeong;Kim, Ji-Eon;Lee, Chungsub;Kim, Tae-Hoon;Kim, KyungWon;Yoon, Kwon-Ha;Jeong, Chang-Won
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.10
    • /
    • pp.285-290
    • /
    • 2021
  • In the medical field, disease diagnosis and prediction research using artificial intelligence technology is being actively conducted. It is being released as a variety of products for disease diagnosis and prediction, which are most widely used in the application of artificial intelligence technology based on medical images. Artificial intelligence is being applied to diagnose diseases, to classify diseases into benign and malignant, and to separate disease regions for use in identification or reading according to the risk of disease. Recently, in connection with cloud technology, its utility as a service product is increasing. Among the diseases dealt with in this paper, liver disease is a disease with very high risk because it is difficult to diagnose early due to the lack of pain. Artificial intelligence technology was introduced based on medical images as a non-invasive diagnostic method for diagnosing these diseases. We describe the development of a web service to help the most meaningful clinical reading of liver cirrhosis patients. Then, it shows the web service process and shows the operation screen of each process and the final result screen. It is expected that the proposed service will be able to diagnose liver cirrhosis at an early stage and help patients recover through rapid treatment.

Effective Defense Mechanism Against New Vulnerability Attacks (신규 취약점 공격에 대한 효율적인 방어 메커니즘)

  • Kwak, Young-Ok;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.499-506
    • /
    • 2021
  • Hackers' cyber attack techniques are becoming more sophisticated and diversified, with a form of attack that has never been seen before. In terms of information security vulnerability standard code (CVE), about 90,000 new codes were registered from 2015 to 2020. This indicates that security threats are increasing rapidly. When new security vulnerabilities occur, damage should be minimized by preparing countermeasures for them, but in many cases, companies are insufficient to cover the security management level and response system with a limited security IT budget. The reason is that it takes about a month for analysts to discover vulnerabilities through manual analysis, prepare countermeasures through security equipment, and patch security vulnerabilities. In the case of the public sector, the National Cyber Safety Center distributes and manages security operation policies in a batch. However, it is not easy to accept the security policy according to the characteristics of the manufacturer, and it takes about 3 weeks or more to verify the traffic for each section. In addition, when abnormal traffic inflow occurs, countermeasures such as detection and detection of infringement attacks through vulnerability analysis must be prepared, but there are limitations in response due to the absence of specialized security experts. In this paper, we proposed a method of using the security policy information sharing site "snort.org" to prepare effective countermeasures against new security vulnerability attacks.

Public Key-Based Operator Authentication Mechanism for Access Control of Multi-Control Systems in OT Control Network (OT제어망에서 다중 제어시스템 접근통제용 공개키 기반 운용자 인증 방안)

  • Kim, Dae-Hwi;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.9
    • /
    • pp.64-75
    • /
    • 2022
  • The method of accessing multiple control systems in the OT control network centered on operation technology uses the operator authentication technology of each control system. An example is ID/PW operator authentication technology. In this case, since the OT control network is composed of multiple control systems, operator authentication technology must be applied to each control system. Therefore, the operator must bear the inconvenience of having to manage authentication information for each control system he manages. To solve these problems, SSO technology is used in business-oriented IT networks. However, if this is introduced into the OT control network as it is, the characteristics of the limited size of the OT control network and rapid operator authentication are not reflected, so it cannot be seen as a realistic alternative. In this paper, a public key-based authentication mechanism was newly proposed as an operator authentication technology to solve this problem. In other words, an integrated public key certificate that applies equally to all control systems in the OT control network was issued and used to access all control systems, thereby simplifying the authentication information management and making access to the control system more efficient and secure.

A Study on Dimming Improvement and Flicker Reduction in Visible Light Communication System (가시광통신 시스템에서 디밍 향상 및 플리커 감소 방안에 대한 연구)

  • Doo-Hee, Han;Kyu-Jin, Lee
    • Journal of Industrial Convergence
    • /
    • v.21 no.2
    • /
    • pp.125-131
    • /
    • 2023
  • In this paper, research was conducted to solve the problem of reducing the dimming level and flicker that occurs in the visible light communication system. Visible light communication is a convergence technology that provides both communication and lighting, and must satisfy not only communication performance but also lighting performance. However, since the existing data transmission method transmits without considering the transmission data sequence, it reduces the dimming level and causes a flicker phenomenon. To solve this problem, in this paper, the Dimming Improvement and Flicker Reduction Mapping technique was studied. Existing systems simply transmitted data of '0' and '1', but in this system, original data transmission channels and DIFR (Dimming Improvement and Flicker Reduction) transmission channels are assigned to RGB channels. Original data is allocated to the R channel and original data or inverse original data is allocated to the DIFR-G channel, and the DIFR-B channel maintains the maximum dimming level by transmitting through the logical operation of the R channel and the G channel. At the same time, the flicker phenomenon is prevented by preventing continuous occurrence of 'OFF' patterns. Through this, we proposed an adaptive data allocation algorithm that can faithfully play a role as a light as well as a communication function.

