• 제목/요약/키워드: information Protection

검색결과 4,510건 처리시간 0.036초

심장동맥 조영 검사 시 검사 조건에 따른 환자 선량 평가 (Evaluation of Radiation Dose to Patients according to the Examination Conditions in Coronary Angiography)

  • 조용인
    • 대한방사선기술학회지:방사선기술과학
    • /
    • 제46권6호
    • /
    • pp.509-517
    • /
    • 2023
  • This study analyzed imaging conditions and exposure index through clinical information collection and dose calculation programs in coronary angiography examinations. Through this, we aim to analyze the effective dose according to examination conditions and provide basic data for dose optimization. In this study, ALARA(As Low As Reasonably Achievable)-F(Fluoroscopy), a program for evaluating the radiation dose of patients and the collected clinical data, was used. First, analysis of imaging conditions and exposure index was performed based on the data of the dose report generated after coronary angiography. Second, after evaluating organ dose according to 9 imaging directions during coronary angiography, with the LAO fixed at 30°, dose evaluation was performed according to tube voltage, tube current, number of frames, focus-skin distance, and field size. Third, the effective dose for each organ was calculated according to the tissue weighting factors presented in ICRP(International Commission on Radiological Protection) recommendations. As a result, the average sum of air kerma during coronary angiography was evaluated as 234.0±112.1 mGy, the dose-area product was 25.9±13.0 Gy·cm2, and the total fluoroscopy time was 2.5±2.0 min. Also, the organ dose tended to increase as the tube voltage, milliampere-second, number of frames, and irradiation range increased, whereas the organ dose decreased as the FSD increased. Therefore, medical radiation exposure to patients can be reduced by selecting the optimal tube voltage and field size during coronary angiography, maximizing the focal-skin distance, using the lowest tube current possible, and reducing the number of frames.

에지 컴퓨팅 기반 객체탐지 서비스를 위한 이미지/동영상 데이터 처리 기법에 관한 연구 (A Study on the Image/Video Data Processing Methods for Edge Computing-Based Object Detection Service)

  • 장신원;홍용근
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제12권11호
    • /
    • pp.319-328
    • /
    • 2023
  • 에지 컴퓨팅 기술은 클라우드 컴퓨팅과 달리 기기와 사용자와 가까운 곳에서 데이터를 분석하고 판단하여 실시간 서비스, 민감한 데이터 보호, 네트워크 트래픽 감소와 같은 장점을 제공한다. 에지 컴퓨팅 플랫폼의 대표적인 오픈소스인 EdgeX Foundry는 현실 세계의 다양한 장치와 IT 시스템 사이에서 서비스를 제공하는 오픈소스 기반 엣지 미들웨어 플랫폼이다. EdgeX Foundry는 기존의 센싱된 데이터를 다루기 위한 서비스와 함께 카메라 장치를 다루기 위한 서비스를 제공하는데, 이 서비스는 단순 스트리밍 및 카메라 장치 관리만 지원할 뿐 EdgeX 내부에 장치에서 얻은 이미지 데이터를 저장하거나 처리하지 않는다. 본 논문에서는 EdgeX Foundry에서 제공하는 서비스 일부를 응용하여 EdgeX 내부에 이미지 데이터를 저장하고 처리할 수 있는 기법을 제시한다. 제시한 기법을 기반으로 실험 및 성능 평가를 위해 자율주행 분야에서 핵심적으로 사용되는 객체탐지 서비스를 위한 서비스 파이프라인을 만든 후 기존 방법과 비교 분석하였다. 이 실험을 통해 에지 컴퓨팅 플랫폼에서 이미지/동영상 데이터를 저장하고 처리하는 과정 등이 추가되었음에도 기존 방법에 비해 지연시간이 거의 없는 것을 확인할 수 있었다.

