• Title/Summary/Keyword: Security status diagnosis

Search Result 18, Processing Time 0.028 seconds

Development of ML and IoT Enabled Disease Diagnosis Model for a Smart Healthcare System

  • Mehra, Navita;Mittal, Pooja
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.1-12
    • /
    • 2022
  • The current progression in the Internet of Things (IoT) and Machine Learning (ML) based technologies converted the traditional healthcare system into a smart healthcare system. The incorporation of IoT and ML has changed the way of treating patients and offers lots of opportunities in the healthcare domain. In this view, this research article presents a new IoT and ML-based disease diagnosis model for the diagnosis of different diseases. In the proposed model, vital signs are collected via IoT-based smart medical devices, and the analysis is done by using different data mining techniques for detecting the possibility of risk in people's health status. Recommendations are made based on the results generated by different data mining techniques, for high-risk patients, an emergency alert will be generated to healthcare service providers and family members. Implementation of this model is done on Anaconda Jupyter notebook by using different Python libraries in it. The result states that among all data mining techniques, SVM achieved the highest accuracy of 0.897 on the same dataset for classification of Parkinson's disease.

Fault Diagnosis with Adaptive Control for Discrete Event Systems

  • El Touati, Yamen;Ayari, Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.165-170
    • /
    • 2021
  • Discrete event systems interact with the external environment to decide which action plan is adequate. Some of these interactions are not predictable in the modelling phase and require consequently an adaptation of the system to the metamorphosed behavior of the environment. One of the challenging issues is to guarantee safety behavior when failures tend to derive the system from normal status. In this paper we propose a framework to combine diagnose technique with adaptive control to avoid unsafe sate an maintain the normal behavior as long as possible.

A Study on Construction of Optimal Wireless Sensor System for Enhancing Organization Security Level on Industry Convergence Environment (산업융합환경에서 조직의 보안성 향상을 위한 센싱시스템 구축 연구)

  • Na, Onechul;Lee, Hyojik;Sung, Soyoung;Chang, Hangbae
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.4
    • /
    • pp.139-146
    • /
    • 2015
  • WSN has been utilized in various directions from basic infrastructure of environment composition to business models including corporate inventory, production and distribution management. However, as energy organizations' private information, which should be protected safely, has been integrated with ICT such as WSN to be informatization, it is placed at potential risk of leaking out with ease. Accordingly, it is time to need secure sensor node deployment strategies for stable enterprise business. Establishment of fragmentary security enhancement strategies without considering energy organizations' security status has a great effect on energy organizations' business sustainability in the event of a security accident. However, most of the existing security level evaluation models for diagnosing energy organizations' security use technology-centered measurement methods, and there are very insufficient studies on managerial and environmental factors. Therefore, this study would like to diagnose energy organizations' security and to look into how to accordingly establish strategies for planning secure sensor node deployment strategies.

A Study of Improvement Direction of Inspection Diagnosis Report and Bridge Maintenance Detailed Guidelines (교량 점검진단 보고서 및 유지관리 세부지침 개선 방향 연구)

  • Han-Min Cho;Ki-Tae Park;Dong Woo Seo;Kyu San Jung;Jae Hwan Kim;Jin-Hyuk Lee
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.4
    • /
    • pp.21-30
    • /
    • 2022
  • After the collapse of the Seongsu Bridge in 1994, the 「Special Act on the Safety Control and Maintenance of Establishments」 was enacted in Korea, and many efforts have been made in the field of safety inspection and maintenance of facilities. Among these facilities, a total of 33,165 bridges, which account for the largest share next to buildings, are currently in use, and 28,150 bridges of type 2 and 3 account for about 85% of the total. However, compared to the relatively more important type 1 bridges, type 2 and 3 bridges, which occupy most of the bridges, have insufficient maintenance status regarding inspection and diagnosis. This reason appears in the subjective judgment and records of the inspection performer when performing inspection and diagnosis of bridges, and in the inspection and diagnosis report form that has not been systematically established. Therefore, in this study, we intend to derive an improvement (draft) of the inspection and diagnosis report that can be systematically and continuously utilized by correcting and supplementing the problems of the existing inspection and diagnosis report.