A Study on the Utilization of ESG for Reducing Carbon Emissions in the Building Sector and Development Directions (건물부문의 탄소배출량 절감을 위한 ESG의 활용방안과 발전방향)

  • Sang Duck Moon
    • Environmental and Resource Economics Review
    • /
    • v.31 no.4
    • /
    • pp.801-824
    • /
    • 2022
  • Recently, United Nations found that 38% of global carbon emissions are generated in the building sector, surpassing other industries (32%) and transportation (23%), and ESG is actively used as a way to reduce carbon emissions in the building sector, led by overseas advanced countries. In Korea, as the National Pension Service announced "Consider ESG with more than 50% of investment assets" this year, the move to introduce ESG in the building sector is accelerating, centering on construction companies and asset management companies. However, as the domestic ESG evaluation system is still mainly focused on corporate governance and social responsibility, interest in the environmental sector is lagging behind that of advanced countries. As ESG in the building sector is expected to grow rapidly over the next 10 years, I would like to suggest the following development directions. The first is the expansion of the incentive system. In order for the government to successfully implement policies related to ESG in the building sector, incentive system such as tax reduction and building standards should be expanded further than now in addition to negative systems such as rent restrictions and punishment taxes due to regulatory violations. Second, standardized ESG standards are established. Rather than creating an independent Korean ESG standard that is far from global standards, it is necessary to organize the common parts of global standards and evaluation methods and create and provide guidelines in the form of standard textbooks that can be used equally by all stakeholders. Third, it is an effort to link ESG in the building sector with Digital Transformation(DX). This is because actual energy savings and carbon emission reduction can be realized only when the operation method of the building sector, which is operated mainly by manpower, is digitalized and converted to an intelligent way.

Smoke Control Experiment of a Very Deep Underground Station Where Platform Screen Doors are Installed (I) - Analysis on Smoke Control Performance on the Platform (스크린도어가 설치된 대심도 지하역사의 제연 실험 I - 승강장에서의 제연의 효과 분석)

  • Park, Won-Hee;Kim, Chang-Yong;Cho, Youngmin;Kwon, Tae-Soon;Lee, Duck-Hee
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.7
    • /
    • pp.485-496
    • /
    • 2018
  • In this paper, the smoke behavior in an underground station on operation of the fans in the ventiliation of the station was measured by the experimental method when the fire occurred in the underground station platform where the platfrom screen door was installed. The ventilation characteristics were compared when the ventilation system was operated and when the ventilation system was not operated when a fire occurred at the platform where the clean door was closed. To simulate the fire smoke, the smoke generated from the smoke generator was heated using a hot air fan. The transmittance was measured using a smoke density meter to quantitatively measure fire smoke. If the screen door is closed and the ventilation system of the underground station does not work, it is confirmed that if a fire occurs in the platform, smoke accumulates inside the platform, evacuating passengers is very difficult and can lead to a very dangerous situation. On the other hand, under the condition that the ventilation facility of the subway station is operated, the smoke evacuates to the outside through the ventilation facility of the underground station, and airflow is formed in the direction from the waiting room to the waiting area, so that the passenger located on the platform can safely evacuate toward the concourse. In the following paper, we will discuss the concurrent effect of tunnel ventilation through tunnel vent near the platform.

Distribute Intelligent Multi-Agent Technology for User Service in Ubiquitous Environment (유비쿼터스 환경의 사용자 서비스를 위한 분산 지능형 에이전트 기술)

  • Choi, Jung-Hwa;Choi, Yong-June;Park, Young-Tack
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.9
    • /
    • pp.817-827
    • /
    • 2007
  • In the age of ubiquitous environment, huge number of devices and computing services are provided to users. Personalized service, which is modeled according to the character of each and every individual is of particular need. In order to provide various dynamic services according to user's movement, service unit and operating mode should be able to operate automatically with minimum user intervention. In this paper, we discuss the steps of offering approximate service based on user's request in ubiquitous environment. First, we present our simulator designed for modeling the physical resource and computing object in smart space - the infrastructure in ubiquitous. Second, intelligent agents, which we developed based on a FIPA specification compliant multi-agent framework will be discussed. These intelligent agents are developed for achieving the service goal through cooperation between distributed agents. Third, we propose an automated service discovery and composition method in heterogeneous environment using semantic message communication between agents, according to the movement by the user interacting with the service available in the smart space. Fourth, we provide personalized service through agent monitoring anytime, anywhere from user's profile information stored on handhold device. Therefore, our research provides high quality service more than general automated service operation.