IT기업의 규제샌드박스 활용 분석 (Analysis of Regulatory Sandbox Usage by IT Companies)

  • 송석주;민대환;이한진
    • 한국IT서비스학회지
    • /
    • 제22권5호
    • /
    • pp.109-124
    • /
    • 2023
  • This study aims to apply the concept of regulatory stringency to the regulatory sandbox with a fresh perspective. The regulatory sandbox is a system that gives opportunities under certain conditions to new technologies or businesses that have not been launched due to inadequacy or insufficiency in legal systems. Previous research on regulatory sandboxes has mainly focused on discussions about their impact on specific technologies or business domains. This study attention to the results according to the evaluations. Among them, whether special cases for demonstration can evolve into official permission has garnered significant attention. For this study, among the cases that passed the regulatory sandbox evaluation from February, 2019, to December, 2022, 162 cases in the field of ICT convergence were selected. The evaluation results were classified into three groups 'positive interpretation (Fast Track)', 'temporary permission', and 'special case for demonstration.' Each case was assigned to one of the three groups. Through the comparative analysis, the common characteristics and differences were summarized. Then, this study explored improvement measures to pass a less restrictive regulatory sandbox. The analysis of the cases revealed that the differences in each evaluation result were attributed to variations in the technological characteristics and user protection features. Considering these differences, as well as the higher weight and importance of the preparation stage for sandbox application, this study suggested a three-step approach to prepare for temporary permission and positive interpretation rather than special case for demonstration. In addition, this thesis discussed the policy limitations of the regulatory sandbox mechanism in South Korea and the limitations of the current study. Hopefully, the results of this study would be beneficial to individuals and companies, particularly venture companies and startups seeking to develop new technologies or businesses and utilize regulatory sandboxes.

A Digital Forensic Framework Design for Joined Heterogeneous Cloud Computing Environment

  • Zayyanu Umar;Deborah U. Ebem;Francis S. Bakpo;Modesta Ezema
    • International Journal of Computer Science & Network Security
    • /
    • 제24권6호
    • /
    • pp.207-215
    • /
    • 2024
  • Cloud computing is now used by most companies, business centres and academic institutions to embrace new computer technology. Cloud Service Providers (CSPs) are limited to certain services, missing some of the assets requested by their customers, it means that different clouds need to interconnect to share resources and interoperate between them. The clouds may be interconnected in different characteristics and systems, and the network may be vulnerable to volatility or interference. While information technology and cloud computing are also advancing to accommodate the growing worldwide application, criminals use cyberspace to perform cybercrimes. Cloud services deployment is becoming highly prone to threats and intrusions. The unauthorised access or destruction of records yields significant catastrophic losses to organisations or agencies. Human intervention and Physical devices are not enough for protection and monitoring of cloud services; therefore, there is a need for more efficient design for cyber defence that is adaptable, flexible, robust and able to detect dangerous cybercrime such as a Denial of Service (DOS) and Distributed Denial of Service (DDOS) in heterogeneous cloud computing platforms and make essential real-time decisions for forensic investigation. This paper aims to develop a framework for digital forensic for the detection of cybercrime in a joined heterogeneous cloud setup. We developed a Digital Forensics model in this paper that can function in heterogeneous joint clouds. We used Unified Modeling Language (UML) specifically activity diagram in designing the proposed framework, then for deployment, we used an architectural modelling system in developing a framework. We developed an activity diagram that can accommodate the variability and complexities of the clouds when handling inter-cloud resources.

블록체인을 적용한 군(軍) 전자적 비밀관리 개선방안 (전장관리정보체계 중심으로) (Blockchain applied Military Electronic Secret Document Management Scheme (focused on C4i))

  • 윤홍;차영균;박종범
    • 융합보안논문지
    • /
    • 제23권5호
    • /
    • pp.181-187
    • /
    • 2023
  • 현재 군의 작전은 다양한 정보·분석·무기·작전체계 등을 이용하여 효과적으로 적을 제압하는데 목적을 두고 있다. 이러한 여러 체계들은 통합적인 구성과 해당 자료를 분석·공유하는 기능들로 이루어져야 한다. 이에 우리 군에서 운용하고 있는 전장관리정보체계는 다양한 데이터를 수집·분석하여 비밀을 생산·공유하여 효과적인 작전을 수행한다. 하지만 전장관리정보체계에서는 비밀의 생산부터 페기·이관까지 전자적인 형태로 운용하지 못하고 있으며, 출력물 기반으로 관리함에 따라 관리의 어려움과 분실 및 유출 등의 다양한 문제가 남아있다. 따라서 본 논문에서는 모든 비밀을 전자문서형식으로 관리하고 무결성과 부인방지를 제공하기 위해 블록체인 기술을 적용한 ESDMB(Electronic Secret Document Management with Blockchain)방안을 제시한다. 특히, 이 제안방식에서는 비밀 생산부터 파기까지 조작 및 유출 등에 대한 보호 대책으로 적합할 것으로 생각된다.

