• Title/Summary/Keyword: a user form

Search Result 1,243, Processing Time 0.037 seconds

Mapping Tool for Semantic Interoperability of Clinical Terms (임상용어의 의미적 상호운영성을 위한 매핑 도구)

  • Lee, In-Keun;Hong, Sung-Jung;Cho, Hune;Kim, Hwa-Sun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.1
    • /
    • pp.167-173
    • /
    • 2011
  • Most of the terminologies used in medical domain is not intended to be applied directly in clinical setting but is developed to integrate the terms by defining the reference terminology or concept relations between the terms. Therefore, it is needed to develop the subsets of the terminology which classify categories properly for the purpose of use and extract and organize terms with high utility based on the classified categories in order to utilize the clinical terms conveniently as well as efficiently. Moreover, it is also necessary to develop and upgrade the terminology constantly to meet user's new demand by changing or correcting the system. This study has developed a mapping tool that allows accurate expression and interpretation of clinical terms used for medical records in electronic medical records system and can furthermore secure semantic interoperability among the terms used in the medical information model and generate common terms as well. The system is designed to execute both 1:1 and N:M mapping between the concepts of terms at a time and search for and compare various terms at a time, too. Also, in order to enhance work consistency and work reliability between the task performers, it allows work in parallel and the observation of work processes. Since it is developed with Java, it adds new terms in the form of plug-in to be used. It also reinforce database access security with Remote Method Invocation (RMI). This research still has tasks to be done such as complementing and refining and also establishing management procedures for registered data. However, it will be effectively used to reduce the time and expenses to generate terms in each of the medical institutions and improve the quality of medicine by providing consistent concepts and representative terms for the terminologies used for medical records and inducing proper selection of the terms according to their meaning.

Performance improvement of multiuser detection using antenna array in CDMA base station

  • Nam, Jong-Gil;Lee, Weon-Chul
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.3B
    • /
    • pp.472-486
    • /
    • 2000
  • This paper analysis the performance of joint receiving structure consisting of the decorrelating multiuser detection and beamfromenr-RAKE receive for DS-CDMA communication systems. In asynchronous transmission as the number of simultaneous users increase. the capacity of CDMA system becomes severly reduced due to the nonideal orthogonality between user-assigned PN sequences and improper power control. Accordingly, the CDMA receiving system becomes vulnerable to the multiple access interferences and the near-far problem under multipath fading channel environment. To withstand these undesired performance degradations, this paper proposes the new type of multiuser detection which has a form of the hybrid structure of concatenating beamformer-RAKE receiver and decorrelating multiuser detection. the beam former-RAKE receiver performs temporal and spatial diversity combining with alleviating fading effect and suppressing undesired interferences, and the multiuser detection plays a role of making the receiver robust to the near-far problem. Regarding the individual merit on the usage of either multiuser detection or beamformer-RAKE receiver, the hybrid one is expected to produce the enhanced performance in multipath fading CDMA channel. However major drawback of using decorrelating multiuser detection for practical deployment is arised from its computational complexity , which is exponentially increased as more number of users and transmitted symbols involve. To diminish the computational complexity, this paper exploits an efficient block Toeplitz inversion technique using matrix Levinson polynomial will be introduced. And this paper provided the mathematical analysis to show the efficiency of the proposed joint structure under the multipath propagation environment. And results of a series of exhaustive computer simulations are presented in order to demonstrate the overall performance of the proposed hybrid structure in multipath fading CDMA channel.

