• Title/Summary/Keyword: Personal data

Search Result 5,555, Processing Time 0.029 seconds

Development of Automatic Data Transmitting System of Arterial Blood Gas Results via Local Area Network( LAN) (LAN을 이용한 혈액가스 검사결과 전송시스템)

  • 김남현;김원기
    • Journal of Biomedical Engineering Research
    • /
    • v.14 no.4
    • /
    • pp.327-332
    • /
    • 1993
  • Automatic transmission of data from the blood analyzer to the request site is one of the most important part in hospital computerization. We have developed a system that transmits data from the arterial blood gas analyzer to the request site automatically In this system HOST computer, FILE server,'LAN(Local Area Network) , 3270 Emulator and bfulti-port card are integrated with 3 blood gas analyzers(NOVA Inc., USA) which are connected to a single multi-port card in a personal computer. When specimen are collected from tramp)inly sites, they are transferee to the laboratory In the Yonsei Cardiovascular Center After analysis, the result is transmitted to the personal computer via serial commnunication between machine and multi-port card using interrupt method. Then, the patient's information (Name, Patient ID No., etc.) is obtained from the HOST computer througth the emulator. The combined data (patient information & lab data) is transmitted to each request site via LAN automatically These results are stored in the File Server for one year and they can be reviewed anytime. Also, it could be used for the various statistics and the flow chart for clinical research. Additionally, we found thal this system reduces the personal labor.

  • PDF

A Study on the Ethical Issues and Sharing Behavior of User's Information in the Era of Big Data

  • Lee, Myung-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.10
    • /
    • pp.43-48
    • /
    • 2016
  • This study is to examine how big data collects user's information and is used; the status quo of exposures of user's information, and various measures of self-control by the user. This study is also to look their ethical issues and discuss problems of privacy concerning big data. As a way for users to self-control their information, they need to check the log-in state of web portal sites and set up their account so that customized advertisement and location information cannot be tracked. When posting a blog, the value of posting should be controlled. When becoming a member of a web site, users must check the access terms before agreement and beware of chained agreements and/or membership joins in order to control the exposure of their personal information. To prevent information abuse through big data through which user's information is collected and analyzed, all users must have the right to control, block or allow personal information. For an individual to have the right to control over his information, users must understand the concept of user's information and practice ethics accompanied by newly given roles in the Internet space, which will lead to the establishment of the sound and mature information society on the Internet.

Accident detection algorithm using features associated with risk factors and acceleration data from stunt performers

  • Jeong, Mingi;Lee, Sangyeoun;Lee, Kang Bok
    • ETRI Journal
    • /
    • v.44 no.4
    • /
    • pp.654-671
    • /
    • 2022
  • Accidental falls frequently occur during activities of daily living. Although many studies have proposed various accident detection methods, no high-performance accident detection system is available. In this study, we propose a method for integrating data and accident detection algorithms presented in existing studies, collect new data (from two stunt performers and 15 people over age 60) using a developed wearable device, demonstrate new features and related accident detection algorithms, and analyze the performance of the proposed method against existing methods. Comparative analysis results show that the newly defined features extracted reflect more important risk factors than those used in existing studies. Further, although the traditional algorithms applied to integrated data achieved an accuracy (AC) of 79.5% and a false positive rate (FPR) of 19.4%, the proposed accident detection algorithms achieved 97.8% AC and 2.9% FPR. The high AC and low FPR for accidental falls indicate that the proposed method exhibits a considerable advancement toward developing a commercial accident detection system.

A Personal Memex System Using Uniform Representation of the Data from Various Devices (다양한 기기로부터의 데이터 단일 표현을 통한 개인 미멕스 시스템)

  • Min, Young-Kun;Lee, Bog-Ju
    • The KIPS Transactions:PartB
    • /
    • v.16B no.4
    • /
    • pp.309-318
    • /
    • 2009
  • The researches on the system that automatically records and retrieves one's everyday life is relatively actively worked recently. These systems, called personal memex or life log, usually entail dedicated devices such as SenseCam in MyLifeBits project. This research paid attention to the digital devices such as mobile phones, credit cards, and digital camera that people use everyday. The system enables a person to store everyday life systematically that are saved in the devices or the deviced-related web pages (e.g., phone records in the cellular phone company) and to refer this quickly later. The data collection agent in the proposed system, called MyMemex, collects the personal life log "web data" using the web services that the web sites provide and stores the web data into the server. The "file data" stored in the off-line digital devices are also loaded into the server. Each of the file data or web data is viewed as a memex event that can be described by 4W1H form. The different types of data in different services are transformed into the memex event data in 4W1H form. The memex event ontology is used in this transform. Users can sign in to the web server of this service to view their life logs in the chronological manner. Users can also search the life logs using keywords. Moreover, the life logs can be viewed as a diary or story style by converting the memex events to sentences. The related memex events are grouped to be displayed as an "episode" by a heuristic identification method. A result with high accuracy has been obtained by the experiment for the episode identification using the real life log data of one of the authors.