A Study on Web Vulnerability Assessment and Prioritization of Measures by Vulnerabilities (웹 취약점 점검 및 취약점별 조치 우선 순위 산정에 관한 연구)

  • Seong, JongHyuk;Lee, HooKi;Ko, InJe;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.37-44
    • /
    • 2018
  • Today we live in a flood of web sites and access numerous websites through the Internet to obtain various information. However, unless the security of the Web site is secured, Web site security can not be secured from various malicious attacks. Hacking attacks, which exploit Web site security vulnerabilities for various reasons, such as financial and political purposes, are increasing. Various attack techniques such as SQL-injection, Cross-Site Scripting(XSS), and Drive-By-Download are being used, and the technology is also evolving. In order to defend against these various hacking attacks, it is necessary to remove the vulnerabilities from the development stage of the website, but it is not possible due to various problems such as time and cost. In order to compensate for this, it is important to identify vulnerabilities in Web sites through web vulnerability checking and take action. In this paper, we investigate web vulnerabilities and diagnostic techniques and try to understand the priorities of vulnerabilities in the development stage according to the actual status of each case through cases of actual web vulnerability diagnosis.

  • PDF

A Study on Major Countries's Level of Cybersecurity for Critical Infrastructure (주요기반시설에 대한 주요국 사이버보안 수준 비교·분석 연구)

  • Park, Hyang-mi;Yoo, Ji-yeon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.163-176
    • /
    • 2017
  • Recently, the critical infrastructure is changing from the existing closed environment to an open environment, and it is becoming a new target of cyber-threats by expanding into cyberspace. In addition, due to the development of information and communications technology(ICT), the interdependence among critical infrastructure is increasing. Previous studies ranged from trend investigation and policy discussions to protection, but separate studies on the diagnosis of the current status and appropriateness judgment for efficient policy implementation were not performed. Therefore, this study compares and analyzes three international indicators that measure the level of cyber security in each country in order to build a new index to measure the level of cyber security of critical infrastructure in the USA, Japan, UK, Germany, Norway, and Korea. It is hoped that this study will serve as a basis for expanding Korean influence and building trust among countries in future cyberspace.

A Study on the Education Status and Improvement of Military Children due to Special Environmental Factors of National Security and Survival Rights (국가안보 및 생존권 수호의 군 특수적 환경 요인으로 인한 군인자녀의 교육 실태 및 개선에 관한 연구)

  • Kim, Byoung Jin
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.95-103
    • /
    • 2018
  • The military's morale is a serious threat in terms of defense posture and protection of national security and the nation's right to survival, as it has led to losses in talented manpower, weakened fighting spirit, damaged troop confidence, and reduced work efficiency and morale. Under these circumstances, a stronger defense posture and maximum morale among the troops should be followed by a thorough diagnosis and results on the factors affecting the military's morale. Professional soldiers often travel to work because of the special nature of their jobs. Among the problems associated with these characteristics is child education. Frequent shifts of military sites are intended to be made based on the analysis of the overall state of the military service education system, such as moving frequently with family members or separating with the family due to issues related to children's education.

  • PDF

The current status and strategies of livestock health control on national and international basis (국내.외 가축위생관리기준의 현황, 적용과 대책)

  • Ryu, Il-Sun
    • 한국환경농학회:학술대회논문집
    • /
    • 2009.07a
    • /
    • pp.240-272
    • /
    • 2009
  • Recently, as Foot and Mouth disease(FMD) outbreaks in South-East Asia, Taiwan, China, we cannot loose our tense to sustain our FMD free country status. And we have increasing possibility of disease inflow because of continual outbreaks of FMD type A, O and Asia 1 in neighbored countries, foreign visitor and foreign workers. So we have to be urgently ready for strengthen surveillance, early-report and early-diagnosis. So the most important things in epidemic control of livestock are co-work between central and local epidemic control office and field epidemic control. However, potential risk for FMD recurrence and sporadic occurrence of epidemic disease still threaten our livestock farmhouse, so we have to be ready for bio-security against these threatening. For these reasons, I will introduce the concept, etiology and epidemiology of disease and investment/ analysis of health management standard of main animals like cattle and pig which is applied to the inside and outside of country. With these references, we have to manage livestock health management thoroughly by establishing livestock health management standard and notifying special veterinarian and livestock farmer of these standard. Later on, prevention and quarantine of epidemic outbreak and establishing livestock health management standard should be undertaken primarily for sustainable growth and stability of livestock farm industry.