  • PDF

Development of Real-time Service Primitive in Message Handling System Supporting Desk-top Conferencing System (데스크탑 회의시스템 지원을 위한 메시지 처리 시스템의 실시간 서비스 프리미티브 개발)

  • 강승찬;김영준
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.2 no.2
    • /
    • pp.169-180
    • /
    • 1998
  • This research presents development of real-time service primitive in MHS(Message Hanling system) supporting desk-top conferencing system. Desk-top conferencing system is one of the real-time GC(Group Communication) services. The complexity of modem society has led to the consequent need for real-time GC between a number of people in order to jointly handle tasks in business, government and other forms of organization. Despite the many different form of desk-top conferencing systems developed to date, there are still few systems in widespred no. One of the biggest hurdle preventing the widespred adoption of real-time GC is the lack of agreement on user-friendly interchange environments. In distributed office environments, the MHS is one of the most widely used service for information interchange. It is a standard of electronic mail system which is concerned mostly with asynchronous exchange of short notes. It is clear that additional functions on MHS are necessary in order to allow users to properly process their real-time group messages and provide them with important facilities as a communication infrastructure for real-time GC.

  • PDF

Content-based Extended CAN to Support Keyword Search (키워드 검색 지원을 위한 컨텐츠 기반의 확장 CAN)

  • Park, Jung-Soo;Lee, Hyuk-ro;U, Uk-dong;Jo, In-june
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.103-109
    • /
    • 2005
  • Research about P2P system have recently a lot of attention in connection of form that pass early Centralized P2P and is Decentralized P2P. Specially, Structured P2P System of DHT base have a attention to scalability and systematic search and high search efficiency by routing. But, Structured P2P System of DHT base have problem, file can be located only their unique File IDs that although user may wish to search for files using a set descriptive keyword or do not have the exact File ID of the files. This paper propose extended-CAN mechanism that creates File ID of Contents base and use KID and CKD for commonness keyword processing to support keyword search in P2P System of DHT base.

  • PDF

A Study on the Fuzzy System for Freeway Incident Duration Analysis (고속도로 사고존속시간 분석을 위한 퍼지시스템에 관한 연구)

  • 최회균
    • Journal of Korean Society of Transportation
    • /
    • v.15 no.4
    • /
    • pp.143-163
    • /
    • 1997
  • Incident management is significant far the traffic management systems. The management of incidents determines the smoothness of freeway operations. The dynamic nature of incidents and the uncertainty associated with them require solutions based on the incident operator's judgment. Fuzz systems attempt to adapt such human expertise and are designed to replicate the decision making capability of on operator. Fuzzy systems process complex traffic information, and transmit it in a simplified, understandable form to human traffic operators. In this study, fuzzy rules were developed based on data from real incidents on Santa Monica Freeway in LosAngeles. The fuzzy rules ail linguistic based, and hence, user-friendly. A comparison of the results from the linguistic model with the real incident durations indicate that the outputs from the model reliably correspond to real incident durations conditions. The model reliably predicts the freeway incident duration. The modes can thus be used as an effective management tool for freeway incident response systems. The approach could be applied to other problems regarding dispatch systems in transportation.

  • PDF

Analysis of Sensible Factors on Service Acceptance Intention of Smart City (스마트시티의 서비스 수용의도에 대한 체감요소 분석)

  • Yang, Jeon-Seong;You, Yen-Yoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.5
    • /
    • pp.146-156
    • /
    • 2021
  • A smart city refers to an intelligent city solving problems arising from the concentration its population using IT technology. Various services such as safety, transportation, environment, education, and medical care are provided in a smart city. Still, the degree of service experienced by the residents is lower compared to the technological maturity. Hence, the service acceptance intention factor needs to be improved. In this study, User Characteristic and Service Characteristic variables were identified separately to improve the awareness and experience of smart services among citizens of the smart city and analyze the intention of easy service acceptance. Based on the results, the present study is expected to improve citizen's quality of life and form a happy society. This improvement in citizens and society is achieved by drawing active participation from citizens and investments from the government and private enterprise through solving various problems in the city.

