• Title/Summary/Keyword: Software systems

Search Result 5,585, Processing Time 0.034 seconds

Development of Authentication Service Model Based Context-Awareness for Accessing Patient's Medical Information (환자 의료정보 접근을 위한 상황인식 기반의 인증서비스 모델 개발)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.99-107
    • /
    • 2021
  • With the recent establishment of a ubiquitous-based medical and healthcare environment, the medical information system for obtaining situation information from various sensors is increasing. In the medical information system environment based on context-awareness, the patient situation can be determined as normal or emergency using situational information. In addition, medical staff can easily access patient information after simple user authentication using ID and Password through applications on smart devices. However, these services of authentication and patient information access are staff-oriented systems and do not fully consider the ubiquitous-based healthcare information system environment. In this paper, we present a authentication service model based context-awareness system for providing situational information-driven authentication services to users who access medical information, and implemented proposed system. The authentication service model based context-awareness system is a service that recognizes patient situations through sensors and the authentication and authorization of medical staff proceed differently according to patient situations. It was implemented using wearables, biometric data measurement modules, camera sensors, etc. to configure various situational information measurement environments. If the patient situation was emergency situation, the medical information server sent an emergency message to the smart device of the medical staff, and the medical staff that received the emergency message tried to authenticate using the application of the smart device to access the patient information. Once all authentication was completed, medical staff will be given access to high-level medical information and can even checked patient medical information that could not be seen under normal situation. The authentication service model based context-awareness system not only fully considered the ubiquitous medical information system environment, but also enhanced patient-centered systematic security and access transparency.

A Study on Development of Independent Low Power IoT Sensor Module for Zero Energy Buildings (제로 에너지 건축물을 위한 자립형 저전력 IoT 센서 모듈 개발에 대한 연구)

  • Kang, Ja-Yoon;Cho, Young-Chan;Kim, Hee-Jun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.3
    • /
    • pp.273-281
    • /
    • 2019
  • The energy consumed by buildings among the total national energy consumption is more than 10% of the total. For this reason, Korea has adopted the zero energy building policy since 2025, and research on the energy saving technology of buildings has been demanded. Analysis of buildings' energy consumption patterns shows that lighting, heating and cooling energy account for more than 60% of total energy consumption, which is directly related to solar power acquisition and window opening and closing operation. In this paper, we have developed a low - power IoT sensor module for window system to transfer acquired information to building energy management system. This module transmits the external environment and window opening / closing status information to the building energy management system in real time, and constructs the network to actively take energy saving measures. The power used in the module is designed as an independent power source using solar power among the harvest energy. The topology of the power supply is a Buck converter, which is charged at 4V to the lithium ion battery through MPPT control, and the efficiency is about 85.87%. Communication is configured to be able to transmit in real time by applying WiFi. In order to reduce the power consumption of the module, we analyzed the hardware and software aspects and implemented a low power IoT sensor module.

The Analysis on Technology Acceptance Model for the 3D Printing Industry with the Social Economic Environment Converged Unified Theory Of Acceptance and Use of Technology Model (3D 프린팅 산업에 대한 사회경제환경 융합형 통합기술수용모델을 통한 기업의 3D기술수용의도 분석)

  • Kim, Young-soo;Hong, Ah-reum
    • Journal of Korea Technology Innovation Society
    • /
    • v.22 no.1
    • /
    • pp.119-157
    • /
    • 2019
  • It is important for the people in the 3D printing industry to determine which factors influence the decision-making that determine the adoption of 3D printers and the role of the factors. Through this, we intend to find ways to contribute to the development of 3D printing industry in Korea by increasing utilization of 3D printer used in domestic companies and increasing investment in related industries. 3D printers are making rapid progress according to the development of technology, the public interest, and the activation of investment. Foreign countries have made remarkable progress in equipment, materials, software, and industrial applications, but they are lower than expected in Korea. It is necessary to introduce a smooth 3D printer in order to revitalize the 3D printer industry and enlarge the base, but it is insufficient for actual introduction and field application. The independent variables that represent economic, technological, and environmental characteristics were selected through a literature survey, and a model for accepting integrated technology for convergence of societies in the 3D printing industry was proposed. This study confirms that economic factors such as output unit price, government support, and environmental factors such as 3D contents should be developed organically for the introduction of 3D printing technology and equipment. This require systematic and effective support from the government, and it is necessary to improve the economic support, related laws, and systems that can be directly experienced by the user as a user. As the domestic 3D printing industry develops with economic, technological and time investment, 3D printing industry should be the key engine of the 4th industrial revolution.