Method's to introduce ROKN Nuclear Propulsion Submarines (한국형 원자력 추진 잠수함 도입방안)

  • Jang, Jun-Seop
    • Strategy21
    • /
    • s.42
    • /
    • pp.5-52
    • /
    • 2017
  • Debates about introducing nuclear submarines have been a main issue in Korea. The highest officials and the government has started to think seriously about the issue. Yet there were no certain decision to this issue or any agreements with US but it is still necessary to review about introducing nuclear submarines, the technologies and about the business. The reason for such issues are the highest officials of Korea to build nuclear submarine, nK's nuclear development and SLBM launching. ROKN's nuclear submarine's necessity will be to attack(capacity to revenge), defend(anti-SSBN Operation) and to respond against neighboring nation's threat(Russia, Japan, China). Among these nations, US, Russia (Soviet Union), Britain, France had built their submarines in a short term of time due to their industrial foundation regarding with nuclear propulsion submarines. However China and India have started their business without their industrial foundation prepared and took a long time to build their submarines. Current technology level of Korea have reached almost up to US, Russia, Britain and France when they first built their nuclear propulsion submarines since we have almost completed the business for the Changbogo-I,II and almost up to complete building the Changbogo-III which Korea have self designed/developed. Furthermore Korea have reached the level where we can self design large nuclear reactors and the integrated SMART reactor which we can call ourselves a nation with worldwide technologies. If introducing the nuclear submarine to the Korea gets decided, first of all we would have to review the technological problems and also introduce the foreign technologies when needed. The methods for the introduction will be developments after loans from the foreign, productions with technological cooperations, and individual production. The most significant thing will be that changes are continuous and new instances are keep showing up so that it is important to only have a simple reference to a current instances and have a review on every methods with many possibilities. Also developing all of the technologies for the nuclear propulsion submarines may be not possible and give financial damages so there may be a need to partially introduce foreign technologies. For the introduction of nuclear propulsion submarines, there must be a resolution of the international regulations together with the international/domestics resistances and the technological problems to work out for. Also there may be problem for the requirement fees to solve for and other tough problems to solve for. However nuclear submarines are powerful weapon system to risk everything above. This is an international/domestically a serious agenda. Therefore rather than having debates based on false facts, there must be a need to have an investigations and debates regarding the nation's benefits and national security.

Numerical Analysis of Resin Filling Process for a Molded Dry-type Potential Transformer (몰드형 건식 계기용 변압기 제작을 위한 수지 충진 해석 연구)

  • Kim, Moosun;Jang, Dong Uk;Kim, Seung Mo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.12
    • /
    • pp.511-517
    • /
    • 2016
  • Current oil-type potential transformers for trains are filled with insulating oil, which could have problems like explosions due to rising inner pressure during train operation. Therefore, mold and dry-type potential transformers are being developed to prevent explosions. One problem in manufacturing mold-type transformers is preventing void formation around the coiled core inside the mold during epoxy filling, which could cause an electrical spark. Micro voids can remain in the resin after filling, and macro voids can occur due to the structure shape. A transformer that is being developed has a cavity at the junction of the core and the coil for better performance, and when highly viscous epoxy flows inside the cavity channel, macro voids can form inside it. Therefore, in this study, the free-surface flow of the mold filling procedure was analyzed numerically by applying the VOF method. The results were used to understand the phenomena of void formation inside the cavity and to modify the process conditions to reduce voids.

A Tree-structured XPath Query Reduction Scheme for Enhancing XML Query Processing Performance (XML 질의의 수행성능 향상을 위한 트리 구조 XPath 질의의 축약 기법에 관한 연구)

  • Lee, Min-Soo;Kim, Yun-Mi;Song, Soo-Kyung
    • The KIPS Transactions:PartD
    • /
    • v.14D no.6
    • /
    • pp.585-596
    • /
    • 2007
  • XML data generally consists of a hierarchical tree-structure which is reflected in mechanisms to store and retrieve XML data. Therefore, when storing XML data in the database, the hierarchical relationships among the XML elements are taken into consideration during the restructuring and storing of the XML data. Also, in order to support the search queries from the user, a mechanism is needed to compute the hierarchical relationship between the element structures specified by the query. The structural join operation is one solution to this problem, and is an efficient computation method for hierarchical relationships in an in database based on the node numbering scheme. However, in order to process a tree structured XML query which contains a complex nested hierarchical relationship it still needs to carry out multiple structural joins and results in another problem of having a high query execution cost. Therefore, in this paper we provide a preprocessing mechanism for effectively reducing the cost of multiple nested structural joins by applying the concept of equivalence classes and suggest a query path reduction algorithm to shorten the path query which consists of a regular expression. The mechanism is especially devised to reduce path queries containing branch nodes. The experimental results show that the proposed algorithm can reduce the time requited for processing the path queries to 1/3 of the original execution time.