Protecting Mobile Agent with VPN (VPN을 이용한 이동 에이전트의 보호)

  • 박재경;원유헌
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.3
    • /
    • pp.3-12
    • /
    • 2001
  • In this course of Internet proliferation, many network-related technologies are examined for possible growth and evolution. The use of Internet-based technologies is private networks has further fuelled the demand for network-based applications. The most promising among the new paradigms is the use of mobile agents. The mobile agent is capable of migrating autonomously form node to node in the network, to perform some computations on behalf of the user. The mobile agent paradigm is attractive alternative to traditional client-server programming for a significant class of network-centric applications. It does however, suffer. from a major drawback namely, the potential for malicious attacks, abuse of resources, pilfering of information, and other security issues. These issues are significantly hampering the acceptance of the mobile-agent paradigm. This paper describes the design of a secure mobile agent gateway 7hat can split and merge the agent code with security policy database on the VPN. This mechanism will promote security in the mobile agent systems.

Implementation of Privacy Protection Policy Language and Module For Social Network Services (소셜 네트워크 서비스를 위한 프라이버시 보호 정책언어 및 프라이버시 보호 모듈 구현)

  • Kim, Ji-Hye;Lee, Hyung-Hyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.53-63
    • /
    • 2011
  • An SNS(Social Network Service) enables people to form a social network on online as in the real world. With the rising popularity of the service, side effects of SNSs were issued. Therefore we propose and implement a policy-based privacy protection module and access control policy language for ensuring the right of control of personal information and sharing data among SNSs. The policy language for protecting privacy is based on an attribute-based access control model which grants an access to personal information based on a user's attributes. The policy language and the privacy protection module proposed to give the right of control of personal information to the owner, they can be adopted to other application domains in which privacy protection is needed as well as secure sharing data among SNSs.

GPU Memory Management Technique to Improve the Performance of GPGPU Task of Virtual Machines in RPC-Based GPU Virtualization Environments (RPC 기반 GPU 가상화 환경에서 가상머신의 GPGPU 작업 성능 향상을 위한 GPU 메모리 관리 기법)

  • Kang, Jihun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.5
    • /
    • pp.123-136
    • /
    • 2021
  • RPC (Remote Procedure Call)-based Graphics Processing Unit (GPU) virtualization technology is one of the technologies for sharing GPUs with multiple user virtual machines. However, in a cloud environment, unlike CPU or memory, general GPUs do not provide a resource isolation technology that can limit the resource usage of virtual machines. In particular, in an RPC-based virtualization environment, since GPU tasks executed in each virtual machine are performed in the form of multi-process, the lack of resource isolation technology causes performance degradation due to resource competition. In addition, the GPU memory competition accelerates the performance degradation as the resource demand of the virtual machines increases, and the fairness decreases because it cannot guarantee equal performance between virtual machines. This paper, in the RPC-based GPU virtualization environment, analyzes the performance degradation problem caused by resource contention when the GPU memory requirement of virtual machines exceeds the available GPU memory capacity and proposes a GPU memory management technique to solve this problem. Also, experiments show that the GPU memory management technique proposed in this paper can improve the performance of GPGPU tasks.

Research on China's Internet Financial Risk Supervision and Countermeasures (중국 인터넷 금융 리스크 관리 및 대책 연구)

  • Yuan, Zhao;Sim, Jae-Yeon
    • Industry Promotion Research
    • /
    • v.7 no.4
    • /
    • pp.109-119
    • /
    • 2022
  • In recent years, China's Internet finance industry is hot. There is no doubt that Internet finance has been fully integrated into China, forming a new form of financing, and rapidly becoming a new channel for investment and financing in China, shouldering the responsibility of inclusive financing and building China's real economy. However, with investment, there are risks. Based on the panel data of China's Internet financial platform, this paper uses the random effect model to study the influencing factors of Internet financial risks, and draws three conclusions: (1) The user funds and platform funds of the financial platform will be managed separately by the bank, which can effectively reduce the risk of financial transactions on the Internet; (2) The risk of Internet financial transactions can be effectively reduced by avoiding the concentration of platform funds in the hands of a few borrowers through regulatory policies; (3) The liquidity control of funds effectively reduces the risk of Internet financial transactions. Based on the conclusions, we propose optimization strategies for regulatory policies to achieve the healthy and sustainable development of Internet finance.