A Study Concerning the Relationships among an Early Childhood Educator's Type of MBTI Personal Tendencies, Creativity, and Teaching Efficacy (유아교사의 성격 유형, 창의성, 그리고 교수효능감 간의 관계 연구)

  • Jeong, Mi-Young;Ahn, Hyo-Jin
    • Journal of the Korean Home Economics Association
    • /
    • v.50 no.3
    • /
    • pp.25-34
    • /
    • 2012
  • This study examined the relationship among early childhood educator's MBTI personal tendencies, creativity, and teaching efficacy. 120 kindergarten teachers and 155 day care teachers participated in this study. Several survey questionnaires were used for this study, such as, teaching efficacy scale, MBTI personality tendencies, and a creativity test. The collected data was analyzed with the SPSS program(version 18.0). The findings of this study were as follows: First, there were some differences between an early childhood educator's MBTI personal tendencies and creativity. Secondly, there was a positive correlation among early childhood educator's MBTI personal tendencies, creativity, and teaching efficacy.

Method of network connection management in module based personal robot for fault-tolerant (모듈기반 퍼스널 로봇의 결함 허용 지원을 위한 네트워크 연결 유지 관리 기법)

  • Choi, Dong-Hee;Park, Hong-Seong
    • Proceedings of the KIEE Conference
    • /
    • 2006.04a
    • /
    • pp.300-302
    • /
    • 2006
  • Middleware offers function that user application program can transmit data independently of network device. Connection management about network connection of module is important for normal service of module base personal robot. Unpredictable network disconnection is influenced to whole robot performance in module base personal robot. For this, Middleware must be offer two important function. The first is function of error detection and reporting about abnormal network disconnection. Therefore, middleware need method for network error detection and module management to consider special quality that each network device has. The second is the function recovering that makes the regular service possible. When the module closed from connection reconnects, as this service reports connection state of the corresponding module, the personal robot resumes the existing service. In this paper proposed method of network connection management for to support fault tolerant about network error of network module based personal robot.

  • PDF

Selections and applications of statistical packages for personal computers (개인용 컴퓨터에서의 통계페키지의 선택과 활용)

  • 김병천
    • The Korean Journal of Applied Statistics
    • /
    • v.1 no.1
    • /
    • pp.75-90
    • /
    • 1987
  • Statistical data analysis using the statisticaal packages can be performed on the personal computers. But it is not easy to select a personal computer in which statisticians could run statistical packages. The paper discusses some of the minimum requirements of the personal computers to use statistical packages and how to choose good statistical packages with better numerical results and introduces the statistical packages which are available in the personal computers.

Database using Personal Information Management System

  • Kim, Jae-Woo;Kim, Don-Go;Kang, Sang-Gil;Kim, Dong-Hyun;Kim, Won-Il
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.8 no.4
    • /
    • pp.260-263
    • /
    • 2008
  • In this paper we propose Personal Information Management System for Library Database. It manages personal search pattern for the given user and provide specific book list for library book search system. With the proposed system, the conventional overlap searching time will be decreased with personalized information and search history. This system manages the individual data according to personal searching pattern, sequence and usability. Therefore, the user can locate necessary book information more accurately with their distinct interest and search history.

Long-Term Care Needs Assessment of the Disabled Workers After an Industrial Injury (산재장해인의 장기요양서비스 요구 분석)

  • Choi, Eun Sook;June, Kyung Ja
    • Korean Journal of Occupational Health Nursing
    • /
    • v.16 no.2
    • /
    • pp.188-196
    • /
    • 2007
  • Purpose: The objective of this study was to evaluate long-term care needs using RAI MDS-HC and MI-CHOICE among the disabled workers. Methods: Data were obtained from 45 personal care recipients with the disability of mental and nervous system, and analyzed using SAS 9.1 by applying t-test, ${\chi}^2$ test, or fisher's exact test. Results: Only 'bed mobility' and 'indoor ambulation' items of ADL and problem activity were statistically significant factors by the level of personal care benefit. By MICHOICE grouping, 20.0 percent of subjects belonged to nursing home group, 51.5 percent were home care service, 28.9 percent were intermittent personal care. Conclusion: Personal care services in industrial accident compensation insurance have been categorized with two groups according to level of disability. But our results could contribute to provide personal care service according to the long term care needs.

  • PDF

Empirical Validation of Personal Information Violation Risk for Cryptocurrency with Use Intention

  • Kim, Jeong-Wook;Choi, Chul-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.9
    • /
    • pp.141-156
    • /
    • 2018
  • The purpose of this study is how personal information violation risks affect the intention to use domestic cryptocurrency services. VAM(Value based Adoption Model) model is validated as a theoretical background, selecting perceived ease of use, perceived usefulness and perceived security as a benefit factors, and considers perceived cost, technical complexity, and risk of personal information violation risks as sacrifice factors. The method of this study used questionnaire survey to collect 150 data on user's perception on cryptocurrency services, and also performed a structural equation modeling method using by AMOS 23. The result of this paper shows that all hypotheses are accepted statistically significant except 2 hypothesis. This research is concluded that perceived value is affected on statistically positive impact on perceived ease of use, perceived usefulness and perceived security, and negative impact on risk of personal information violation risk, not statistically perceived fee and technical complexity.