Design of Programming Failure Feedback System Based on Control Flow of Test Case to Support Programming Training (프로그래밍 훈련 지원을 위한 테스트케이스의 제어흐름에 기반한 프로그래밍 실패 피드백 시스템 설계)

  • Lee, Sunghee;Kim, Deok Yeop;Seo, Kang Bok;Lee, Woo Jin
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.8
    • /
    • pp.317-322
    • /
    • 2019
  • Programming judge systems for programming training support are typically built on the Web, where the examiners uploads a programming problem, which the student reads and submits an answer to the problem. The judge system executes the submitted answer of source code to provide feedback such as pass, failure, and error messages. Students who receive the feedback except for the pass continues debugging the source code until they are judged to pass. We developed an online judge system to support programming training and analyzed answers submitted by the students and found that many of the students who were not judged to pass that test did not know exactly where they were wrong but continued to solve the problem. The current judge system generally feeds runtime error messages back to students. However, with only runtime error message, it is difficult for student who train to find the wrong part of the answer. Therefore, in this paper, we propose a system that provides the feedback of programming failure by analyzing the control flow of the test cases used in the source code submitted by the student. The proposed system helps students find the wrong parts more quickly by feeding back the paths where faults in the control flow may exist. In addition, we show that this system is applicable to the answer source code that the actual student submitted.

Flapless implant placement with digital 3D imaging and planning system in fully edentulous patient: A case report and 5-year follow-up (완전무치악 환자에서 디지털 가이드 수술 방식을 이용한 무피판절개 임플란트 식립증례: 증례보고 및 5년 추적관찰)

  • Shin, Mi-sun;Paek, Janghyun
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.57 no.3
    • /
    • pp.312-320
    • /
    • 2019
  • One of the fastest growing segments of implant dentistry is the utilization of computed tomography (CT) scan data and treatment planning software in conjunction with guided surgery for implant reconstruction cases. Computer assisted planning systems and associated surgical templates have established a predictable, esthetic, functional technique for placing and restoring implants. Especially, a philosophy of restoratively driven implant placement has been generally adopted. Recently, a variety of commercial dental fields have released their scanning and fabricating protocols and methods for restorations. This process is still being investigated and developed for the most precise and predictable outcome. This case report describes a female patient who wanted dental implants in fully edentulous areas. Restoratively driven implant placements were performed with surgical guide and the patient was fully satisfied with the clinical results, and at 5-year post restorative follow-up assessment, both implant and prosthesis were proved clinical success.

A Study on the Conceptual Design of Integrated Management System for Public SW Project Information (공공 소프트웨어(SW) 사업정보 통합 관리체계의 개념적 설계에 관한 연구)

  • Shin, Kitae;Park, Chankwon
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.2
    • /
    • pp.199-216
    • /
    • 2019
  • The public SW market is 3 trillion won, which is less than 10% of the total SW market. However, due to the nature of the domestic market, it is an important market with a relatively large impact on small and medium-sized software companies. In this market, government is operating the Public SW Project Demand Forecasting System in order to support the marketing activities of small and medium sized SW companies and establish a fair market order. The current system has limitations such as lack of user convenience, insufficient analysis capability and less business connection. This study was conducted to identify the problems of these systems and to propose a new system for improving the convenience of users and expanding the information utilization of SMEs. To this end, we analyzed the requirements of each stakeholder. We proposed the 2-phased forecasting cycle, the management cycle, and the system life cycle of public SW projects and created a unified identifier (UID) so that the information of those projects can be identified and linked among them. As a result, an integrated reference model of project information management based on system life cycle was developed, which can explain the demand forecasting and project information, and the improved processes was also designed to implement them. Through the result of this study, it is expected that integrated management of public SW projects will be possible.