챗봇서비스 구현 모델의 보안요구사항 분석 (Analysis of the Security Requirements of the Chatbot Service Implementation Model)

  • 조규민;이재일;신동규
    • 인터넷정보학회논문지
    • /
    • 제25권1호
    • /
    • pp.167-176
    • /
    • 2024
  • 챗봇서비스는 AI서비스와 연계하여 다양한 분야에서 활용되고 있다. AI에 대한 보안 연구는 초기 단계이고, 이를 이용한 서비스 구현단계에서의 실질적인 보안 연구는 더욱 부족한 상황이다. 본 논문은 AI서비스와 연계된 챗봇서비스에 대한 보안요구사항을 분석한다. 먼저, 본 논문에서는 최근 발표된 AI보안에 대한 논문과 자료들을 분석한다. 시장에서 서비스가 제공되는 있는 챗봇서비스를 조사하여 일반적인 구현 모델을 정립한다. 구현 모델에는 챗봇관리시스템과 AI엔진이 포함된 5개의 구성요소가 포함되어 있다. 정립된 모델에 기반하여 쳇봇서비스에 특화된 보호자산과 위협을 정리한다. 위협은 실제 운영중인 챗봇서비스 담당자 설문을 통해 챗봇서비스에 특화된 위협을 중심으로 정리한다. 10개의 주요 위협이 도출되었다. 정리된 위협에 대응하기 위해 필요한 보안 영역을 도출하였고, 영역별로 필요한 보안요구사항을 분석하였다. 이는 챗봇서비스 보안 수준을 검토하고 개선하는 과정에서 보안평가 기준으로 활용될 것이다.

Analysis of University Cafeteria Safety Based on Pathfinder Simulation

  • Zechen Zhang;Jaewook Lee;Hasung Kong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제16권2호
    • /
    • pp.209-217
    • /
    • 2024
  • Recent years have seen a notable increase in fire incidents in university cafeterias, yet the social attention to these occurrences remains limited. Despite quick responses to these incidents preventing loss of life, the need for large-scale evacuation in such high foot traffic areas can cause significant disruptions, economic losses, and panic among students. The potential for stampedes and unpredictable damage during inadequate evacuations underscores the importance of fire safety and evacuation research in these settings. Previous studies have explored evacuation models in various university environments, emphasizing the influence of environmental conditions, personal characteristics, and behavioral patterns on evacuation efficiency. However, research specifically focusing on university cafeterias is scarce. This paper addresses this gap by employing Pathfinder software to analyze fire spread and evacuation safety in a university cafeteria. Pathfinder, an advanced emergency evacuation assessment system, offers realistic 3D simulations, crucial for intuitive and scientific evacuation analysis. The studied cafeteria, encompassing three floors and various functional areas, often exceeds a capacity of 1500 people, primarily students, during peak times. The study includes constructing a model of the cafeteria in Pathfinder and analyzing evacuation scenarios under different fire outbreak conditions on each floor. The paper sets standard safe evacuation criteria (ASET > RSET) and formulates three distinct evacuation scenarios, considering different fire outbreak locations and initial evacuation times on each floor. The simulation results reveal the impact of the fire's location and the evacuation preparation time on the overall evacuation process, highlighting that fires on higher floors or longer evacuation preparation times tend to reduce overall evacuation time.In conclusion, the study emphasizes a multifaceted approach to improve evacuation safety and efficiency in educational settings. Recommendations include expanding staircase widths, optimizing evacuation routes, conducting regular drills, strengthening command during evacuations, and upgrading emergency facilities. The use of information and communication technology for managing emergencies is also suggested. These measures collectively form a comprehensive framework for ensuring safety in educational institutions during fire emergencies.