  • PDF

A study on the policy of de-identifying unstructured data for the medical data industry (의료 데이터 산업을 위한 비정형 데이터 비식별화 정책에 관한 연구)

  • Sun-Jin Lee;Tae-Rim Park;So-Hui Kim;Young-Eun Oh;Il-Gu Lee
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.85-97
    • /
    • 2022
  • With the development of big data technology, data is rapidly entering a hyperconnected intelligent society that accelerates innovative growth in all industries. The convergence industry, which holds and utilizes various high-quality data, is becoming a new growth engine, and big data is fused to various traditional industries. In particular, in the medical field, structured data such as electronic medical record data and unstructured medical data such as CT and MRI are used together to increase the accuracy of disease prediction and diagnosis. Currently, the importance and size of unstructured data are increasing day by day in the medical industry, but conventional data security technologies and policies are structured data-oriented, and considerations for the security and utilization of unstructured data are insufficient. In order for medical treatment using big data to be activated in the future, data diversity and security must be internalized and organically linked at the stage of data construction, distribution, and utilization. In this paper, the current status of domestic and foreign data security systems and technologies is analyzed. After that, it is proposed to add unstructured data-centered de-identification technology to the guidelines for unstructured data and technology application cases in the industry so that unstructured data can be actively used in the medical field, and to establish standards for judging personal information for unstructured data. Furthermore, an object feature-based identification ID that can be used for unstructured data without infringing on personal information is proposed.

A Study of the Family Caregiver's Burden for the Elderly with Chronic disease in a Rural Area (일부 농촌 지역 노인 만성질환자 가족의 부담감에 관한 연구)

  • Jang, In-Sun
    • Journal of Korean Academic Society of Home Health Care Nursing
    • /
    • v.2
    • /
    • pp.19-34
    • /
    • 1995
  • The purpose of this study was to analysis level on family caregiver's burden for the elderly with chronic disease in a rural area and to choose priority care group, thereby facilitating the development of interventions to reduce the caregiver's burden. For this purpose, data were collected by questionaire from June 10 to October 8, 1994. The instruments for data collection were Caregiver Burden Inventory by Novak(1989) and Zarit et al(1982), severity of dementia by Hughes Scales(1982), ADL by Lawton(1971), patients' family caregiving activity by pre-survey and reference review(Lee, 1993 ; Jang, 1990 ; Yoo, 1982). The subjects were 213 family caregiver of elderly with chronic disease in a rural area. The data was analysed by the use of t-test, ANOVA, correlation and multiple regression. The results were as follows ; 1. Total burden was evaluated below average, the mean of family burden was 46.98. By the diagnostic classification, Hypertension was 27.37, DM 32.46, CVA 62.96, Dementia 61.24. 2. Significant variables which were correlated to the family caregiver's burden were the patient's disease diagnosis (F=33.82, p<0.001), severity of dementia(F=30.52, p<0.001), the status of disease management(F=11.53, p<0.001), ADL(F=10.54, p<0.001), PADL(F=7.50, p<0.001), income(F=7.17, p<0.001), caregiver's health status(F=24.53, p<0.001), a view of patient's prognosis (F=22.17, p<0.001), relationship with the patient(F=33.82, p<0.001), the number of hours per day spent on caregiving(F=77.52, p<0.001), level of intimacy of caregiver and patients(F=8.75, p<0.001), level of helping(F=4.90, p<0.01), the frequency of caregiving activity(F=3.80, p<0.01), the number of admission(F=5.54, p<0.01), the length of caregiving(F=4.43, p<0.01), other chronic patient in family(t=2.81, p<0.01), caregiver's job(F=3.11, p<0.01), the duration of illness(F=2.98, p<0.05), caregiver's religion(F=2.93, p<0.05), medical security(F=3.89, p<0.05), caregiving's helper(t=2.42, p<0.05). 3. PADL was the most important predictor to family caregiver burden(R2=0.6611). In addition to this, IADL, caregiver's health status, the length of caregiving. level of intimacy of caregiver and patients, patient's age, the patient's disease diagnosis and patient's job accounted for 76% of family caregiver burden. 4. The criteria of priority care group were as follows ; the mean of family caregiver burden was above 58, above of moderate ADL, the number of hours per day spent on caregiving above of 8 hours, above of moderate dementia. By the diagnostic classification, number of priority care group, Hypertension was 4 (8.0%), DM 4(8.0%), CVA 34(64.1%), Dementia 45(75.0%).

  • PDF