Translation of Korean Object Case Markers to Mongolian's Suffixes (한국어 목적격조사의 몽골어 격 어미 번역)

  • Setgelkhuu, Khulan;Shin, Joon Choul;Ock, Cheol Young
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.2
    • /
    • pp.79-88
    • /
    • 2019
  • Machine translation (MT) system, especially Korean-Mongolian MT system, has recently attracted much attention due to its necessary for the globalization generation. Korean and Mongolian have the same sentence structure SOV and the arbitrarily changing of their words order does not change the meaning of sentences due to postpositional particles. The particles that are attached behind words to indicate their grammatical relationship to the clause or make them more specific in meaning. Hence, the particles play an important role in the translation between Korean and Mongolian. However, one Korean particle can be translated into several Mongolian particles. This is a major issue of the Korean-Mongolian MT systems. In this paper, to address this issue, we propose a method to use the combination of UTagger and a Korean-Mongolian particles table. UTagger is a system that can analyze morphologies, tag POS, and disambiguate homographs for Korean texts. The Korean-Mongolian particles table was manually constructed for matching Korean particles with those of Mongolian. The experiment on the test set extracted from the National Institute of Korean Language's Korean-Mongolian Learner's Dictionary shows that our method achieved the accuracy of 88.38% and it improved the result of using only UTagger by 41.48%.

Analysis of Abnormal Path Loss in Jeju Coastal Area Using Duct Map (덕트맵을 이용한 제주해안지역 이상 전파특성 분석)

  • Wang, Sungsik;Lim, Tae-Heung;Chong, Young Jun;Go, Minho;Park, Yong Bae;Choo, Hosung
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.30 no.3
    • /
    • pp.223-228
    • /
    • 2019
  • This study analyzes the propagation of the path losses between Jeju-do and Jin-do transceivers located in the coastal areas of Korea using the Advanced Refractive Prediction System(AREPS) simulation software based on the actual coastal weather database. The simulated data is used to construct a duct map according to the altitude and thickness of the trap. The duct map is then divided into several regions depending on the altitude parameters of Tx and Rx, which can be used to effectively estimate the abnormal wave propagation characteristics due to duct occurrence in the Jeju-do coastal area. To validate the proposed duct map, two representative atmospheric index samples of the weather database in May 2018 are selected, and the simulated path losses using these atmospheric indices are compared with the measured data. The simulated path losses for abnormal conditions at the Rx point at Jeju-do are 167.7 dB and 192.3 dB, respectively, which are in good agreement with the measured data of 164.4 dB and 194.9 dB, respectively.

A Study on the Application of Cybersecurity by Design of Critical Infrastructure (주요기반시설의 사전예방적보안(Cybersecurity by Design) 적용 방안에 관한 연구)

  • YOO, Jiyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.674-681
    • /
    • 2021
  • Cyber attacks targeting critical infrastructure are on the rise. Critical infrastructure is defined as core infrastructures within a country with a high degree of interdependence between the different structures; therefore, it is difficult to sufficiently protect it using outdated cybersecurity techniques. In particular, the distinction between the physical and logical risks of critical infrastructure is becoming ambiguous; therefore, risk management from a comprehensive perspective must be implemented. Accordingly, as a means of further actively protecting critical infrastructure, major countries have begun to apply their security and cybersecurity systems by design, as a more expanded concept is now being considered. This proactive security approach (CSbD, Cybersecurity by Design) includes not only securing the stability of software (SW) safety design and management, but also physical politics and device (HW) safety, precautionary and blocking measures, and overall resilience. It involves a comprehensive security system. Therefore, this study compares and analyzes security by design measures towards critical infrastructure that are leading the way in the US, Europe, and Singapore. It reflects the results of an analysis of optimal cybersecurity solutions for critical infrastructure. I would like to present a plan for applying by Design.

Ensemble Deep Network for Dense Vehicle Detection in Large Image

  • Yu, Jae-Hyoung;Han, Youngjoon;Kim, JongKuk;Hahn, Hernsoo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.1
    • /
    • pp.45-55
    • /
    • 2021
  • This paper has proposed an algorithm that detecting for dense small vehicle in large image efficiently. It is consisted of two Ensemble Deep-Learning Network algorithms based on Coarse to Fine method. The system can detect vehicle exactly on selected sub image. In the Coarse step, it can make Voting Space using the result of various Deep-Learning Network individually. To select sub-region, it makes Voting Map by to combine each Voting Space. In the Fine step, the sub-region selected in the Coarse step is transferred to final Deep-Learning Network. The sub-region can be defined by using dynamic windows. In this paper, pre-defined mapping table has used to define dynamic windows for perspective road image. Identity judgment of vehicle moving on each sub-region is determined by closest center point of bottom of the detected vehicle's box information. And it is tracked by vehicle's box information on the continuous images. The proposed algorithm has evaluated for performance of detection and cost in real time using day and night images captured by CCTV on the road.