Prevalence and Determinants of Catastrophic Healthcare Expenditures in Iran From 2013 to 2019

  • Abdoreza Mousavi;Farhad Lotfi;Samira Alipour;Aliakbar Fazaeli;Mohsen Bayati
    • Journal of Preventive Medicine and Public Health
    • /
    • 제57권1호
    • /
    • pp.65-72
    • /
    • 2024
  • Objectives: Protecting people against financial hardship caused by illness stands as a fundamental obligation within healthcare systems and constitutes a pivotal component in achieving universal health coverage. The objective of this study was to analyze the prevalence and determinants of catastrophic health expenditures (CHE) in Iran, over the period of 2013 to 2019. Methods: Data were obtained from 7 annual national surveys conducted between 2013 and 2019 on the income and expenditures of Iranian households. The prevalence of CHE was determined using a threshold of 40% of household capacity to pay for healthcare. A binary logistic regression model was used to identify the determinants influencing CHE. Results: The prevalence of CHE increased from 3.60% in 2013 to 3.95% in 2019. In all the years analyzed, the extent of CHE occurrence among rural populations exceeded that of urban populations. Living in an urban area, having a higher wealth index, possessing health insurance coverage, and having employed family members, an employed household head, and a literate household head are all associated with a reduced likelihood of CHE (p<0.05). Conversely, the use of dental, outpatient, and inpatient care, and the presence of elderly members in the household, are associated with an increased probability of facing CHE (p<0.05). Conclusions: Throughout the study period, CHE consistently exceeded the 1% threshold designated in the national development plan. Continuous monitoring of CHE and its determinants at both household and health system levels is essential for the implementation of effective strategies aimed at enhancing financial protection.

간호대학생의 인터넷 윤리의식, 자기통제력, 간호전문직관 및 환자개인정보 보호인식간의 관계분석 (Analysis of the relationship between nursing students' Internet ethics awareness, self-control, nursing professional intuition, and patient privacy protection awareness)

  • 김외남;오재우; 김정회
    • 문화기술의 융합
    • /
    • 제10권3호
    • /
    • pp.693-701
    • /
    • 2024
  • 본 연구에서는 임상실습경험이 있는 간호대학생을 대상으로 인터넷 윤리의식, 자기통제력, 간호전문직관 및 환자개인정보보호 인식간의 관계를 살펴보고, 정보화 시태의 흐름을 반영하여 환자개인정보 보호 인식 향상프로그램 개발을 위한 기초자료를 제공하고자 시도되었다. 자료수집기간은 2023년 11월 20일부터 12월 15일까지이며. 대전광역시와 청주시 소재 D대학교 및 C대학교에 재학중이며 본 연구에 참여 동의한 간호대학생 142명의 설문지가 분석되었다. 분석결과 간호대학생의 환자개인정보 보호인식에 미치는 영향요인은 간호전문직관과 자기통제력으로 나타났으며, 이들의 변수에 대한 설명력은 24%였다. 결론적으로 간호대학생의 환자개인정보 보호인식을 향상시키기 위해서는 인터넷 윤리의식을 증진시킬 수 있는 방안을 모색하고 간호전문직관을 높일 수 있는 교육 프로그램개발이 이루어져야 할것으로 생각된다.

멸종위기 야생생물 민원 텍스트 마이닝 연구 - LDA 토픽 모델링과 네트워크 분석을 통한 주요 이슈 발굴 - (A Text Mining Study on Endangered Wildlife Complaints - Discovery of Key Issues through LDA Topic Modeling and Network Analysis -)

  • 김나영;남희정;박용수
    • 한국환경복원기술학회지
    • /
    • 제26권6호
    • /
    • pp.205-220
    • /
    • 2023
  • This study aimed to analyze the needs and interests of the public on endangered wildlife using complaint big data. We collected 1,203 complaints and their corresponding text data on endangered wildlife, pre-processed them, and constructed a document-term matrix for 1,739 text data. We performed LDA (Latent Dirichlet Allocation) topic modeling and network analysis. The results revealed that the complaints on endangered wildlife peaked in June-August, and the interest shifted from insects to various endangered wildlife in the living area, such as mammals, birds, and amphibians. In addition, the complaints on endangered wildlife could be categorized into 8 topics and 5 clusters, such as discovery report, habitat protection and response request, information inquiry, investigation and action request, and consultation request. The co-occurrence network analysis for each topic showed that the keywords reflecting the call center reporting procedure, such as photo, send, and take, had high centrality in common, and other keywords such as dung beetle, know, absence and think played an important role in the network. Through this analysis, we identified the main keywords and their relationships within each topic and derived the main issues for each topic. This study confirmed the increasing and diversifying public interest and complaints on endangered wildlife and highlighted the need for professional response. We also suggested developing and extending participatory conservation plans that align with the public's preferences and demands. This study demonstrated the feasibility of using complaint big data on endangered wildlife and its implications for policy decision-making and public promotion on endangered wildlife.